With all the high-tech ways that hackers and identity thieves can help themselves to your money, it’s easy to forget that the “old school” methods are still a very real threat. Things like dumpster diving for your discarded credit card offers or stealing your mail from your curbside mailbox still carry the possibility of a crime.

One viable method of wreaking havoc with your identity is to have your purse or wallet go missing, either through loss or theft. If that occurs, your checkbook can provide an opportunistic thief with a short-lived but still hefty payday.

If you notice that your checkbook is missing, there are some important steps you should take:

1. Is it lost or stolen?

This can be hard to determine, but if you’re able to tell whether it was just misplaced (maybe your wallet fell off the roof of your car when you drove away) versus actively stolen, your next appropriate steps can change. If you’re certain it was just dropped or left behind somewhere, call your bank and have those check numbers invalidated. If you aren’t certain about the numbers in your checkbook, they may be able to help you trace back which numbers you’ve already spent, and go from there.

2. Placing a freeze

If you can’t figure out the numbers or if you aren’t certain this was an accident, your bank might put a freeze on your account. It’s temporary but immediate, and it can prevent a thief from spending money in your name. That’s why it’s important to contact your financial institution as soon as you know something’s wrong.

3. Closing the account

Ultimately, your bank may decide that closing the account is the best option, especially if someone got a lot of checks or your bank cards. They will usually meet with you to determine which pending transactions are valid, such as any automatic bill pay items like your power bill, and help you establish a new account.

4. Transfer those draft payments!

If you do have to open a new account, make sure you think about all of the automatic draft payments you have, such as utility bills, gym memberships, or other recurring items. You don’t want a constant reminder of this headache every time your electricity is shut off or your membership expires for non-payment.

5. Decide if a police report is warranted

If you think you might have just lost your wallet, you might not need a police report. However, it’s a good idea to contact your local law enforcement office anyway and let them determine if you need to file any paperwork. After all, the person who finds your missing wallet might not be honest and could use your identification or your cards for fraud. If you do know that it was stolen, then you definitely should alert the police and file a report.


If you think you may be a victim of identity theft, contact the Identity Theft Resource Center for toll-free, no-cost assistance at (888) 400-5530. For on-the-go assistance, check out the free ID Theft Help App.

It’s a scenario that unsettles most people; the loss or theft of your wallet or purse. Your ID cards, all your credit and debit cards, receipts, any number of other valuable documents, even pictures with sentimental value might be lost.

While there’s no way to completely protect oneself from the sting of such a loss, the best way to reduce such difficulty is to ensure that only the things you really need with you all the time are the things you carry, and to leave the rest at home. The difference between a temporary headache and a life-long issue can sometimes boil down to what you did or didn’t have in that purse or wallet. Below are five things you should (almost) NEVER carry around in a purse or wallet:

  • Social Security Card (or any piece of paper with the SSN written on it): This is one of the biggest mistakes, and generates many calls to the ITRC.wallet Identity theft springing from a stolen social security card carried in a wallet or purse is among the most common ways people become victims. If you lose your wallet and the Social Security card was in it, unlike a credit or debit card, you cannot simply cancel the card and change the number. This number is what’s known as a “unique identifier,” meaning that number is unique to you, and only you, and cannot be changed in all but the rarest of cases. With that Social Security number and little else, a criminal can take over your identity, open new accounts in your name, work under your name, create new drivers licenses or state ID’s in other states, and on and on. Unless you have need of your Social Security card THAT DAY, do not carry your Social Security card around in your purse or wallet. This document, more than any other, changes the loss of a wallet from a temporary hurdle to a life of constant increased vigilance and paranoia.
  • Birth Certificate: Possibly the only thing more damaging than losing a Social Security card is the loss of a birth certificate. Your certificate of live birth is the first and fundamental document issued by the government and it is the document from which all other documents spring. A birth certificate can get you a replacement Social Security card, a passport, a driver’s license, and many other forms of identification, virtually anything. Since this document is considered by government and financial institutions as the bedrock identifying document, once a thief has possession of it, it is virtually impossible to prevent fraud. At that point, your only recourse is to try and clean up the mess after fraud has already occurred. This document is the single most destructive one in existence if it falls into the wrong hands. Obviously, something like this should never be carried around where it could be easily lost or stolen.
  • Account and Routing Numbers: If you’re not going to the bank today, why are you carrying around the account and routing number to your checking account? In the wrong hands, these numbers can be used by a thief to clean you out, overdraw you, and leave you stuck with the financial loss. Unlike the loss of a check or credit card, simply canceling the card will not prevent a thief with access to your account numbers from making use of your account. One must actually close the account and open an entirely new one. In the interim, you will have to file a police report and dispute with the bank any fraudulent charges. You may get your money returned after the conclusion of an investigation, but in the meantime, you no longer have access to your money. Avoid carrying these numbers around unless really necessary. If you do lose an account number, immediately set up a verbal password with your bank to protect against any unauthorized access to your account.
  • Password Cheat Sheets: I know, in today’s highly integrated electronic society, you might have as many as 10-12 passwords you need to remember for various accounts. More than you can probably remember on your own. To give yourself a little help, you wrote them down in one place you’ll know to look in the event you can’t remember one of them. Good trick, but DON’T leave it in your wallet. Even if the passwords aren’t linked to paper to any particular account, it’s a GREAT cheat sheet for any thief looking to do additional damage. Keep your password cheat sheet where it belongs, at home.

 

  • Passports: A passport is a quintessential document necessary for international travel. This document, because it is government-issued is also useful in acquiring a new Social Security card, driver’s license or state ID card, and can be used as an identifying document in acquiring a loan or opening a new credit account. Unless you’re leaving the country today, leave that passport at home.

In today’s age of electronic commerce it’s sometimes hard to tell what’s the best way to make purchases that don’t require cash. Should you charge it on your credit card, or should you use your debit card and not have to worry about paying it back? For many people the convenience of a debit card is the deciding factor. Also, they feel safe knowing their information is protected by the pin code that they set up when the card was activated. But there are some things that most consumers may not know about the difference between debit card and credit card transactions. Things they should consider when making purchases.

  • Most places do not check IDs anymore when purchases are made using a card. So,anybody can swipe any card when making a purchase and becredit card relatively certain that they won’t need to prove their identity to finish the purchase.
  • A pin code does not have to be used when making a purchase with a debit card. Most card readers will give you the option of running your debit card as a credit card, making the need for a pin code authentication meaningless. You can tell if your debit card will allow this option if it has the Visa or Master Card logo on it.
  • Most credit card companies will give you 30 to 60 days to report fraudulent activity on your card. Since it is a charge account, no actual money has left your bank account and once you successfully dispute the fraudulent charges you will not be held responsible for them.
  • Most debit cards give the user only a 2 to 7 day window to report fraudulent charges. Also, since the card is attached to your bank account, the fraudulent transaction must be completed before the money can be refunded to your account. This process can take up to two weeks. In that time, overdraft charges may be incurred and will have to be disputed with the bank.

Yes, debit cards do offer many conveniences to consumers when making purchases. But those conveniences may leave you vulnerable to fraud and reduce your protections in case your information falls into the wrong hands. When making purchases follow these helpful tips:

  • Use credit cards to make purchases and transaction, especially online.
  • Do not use debit cards when making purchases online. All purchases with a debit card come directly from your bank account. If your debit card number is compromised online you only have a short amount of time to catch and report the fraud. Then, it can take several weeks to recover the money and put it back into your account.
  • Avoid carrying a debit card that carries the Visa/Master Card Logo. These cards can be used exactly like credit cards without the need of a pin code.
  • Use an ATM Only card to access your bank accounts. This card can only be used at ATMs and does require a pin code to access.

If you found this information helpful, you may want to consider taking part in the Identity Theft Resource Center’s Anyone3 fundraising campaign.  For more information or to donate please visit http://www.idtheftcenter.org/itrc-launches-anyone3-campaign.

Either through a failed attempt at renewing your driver’s license, an unexpected failed background check during a pre-employment screening, or through some event more traumatizing, like being informed at a traffic stop that you have a criminal record you were not aware of, you’ve discovered that someone has successfully made a fraudulent driver’s license (or state id card) with your information. Now what? I interviewed ITRC’s senior advisor Wilma to get the best tips for resolving driver’s license or state ID fraud.

governmental id theftITRC: What is the most important first step for any victim of driver’s license fraud to take in order to mitigate their case?

Wilma: They should call the DMV Fraud Department in the state where the fraudulent license was issued and inform them that a license was issued in their state using their stolen information.

ITRC: What can be done if the victim needs a new license in the state where as a result of the fraud, someone else already is in possession of a current and active license?

Wilma: When the victim contacts the issuing state’s DMV, the process will vary slightly depending on the state. The victim should ask that particular DMV what they require to be sent to them in order to get the current license suspended or revoked so that the victim can get a valid license issued in his home state.

ITRC: Ok, what next?

Wilma: The victim must file a police report for criminal impersonation/identity theft at their local police dept. They should also check with their local Social Security Office to determine if SSA issued a replacement social security card and how many were issued.

ITRC: And what if the SSA informs the victim that replacement cards they didn’t request have been issued, potentially to the identity thief?

Wilma: In that case, the victim should submit their police report to the Social Security Administrations, and inform them that the prior requests were fraudulent. Request them to furnish you a Work History Report to make sure no one is employed using your Social Security Number. Then check your Credit Reports, and issue fraud alerts. In the event that any fraudulent financial information appears on the Credit Report, the victim will need to contact each of those creditors, inform them that the debt is fraudulent, and submit to each creditor a copy of your police report, along with a written dispute of the charges.

Identity theft is an ever-growing problem. What follows are 5 simple steps anyone can easily take to reduce their risk of becoming a victim of identity theft.

  1. Get that Social Security Card and birth certificate OUT of your wallet/purse/car: I can’t stress this enough, if you’re not going to get a passport or open a bank account, or process your new-hire paperwork for your next job TODAY, then why are your most sacred identity documents still floating around in your purse or wallet? I can’t tell you how often the ITRC works with confirmed identity theft victims whose cases began out of a lost or stolen purse or wallet. Without an SSN or birth certificate, the theft of a wallet is a temporary inconvenience. You’ll have cancel a few credit cards, maybe close a bank account or two, and get yourself a new license from the DMV. If on the other hand if either or both of those documents were inside the wallet or purse when stolen, congratulations; you’ll now be at an exponentially greater risk for identity theft, and numerous other types of fraud….for the rest of your natural existence. That’s not an exaggeration, once a birth certificate or SSN is compromised or exposed; there is NO perfect solution to putting humpty dumpty back together again. You’ve now forced yourself to become the paranoid, mildly panicky consumer you previously may have made fun of.
  2. Shred Your Mail: Most consumers don’t pay attention to the plethora of personal information we throw away in our discarded mail. Our mail often contains vital information that is best protected from the public. Everything from account numbers, contact information, SSN’s, dates of birth, tax id numbers, all can be found in your mailed correspondence. Invest in a shredder and make sure that any document that contains sensitive personal data makes it through the cross cutters before it goes to the trash. Having a locking mailbox is also a good idea.
  3. Check Your Credit Reports: I know you hear this all the time, from a thousand different places right? But do you really understand WHY checking your credit is a good idea? Think of it being similar to a financial X-ray – if you broke your ankle, you would go to the doctor to get it checked out. Chances are a medical professional knows your ankle is broken just from feeling it, but he orders the X-ray anyway. Why? Because the X-ray allows the doctor to identify precisely where the damage is, and hence the best/most appropriate remedy. A credit report is no different. It will show you if damage to your credit worthiness might exist, and may point out where the damage is coming from. Knowing that someone else is using your credit worthiness, and identifying the SOURCE of bad/fraudulent information is obviously the first step in getting it corrected. Checking your credit is the easiest way to find out if someone else is using your financial good name to acquire benefit, at your cost.
  4. Don’t Send Personal Identifying Information (PII) to an Online Employer: Never give your SSN, bank account numbers, or any other personally identifying information (PII) to an employer you’ve never met in person. Searching online for jobs is a fast, convenient way to job search, but consumers should understand that this convenience is not without added risk. If you haven’t had an in person meeting or at least a few phone conversations with your perspective employer, than why does he need your SSN? Make sure you know the organization that may be hiring you before giving any information. Job scams are a very common way for thieves to capitalize on the desperation of others, so make sure you’re careful with what information you send and to whom you send it. A legitimate organization will almost always want an in-person interview before offering a job position.
  5. Don’t Be Lazy with Passwords: Is your password to your online bank account the same as the one to your email, which is the same as the one to your social media page, which is the same as the one to your fantasy sports team? Password laziness is a key way scammers take advantage of you. They find a way to get access to a piece of information that on its own is harmless (maybe a name and the last 4 digits of your social). This seemingly harmless info may be enough to request a password for an online banking account. Now they have access to one account. From there, if you’re not serious about your password selections, you might’ve just made it that much easier for a thief to gain access to your entire life online. Use capital letters and numbers, and change your passwords at regular intervals.

If you found this information helpful, you may want to consider taking part in the Identity Theft Resource Center’s Anyone3 fundraising campaign.  For more information or to donate please visit http://www.idtheftcenter.org/itrc-launches-anyone3-campaign.

Especially in today’s age of accessible information, parents are more and more protective of their children’s information. This is a wonderful thing because the more aware parents are of the risks to their children for identity theft, the less likely their children will become victims themselves.

If a situation occurs that could put your child’s social security number in danger (stolen wallet, information breach, etc.) It is natural for a parent to protect their child using the steps that an adult would use on themselves. The thing that is important for all adults to understand is that the process for children is very different and can have negative results if attempted.

check

It is important to keep in mind that the credit reporting agencies do not know that a person exists until a credit report is started under their social security number. This usually occurs when credit is applied for, like for a credit card, cell phone, student loans, etc. Another way this can occur is if a parent requests a credit report on their child too often. By frequently inquiring into your child’s social security number with Equifax, Experian, and Trans Union, you run the risk of them viewing your credit checks like those done by a creditor. Checking once a year or even once every two years can start a credit history for your child at an age where they should not and cannot be applying for credit. The longer your child has inquiries but not credit on their credit report, the lower their perceived credit score goes. This will make it tougher for your child to apply for credit when they do turn 18 because it will appear that they have inquired for credit, but never received it.

In order to prevent this from happening:

  • Do not check on your child’s credit report unless there is evidence that fraud may be taking place. This can include:
    • Receiving bills or statements under your child’s name
    • Being told your child already has a bank account when you go to open one
    • Problems claiming your child on your taxes
    • Personal information is lost or stolen.
  • Check your child’s credit report when they turn 16 ONLY if one of the above scenarios have occurred. Checking at 16yrs of age allows you time to clear up any fraud that may be occurring before your child turns 18.

Child identity theft is definitely becoming more prevalent on parents’ radars as cases start to be revealed in the media. It is understandable for this concern, but as stated above a parent can do more harm than good if they are overzealous. For more information on child identity theft you can read the Identity Theft Resource Center’s Fact Sheet on Child Identity Theft. If you still have questions you can always call our victim advisor center toll free at 888.400.5530.

If you found this information helpful, you may want to consider taking part in the Identity Theft Resource Center’s Anyone3 fundraising campaign.  For more information or to donate please visit http://www.idtheftcenter.org/itrc-launches-anyone3-campaign.

When most people think of identity theft, they only imagine the financial implications of someone opening up credit cards or writing bad checks. However, there is a whole world of ways that these creative thieves can use a victim’s personal information. One of those ways is medical identity theft and even within this subset of crime there are even more typed of crimes to be committed. One of those is what is called financial identity theft.

Examples of this type of fraud would include a hospital or a doctor billing you for medical services given to another person. The thief may or may not have a copy of your private insurance card. Here are the following steps you should take if you believe you have become a victim of this particular crime.

Ambulance

  1. Contact the billing department of the medical facility or doctor requesting payment. If you are receiving this notice from a collection agency, then contact the collection agency first. Explain that this is a case of identity theft or mistaken identity. If the billing department is reluctant to help, then contact the attending doctor, or the medical facility’s fraud or legal department.
  2. Ask what proof they have that this person is you. There is almost always a physical description of the patient. Does it match you? You might be able to show that your height, weight, skin color, age, blood type, or sex is not the same as the “patient.”
  3. Ask when service was provided. You might be able to prove you were somewhere else during that period.
  4. What service was provided? If surgery was done or a condition was diagnosed, you might be able to prove you don’t have a scar or that condition.
  5. Ask if your Social Security Number (SSN) was used or just a name and address. If your SSN was used, you will need to follow the information in ITRC Fact Sheet 100 – Financial Identity Theft: the Beginning Steps and check your credit reports. This thief may be affecting your credit status in other ways. They may be opening new lines of credit or leaving other collection actions behind.
  6. Ask if this person used your medical insurance card or number. If so, contact your insurance company and report the problem. Ask for a new number on the replacement card. They may also have a fraud department that tracks cases.
  7. File a police report in your city and state of residence. You are a victim of a crime. At your earliest opportunity, obtain a copy of the police report.
  8. Send copies of your affidavit of fraud, the police report, any other supporting documentation proving identity theft to the medical billing department and any additional collection agencies which may be involved. Please remember to mail this documentation certified, return receipt requested.
  9. Once the provider agrees this is a case of fraud or identity theft, get that agreement in writing and keep it in a safe place forever. This is called a Letter of Clearance.

While this seems like an overwhelming amount of activity to clear your name, it is not. It will be difficult and you will be angry that this has happened to you, but it can be rectified. If at any time you need additional help or have questions you can always call the Identity Theft Resource Center at 888.400.5530 to speak with a live Victim Advisor who is trained to help you through this process. There is also additional information on the Identity Theft Resource Center’s website which may be helpful.

While more light still needs to be shown on all the electronic data breaches that are occurring every day, the less flashy and attention-getting forms of attaining personal identifying information should not be overlooked. These “low-tech” strategies for stealing one’s information include stealing wallets or purses, mail theft, sifting through dumpsters for documents, and spying over your shoulder while you handle personal identifying information. The easiest of these forms of identity theft with the lowest risk of detection is looking for your documents in the trash, otherwise known as “dumpster diving.” It is of utmost importance to be vigilant against these forms of theft and one of the easiest ways to minimize low-tech ID theft is to keep a shredder handy around your house or office.

document shreddarThe Identity Theft Resource Center maintains a cutting edge Data Breach Report on the type and number of data breaches in the United States. While electronic data compose the overwhelming majority of data breaches, paper data breaches still make up over 15% of all data breaches reported so far this year. While 15% may seem low, people must be aware that paper breaches can often be much more devastating than electronic breaches. While an electronic breach can be just as devastating, the information compromised in an electronic data breach may be just an e-mail address, a password, or user name.

With Congress starting to take notice of cybersecurity, it is likely that low-tech ID theft, especially paper breaches, may increase as businesses begin to make a greater effort to upgrade their information technology systems. Paper breaches will often have significant amounts of your personal identifying information (PII) with extras such as what your signature looks like, fingerprints, or copies of your photo identification in a file. This is the mother lode for an identity thief. Now, the safest route to take is to simply shred every single piece of paper you throw away, but obviously not everyone wants to take the time and effort to shred that much paper on a daily basis. While you do not have to shred everything, you should always shred the following documents as soon as possible: tax returns, bank statements, credit card offers, old photo identification cards, pay stubs, convenience checks, canceled checks, old Medicare cards, and canceled credit cards or debit cards.

These documents all contain sensitive personal identifying information that an identity theft can use to do considerable damage to you. Use a crosscut shredder, which means that the shredder won’t just cut the paper into long lines, that cuts the paper being shredded into hundreds of pieces which makes it virtually impossible for an identity theft to put back together. For documents containing PII that you must absolutely hang onto, the best thing to do is to scan these documents onto your computer, transfer them to a thumb drive, and then delete them from your computer. Store the thumb-drive either in a safe storage area like a safe or hide it somewhere that a thief would have trouble finding it.

“Shred for Your Protection” was written by Sam Imandoust, Esq. Sam serves as a legal analyst for the Identity Theft Resource Center. We welcome you to post/reprint the above article, as written, giving credit to and linking back to the ITRC Blog.

Social networking sites are a great way for families and friends to stay in contact with each other. They also provide an open forum for people to speak their mind, talk about issues that are important to them, and share photos and memories with the world. Kids and teens have especially taken to this new way of connecting with people. In 2009, 38% of 12 year olds in the United States were members of at least one social network according to the Pew Research Center’s Internet and American Life Project. Kids love chatting, sharing real time photos, and instant messaging each other.

This is a wonderful tool for kids and teens to use, but there are certain things that must be taken into consideration, the first being the mental and emotional maturity of the user. Most young people don’t understand that what you post online can be seen by everyone, and is online forever. Pictures, comments, etc. can be viewed by anybody you allow access to. The biggest concern most parents have is stalkers and pedophiles who can use the information posted by kids to pinpoint what school they go to, the rout they take to walk home, if they have after school jobs, or if they will be at a particular location unsupervised like at the mall.

The second concern is that most kids don’t understand the long term consequences of what they post. Some users have found their posts used against them years later when they are applying for college and jobs. Comments about a particular college could result in an application to attend being denied. Pictures and comments at parties and social gatherings could cost you a job. Even pictures that a minor child may think are safe to post or share online could result in criminal charges of child pornography and a permanent record as a sex offender.

The last thing kids and teens need to keep in mind is that anything they post online can be accessed and manipulated by others. Cyberbullies have been known to take pictures from legitimate social networking profiles and create a dummy profile. They may doctor the pictures to depict the original person in compromising and embarrassing situations.

When teaching your children safety online it is always important to stress that nothing they post is 100% guaranteed to be private. Parents should be proactive in monitoring what their children post and talk with them if they see anything they deem inappropriate.

A year ago in May, the ITRC posted ITRC Fact Sheet FS 143, which provided an overview of what the IRS was doing to combat identity theft, and help those victims who specifically had IRS issues because of tax problems created by the identity theft. The content of Fact Sheet 143 was provided by the IRS Office of Identity Protection, and this document is definitely a necessary starting point for anyone who has encountered issues with the IRS caused by returns being filed with your SSN, or reports of a work history that do not belong to you.

The IRS established internal procedures in 2009 to give IRS employees guidance on identity theft issues, and provided the IRS business units methods for handling the unique aspects of identity theft cases. Since 2008, the IRS has also provided a specialized identity theft unit as a service to taxpayers who have been victims of identity theft, and wanted to notify the IRS. This unit has a toll free number (1-800-908-4490) and will work with victims to review their taxpayer accounts and history, and provide guidance on what steps to take to mitigate their identity theft case. This unit has handles hundreds of thousands of consumer calls in English and Spanish. Using these methods, the IRS has been able to mark taxpayer accounts when identity theft has been indicated, establish communications with the affected taxpayer, and proactively investigate returns tied to marked accounts to prevent additional fraud on these accounts. In addition, those identified as identity theft victims may now receive an Identity Protection PIN to ensure that only their verified return is processed, and without delay.

So, what’s new?

In a hearing of the Congressional House Committee on Ways and Means on 5/8/2012, the IRS gave testimony that directly answers the question posed by this blog:

“Over the past few years, the IRS has seen a significant increase in refund fraud schemes in general and schemes involving identity theft in particular. Identity theft and the harm that it inflicts on innocent taxpayers is a problem that we take very seriously. The IRS has a comprehensive identity theft strategy comprised of a two-pronged effort, focusing both on fraud prevention and victim assistance.”

In the area of fraud prevention, the IRS noted that in 2011 identity theft screening filters were put in place to detect fraudulent returns before processing. This is a huge task given 100 million returns to process, and the fact that 10 million taxpayers move and 46 million change jobs each year. IRS has now instituted a correspondence with the sender of a flagged return before that return is processed, and is issuing Identity Protection PIN’s to those who are known to be identity theft victims. For the 2012 tax filing season, over 250,000 “IP PINs” were issued.

Prevention of tax fraud using the identity of deceased taxpayers is also being addressed. The IRS is coding deceased accounts that have been used fraudulently to prevent further future misuse, and marking the accounts of recently deceased taxpayers so that future attempt to use the account will be prevented. The IRS is also working with the SSA to shorten the time required to update Death Master File information into IRS records. They are also working with SSA on a potential legislative change which could help reduce the use of the Death Master File as a source for identity theft SSN’s. And, the IRS has developed methods to us information from law enforcement agencies to flag high risk accounts and help block returns that are filed by identity thieves. Altogether, it is apparent that the IRS is putting serious effort into identity theft prevention methods.

The IRS also testified about their efforts to ease the plight of identity theft victims. By the end of this fiscal year, they will have almost 2500 employees dedicated to identity theft work. In addition to the IP PIN program, IRS has dedicated significant training to employees and call center assistors in order to improve their response to identity theft victims. Coupled with a healthy taxpayer outreach and education effort, it appears to ITRC that the IRS is engaging in a serious campaign to reduce identity theft related fraud and provide needed support to victims.

The full testimony can be found here: http://waysandmeans.house.gov/Calendar/EventSingle.aspx?EventID=293593

‘What the IRS is Doing About Tax Fraud’ was written by Rex Davis. Rex is the Director of Operations at the Identity Theft Resource Center.