Monday, July 24, 2017

Identity theft resource cheat sheet

Identity theft is the fastest growing crime in America. You must keep track
of a lot of personal information and always on point to prevent identity theft.
This Cheat Sheet includes some powerful information you need to protect your identity.

Identity theft

You have the power to stop Identity theft   

How to protect your Social Security number

Agency/Name         Information They Provide

Federal Trade Commission 877-382-4357   How to protect yourself and what to do if you are a victim.

Social SecurityAdministration 800-772-1213 How to report fraud and misuse of your SSN.

United States PostalService 877-876-2455 (Postal Inspectors) It is under the tab contact us. MJA How to protect yourself from becoming a victim and how to
report mail theft.
877-322-8228 It is on the site MJA Order free annual credit report from all three credit bureaus

Identity Theft Resource
Center 888 400-5530 Information about identity theft and resources to assist you if you become a victim.

Equifax 866-640-2273 Credit bureau; provides credit reports you can use to track your credit history and standing.

Experian 888-397-3742 It is on the web site under contact us MJA Credit bureau; provides credit reports you can use to track your credit history and standing.

TransUnion  800-680-7289 Credit bureau; provides credit reports you can use to track your credit history and standing.

Thursday, February 11, 2016

3 Things that should not be Stored in your Smartphone.

According to the experts, your smartphone is extremely valuable to an Internet thief. That is because there is a vast amount of sensitive and valuable data stored on our smartphones.
According to Consumer Reports nearly 34 percent of all smartphone owners do absolutely nothing to secure their phone, not even a simple code to lock the screen.
Even with the sharp decline in smartphone thefts, users still need to be cautious about the things they store on their phone. This a list of 3 things smartphone users should stop storing in their devices, regardless of this decline.

#1. Passwords
Stop reusing passwords across multiple websites.If you can create different passwords for different websites.Never use Pass word as a Pass word just to save time. Do not create a note on your smartphone that stores all of your passwords, it makes it easy to find quickly the password we need.It also makes it easy for the smartphone thief, who also wants to hack your bank account.

#2. Geotagged pictures and videos

When we add Geotagging, it adds geographical identification metadata to your pictures and videos. When we post photos on Google Plus, Twitter, or Facebook we don't intentionally add our home address or work address to each photo but, we do. When you have Geo-location tagging turned on when you take pictures, you're posting your address with every photo or video you post. Leave those geotagged pictures of your Flat-screen TV, your new furniture and your brand new car on your phone and you'll come back from work with even less than you had when you left.

#3.Very few of us can remember all of the Credit card numbers,all of the Debit card numbers, Addresses and expiration dates.Many of us will snap a picture of the card - both front and back - so they don't have to carry a purse or wallet around with them.Never store credit card data on a smartphone. A thief can steal your phone and use your own phone to clean out your accounts that you know about and create new accounts that you won't know about for 30 days or longer. Card-not-present Credit card fraud accounted for 45% of credit card fraud in 2014 28% of women and 21% of men have had their credit card information stolen through a computer hack Experts project that over 33% of the world's population - 2.6 billion people - will own a smartphone by 2017. That means good people have to get a lot smarter than the scammers - and fast

Tuesday, January 5, 2016

Identity Theft Help For Military Veterans

There is something special and commanding about the presence of a soldier in uniform. Whether or not you agree with the politics behind different wars that are being fought, one thing is certain: a soldier in battle is heroic. But there are some battles soldiers should never have to endure. The battle of identity restoration is one of them.

A victim of identity theft has to endure a bad credit rating, higher interest rates, etc. military personnel have other obstacles that they must overcome if they have been a victim of identity theft. Their security status and the opportunity for promotion might be put on the line by a bad credit history that may not belong to them.

The U. S. military has determined that Identity theft is such a serious threat that special precautions and are being taken to protect military personnel and their families from unnecessary risk and exposure. Currently, steps are being taken to minimize the risks posed exclusively to servicemen and women.New RFID technology is currently used to protect against Identity Theft

Veterans hospitals in many parts of the United States,use wrist bands printed with the full (nine digits) social security numbers.This greatly increases a patient's risk of having his or her identity stolen. It makes them vulnerable to other  personnel, working for the hospital.

In addition, we have created a toll-free Identity Theft Resource Line for Veterans and their beneficiaries to call for more information or if they suspect that their identities may have been compromised.  The toll-free number is 855-578-5492.

For More Information On VA Identity Theft Help Line

Sunday, November 22, 2015

Defunding ISIS with the help of Kroll

The Islamic State raises millions of dollars a week from "taxation" and outright extortion of businesses and local government and civilian workers, according to Howard Shatz, a senior economist at the Rand Corp.

U.S. officials are seeking to track down the financial footprints of the terrorist group. Coalition forces will step up military strikes to turn back territorial gains by ISIS.

"It's a matter of developing the names of the individuals who control these accounts and working your way back through
there," Kroll Associates Chairman Dan Karson told CNBC. "Once you have the control of the account and the cooperation of the exchange, or the control of the network, then you can work your way back and find out who these people are who are contributing to the network itself."
Read the rest of the story by clicking here

Saturday, November 21, 2015

How to defeat ISIS

Kroll Associates Chairman Daniel Karson weighs in on how Western countries can work together with the rest of the world to defeat the Islamic State.

Kroll works with global experts in data security, breach prevention, and organizational recovery who are constantly monitoring criminal activity and systems response to enable clients to defend against evolving security breach methods.Kroll Advisory Solutions is the company partnered exclusively with LegalShield to handle the monitoring & restoration for IDShield.

Kroll is the only data security and breach recovery solution provider to employ licensed investigators with thousands of hours of experience and the hands-on understanding required to methodically fight and win in the arena of Cyber-Security.Learn how Kroll will help to defeat ISIS.

Sunday, November 1, 2015

Child identity theft

The Bureau of Justice Statistics announced that 17.6 million U.S. residents were victims of identity theft in 2014. The Identity Theft and Restoration Center Augusta, An Identity Theft service organization in Augusta,Ga that helps victims, reported a 300 percent rise in calls during 2014 period related to child identity theft.

Child identity theft can go on for years before being detected. It's also extremely common.By looking ahead you can minimize the chances of your childrens identity will be impacted.
When enrolling your children for school, students and parents expose a number of personal documents with school administrators, from medical records to social Security numbers and residential addresses. When sharing this information, it's important that certain measures are taken to ensure that student identity is protected.

When your child is old enough to understand, sit them down with you and teach them how to read the credit report and teach them why a good credit score is important for the future.

1.Keep your children's personal information in a safe location.
  Carrying around your children's Social Security cards, birth certificates or passports is never a
  wise idea. It's better to store them in a safe and locked place at home, and take them out only
  when needed.

2.Don't share your childs Social Security numbers with everyone.The child's social security number
  Should only be used when necessary.When asked to provide your child's Social Security
  number,inquire as to why it's needed and what policies are in place to ensure that it is

3.Train your children to recognize identity theft.Parents should inform children about the risks
  involved, and educate them on how to protect personal information.

The Federal Educational Rights and Privacy Act (FERPA), schools are required to notify parents and guardians about their school-directory policy. Parents and guardians should be informed about any third parties that the information is sold to, allowing you to opt out from the release of such information.

Young children can be victims of identify theft.Even very young children are at risk.
One reason is because most kids have squeaky clean credit ratings. They have probably never taken out credit, which means they have never been late with a payment. Another is that the identify thieves know that the crime can go undetected for many years. Most people periodically check their credit report or take out loans or credit cards or rental applications, and if their ID has been stolen, they will probably find out. A child may not find out until he or she applies for a student loan or a credit card, which usually doesn't happen till they're nearly 18.

Sunday, August 23, 2015

Protecting Your Military ID Card and Your Credit Card from Electronic Pick Pocket.

RFID Skimming is a form of digital theft, which enables information from RFID-based credit, debit and ID cards to be read and duplicated.

It can be used as a form of credit card and identity theft and works by covertly reading RFID chips from a distance using a device which downloads the card information.

The stolen information can then be written to a new blank card, which operates just like the original card. It makes no difference if the original data is encrypted or not.

If your credit card does not have an EMV chip, but does have RFID, you have a valid concern.Your bank should issue you a card with RFID or one with an EMV chip.

The idea of RFID in a credit cards is a ridiculous idea.The data can be intercepted much easier than stealing the card itself.At least you have the advantage of knowing when your card is stolen.In a walk-by scan you have no way of knowing until you begin to notice transactions that you didn't authorize in your account statements... And you have to be looking for those to find them a lot of times.

Identity theft resource cheat sheet

Identity theft is the fastest growing crime in America. You must keep track of a lot of personal information and always on point...