Dr. Barbara O'Neill and Carol Kando-Pineda, of the Federal Trade Commission, will present this 90-minute webinar on behalf of the Military Families Learning Network. This 90-minute webinar will include two sections: a general overview of identity theft and discussion about military-specific scams. Topics covered during the first section, presented by Dr. O’Neill, include a definition of identity theft, signs of identity theft, an identity theft risk assessment quiz, types of identity theft, how identity theft occurs, ways to reduce identity theft risk, phishing scams, proactive and reactive identity theft actions, and identity theft resources. Ms. Kando-Pineda plans to discuss getting help for identity theft victims, including the steps they need to take immediately, walking through the new features for consumers on Identitytheft.gov and how they help victims develop a recovery plan, get a heads-up on the latest “imposter” scams, and an update on the Military Consumer campaign and new resources on the way for the military community.
Identity theft occurs when an unauthorized person uses your name, date of birth, social security number or other forms of identity to obtain credit in your name without your consent. Some identity theft methods include phishing, vishing, pretexting, shoulder surfing, dumpster diving, atm skimming and more. Stay alert and informed and protect yourself and your identity.
Identity theft occurs when an unauthorized person uses your name, date of birth, social security number or other forms of identity to obtain credit in your name without your consent. Some identity theft methods include phishing, vishing, pretexting, shoulder surfing, dumpster diving, atm skimming and more. Stay alert and informed and protect yourself and your identity.
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
Social engineering is a growing industry. Even the biggest companies as well as technology-savvy individuals fall victim to social engineering attacks. This training deck will help you understand the different types of social engineering attacks and how to protect your assets and data.
Credits:
Photos - unsplash, pixabay, flaticons
Presentation by: Jam Rivera
Learning Objectives:
1. Understand how this unique, emergent form of evidence can be used for criminal investigations and civil litigation e-discovery.
2. Discover the DoJ memo to law enforcement uncovered by FOIA stressing why and how to use social media in criminal cases.
3. See social media evidence recovered from smart phones, personal computers, and the cloud.
4. Learn the ethics of social media evidence collection including what you can and cannot do, if you want to keep your license that is.
With 1.2 billion monthly active users on Facebook alone, it’s not surprising that social media networks can be a rich source of information for investigators. And because Americans spend more time on social media than any other major Internet activity, including email, social media information and evidence is plentiful. You just need to know how to get it.
Finding, preserving and collecting social media evidence often requires some forensic skills, as well as an understanding of the laws that govern its collection and use. It’s important for investigators to be aware of both the possibilities and limitations of social media forensics.
Content:
What is phishing, history, how it works, statistics, types of phishing, how to identify it, how to take countermeasures, phishing kit, example of phishing attack.
Presentation of Social Engineering - The Art of Human Hackingmsaksida
Nowadays if you want to hack a corporation or damage a personal "enemy" fast, Social Engineering techniques work every time and more often than not it works the first time. Within the presentation you will be able to learn what social engineering is, types of social engineering and related threats.
This was a presentation by Hewie Poplock on Tuesday, November 15th, 2016 in the Goodwill Manasota (FL) Ranch Lake Community Room, "How to Avoid Identity Theft".
A victim of identity theft himself, Hewie will provide examples of how ID theft can happen as well as suggestions and precautions on how to prevent you and your family from becoming victims of identity theft yourselves. Topics covered included:
• What is Identity Theft
• How ID Theft Happens
• How to Protect Yourself
• Phishing
• Data Breaches
• Facebook Spoofing
• Skimmers
• Security Freeze
• On Line Shopping Safety
• Credit Card Chips
• What to Do If You are a Victim
Hewie is a former teacher, college instructor, business owner and manager, IT Manager, and web designer. He is currently semi-retired, but is active in technology user groups and frequently speaks to and teaches groups who are mostly seniors. He holds a monthly Windows Special Interest Group for a group in Orlando and has several videos on YouTube. He is an active member of The Sarasota Technology User Group.
Nowadays the payment fraud landscape is changing quite fast. Changing from classic schemes as bank cheque fraud, faked manual payment orders to organized crime with corporates as targets
Social Engineering - Are You Protecting Your Data Enough?JamRivera1
Social engineering is a growing industry. Even the biggest companies as well as technology-savvy individuals fall victim to social engineering attacks. This training deck will help you understand the different types of social engineering attacks and how to protect your assets and data.
Credits:
Photos - unsplash, pixabay, flaticons
Presentation by: Jam Rivera
Learning Objectives:
1. Understand how this unique, emergent form of evidence can be used for criminal investigations and civil litigation e-discovery.
2. Discover the DoJ memo to law enforcement uncovered by FOIA stressing why and how to use social media in criminal cases.
3. See social media evidence recovered from smart phones, personal computers, and the cloud.
4. Learn the ethics of social media evidence collection including what you can and cannot do, if you want to keep your license that is.
With 1.2 billion monthly active users on Facebook alone, it’s not surprising that social media networks can be a rich source of information for investigators. And because Americans spend more time on social media than any other major Internet activity, including email, social media information and evidence is plentiful. You just need to know how to get it.
Finding, preserving and collecting social media evidence often requires some forensic skills, as well as an understanding of the laws that govern its collection and use. It’s important for investigators to be aware of both the possibilities and limitations of social media forensics.
Content:
What is phishing, history, how it works, statistics, types of phishing, how to identify it, how to take countermeasures, phishing kit, example of phishing attack.
Presentation of Social Engineering - The Art of Human Hackingmsaksida
Nowadays if you want to hack a corporation or damage a personal "enemy" fast, Social Engineering techniques work every time and more often than not it works the first time. Within the presentation you will be able to learn what social engineering is, types of social engineering and related threats.
This was a presentation by Hewie Poplock on Tuesday, November 15th, 2016 in the Goodwill Manasota (FL) Ranch Lake Community Room, "How to Avoid Identity Theft".
A victim of identity theft himself, Hewie will provide examples of how ID theft can happen as well as suggestions and precautions on how to prevent you and your family from becoming victims of identity theft yourselves. Topics covered included:
• What is Identity Theft
• How ID Theft Happens
• How to Protect Yourself
• Phishing
• Data Breaches
• Facebook Spoofing
• Skimmers
• Security Freeze
• On Line Shopping Safety
• Credit Card Chips
• What to Do If You are a Victim
Hewie is a former teacher, college instructor, business owner and manager, IT Manager, and web designer. He is currently semi-retired, but is active in technology user groups and frequently speaks to and teaches groups who are mostly seniors. He holds a monthly Windows Special Interest Group for a group in Orlando and has several videos on YouTube. He is an active member of The Sarasota Technology User Group.
Nowadays the payment fraud landscape is changing quite fast. Changing from classic schemes as bank cheque fraud, faked manual payment orders to organized crime with corporates as targets
This webinar will discuss one of the most important savings goals of American families: saving money for a comfortable retirement. Specific topics to be covered include research findings about the retirement preparedness of American families, conflicting opinions about “the number” (i.e., amount of money needed to comfortably retire), factors that influence the number, and retirement savings calculation tools such as the Ballpark Estimate and Monte Carlo simulations. Case studies and chat questions will be included to apply the webinar content to real world situations.
In gearing up for America and Military Saves Weeks, Dr. Barbara O'Neill will present this 90-minute webinar on the tools and resources available for calculating the amount individuals and couples need to save for retirement, on behalf of the Military Families Learning Network.
December is Identity Theft Prevention and Awareness Month - Identity theft is a serious crime. This is the month to educate yourself on how to prevent identity theft. Join us for an important webinar with staff members from the SC Department of Consumer Affairs on how to prevent ID theft and know what to do if it happens to you. Open to library staff, state government employees, general public.
The Inside Job: Detecting, Preventing and Investigating Data TheftCase IQ
Companies have enough to worry about from outsiders when it comes to cybersecurity. From stealthy hackers infiltrating their networks to criminal cyber-gangs stealing their data and government surveillance of their systems, security teams must be on their toes at all times. But the insider threat can be just as dangerous and sometimes harder to detect.
According to the 2015 Insider Threat Spotlight Report, 62 per cent of security professionals are seeing a rise in insider attacks. While many of these are malicious attacks, they can also be unintentional breaches. The consequences, no matter the motivation, can be equally devastating.
This is basically do it yourself credit repair letters, you can use these letters when disputing items and sending them in to the credit bureaus yourself.
Common Consumer Frauds & How to Avoid Themmilfamln
Dr. Barbara O'Neill of Rutgers University and Carol Kando-Pineda of the Federal Trade Commission will present this 90-minute session on behalf of the Military Families Learning Network on March 20 at 11 a.m. ET. More info: https://learn.extension.org/events/1500/
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
During this workshop, Mr. Taylor will be discussing
how this growing crime is affecting individuals, families and small businesses.
Never before has there been a greater need for understanding identity theft and its impact.
In the workshop you will:
• Learn what ID Theft is and how to minimize the devastating effects
• Be introduced to the major types of identity theft
• Learn how to better protect personal and small business information
• Learn about restoration services and credit monitoring plans
Helpful information about what identity theft is, how to help prevent it and protect yourself from it. Designed for readers with limited knowledge. Easy to understand and share with audiences starting at age 13.
During this workshop, Mr. Taylor will be discussing
how this growing crime is affecting individuals, families and small businesses.
Never before has there been a greater need for understanding identity theft and its impact.
In the workshop you will:
• Learn what ID Theft is and how to minimize the devastating effects
• Be introduced to the major types of identity theft
• Learn how to better protect personal and small business information
• Learn about restoration services and credit monitoring plans
Identity theft is the #1 consumer complaint filed with the Federal Trade Commission for 14 consecutive years. All age and socio-economic groups are affected by Identity theft. This problem is affecting a younger demographic, affecting the workplace productivity of their parents.
Watch this presentation, get educated, and find out how you can avoid identity theft.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Company names mentioned herein are the property of, and may be trademarks of, their respective owners and are for educational purposes only.
17 U.S. Code § 107 - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work, including such use by reproduction in copies or phonorecords or by any other means specified by that section, for purposes such as criticism, comment, news reporting, teaching (including multiple copies for classroom use), scholarship, or research, is not an infringement of copyright.
Protecting your privacy, identity and financial information online is critically important in today’s Internet economy. Last year, 13.1 million Americans were victims of identity theft. I have no plans on joining this group, which is what inspired us to create our latest Zing blog guide – Identity 101.
company names mentioned herein are for identification and educational purposes only and are the property of, and may be trademarks of, their respective owners.
Identity Theft 101: How It Happens & What You Can Do To Prevent ItIdentityForce
Your information is everywhere and criminals, such as hackers, who’ve stolen as many as 1.2 billion passwords in one crime spree, know how to get to it. Our new Identity Theft 101 infographic discusses the different types of identity theft, explains exactly how identity theft occurs, and what you can do to prevent it. Don’t leave yourself unprotected!
Identity Theft and How to Prevent Them in the Digital Age Maven Logix
Mr. Jamshed Masood who is a telecom sector executive provided information about how to identity thefts and how to prevent them in the digital age. He discussed the real definition of identity theft, its impact. Not only limited to this, respected speaker also gave the complete information of different types of identity thefts and their methods such as hacking, shoulder surfing. While discussing these thefts, light on prevention methodology to treat these kind of thefts was also given to the audience.
Similar to Identity Theft: How to Reduce Your Risk (20)
Warrior Wellness: Mental Health and Women in the U.S. Militarymilfamln
Women play a pivotal role in military operations, and their experiences and responses may differ from their male counterparts. This webinar looks at how mental health manifests differently for women, in particular women in the military.
Women in the Military: Special Contributions and Unique Challengesmilfamln
Women have made and continue to make special contributions to the military, however they also face unique challenges as service members. This webinar discusses those contributions as well as some of the challenges they face.
Focusing on Co-parenting: Strengthening Diverse Military Family Systemsmilfamln
Join us to explore how the Military Family Readiness System can strengthen diverse families with a focus on co-parenting knowledge and skills. Best practices and research based strategies will be described and applied to military family systems and transitions.
Family Systems Trends and Transitions: What They Mean For Military Familiesmilfamln
Families are changing in response to large global trends. Military families are experiencing the same transitions which may be compounded by military service. Demographic changes will be discussed and the implications on family systems. In this webinar, participants share views of these changes, both personally and professionally.
Promoting Successful Home-to-School Transitions for Military Families with Yo...milfamln
This webinar will focus on promoting positive transitions from home to school and from school to school (e.g., during a move) for young children and their families. The presenters will identify important transitions that occur during early childhood including moving from home to school or school to school and discuss what research indicates regarding how these transitions play a role in children’s socioemotional and cognitive development. The challenges that exist within these transitions will be identified.
Presenters will describe and promote participant discussion of a range of research-based strategies for military families and caregivers/teachers to promote effective home-to-school/school-to-school transitions, strategies that promote positive socioemotional or cognitive development prior to, during, and after a transition. These will include how to connect with schools/teachers from a distance, moving, creating routines within transitions. The presentation will include a question and answer session immediately following.
Home Is Where Your Heart Is | Kids Serve Too!milfamln
Representative(s) from the Sesame Street Workshop will address potential child concerns and developmentally appropriate responses to relocation transitions, explore resources that caregivers can use when addressing these concerns, and provide tips in navigating the resources related to this topic on the Sesame Street for Military Families website.
This event is hosted by the Family Transitions concentration area of the Military Families Learning Network.
PCS Series: Research and Tools for Supporting Military Transitionsmilfamln
An overview of common issues military families face during a Permanent Change of Station (PCS). The first half of this webinar will look at the 2018 RAND Report, “Enhancing Family Stability During a Permanent Change of Station.” The second half of the webinar will focus on the tools available to military service providers through Military OneSource, such as Plan my Move, and other Military OneSource moving resources that can support families throughout a PCS.
This is the 3rd webinar in a 3-part Permanent Change of Station series focused on the issues military families face during a PCS.
SlideShare - Sesame Street Overview on Military Resources milfamln
In this 60-minute webinar, representative(s) from the Sesame Street Workshop will introduce the Sesame Street for Military Families website as well as explore resources that can be utilized in training, outreach efforts, family conversations, and community events. They will also discuss activities that promote child and family self-expression.
Up and Away: Building Child Language, Social Interactions, and Preliteracy S...milfamln
This webinar will focus on strategies to help children use more complex sentences and vocabulary with their caregivers and peers. Children learn through daily routines and play, but as they grow and explore early education settings, their social worlds expand. Opportunities abound for children to learn as they take turns peeking at the classroom guinea pig, pretend to be police officers on a chase, and read books with a favorite caregiver. We will cover strategies to support growth in language, social communication, and early literacy skills by engaging children in meaningful, everyday activities in early care settings.
Objectives:
1. Name three strategies to help support a child’s growing ability to combine words
2. Describe the importance of social interactions during the preschool years and how to support turn-taking and other early social skills
3. Learn three early literacy strategies to use in supporting young children’s readiness for school
Overindulgence In Parenting: How Much Is Too Much?milfamln
Overindulgence is an issue many people face in our society as the research and subsequent literature has shown us. While society tells us we need more on a regular basis, parents and children alike are struggling to understand how much is enough and adults who were given too much as children often feel the effects.
What is overindulgence?
Three ways parents overindulge
Tools to reduce overindulgence (The Test of Four)
Online course offerings
Employment Resources for Military Familiesmilfamln
Webinar attendees working with military service members will leave the webinar knowing where to find resources, partnering organizations, and support when working with military spouses seeking educational or career opportunities.
Opportunities & Possibilities: Posttraumatic Growth in Research & Practice milfamln
In this presentation, Richard Tedeschi, Ph.D. will discuss the theoretical model and research basis of posttraumatic growth, the process by which trauma survivors often find valuable changes in how they live life in the aftermath of trauma. He will outline a framework for therapeutic interventions that facilitate posttraumatic growth through a way of relating called expert companionship. This approach to practice incorporates a broad view of what constitutes trauma, including many experiences that are not typically considered traumatic in our current diagnostic system, but which are traumatic to people because they challenge core beliefs about oneself, other people, the future, and the kind of world in which we live. The attention paid to possibilities for transformation of individuals and their relationships does not preclude working on typical symptoms of trauma, but recognizes that symptoms are better understood, tolerated, and reduced when traumatic suffering can have meaning and purpose.
Coconut oil is all the rage these days to benefit your health. It has been rumored to help with heart disease, thyroid problems, slow aging, and protect against illnesses such as Alzheimer’s, arthritis, diabetes and even weight loss. But what is the truth about coconut oil? Tune into this webinar to learn fact from fiction about this popular oil.
Learning Objectives
The participant will be able to discuss the composition of coconut oil and the metabolism of its triglycerides.
The participant will be able to explain the science behind the purported benefits of coconut oil for weight loss and blood lipid levels.
The participant will be able to assist clients in understanding the inclusion of coconut oil in the context of a healthy dietary pattern.
Small Talk: Strategies to Support Child Communication Before Words Emergemilfamln
Previous webinars in this series have covered child communication development through the preschool years. In this session Drs. Mollie Romano and Juliann Woods will discuss what families, early care and education providers, and early interventionists can do to help a child learn to communicate and talk. A focus will be placed on evidence-based strategies to support communication leading to words and how caregivers can embed these strategies in everyday activities - from walking to the bus stop to pick up an older sister to Face-timing with Mom or Dad while during deployment. The presenters will present a variety of responsive intervention strategies including interactive book sharing to support child communication and emergent literacy.
Objectives:
1. Describe the importance of responding to child communication as a strategy
2. Discover at least three ways to create opportunities for children to communicate during everyday routines
3. Learn how to coach families to embed strategies during their daily routines and activities
From Communication to Conversations: Expanding Language Development in the E...milfamln
Children’s language use grows dramatically throughout the toddler and preschool years. Words and phrases expand daily and children begin to form sentences that go beyond sharing their preferences. Their speech sounds continue to develop and include both predictable, and sometimes adorable, error patterns. Pre-literacy skills also emerge during this developmental window and lay the foundation for academic success as children approach elementary school. In this webinar, the presenters will discuss decontextualized language, early developing morphemes, timelines for phonological processes, and preliteracy achievements during the preschool years as well as when to worry that a child’s speech and language doesn’t seem to be progressing as expected.
Entrepreneurial Opportunities for Military Familiesmilfamln
This 90-minute webinar will examine the resources and programs offered by the Small Business Administration that can benefit military service members and spouses transitioning from the military into business-owning ventures. Jaime Wood from the Small Business Administration will give an overview of the programs offered nationally by the SBA to support entrepreneurial efforts of veterans and military spouses, including the Boots to Business initiative, programs offered by the Office of Veteran's Business Development, the Veteran Women Igniting the Spirit of Entrepreneurship (V-Wise), and Entrepreneurial Development programs for service disabled veterans.
Watch recording and learn more: https://learn.extension.org/events/3265
Getting to Know You: Early Communication Development from Birth to Three Yearsmilfamln
Infants share their needs and interests, as well as learn from social interactions within their everyday routines and activities. Recognizing children’s early communication signals is key to supporting their future development. Children learn about language and how it is used in their environment even prior to understanding and using words themselves. Join us as we explore the importance of early communication development and the initial stages of language expansion. We will share milestones that identify typical and atypical development along with resources which provide a deeper exploration of this topic.
Objectives:
*Identify at least 12 early developing gestures that are used by young children to share and gather information
*Describe early sound development milestones and identify red flags for atypical speech sound development
*Provide strategies for explaining how vocabulary and word combinations develop to families
*Discuss similarities and differences in communication development for Dual Language Learners
Income Tax Tips for PFMs Working with Military Familiesmilfamln
This is a free webinar hosted by the Personal Finance concentration area of the Military Families Learning Network.
This 90-minute webinar will address updates to tax changes that affect military families and service members. Barbara O’Neill will discuss tax basics and common tax errors during the first half hour of this interactive webinar. In the second half Taylor Spangler of University of Florida Extension will talk about the specific tax issues of concern to military families, as well as provide military specific resources for tax help and support. Carol Kando-Pineda of the Federal Trade Commission will close the session with an update on the resources available through identitytheft.gov. Find more info: https://learn.extension.org/events/3191
The Blended Retirement System Launch: Questions & Answers milfamln
The new Blended Retirement System goes into effect on January 1, 2018. Speaker Andy Corso will discuss Blended Retirement basics, including identifying the requirements for eligibility to opt into the BRS, requirements for automatic enrollment in the BRS, the opt-in period; enrollment and training requirements, including the factors used to determine if a member is opt-in eligible or automatically enrolled in the BRS, how enrollment status impacts benefits under the BRS, which training course(s) a member must complete, hardship extensions, ROTC/Academy rules, and special treatment of Delayed Entry Program enlistees. Mr. Corso will also cover vesting and account options such as basic rules for starting and stopping TSP contributions and receipt of matching and automatic TSP contributions, the vestment process in retirement savings and retirement benefits, breaks in service, re-entry, and change of component each impact benefits; and continuation pay and lump sum options including the requirements for receiving Continuation Pay, the policies and procedures for requesting a lump sum of retired pay, how a discount rate affects the amount of a lump sum, tools to analyze lump sum options, and the advantages and disadvantages of a lump sum.
Beyond the Shape Sorter: Playful Interactions that Promote Strong Academic & ...milfamln
This webinar is hosted by the MFLN Family Development Early Intervention concentration area. For full information and the archived recording, visited https://learn.extension.org/events/2943. Questions about the MFLN? Email us at MilFamLN@gmail.com
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
2. Connecting military family service providers
to research and to each other
through innovative online programming
www.extension.org/militaryfamilies
MFLN Intro
Sign up for webinar email notifications at www.extension.org/62831
2
3. Connecting military family service providers
to research and to each other
through innovative online programming
MFLN Intro
Join the Conversation Online!
3
4. Join the Conversation Online!
MFLN Personal Finance
MFLN Personal Finance @MFLNPF
MFLN Group https://www.linkedin.com/groups/8409844
PF SMS icons
PF SMS icons
Military Families Learning Network
4
5. Dr. Barbara O’Neill
•Financial Resource Management Specialist for
Rutgers Cooperative Extension
•Has been a professional, financial educator and
author for more than 35 years.
•Has written more than 1,500 articles for
academic journals, conference proceedings &
other professional publications.
Today’s Presenters
5
Carol Kando-Pineda
•Counsel in the FTC’s Division of Consumer &
Business Education
•She leads FTC teams to create and distribute
free resources to help people spot, stop and
avoid fraud, manage their money and make wise
buys.
•She began her FTC career as a staff attorney
bringing false advertising claims.
6. Question #1:
Has Anyone (or Family Member)
Been an ID Theft Victim?
• Describe the situation
• Who was the fraudster (if known)?
• How was the case resolved?
6
7. Back in the Day….
What did people do when they
wanted to steal a lot of
money?
7
8. Some Famous Bank Robbers in
U.S. History
• Bonnie and Clyde
• John Dillinger
• Willie Sutton
8
9. Today Most Financial Theft Is Done
Through Identity Theft
• A major white-collar crime:
https://www.fbi.gov/about-us/investigate/white_collar
• Thief may not know victim
• No need to use physical violence
• Less risk of being caught
• Technology and carelessness with data help thieves
9
10. What Is Identity Theft?
Fraud committed via the stealing and unlawful
use of key pieces of personal identification
information (PII)
In other words, when bad things happen to
someone’s good name.
10
14. Signs of Identity Theft
• Items in your credit report that aren’t yours
• Calls or letters from creditors, medical providers, or law
enforcement
• Negative notification at a critical point in life
– Buying a home or car
– Applying for a job
• Zero balances in bank accounts
• When a child starts getting credit offers or debt calls
• Delay in processing an income tax refund
• Other?
14
15. Are YOU at Risk For Identity Theft?
Take this 15-question quiz adapted from
Experian to find out
The lower your score, the better
15
16. 1. You receive offers of pre-approved credit and, if you
decide not to accept them, you do not shred them (10
points)
2. You carry your Social Security card (or other
document with your SS number on it) in your wallet (10
points)
3. You do not have a post office box or a locked,
secured mailbox (5 points)
4. You drop off your outgoing mail at an open, unlocked
box or basket (10 points)
5. You have sensitive personal data posted online (e.g.,
a blog or social media) (10 points) 16
17. 6. You do not shred or tear banking and credit
information when you throw it in the trash (10 points)
7. You provide your Social Security number (SSN)
whenever asked (20 points)
– Add 5 points if you provide it orally without checking
to see who might be listening
8. You are required to use your SSN as an employee
or student ID number (5 points)
9. Your SSN is printed on an employee badge that you
wear (10 points)
10. Your SSN or driver’s license number is printed on
your personal checks (20 points) 17
18. 11. You are listed in a Who’s Who Guide (5 points)
12. You carry an insurance card in your wallet and it
contains your SSN or your spouse’s SSN (20 points)
13. You have not ordered a copy of your credit report
for at least two years (10 points)
14. You write checks with a “regular” pen instead of a
gel pen with ink that cannot be “washed” (5 points)
15. You do not believe that people would root around
in your trash looking for credit or financial information
(10 points)
18
19. What Your Identity Theft Risk Score
Means
• 100+ Points: You are at HIGH RISK. You should
purchase a paper shredder and become more
security aware in document handling.
• 50-100 points: Your odds of being victimized are
about average; higher if you have good credit.
• 0-50 points: Congratulations! You have a high
security IQ. Keep up the good work.
19
20. Question #2:
How Were Your Quiz Scores?
• 0 to 50 points? (Lower Risk)
• 50 to 100 points?
• 100+ points? (High Risk)
20
21. FTC Identity Theft Video #1:
How Identity Theft Happens
http://www.youtube.com/watch?v=-IEBVIh7bzc
21
22. FTC Identity Theft Video #2:
Case Stories of Real People
http://www.youtube.com/watch?v=OoPJImjP1ZQ
22
23. Who are Identity Thieves?
• Narcotics users or sellers
• Organized crime and gangs
• Opportunists
• Desperate people
• Employees (business and government)
• Family members or someone close to you
23
25. Driver’s License Identity Theft
• Your driving privileges could be
suspended or revoked
• You could be arrested during a
routine traffic stop for crimes you did
not commit
• Thieves can open bank accounts,
apply for credit, and cash checks in
your name
25
27. “I owe $20,000 on
four credit cards, my
car was repossessed,
and I turn two next
month”
Criminals often use children’s identities, not for credit
fraud, but to obtain a driver’s license, commit crimes,
collect Social Security, and obtain medical treatment
27
27
29. How Identity Theft Occurs
Identity thieves…
• steal wallets and purses containing your ID
• steal your mail
• rummage through trash (“dumpster diving”)
• pose fraudulently as someone else to get your
information (“pretexting”)
• steal data with skimming devices
29
30. Skimming is stealing credit /debit card numbers with a
device that reads and decodes information from the
magnetic strip on the back of credit or debit cards
Skimming Machines
30
31. More Identity Theft Methods
Identity thieves…
• steal business or personnel records at your
workplace
• find personal info in your home
• use info you put on the Internet
• buy personal info from “inside sources”
• “shoulder surf” at ATMs and telephones
31
32. How Identity Thieves
Use Stolen Information
• Open new credit card accounts
• Establish phone or wireless service
• Open new bank accounts and write bad checks
• Counterfeit checks or debit cards
• Buy cars and take out car loans
• Get fraudulent income tax refunds
• Get medical care in a victim’s name
….and more!
32
33. Reducing Identity Theft Risk
• Destroy credit card applications, receipts, bank, and
billing statements
• Avoid giving your SSN unless it’s absolutely
necessary -- use other identifiers
• Pay attention to billing cycles
• Guard your mail from theft
• Put passwords on smart phones
• Don’t let your credit card out of your sight
33
34. More Ways to Reduce
Identity Theft Risk
• Carry as little identification info as possible
• Limit the number of credit cards you carry
• Don’t give personal identification info on the
phone unless you initiate the call
• Be cautious with personal info in your home
• Check who has access to personal info at work
• Clean out your car
34
35. Still More Ways to
Reduce Identity Theft Risk
• Don’t carry your SS card
• Save ATM and credit card receipts to check
against statements
• Alert family members to dangers of pretexting
• Make sure your credit reports are accurate
• Write checks with uniball gel pens
35
36. Question #3:
Can You Suggest Any Other Identity
Theft Risk Reduction Strategies?
36
38. Look-Alike (Fake) Web Sites
• Spoof e-mail messages sent to “verify” or
“update” account info
• Appears to come from reputable company
– Example: eBay, Best Buy, banks, merchants
• Looks “legitimate”
• Scam is called “phishing”
– Get people to disclose sensitive data
– Data used to commit identity theft
38
39. Red Flags of a Phishing Scam
• E-mails that direct users to a Web site to
“validate” or “update” info
• Threats that accounts will be closed
• Grammatical errors and typos
• Lack of a specific contact person, phone
number, or address
• Words Like “Urgent” and “Immediately”
39
40. Phishing Video: Symantic Guide to
Scary Internet Stuff
http://www.youtube.com/watch?v=K8lWLwuiDwk
40
41. Steps To Avoid Phishing
• Be cautious: African refugees with $10 million,
suspended FDIC insurance, etc.
• Realize that banks never ask for account info,
especially in an e-mail
• Ditto for the IRS
• Don’t click on any links in suspicious e-mails
• Report suspicious e-mails to companies and
spam@uce.gov
• D-E-L-E-T-E 41
42. Phishing Sample #1
After the last annual calculations of your fiscal activity
we have determined that you are eligible to receive a
tax refund of $92.50. Please submit the tax refund
request and allow us 3-6 days in order to process it. A
refund can be delayed for a variety of reasons. For
example submitting invalid records or applying after the
deadline.
To access the form for your tax refund, please click:
http://easy-classifieds.com/Internal/Revenue/service/verify.
Regards, Internal Revenue Service 42
43. Phishing Sample #2
ATTN: An Iraqi made a fixed deposit of 44.5m usd in my bank branch and he
died with his entire family leaving behind no next of kin,am ready to share
70/30 with you if you choose to stand as my deceased client next of kin.
Pls indicate by sending the following below to show your interest. 1.YOUR
NAME 2.YOUR RESIDENT ADDRESS 3.YOUR OCCUPATION 4.YOUR
PHONE NUMBER 5.DATE OF BIRTH 6.COUNTRY OF RESIDENT 7. ANY
FORM OF YOUR IDENTIFICATION OR INTERNATIONAL PASSPORT
Your response with the requested information should be sent to reach me at
my personal email address below: yi.simon19@gmail.com
Yours Truly, Simon Yi
43
44. Phishing Sample #3
Attention: Beneficiary I wish to use this medium and my office to inform you
that your CONTRACT/INHERITANCE Payment of USD10,500,000.00 only
from CENTRAL BANK OF NIGERIA has been RELEASED and APPROVED
for onward transfer to you via ATM CARD which you will use in withdrawing
your funds in any ATM SERVICE MACHINE in any part of the world, but the
maximum you can withdraw in a day is USD$10,000 Only.
The United States government has mandated the CENTRAL BANK OF
NIGERIA, to send you the ATM CARD and PIN NUMBER. Therefore You are
advised to contact the Head of ATM CARD Department of the CENTRAL
BANK OF NIGERIA for further instructions on how to dispatch your ATM
CARD to you.
Name: REV FR MARTINS UZOR DIRECTOR ATM DEPARTMENT OF CBN
Email: lap111@blumail.org
44
45. Spear Phishing
• Instead of casting out thousands of random e-mails,
spear phishers target victims more personally
– May have stolen ID info
– People that attend the same college OR use the
same bank OR work for same employer, etc.
• E-mails to victims are more “personal,” which makes
them dangerous and deceptive
45
47. Rutgers Cooperative Extension
Online Identity Theft Quiz
www.rce.rutgers.edu/money/identitytheft/default.asp
The online quiz provides both
personalized feedback to users and
a database for ongoing research
47
48. 2014 Study Findings
• The higher the score, the more frequently identity theft risk
reduction practices are performed. The mean quiz score
was 73.58 out of 100. Mean scores for individual quiz items
ranged from 2.50 to 4.48 (1= Never, 5 = Always)
• Two areas of weakness were checking one’s credit report
annually (2.65) and securing incoming mail (2.50).
• Almost two-thirds (64.4%) of respondents scored between 70
and 100. The three risk reduction strategies that were
performed most frequently (mean score above 4) were not
divulging one’s SSN, not printing sensitive data on
checks, and practicing “general security consciousness”
48
50. Key Follow-Up Actions
Fraud Alert
A fraud alert notifies lenders
to take precautions to check
your identity before extending
credit
Credit agency has to call you
to confirm ant request it
receives to open an account
in your name
Credit Freeze
A credit freeze is a more
serious step. It denies lenders
and others (except those you
already have a relationship
with) access to your credit
report so they can’t extend
credit
Keeps everyone- including
YOU- from applying for
additional credit
50
51. Identity Theft Resources
• Reporting Identity Theft (FINRA):
http://www.saveandinvest.org/protect-your-money-report-fraud/r
• Identity Theft Affidavit (FTC):
http://www.consumer.ftc.gov/articles/pdf-0094-identity-theft-affid
• Identity Theft IQ Test (Privacy Rights Clearinghouse):
https://www.privacyrights.org/itrc-quiz1.htm
• Identity Theft and Your Social Security Number (Social
Security Administration):
https://www.ssa.gov/pubs/EN-05-10064.pdf
51
53. Tax, medical & child identity theft
and imposter scams
Carol Kando-Pineda
Federal Trade Commission
53
54. Tax Identity Theft
• Using someone else’s Social Security
number to file a fraudulent tax return
(or a deceased taxpayer’s information to get their
refund)
•Claiming someone else’s children as
dependents
54
55. Warning Signs
• Social Security number is lost, stolen, or
compromised
• Unusual delay in getting a refund
• IRS notification:
– duplicate tax return filing
– unreported income
55
56. Immediate Steps for Victims
• Contact the IRS Identity Protection Specialized Unit at
800-908-4490 (8 a.m. to 8 p.m., local time)
• File IRS Identity Theft Affidavit (Form 14039)
• Have valid govt-issued identification
– Social Security card, driver’s license, or passport)
• When resolved, you’ll get an Identity Verification PIN
• Go to: irs.gov/identitytheft
56
57. Step 1: Call the companies where you
know fraud occurred
Call the fraud department
Explain that someone stole your
identity
Immediate Steps for Victims
57
58. Step 2: Place a fraud alert and get your
credit report
www.annualcreditreport.com or 1-877-322-8228.
Immediate Steps for Victims
58
59. Step 3: Report identity theft to the FTC
Complete the online form or call 1-877-438-
4338. Include as many details as possible
Immediate Steps for Victims
59
60. Step 4: File a report with your local police
department
Bring ID with photo, proof of address
Immediate Steps for Victims
60
63. Preparing and Filing Tax Returns
• Know your tax preparer
• Mail tax returns as early in the tax season
as possible
63
64. Preparing and Filing Tax Returns
• Keep them safe:
–Not in outgoing mail
–Secure network to transmit
–Lock up copies
–Shred, shred, shred
64
65. Preparing and Filing Tax Returns
• Minimize personal information in purses
or wallets, or on smartphones
• Do not respond to unsolicited emails and
calls that appear to be from the IRS
65
66. Medical Identity Theft
• Read every “Explanation of Benefits” statement you
get from your health insurer
• Follow up on any item you don’t recognize
• Check your benefits
66
67. Medical Identity Theft
• Contact each doctor… or clinic, hospital, pharmacy,
laboratory, and health plan where the thief may have used
your information
• Get your records. Complete the providers’ records request
forms and pay any fees required to get copies of your records
• Check your state’s health privacy laws. Some state laws make
it easier to get copies of your medical records
67
68. Medical Identity Theft
• Review your medical records, and report any errors to your
health care provider
• Write to your health care provider to report mistakes in your
medical records
• Notify your health insurer
– Send your Identity Theft Report to your health insurer’s
fraud department
– Tell them about any errors in your medical records
68
69. Child Identity Theft
• Follow the usual steps for What To Do Right Away
and What To Do Next with 2 exceptions:
• Ask (phone or email) for a search based only on
your child’s Social Security number (SSN)
– Equifax
1-800-525-6285
– Experian
1-888-397-3742
– TransUnion.com
childidtheft@transunion.com
69
70. Child Identity Theft
• Send each credit reporting agency the Minor’s Status
Declaration [PDF] form
– It’s proof that your child is a minor
– Include a letter asking that all information associated with
your child’s name or SSN to be removed
70
80. Imposter complaints to FTC have skyrocketed
CY2013 126,000
CY2015 350,000
IRS complaints alone are up to 228,000
(from 64,000 in CY 2013)
Imposter Scams
80
81. The Great Pretenders
• The stories change but the ending is
always the same…
–IRS and Other government imposters
–Online romance
–Family emergency
–Business/Tech support
81
82. • Scammers posing as the IRS call and say you owe
taxes
• They might also:
– know all or part of your SSN
– rig caller ID to make it look like call is from DC (202 area
code)
Imposter Scams
82
83. Imposter Scams
• Imposters might:
– threaten arrest or deportation
– demand immediate payment
• pre-paid debit card or wire transfer
– send you bogus IRS emails to further the scheme
83
84. What you need to know
• The IRS will not:
– ask you to pay with prepaid debit cards or wire
transfers
– ask for a credit card number over the phone
– threaten arrest, deportation or loss of your
drivers license
– send you emails without prior contact
84
85. What you need to know
• If the IRS needs to contact you,
– they will first do it by mail
• If you have any doubts,
– call the IRS directly at 800-829-1040
85
89. What is one significant thing you
learned today?
89
90. Key Takeaways
• Identity theft uses “no tech” and high tech methods
• Minimize the amount of information that can be
stolen from you
• You cannot control every identity theft risk factor
• Identity theft is a crime that should be reported
• Act immediately to stop further use of your identity
90
91. Evaluation and Continuing Education
Credits/Certificate of Completion
MFLN Personal Finance is offering 1.5 credit
hours for AFC-credentialed participants through
AFCPE and CPFCs through FinCert.
To receive a certificate of completion, please
complete the evaluation and post-test at:
https://vte.co1.qualtrics.com/SE/?
SID=SV_2aYT6lxWbYLzI2x
Must pass post-test with an 80% or higher to
receive certificate.
91
92. Personal Finance Upcoming Event
Life Insurance Basics for Military Families
• Date: April 5, 2016
• Time: 11 a.m.-12:30 p.m. Eastern
• Location:
https://learn.extension.org/events/2496
For more information on MFLN Personal Finance go to:
https://blogs.extension.org/militaryfamilies/category/per
sonal-finance/
92
Identity theft happens when someone steals your personal identifying information in order to open new charge accounts, order merchandise, or borrow money. Review list of identifying information in the slide.
A person targeted by an identity thief usually doesn’t know he or she has been victimized until the thief fails to pay the bills or repay the loans, and collection agencies begin hounding the person (whose identity has been stolen) for payment of accounts that he/she didn’t even know he had.
Other fraudulent activities that identity thieves perpetrate are:
taking over the victim’s financial accounts,
opening new bank accounts,
applying for Social Security benefits,
renting apartments, and
establishing services with utility and phone companies.
Some people say take my credit, or that I am good at protecting my information, BUT WHAT ABOUT EVERYONE ELSE are they protecting your information.
Unlike the drug trade one transaction one product, with your information it can be sold over and over again
Pill bottle
There is no accurate profile for an identity thief.
This is their job
They love the challenge, adrenaline rush and money
Most people recognize that there is much less risk in identity theft than most common crimes, and a relatively high return on the time invested.
Of those who know how they were victimized, more than half of the criminals were family members, or other close acquaintances.
Despite your best efforts to take precautions with accessibility to your personal information or to keep it private, skilled fraudsters may use a variety of methods -- low- and high-tech -- to gain access to your data and your life.
According to the FTC, this is how identity thieves get your personal information:
They steal wallets and purses containing your identification and credit cards, and ATM cards.
They steal mail from your mailbox, including your bank and credit card statements, bills from retail stores, pre-approved credit offers, telephone calling cards, as well as tax information.
They fill out a “change of address forms” to divert your mail to another location.
They rummage through garbage cans or the refuse of businesses for personal data that has been discarded in a practice known as “dumpster diving.”
They commit fraud to obtain your credit report by posing as a landlord, employer, or someone else who may have a legitimate need for and legal right to -- the information.
Your information is than downloaded to a computer using the device obtaining your name and expiration date.
Also, blank cards can be bought and using a credit card encoder can put your credit card info into the blank card making available for the criminal to use it.
Here are several more ways you can have your identity stolen by fraudsters:
They get your business or personnel records at work. This is usually an “inside job,” done sometimes by a disgruntled employee.
They find personal information in your home -- perhaps they are sharing an apartment with you.
They use personal information you share on the Internet.
Web sites, particularly e-commerce sites, collect a lot of data from visitors. If you buy a book or a CD at a bookstore and pay cash, there will be no record linking you to the purchase. But the books, magazines, music, and movies you buy online are all linked to you by name. Web retailers are collecting a sizable database of information on individual purchases (e.g., who’s buying certain prescription drugs or books).
E-commerce sites routinely share your information, or sell it. If an e-commerce site you bought from goes bankrupt, it could be legally required to sell your data to the highest bidder as a company asset. Also, sites routinely sell or exchange your personal information. Privacy advocates are seeking federal legislation requiring Web sites to let users “opt out” of sharing data, as has recently happened in financial services.
Sometimes identity thieves buy your personal information from “inside” sources. For example, an identity thief may pay a store employee for information about you that appears on an application for goods, services or credit.
Identity thieves also do some of their best work just by looking over your shoulder (a.k.a., “shoulder surfing”) as you dial your telephone calling card number or punch in your account number or PIN at an automated teller machine (ATM). To avoid having account data stolen in this manner, shield the key pads with your hand whenever you use a public phone or ATM.
Once identity thieves have secured a piece of your personal identification, it is relatively easy to use it to wreak havoc on your life. They may use it for a number of illegal activities such as:
Calling your credit card issuer and pretending to be you. They then ask to change the mailing address on your credit card account. Next, they run up charges on your account. Because your bills are being sent to the new address, it make take some time before you realize there’s a problem.
Opening a new credit card account using your name, date of birth, and Social Security number. When they use the credit card and don’t pay the bills, the account now in default is reported on your credit report.
Establishing phone, cable, or wireless service in your name. Again, these bills go unpaid until service providers contact the victim looking for payment.
Opening a bank checking account in your name and writing bad checks on it.
Filing for bankruptcy under your name to avoid paying debts they’ve run up under your name, or to avoid eviction from their apartment.
Counterfeiting checks or debit cards, and draining your bank account.
Getting access to a PIN number and draining your retirement account.
Buying cars by taking out auto loans in your name.
Buying other big ticket items and charging them on store accounts, then never making a payment.
The Federal Trade Commission acknowledges that, while you probably can’t prevent identity theft entirely, you can lessen your risk. By managing your personal information wisely, cautiously, and with an awareness of the dangers, you can help protect against identity theft.
Here are the best ways to minimize your risk:
Store items with personal information in a safe place. To foil an identity thief who may pick through your trash to retrieve personal information, tear up charge receipts, copies of credit applications, insurance forms, physicians’ statements, and bank checks and statements that you are discarding, as well as expired charge cards and credit offers you get in the mail. Better still, purchase an inexpensive shredder.
Give your Social Security number (SSN) only when absolutely necessary. Ask to use other types of identifiers when possible.
Pay attention to your billing cycles. Call your creditors if your bills don’t arrive on time. A missing credit card bill could mean a fraudster has taken over your credit card account and changed your billing address to cover his tracks.
Guard your mail from theft. Deposit outgoing mail in post office collection boxes or at your local post office. Don’t leave mail unattended at your residence mail box to be picked up. Promptly remove mail from your mailbox after is has been delivered. If you’re planning to be away from home and can’t pick up your mail, call your local post office to request a vacation hold. The Postal Service will hold your mail at your local post office until you can pick it up.
Ask to establish passwords on your credit card, bank and phone accounts. Avoid using easily available information like your mother’s maiden name, your birth date or your spouse’s, the last four digits of your SSN or your phone number, or a series of consecutive numbers, like 1, 2, 3, 4.
Here are some additional identity theft precautions:
Carry as little identification information and as few credit cards on your person as possible. Carry only what you’ll actually need and leave the rest at home.
Do not give out personal information on the phone, through the mail, or over the Internet unless you have initiated the contact or know who you’re dealing with. Identity thieves often pose as representatives of banks, Internet service providers, and even government agencies, to persuade you to reveal your Social Security number, financial account number, and other identifying information. Legitimate organizations with whom you do business already have the information they need and will not ask you for it.
Be cautious about where you leave personal information in your home, especially if you share an apartment with roommates, employ housekeeping or outside help, or are having service work done in your home.
Be aware of who has access to your personal information at work and verify that the records are kept in a secure location. This is particularly important if you are in a position where you may have dealings with disgruntled employees.
Here are several more ways to protect your personal information:
Don’t carry your SSN card in your wallet; leave it in a secure place at home.
Save your ATM and credit card receipts to check against your bank and credit statements. Review them carefully and promptly.
Alert family members to the dangers of pretexting. Tell them that only you, or someone you authorize, should provide personal information to others.
Before you reveal any personally identifying information, find out how it will be used and whether it will be shared with others. Ask for their specific policies about sharing information. Can you choose to have it kept confidential?
Order a copy of your credit report from each of the three major credit reporting agencies every year. Make sure that it’s accurate and includes only those accounts and credit transactions that you’ve authorized. One credit report per year is free from each of the major credit bureaus for New Jersey residents.
A credit file request form is available on the Rutgers Cooperative Extension MONEY 2000 Web site at www.rce.rutgers.edu/money2000.
How does tax IDT happen?
The usual ways -- Lost or stolen wallets, Medicare cards, smartphones
Theft
family, friends, visitors, advisors
dumpster diving
mail or tax returns
Unsolicited calls asking for personal information
Buying information from corrupt insiders or volunteers at:
banks, debt collectors
hospitals, clinics, medical offices, nursing homes
prisons
schools, government offices
tax preparation services
STEP 1 – Call the Companies
- Ask them to close or freeze the accounts. Then, no one can add new charges unless you agree.
- Change logins, passwords and PINS for your accounts.
You might have to contact them again once you have your Identity Theft Report
STEP 2 – Fraud Alert
You’ll get a letter from each credit bureau -- confirms that they placed a fraud alert on your file.
Get your free credit report right away.
Go to annualcreditreport.com or call 1-877-322-8228
Did you already order your free annual reports this year?
you can pay to get your report immediately.
Or follow the instructions in each fraud alert confirmation letter to get a free report, but it might take longer.
STEP 3 – Report to FTC
create an account, we'll walk you through each recovery step, update your plan as needed, track your progress, and pre-fill forms and letters for you.
If you don't create an account, you must print and save your Identity Theft Affidavit and recovery plan right away. Once you leave the page, you won't be able to access or update them.
STEP 4 – Police
Go to your local police office with:
- a copy of your FTC Identity Theft Affidavit
a government-issued ID with a photo
- proof of your address (mortgage statement, rental agreement, or utilities bill)
any other proof you have of the theft (bills, IRS notices, etc.)
Ask for a copy of the police report (you’ll need this for other steps)
Trouble getting the police report – try bringing this memo with you:
FTC's Memo to Law Enforcement [PDF]
The Identity Theft Report guarantees certain rights – like getting fraudulent info off your credit report, get the extended fraud alert
Do not put tax returns in outgoing mail; mail tax returns directly from post office
If filing electronically, use a secure network and encrypt
Store copies of your returns in a secure place
Shred drafts, calculation sheets, and extra copies
At least once a year, ask the health insurers you’ve been involved with for a list of the benefits they paid in your name.
Did your provider refuse to give you copies of the records to protect the identity thief’s privacy rights?
You can appeal.
Contact
the person listed in your provider’s Notice of Privacy Practices,
the patient representative, or
the ombudsman.
Explain the situation and ask for your file.
If the provider refuses to provide your records within 30 days of your written request,
- you may complain to the U.S. Department of Health and Human Services Office for Civil Rights.
Include a copy of the medical record showing the mistake.
Explain why this is a mistake, and how to correct it.
Include a copy of your Identity Theft Report.
Send the letter by certified mail, and ask for a return receipt.
health care provider should respond to your letter within 30 days. Ask the provider to:
fix the mistake and
notify other health care providers who may have the same mistake in their records.
medical billing errors on your credit report,
- notify all 3 credit reporting companies.
Write down who you contacted and when.
- Keep copies of any letters you send.
Largest telephone scam in TIGTA’s history
800,000+ contacts across the US
Over $14M paid to scammers
Top 5 states* affected (by dollar loss):
- California - Florida
- New York - Virginia
- Connecticut
Mention – private debt collection issue
At 10 minutes before the published end time, presenter or facilitator invite participants to answer this question in text. Wait at least 60 seconds for replies.
Thank participants for attending and for responding and ask a Follow up question verbally: “What will you DO with the information you learned?”
Discuss responses, then ask of all participants “What else do you have questions about regarding today’s topic?” Wait a minimum of 60 seconds.
Answer questions and provide additional resources as appropriate.
To minimize the amount of information a thief can steal, do not carry extra credit cards, your Social Security card, a birth certificate or a passport in your wallet or purse, except when needed.
To reduce the amount of personal information that is “out there,” consider removing your name from the marketing lists of the three credit reporting bureaus. This will limit the number of pre-approved offers of credit that your receive.
* Sign up for the Direct marketing Association’s Mail Preference Service and the Telephone
Preference Service. Your name is added to computerized name deletion lists used by nationwide
marketers.
* Have your name and address removed from the phone book and reverse directories (i.e., directories that list people by their addresses rather than their names).
* Don’t put your Social Security number on checks.
Ask your financial institution to add extra security protection to your account. Most will allow you to use an additional code (a number or word) when accessing our account.
If you become a victim of identity theft, report the crime to the police immediately. Give them as much documented evidence as possible, and get a copy of the police report. Credit card issuers, banks, and the insurance company may require you to show the report in order to verify the crime. Then report your case to the federal authorities. The Federal Trade Commission has a special identity theft hotline to provide information to consumers and take complaints from victims by phone (1-877-438-4338) or online (www.consumer.gov/idtheft).
As soon as possible, call the fraud units of the three major credit bureaus. Ask to have a fraud alert placed on your credit report -- this will let companies know that someone else has been using your information and that you wish to be informed by phone before any new credit is granted. Close the accounts and get replacement cards with new account numbers.