Deputy Mike Butler Deputy Leslie Fox Dane County Sheriff s Office
Identity theft occurs when someone uses your personal identifying information such as: A. Your name B. Social Security number C. Credit Card number D. Financial account information This is done without your permission and is used to commit fraud or other crimes.
Dumpster Diving: They rummage through trash looking for bills or other paper with your personal information on it. Skimming: They steal credit/debit card numbers by using a special storage device when processing your card. Phishing: They pretend to be financial institutions or companies and send spam or popup messages to get you to reveal your personal information
Changing Your Address: They divert your billing statements to another location by completing a change of address form. Old-Fashion Stealing: They steal wallets and purses; mail, including bank and credit card statements; preapproved credit offers; and new checks or tax information. They steal personnel records, or bribe employees who have access Pretexting: They use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources.
Credit Card Fraud: They may open new credit card accounts in your name. When they use the cards and don t pay the bills, the delinquent account appear on your credit report. They may change the billing address on your credit card so that you no longer receive bills, and then run up charges on your account. Because your bills are now sent to a different address, it may be some time before you realize there s a problem.
Phone or Utilities Fraud: They may open a new phone or wireless account in your name, or run up charges on your existing account. They may use your name to get utility services like electricity, heating, or cable TV.
Bank/Finance Fraud: They may create counterfeit checks using your name or account number. They may open a bank account in your name and write bad checks. They may clone your ATM or debit card and make electronic withdrawals w/your name, draining your accounts. They may take out a loan in your name.
Government Documents Fraud: They may get a driver s license or official ID card issued in your name but with their picture. They may use your name and Social Security number to get government benefits. They may file a fraudulent tax return using your information.
Other Fraud: They may get a job using your Social Security number. They may rent a house or get medical services using your name. They may give our personal information to police during an arrest. If they don t show up for their court date, a warrant for arrest is issued in your name.
The Federal Trade Commission recommends that you take three actions immediately. First: Contact the fraud departments of each of the three major credit bureaus. Have them Flag your file with a Fraud Alert including a statement that creditors should call you before they open any new accounts in your name. You are entitled to a free credit report after you have your account Flagged.
Second: Contact the creditors for any accounts that have been tampered with or opened fraudulently. Ask to speak to a representative in the fraud or security department, and follow up with a certified letter. Record a date, time and the person you spoke to. Third: File a police report. Keep a copy and record of the agency s case number
Close Accounts: Close any accounts that have been tampered with or established fraudulently. Use the ID Theft Affidavit at ftc.gov/idtheft to support your written statement. Ask for written verification that the disputed account has been closed and the fraudulent debts discharged. Keep copies of documents and records of your conversations about the theft.
Report the theft to the FTC. Online: ftc.gov/idtheft By phone: 1-877-ID-THEFT (438-4338) By mail: Identity Theft Clearinghouse, FTC, Washington, DC 20580
A police report that provides specific details of the identity theft is considered an Identity Theft Report, which entitles you to certain legal rights when it is provided to the three major credit reporting agencies or to companies where the thief misused your information. An Identity Theft Report can be used to permanently block fraudulent information that results from ID theft, such as accounts or addresses, from appearing on your credit report. It will make sure these debts do not reappear on your credit reports. ID reports can prevent a company from continuing to collect debts that result from ID theft, or selling them to others for collection. An ID theft report is also needed to place an extended fraud alert on your credit report.
A police report is also needed to get copies of the thief s application, as well as transaction information from companies that dealt with the thief. You should also file an ID Theft complaint with the FTC and bring your printed ID Theft complaint with you to the police station when you file your police report.
Victims need a detailed report to claim certain rights under the law. Work with your local law enforcement agency to get a copy of the report. A detailed report keeps fraudulent debts from reappearing on the victims credit reports. By law, the victim can only assert their rights if the police report specifies which accounts and information on the credit report resulted from Identity theft. Police and the victim need to sign the affidavit.
Have the victim fill out as much of the form as possible. Law enforcement fill out p.5 and sign p.6 Law enforcement keep a copy and use the required information in your report, attach the affidavit to your report or both.
Invest in a safe/locked file cabinet. Store all bank/credit card statements, tax returns, or other information that might include account numbers, passwords or SSN. Opt-out of credit card offers so family or house guests cannot establish credit in your name. Be careful with your purse, wallet and checkbook when you have visitors. Adopt a healthy suspicion of your teenage children and their friends. Don t leave the above information out in plain view.
Log off your computer when not in use. Give each user in your family different user names and passwords. Don t keep financial files with important information and personal numbers on your computers hard drive. Don t choose passwords that are obvious. Relatives may be able to figure it out. Be careful who you give out your personal information to.
Be wary of who you choose to house sit while you are away. Have your mail held while you are away. Opt for automatic deposits instead of written checks. If you live with a relative you do not trust consider having your mail diverted to a post office box. Consider enrolling in a credit checking business.
The following is some Dane Co. 2010 statistics regarding elder crimes in which some were financial. Most cases of elder abuse involve more than just financial abuse.
Family represents the most likely abuser of older adults in Dane County, accounting for 69.7% of all reported alleged abusers. The most common characteristics among alleged abusers include: 30.3% Alcohol Abuse 16.0% Drug Abuse 17.1% Mental Illness 19.8% Financially dependent on victim. In comparison to national data on the prevalence of mental illness or substance abuse, alleged abusers of older adults in Dane County are approximately twice as likely to have a serious mental illness or substance abuse concerns. 4% of reports in the State have multiple abusers, with only the information on the first listed abuser reflected in the information above.
Experian, Protect my ID Federal Trade Commission Scott Martin, Office of Elder Abuse and Neglect. Deputy Cindy Holmes