FBI’s Law Enforcement Executive Development Association (FBI-LEEDA) has partnered with LifeLock, an industry leader in identity theft protection services, in order to provide cutting edge seminars on identity theft to law enforcement around the nation. These seminars cover current identity theft laws, the various technologies used in identity theft crimes, and proper identity theft awareness and protection strategies. In addition, this program provides access to databases to assist law enforcement in identity theft investigations.

In the last three and a half years, the FBI-LEEDA/LifeLock Identity Theft Summits have reached more than 7,000 law enforcement officials representing more than 2,500 agencies around the United States. The Summits have been hosted by police chiefs, sheriff’s offices, universities and state attorneys general across 32 states. More than 100 Identity Theft Summits have been held so far, with more than 30 taking place in 2012 alone. LifeLock has been recognized for its Corporate Social Responsibility by both the American Business Awards and Communitas Awards for its work with the FBI-LEEDA program.

Based on a recent Javelin study, the FBI-LEEDA program picked a strong company to partner with to educate and assist law enforcement in the field of identity theft. The study, titled 2012 Identity Protection Services Scorecard: How to Deliver Customer and Market Value in a Regulated $4B Market provides insight into the different companies and services available to consumers who want to protect themselves against identity theft. The Javelin report ranked LifeLock number one, tied with the company Intersections, in overall identity theft protection service when compared with 15 other top companies in the industry.

Based on Javelin’s criteria, LifeLock was the only company to receive a 100% score in the category of detecting breaches to your identity due to their multi-faceted approach of triple-bureau credit monitoring, internet scanning, public records scanning, Social Security Number tracing, and offering a child and family option for the consumer. LifeLock was ranked number two in the category of resolving identity breaches for providing consumers with a certified fraud specialist, 24/7 access to LifeLock’s multilingual 24/7 resolution team and a large identity fraud insurance and service guarantee provided by a third-party insurance provider.

FBI-LEEDA/LifeLock Identity Theft Summits for the rest of 2012 will be held in Prescott Valley, Arizona and Baltimore, Maryland.

If you found this information helpful, you may want to consider taking part in the Identity Theft Resource Center’s Anyone3 fundraising campaign.  For more information or to donate please visit http://www.idtheftcenter.org/itrc-launches-anyone3-campaign.

Prescription fraud occurs when an identity thief, using your personal information, has a prescription issued and possibly filled under your name. Prescription fraud is just one consequence of medical identity theft, where a thief obtains enough of your personally identifying information to be able to assume your medical identity. Prescription fraud affects the victim in many ways, including their finances, ability to get necessary health care and possibly their ability to check their own health records.

An identity thief using your identity to be prescribed restricted medications, may also use your health insurance to purchase the medication. This means that you, the victim, will often get left with the bill for any unpaid expenses the identity thief incurs while using your identity and medical insurance.


It is important to be alert for any explanation of benefits (EOB) you receive from your health insurance provider or bills for medical services you did not seek or receive. This may be your best warning that an identity thief is abusing your medical identity and insurance.

Unfortunately, there are worse consequences to being a victim of prescription fraud than bearing the brunt of fraudulent medical bills. When an identity thief uses your medical identity to be prescribed medication, this information will be incorporated into your health record. Any subsequent medical personnel looking at your record will see the new prescriptions and make medical decisions based on this fraudulent record. Prescription fraud victims have discovered they were victims of identity theft and prescription fraud after their pharmacy refused to fill their current, valid prescription because it conflicted with another medication prescribed to the identity thief.

Lastly, it can be exceedingly difficult to set your health records straight after an identity thief has received services or prescriptions under your name. Under the Health Insurance Portability and Accountability Act, or HIPAA, strict rules prevent access to patients’ medical records by unauthorized entities or individuals. Sadly, this very same rule prohibits victims of prescription fraud from accessing their personal health records in order to correct it because health care providers fear it may be a violation of the identity thief’s rights to confidentiality of their medical records.

The best defense to prescription fraud or any identity theft is to be keenly aware of your personal information. Any documents that contain personal information such as your birth date, Social Security number, driver’s license number, or insurance plan information, should be stored somewhere safe and secure or shredded when no longer needed. Do not carry your Social Security card, military identification, or Medicare card on your person as they have your Social Security number on them and are extremely helpful in the hands of an identity theft. New military identification cards no longer have Social Security numbers on them, so if you have an old military ID you can always renew your card to reduce your risk of identity theft.

“Prescription Fraud and Identity Theft” was written by Sam Imandoust, Esq. He serves as a legal analyst for the Identity Theft Resource Center. We welcome you to post/reprint the above article, as written, giving credit to and linking back to the original post.

SC Department of Revenue Reports Record Setting Data Breach

It was admitted publicly by state officials yesterday that the tax and banking information from millions of South Carolinians may have been compromised in a recent exploitation by hackers of the Department of Revenues servers.

What Happened: On October 10, the South Carolina Department of Revenue (DOR) was informed by the South Carolina Division of Information Technology (DSIT) of a potential cyber-attack involving the personal information of South Carolina Tax Payers. On October 12, the state hired an outside IT security firm, Mandiant, which on October 16, determined the intruders accessed state systems in early and mid-September. It wasn’t until eight days later, on October 20, that the suspected security hole was actually closed.

Who It Affects: In the aftermath of this discovery, it was determined that approximately 3.6 million Social Security numbers and 387,000 credit and debit card numbers of South Carolina Tax Payers may have been exposed (The entire population of the State of South Carolina is approximately 4.7 million), making this the largest breach of its kind in state history.

What’s Being Done: “We are taking immediate steps to protect the taxpayers of South Carolina, including providing one year of credit monitoring and identity protection to those affected,” Governor Nikki Haley said in a statement. In an effort to mitigate the potential damage, taxpayers in South Carolina who might have potentially been impacted are being provided one year of credit monitoring. Haley said the state was negotiating to offer protection at about $8 per person, which would cost the state about $29 million if every taxpayer affected registered.

South Carolina Taxpayers that have filed returns in that state since 1998 are encouraged to call the toll-free call center established by the DOR, 866-578-5422.

If you found this information helpful, you may want to consider taking part in the Identity Theft Resource Center’s Anyone3 fundraising campaign.  For more information or to donate please visit http://www.idtheftcenter.org/itrc-launches-anyone3-campaign.

Almost everybody has heard the horror stories and nightmare scenarios of an identity thief gaining your personal information and using it to establish credit card, loans and other lines of credit that you would not have applied for yourself. But what these scenarios rarely talk about are the steps you can take to prevent such an event from occurring, or what to do to clear your name should you find yourself in this situation.

Something that anybody can do, at any time, is to place a free 90-Day Fraud Alert on their credit reports. This requests that credit issuers (credit card companies, cell phones, etc) contact you first before they approve of any applications for credit. This will not affect accounts you have open or your credit score. As well, you can replace the fraud alert every 91 days at no charge, or extend it to seven years with a police report. The fraud alert can be applied for over the phone or going to each credit agency’s website directly. It’s always a good idea to place the fraud alert with all three companies yourself to make sure that possible fraud doesn’t get in the way of your protection.

Once you place the 90-Day Fraud Alert the credit reporting agencies will send to you a letter with instructions on how to gain a free copy of your credit report. This way you can make sure that everything is ok with your credit reports and fraud isn’t taking place. This report does not count towards your annual free credit report, allowing you to save that one for later.

But what should you do if there is something on your credit report? The first step is to file an Identity Theft Report through the Federal Trade Commission.

Once you have filed an Identity Theft Report, contact the companies that are reporting fraudulent accounts. Request to speak to their fraud or identity theft department and inform them of the fraudulent account. Fill out these documents, get them notarized, and send them back to the company/s with a copy of your Identity Theft Report. Some companies will ask for other things like a photocopy of your driver’s license. Make sure you send these documents with your packet. Make sure you send it Certified Mail Return Receipt so that you get proof of when they received your paperwork.

Continue to talk to these companies and, if need be, send them any documents they may request. If all goes well, they will recognize this was identity theft and they won’t hold you responsible. Make sure you get this in writing. Computers can error and humans make mistakes. These letters of clearance come in handy when this happens.

For more long term/permanent options for protection from identity theft (especially after you have already been victimized) look into freezing your credit reports with the three credit reporting agencies. The process is slightly different for each state, but all states offer the freeze for free to victims with a police report.

For more information, check out the ITRC victim assistance page here: http://www.idtheftcenter.org/knowledge-base.

If you think you may be a victim of identity theft, contact the Identity Theft Resource Center for toll-free, no-cost assistance at (888) 400-5530. For on-the-go assistance, check out the free ID Theft Help App.

I’m an old guy, and have been quite a few places, and done quite a few things. So, not much surprises me anymore. And, along with life’s lessons, I acquired over 25 years of business experience before retiring and ultimately ending up at the Identity Theft Resource Center (ITRC). But one thing that has continued to surprise me for the past 6 years is hearing the details of hundreds of new identity theft cases each and every month. I have found these cases to be constantly changing and evolving, and ranging from simple to very complex. Although I am not a victim advisor, I have been constantly surprised at what ITRC Victim Advisors do each and every work day to help this unending stream of victims.

A victim advisor for the ITRC never knows what the next call will bring. The phone rings according to your position on the phone queue, and now it becomes your call, your turn to listen, assess, question, analyze, discuss, and plan. Hopefully you can make some sense and order out of a victim’s pain and suffering at the hands of an identity thief. The training and preparation to become an identity theft Victim Advisor is by itself daunting. Each person I have seen trained for the job soon shows the signs of “information overload” as they begin to understand the breadth and depth of the information that must be understood and retained in order to appropriately answer that ITRC Call Center phone.

ITRC provides information and help on a wide variety of identity theft cases, scams, and related topics. Identity theft cases can be financial, government related (SSN and DMV), medical, criminal, child related, or Internet/account takeover types of cases. Each of these types of cases will require different actions to correct. In many cases the appropriate response, that will actually do some good, may vary depending upon the laws of the state of residence. And, as if that wasn’t enough, a significant percentage of these callers will have more than one type of identity theft to resolve. In the period January through August 2012, 28% of the victims reported governmental identity theft, usually meaning the illicit use of their SSN in some manner. Approximately 6 out of 10 reported financial identity theft. It is relatively common for a single victim to have financial identity theft at the same time they are a victim of governmental identity theft. Since there are many “sub-types” to each of these major categories, the Victim Advisor has the task of sorting out all the facets of these cases, and determining the appropriate course of action for each.

In addition, victims of identity theft are often very emotional and upset with this unexpected and serious invasion of their privacy. Some need to vent, and most have also been frustrated with endless phone trees, conflicting website information, and probably have found little coherent help with their specific problem. The Victim Advisors deal with a wide variety of personalities, including a few that simply don’t want to help themselves, and expect “someone else” to fix the problems. It is a saving grace that for most of the victims who contact the ITRC this will be their first time to speak with a live person, who is interested in their specific case, and has the knowledge to provide a good roadmap of actions to begin mitigating the problems.

So, I continue to be impressed by what the ITRC Victim Advisors do, and how they do it. In the field of identity theft, they are “in training” every day as exploits used by the criminals are constantly evolving. And it is always a great payback when a victim calls or emails, thanking our advisors for what they do.

When most people think of identity theft they think of a thief opening up fraudulent accounts under their name and information, charging huge amounts of money. What a lot of people don’t consider is the possibility of a thief gaining access to their own credit reports and learning about where they have credit. If you find that somebody has pulled your credit report without your permission, don’t panic. Stay calm, there are things you can do to protect yourself.

The first is to get a copy of your credit reports yourself if you don’t already have one. This can be done by placing a 90 day fraud alert on your credit report by phone, by visiting the three credit reporting agencies’ websites, or by writing to the three credit reporting agencies if you are having problem with the phone or internet. Credit report

Once you have your credit reports you can see all of the companies that currently have accounts under your social security number, and if the thief has started any new accounts.

For lines of credit that are your own, call or physically go to these companies and talk to them about precautions and protections that can be placed on your account to prevent fraud. Most companies will offer a password or pin code for you. In cases of credit cards and some bank loans, you might want to consider changing the account number to make it more difficult on a potential thief. If you have any credit card accounts that you do not use regularly you may want to consider closing them. Make sure you have documentation showing when you have closed any line of credit reported with the CRAs.

If a fraudulent line of credit has been opened by the thief, read Fact Sheet FS 100 on the Identity Theft Resource Center’s website. It will walk you through what to do. After you have secured all of your accounts, consider freezing your credit reports. This will prevent the thief from viewing them again as well as establishing new accounts under your information. You can read about freezing from the Identity Theft Resource Center’s Website., Fact Sheet FS 124.

For continued vigilance, keep track of all statements (mailed or electronic) and watch everything for new activity or charges. Make sure all accounts that are supposed to be closed stay closed. Check your credit reports every year to make sure that everything remains ok and when in doubt, contact the Identity Theft Resource Center at 888-400-5530 for a free phone consultation.

If you found this information helpful, you may want to consider taking part in the Identity Theft Resource Center’s Anyone3 fundraising campaign.  For more information or to donate please visit http://www.idtheftcenter.org/itrc-launches-anyone3-campaign.

With all the high-tech ways that hackers and identity thieves can help themselves to your money, it’s easy to forget that the “old school” methods are still a very real threat. Things like dumpster diving for your discarded credit card offers or stealing your mail from your curbside mailbox still carry the possibility of a crime.

One viable method of wreaking havoc with your identity is to have your purse or wallet go missing, either through loss or theft. If that occurs, your checkbook can provide an opportunistic thief with a short-lived but still hefty payday.

If you notice that your checkbook is missing, there are some important steps you should take:

1. Is it lost or stolen?

This can be hard to determine, but if you’re able to tell whether it was just misplaced (maybe your wallet fell off the roof of your car when you drove away) versus actively stolen, your next appropriate steps can change. If you’re certain it was just dropped or left behind somewhere, call your bank and have those check numbers invalidated. If you aren’t certain about the numbers in your checkbook, they may be able to help you trace back which numbers you’ve already spent, and go from there.

2. Placing a freeze

If you can’t figure out the numbers or if you aren’t certain this was an accident, your bank might put a freeze on your account. It’s temporary but immediate, and it can prevent a thief from spending money in your name. That’s why it’s important to contact your financial institution as soon as you know something’s wrong.

3. Closing the account

Ultimately, your bank may decide that closing the account is the best option, especially if someone got a lot of checks or your bank cards. They will usually meet with you to determine which pending transactions are valid, such as any automatic bill pay items like your power bill, and help you establish a new account.

4. Transfer those draft payments!

If you do have to open a new account, make sure you think about all of the automatic draft payments you have, such as utility bills, gym memberships, or other recurring items. You don’t want a constant reminder of this headache every time your electricity is shut off or your membership expires for non-payment.

5. Decide if a police report is warranted

If you think you might have just lost your wallet, you might not need a police report. However, it’s a good idea to contact your local law enforcement office anyway and let them determine if you need to file any paperwork. After all, the person who finds your missing wallet might not be honest and could use your identification or your cards for fraud. If you do know that it was stolen, then you definitely should alert the police and file a report.

If you think you may be a victim of identity theft, contact the Identity Theft Resource Center for toll-free, no-cost assistance at (888) 400-5530. For on-the-go assistance, check out the free ID Theft Help App.

It’s a scenario that unsettles most people; the loss or theft of your wallet or purse. Your ID cards, all your credit and debit cards, receipts, any number of other valuable documents, even pictures with sentimental value might be lost.

While there’s no way to completely protect oneself from the sting of such a loss, the best way to reduce such difficulty is to ensure that only the things you really need with you all the time are the things you carry, and to leave the rest at home. The difference between a temporary headache and a life-long issue can sometimes boil down to what you did or didn’t have in that purse or wallet. Below are five things you should (almost) NEVER carry around in a purse or wallet:

  • Social Security Card (or any piece of paper with the SSN written on it): This is one of the biggest mistakes, and generates many calls to the ITRC.wallet Identity theft springing from a stolen social security card carried in a wallet or purse is among the most common ways people become victims. If you lose your wallet and the Social Security card was in it, unlike a credit or debit card, you cannot simply cancel the card and change the number. This number is what’s known as a “unique identifier,” meaning that number is unique to you, and only you, and cannot be changed in all but the rarest of cases. With that Social Security number and little else, a criminal can take over your identity, open new accounts in your name, work under your name, create new drivers licenses or state ID’s in other states, and on and on. Unless you have need of your Social Security card THAT DAY, do not carry your Social Security card around in your purse or wallet. This document, more than any other, changes the loss of a wallet from a temporary hurdle to a life of constant increased vigilance and paranoia.
  • Birth Certificate: Possibly the only thing more damaging than losing a Social Security card is the loss of a birth certificate. Your certificate of live birth is the first and fundamental document issued by the government and it is the document from which all other documents spring. A birth certificate can get you a replacement Social Security card, a passport, a driver’s license, and many other forms of identification, virtually anything. Since this document is considered by government and financial institutions as the bedrock identifying document, once a thief has possession of it, it is virtually impossible to prevent fraud. At that point, your only recourse is to try and clean up the mess after fraud has already occurred. This document is the single most destructive one in existence if it falls into the wrong hands. Obviously, something like this should never be carried around where it could be easily lost or stolen.
  • Account and Routing Numbers: If you’re not going to the bank today, why are you carrying around the account and routing number to your checking account? In the wrong hands, these numbers can be used by a thief to clean you out, overdraw you, and leave you stuck with the financial loss. Unlike the loss of a check or credit card, simply canceling the card will not prevent a thief with access to your account numbers from making use of your account. One must actually close the account and open an entirely new one. In the interim, you will have to file a police report and dispute with the bank any fraudulent charges. You may get your money returned after the conclusion of an investigation, but in the meantime, you no longer have access to your money. Avoid carrying these numbers around unless really necessary. If you do lose an account number, immediately set up a verbal password with your bank to protect against any unauthorized access to your account.
  • Password Cheat Sheets: I know, in today’s highly integrated electronic society, you might have as many as 10-12 passwords you need to remember for various accounts. More than you can probably remember on your own. To give yourself a little help, you wrote them down in one place you’ll know to look in the event you can’t remember one of them. Good trick, but DON’T leave it in your wallet. Even if the passwords aren’t linked to paper to any particular account, it’s a GREAT cheat sheet for any thief looking to do additional damage. Keep your password cheat sheet where it belongs, at home.


  • Passports: A passport is a quintessential document necessary for international travel. This document, because it is government-issued is also useful in acquiring a new Social Security card, driver’s license or state ID card, and can be used as an identifying document in acquiring a loan or opening a new credit account. Unless you’re leaving the country today, leave that passport at home.

In today’s age of electronic commerce it’s sometimes hard to tell what’s the best way to make purchases that don’t require cash. Should you charge it on your credit card, or should you use your debit card and not have to worry about paying it back? For many people the convenience of a debit card is the deciding factor. Also, they feel safe knowing their information is protected by the pin code that they set up when the card was activated. But there are some things that most consumers may not know about the difference between debit card and credit card transactions. Things they should consider when making purchases.

  • Most places do not check IDs anymore when purchases are made using a card. So,anybody can swipe any card when making a purchase and becredit card relatively certain that they won’t need to prove their identity to finish the purchase.
  • A pin code does not have to be used when making a purchase with a debit card. Most card readers will give you the option of running your debit card as a credit card, making the need for a pin code authentication meaningless. You can tell if your debit card will allow this option if it has the Visa or Master Card logo on it.
  • Most credit card companies will give you 30 to 60 days to report fraudulent activity on your card. Since it is a charge account, no actual money has left your bank account and once you successfully dispute the fraudulent charges you will not be held responsible for them.
  • Most debit cards give the user only a 2 to 7 day window to report fraudulent charges. Also, since the card is attached to your bank account, the fraudulent transaction must be completed before the money can be refunded to your account. This process can take up to two weeks. In that time, overdraft charges may be incurred and will have to be disputed with the bank.

Yes, debit cards do offer many conveniences to consumers when making purchases. But those conveniences may leave you vulnerable to fraud and reduce your protections in case your information falls into the wrong hands. When making purchases follow these helpful tips:

  • Use credit cards to make purchases and transaction, especially online.
  • Do not use debit cards when making purchases online. All purchases with a debit card come directly from your bank account. If your debit card number is compromised online you only have a short amount of time to catch and report the fraud. Then, it can take several weeks to recover the money and put it back into your account.
  • Avoid carrying a debit card that carries the Visa/Master Card Logo. These cards can be used exactly like credit cards without the need of a pin code.
  • Use an ATM Only card to access your bank accounts. This card can only be used at ATMs and does require a pin code to access.

If you found this information helpful, you may want to consider taking part in the Identity Theft Resource Center’s Anyone3 fundraising campaign.  For more information or to donate please visit http://www.idtheftcenter.org/itrc-launches-anyone3-campaign.

Either through a failed attempt at renewing your driver’s license, an unexpected failed background check during a pre-employment screening, or through some event more traumatizing, like being informed at a traffic stop that you have a criminal record you were not aware of, you’ve discovered that someone has successfully made a fraudulent driver’s license (or state id card) with your information. Now what? I interviewed ITRC’s senior advisor Wilma to get the best tips for resolving driver’s license or state ID fraud.

governmental id theftITRC: What is the most important first step for any victim of driver’s license fraud to take in order to mitigate their case?

Wilma: They should call the DMV Fraud Department in the state where the fraudulent license was issued and inform them that a license was issued in their state using their stolen information.

ITRC: What can be done if the victim needs a new license in the state where as a result of the fraud, someone else already is in possession of a current and active license?

Wilma: When the victim contacts the issuing state’s DMV, the process will vary slightly depending on the state. The victim should ask that particular DMV what they require to be sent to them in order to get the current license suspended or revoked so that the victim can get a valid license issued in his home state.

ITRC: Ok, what next?

Wilma: The victim must file a police report for criminal impersonation/identity theft at their local police dept. They should also check with their local Social Security Office to determine if SSA issued a replacement social security card and how many were issued.

ITRC: And what if the SSA informs the victim that replacement cards they didn’t request have been issued, potentially to the identity thief?

Wilma: In that case, the victim should submit their police report to the Social Security Administrations, and inform them that the prior requests were fraudulent. Request them to furnish you a Work History Report to make sure no one is employed using your Social Security Number. Then check your Credit Reports, and issue fraud alerts. In the event that any fraudulent financial information appears on the Credit Report, the victim will need to contact each of those creditors, inform them that the debt is fraudulent, and submit to each creditor a copy of your police report, along with a written dispute of the charges.