ID Theft; do we have a chance

Posted in Uncategorized on September 30, 2010 by Bob Fedder

This video cuts to the chase;  whether it be high tech or low tech, the thieves often have the upper hand.

http://financiallyfit.yahoo.com/finance/video-top-5-tricks-of-identity-thieves-22134215

Network Marketing on NBC News

Posted in Identity theft, Job/Business Opportunity, Legal Services with tags , , , , on September 23, 2010 by Bob Fedder

Pre-Paid Legal Services (PPL) is a 38 year old publicly traded company on the NYSE with an A+ rating by the BBB.  In addition to Network Marketing, PPL offers a B2B or B2C business model as well.  You don’t have to recruit others to make this business work.  You can pick and choose where your efforts will be best spent and make an attractive income either on a part-time or full-time basis. 

For information on this business opportunity, go to www.YourLife-YourFuture.com or contact me direct.  This is not for everyone, but it is certainly worth 12 minutes of your time to gain the knowledge needed to make that decision. 

By the way, be assured that the contact information requested on the video will only go to me and will not be shared or available to others.

ID Thieves target children

Posted in Identity theft, Legal Services with tags , , , , , , on September 23, 2010 by Bob Fedder

ID Thief: They will do the darnest things!

Posted in Identity theft, Legal Services with tags , , , , , on September 22, 2010 by Bob Fedder

13 Things An Identity Thief Won’t Tell You

 (From Reader’s Digest©) Interviews by Michelle Crouch Former with identity thieves who confess the tactics they use to scam you.

1. Watch your back. In line at the grocery store, I’ll hold my phone like I’m looking at the screen and snap your card as you’re using it. Next thing you know, I’m ordering things online—on your dime.

2. That red flag tells the mail carrier—and me—that you have outgoing mail. And that can mean credit card numbers and checks I can reproduce.

3. Check your bank and credit card balances at least once a week. I can do a lot of damage in the 30 days between statements.

4. In Europe, credit cards have an embedded chip and require a PIN, which makes them a lot harder to hack. Here, I can duplicate the magnetic stripe technology with a $50 machine.

5. If a bill doesn’t show up when it’s supposed to, don’t breathe a sigh of relief. Start to wonder if your mail has been stolen.

6. That’s me driving through your neighborhood at 3 a.m. on trash day. I fill my trunk with bags of garbage from different houses, then sort later.

7. You throw away the darnedest things—preapproved credit card applications, old bills, expired credit cards, checking account deposit slips, and crumpled-up job or loan applications with all your personal information.

8. If you see something that looks like it doesn’t belong on the ATM or sticks out from the card slot, walk away. That’s the skimmer I attached to capture your card information and PIN.

9. Why don’t more of you call 888-5-OPTOUT to stop banks from sending you preapproved credit offers? You’re making it way too easy for me. PLUS: 13 Things Your Financial Adviser Won’t Tell You

10. I use your credit cards all the time, and I never get asked for ID. A helpful hint: I’d never use a credit card with a picture on it.

11. I can call the electric company, pose as you, and say, “Hey, I thought I paid this bill. I can’t remember—did I use my Visa or MasterCard? Can you read me back that number?” I have to be in character, but it’s unbelievable what they’ll tell me.

12. Thanks for using your debit card instead of your credit card. Hackers are constantly breaking into retail databases, and debit cards give me direct access to your banking account.

13. Love that new credit card that showed up in your mailbox. If I can’t talk someone at your bank into activating it (and I usually can), I write down the number and put it back. After you’ve activated the card, I start using it.

Sources: Former identity thieves in Kentucky, Florida, Indiana, Virginia, and New York.

A needed employee benefit

Posted in Employee Benefit, Identity theft, It's Your Business; dedicated to enhancing and building your business, Legal Services with tags , , , , , on September 15, 2010 by Bob Fedder

Cyber ID theft

Posted in Identity theft, Identity theft videos, Legal Services with tags , , , , , , on August 21, 2010 by Bob Fedder

  Cyber crime has become an international issue.  For a solution, go to www.GreatLegalBenefit.com.

SSN ID Theft

Posted in Identity theft, Identity theft videos, Job/Business Opportunity, Legal Services with tags , , , , , , , , on August 21, 2010 by Bob Fedder

What would you do if you woke up one day and received a bill of $1 million from the IRS for past taxes and penalties owed?  Watch this video, then go to www.GreatLegalBenefit.com for a solution.

Latest on ID theft of minors

Posted in Identity theft, Legal Services, Uncategorized with tags , , , , on August 4, 2010 by Bob Fedder

AP IMPACT: New ID thefts target kids’s social security numbers

 

AP – Graphic outlines a new kind of credit fraud scheme involving credit privacy numbers;

By BILL DRAPER, Associated Press Writer Bill Draper, Associated Press Writer Mon Aug 2, 10:35 pm ET

KANSAS CITY, Mo. – The latest form of identity theft doesn’t depend on stealing your Social Security number. Now thieves are targeting your kid’s number long before the little one even has a bank account.

Hundreds of online businesses are using computers to find dormant Social Security numbers — usually those assigned to children who don’t use them — then selling those numbers under another name to help people establish phony credit and run up huge debts they will never pay off.

Authorities say the scheme could pose a new threat to the nation’s credit system. Because the numbers exist in a legal gray area, federal investigators have not figured out a way to prosecute the people involved.

“If people are obtaining enough credit by fraud, we’re back to another financial collapse,” said Linda Marshall, an assistant U.S. attorney in Kansas City. “We tend to talk about it as the next wave.”

The sellers get around the law by not referring to Social Security numbers. Instead, just as someone might pay for an escort service instead of a prostitute, they refer to CPNs — for credit profile, credit protection or credit privacy numbers.

Julia Jensen, an FBI agent in Kansas City, discovered the scheme while investigating a mortgage-fraud case. She has given presentations to lenders across the Kansas City area to show them how easy it is to create a false credit score using these numbers.

“The back door is wide open,” she said. “We’re trying to get lenders to understand the risks.”

It’s not clear how widespread the fraud is, mostly because the scheme is difficult to detect and practiced by fly-by-night businesses.

But the deception is emerging as millions of Americans watch their credit scores sink to new lows. Figures from April show that 25.5 percent of consumers — nearly 43.4 million people — now have a credit score of 599 or below, marking them as poor risks for lenders. They will have trouble getting credit cards, auto loans or mortgages under the tighter lending standards banks now use.

The scheme works like this:

Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.

Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called “piggybacking,” which involves linking to someone else’s credit file.

Many of the business selling the numbers promise to raise customers’ credit scores to 700 or 800 within six months.

If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud.

Jensen compared the businesses that sell the numbers to drug dealers.

“There’s good stuff and bad stuff,” she said. “Bad stuff is a dead person’s Social Security number. High-quality is buying a number the service has checked to make sure no one else is using it.”

Credit bureaus can quickly identify applications that use numbers taken from dead people by consulting the Social Security Administration’s death index.

Social Security numbers follow a logical pattern that includes a person’s age and where he or she lived when the number was issued. Because the system is somewhat predictable, sellers can make educated guesses and find unused numbers using trial and error.

A “clean” CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.

Robert Damosi, an analyst with Javelin Strategy & Research, said the crime can come back to hurt children when they get older and seek credit for the first time, only to discover their Social Security number has been used by someone else.

“Those are the numbers criminals want. They can use them several years without being detected,” Damosi said. “There are not enough services that look at protecting the Social Security numbers or credit history of minors.”

Since the mortgage meltdown of 2008, banks have tightened lending policies, but many credit decisions are still based solely on credit scores provided by FICO Inc. and the three major credit unions: Experian, TransUnion and Equifax.

Federal investigators say many businesses do not realize that a growing number of those credit scores are based on fraudulent information.

“Lenders don’t understand that when they pay money to go through a service, they may be receiving false information,” Jensen said. “They think when they order the information from credit bureaus, it must be true.”

Without special scrutiny, credit profiles created with the scheme are not immediately distinguishable from other newly created, legitimate files.

Investigators say the businesses clearly know they are selling Social Security numbers, but it’s difficult to prove. The sellers use complex disclaimers that disavow illegal activity and warn customers against using their numbers in place of Social Security numbers.

The businesses also instruct customers to provide false information when using the number to apply for credit. Customers are told to use their real name and date of birth, but to avoid listing any addresses or phone numbers they’ve used in the past. They’re also told to avoid any other information that connects the new, clean credit profile with the old, damaged one.

Craig Watts, a spokesman for credit reporting agency FICO Inc., said FICO has tools available for businesses to protect themselves from this type of fraud, but they are not cheap. And many lenders are slow to adopt FICO’s new formulas, which are updated every few years.

Some companies that sell the numbers have lavish, high-tech websites. Others run no-frills ads on sites like Craigslist.

Jim Buckmaster, president and CEO of the San Francisco-based Craigslist, recently told the AP in an e-mail that there were “fewer than 200” classifieds on his site that used the word “CPN.”

Within an hour of that e-mail exchange, dozens of the ads in cities such as Las Vegas, Los Angeles and New York had been pulled from the site. Many were reposted the next day.

An AP reporter called several of the sites, but got only recordings asking callers to leave a message with contact information.

Experts say the fraud will be difficult to stop because it’s so easily concealed and targets such vulnerable people. Other than checking with the credit bureaus to see if there is a credit file associated with your child’s Social Security number, spokesmen at FICO, the Social Security Administration and the FTC said there are no specific tools for safeguarding the number.

“This is an invisible crime, with invisible victims who don’t have enough support out there to help them,” said Linda Foley of the ID Theft Resource Center in San Diego.

More high tech identity theft

Posted in Identity theft, Identity theft videos, Legal Services, Uncategorized with tags , , , , , on July 26, 2010 by Bob Fedder

High tech ID theft

Posted in Identity theft, Identity theft videos, Legal Services, Uncategorized with tags , , , , , , , on July 26, 2010 by Bob Fedder