Translate

Tuesday, January 31, 2012

How to Get a New Social Security Number

If you need a new social security number due to identity theft, be prepared to jump through some hoops to get one

In a recent article, I outlined what you should do if your Social Security Number has been hijacked. But what if the identity thief has irrevocably ruined that number for you, by running up bills in your name or otherwise performing illegal acts? Can you get a new number to help limit the damage?

Yes, you can. But don't expect it to be easy, because the Social Security Administration is very reluctant to hand out an SSN if you already have one. That's understandable, because it messes things up all up and down the line.

Jump Through This Hoop, Please
Think about all the organizations that use your SSN these days, for one reason or another. There's all the government agencies (federal, state, and local), most of your creditors, your bank, all the major credit reporting companies, and anybody else who wants to keep track of you.

It's easy to see why they don't want to have you change your SSN. Fair enough.
That's why the SSA makes it difficult. In order for them to even consider it, you'll need to prove your identity, age, and citizenship (or legal immigration status), and demonstrate that you're inconvenienced by the illegal use of your old number. That's all on you, and they can still turn you down if they want.

For more info on how to change your SSN, click here to get Publication Number 05-10002, Your Social Security Number And Card, and read it thoroughly before you even try.

No, Nope, Uh-Uh
Here are the circumstances under which the SSA will certainly refuse your request:

1. You're trying to avoid the consequences of bankruptcy.

2. You're trying to duck a legal responsibility.

3. You're trying to hide from the law.

4. There's no evidence someone else is using your SSN, even if it's been stolen.

If any of those are true, don't even bother to file for a new number; you won't get one.

One final bit of advice: even if the SSA gives you a new number, it may be more trouble than it's worth. You won't be able to use the old number anymore, and that's the number that the government and any businesses you've had dealings with know you by.
You won't even necessarily be able to use the new SSN to get a fresh start credit-wise. While the new number may trip up other businesses, the credit reporting companies are very cagey, and will be happy to identify you by other information that hasn't changed, such as your name or address
.

For all these reasons, getting a completely new Social Security Number as a response to identity theft should be saved back as a last resort.


How to Dispute Credit Report Errors

Credit report errors are a common result of identity theft. Here's how to dispute them:

For many of us, the first hint of identity theft is a rash of credit report errors -- usually late notices or charge-offs for credit cards we don't even own. Setting the record straight is a difficult, time-consuming process, but you have to do it.
By law, credit reporting agencies must correct any inaccurate information when you point it out. But because they have to be very cautious before doing so, expect to have to jump through a few hoops first.

Getting Started
The dispute process is fairly straightforward, but it can take a while and the details can be complex. Your first step, once you've identified unexplained entries, is to send a detailed letter to the credit reporting agency outlining exactly why you think the report is inaccurate.

They'll want copies of any supporting documentation you may have (don't send the originals; you'll never see them again). Explain exactly why you're disputing the item, and request its removal. Make sure all your contact info (address, phone number, email, etc.) is accurate on your paperwork.

Send the letter by certified mail, with a return receipt requested, so you can be sure they got it.

The Response
Unless the reporting agency considers your claim frivolous, they have to investigate within 30 days, and forward the claim to the information provider, which must also investigate. If the latter finds that their information is inaccurate, they have to report that to all the major credit reporting agencies.

Win or lose, your reporting agency must notify you of the results in writing. If the dispute resulted in a change in your credit record, they also have to give you a free report, and then they have to send notice of the correction to anyone who has received your report in the past six months.

This report doesn't count against your free yearly report, and if you like, you can ask that it be sent to anyone you've contacted for employment purposes in the last two years.

Even if you don't win the dispute, you can ask for a statement of the dispute to be included with your report. They're likely to charge you for this, though.
Further Efforts

While the information provider should receive your claim via the reporting agency and respond to it forthwith, you can also contact them directly with your dispute; they may provide a specific address for this. Include all the information you would provide to the reporting agency, including copies of supporting documentation.
For more detailed information on how to dispute credit report errors, including sample letters that you can use as templates of your own, check out the Federal Trade Commission's web page on the subject.

Saturday, January 28, 2012

Identity Theft and Your Social Security Number

If someone steals your Social Security Number, you can be in for a world of hurt. Here's what to do to fix it



Do you know where your Social Security Number is... or, more to the point, who it's with?

The truth is, most of us don't even know our SSNs by heart, and we don't take them seriously enough. Most of us see an SSN primarily as a form of identification, which it is - but more significantly, it's the form of ID that the government uses to track almost every aspect of your life.

That Little Card
When someone gets a purse or wallet stolen, their first thoughts are usually for the cash and the credit cards inside. But many of us also keep a copy of our Social Security card with us, just in case... and truth be told, losing the SSN card can be more damaging than losing a dozen credit cards.

Credit cards can be cancelled fairly easily, and new ones issued in a snap. That's not so easy with a Social Security card. This is the government we're talking about, after all, and they tend to be slow and very cautious.

Plus, don't forget: with your SSN, an identity thief can build a whole new life under your name, whether they're just trying to hide under a cloned identity or because they want to buy things in your name and foist the bills off on you. They're a lot less limited than they are with existing credit cards.
What Should You Do?

If your Social Security card goes missing, report its loss immediately to the Social Security Administration.

If you think someone is using your SSN to cause credit problems for you, the SSA won't be able to help: you'll need to contact the Federal Trade Commission at 1-877-IDTHEFT (1-877-438-4338).


Before you do, though, take a look at your credit report to see if there's any suspicious activity. You can get a copy free from Annual Credit Report.com.

You should also contact the IRS, just in case the miscreant has used your number to file an income tax return (so they can steal your refund) or to get a job. Call the IRS Identity Protection Unit at 1-800-908-4490.


Now What?

Expect it to take at least a couple of months for everything to get straightened out and blow over, especially if the identity thief managed to cause you credit problems. That may seem annoying long, but don't just blow it off; that could be disastrous.

Worst case scenario? Someone might steal not just your IRS tax refund, but any SSI or Social Security benefits you're due. That's why it's so crucial to report the theft of your Social Security Number immediately!
Computer Tips to Protect You and Your Family

These computer tips could save you from a case of identity theft

Identity theft and computer tips go hand in hand. Sure, there are many methods of stealing someone's identity -- but online is the easiest and most common. That being the case you have to keep your eyes open wide and remember that as private as your computer feels, it's just like a window into your home: only as secure as you make it.

In fact, a window is exactly what your computer can be -- and without computer security tips, it could be a sliding window standing wide open with a sign that says 'come on in.' So if you want to protect yourself and your financial information from identity theft, take these computer tips to heart!

Helpful computer security tips
1. Watch for your computer suddenly slowing down or working less efficiently. This can be a sign of a computer virus, which could easily hack through your entire system.

2. Enter web addresses yourself -- don't click on links, especially those in emails. A common phishing method involves sending you a great link which, once you click on it, either downloads a file, harvests information, or redirects you to a fake site that tricks you into entering personal info.

3. Read about common phishing scams and stay up to date. Treat all emails with healthy suspicion, even if they seem to come from close friends. Contact people personally on the phone before you reply to any email requesting personal information.

4. If you want to phone someone to confirm an email, look up their phone number directly -- don't go with the number they include in the email. Sometimes thieves will claim to be a financial institution and give you their phone number. Call your bank, creditor, etc. directly if you think an email may be genuine.

5. Change your passwords. Don't use easily predictable passwords and don't use the same password for every website. I know it can get complicated after a while, remembering all of those passwords, but this is an incredibly important computer tip. Otherwise, if a thief cracks one password, they crack them all.

6. Watch your bank account and credit card statements carefully. If you find unexplained charges, even if they're very small, immediately contact your financial institution. If this continues, consider putting a fraud alert on your cards. Small thefts are still thefts, and sometimes thieves take small amounts in preparation for taking larger amounts later on.

Computer safety is one of the most important things we can teach ourselves and our families in these days of rampant fraud. It's not enough to follow these computer tips yourself: you need to make sure everyone in your family, especially people who might not be as familiar with computer scams (elderly people or children, for example) are aware of the dangers.

Create computer rules for your family and enforce them strictly -- and keep them yourself, too. It may seem like a pain, but these computer tips could keep you from losing your life's savings.


Friday, January 27, 2012

Facebook and Identity Theft -- Can We Relax Yet?

Learn the main cause of identity theft on Facebook and how you can prevent it
Don't you just love Facebook? I do, you do, and so do identity theft criminals. Facebook has taken measures to increase security on the popular social networking site, and yet identity theft continues to be a problem. Discover where the real problem lies, how to stay safe from cybercriminals and enjoy Facebook at the same time.

Who is to blame?
Facebook is a great social networking site. Its developers have worked overtime to put security practices in place to keep its members safe from criminal activity. Yet, in spite of this, identity theft continues to happen. Why?

Sophos, an IT security firm that helps fight identity theft, recently looked into the situation. To find the real reason why Facebook users are susceptible to identity theft, they did a couple of tests. For the test, they created two fictitious Facebook members, a 21-year-old and 56-year-old female.

Each fake member sent out 100 friend requests to randomly chosen Facebook users in their age group. Ninety-five complete strangers chose to become 'friends' with the two fake members within two weeks. If that isn't bad enough, check out the rest of the information from the test:

*8 users became friends with the 56-year-old fake member without being asked.

*89% of the 20-something age group gave away their full birth date

*57% of the 50-something age group gave away their full birth date

*Just under 1/2 of the 20-something crowd and 1/3 of the 50-something crowd gave away personal information about friends and family.

What does this mean? It means Facebook members are willingly giving away personal information to people they don't know -- people who could very well be cybercriminals waiting to steal their identity. This is how identity theft occurs.

Facebook Safety Tips
How can you protect your identity and keep from being the next victim of identity theft? Paul Ducklin, head of technology of Sophos, recommends the following tips:


*Take advantage of your social networking site's security.

All social networking sites have security settings. Use them. When you first join a network, set the security settings to the strictest settings possible and leave them in place until you become familiar with the network. Gradually, begin accepting 'friends' but do it with caution.

*Be a real friend
On Facebook, just like in real life, it's cool to have loads of friends. It makes you feel popular and that everyone likes you. Seeing how many 'friends' you can get seems to be the focus of many on Facebook.

While this is fun, there's also danger involved. In real life, even if you have many friends, you really know that when push comes to shove, you can only depend on a handful of those friends.

The same applies on Facebook. You constantly get add requests and you want to add them but before you do, there's something you need to know. There are people on Facebook to have fun and socialize. Then there are people on Facebook that use it to abuse your personal information and commit identity theft.

The definition for a friend is someone you 'know, like, and trust.' This is a good rule to follow on Facebook. If you personally know the friends you add, you can be pretty sure they aren't just after your personal information. Anonymous 'friends' could be cyber-criminals in disguise.

*Once on the internet, always on the internet.
The information you put out about yourself, your friends, and family is forever on the internet. It never goes away. If you post information that includes your date of birth, your phone number, or home address, it will be there forever. The same goes for pictures or information you post about others. So before you post anything, think.

Facebook continues to be a fun place to hang out, catch up with friends, read the latest gossip, and stay in the know. Facebook has made every effort possible to keep their site a fun and safe place. If you want to continue to hang out on Facebook, your safety is up to you.

Take responsibility in what information you post, the friends you accept, and take advantage of the available security. Be diligent in doing these three things and you can continue to enjoy Facebook while staying safe from identity theft.


Computer Crimes to Watch Out For

Beware of these all-too-common computer crimes!

The most common form of identity theft remains computer crimes, especially those that allow hackers to capture personal information and use a victim's credit cards fraudulently. And yet many people don't understand the depth and danger of computer crime -- instead, they think of it as a 'lesser' crime when compared to face-to-face offenses.

Obviously, though, perpetrators commit identity theft in secret -- and that makes computer crimes the perfect approach. Here are the three most common identity theft computer crimes and what you can do to avoid them.

1. Phishing
By now most people know better than to send money to African princesses, but there are literally thousands of phishing emails out there, and some are pretty insidious. The best hackers pose as an established company, going so far as to create a plausible email address and analyze the company's official communications to sound authentic.

Most phishing emails contain a threat so that you'll act quickly, without thinking too much. Be wary of any financial threat coming via email. If you have any suspicions at all, immediately contact the institution and ask them to confirm the information. Obviously, you should not do this by replying to the suspect email or using any phone numbers it provides -- look up the company's contact info directly.

2. Keystroke Spyware
Spyware is another one of those insidious computer crimes. It preys on the unsuspecting, attaching itself to legitimate websites, showing up in random links, or appearing in games and other programs you download.

Keystroke spyware is particularly insidious. The hacker installs a keystroke program on your computer -- which is to say, a program that captures every key you strike and sends it back to the hacker to analyze. From there, it's surprisingly easy to glean information like your passwords, credit card number, and anything else you type into your computer.

The only protection against spyware? A good anti-virus program that also watches for computer crimes. Install one of these and keep it up to date. Otherwise, you never know what you'll wind up downloading.

3. Hacker Spyware
Hacker spyware is the same as keystroke spyware, but serves a different function. Instead of capturing keystrokes, it opens a window into your system, allowing the hacker to enter your computer and stroll through your hard drive, gathering any information you might store.

Obviously, you should handle these computer crimes the same as the former: install a good anti-virus protection system that also watches for spyware.

It's true that computer crimes are on the rise, but you don't have to be helpless -- not if you follow these simple tips.

Thursday, January 26, 2012

Don't Let Thieves Ruin Your Life with This Computer Crime
Protect yourself from this computer crime before it ruins your life.


We love our technology and electronic gadgets, but with the good comes the bad and some of that 'bad' is computer crimes. When you think of identity theft, you usually think of someone stealing your identity. But what if you unknowingly download a virus that allows thieves to ruin your reputation when you've done absolutely nothing wrong? Find out how this is possible

Computer Cyber Crime that Ruins Reputations
There are many types of computer crimes but According to Associated Press, it is possible to have your computer taken over by pedophiles through viruses. They download child pornography to your computer. They get their fix, and you get the blame.

Think this couldn't happen to you? Think again.
In 2007 Michael Fiola's bosses became suspicious when they discovered he had 4 1/2 times more data on his computer than his co-workers. A technician found that Michael had child pornography stored in his images folder.

After 11 months, spending $250,000 in legal fees, having his and his wife's reputation ruined, and health issues due to the stress, Michael was finally cleared after proof showed his laptop was severely infected with a virus that was programmed to visit as many as 40 child porn sites per minute.

Through a virus, a pedophile had logged on to Michael's laptop and downloaded the porn. Unfortunately, it doesn't have to be a pedophile that does this. Anyone who wants to play a sick joke or frame you can do this.

Prevent this from Happening to You
Bryan Oakley is a special agent with the FBI who works pedophilia cases. He states, "Nationwide I've only found four cases where someone has by malicious intent of another person had child pornography put on their computer. Pedophiles generally want immediate access to their material. With it being remotely stored they don't have immediate access to that material."

Oakley uses a laptop or home computer for example. "When they want to access it, it may be off your network may be down, they no longer have access to that data," Oakley added.

In view of this, you don't have to be overly concerned about this type of a computer crime happening to you. To protect yourself from computer crime, install reputable anti-virus software and avoid downloading illegal software. Most of the time, internet users get viruses from free downloads and illegal downloads.


Computer Crimes -- Is WiFi Safe?

Know the risks of computer crimes when using WiFi hotspots


WiFi hotspots are popping up everywhere and computer crimes linked to WiFi are popping up just as fast. On one hand, you certainly don't want to go without the convenience, but on the other hand, you can't afford to put yourself at risk for a computer cyber crime. To stay safe and still use WiFi, you should know a few things.

Why is WiFi Unsafe?
WiFi hotspots are unsecured and unencrypted. Because of this, the connections are open making it easy for hackers to intercept your traffic and steal your information. Thieves do this in one of three ways -- man-in-the-middle, sniffing, and the low-tech method of just plain being nosey.

Nosey people involve those close to you looking over your shoulder and watching what you're doing. This one is easy to solve but sometimes you let your guard down and forget. Always remember when working online at a hotspot to sit with your screen facing away from others. If possible, sit with your back against a wall.

The man-in-the-middle technique means the thief intercepts your between the computer and a wireless router. If the thief is successful, he can collect all your personal information and transfer it to his.

Sniffing is done with sniffer software. This device can read, monitor and capture your information. This is very dangerous because thieves can get all your information including passwords, user names, personal information and credit card numbers.
Protect Yourself

Protecting yourself from nosey people is easy. The other two methods are a little more difficult but it's not impossible to protect yourself from these types of computer crimes.

*Never enter important information (social security number, credit card number, passwords) unless you are on a secured connection.

*When you're not using your computer, unhook your wireless adapter.

*Check the URL. If the URL has an 's' after the http, it is a secure connection.

*Disable file sharing.

*Install a firewall on your computer.

The convenience of WiFi is nice and something everyone uses. Continue to use WiFi, but stay aware and stay safe from computer crimes by following these tips.

Wednesday, January 25, 2012

Dispelling Common Fraud Myths

Protect yourself from fraud by knowing the truth behind the myths

We all know about fraud, but how accurate is our information? There are a surprising number of myths floating around, some of them so common they've become accepted 'knowledge' -- much to the experts' dismay! Are you falling for any of these common myths?

ID fraud myths and the truth behind them
Make sure you don't fall prey to these myths!

1. Most identity theft occurs online.

In fact, the highest instances of identity theft come from credit card misuse. That includes an online portion, but it can also involve someone stealing your credit card or a sneaky waiter or sales clerk grabbing the number.

2. People who steal credit and debit cards are petty thieves out for personal gain.

Identity theft, especially credit card fraud, is almost its own industry. Many very organized criminal groups such as drug traffickers and the like engage in ID fraud on a (dare I say it?) professional level. These people are not only very good at getting your information, they are good at stretching out the time period between the theft and the time you realize what's going on.

3. The police can't do anything about identity theft, so there's no point calling them.

While it's true that the police often find their hands tied in fraud situations, you still have to report the crime. The police will do whatever they can to help you, and sometimes they even can make arrests or stop sloppy thieves before they get too far.

4. If a website has a professional appearance and contains contact information, it's safe to do business online.


It's not hard to design a professional looking website, and it's even easier to fabricate contact information. Again, the problem here is that we regard identity thieves as petty criminals, whereas many of them are very well organized and know what they're doing. Verify that a site is real by checking its address, looking for security features, and reading online reviews.


5. If you're familiar with online scams and have a good security system on your computer, you're safe online.


Thieves constantly change and evolve their scams, and you can never completely rely on internet security systems. Always be careful and treat anything that seems a little bit suspicious with great caution. Remember the old chestnut: if it seems too good to be true, it probably is!

6. Offshore tax shelters are a quick and easy way to protect your money.

Offshore tax shelters do exist, and there are legal ways to invest internationally. However, inviting people to invest in offshore tax shelters is a quick, easy way to convince them to dump large sums of money in places where American law enforcement officials can't touch it. Watch out for these investments.

There are a lot of myths out there, but if you're careful, you can avoid these common fraud pitfalls.


Become Familiar with Common Computer Crimes

Do you know about the computer crimes that could put you in danger?

We all know about computer crimes -- but then again, how much do we know, really? When you think of computer crimes, do you think of hackers slipping into bank servers to examine financial records, or someone sending you a fraudulent email?

The thing is, both of those -- and many other activities -- are computer crimes. Some are more likely to affect you than others, though, and those are the crimes watch for and be ready to deal with.

Common crime: Phishing
What is it?


A criminal sends a fraudulent email claiming to be from a familiar company, usually requesting either money or personal information, often noting that if you fail to respond you somehow lose your account.

How to prevent it
Big businesses don't do business by chain letter, and they never request personal information over email. If you suspect an email might be legitimate, do NOT respond to it: contact the company directly to confirm the request.

Common crime: Spyware
What is it?


Spyware is a type of virus that installs itself on your computer. This virus doesn't crash your system like some might. Instead, it quietly watches everything you do and reports back to its creator, enabling them to commit future computer crimes in your name. Spyware is used for everything from monitoring sites you visit so advertisers target you more effectively to obtaining access to your bank accounts.

How to prevent it
Use your common sense and take the same precautions you would to avoid downloading any virus. Never download anything from a site or email you don't completely trust, and install Internet security (preferably a firewall) and virus protection to safeguard your computer.

Phishing and spyware are the two most common types of computer crimes affecting regular users. Don't worry about someone gaining access to your bank records by hacking your bank -- businesses have strong safeguards and insurance in place to protect against those possibilities. Worry instead about your own computer. Practice safe Internet skills and don't take anything for granted -- those are the best ways to stop computer crimes in their tracks.

Tuesday, January 24, 2012

Creative Identity Theft: It's on the Rise

It's amazing what some people will do to steal from you. Here are a few of the more creative identity theft trends you need to be aware of.

While the same old methods of ID theft keep occurring over and over again -- because, sadly, they work like gangbusters --I've seen some surprisingly creative identity theft methods become more prominent recently.

While ID thieves can be dumb, they're not always. Sometimes they're pretty darn smart. I don't say that because I admire them, but because it's critical for you to realize that a lack of ethics doesn't necessarily equal a lack of brains. You have to remain very, very careful, even in situations when you shouldn't have to.

The price of good credit is, after all, eternal vigilance. I believe one of the Founding Fathers said that.

Endless Diversity
Recently, we made you aware of the recent plague of identity theft on Face-Book, and you can rest assured that it's spread to any other social media site you can think of since, from Zing to Linked In to Big Ben's BBQ Network. This is pedestrian compared to some recent ID theft issues.

For instance: You may not be aware that most photocopiers, scanners, fax machines, and similar devices made in the past decade contain hard drives that can store images of anything you pass through them. The clever thief can access that drive to pull your identity information with relative ease.

Your only real fix here is to never, ever copy your personal information on a machine you don't have total control over.

Matters of Life...
If you become pregnant, be very, very careful about who your friends are. Recently, one woman went to great lengths to pretend to be a new mom, then befriended an actual pregnant women, stole her information, obtained the birth certificates of her children... and used them to acquire government benefits.

If you have kids, it's a good idea to order credit reports on each of them every few years, to be sure that no one has tried this--or any other form of ID theft that could leave your kids' credit (or yours) ruined sometime in the future.

...and Death
People aren't even safe from identity theft after death. Recently, enterprising thieves have been grabbing personal information from places like the online Social Security Death Index, and opening new credit card accounts to abuse -- and have even been raiding existing ones.

Usually, the first thing anyone knows about this is when bill collectors start harassing the family of the deceased.

Now, you usually aren't liable for a deceased person's bills anyway, although some collectors may try to convince you otherwise. But it's still a nuisance. The best fix is to notify the credit reporting agencies immediately if a relative passes away, so you don't fall prey to some ghoul's creative identity theft.


Are You a Victim of This Computer Crime?

Know How to Protect Yourself from Computer Crimes and Keystroke Logging
You have to give cybercriminals credit. When it comes to computer crimes, they can be quite ingenious. Identity thieves are constantly developing new ways to steal your personal information or improving their methods. Such is the case with keystroke logging.

Fortunately for us, the good guys, and unfortunately for them, the bad guys, most of their attempts are detectable. That is, if you know what you're looking for. Here's help.

Understanding Keystroke Logging

Perry Kivolowitz, an American computer scientist, authored one of the first keylogger programs in 1983. Perry, a good guy, never intended his program for evil purposes and works today as a speaker on the subject of detecting tampering digital devices. But it goes to show, how technology in the wrong hands is often used for wrong purposes.

Keylogging is a computer cyber crime that means to track or log the keys you strike on your computer keyboard. Criminals do this covertly or in ways to avoid detection.

Why? A computer crime of this type happens for many purposes, most of which are not good. If a criminal is successful in attaching keylogging software or hardware to your computer, he can track everything you do.

This means when you log in to pay bills, pay credit cards, loan payments, make bank deposits or withdrawals, the thief is quietly collecting your personal information, usernames and passwords.

There are many different methods of keylogging, but the two main methods are software-based and hardware-base methods.

Software-based keyloggers - There are software programs designed specifically to work on your computer's operating system. Just as you download other programs to your computer to make it do specific things like word-processing or spreadsheets, keylogger software downloads and keeps track of everything you are typing into your computer.

Some software keyloggers operate remotely transmitting data from your computer to the thief's computer. Data can be transmitted using four different ways: uploaded with an FTP account, periodically emailed, wirelessly transmitted, or through your Ethernet cable.

Hardware-based keyloggers - These keyloggers don't depend on downloaded software. Instead, the thieves attach hardware to the cables coming into your computer. Unless you know what this piece of equipment looks like, you'll never know it there.

Preventing Keystroke Logging
Once you know what keystroke logging is, it isn't that hard to prevent. You can only be affected by software-based keylogging by downloading infected software. You can prevent this easily with a good anti-virus program and being careful about freeware you download.

You can detect hardware-based keylogging by checking the cables leading into your computer. Once you know what you're looking for, it's easy to spot.

Keystroke logging is preventable but don't let that lull you into a false sense of security. Identity theft is always on the rise. Stay ahead of identity theft and computer crime by staying educated on the latest methods used by criminals.

Tuesday, January 10, 2012

Again DON'T BE A VICTIM

Police Crime Tips
The Police Department's mission is to protect the public safety of all citizens, but the officers can not do it without the eyes and ears of you - the community.

At home?
Lock your doors and windows when leaving your residence. Most residential burglaries occur during the daytime. Know who is at your door before opening it.

Screen doors and chain locks provide false security. Obtain identification. If they show you an ID for a service company (i.e.Cable, phone, etc.)call their employer and verify who they are and why they are at your door. Consider installing peepholes in all entryway doors. Mark your property with your Driver License number, that way it can be traced ONLY to you if it is stolen.

Remember the three L's of Crime Prevention: LIGHTS, LOCKS & the LAW! Light up your residence, lock your doors at all times, and call the Law when you see something suspicious


Alarmed
Prior to installing home-security devices - think fire safety first. Would the device prevent you from getting out of your home? Do you have pet doors? They provide entry for pets, but they may also provide entry for criminals. Privacy fences give you privacy, but they also give the criminal concealment from outside view. Secure your garage door, even when you are at home. Burglaries and thefts take minutes or even seconds to commit.

DON'T open your door until you know who is there. When you are not home, leave lamps on timers and consider leaving a radio or television on. Consider leaving porch lights on at night. LIGHTING is one of the most INEXPENSIVE crime deterrents. Secure your keys and keep them out of view. NEVER place identification tags on your key rings. Treat your garage door opener like your keys.

NEVER leave your garage door opener inside a vehicle which is parked outside. Keep trees and shrubbery trimmed for better visibility. Keep windows clear and free of shrubbery and debris. Overgrowth may provide hiding places for criminals.

While On vacation
When leaving town, have a trusted friend or neighbor take care of your home. NEVER cancel general deliveries such as mail, milk, newspapers and other services when leaving town or going on vacation. But don't let those newspaper deliveries pile up either. If you will be away for an extended period arrange to have a neighbor cut your lawn. If you can, also have them move your car in the driveway so it appears you are still coming and going as usual. And NEVER leave your porch light on ONLY when you go on vacation. This tells a thief come on in...we are on vacation!

Out on the town
Remove your keys and lock your doors when leaving your vehicle. It only takes seconds to steal a locked car without the keys - why make it easier for a thief by leaving the keys in the car? And NEVER leave extra keys inside the vehicle or under the hood.

Secure your valuables in your trunk or take them with you. Don't create temptation by leaving valuables within view inside your vehicle. When returning to your vehicle at night, be aware of your surroundings. Look underneath and inside your vehicle before entering.

You make the call!
The MOST important thing YOU can do is CALL THE POLICE to report a CRIME or any SUSPICIOUS activity. You have to be the eyes of your neighborhood. And remember you can always remain a pair of anonymous eyes!

Getting personal
Stay alert by being aware of your surroundings.

Walk everywhere with a sense of purpose - show you are calm, confident and know where you are going.

Go with your gut feelings - if you feel uncomfortable, leave.

Carry your purse firmly and close to your body or better yet leave it at home and only carry what you need in your pocket - such as a small amount of money, keys, and maybe one credit card.

Keep your wallet in an inside coat or side trouser pocket.

Have your car or house key in your hand as you approach the door. If attacked use those keys as weapons!

Park in well-lighted areas that will be well-lighted when you return. Be sure to lock your car doors. If you jog, do not jog alone in isolated areas.

Do not hitchhike and never pick up hitchhikers.

Only list your last name and first initial in the phone book and on mail boxes.
Ask the phone company to not list your address in the book.

If you are concerned about crime and must go out, use the buddy system. Take a friend on that jog around your neighborhood. You'll both benefit from it!


Victimized
Remain calm. Try not to panic or show any signs of anger or confusion.

If the attacker is after your property, don't resist. That watch, car, money - whatever is replaceable - YOU ARE NOT!

Don't escalate this crime into a violent encounter. But NEVER let your assailant take you to another location. Your chance of survival is slim.

Make an effort to get an accurate description of your attacker: age, sex, race, complexion, body build, height, weight, type and color of clothing.

Call the police immediately, identify yourself and give your exact location. Do not leave the scene.

When you call 911 you will be asked several questions by the Call Taker. Be patient. While your are answering their questions they are keying in your information and dispatching the next available car. Any information you can provide to the dispatcher may help the officer en route to your call with apprehending the suspect.

Be ready to provide the following information:
Your Name

Address

Phone Number

What Happened?
Describe the event in as brief manner as possible.

When Did it Happen? Tell if the crime is in progress or when it occurred.

Who Did It? Name or describe the suspect or vehicle, if there is one.

Where Did They Go? Which way and how did they leave?

Wait for the officer to arrive or to call you back. The time it takes for an officer to arrive will depend on many factors. All police calls are prioritized by emergency status.

A theft of personal property may be aggravating but it is not considered as an emergency.When the officer arrives he/she may ask you questions similar to those asked earlier. Please be patient so the police officer can help you.

-Birdy

Monday, January 9, 2012

More Anti-Crime Tips: DON'T BECOME A VICTIM


Anti-Crime Tips
There are many simple precautions you can take to avoid becoming the victim of a crime. Many of them are just plain common sense, but we all forget from time-to-time.

While some crimes are carefully planned and executed, many are so-called 'crimes of opportunity.' If your actions make it appear easy and tempting for someone else to commit a crime, you could suddenly find yourself in the middle of a crime scene.

Burglary Tips
Purchase an alarm system for your home or business and use it whenever you're away.

It is also a good idea to have your home alarm activated while you're asleep.

Install motion sensor lights at the front and rear of your home or business.

Make sure you keep your doors and windows locked. Do not hide a key outside of your home, because criminals know all the places that you can think of to hide it.

Install double keyed deadbolt locks on all exterior doors if there is a window within arms reach of the interior lock. Make sure you keep a key readily available near each door in the event of a fire.

Make sure that you pick-up your mail and newspapers on a daily basis. If you're not going to be at home for a few days or longer, arrange to have someone you trust pick-up your mail and newspapers every day.

Keep the shrubbery and trees located next to your windows cut down so that criminals will not have a place to hide while they are prying open your window.

When you're going to be away from home on vacation put several interior lights on a timer, making sure you set them to go on and off at different times.

Make sure your neighbors know to call the police immediately if they see any suspicious activity at your home.

Financial/White Collar Tips

When using an ATM machine, make sure that no one is watching you enter your PIN number.

Check your credit history at least once a year to make sure that no unauthorized people have opened any accounts in your name.

Shred the pre-approved credit card applications that you receive in the mail before throwing them away.

When receiving credit cards and / or checks through the mail, make sure you check your mailbox promptly everyday to help reduce the possibility of someone stealing them out of your mailbox.When accepting checks as payment for anything, make sure the check is good prior to delivering the purchased item to the buyer. Bank checks are very easy to forge.

If your wallet or purse is lost or stolen, make sure you notify your bank and credit card companies as soon as possible.

If the deal sounds too good to be true, it probably is.

Never give your social security number or bank account numbers to anyone over the telephone or via e-mail unless you're absolutely sure that the person/company you are talking with is legitimate.

Try to use Direct Deposit whenever possible.

Make sure that your driver's license number is not the same as your social security number.

Do not leave your credit card receipts where people may find them. (Some businesses still print your entire charge account number on their receipts.) When throwing them away, make sure you shred them completely.

When discarding your credit card statements, make sure that you shred them completely.

Be aware of the possibility of fraud when making purchases over the Internet.

General Crime Tips

When you see suspicious activity, contact the police immediately. We would much rather respond and determine that everything is okay than not be called and learn later on that a crime was committed.

Try to remember as much as you can about the suspicious person(s) or vehicle(s) so you can provide that information to the police. Write the information down if at all possible. Clothing descriptions, scars, marks, tattoos, voice impediments, jewelry worn, physical deformities and anything else that may help us identify the perpetrator(s) are important.

When noting information about suspect vehicles, the Make, Model, color, number of doors, body damage, tag number, number of occupants, type of wheels, and anything else that may be unique to that vehicle are important to us.

Make every effort to obtain a tag number from the suspect vehicle(s), as well as the direction it traveled when it left the area.

If you witness a crime, please report it immediately and make sure you stay around so an officer can take your statement.

If you look like a victim and act like a victim, you're more likely to become a victim. Be aware of potential dangers and make every effort to protect yourself, your family, and your property.

Robbery Tips


Do not loiter in the parking lot of a business or apartment complex.
If at all possible, never walk alone.

When walking to or from a location, take the most direct route possible.

Do not walk in secluded areas or hang out in unoccupied or abandoned buildings.

Do not accept rides from, or offer rides to people that you do not know.

Do not open the door for anyone unless you know them personally. If the person tells you that they need help, advise them that you will call the POLICE for them. Do not let them into your home to use your telephone.

Do not carry large amounts of cash or wear a lot of jewelry.

Make sure your wallet or purse is carried in a manner that will make it difficult for someone to grab.

Do not count your money in public.Do not leave your purse unattended in a shopping cart or on the front seat of your vehicle. Do not place yourself in harms way by frequenting areas where criminal activity is prevalent.

Always be aware of your surroundings and the activity going on around you. If your instincts tell you that something is wrong and to be alarmed, pay attention and remove yourself from the potentially dangerous situation.

Vehicle Crime Prevention Tips

Keep the doors to your vehicle locked whenever it is unoccupied.

Do not leave any items of value in your vehicle. If you must leave valuables in the vehicle, please keep them in the trunk and out of sight.

Do not leave your vehicle running while you enter a store to pay for gas or to make a purchase.

Never leave your keys in your vehicle.

When selling your vehicle, make sure that you verify that the check used to pay for the vehicle is good before you allow the buyer to take possession of the vehicle. Be aware that it is very easy to forge a cashier's or bank check.

Always try to park your vehicle in an area that is well lighted.

Do not allow anyone to borrow your vehicle unless you know and trust them completely.

Park your vehicle in your locked garage whenever possible.



-Birdy
Powered By Blogger

Labels

Abduction (2) Abuse (3) Advertisement (1) Agency By City (1) Agency Service Provided Beyond Survival Sexual Assault (1) Aggressive Driving (1) Alcohol (1) ALZHEIMER'S DISEASE (2) Anti-Fraud (2) Aspartame (1) Assault (1) Auto Theft Prevention (9) Better Life (1) Books (1) Bribery (1) Bullying (1) Burglary (30) Car Theft (8) Carjackng (2) Child Molestation (5) Child Sexual Abuse (1) Child Abuse (2) Child Kidnapping (3) Child Porn (1) Child Rape (3) Child Safety (18) Child Sexual Abuse (9) Child Violence (1) Classification of Crime (1) Club Drugs (1) College (1) Computer (4) Computer Criime (4) Computer Crime (8) Confessions (2) CONFESSIONS (7) Cons (2) Credit Card Scams (2) Crime (11) Crime Index (3) Crime Prevention Tips (14) Crime Tips (31) Criminal Activity (1) Criminal Behavior (3) Crimm (1) Cyber-Stalking (2) Dating Violence (1) Deviant Behavior (6) Domestic Violence (7) E-Scams And Warnings (1) Elder Abuse (9) Elder Scams (1) Empathy (1) Extortion (1) Eyeballing a Shopping Center (1) Facebook (9) Fakes (1) Family Security (1) Fat People (1) FBI (1) Federal Law (1) Financial (2) Fire (1) Fraud (9) FREE (4) Fun and Games (1) Global Crime on World Wide Net (1) Golden Rules (1) Government (1) Guilt (2) Hackers (1) Harassment (1) Help (2) Help Needed (1) Home Invasion (2) How to Prevent Rape (1) ID Theft (96) Info. (1) Intent (1) Internet Crime (6) Internet Fraud (1) Internet Fraud and Scams (7) Internet Predators (1) Internet Security (30) Jobs (1) Kidnapping (1) Larceny (2) Laughs (3) Law (1) Medician and Law (1) Megans Law (1) Mental Health (1) Mental Health Sexual (1) Misc. (11) Missing Cash (5) Missing Money (1) Moner Matters (1) Money Matters (1) Money Saving Tips (11) Motive (1) Murder (1) Note from Birdy (1) Older Adults (1) Opinion (1) Opinions about this article are Welcome. (1) Personal Note (2) Personal Security and Safety (12) Porn (1) Prevention (2) Price of Crime (1) Private Life (1) Protect Our Kids (1) Protect Yourself (1) Protection Order (1) Psychopath (1) Psychopathy (1) Psychosis (1) PTSD (2) Punishment (1) Quoted Text (1) Rape (66) Ravishment (4) Read Me (1) Recovery (1) Regret (1) Religious Rape (1) Remorse (1) Road Rage (1) Robbery (5) Safety (2) SCAM (19) Scams (62) Schemes (1) Secrets (2) Security Threats (1) Serial Killer (2) Serial Killer/Rapist (4) Serial Killers (2) Sexual Assault (16) Sexual Assault - Spanish Version (3) Sexual Assault against Females (5) Sexual Education (1) Sexual Harassment (1) Sexual Trauma. (4) Shame (1) Sociopath (2) Sociopathy (1) Spam (6) Spyware (1) SSN's (4) Stalking (1) State Law (1) Stress (1) Survival (2) Sympathy (1) Tax Evasion (1) Theft (13) this Eve (1) Tips (13) Tips on Prevention (14) Travel (5) Tricks (1) Twitter (1) Unemployment (1) Victim (1) Victim Rights (9) Victimization (1) Violence against Women (1) Violence. (3) vs. (1) Vulnerable Victims (1) What Not To Buy (2)