It takes…

It takes about 60 seconds to find out that you are a victim of identity theft...

It takes an average of 600 hours to restore your identity, if you try it yourself.

Don't be a victim, get the best protection on the market today

Saturday, September 29, 2012

Medical ID Theft On The Rise, Could Put Lives In Danger

We’ve all heard of identity theft and having our financial information stolen. But now there’s a new, scary twist on this crime.
Thieves are stealing medical identities, and that’s leaving victims with big bills and the potential for medical catastrophes.
Lisa is on the hook for $50,000 for services and drugs obtained in half-dozen states.


http://boston.cbslocal.com/2012/09/27/i-team-medical-id-theft-on-the-rise-could-put-lives-in-danger/

Saturday, September 22, 2012

'Packed house' for ID theft protection in Forest Lake, MN

FOREST LAKE, Minn. - Meetings at the library aren't usually sell outs but on Thursday night in Forest lake, the line went out the door to get in.
That's because folks are concerned and they wanted to hear from police about what is being done to investigate a recent rash of identity thefts.
Identity theft hit this community with a bang when ten women, who all live in the same neighborhood, most on the same street had their identities stolen in the last few weeks.
Read More

Infant to senior: How identity theft is affecting every generation

An infant’s Social Security number is used in a credit card application. A 10-year-old’s identification information is used to apply for a car loan. Grandpa gets an email claiming that he won the lottery and needs to provide information to collect the winnings. Today, identity theft can occur to anyone, not just middle-aged adults. Savvy thieves are targeting every generation, from child to adult to senior. It’s important to stay alert so every member of your family is better protected.
Child ID theft
Think you don’t have to worry about identity theft for your kids? The fact is more than 19,000 cases of child identity theft were reported in 2011, up from about 6,000 in 2003, according to the Federal Trade Commission.

  How does this occur to children, who typically don’t even have a bank account? Every day many parents send their children to school and child care with personal information in their backpacks. Backpacks are typically hung out of sight for hours or information can end up in desks for days, providing ample opportunity for identity thieves.

Read more

Thursday, September 20, 2012

94 Million Exposed: The Government's Epic Fail on Privacy

When you hear a number like "94 million" in the news, it's usually because somebody won the lottery. This time around, no such luck. This 94 million is the number of Americans' files in which personal information has been exposed, since 2009, to potential identity theft through data breaches at government agencies. Go ahead, count the zeroes: 94,000,000. That's like releasing the personal data of every man, woman and child in California, Texas, New York, and Ohio.

 http://www.huffingtonpost.com/adam-levin/government-data-security_b_1897229.html

Learn how to fight identity theft

By bringing electronic communications and banking to our computers and now our smart phones, technology certainly has made life easier in so many ways.

Want to pay a bill? Just go online and do it. Want to order some clothes or books? That’s just a click away. Need some gas for the car? Pop the credit card in the slot at the service station.


With such convenience has come a horrifying problem, and it’s unfortunately one that more people become familiar with each year. Identity theft is on the rise, and every day people in our area are discovering that someone has made purchases with a fake credit card based on a stolen ID.


Identity theft is often called the fastest growing crime in the nation. No one, even the most Internet-savvy person or someone who is exceptionally cautious, is immune to having their identity stolen. The crooks devote much time and research to staying ahead of efforts to stop this crime, and they are most imaginative.

Read more here:  Learn how to fight identity theft

 Get protection TODAY

Thursday, July 12, 2012

How to Protect Your Personal Information When Looking for Work in Today’s Economy


Unemployment continues to be a top issue in the US, so it’s
not surprising that some job seekers will do whatever it takes
to gain employment. This “desperate times call for desperate
measures” approach has, unfortunately, attracted the attention
of identity thieves and scammers, taking full advantage of what
they perceive as a lucrative venture. Phishbucket.org, an online
clearinghouse of job scam information, states the number of
reported job scams tripled between 2008 and 2010.

There is, however, some good news for job seekers –
understanding the risks before you begin your job search will
not only help you avoid identity theft, it can make your job
search more productive, too.
Here the Investigators of the Fraud Solutions division of Kroll
outline some of the key factors job seekers should keep in mind
to protect their personal information during the job search
process.

» Remember: your resume is a hot commodity. Resumes
are an essential tool for someone looking for a job. They
reveal a lot about you and your professional background
– information which is important to potential employers.
Still, there are some items that should never be disclosed,
particularly if you intend to post your resume on career
websites. Social Security Number (SSN), driver’s license
number, and date of birth should never appear on a resume.
The same goes for job applications: you might consider
writing “prefer to provide this information during the
interview” in the fields where these pieces of personal
information are requested.

» Proceed cautiously with career websites. Not all job posting
websites are created equal. Make sure you review the
privacy policy and user terms and agreements before you
post your resume on a career website. You may also want
to do some online research to ensure that the site you are
working with is credible. When in doubt check with online
resources such as The World Privacy Forum’s Consumer’s
Guide to Online Job Sites. That said, it’s important to
remember that no matter how credible the site or how well
it safeguards the data it keeps, no one can guarantee what
happens to your resume after it has been downloaded by
a recruiter or potential employer. For that reason, you may
want to inquire if the site allows you to mask your name
and contact information, thus giving you the ability to
choose who can and cannot contact you.

» Know how to spot bogus job ads. Job-related identity theft
scams are becoming increasingly sophisticated. Despite the
best screening efforts used by career sites, scammers seem
to find a way in. You might be looking at a fake job ad if it:
- Offers considerable pay with few to no duties
- Promises payment of wages in cash
- Contains no physical address or contact person
- Requires you to open a new bank account or accept
company checks to “test” a wire transfer service

Most employment sites offer information on known scams, and
should be notified immediately if you suspect that a posted job
isn’t legitimate. You can also conduct an internet search on the
company or check with the Better Business Bureau to determine
if the potential employer has a bad reputation.

» Carry good data security practices with you offline. Keeping
personal information off a resume is only the first step—
other vulnerable situations include phone interviews, job
fairs, and e-mail and phone conversations with recruiters.
Scammers know that as long as someone thinks an offer
is genuine, they are more likely to provide sensitive
information. Make sure that you know who you’re talking
to and never divulge any personal information if you have
doubts about their credibility.  

Remember that virtually all
legitimate businesses or recruiters will not ask for your SSN
or other information until after you have begun a formal
interview process. A legitimate company should not ask
you to divulge personal identifiers via email as email is not
secure.



» Think before you post! Social networking sites are a great
way of communicating your talent and expertise with a
larger community of individuals. But sometimes staying
connected comes at a cost. What many do not realize is
that the more information you reveal online, the greater
your chances of having that information accessed by
the wrong person. Carefully consider what information
you include on your profile page. For example, is it really
necessary to share your date of birth and address with
potential employers? When in doubt, remember this: if
you wouldn’t give this information to a stranger on the
street – you probably don’t want to put it online for the
world to see.

» Secure your delivery channels. Before sharing information
online, make sure the computer or other device you
use is equipped with current anti-malware and other
appropriate security programs. In addition, use a secure
network. The coffee shop’s free wi-fi isn’t the best avenue
for reaching a potential employer because of the risk of
data being stolen en route.

Tuesday, March 27, 2012

Identity theft tax fraud on the rise

What Mersinger didn’t know was his ordeal of police reports, sworn affidavits, unreturned phone calls and ambiguous, frustrating communication from an understaffed government agency was just beginning. He also didn’t know that he will likely wait a year or more to get his $3,500 tax refund, as he becomes one more victim of a fraud that is costing the American taxpayers billions in stolen U.S. Treasury funds and government resources.
http://www.news-press.com/article/20120327/NEWS01/303270002/1051/RSS05/Exclusive-Identity-theft-tax-fraud-rise?odyssey=nav|head

Sunday, March 25, 2012

The attack of the annoying computer passwords

    The attack of the annoying computer passwords
POSTED: March 25, 2012 12:30 a.m.
My life has been overtaken by passwords.
I have so many passwords now for so many websites that I cannot keep them straight.
I have to have a password for everything. My bank account. My credit card. The cable company. The cell phone company. Amazon.com. The UGA ticket office. I even need a password to sign into this newspaper's website.
I understand the need to have different passwords. Elsewhere in today's paper is a story about identity theft and the fact that Gainesville has the 22nd highest rate of identity theft of any city in the country.
I understand that I should make my passwords as complicated as possible so that other can't easily figure them out.
I understand that by having different passwords for all the websites I visit makes it that much more difficult for some bad person to access all of my personal information and to steal my identity.
I understand it, but I don't like it.
When I first started using the Internet years ago, you almost never needed a password. And when you did, it didn't matter if the password you chose was something short and simple.
I chose "glory," the name of the black and white springer spaniel that lives at my house, as my password.
Before long, websites started requiring that my passwords be a combination of letters and numbers. So I threw a couple of numbers at the end of "glory" and went about my business.
But then identity theft became a big issue, and websites starting requiring that your passwords be longer and more complicated to remember. And the IT experts began recommending that we all use a different password for every website on which we have accounts.
I remember signing up for one website. When I attempted to use my standard "glory" password, the website wouldn't accept it. It wasn't long enough
"Please enter a password that is 8-20 characters long."
Eight characters? Really? I can barely remember what I ate for lunch yesterday, and I'm supposed to remember an eight-character password?
The only thing I could think of with eight characters was "Snow White and the Seven Dwarfs." Didn't figure that would work as a password.
Now some websites require that passwords include not only letters and numbers, but also special characters, such as "#," "_," "*," or "/."
So now I have about six different passwords, and use one variation every time I sign up for a new site. They all are long. They all have numbers, letters and special characters. And they are all impossible to remember.
Last week, I went to a website and typed in my password.
I got an error message. "There was an error with your email/password combination. Please try again," it said.
I must have made a typo. I tried the same password again. No luck.
I tried one of my other passwords. It didn't work, either.
After about four more attempts, the website locked me out for exceeding the number of sign-in attempts allowed. So I had to call the company and verify who I was to be allowed access to my account.
I told this story to the newspaper's IT guy one day last week.
"There's a really good way to create a password that will never cause you any trouble," he said.
Do tell, I said.
"Use a favorite quote from a book or movie as your password," he said. "That way you have a capital letter at the beginning and a period at the end, and that takes care of your need for special characters."
It seems foolproof, and I'm excellent at quoting things, from "The Andy Griffith Show" to "Casablanca" to "The West Wing." Now all I need to do is come up with an obscure enough quote from one of my favorite movies, and I shouldn't struggle to remember passwords anymore.
Although it probably sums up my attitude about passwords best, I think it best to reject that famous quote that starts, "Frankly, Scarlett."
Mitch Clarke is executive editor of The Times. His column appears Sundays. Read previous columns at gainesvilletimes.com/mitch. Follow him on Twitter @MitchTimes.


                        

Dating safety: Don't let them steal more than your heart

Posted: Mar 24, 2012, 5:42 am

By ARA content
ARA content
When your grandparents started dating, chances are they knew each other already or had mutual friends. In those days, a blind date — going out with someone you hadn't met or knew nothing about — was a rarity.

Today, with the boom in online dating, going on first dates with strangers is commonplace, while dating a friend seems like the "old-fashioned" approach.

Plenty of people find love online every year, but when you're dating a stranger, it's important to take steps to ensure the only thing they steal is your heart. Online dating, and other forms of blind dating, require extra caution to protect your personal information from those who might use it without your permission.

Safely connecting online

Joining one or more dating websites can be a great way to meet people you might enjoy spending time with. Yet, nearly half of online daters fail to verify the authenticity of a potential match before communicating, according to a survey conducted by Impulse Research on behalf of ProtectMyID.

By following some basic safety guidelines, you can help ensure the experience is as positive as possible and minimize the risk of being targeted by cyber criminals who frequent dating sites.

First, be careful what you share in your profile. Never provide your full name, phone numbers, personal email addresses, home address, or other potentially identifying information such as where you work. Use the website's built-in tools for contacting and communicating with other members.

Be wary of requests for personal information such as where you bank or what you are doing. And be careful to not reveal potentially valuable information, such as your mother's maiden name (a frequently used identifier for online accounts).

These warnings sound obvious, but be alert that the information doesn't reveal itself in obvious ways. Scammers might make a request for a banking recommendation, or an inquiry as to where your family is from.

No matter how convincing the story, never respond to a request for money or financial information. Instead, report the individual to the website's security team; there's never any reason for someone you've just met (or haven't yet met) to make that kind of request.

While you're bringing so many new people into your life, keep an eye on your credit and financial accounts to ensure you detect fraud quickly. An identity theft protection service like ProtectyMyID can help you monitor your credit and know sooner if your identity has been compromised.

ProtectMyID uses daily Internet scanning to determine if your information appears on suspect sites or chat rooms that specialize in trafficking stolen credit card numbers. Identity theft resolution agents also provide personal assistance to resolve new identity theft issues.

Communicating safely

Once you've made initial contact, be smart and cautious in your communications. Don't exchange private emails or engage in texting or instant messaging until you've gotten to know the person better through the website's protected communication methods.

When you're ready to talk to each other, consider doing so through an online service like Skype or Yahoo Messenger, rather than exchanging phone numbers. These free services allow you to have a voice conversation over the computer without revealing something as personal as your cell phone or land line number.

Meeting for the first time

When you take the next step and meet in person, always take precautions. Meet in a public place and make sure a trusted loved one knows where you will be, who you are with and how long you expect to be there. Keep your cell phone handy and consider arranging a check-in with a trusted friend.

Drive your own car to the meeting or arrange for your own taxi; don't rely on your date for transportation. Adhere to the safety basics that you always have in place when you go out, including keeping personal items and your drink in your possession at all times and leaving unneeded ID like your Social Security card at home.

If meeting your online date requires long-distance traveling, you need to be even more careful and smart. Make sure someone at home knows your travel plans and schedule.

If you're arriving at your destination by plane, do not accept a ride from the person you're meeting and don't agree to stay in their home. Instead, arrange for your own rental car or taxi and stay in a hotel. Do not disclose the location of the hotel until you've met the person and established a level of trust.

Finally, if something doesn't feel right or you feel pressured, end the date immediately. Trusting your gut can help protect you from an unpleasant or unsafe experience.

Smartphone owners experience greater incidence of fraud--Data Breach Victims 9.5 Times More Likely To Be Fraud Victims

   Smartphone owners experience greater incidence of fraud-- Data Breach Victims 9.5 Times More Likely To Be Fraud Victims      

SAN FRANCISCO, Feb 22, 2012 (BUSINESS WIRE) -- --Data Breach Victims 9.5 Times More Likely To Be Fraud Victims
The 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier, released today by Javelin Strategy & Research ( www.javelinstrategy.com ), reports that in 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held steady. The report also took the nation's most comprehensive quantitative look at consumer behavior and fraud and found consumers' social media and mobile behaviors may be putting them at greater risk.
Now in its ninth consecutive year, the comprehensive analysis of identity fraud trends is independently produced by Javelin Strategy & Research and made possible by Fiserv, Intersections Inc. and Wells Fargo & Company, companies dedicated to consumer fraud prevention and education. It is the nation's longest-running study of identity fraud, with 42,951 respondents surveyed over the past nine years.
Identity fraud is defined as the unauthorized use of another person's personal information to achieve illicit financial gain. In October 2011, Javelin Strategy & Research conducted an address-based survey of 5,022 U.S. consumers to identify important findings about the impact of fraud, uncover areas of progress, and identify areas in which consumers must exercise continued vigilance.
"While identity fraud incidence increased last year, it is becoming less profitable for fraudsters. Consumers, the financial services industry, law enforcement and government agencies are stopping fraud earlier and making new account fraud more difficult to perpetrate," said James Van Dyke, president and founder of Javelin Strategy & Research. "The study found specific opportunities for improvement. Consumers must be vigilant and in control of their personal data as they adopt new mobile and social technologies in order to not make it easier for fraudsters to perpetrate crimes. Our survey found data breaches are increasingly putting consumers at risk. Consumers and organizations should always carefully and actively monitor accounts, but they should pay particular attention after an incident."
Key Findings
The study found four overall fraud trends:
-- Identity fraud incidents increased, amount stolen remained steady--The number of identity fraud incidents increased by 13 percent over the past year, but the dollar amount stolen remained steady. Additionally, consumer out-of-pocket costs have decreased by 44 percent since 2004, likely due to the improved prevention and detection tools that have come available as well as fraud alerts leading to reduced detection time.
-- Social behaviors put consumers at risk--For the first time, Javelin examined social media and mobile phone behaviors and identified certain social and mobile behaviors that had higher incidence rates of fraud than all consumers. LinkedIn, Google+, Twitter and Facebook users had the highest incidence of fraud although there is no proof of direct causation. The survey found that despite warnings that social networks are a great resource for fraudsters, consumers are still sharing a significant amount of personal information frequently used to authenticate a consumer's identity. Surprisingly those with public profiles (those visible to everyone) were more likely to expose this personal information. Specifically, 68 percent of people with public social media profiles shared their birthday information (with 45 percent sharing month, date and year); 63 percent shared their high school name; 18 percent shared their phone number; and 12 percent shared their pet's name--all are prime examples of personal information a company would use to verify your identity.
-- Smartphone owners experience greater incidence of fraud--The survey found seven percent of smartphone owners were victims of identity fraud. This is a 1/3rd higher incidence rate compared to the general public. Part of this increase may be attributable to consumer behavior: 32 percent of smartphone owners do not update to a new operating system when it becomes available; 62 percent do not use a password on their home screen--enabling anyone to access their information if the phone is lost; and 32 percent save login information on their device
-- Data Breaches increasing and more damaging -- One likely contributing factor to the fraud increase was the 67 percent increase in the number of Americans impacted by data breaches compared to 2010. Javelin Strategy & Research found victims of data breaches are 9.5 times more likely to be a victim of identity fraud than consumers who did not receive such a data breach letter.
Understanding the Findings
Approximately 1.4 million more adults were victimized by identity fraud in 2011, compared to 2010. Countering this rise is the successful effort to combat identity fraud coupled with greater consumer awareness of the issue. While the number of fraud incidents increased, the total amount lost remained steady.
One of the key factors potentially contributing to the increase in incidents was the significant rise in data breaches. The survey found 15 percent of Americans, or about 36 million people, were notified of a data breach in 2011. Consumers receiving a data breach notification were 9.5 times more likely to become a victim of identify fraud.
According to the survey the three most common items exposed during a data breach are:
-- Credit card number
-- Debit card number
-- Social Security number
Some factors contributing to the decline in overall fraud amounts are the more stringent criteria financial institutions are applying to authenticate users and determine credit risk, as well as more Americans monitoring accounts online and using monitoring protection services that can provide alerts and updates. For the first time, more Americans detected fraud by monitoring accounts through the internet, ATM or other electronic means than by examining paper records (24 percent vs. 11 percent). Additionally, there was a 42 percent decline in new account fraud, which can be the most costly and difficult to detect.
When it comes to social networks, LinkedIn users are more than twice as likely to have reported being a victim. Fraud incidence among MySpace users is lower compared to the general consumer. Additionally, those consumers who regularly check-in with GPS-enabled information also reported fraud rates more than double the average.
Eight Safety Tips to Protect Consumers
Javelin Strategy & Research recommends that consumers follow a three-step approach to minimize their risk and impact of identity fraud: Prevention, Detection and Resolution(TM).
Prevention
1. Keep personal data private--At home, at work and on your mobile devices, secure your personal and financial records in a locked storage device or behind a password. Of those consumers who knew how the crimes were committed, nine percent of all identity fraud crimes were committed by someone previously known to the victim in 2011. Avoid mailing checks to pay bills or to deposit funds in your banking account. Use online bill payment on a secure Internet access (not a public Wi-Fi hotspot) instead and direct deposit payroll checks.
2. Be social, be responsible--While social networks are popular, be careful about publicly exposing personal information that is typically used for authentication (full birthdate, high school name). This applies to all social networks.
3. Use mobile devices responsibly--Mobile devices are a treasure trove of information for fraudsters. The "always on" functionality of mobile devices provides fraudsters with new avenues for securing information. Be sure of the applications you download, the data you share over public Wi-Fi and where you leave your devices.
4. Ask questions-- Before providing any information on mobile phones, social media sites and transactions sites, question who is asking for the information? Why do they need it? How is the information being used? If volunteering information, ask yourself if you have more to gain or more to lose by sharing personal and unnecessary details.
Detection
5. Take control--In 2011, 43 percent of fraud was first detected by the victims. By monitoring accounts online at bank and credit card websites, and setting up alerts that can be sent via e-mail and to a mobile device, consumers can more quickly detect if they are a victim of identity fraud and stop it early.
6. Learn about methods to protect your identity--There is a wide array of services available to consumers who want extra protection and peace of mind. These include credit monitoring, fraud alerts, credit freezes and database scanning. Some services can be obtained for a fee and others at no cost. These services can detect potentially fraudulent information from credit reports, public records, and online activity that are difficult to track on your own.
Resolution
7. Report problems immediately--Work with your bank, credit union or protection services provider to take advantage of resolution services, loss protections and methods to secure your accounts. A fast response can enhance the likelihood that losses are reduced, and law enforcement can pursue fraudsters so they experience consequences for their actions.
8. Take any data breach notification seriously--If you receive a data breach notification, take it very seriously as you are at much higher risk according to the 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier. If you receive an offer from your financial institution or retailer for a free monitoring service after a breach, you should take advantage of the offer or closely monitor your accounts directly.
For Additional Educational Tips, Consumers Should Visit:
-- Fiserv http://www.ebillplace.com/staysafe
-- Intersections Inc. http://www.identityguard.com/identity-theft/protect-identity
-- Wells Fargo www.wellsfargo.com/privacy_security/fraud_prevention/
-- Better Business Bureau www.us.bbb.org
To take an identity fraud safety quiz and download a free consumer version of Javelin's identity fraud report, and get additional safety tips, visit www.idsafety.net .
Law enforcement professionals who are sworn officers and are interested in obtaining a copy of the complete report, please contact: nozawa@javelinstrategy.com.

What Are the Latest Identity Theft Statistics?

What Are the Latest Identity Theft Statistics?

Posted on March 24th, 2012
Read 239 times.
The 2012 Identity Fraud Report: Social Media and Mobile Forming the New Fraud Frontier, released by Javelin Strategy & Research, reports that in 2011 identity fraud increased by 13 percent. More than 11.6 million adults became a victim of identity fraud in the United States, while the dollar amount stolen held steady.
Approximately 1.4 million more adults were victimized by identity fraud in 2011, compared to 2010. Countering this rise is the successful effort to combat identity fraud coupled with greater consumer awareness of the issue. While the number of fraud incidents increased, the total amount lost remained steady.
One of the key factors potentially contributing to the increase in incidents was the significant rise in data breaches. The survey found 15 percent of Americans, or about 36 million people, were notified of a data breach in 2011. Consumers receiving a data breach notification were 9.5 times more likely to become a victim of identify fraud.
According to the survey the three most common items exposed during a data breach are:
Credit card number
– Debit card number
– Social Security number
What Are the Latest Identity Theft Statistics?
Here are some eye-opening statistics:
•           500 million—the number of consumers from 2005 to 2009 whose personal and financial data has been exposed as a result of corporate data breaches—events the victims cannot control despite taking personal safety measures
•           400%—victims who found out about their identity theft more than six months after it happened incurred costs four times higher than the average
•           165 hours—the average amount of time victims spent repairing the damage done by creation of new fraudulent accounts
•           58 hours—the average amount of time victims spent repairing the damage done to existing accounts
•           43%—the percentage of identity theft occurring from stolen wallets, check-books, credit cards, billing statements, or other physical documents
•           1 in 4—number of American adults who have been notified by a business or checkbooks, credit cards, billing statements, or other physical documents
•           Once every three seconds—how often an identity is stolen
The most efficient way to protect your identity is with an identity theft protection service and get a credit freeze.

Thursday, March 15, 2012

Prevention Tips:
1.Review a current copy of your credit report.
2. Make sure you shred “junk mail” and unwanted credit card offers!
3. Opt out when you receive Privacy Statements – You must write them to stop companies from sharing your information.
4. Do not carry your Social Security Card – Keep it safe at home.
5. Do not carry extra credit cards.
6. Copy the contents of your wallet and store in a secure place.
7. Do not mail bill payments and checks from home. Use locked mailboxes.
8. Do not print your Social Security number or drivers license number on your checks.
9. Order your Social Security Earnings and Benefits statement and check it for accuracy.
10. Invest in an identity theft protection plan that provides restoration services.

For information on identity theft restoration services call:
Rob Taylor Identity Theft Specialist
Harvard Risk Management

Wednesday, January 11, 2012

NJ ringleader of ID theft, that reached from northern New Jersey to U.S. territories in the Pacific, fraud ploy admits guilt.

NEWARK, N.J. (AP) — The leader of an identity theft and fraud ring has pleaded guilty in a scheme that federal authorities said operated as a veritable "crime superstore" that reached from northern New Jersey to U.S. territories in the Pacific.
Sang-Hyun "Jimmy" Park admitted in federal court in Newark on Monday that he had helped people fraudulently obtain credit cards, bank accounts and loans using illegally obtained Social Security numbers in a scheme that federal authorities say defrauded various credit card companies, banks and lenders out of about $4 million.
Fifty-three other people — most of them, like Park, Korean immigrants living in New Jersey or New York — were charged in September 2010.
Prosecutors said Park and his co-conspirators operated a scheme to buy Social Security cards from brokers who fraudulently obtained them from Asian immigrants — mostly Chinese nationals — working in American territories, including Guam, American Samoa and Saipan.
The cards were then resold to Korean immigrants in the territorial U.S. who used them to apply for driver's licenses in California, Pennsylvania, Illinois, Nevada, New York and elsewhere. Several of the defendants then used their U.S. identifications to apply for credit cards. Some used all the credit they obtained to buy luxury goods such as vehicles, designer bags or liquor, some of it to resell.
Park, a 45-year-old native of South Korea, lives in Palisades Park, a town just across the George Washington Bridge from Manhattan that is home to a large Korean population. He emigrated from Seoul in 1999 to start a business importing raw materials from Central America to manufacture hats in New Jersey, according to his attorney, Christian Fleming.
After the Sept. 11 attacks, Park took a $100,000 family loan against his mother's house in South Korea to keep his business afloat. It had slowed and faltered in the wake of the attacks, largely because of tightened U.S. restrictions on imported goods, Fleming said. Park turned to the illegal enterprise, according to his lawyer, out of desperation to try to repay his debts.
"That's what led to this," Fleming said. "He feels a lot of shame and accepts full responsibility, and that's why he wanted to plead guilty."
Michael Ward, special agent in charge of the FBI's Newark division, and Paul Fishman, U.S. attorney for the District of New Jersey, said Park headed a sophisticated criminal enterprise that made millions of dollars in profits and went to great efforts to conceal itself from U.S. authorities.
Park ran the operation by using shell businesses, advertising the sale of U.S. identity documents in local Korean-language newspapers and employing a staff that included identity document brokers, people who worked to increase credit limits and boost scores for customers using the fraudulently obtained credit cards and local merchants who would swipe the cards at their businesses to get banks to transmit them money, according to court documents.
"Sang-Hyun 'Jimmy' Park was the head of a New Jersey crime conglomerate which advertised, facilitated and supported a multitude of frauds resulting in staggering economic losses," Ward said.
The five counts to which Park pleaded guilty could carry up to 70 years in prison when he is sentenced in April.
Another defendant, Ho K. Yu, known as Edmund, also admitted his role in the scheme Monday in Newark federal court. The 59-year-old Tenafly resident pleaded guilty to three counts of conspiracy to commit wire fraud affecting financial institutions. Those counts could carry up to 30 years each.
Prosecutors said Yu fraudulently obtained hundreds of thousands of dollars in commercial loans for customers or falsely built up credit scores for them. His attorney, Robert Stahl, said he had entered the business thinking it was a legitimate enterprise to help people obtain credit but continued working there after he found out it was not. Stahl said his client had accepted responsibility for his actions by pleading guilty.
Also Tuesday, 37-year-old Yu-Je Jo, of Cliffside Park, was sentenced in Trenton federal court to two and a half years in prison after pleading guilty in the case.
The U.S. attorney's office said several other defendants had pleaded guilty to various offenses in the case.

An Identity Theft Nightmare

(CBS)  Almost 10 million Americans were victims of identity theft last year. And the recent revelation of a major security breach at the private data broker ChoicePoint has focused even more attention on the growing problem.

Few people know more about identify theft than John Harrison. In an ironic twist, when the president of ChoicePoint wrote a book on identity theft, he went to Harrison.

The Connecticut salesman has spent over 2,000 hours trying to reclaim his life after having his identity stolen, and his home office has become a shrine to the suffering, reports CBS News Correspondent Byron Pitts.

"I had to come up with a filing system,'' says Harrison of his efforts to clear his name.

Harrison was a victim nearly four years ago, when a 20-year-old stole his identity and literally went for a ride.

"Lowes, Home Depot, Sears, JC Penny, two cars from Ford, a Harley, a Kawasaki motorcycle," says Harrison, listing off the purchases made in his name. "About $265,000 in four months."

Police arrested and prosecuted the thief, Jerry Phillips, and he even went to prison for three years.

"Sorry. You know, I wish I could make it up to you,'' Phillips said of his wrongdoing.

With an apologetic theif behind bars, Harrison thought he was lucky -- but was he wrong. Despite letters from the Justice Department confirming that he was a victim, Harrison and millions of others are still being harassed by creditors. In fact, he remains nearly $140,000 in debt.

"It keeps coming," says Harrison. "It keeps coming and you don't have a choice but to deal with it."

Some suggestions for victims of identity theft include:


  • File a police report immediately

  • Contact the 3 major credit bureaus -- and your creditors

  • Keep records of all transactions

  • Hire an attorney

    Eric Gertler, an identity theft expert, says that Harrison's experience reflects the unfairness of the whole system.

    "The problem with identity theft is that once you're a victim you're guilty until proven innocent," says Gertler. "You need to go to the financial institution and prove to them that you're not just some other deadbeat trying to get away with not paying your bills."

    John Harrison followed all the rules.

    "I was in a corner. I had already done everything the law told me I should be doing. And it didn't work,'' he says.

    He says the many victims whose identities were compromised by ChoicePoint can expect "the same thing."

    What angers John Harrison is that he followed all the rules and finds himself in debt because of a thief, and a bad thief at that. In fact, on one of the forged checks, Harrison's name was spelled incorrectly.

    "He didn't have to be bright to steal your identification, but you have to be perfect to stop him?" asked Pitts.

    "Absolutely, you have to be more than perfect."

    Harrison's advice, before you ever become a victim, check your credit report frequently.

  • Friday, January 6, 2012

    Three New Ways to Protect Your Identity in 2012

    Justine Rivero, Contributor




    Don’t start 2012 as the victim of identity theft.


    It’s a $37 billion crime that affects 1 in 25 Americans, with the average victim suffering $631 in out-of-pocket costs, reports Javelin Strategy & Research. Identity theft and fraud has become more difficult to detect and resolve in recent years, resulting in even higher consumer costs.
    Your bank account isn’t the only casualty of identity theft and fraud; time is another significant cost. The average identity fraud case will cost a consumer 33 hours to resolve—equivalent to more than four work days.
    Whether or not you think you are susceptible, it takes just a few easy entry points for thieves to discover your personal information and abuse it at your expense. If you use mobile banking, social networking sites (such as Facebook, Twitter or LinkedIn), shop online, access Wi-Fi in public areas, discard sensitive documents like bill statements without using a paper shredder, pay your bills via traditional mail, or hand off your credit card at a restaurant, you’re already at high risk of identity theft. While that sounds extreme, it’s the reality of how vulnerable we are as consumers.
    Don’t wait until you’re a victim to take action against identity theft and fraud. You can protect your finances and quality of life this year by taking the following key steps.

    1)    Get credit monitoring. According to Javelin, consumers opening new financial accounts in 2012 may be responsible for nearly half of the total cost of identity fraud. This is primarily due to the fact that new accounts take longer to detect, which leads to higher consumer costs than other types of fraud.

    How: The old way of checking your credit was to manually pull your credit report, which you can do for free through AnnualCreditReport.com. The new way is to use a credit monitoring service that automatically reviews your credit report on a daily basis to monitor for any changes. The longer identity theft and fraud goes undetected, the more time and money you’ll suffer trying to resolve your case; detecting suspicious activity or fraudulent accounts as soon as possible allows you report these red flags immediately and cut your losses. The three major credit bureaus offer credit monitoring services that range from $120 to $180 a year. For a hassle-free, no-cost alternative, CreditKarma.com recently launched a new, free credit monitoring service that monitors your credit report on a daily basis and notifies you via email if a significant change is detected. Credit monitoring is one of the best safeguards against identity theft and fraud, and for the first time, it’s totally free.
    2)     Switch to a smart card. While most credit cards and some debit cards offer zero liability fraud protection, identity fraud will still cost consumers an average out-of-pocket cost of $631 and 33 hours to resolve. A better measure than protection after fraud occurs is to prevent fraud in the first place with a more secure payment method. New “smart cards”, credit cards embedded with EMV microchip technology, have stronger fraud protection than traditional magnetic strip credit cards. Smart cards require the cardholder’s unique PIN—rather than, say, an easy-to-forge signature—to use it, and the encrypted microchip makes it much more difficult to counterfeit.
    How: The U.S is slow to adopt smart cards, which are already the fast-growing payment standard in Europe, because of the high cost to upgrade merchant card terminals to accept the new technology. However, major credit card issuers are slowly making the switch by pushing merchants to support smart cards in 2012. Wells Fargo, Chase, U.S. Bank, and several credit unions partnered with Fiserv have already begun introducing smart cards with dual features of both the EMV microchip and the traditional magnetic strip. Inquire at your bank or issuer if they offer cards with an EMV chip; the more consumers request it, the more pressure it puts on financial institutions to meet the demand for new technology.

    3) Lock down your smartphone. Your phone is essentially a one-stop shop for your data and, if stolen or exposed to thieves, can compromise your identity and financial accounts. Even if you don’t use mobile banking or financial apps, your phone could store sensitive data from online shopping, social networking and more. An unsecured phone poses a major security risk that is vulnerable everywhere you go.

    How: Here’s a quick five minute checklist of how to protect your data from identity thieves by securing your mobile phone:
    • Password-protect your phone with a complex and unique password, and set your phone to auto-lock. Also, make sure any mobile banking or financial apps have passwords that are not auto-saved on your phone.
    • Enable a service with remote tracking, and in the event your phone is stolen will remotely lock your phone and erase its data. You can also set your phone to automatically wipe your data if your phone password is inputted incorrectly several times.
    • Turn Bluetooth off if you’re not using it. Thieves can pair their Bluetooth device with yours and hack personal information.
    • Be careful on Wi-Fi networks, another channel for thieves to remotely access your data undetected. Only connect your phone to secure networks with passwords.
    • Before downloading any apps to your phone, always do a quick search to make sure it comes from a legitimate site or publisher. Check user reviews on sites like appWatchdog for any complaints.

    In the worst case scenario that you suspect you may be a victim of identity theft and fraud, follow the Department of Homeland Security’s steps of what to do if your personal information is compromised.
    Remember that your financial accounts, mobile phone and credit cards don’t have built-in protections to keep you and your identity safe. It’s up to you to take these three key steps to protect your identity in 2012.


    Justine Rivero is the Credit Advisor for CreditKarma.com, a free credit management website that helps nearly 3.5 million consumers access their truly free credit score and free credit monitoring.


    I can help in restoring your identity.

    Go to www.legalshield.com/hub/taylor_ra  for more information.

    Denison pair face charge of Identity Theft, using false names

    HARLAN -- Two Denison individuals face felony charges today in Shelby County District Court for Identity Theft in separate incidents.

    Maria Guadalupe Valle, 27, 802 13th Ave. S #12, and Joel Valdez Flores, 201 Chamberlian Dr. #3, both are scheduled to appear on the charge in district court today, Tuesday, Dec. 20.

    If convicted of the class D felony, they each face up to five years in jail with additional fines totaling $5,000.

    According to a complaint filed in court, Valle collected wages at the Shelby County Cookers plant in Harlan in 2011 and before in excess of $1,000 under a false identity. Valle allegedly used the name Angela Mai Sepulveda, who had her purse stolen from a store parking lot in 2000.


    Flores also collected wages in excess of $1,000 at the Cookers plant in 2011 and before, using the identity of Davidi Marez, who had his identification stolen from his residence in Texas in 2008. His identity has been used to gain wages by fraud since that time.



    This will only grow.   Protect yourself
    www.legalshield.com/hub/taylor-ra

    Sunday, January 1, 2012

    The Silent Crime — Identity Theft

    This is an article from Lynn Lionhood:


    The Silent Crime — Identity Theft

    It may even be the hardest to prosecute. Countless people have asked, “Who would want my identity?” or stated, “If they want to be me, then let them.” Frankly speaking, that’s a dangerous perspective. If you believe that identity theft can only affect your finances, you’re wrong. The impact of identity theft on the lives of those who’ve had their indentities stolen is devastating. Through our extensive research, we have concluded that identity theft consists of three categories: financial, medical and character, or what some call criminal. According to data from the Consumer Sentinel and Identity Theft Clearing House published in February 2009, financial losses from credit cards and bank fraud amount to less than half of the reported cases, which leaves us all vulnerable to countless other schemes.

    Let’s begin with defining identity theft. The FTC’s definition is: “Identity theft occurs when someone possesses or uses your name, address, Social Security number (SSN), bank or credit card account number, or other identifying information without your knowledge with the intent to commit fraud or other crimes.” Now, let’s break this definition down to the three categories that, in our opinion, are at greatest risk: financial losses, medical files and procedures, and character attacks that most often take shape as criminal actions by another in your good name.

    The first form of identity theft is that of your financial credit. Simply put, it is the stealing of your identity for your money. Credit card fraud is the most common form, at 28% of all cases, followed by bank fraud at 18%. The criminal will set up accounts in your name using alternative addresses, use your existing bank account at another branch (with the drivers license he or she obtained in your name with his or her picture), borrow money on your home, buy a car or furniture in another town, drain your online stockbrokerage accounts; the list is endless.

    Secondly, there is medical identity theft. Most of us overlook this criminal aspect. This occurs in numerous ways: employees of hospitals copying your files for personal information; others using your Social Security number to have procedures like surgery or even an AIDS/HIV test; or checking into the emergency room under your name so they can kindly pass on the cost directly to you. Another reason may be to obtain an elderly person’s insurance, Medicare/Medicaid or prescription drug benefits. Imagine if you went to your pharmacist, and they told you your prescription was already filled in a neighboring community, and they could not fill it again.

    Finally, there is character identity theft, where employment fraud tops the FTC list at 13% of total cases, followed closely by criminal acts being committed in your name. One day, you may wake up to a knock on your door by the sheriff’s department arresting you for an outstanding warrant in your name for crimes committed in another state.

    There are many stories more frightening than the ones above. The point is, there are many forms of identity theft and many more to arise from this multibillion dollar criminal industry. If you have never experienced the long-term consequences of being a victim, then you may not realize the need for proper insurance or protection.

    Let me help you in protection.    Contact me:  www.legalshield.com/hub/taylor_ra