Online Identity Theft Protection



             


Thursday, April 10, 2008

Phishing, Identity Theft and Scams

The Internal Revenue Service has issued several consumer warnings on the fraudulent use of the IRS name or logo by scamsters trying to gain access to consumers' financial data in order to steal their assets. Fraudsters may use the IRS name because most consumers recognize it, have had prior communication with or from the IRS (such as receiving annual tax form and instruction packages) and have previously provided the IRS some financial data (such as that contained on tax returns).

As a general rule, the IRS does not send out unsolicited e-mails or ask for detailed personal information. Additionally, the IRS does not ask people for the PIN numbers, passwords or similar secret access information for their credit card, bank or other financial accounts.

Tricking consumers into disclosing their personal and financial data, such as secret access data or credit card or bank account numbers, is identity theft. Such schemes perpetrated through the Internet are called "phishing" for information.

The information fraudulently obtained is then used to steal the taxpayer's identity and financial assets. Typically, identity thieves use someone's personal data to steal his or her financial accounts, run up charges on the victim's existing credit cards, apply for new loans, credit cards, services or benefits in the victim's name and even file fraudulent tax returns.

Identity theft usually causes immediate financial losses for the victims, who may also encounter lingering credit and other problems as a result of the identity theft.

Identity theft schemes take numerous forms. Identity theft may be conducted by e-mail (phishing), standard mail, telephone or fax. Thieves may also go through trash looking for discarded tax returns, bank records, credit card receipts or other records that contain personal and financial information.

When the IRS learns about schemes involving use of the IRS name, it tries to alert consumers as well as authorities that can shut down the scheme, if possible.

The following are examples of recent schemes:

1. e-Mails claiming to come from tax-refunds@irs.gov, admin@irs.gov or other variations on the irs.gov theme told the recipients that they were eligible to receive a tax refund for a given amount. It directed recipients to claim the refund by using a link contained in the e-mail which sent the recipient to a Web site. The site, a clone of the IRS Web site, displayed an interactive page similar to a genuine IRS one; however, it had been modified to ask for personal and financial information that the genuine IRS interactive page does not require.

The Treasury Inspector General for Tax Administration (TIGTA) has reported that it found 12 separate Web sites in 11 different countries hosting variations on this scheme.

2. A bogus IRS letter and Form W-8BEN (Certificate of Foreign Status of Beneficial Owner for United States Tax Withholding) asked non-residents to provide personal information such as account numbers, PINs, mother's maiden name and passport number. The legitimate IRS Form W-8BEN, which is used by financial institutions to establish appropriate tax withholding for foreign individuals, does not ask for any of this information.

To protect against potential identity thieves, take the following steps:

1. Be skeptical of communications you receive from sources you are not expecting. Verify the authenticity of phone calls, standard mail, faxes or e-mails of questionable origin before responding.

2. Do not reveal secret passwords, PINs or other security-based data to third parties; genuine organizations or institutions do not need your secret data for ordinary business transactions.

3. Do not click on links contained in possibly questionable e-mails; instead, go directly to the site already know to be genuine. For example, the only address for the IRS Web site is www.irs.gov -- any other variations on this will not lead to the legitimate IRS Web site.

4. Do not open attachments to e-mails of possibly questionable origin, since they may contain viruses that will infect your computer.

5. Shred paper documents containing private financial information before discarding.

To report the fraudulent misuse of the IRS name, logo, forms or other IRS property, you may contact the TIGTA toll-free hotline at 1-800-366-4484 or visit the TIGTA Web site.

Those who think their identity has been stolen should visit the Federal Trade Commission's Web site for information about how to handle the aftermath of identity theft.

Cal Golden is a volunteer tax preparer and webmaster of Tax Help Super Tips For up to the minute information on how to get the most from your federal and state tax returns, visit his site now.

Labels: , , ,

Crime and Identity Theft

What is crime? Crime defined is an atrocity or enslavement, an act carried out by a single or group of individuals, targeting the population, or a set area to attack. When an identity thief gets hold of a persons identity he/she has CONTROL to a large degree over an entire population of people, and next to complete control over the victim in which the identity he stole.

Identity is cards that link personal information to thousands of databases worldwide. The government stores in its filing cabinets the identity of millions of individuals, including members in foreign lands. Companies store on their databases each day millions of identities and the list continues.

Crime has been ongoing since the first Sin. The first crime reported in history was the act Cain committed against his brother Abel. Followed by the first recording came a linage of other crimes, thus each year the crimes worsen and the law is far from putting a stop to the unlawful acts committed against an entire population, including the victims of the crime.

The law is made up of assumptions, thoughts, ideas, opinions, et cetera. Each year the law changes when a number of complaints, theories, protests, and other letters come in on a particular subject. Therefore, if you want to fight identity theft you must learn how to protest the laws and stand up for your rights. This includes every one of us standing up, fighting, and protesting ongoing without cease. Furthermore, protesting and fighting back includes adhering to assertiveness and avoiding violence and aggressiveness.

As a protestor of many laws, for years I have made waves with the government by enforcing my statements and repeatedly letting the government know new crimes or actions pending, or letting them have insight of the small town where I live and constantly telling them about the many complaints. As a study of Criminal Justice I have learnt that what I am doing is what all of us should be doing, thus it takes the PEOPLE to make the changes.

Identity theft has increased since technology has enhanced throughout the years. The financial processors designed to pay bills, make purchases, et cetera puts us at risk of identity theft. My son asked me last night, "What happen to Type Writers?" this is one of the questions I have asked for years, and all I could tell him, is "Someone thinks they have the ultimate solution to fix everyone problems," thus risks are increasing.

At one time, the world was comfortable with typewriters and rarely did you hear reports of identity theft. If you did, it was escalated to the millions of reports you hear each year today. Thus, technology, financial processors and other sources are making it easier than ever for criminal minds to take hold of someone's identity. The downside is the true victims of the crime pay (over and over and over and over and over and over)...Get the point...for the crime committed against them.

When identity theft occurs, we all are victims of the crime, since gas prices increase, produce prices increase and other necessity prices increase. We are in a race and the motive is to survive greed, self-centered, ill-minded world. Thus, the patients diagnosed with mental illnesses often have more sense than the common people that make waves for criminals to control our lives. Most patients diagnosed with mental illness (outside of psychopathic and other major illnesses) have never committed a crime in their lives. Few may have committed petty crimes, but for the most part they live and they learn. Yet, many degrade the suffering souls that have more sense than most people do in existence.

Thieves often are accused of having Antisocial Behaviors. In many studies it shows that the thieves follow patterns that lead to Antisocial Personality Types, thus in the next article we will go over the symptoms of Antisocial Behaviors to help you determine who the real thieves are?

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , ,

Resources for Identity Theft Victims

Having the right resources to prevent theft or else learn how to cope with identity theft and take the steps to recover from the loss is essential, since more victims occur daily. First, you will need copies of your credit reports or else information that will help you to see what is on your credit reports. The Free Credit Report site is just one area online where you can view copies of your reports. The site is secure as you will see when you look in the search engine, noticing the's' behind the http: in the area. The's' stands for secure site. Otherwise, you can visit the TransUnion site, Experian site or Equifax to request an annual free copy of your report. If you have received your free annual report then you will need to view the updated copies or else pay the small fees to obtain personally copies of your reports. If you are a victim of identity theft, you will need to mail a letter to the three bureaus requesting a copy of your reports and provide proof of your identity, including utility receipts of last area lived, rental or mortgage receipts, picture ID and social security number.

Once you have copies in your hands review the reports carefully to make sure that nothing is showing on your report that does not belong to you. If you notice, any unauthorized debts report them immediately to the bureaus, disputing the actions. If you are a victim of identity theft make, sure you monitor your reports carefully all through the year and from that point on. Some recommend that you review your reports during the first year at least twice and yearly thereafter, however, twice is not enough. Take it from someone that knows from experience.

Thieves will work longer hours than most police officers to get what they want and when they want it. Therefore, reviewing your reports only twice per year is leaving room for the perpetrator to take full control. If you recently fell into the hands of an identity theft, be sure to report the crime immediately and keep copies of the police report. The police will do little to find the perpetrator unless you meet their special criteria of victims, but for the most part, you will have ammunition. Next, report the crime to the Federal Trade Commission Consumers, where you information will reach government officials. Again, expect little effort to find the perpetrator, but at most, you will have additional ammunition.

If you have to go to the FBI and higher if necessary to make the law work for you and to enforce that the perpetrator is caught. Unfortunately, victims of identity theft rarely receive justice. You might want to go online and read any information available on identity theft to learn how to protect, recover and take the steps to ensue the case.

It is important that you protect your self from identity theft, even if you are a victim. All of us are encouraged to change our passwords and PIN numbers at random to avoid loss. We are also encouraged to close any accounts if a thief has your information, including closing credit card accounts, bank accounts, and other accounts in your name. Keep watch over all new accounts, including statements you receive. Make sure you keep all copies of your receipts, even if the receipts do not seem important. Store the receipts, statements and any notes you keep on your self in a safe place.

Many people store information on computers, but this is a bad idea. Computers are far too risky of loss to store valuable information on them, thus store you information on discs, tapes and keep hard copies in a safe place for sufficiency.

It is important that you keep your personal information out of everyone's hands, including friends, family if necessary and so forth. All it takes is one mistake and your life can fall into anyone's hands at any time. Finally, if you are a victim of identity theft, report the crime to the Department of Motor Vehicles also, since criminals holding your driver license will do anything in your name.

Tony Robinson is an International Author, Webmaster and Security Guru. Check out his Identity Theft Protection Tips at http://www.officialidentitytheft.com/

Labels: , , , ,