HomeMy WebLinkAbout2019 ,
If- o�lu�s of al s�ca rn. - - - --- =. -
�'� r,�_ _ ... �If�you-spot a scarri,.�report7it�at�- -, -��
- -_- - _-
' Your reports help
things you
the FTC and other -- -
T h e n t,ejGh t'h e :FTC law enforcement can do to
investigate scams
and bring crooks � � -
_ to justice.
-ftc.g; lv/cgM.p aint-, R&U
1-877!FT:C-HELP
' (1-877-382=43�5.7)�
r
FEDERAL TRADE'COMMISSION
August 2018
Spot imposters. Don't pay upfront for a promise. Hang up on robocalls.
Scammers often pretend 4Someone might ask you to pay 71f you answer the phone and
to be someone you trust, like a in advance for things like debt relief, hear a recorded sales pitch, hang up
government official, a family member, credit and loan offers, mortgage and report it to the FTC. These calls
a charity, or a company you do assistance, or a job. They might are illegal, and often the products are
business with. Don't send money even say you've won a prize, but bogus. Don't press 1 to speak to a
or give out personal information in first you have to pay taxes or fees. If person or to be taken off the list. That
response to an unexpected request you do, they will probably take the could lead to more calls.
-whether it comes as a text, a money and disappear.
phone call or an email. Learn where to get real Be skeptical about free trial offers.
help with these issues at Some companies use free trials to
Do online searches. consumerftc.gov. sign you up for products and bill you
Type a company or product every month until you cancel. Before
name into your favorite search Consider how you pay. you agree to a free trial, research the
engine with words like "review," 5 Credit cards have significant company and read the cancellation
"complaint" or "scam." fraud protection built in, but some policy. And always review your
Or search for a phrase 77 payment methods don't. Wiring money monthly statements for charges
that describes your :,' f` . R through services like Western Union you don't recognize.
situation, like "IRS call." or MoneyGram is risky because it's
You can even search , _,'; nearly impossible to get your money Don't deposit a check and wire
for phone numbers to back. That's also true for reloadable money back.
see if other people have -=f' cards (like MoneyPak or Reloadit) By law, banks must make funds from
reported them as scams. ,,�-, and gift cards (like iTunes or Google deposited checks available within
Play). Government offices and honest days, but uncovering a fake check
Don't believe your companies won't require you to use can take weeks. If a check you
caller ID. Technology makes these payment methods. deposit turns out to be a fake, you're
it easy for scammers to fake caller responsible for repaying the bank.
ID information, so the name and Talk to someone.
number you see aren't always real. If Before you give up your moneySign up for free scam alerts
someone calls asking for money or or personal information, talk to ' from the FTC at ftc.gov/scams.
personal information, hang up. If you someone you trust. Con artists want Get the latest tips and advice about
think the caller might be telling the you to make decisions in a hurry.-They scams sent right to your inbox,
truth, call back to a number you know might even threaten you. Slow down,
is genuine. check out the story, do an online
search, consult an expert--'or just-tell - -
a friend.
- r=;— -
1
I
r
k4rwe "a Identity Theft
HEARD
b
Here's how it works;
Someone gets your personal information and runs up bills in your
name. They might use your Social Security or Medicare number, your
credit card, or your medical insurance — along with your good name.
How would you know? You could g-et bills for things you didn't buy or
services you didn't get. Your bank account might have withdrawals you
didn't make. You might not get bills you expect. Or, you could check
your credit report and find accounts you never knew about.
Here's what you can o:
�e Protect your information. Put yourself in another person's
shoes. Where would they find your credit card or Social Security
number? Protect your personal information by shredding
documents before you throw them out, by giving your Social
Security number only when you must, and by using strong
passwords online.
Read your monthly statements and check your credit. When you
get your account statements and explanations of benefits, read
them for accuracy. You should recognize what's there. Once a
year, get your credit report for free from Ann ualCreditReport.com
or 1-877-322-8228. The law entitles you to one free report each
year from each credit reporting company. If you see something
you don't recognize, you will be able to deal with it.
f $ 4
Grandkid Scams
HEARD .j
56L:—.9j
Here's how they work:
You get a call: "Grandma, I need money for bail." Or money for a medical bill.
Or some other kind of trouble. The caller says it's urgent — and tells you to
keep it a secret.
But is the caller who you think it is? Scammers are good at pretending to be
someone they're not. They can be convincing: sometimes using information
from social networking sites, or hacking into your loved one's email account,
to make it seem more real. And they'll pressure you to send money before
you have time to think.
Here's what you can do:
�w Stop. Check it out. Look up your grandkid's phone number yourself, or
call another family member.
® Pass this information on to a friend. You may not have gotten one of
these calls, but chances are you know someone who will get one — if
they haven't already.
i'�gni;_Yid,•
I C
"You 've Won" Scams
. . •
Here's how they work:
You get a card, a call, or an email telling you that you won! Maybe it's a trip or
a prize, a lottery or a sweepstakes. The person calling is so excited and can't
wait for you to get your winnings.
But here's what happens next: they tell you there's a fee, some taxes, or
customs duties to pay. And then they ask for your credit card number or
bank account information, or they ask you to wire money.
Either way, you lose money instead of winning it. You don't ever get that big
prize. Instead, you get more requests for money, and more promises that you
won big.
Here's what you can do-O
Ido Keep your money — and your information — to yourself. Never share
your financial information with someone who contacts you and claims
to need it. And never wire money to anyone who asks you to.
�® Pass this information on to a friend. You probably throw away these
kinds of scams or hang up when you get these calls. But you probably
know someone who could use a friendly reminder.
t
r
r
I
Tech Support Scams
HEARD
. . .
Here's how they work:
You get a call from someone who says he's a computer technician. He might
say he's from a well-known company like Microsoft, or maybe your internet
service provider. He tells you there are viruses or other malware on your
computer. He says you'll have to give him remote access to your computer
or buy new software to fix it.
But is the caller who he says he is? Judging by the complaints to the Federal
Trade Commission, no. These scammers might want to sell you useless
services, steal your credit card number, or get access to your computer to
install malware, which could then let them see everything on your computer.
Here's what you can dQ
Hang up. Never give control of your computer or your credit card
information to someone who calls you out of the blue.
�Q Pass this information on to a friend. You might know these calls are
fakes, but chances are you know someone who doesn't.
i
-rr
l
_ IRS I Scams
HEARDabout— j"d
56L: --.A
Here's how they or :
You get a call from someone who says she's from the IRS. She says that you
owe back taxes. She threatens to sue you, arrest or deport you, or revoke
your license if you don't pay right away. She tells you to put money on a
prepaid debit card and give her the card numbers.
The caller may know some of your Social Security number. And your caller ID
might show a Washington, DC area code. But is it really the IRS calling?
No. The real IRS won't ask you to pay with prepaid debit cards or wire
transfers. They also won't ask for a credit card over the phone. And when the
IRS first contacts you about unpaid taxes, they do it by mail, not by phone.
And caller IDs can be faked.
Here's what you can do.
�4 Stop. Don't wire money or pay with a prepaid debit card. Once you
send it, the money is gone. If you have tax questions, go to irs.gov or
call the IRS at 800-829-1040.
4 Pass this information on to a friend. You may not have gotten one of
these calls, but the chances are you know someone who has.
r
Health Care Scams
Here's how they ®Irk:
You see an ad on TV, telling you about a new law that requires you to get
a new health care card. Maybe you get a call offering you big discounts on
health insurance. Or maybe someone says they're from the government, and
she needs your Medicare number to issue you a new card.
Scammers follow the headlines. When it's Medicare open season, or when
health care is in the news, they go to work with a new script. Their goal? To
get your Social Security number, financial information, or insurance number.
So take a minute to think before you talk: Do you really have to get a
new health care card? Is that discounted insurance a good deal? Is that
"government official" really from the government? The answer to all three is
almost always: No.
Hare's what you can doo
�o Stop. Check it out. Before you share your information, call Medicare
(1-800-MEDICARE), do some research, and check with someone you
trust. What's the real story?
�o Pass this information on to a friend. You probably saw through
the requests. But chances are you know someone who could use a
friendly reminder.
i
PayingToo Much
. • •
Here's how ft works-0
Everyone pays all kinds of bills. Some are higher than you think they should
be. Sometimes, unexpected charges appear on your bill — or sometimes, you
might see a fee for a service you don't recall ordering. Are you paying more
than you should?
You are your own best advocate. How often does a company figure out that
you've overpaid — and refund your money? It could happen — but you're
more likely to get money back if you spot the error and point it out.
It means keeping track of what you normally pay, and what the charges are
for. You also can ask for a better deal: call to see if there's a promotion you
qualify for and how long it will last, or if they can lower your interest rate.
They might say no — but if you don't ask, you don't get.
HeTe's what you can do-O
�o Read every statement, every time. Does something look wrong or
unfamiliar? Call the company and ask. If you don't like the response
you get, ask for a supervisor. And keep written records of your calls.
�o Pass this information on to a friend. Not paying more than you need
to might come easily to you. But you probably know someone who
could use some friendly encouragement.
- Charity Fraud
Here's how Oft works:
Someone contacts you asking for a donation to their charity. It sounds like a
group you've heard of, it seems real, and you want to help.
How can you tell what charity is legitimate and what's a scam? Scammers
want your money quickly. Charity scammers often pressure you to donate
right away. They might ask for cash, and might even offer to send a courier
or ask you to wire money. Scammers often refuse to send you information
about the charity, give you details, or tell you how the money will be used.
They might even thank you for a pledge you don't remember making.
Haas's what you can do.-
Take
omTake your time. Tell callers to send you information by mail. For
requests you get in the mail, do your research. Is it a real group? What
percentage of your donation goes to the charity? Is your donation tax-
deductible? How do they want you to pay? Rule out anyone who asks
you to send cash or wire money. Chances are, that's a scam.
�® Pass this information on to a friend. It's likely that nearly everyone you
know gets charity solicitations. This information could help someone
else spot a possible scam.
1
-I
Online Dating Scams
HEARD
. • •
Here's how they work:
You meet someone special on a dating website. Soon he wants to move off
the dating site to email or phone calls. He tells you he loves you, but he lives
far away — maybe for business, or because he's in the military.
Then he asks for money. He might say it's for a plane ticket to visit you. Or
emergency surgery. Or something else urgent.
Scammers, both male and female, make fake dating profiles, sometimes
using photos of other people — even stolen pictures of real military
personnel. They build relationships — some even fake wedding plans —
before they disappear with your money.
Here's what you can do:
1. Stop. Don't send money. Never wire money, put money on a prepaid
debit card, or send cash to an online love interest. You won't get it
back.
Pass this information on to a friend. You may not have gotten one of
these calls, but chances are you know someone who will get one — if
they haven't already.
.-• - - - - - - -- ., _. ; - -• , _-_ -- - :-- _ --. - .- _- -- - -. _ - _ -�,,"`"' -- _- _ ice} s��,��.:7 ,�.,
Want to know more? Sign up for
vie]ilk 0
scam alerts at ftc.gov/subscribe.
r`y
Please Report Scams
If you spot a scam, please report it to the Federal '
Trade Commission.
Call the FTC at 1-877-FTC-HELP
(1-877-382-4357) or TTY 1-866-653-4261
Go online: ftc.gov/complaint
Your complaint can help protect other people.
By filing a complaint, you can help the FTC's
I
investigators identify the imposters and stop them
before they can get someone's hard-earned money.
It really makes a difference.
Federal"Trade Commi"scion I ftc;gov/PaslfiQn
NEW YORK STATE
SE .CURITY
M' 14
A,
. Helping you to prevent Identity Theft
Identity Theft occurs when someone uses your name or personal information to open an
unauthorized new account, make unauthorized changes, secure services or benefits or borrow money.
This crime continues to be the most common consumer fraud complaint,affecting approximately 8 to 15
million Americans each year. It is of particular concern in New York,which has one of the sixth highest
per-capita rates of Identity Theft in the country. New Yorkers have a tool to use against Identity
Theft...The New York State Security Freeze Law.
Security Freeze Law
As of November 1, 2006, New York residents can initiate a Security Freeze on their credit bureau
information.The new Security Freeze Law is designed to help prevent Identity Theft and should be
considered a major weapon in the war against identity thieves.
How a Security Freeze Works
At your request, a Security Freeze is placed on your credit file,which is sometimes called your"credit
history." The Security Freeze prevents most potential creditors and others from accessing your credit
report for review prior to granting a new line of credit. With a Security Freeze in place,the lender will
not be able to get a copy of your credit history and, as a result, most lenders will refuse to grant credit or
loans. The Security Freeze will, in most cases,prevent someone from opening a new account or
borrowing money using your name or personal information because your credit file cannot be accessed.
There is no charge for a New York State resident to place a Security Freeze on their credit report if you
are the victim of Identity Theft or if you are making this request for the first time. For second or
subsequent requests for a Security Freeze,you may be charged up to$5.00 for that service.There may
also be a$5.00 fee to temporarily lift or remove a Security Freeze. There is also a$5.00 for a replacement
PIN (Personal Identification Number) or Password.
C-71 �<<' �Securi Freeze�ma •be`' articularh 'beneficiaTfor consumers who = _ �_ -;', �
KA'A li'een th'e victim of Identi ';Theft+domestic violence:stalkin or - '
wlio lieTiee,ther„pzersorial information lias,be'en compromised:
v Benefits and Risks of a Security Freeze
Not everyone will want to place a Security Freeze on their credit file. With a Security Freeze in place,you
won't be able to borrow money, obtain instant credit or get a new credit card until you temporarily lift or
permanently remove the Security Freeze. The same is true of new insurance coverage and background
checks that might be required by a new employer. Additionally, it can impede renting an apartment or
other housing opportunities.,
How to obtain a Security Freeze
To obtain a Security Freeze, contact each of the three (3) major credit reporting agencies (CRA): Trans
Union, Experian and Equifax. The Security Freeze should be in place five (5) days after the reporting
agency receives your request. Within ten (10) days,the agencies must mail-you-a-letter-conta-i-rring your
PIN or Password and a confirmation that the Security Freeze is in place. Additionally, each CRA is -
required to have a secure website and a dedicated toll free number to place a Security Freeze. Requests
for a Security Freeze must contain personal information that will be specified by each credit bureau. This
information may include your name, addresses during past five years and Social Security number. Credit
bureaus need this information to verify your identity and process your request. If you choose to use the
mail and write a letter,the Consumer Protection Board (CPB) website (nysconsumer.gov) contains
information on the requirements of each credit bureau, along with sample letters that can be used to
initiate your request for a Security Freeze. If you are victim of Identity Theft you will need to provide a
valid copy of a police report or a Federal Trade Commission Identity Theft Affidavit. Each letter should
be sent certified mail with confirmation of delivery.
How to Remove or Lift the Security Freeze
Each consumer credit reporting bureau has its own instructions for temporarily lifting or removing the
Security Freeze. Generally the information required would include the PIN or Password issued when
placing the freeze with proper identification. The name of the party the information should be released
to or the period of time the information should be available to requestors. REMEMBER! If you are
applying for credit,insurance coverage or a new job and a check of your credit history is required they
will not be able to do so unless you lift the Security Freeze.
Requests for a temporary or permanent removal of the Security Freeze must be accompanied by proper
identification and payment of applicable fee. CRA's must lift the freeze within 15 minutes of a request
received by telephone orsecure electronic mechanism such as via the Internet.
r
FREQUENTLY ASKED QUESTIONS
Can I order my own credit report if my credit file is frozen?
Yes. To obtain a free copy of your credit report (a free copy is available from each of the three (3) credit
bureaus every twelve (12) months).See the Resource page for information on obtaining the free annual
credit report.
Can some companies still review my credit history even with a Security Freeze in place?
Yes. Some private companies,government agencies and courts can still access your credit files with a
Security Freeze in place.These include companies with which you're currently doing business, companies
to which you owe money and collection agencies. Credit card companies and other lenders can also
access this information in order to offer you credit cards and related services. You have the option of
"opting out" for five (S) years or permanently. "Opting out" only affects credit offers that use the
reporting agencies for information.
Will a Security Freeze lower my credit score?
No.
Does one Security Freeze cover everyone in my household?
No.All adults have to freeze their separate credit files,via separate letters requesting the freeze, in order
to obtain the benefit of a Security Freeze.
What is the difference between a Fraud Alert and a Security Freeze?
A Fraud Alert is indicated on the credit report that the credit issuer receives when checking and
reviewing a consumer's credit rating. It tells the credit issuer that there may be fraud involved on that
account. It does not limit or prevent access to your credit file. An initial Fraud Alert can make it harder
for an identity thief to open more accounts in your name,but does not entirely prevent it. A Fraud Alert
is limited to 90 days.You can renew it after 90 days. A Security Freeze means that your credit file cannot
v be accessed by potential creditor, insurance companies or employers doing background checks-unless
you give your personal consent or authorization. A Security Freeze remains in place until you authorize it
to be lifted or removed.1
Where can I obtain more information regarding Identity Theft?
The NYS Consumer Protection Board has prepared information on how to avoid becoming a victim of
Identity Theft and what to do if your identity is stolen. That information is available at
www.nysconsumer.gov under"Publications". For your convenience we have enclosed sample security
freeze letters specific to each of the three (3) credit reporting agencies. They are located after the
Resource Page.
For additional information,visit www.suffolkpd.org
f
Y RESOURCE PAGE
NOTE: Always use the addresses,phone numbers and website addresses on these pages.
1. To receive your annual credit report once each year:
Click on the website www.annualcreditreport.com and fill out a request.
Call: 1-877-322-8228 TDD: 1-877-730-4104
Print out annual credit report request form at www.ftc.gov/credit and mail to
Annual Credit Report Request Service, PO Box 105281,Atlanta, GA 30348-5281
If you discover an error in a report,write to the reporting company to explain the situation.
2. Credit Reporting Agencies
Experian Equifax TranUnion
www.experian.com www.equifax.com www.transunion.com
PO Box 9701 PO Box 740241 Fraud Victim Assistance Dept.
Allen,TX 75013-0949 Atlanta, GA 30374-0241 PO Box 2000
Chester, PA 19016
To place a Fraud Alert by To place a Fraud Alert by To place a Fraud Alert by
phone: phone: phone:
1-888-397-3742 1-800-525-6285 1-800-680-7289
To place a Security Freeze To place a Security Freeze by To place a Security Freeze
by phone: phone: by phone:
1-888-397-3742 option 2, 1-800-349-9960 1-888-909-8872
option 2
Call the NYS consumer Protection Board for all consumer-related assistance or to file a complaint
NYS Consumer Protection Board
Advocating for and Empowering NY Consumers
1-800-697-1220
www.nysconsumer.gov
A product of the NYS Protection Board's Identity Theft
Prevention and Mitigation Program
Y. Security Freeze request to Equifax,Inc.
NOTE: If this is your first time placing a security freeze,there is no fee. Upon removal or temporary
lifting of the Security Freeze, a fee of$5.00 will be charged to restore the Security Freeze.
There is an exception if you are a victim of Identity Theft.You will not be charged this fee if you submit a
copy of a police report or a signed copy of a Federal Trade Commission ID Theft victim affidavit.
You must send this letter to Equifax by either certified mail or overnight mail through the US Postal
Service to: Equifax Security Freeze
PO Box 105788
Atlanta, GA 30348
Date:
Dear Equifax:
I would like to place a Security Freeze on my credit file.
My full.name (with middle initial and generation,such as Jr. or Sr.) is:
My complete current address is:
My date of birth is: ,
My Social Security number is:
I am also enclosing a copy of a document(such as utility bill) for verification of my current mailing
address.
Yours truly,
Security Freeze request to Experian,Inc J
Information required by Experian
Make sure that each copy of your personal information is legible (enlarge if necessary) and it displays
your name and current mailing address, as well as the date of when the document was issued. The
date(s) on these documents must be recent.
• Experian will NOT accept credit card statements,voided checks,lease agreements, magazine
subscriptions or postal service forwarding orders as proof.
• To protect your personal information, Experian does not return correspondence mailed to them.
Do not send original documents. Send Experian copies of necessary documentation.
• If this is your first time placing a security freeze,there is no fee. Upon removal or temporary
lifting of the Security Freeze, a fee of$5.00 will be charged to restore the Security Freeze.
• There is an exception if you are a victim of Identity Theft.You will not be charged this fee if you
submit a copy of a police report or a signed copy of a Federal Trade Commission ID Theft victim
affidavit.
You must send this letter to Experian by either certified mail or overnight mail through the US Postal
service to: Experian Security Freeze
PO Box 9554
Allen,TX 75013
Date:
Dear Experian:
I would like to place a Security Freeze on my credit file.
My full name(with middle initial and generation, such as Jr, or Sr.) is:
My Social Security number is:
My date of birth is:
My complete current address is:
Below is a list of my addresses for the past two years: I am also enclosing one copy of(a government
issued identification card,such as driver's license,state ID card, military ID card, etc.)
To verify my current address, I am also enclosing one copy of(utility bill, bank or insurance statement,
etc.)
Enclosed are copies of for proof that I am a victim of Identity Theft or a victim of
domestic abuse.
Yours truly,
Security Freeze request to TransUnion,Inc.
NOTE: If this is your first time placing a security freeze,there is no fee. Upon removal or temporary
lifting of the Security Freeze, a fee of$5.00 will be charged to restore the Security Freeze.
There is an exception if you are a victim of Identity Theft.You will not be charged this fee if you submit a
copy of a police report or a signed copy of a Federal Trade Commission ID Theft victim affidavit.
TransUnion reserves the right to ask for further proof of identity should the information provided is not
complete or if security warrants it. Additional information required to verify may include:
The following can be used as proof of address and Social Security number: copies of current driver's
license,bank or credit union statement, Medicaid or Medicare card,paycheck stub, state ID card,W2
form.
TransUnion will accept letters by regular mail, certified mail or overnight mail from the US Postal Service
at this address: TransUnion Consumer Solutions
PO Box 2000
Chester, PA 19016-2000
Date:
Dear TransUnion:
-I would-like to place a Security Freeze-on-my-credit file: -
My full name (with middle initial and generation,such as Jr. or Sr.) is:
My complete current address is:
My previous address is (if you have other addresses in the previous five(5)years):
My home phone number is:
My Social Security number is:
My date of birth is:
My driver's license number is:
Yours truly,
SUFFOLK COUNTY FFIll
POLICE DEPARTMENT
IDENTITY THEFT UNIT ry
F-111 CD
-IV-Ej VT-ITY �I-E--s
L BTS T PR A C TICTS
U
Ll
liffr--T
Ll
Fl,
LEO
L ULU
TABLE OF CONTENTS
I. What is Identity Theft?
A. How Are Identities Compromised?
B. Prevention Tips
C. Your Computer and Identity Theft
II. What To Do if You Become a Victim of Identity Theft
A. The Security Freeze
B. The Identity Theft Affidavit
III. Sample Freeze Letters
IV. Sample Dispute Letters
V. The FACTA Law and a Summary of Your Rights
VI. Resource Pages
Suffolk County Police 'Department
Identity Theft Chit
30 Yaphank Avenue
Yaphank, NY 11980
Phone: 631-852-6821
E-mail: Identity.Theft@suffolkcountyny.gov
As a part of its community outreach program, the Identity
Theft Unit provides - speakers for presentations to the
public about-the dangers of identity crimes and tips on how
to avoid becoming a victim. If your organization is
interested in hosting such an event, please contact the
section'at 631-852-6821.
WHAT IS IDENTITY THEFT?
Identity theft occurs when someone uses your:
❖ Name ❖ Social Security Number
❖ Date of Birth ❖ Maiden Name
❖ Other personal identifying information
to commit a crime or a fraud.
Most folks only consider identity crime as being financial, but a n imposter can ju st as easily
identify himself as you when he is arrested for non-financial crimes, such as driving while under
the influence. Some criminals may also use your personal identifying information to o btain
passports or drivers licenses in your name, an aspect that may have national security aspects if
the criminal(s)are connected to terrorism.
WHAT THEY DO WITH YOUR IDENTITY
❖ Open New Accounts ❖ Obtain loans
o bank accounts o home mortgages
o credit/debit card accounts o equity lines
o cell phone and utility o auto financing
❖ Take over your existing accounts. ❖ Counterfeit your checks.
❖ Clone your credit and debit cards ❖ Commit crimes in your name
PREVENTION
An important aspect to remember about the theft of identities, while large scale data breaches of
merchant and financial institution computer databases is a reality, an im portant aspect to
remember about the theft of identities is that, in most cases, the identity thief employs more
traditional, low-tech methods to steal your information. This kn owledge places the ability to
prevent identity theft in the hands of the potential victim, who can make informed decisions about
the security of his or her personal information. So it is very impo rtant that you know how identity
thieves can obtain your personal identifying information.
HOW ARE IDENTITIES COMPROMISED?
❖ Victim assisted: The victim divulges personal information to a nyone who asks for it wh ether
or not the information is required even during cash transactions, or through scams designed
to encourage the victim to give out personal data.
o Pretext phone calls
■ These are phone calls made by criminals meant to trick the intended victim into
divulging personal information.
■ Often the caller leads the victim to believe he represents a lottery or a fina ncial
institution and needs your personal information so you can claim a prize or to
update personal account data at your bank.
o Store clerks/office receptionists
■ Often request personal i nformation from a cu stomer or a pati ent when not
required to deliver the service or merchandise.
❖ Theft or loss of:
o Wallets and pocketbooks
o Mail
o Trash containing personal information
❖ Burglary of residence or business where personal information may be stored
- 1 -
❖ Skimming
o An identity thief can obtain a victim's credit card number by just copying down a victim's
credit card number or more advanced methods such as using a small electronic device
(skimmer) to swipe and store hundreds of victims' credit card numbers. Common
scenarios for skimming are restaurants or bars where the skimmer has possession of the
victim's credit card out of their immediate view.
Skimming may also involve place a device over the card slot of an ATM (A utomated
Teller Machine), which reads the magnetic strip as the user unknowingly passes their
card through it. A pinhole camera or fake keypad may be utilized to record the user's PIN
at the same time.
❖ Internet
o "Phishing"
■ "Phishing" is an e-mail message that appears to be sent by a legitimate institution
designed to trick con sumers into divulging personal information —such as their
credit or debit account numbers, checking account information, Social Security
numbers or banking account passwords — by directing the recipient to a fake
website or prompting a reply e-mail.
o Unsecured wireless networks
■ As more people install wireless routers on their home networks they fail to utilize
the security features on their wireless routers or firewall software. Criminal's can
gain access to a victims unsecured internet connection and use it to commit
crime and frauds.
o Unsecured laptops using "hotspots"
■ Criminals can gain access to your laptop while you use a public "hotspot" and
obtain personal or important information stored in files on the laptop's hard drive
o Fake websites
■ Fake websites mimic the sites of established - R —=
companies to trick prospective customers into 0-
revealing
revealing credit card information. -
■ Look forth a security indicators on your web browser ps
such as, the Padlock symbol and "https" in the
MK2
address box.
=80- ,
PREVENTION TIPS _
o Vigilance= Protection!
o You Decide When and What Information You Want To Give Out
Ask a m erchant or service provider requesting your Social Security number or
personal information:
■ Why do they need it?
■ What will they do with it?
■ Where will it be kept?
■ Will you still get the merchandi se or service if you do not provid a them with
your personal information?
■ Can you substitute passwords or identifiers of your choosing?
o DO NOT give out personal information over the phone or Internet unless you initiate the
call to a known person or business.
o DO NOT TRUST caller id's to identify the caller. The advent of Voice Over Internet
Protocol (VOIP) Phone S ervice allows the cr iminal to "spoof' or fake the displayed
number. Financial institutions will not call you to ask for personal information.
- 2 -
o Wallet or Pocketbook
■ Only carry the personal information you need daily in your wallet or purse.
■ Leave your Social Security Card in a safe place at home.
■ Reduce the number of credit'cards you carry—bette r yet, only take a credit
card with you when you expect to use it. Secure extra credit cards in a safe
place at home.
■ DO NOT keep copies of Social Security numbers, Account numbers, PINS or
other identifying information in your wallet.
■ You must carry your driver's license and in many cases business or school
identification as well a s health insu rance cards. Such do cuments may
contain your Social Security number. If possibl e, replace your Social
Security number,with a different identifying number or password.
o Protect your mail
■ Locking mail boxes.
■ Vacation hold.
■ Outgoing mail should only be placed in U.S. Postal Service collection boxes.
■ Opt Out of re ceiving pre-screened,credit offers. (See the resource page for
information on Mail Solicitations.)
■ Know your billing cycles.
o Trash: Shred documents containing personal information before placing in the trash. IF
IN DOUBT, SHRED IT!
o DO NOT CARRY Passwords for credit, debit cards, bank and phone accounts in your
wallet, pocketbook or day planner. Do not write the PIN on your credit/debit cards.
o Secure Your Information
■ At home—burgla r proof by storing personal information and valued items in secure
areas.
■ Know who has access to your i nformation such as family, friends and home
assistants. Take action to secure your information from those who you do not want
to have access.
o Order your Credit Bureau Reports
■ Check your credit reports carefully for credit cards and loans you may not
have opened or applied, for. (See the en closed Resource Page fo r
information on the three (3) major Credit,Reporting Agencies.)
YOUR COMPUTER AND IDENTITY THEFT
Computers with access to the internet can be found in almost every household and business in
Suffolk County. The to chnology offers g rowing opportunities to communicate, educate, and
conduct business from homes and businesses in a way that was beyond our imaginations just a
short time ago. The speed of technological advances in the area of home and office computing
often surpasses the user's ability to comprehend and fully use all th a computer's features
especially when it comes to security.
As users become more involved in on-line banking, commercial purchases and other e-
businesses, the risks for the loss or theft of personal information has become a matter of concern.
There are many stories by the news media about the theft of cu 'stomer or client information
through huge corporate data breaches but, you should not forget that you r personal computer
may also be the target of attack by identity thieves. The follo wing tips a re offered to get you
thinking about secure computing and on-line habits.
- 3 -
Social Networking Sites
Social Networking sites such as My Space, Facebook, You Tube and Twitter, as well as others,
are on-line communities that offer ne w and exciting venues for,users to meet new p eople or
maintain communication with off-line friend s or g roups. Your inf ormation can be entered as a
user profile, or dialogue in bulletins or blogs. As in any real world community, the criminal
element has found a way to lurk in th a shadows to exploit the unwitting or careless for their
benefit or to cause harm.
Users should be mindful that the personal information they list on their on-lin a profile in these
communities may be open for everyone in the community to see. Though you may feel that the
information by itself cannot be used to harm you, it should be considered in the context of all the
information you slowly provide over time through blogging and bulletins.
❑ Consider limiting the information listed on the site's profile page. The comp romise of
personal information is a very real issue when using social networking sites.
❑ Learn to use the networking site's security features such as Facebook's "Friends List"
that limits who can access your page.
❑ Carefully consider what photo's you wi sh to post, n of only for memori alizing potentially
embarrassing incidents but what information a criminal can learn about you from the
background, such as school banners, or the room's furnishings.
❑ Networking(sites may be a source for computer viruses, Trojan Horses and Spyware
❑ Networking sites have been used to spread "phishing" e-mails or change site content
without your authorization.
❑ Do not take for granted that the networking site's security features work.
Online Safety:
o Computer Security
■ Use antivirus software.
■ Use or enable firewall software.
Keep your Operating System and virus software updated.
■ Beware of e-mail attachments from those you don't know.
■ Turn the computer off when not in use.
■ Use a strong password containing both upper and lower case I etters and
numbers.
■ If using a router, keep security firmware updated.
o Wireless Networks
■ Wireless networks, either in the home or in a business, present computer safety
issues most users do not encount er while using their"wired " internet
connections. One of these dangers may include what is commonly called "war
driving", where criminals and hackers may gain access to your intern et
connection because it is broadcasted outside your home. Thieves may not only
gain access to the internet but to y our computers' hard d rive where you may
have stored important personal identifying information. Criminals can use you r
internet connection to commit crimes on the internet which can be traced back to
your home address.
■ Make sure you change the default password after installation.
■ Change the default SSID (Service Set Identifier; it is referred to as a network
name because it essentially is a name that identifies a wireless network) —
change it frequently.
■ Disable SSID Broadcast.
■ Enable Wireless Security(WEP or WAP).
■ Keep the wireless router firmware updated.
- 4 -
o Laptop Computers
■ If possible DO NOT store personal data on a laptop.
■ Consider Physical Security.
❑ Locks
❑r Security cables
■ Use bios and sign on Passwords.
■ Enable document encryption.
_ o Public Wireless Connections
■ 'Be aware of Evil Twin Access Points that look like the friendly access point
that you are trying to utilize in such Wi-Fi Hot Spots as in airports, cafes,
hotels and libraries. The rogue access point can be used to"sniff' o r
"eavesdrop"on wireless communications.
■ Keep software updated.
■ Enable Operating Systems and other software firewalls.
■ Enable encryption which prevents "sniffing". Browser sniffing is a common
technique used in websites and web applications in order to determine the
web browser a visitor is using. "Sniffing" is a form of wire-tap applied to
computer networks. This means that traffic on a segment passes by all hosts
attached to that seg ment. Filters on the network prevent the host machine
from seeing traffic addressed to other stations. Sniffing programs turn off the
filter, and thus hackers can see everyone's traffic.
■ Never
❑ Send confidential info by a-mail
❑ Send user Id's or passwords
❑ View online bank statements
o Computer Hard Drives
■ Do Not discard old hard drives in the trash without first:
❑ Using specialized disk wiping software to clear data from the hard
drive, or better
❑ Destroy the hard drive if no longer needed.
WHAT TO DO IF YOU BECOME A VICTIM OF IDENTITY THEFT
IMMEDIATELY!
o Call the Police
■ Go to your local precinct or call to have a police officer come to your h ome.
(631)852-COPS (2677)
■ Providing the credit reporting agencies with a copy of your police report will
allow them to extend the fraud alert on your information to seven years.
Contact the three major Credit Reporting Bureaus.
■ Place a fraud alert on your Credit Bureau information.
■ Request your credit bureau reports.
■ Check your repo rts carefully, make sure you can identify every entry
reported, close any accounts you did not open or authorize.
■ The Resource Page co ntains information on the three (3) major Credit
Reporting Agencies.
o Call the creditors involved.
■ Advise them that you are the victim of Identity Theft.
■ Close the affected accounts.
o Correct the address for any ma ilings in your name being sent to the wrong location by
contacting the U.S. Posta I Inspection Service (See the end osed Resource Page for
information on the U.S. Postal Inspection Service.).
- 5 -
o Contact the Federal Trade Commission Identity Theft Hotli ne (See the enclosed
Resource Page for information on the Federal Trade Commission.)
o Consider placing a "Se curity Freeze" on y our Credit Burea u Information. See the
Resource Page for more information.
Social Security Number Fraud
If you believe som eone has been using your social security number to o btain benefits or
employment you should also report your complaint to the Social Security Administration. (Se e
the Resource Page for information on the Social Security Administration.)
Internal Revenue Service Fraud
If you believe that you have been the victim of fraudulent filing of documents with the Department
of Treasury Internal Revenue Service please report your complaint to the I nternal Revenue
Service. (See the en closed Resource Page fo r information on contacting the Department of
Treasury— Internal Revenue Service.)
Take Control!
Here are a few guidelines to regain control of your life and your financial well being by`proving to
financial institutions that you are the victim and not the perpetrator.
o Gather all th a information you po ssess regarding the theft and use of your perso nal
identifiers.
o Chart a timel ine as to the sequence of events as you un derstand them. Correct the
timeline as you gather more information.
o Keep a diary and document phone calls regarding your problem; record the date, time
and the names of persons you called and what information was discussed. Get dire ct
phone numbers of those contacted as well a s addresses for future correspondence.
Refer to the New York State Consumer Protection Website for a sample diary. Th e
website information is on the enclosed Resource Page for your convenience.
o Follow up all phone conversations with a written correspondence confirming the details of
your conversation. Send all correspondence certified mail with a return receipt through
the U.S. Postal Service.
o Keep hard copies as well as computer copies of all correspondence, bills and charges
either sent or received.
o Keep track of expenses related to correcting your personal identifiers or credit information
for the possibility of future restitution. Refer to the New York State Consumer Protection
Website for information about victim restit ution. T he website i nformation is on the
Resource Page for your convenience.
o Stay organized, that may be difficult in such stressful circumstances so you may need to
enlist a family member or close friend to assist you in the effort.
THE SECURITY FREEZE
Identity Theft, when someone uses your name or personal information to open an unauthorized
new account or borrow money, or make unauthorized charges, continues to be the most common
consumer fraud complaint, affecting approximately 8 to 15 million Americans each year. It i s of
particular concern in New York, which has the sixth highest per-capita incidence of Identity Theft
in the country. New Yorkers h ave a weapo n to use against Identity Theft: the New York S tate
Security Freeze Law.
- 6 -
How a Security Freeze works
At your request, a Security Freeze is placed on your credit file, which is sometimes called your
"credit history." The Security Freeze prevents lenders and others from gaining access to your
credit report for review. With a Security Freeze in place, the lender will not be able to get a copy
of your credit history and, as a result, most lenders will refuse to open a new credit account. The
Security Freeze will, in most cases, block someone from opening a new account or borrowing
money using your name or person al information. There i s no cha rge for New York State
residents, to place a Security Freeze on their credit report if they are the victim of Identity Theft or
they are making this request for the first time.
Benefits and risks of a Security Freeze
Not everyone will want to place a Security Freeze on their credit file. With a S ecurity Freeze i n
place, you won't be able to borrow money, obtain instant credit or get a new credit card until you
temporarily lift or permanently remove the Security Freeze. The same is true of new insurance
coverage and background checks that might be required by a new employer. Additionally, it can
impede renting an apartment or other housing.
How to obtain a Security Freeze
To obtain a Security Freeze, contact each of the three (3) major credit reporting agencies (CRA):
TransUnion, Experian and Equifax. By law, the three credit bureaus will have three business days
from the date they receive your request to place a Security Freeze on your credit file (in 2010 it
decreases to one business day).Additionally, each CRA is required to have a secure website and
a dedicated toll-free number to place a Security Freeze. Requests for a Secu rity Freeze must
contain personal information that will be specified by each credit bureau. This information may
include your name, addresses during the p ast five years and Social Security number. Credit
bureaus need this information to verify your identity and process your request. If you wish to use
the mail and write a letter, the Consumer Protection Board's (CPB)website (nysconsumer.gov)
contains information on the requirements of each credit bureau, along with sample letters that can
be used to initiate our request for a Security Freeze. Each letter must be sent with confirmation of
delivery.
What happens next?
The credit bureaus (all of which are private companies) will write back to you within fiv a (5)
business days of placing the freeze, confirming that it has been activated. These letters will also
contain a password or a Personal Identification Number (PIN). When you want to temporarily lift
or permanently remove your Security Free ze, you will use thi s password or PIN to identify
yourself when calling the credit bureaus. Each reporting agency will give you a different password
or identification number. The PIN can not be a So cial Security number or a sequential portion
thereof.
How to remove the Security Freeze
Consumers may request that the Secu rity Freeze be lifted temporarily, or permanently on their
credit report, and sho uld follow the in structions provided by ea ch credit re porting agency. To
obtain a temporary lift of the Security Freeze, consumers must inform the credit reporting agency
of the name of the party to whom the report should be made available or the period of time when
the report should be av ailable to all requestors. Requests for a tempora ry or a perm anent
removal of the Security Freeze must be accompanied by proper identification and payment of the
applicable fee. Credit re porting agencies must comply with su ch requests within th ree (3)
business days of receipt. As of Septe mber 1, 2009, credit reporting agencies must comply with
this request within 15 mi nutes-of the reque st being received by telepho ne or secure electronic
mechanism (e.g., Internet).
Fees associated with the Security Freeze
You can be charged up to$5 to place a second or subsequent freeze on your report or to remove
the Security Freeze. If you are a victim of Identity Theft, there is no charge for restoring a
- 7 -
Security Freeze as long as you provide a copy of an ID theft report from a law enforcement
agency or an ID Theft Victim Affidavit from the Federal Trade Commission.
FREQUENTLY ASKED QUESTIONS
Can I order my own credit report if my file is frozen?
Yes. To obtain a free copy of your credit report (a copy is available from each of the three credit
bureaus every 12 months). (See the Resource Page for information on obtaining the free annual
credit report.)
Can some companies still review my credit history even with a Security Freeze in place?
Yes. Some private companies, government agencies and courts can still access your credit files
with a Security Free ze in place. These include companies with which you're currently d oing
business; companies to which you owe money; and collection agencies. Credit card companies
and other lenders can also access this information in order to offer you credit cards and related
services. You have the option of"opting-out" for five (5) years or permanently. "Opting-out" only
affects credit offers that use the reporting agencies for information. (See the Resource Page for
information on the Opt Out options.)
Will a Security Freeze lower my credit score?
No.
Does one Security Freeze cover everyone in my household?
No.All adults have to freeze their separate credit files,via separate letters requesting the freeze,
in order to obtain the benefit of a Security Freeze.
What is the difference between a Security Freeze and Fraud Alert?
A fraud alert is a special message on the credit report that a credit issuer receives when checking
a consumer's credit rating. It tells the credit i ssuer that th ere may be fraud involved in the
account. It does not limit access to your file. A fraud alert can help protect you against identity
theft, but it can al so slow down your ability to get new credit. It should not st op you from using
your existing credit cards or other accounts. A Security Freeze means that your,credit file cannot
be accessed by potential creditors, insurance companies, or employers doing background checks
-unless you give your personal consent or authorization.
Where can I obtain more information regarding Identity Theft?
The NYS Consumer Protection Board has prepared information on how to avoid becoming a
victim of Identity Theft and what to do i f your identity is stolen. T hat information is available at
www.nysconsumer.gov, under"Publications."
For your convenience we have enclosed sample security freeze letters specific to each of the
three (3)credit reporting agencies. They are located after the Resource Page.
See the Resource Page for the telephone numbers, online website addresses and location
addresses of the three credit reporting agencies.
THE IDENTITY THEFT AFFIDAVIT
To make certain that you do not be come responsible for any debts incurred by an identity thief,
you must prove to each of the companies where accounts were opened in your name that you
didn't create the debt. The ID T heft Affidavit was developed by a gro up of credit grantors,
consumer advocates, and attorneys at the Federal Trade Commission (FTC) for this purpose.
Importantly, this affidavit i s only fo r use where a n ew account was opened in your name. If
someone made unauthorized charges to any existing account, call the company for instructions.
- 8 -
While many companies accept this affidavit, others require that you submit more or different
forms. Contact each company to find out if th ey accept it. If they do not accept the ID Theft
Affidavit, ask them what information and/or documentation they require.
You may not need the I D Theft Affidavit to absolve you of debt resulting from identity theft if you
obtain an Identity Theft Report. We suggest you consider obtaining an Identity Theft Report
(Police Report)where a new account was opened in your name. An Identity Theft Report can be
used to (1) permanently block fraudulent information from appearing on your credit report; (2)
ensure that debts do not reappear on your credit reports; (3) prevent a company from continuing
to collect debts or selling the debt to others for collection; and (4)=obtain an extended fraud alert.
The ID Theft Affidavit may be required by a comp any in order for you to obtain appli cations or
other transaction records related to the theft of your identity. These records may help you prove
that you are a victim. For example, you may be able to show that the signature on an application
is not yo urs. The se documents also may contain information about the i dentity thief that is
valuable to law enforcement. Complete this affidavit as soon as possible. Many creditors ask
that you send it within two weeks.
This affidavit has two parts:
■ Part One—The ID Theft Affidavit—is where you report general information about yourself
and the theft.
■ Part Two— The Fraudulent Account Statement -is whe re you describe the fraudulent
account(s) opened in yo ur name. Use a separate Fraudulent Account Statement for
each company you need to write to.
When you send the affid avit to the compani es, attach COPIES (NOT ORIGINALS) of any
supporting documents (for example, driver's license or police re port). When you have finishe d
completing the affidavit, mail a co py to each creditor, bank, or company that provided the thief
with the unauthorized credit, goods, or services yo u describe. Attach a co py of the Fraud ulent
Account Statement with information only on accounts opened at the institution to which you are
sending the packet, as well as any other supporting documentation you are able to provide. Send
the appropriate documents to each company by-certified mail, return receipt requested, so you
can prove th at it wa s received. Th a companies will review your claim and se nd you a written
response telling you the outcome of their investigation. Keep a copy of everything you submit. If
you are unable to complete the affidavit, a legal guardian or someone with power of attorney may
complete it for you.
For your convenience we have enclosed two (2) sample dispute letters. O ne is for a newly
opened account in your name; the other is for an existing account that has been compromised.
- 9 -
Name: Suffolk County P.D. Central Complaint#:
WFORMA TION
1. My full legal name is
(First) (Middle) (Last) (Jr., Sr., III)
2. (If different from above)When the events described in this affidavit took place, I was known
as:
(First) (Middle) (Last) (Jr., Sr., III)
3. My date of birth is:
(Day/MonthNear)
4. My Social Security Number is:
5. My driver's license or identification card state and number is:
6. My current address is:
City: State: Zip Code:
7. 1 have lived at this address since:
(MonthNear)
8. (If different from above) When the events described in this affidavit took place, my address
was:
City: State: Zip Code:
9. 1 lived at the address in Item 8 from to
(MonthNear) (MonthNear)
10. My daytime telephone number is: �) -
My evening telephone number is: �) -
IHOW THE FRAUD OCCURRED
CHECK ALL THAT APPLY FOR ITEMS 11 - 17
11. _ I did not authorize anyone to use my name or personal information to seek the money,
creditjoans, goods or services described in this report.
- 10 -
Name: Suffolk County P.D. Central Complaint#:
12. _ 1 did not receive a ny benefit, money, goods or services as a result of the events
described in this report.
13. _ My identification documents (for example, credit card s; birth ce rtificates; driver's
license; Social Security Card, etc)were:
stolen lost on or about
(day/month/year)
14. _ To the best of my knowl edge and belief, the following person(s) used my information,
(for example, my name, addre ss, date of birth, existing accou nt numbers, Social Security
Number, mother's maiden name, etc.) or identification documents to get money, credit, loans,
goods or services without my knowledge or authorization:
Name (If known) Name (If known)
Address (If known) Address (If known)
Phone Number(s) (If known) Phone Number(s) (If known)
Additional Information Additional Information
15. _ 1 do NOT kn ow who used my information or identification documents to get money,
credit, loans, goods or services without my knowledge or authorization
16. Additional comments: (Fo r example, description of the fraud, whi ch documents or
information were used or how the identity thief gained access to your information)
Attach additional pages as necessary
- 11 -
Name: Suffolk County P.D. Central Complaint#:
VICTIM'S LAW ENFORCEMENT ACTIONS
17. (Check only one)
_ lam — I am not willing to assist in the prosecution of the person(s)who committed
this fraud. -
18. (Check only one)
_ I am — I am not authorizing the release of this information to law enforce ment for
the purposes of assisting them in the investigation and prosecution of the person(s) who
committed this fraud.
19. (Check all that apply): I _ have _have not reported the events described in this
affidavit to the police or other law enforcement agency. The police_did_did not write
a report. In the event you have contacted the police or other law enforcement agency
please complete the following information:
Agency#1 Officer/Agency personnel taking report
Date of Report Report Number(if any)
Phone Number Email Address (if any)
Agency#2 Officer/Agency personnel taking report
Date of Report Report Number(if any)
Phone Number Email Address (if any)
DOCUMENTATION
Please indicate the supporting documentation you are able to provide to the companies you plan
to notify. Attach copies (NOT originals)to the affidavit before sending it to the companies.
20. _ A copy of a valid governm ent-issued photo-identification card (for
example, your driver's license, state-issued ID card, or your
passport.) If you are u nder 16 and don't have a p hoto-ID, you may
submit a copy of your birth certificate or a cop y of your official scho of
records showing your enrollment and place of residence.
21. _ Proof of resi dency during the time the disputed bill occurred, the loan
was made o r the other eve nt took pla ce (fo r example, a rental/lease
agreement in your name, a copy of a utility bill or a copy of an
insurance bill).
22. _ A copy of the report filed with the police or sheriffs department. If
you are unable to obtain a report or a repo rt number from the p olice,
please indicate that in Ite m 19. Some companies only need the
report number, not a copy o f the repo rt. You may want to the ck with
each company.
- 12 -
Name: Suffolk County P.D. Central Complaint M
SIGNATURE
I certify that, to the best of my knowledge and belief, all the information on and attached to
this affidavit is true, correct, and complete and made in good faith. I also understand this affidavit
` or the information it contains may be made available to fe deral, state, and/or local law
enforcement agencies for su ch action within thei r jurisdiction as they d eem appropriate. I
understand that knowingly making any false or fraudulent statement or representation to the
government may constitute a violation of 18 U.S.C. 1001 or other federal, state or local cri mina)
statutes, and may result in imposition of a fine or imprisonment or both.
Signature Date Signed
Notary
Check with each company. Creditors sometimes require notarization. If they do not, please have
one witness (non-relative) sign below that you completed and signed this affidavit.
Witness:
Signature Printed Name
Date Telephone Number
- 13 -
Name: Suffolk County P.D. Central Complaint#:
FRAUDULENT ACCOUNT STATEMENT
Completing the Statement
■ Make as many copies of this page as you need. Complete a separate page for each
company you're notifying and only send it to that company. Include a copy of your signed
affidavit.
■ List only the account(s) you're disputing with the company receiving this form. See th e
example below.
■ If a collection agency sent you a statement, letter or notice about the fraudulent account,
attach a copy of that document(Not the original).
I declare (check all that apply):
As a result of the event(s) described in the ID Theft Affidavit, the following account(s)
was/were opened at your company in my name without my knowledge, permission or
authorization using my personal information or identifying documents.
Creditor Account. Type of Unauthorized Date Amount/Value
Name/Address Number Credit/Goods/Services .Issued or Provided
Provided by Creditor Opened -
(The
pened -(The company that (If known) (The amount charged
opened the account
or provided the goods (If known) or the cost
or services} good or services)
of the
Example 01234567-89 Auto Loan 01/05/2002 $25.500.00
Example National
Bank
22 Main Street
Columbus, OH
22722
During the time of the accounts described above, I had the following account open with your
company:
Billing Name:
Billing Address: _
Account Number:
- 14 -
Security Freeze (Sample) letter request to Equifax, Inc.
Note: If thi s is your first time placing a security freeze, there is no fee for requestin g a
Security Freeze. Once you remove or tem porarily lift the Security Freeze, you will be
charged up to $5 to restore the Security Freez e. There is an exception, however, if you
are the victim of Identity Theft. You will not be charged this fee if you submit a copy of
the police r eport or a signed copy of a Federal Trade Commission ID Theft Victim
Affidavit.
You must send this letter to Equifax by either certified mail or overnight mail through the
U.S. Postal Service to:
Equifax Security Freeze
PO Box 105788
Atlanta, GA 30348
Date:
Dear Equifax:
I would like to place a security freeze on my credit file.
My full name (with middle initial and generation, such as Jr. or Sr.) is:
My complete current address is:
My date of birth is:
My Social Security Number is:
I am also enclosing a copy of a document (such as a utility bill) that verifies my current
mailing address.
Yours truly,
- 15 -
Security Freeze (Sample) Request to Experian Inc.
Information on what to send to Experian:
Make sure that each copy of your personal information is legible (enlarge if necessary)
and it displays your name and curre nt mailing address, as well as the date of when the
document was issued. The date(s) on these documents must be recent. Experian will
NOT accept credit car d statements, voided checks, lease agreements, magazine
subscriptions or postal service forwarding orders such as proof.
To protect your personal information, Experian d oes not return correspondence sent to
them. So keep your original documents and only send copies to Experian.
Note: If this is your first time placing a security freeze, there is no fee for requestin g a
Security Freeze. Once you remove or tem porarily lift the Security Freeze, you will be
charged up to $5 to restore the Security Freez e. There is an exception, however, if you
are the victim of Identity Theft. You will not be charged this fee if you submit a copy of
the police r eport or a signed copy of a Federal Trade Commission ID Theft Victim
Affidavit.
You must send this letter to Experian by either certified mail or overnight mail thr ough
the U.S. Postal Service to:
Experian Security Freeze
PO Box 9554
Allen, TX 75013
Date:
Dear Experian:
I would like to place a security freeze on my credit file.
My full name (with middle initial and generation, such as Jr. or Sr.) is:
My Social Security Number is:
My date of birth is:
My complete current address is:
Below is a list of my addresses for the past two years:
I am enclosing one copy of a go vernment-issued identification card, such as a driver's
license, state ID card, military ID card, etc.
To help verify my current address, I am also enclosing one copy of a utility bill, bank or
insurance statement, etc.
Yours truly, `
- 16 -
Security Freeze (Sample) Request to TransUnion Inc.
Note: If this is your first time placing a security freeze, there is no fee for requestin g a
Security Freeze. Once you remove or tem porarily lift the Security Freeze, you will be
charged up to $5 to restore the Security Freez e. There is an exception, however, if you
are the victim of Identity Theft. You will not be charged this fee if you submit a copy of
the police r eport or a signed copy of a Federal Trade Commission ID Theft Victim
Affidavit.
TransUnion reserves the right to ask for further proof of id entity should the information
you provide not be co mplete or if security warrants it. T he following can be used as
proof of address and Social Security number: co pies of current driver's license, ban k or
credit union statement, Medicaid or Medicare c ard, paycheck stub, state ID card, W2
form.
TransUnion will accept I etters by regular mail, certified mail or overnight mail from the
U.S. Postal Service at this address:
TransUnion
Fraud Victim Assistance Department
PO Box 6790
Fullerton, CA 92834
Date:
Dear TransUnion;
I would like to place a security freeze on my credit file.
My name is:
Other name(s) used:
My current address is:
My previous address is (if you have other addresses in the previous five (5) years):
My home phone is:
My Social Security Number is:
My date of birth is:
My driver's license# is:
Yours truly,
- 17 -
Sample Dispute Letter
Date
Your Name
Your Address
Your City, State, Zip Code
Complaint Department
Company Name
Address
City, State, Zip Code
Dear Sir or Madam:
I am writing to dispute th a following information in my file. I have circled the items I am
disputing on the attached copy of the report I received.
This item (identify the item(s) disputed by name of source, such as creditors or tax court,
and identify type of item, such as credit account, judgment, etc.) is (inaccurate or
incomplete) because (describe what is inaccurate or incomplete and why). I am
requesting that the item be remove d (or request another specific change) to correct the
information.
Enclosed are copies of (use this sentence if applicable and describe any enclosed
documentation, such as a police report, Identity Theft Affidavit, payment records, court
documents) supporting my position. Please reinvestigate this (these) matter(s) and
(delete or correct) the disputed item(s) as soon as possible.
In addition, pursuant t o FACTA Public Law 1 08, as a victim of ide ntity theft, I am
requesting that you pro vide me with copies of any and al I applications and busin ess
transaction records related to the fraudulent account(s). The copies of the records can
be (mailed to me at the above address or faxe d to me at this telephone number: (xxx)
xxx-xxxx). In addition, please make these records available to the Suffolk County
Police Department upon their request.
Sincerely,
Your name.
Enclosures (list below what is enclosed)
- 18 -
Sample Dispute Letter for Existing Accounts
Date
Your Name
Your Address
Your City, State, Zip Code
Your Account Number
Name of Creditor
Billing Inquiries
Address
City, State, Zip Code
Dear Sir or Madam:
I am writing to dispute a fraudulent (charge or debit) on my account in the amou nt of
$ . I am a victim of identity theft, and I did not make this (charge or debit). I
am requesting that the (charge be removed or the debit be reinstated), that any fina nce
and/or other charges related to the fraudulent amount be credited, as well, and that I
receive an accurate statement.
Enclosed are copies of (use this statement to described any enclosed information, such
as a police report or ID Theft Affidavit) supporting my position. Please investigat a this
matter and correct the fraudulent (charge or debit) as soon as possible.
In addition, pursuant t o FACTA Public Law 1 08, as a victim of ide ntity theft, I am
requesting that you provide me with copies of any and al I applications and busin ess
transaction records related to the fraudulent account(s). The copies of the records can
be (mailed to me at the above address or faxed to this telephone number. (xxx) xxx-
xxxx). In addition, please make these records available to the Suffolk County
Police Department upon their request.
Sincerely,
Your Name
Enclosures (list below what is enclosed)
- 19 -
FAIR AND ACCURATE CREDIT TRANSACTIONS ACT OF 2003
PUBLIC LAW 108-159, DECEMBER 4, 2003
SEC. 151. SUMMARY OF RIGHTS OF IDENTITY THEFT VICTIMS
a) IN GENERAL—
1) SUMMARY - Section 6 09 of the F air Credit Reporting Act (15 U.S.C. 16818) is
amended by adding at the end of the following:
d) SUMMARY OF RIGHTS OF IDENTITY THEFT VICTIMS—
1) IN GENERAL - The Commission, in consultation with the Federal banking
agencies and the National Credit Union Administration, shall prepare a
model summary of the rights of consumers under this title with respect to the
procedures for remedying the effects of fraud or identity theft involving credit,
an electronic fund transfer, or an account or transaction at or with a financial
institution or other creditor.
2) SUMMARY OF RIGHTS AND CONTACT INFORMATION - Be ginning 60
days after the date on wh ich the model summary of rights is p rescribed in
final form by the Commission pursuant to paragraph 1), if any consumer
contacts a consume r reporting agency and exp resses a belief that the
consumer is a victim of fraud or id entity theft involving credit, an electronic
fund transfer, or an account or transaction at or with a financial institution or
other creditor, the consumer reporting agency shall, in addition to any other
action that the agency may take, provide the consumer with a summary of
rights that contains all of the information required by the Commission under
paragraph 1), and information on how to contact the Commission to obtain
more detailed information.
e) INFORMATION AVAILABLE TO VICTIMS—
1) IN GENERAL - Fo r the purpose of documenting fraudulent transactions
resulting from identity theft, not later than 30 days after the date of receipt of
a request from a victim in accordance with paragraph 3), a nd subject to
verification of the identity of the vict im and the claim of identity theft in
accordance with paragraph 2) a business entity that has provided credit to,
provided for consideration products, goods, or services to, accepted
Payment from, or oth erwise entered into a commercial transaction for
consideration with, a person who has allegedly made unauthorized use of
the means of identification of the victim, shall provide a copy of application
and business identification of the victim, shall provide a copy of application
and business transaction records in the control of the busi ness entity,
whether maintained by the business entity or by another person on behalf of
the business entity, evidencing any transactio n alleged to be a result of
identity theft to—
a. The victim
b. Any Federal, State or Lo cal government law enforcement agency or
officer specified by the victim in such a request; or
c. Any law enf orcement agency investigating the ide ntity theft an d
authorized by the victim to take receipt of records provided under this
subsection.
2) VERIFICATION OF IDENTITY AND CLAIM - Before a business entity
provides any information under paragraph 1), unless the business entity, at
its discretion, otherwise has a high degree of confidence that it knows the
identity of the victim makin g a request under paragraph 1), the vi ctim shall
provide to the business entity-
- 20 -
a. as proof of positive identification of the victim, at the electio n of the
business entity—
i). the presentation of a government-issued identification card;
ii). perso nally identifying information of the same type as was
provided to the business entity by the unauthorized person; or
iii). Person ally identifying informati on that the business entity
typically requests from new applicants or for new transactions at the
time of the victim's reque st for informatio n, including any
documentation described in clauses i)and ii); and
b. as proof of a claim of ide ntity theft, at the electio n of the busi ness
entity–
i). A copy o f a police re port evidencing the claim of the victim of
identity theft; and
ii). a properly completed–
I. copy of a standardized affidavit of identity theft
developed and made available by the Commission; or
II. an affidavit of fact that is acceptable to the bu siness
entity for that purpose.
3). PROCEDURES–The request of a victim under paragraph 1)
shall–
a. be in writing
b. be mailed to an address specified by the business entity, if any; and
c. if asked by the business entity, include relevant information about
any transaction alleged to be a result of identity theft to facilitate
compliance with this section including–
L if known by the victim (or if readily obtainable by th a victim), the
date of the application or transaction; and
ii. if known 'by the victim (or if readily obtainable by the victim), any
other.identifying information such as an account or transaction
number
4). NO CHARGE TO VICTM–Information required to be provided
under;paragraph 1)shall be so provided without charge.
5). AUTHORITY TO DECLINE TO PROVIDE INFORMATION–A
business entity may decline to provide information under
paragraph 1) if, in the exercise of good faith, the business entity
determines that–
this subsection does not require disclosure of this information;
a. after reviewing the information provided pursuant to paragraph
2), the business entity does not have a hi gh degree of
confidence in knowing the true identity of th a individual
requesting the information;
b. the request for the i nformation is based on a misrepresentation
of fact by th a individual requesting the information relevant to
the request for information; or
c. the information requested is Internet navigational data or similar
information about a person's visit to a website or online service.
- 21 -
A Summary of Your Rights Under the Fair Credit Reporting Act
(Para informacion en espanol,visite www.ftc.gov/credit o escnbe a la FTC Consumer Response Center, Room 130-A
600 Pennsylvania Ave N.W.,Washington, D.C.20580.)
The Federal Fair Credit Reporting Act(FCRA)promotes the accuracy,fairness,and privacy of information in the files of consumer reporting
agencies. There are many types of consumer reporting agencies, including credit bureaus that gather and sell information about your
creditworthiness to creditors, employers, landlords, and other businesses. The FCRA gives you specific rights, which are summarized
below. You may have additional rights under state law. For more information, go to www.ftc.gov/credit, or write to Consumer Response
Center, Federal Trade Commission,600 Pennsylvania Ave N.W.,Washington, D.C.20580.
You must be told if information in your file has been used against you. Anyone who uses information from a consumer reporting
agency to deny your application for credit, insurance, or employment—or take another adverse action against you—must tell you and give
you the name,address,and phone number of the agency that provided the information.
You can find out what is in your file.At any time,you may request and obtain your report from a consumer reporting agency.You will be
asked to provide proper identification, which may include your Social Security number. In many cases the report will be free.You are
entitled to free reports if a person has taken adverse action against you because of information-in a report; if you are the victim of identify
theft; if you are the victim of fraud; if you are on public assistance, or if you are unemployed but expect to apply for employment within 60
days. In addition, you are entitled to one free report every twelve months from each of the nationwide credit bureaus and from some
specialized consumer reporting agencies.See www.ftc.gov/credit for details about how to obtain your free report.
You have a right to know your credit score. Credit scores are numerical summaries of a consumer's creditworthiness based on
information from consumer reports. For a fee, you may get your credit score. For more information: click on www.ftc.gov/credit. In some
mortgage transactions,you will get credit score information without charge.
You can dispute inaccurate information with the consumer reporting agency. If you tell a consumer reporting agency that your file
has inaccurate information,the agency must take certain steps to investigate unless your dispute is frivolous. For an explanation of dispute
procedures,go to www.ftc.gov/credit.
Inaccurate information must be corrected or deleted. A consumer reporting agency or furnisher must remove or correct information
verified as inaccurate, usually within 30 days after you dispute it. However, a consumer reporting agency may continue to report negative
data that it verifies as being accurate.
Outdated negative information may not be reported. In most cases, a consumer reporting agency may not report negative information
that is more than seven years old,or bankruptcies that are more than 10 years old.
Access to your file is limited. A consumer reporting agency may provide information about you only to people with a valid need as
determined by the FCRA--usually to consider an application with a creditor, insurer,employer, landlord,or other business.
Your consent is required for reports that are provided to employers.A consumer reporting agency may not give out information about
you to your employer,or potential employer,without your written consent. Blanket consent may be given at the time of employment or later.
You may choose to remove your name from consumer reporting agency lists for unsolicited credit and insurance offers. These
offers must include a toll-free phone number you can call if you choose to take your name and address off lists in the future You may opt-
out at the major credit bureaus by calling 1-888-50PTOUT.
You may seek damages from violators. If a consumer reporti ng agency, a user of consum er reports, or, in some cases,a furnisher of
information to a consumer reporting agency violates the FCRA,you may sue them in state or federal court
Identity theft victims and active duty military personnel have additional rights. Victims of identity theft have new rights under the
FCRA.Active-duty military personnel who are away from their regular duty station may file"active duty"alerts to help prevent identity theft.
For more information,visit www.ftc.gov/credit.
The FCRA gives several federal agencies authority to enforce the FCRA:
TO COMPLAIN AND FOR INFORMATION: PLEASE CONTACT:
Consumer reporting agencies, creditors and others not listed Federal Trade Commission Consumer Response Center-
below FCRA Washington, DC 20580 1-877-382-4367 (Toll-Free)
National banks, federal branches/agencies of forei gn banks Office of th a Comptroller of the Currency Compliance
(word "National" or i nitials "N.A."app ear in or after bank's Management, Mail Stop 6-6 Washington, DC 20219 800-
name) 613-6743
Federal Reserve System member banks (except national Federal Reserve Board Division of Con sumer &
banks, and federal branches/agencies of foreign banks) Community Affairs Washington, DC 20551 202-452-3693
Savings associations and federally chartered savings banks Office of Thrift Supervision .Consumer Programs
(word "Federal" or initials "F.S.B."appea r in federal Washington, DC 20552 800-842-6929
institution's name)
Federal credit unions (words "Federal Credit Union" appear in National Credit Union Administration 1775 Duke Street
institution's name) Alexandria, VA 22314 703-518-6360
State-chartered banks that are n of members of th a Federal Federal Deposit Insurance Corporation Division of
Reserve System Compliance & Consumer Affairs Washington, DC 20429
800-934-FDIC
Air, surface, or rail common carriers regulated by former Civil Department of Tra nsportation Office of Fi nancial
Aeronautics Board or Interstate Commerce Commission Management Washington, DC 20590 202-366-1306
Activities subject to the Packers and Stockyards Act, 1921 Department of Agriculture Office of Dep uty Administrator-
GIPSA Washington, DC 20250 202-720-7051
` 2/11/2015
Enhanced Security and
Automated Bank Deposits
Gloria Fried,Receiver of Taxes,Town of Ossining
gloria fried@townofossming com (914)762-8790
Gene Handy,Branch Manager,Cummins Allison Corporation
handyg@cumminsalllson com ((203)948-3390)
Fiduciary Responsibilities of a
Receiver of Taxes
• Town Tax and Special Districts
—Town General
—Separate Unincorporated Area Taxes
—Special Districts
•Ambulance,Water,Sewer,Fire Protection,Lighting,
Refuse
• Municipal entities beyond the Town
—County Tax and Special Districts
• County General Tax,Sewer Districts,Solid Waste District
—School Districts
•School Tax and Library
Surety Bond
• The Receiver must file an Undertaking with the
Clerk's Office in the form of a Surety Bond
• "Such Surety shall be a lien on all the real estate
held by the collector or his sureties in the county
at the time of the filing and shall continue to be
such lien,until its condition,together with all costs
and charges which may accrue by prosecution
thereof shall be fully satisfied."Art.3§35
• The bond protects the municipality in the case of a
default by the Receiver but the Receiver is
Personally liable.
1
t 2/11/2015
Lost or Stolen Funds
• Deposits of Town Tax monies must be made within 24
hours after receipt. IS Op State Comp 18,1959
• NY State Law: (13)Lost or Stolen Funds. A town
receiver of taxes is personally responsible for taxes
collected by him which are lost or misplaced,and the
town could not release him from liability for loss of such
moneys unless the loss was caused by an Act of God or
the public enemy..." Const Art,8,§1.Op State Compt 79-217 See also Op,State
Compt.78-270
• A receiver of taxes is the only elected official who is
Personally responsible and whose real estate is collateral
for losses incurred.
SECURITY REVIEW in 2011
Identified four security issues
1. Counting Cash
At the counter
At the end of the day
2. Copying Checks
3. Catching Counterfeits
4. Courier Costs
Security Issue 1: Counting Cash
• Counting Cash at the Tax Office Counter
—Total cash payments in 2012: $656,469.46
—Cash was received on 85 of the 250 days the
tax office was open.
—Each Cash payment must be counted twice
in front of the taxpayer when accepted at
the counter.
—Lines of waiting Taxpayers grew while cash
was double counted and they watched.
2
2/11/2015
Security Issue 1: Counting Cash
• Counting Cash at the end of the Day
—End of day--recounting the total cash for
deposit preparation
—Total amount of cash varies each day and must
be totaled twice by different people when
prepared for the deposit bag.
—The deposit bag required a tally of each
denomination of bills
Security Issue 2: Copying Checks
• Check Processing--2012 Totals
—17,131 checks
—$83,038,359.29 in total check deposits
—Multiple Batches daily with 50 or fewer checks
in each.
—165 days with checks but no cash
• Additional Deposits
—Wires from Tax Service Agencies
—Internet payments—ACH transfers and Credit Card
Security Issue 2: Copying Checks
• 'Bonded"Courier Service-provided by our bank
• Their bond only insures the cost of
reconstructing the deposit.
—It does not insure the face value of the deposit.
—We are required by their contract to have a copy of
each check.
• Must Identify:The maker of the check,
•the dollar amount,and the
• routing number and account number on the check.
3
2/11/2015
Security Issue 3: Catching Counterfeits
• Counterfeits at the Tax Office Counter
—The average tax payment consisted of 35 to
40 bills.
—Each bill must be checked in front of the
taxpayer
—Lines of waiting Taxpayers grew while bills
were checked INDIVIDUALLY
—A$100 counterfeit bill slipped past on the
last day of January.
Security Issue 4: Courier Costs
• The Courier comes each day—250 days
—The bank assumes the cost at$24 per day
—$,6000.00 per year
—"Relationship Interest Rate"
—For each bank service we use,we lose points
on our interest rate
—Over$130 million was deposited in 2012.
—Courier savings for bank= higher interest for
Town.
How to Solve Security Issues ?
1. Counting Cash
At the counter
At the end of the day
2. Copying Checks
3. Catching Counterfeits
4. Courier Costs
4
2/11/2015
Currency Counter/Counterfeit Detector
Check Scanner/Deposit Manager
Cummins -• a `�
J ETSCAN I FX N4j�"
17T-7/
-
- r
Cummins JetScan 1FX Currency Counter
and Check Scanner
The Receipt Printer is located on the shelf beneath the JetScan iFX
V" I
Security Issue 1: Counting Cash
• Counting Cash-at the Counter
—Extremely fast
— Eliminates taxpayers waiting in lines while
currency is counted
— Minimizes exposure to security issues
—Taxpayers watch their currency being
counted.
—Easy to count each payment multiple times
—Doesn't require a second person to do a
double count.
5
:. ,. .�..� 2/11/2015
Security Issue 1: Counting Cash
• End of Day Tallies
— Verifiesthe total currency collected for the
day's deposit.
— Rapidly counts the totals multiple times,
eliminates need for a second person to do a
double count.
— Don't need to separate bill types
— Prints receipt with tally of each bill type for
bank deposit.
Security Issue 2: Catching Counterfeits
Counterfeit detection is turned on by pressing
the CF key on the screen of the Jetscan iFX
— The software in the Jetscan iFX can be
upgraded to recognize the new bills.
— When a bill is rejected,it can be further
verified by another method of detection
— We were able to catch a sophisticated
counterfeit bill from Peru
Security Issue 3: Copying Checks
• IMS—Image Management System
—Software that enables the currency machine to
scan each check and manage the'images in a
computer file.
—Retains the information required by Courier
Services
—Scans checks as quickly as it scans currency.
—Can scan and copy over 400 checks per minute.
—Reduces exposure to adverse security issues.
—Scans and copies multiple sized checks in same
batch.
6
• 2/11/2015
Jetscan WX vrs. manual check copying
• Jetscan WX
—53 checks in 7 seconds--450 checks per minute
—Can scan entire year of 17,131 checks in 38 minutes
—No paper costs—No personnel costs
• Manual
—53 checks in 3.5 minutes (15 checks per minute)
—17,131 checks take 19 hours to copy one year's checks
—9 reams of legal paper per year--$34.00
—Salary of one deputy--19 hours @$24.24=$498.56
—Security issue: copier is in the public area of the office
Cummins
r� JetScan iFX
Security Issue 4: Courier Charges
Cummins DBM—Deposit Balancing Manager Software
—Enables the Jetscan iFX currency machine to review
scanned images of each check and create an ICL(Image
Cash Letter)compatible with the Fisery Banking System
—Sorts checks by Confidence Level
•Red—Low Confidence—requires review and
intervention
•.Orange—Medium Confidence—Requires review and
possible intervention
•Green—High confidence—Generally acceptable if the
total deposit is green and matches.
—Reduces exposure to adverse security issues
—Saves time--automatically endorses the back of the
check image with the Tax Office Account Info.
• 2/11/2015
Justification for Cummins Check Scanning
• Security
—Checks never leave the Tax Office
• Accuracy -
-We can identify the image of the check because we know what the
amount is supposed to be from the tax bill
• Speed
—No need to endorse checks because the Software does it for us
—Deposits made within 24 hours as proscribed by law.
• Save Money
— No paper costs or personnel costs on manual copying checks
• Applicability
—Can be used for other Town Functions or deposits.
• Portability
—Can be used with other banks if we find better terms
In-House Scanning vrs.
Bank Supplied Systems
• Works with our existing equipment.
• Ten times faster than bank proprietary systems
(500 checks per minute instead of 50 checks
per minute)
• No"Relationship Interest Rate" Expenses
—Able to negotiate a higher interest rate because of
the lower courier charges to the bank
Benefits
• Meet State requirement for 24 hour deposit
• Extra Interest from Day of posting ($867.53 at.27%)
—At least one extra day's interest for each deposit
—Three extra days for each Friday deposit
—Four Extra days for Friday deposits with Holiday Mondays
—Five extra days for Thanksgiving Wednesday deposit
—Two extra days interest for other holidays
• Saves Time—Preparing deposits and endorsing checks.
• Courier Savings
—Only 85 days with cash deposits in 2012 out of 250.
—Save$24 per day for 165 days=$3,960.00
• Potential"Relationship based Interest Rate"increase
— Possible $ 1,389.26 or$ 2,778.51
• Additional Security(priceless)
8