Monday, November 26, 2012

Cyber Monday


Cyber Monday: Tips to Avoid Online Shopping Scams

If you're planning on shopping on Cyber Monday, it's important to know that scammers are getting ready too. The company IDentity Theft 911 offered these tips to help protect yourself from scams and fraud while shopping online this holiday season, and all year long. Shop on secure sites. Look for "https" in the address bar and a yellow padlock logo to the right of the Web browser address bar. Double-click on the lock to see a digital certificate of the website. Review these certificates on unfamiliar sites. Make sure you are entering correct URLs. Hackers often buy misspelled domains to trick people into entering personal information. Never enter your Social Security number or passwords to e-mail and bank accounts as part of the buying process with online retailers. Use a different password for each online retailer, personal e-mail account and banks account you have. That way, if a hacker cracks one password, he or she won't have access to others. Read reviews of a site before making any purchases from it. These are some of the suggestions to avoid becoming a victim of Identity Theft.

Friday, November 23, 2012

Cyber Monday Scams

Hope everyone had a great thanksgiving!!! Lookout for Cyber Monday Deals-and Scams Turkey, pumpkin pie, and football aren't the only things that are part of many American's Thanksgiving traditions. Steals, deals, and bargain prices are also becoming a part of the holiday season-and more and more people are going online to find them. Cyber Monday, one of the biggest shopping days of the year for consumers and retailers, also provides a golden opportunity for scammers and spammers looking to take advantage of the higher than normal amount of people shopping online. On Cyber Monday, hackers use tactics like preying on popular keyword searches, such as "jewelry" or "flat screen TV," to lure unsuspecting shoppers to malicious websites. The Department of Homeland Security's Stop.Think.Connect.TM Campaign offers the following tips to help safeguard your personal information and transactions on Cyber Monday and throughout the holiday season: Keep your computer, browser, anti-virus and other critical software up to date. Security updates and patches are available for free from major companies. Pay attention to website URLs. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net). Also look in the address box for the "s" in https:// before any transaction. That "s" tells you that the site is taking extra measures to help secure your information. Beware of deals that sound too good to be true. Use caution when opening email attachments and do not follow unsolicited web links in email messages. Pay special attention to extremely low prices on hard-to-get items. Check privacy policies. Before providing personal or financial information, check the website's privacy policy to ensure your safety. Use a credit card. There are laws to limit your liability for fraudulent credit card charges, and you may not have the same level of protection when using your debit card. Keep a record of your order. Retain all documentation from the order in the event your purchase does not ship or if there are unauthorized charges on your bill. Check your statements. Keep a record of your purchases and copies of confirmation pages, and compare them to your bank statements. If there is a discrepancy, report it immediately.

Thursday, November 8, 2012

Identity Theft...Home Security.... Work hand in hand

Call Now: 888-925-7519

Phishing costs millions

Last year, members of the American Airlines AAdvantage Program received e-mail purportedly from American Airlines promising $50 for participating in an online survey. But those who took the bait ended up on a fake site that asked for their personal information.
We estimate consumer losses to phishing scams at almost a half-billion dollars during the past two years. Last fall, more than 250 brand names were used each month in e-mail scams and other cybercrime.   The most targeted industry was financial services.
One reason there are many successful phishing attacks is that users of social-network sites are often targeted  and might be less alert to the presence of malicious Web sites, dangerous e-mail, and harmful software. "Phishing e-mails are designed to make you think there coming from a legitamit business or government agency. While earlier phishing scams were characterized by poor grammar, misspellings, and cheesy graphics, most are now so well done that experts can't easily tell real ones from fake.

Protect yourself

Never provide personal information via an e-mail link. Enable the antiphishing feature in your browser or download a free antiphishing toolbar such as McAfee Site Advisor (at www.siteadvisor.com), which warns you when you're visiting a dangerous site. Only 27 percent of respondents to our survey used such tools.
 

Tuesday, October 23, 2012

October 23, 2012

Kansas case puts US face on 'total identity theft'

WICHITA, Kan. (AP) — When Candida L. Gutierrez's identity was stolen, the thief didn't limit herself to opening fraudulent credit and bank accounts. She assumed Gutierrez's persona completely, using it to get a job, a driver's license, a mortgage and even medical care for the birth of two children.
All the while, the crook claimed the real Gutierrez was the one who had stolen her identity. The women's unusual tug-of-war puts a face on "total identity theft," a brazen form of the crime in which con artists go beyond financial fraud to assume many other aspects of another person's life.



The scheme has been linked to illegal immigrants who use stolen Social Security numbers to get paid at their jobs, and authorities fear the problem could soon grow to ensnare more unsuspecting Americans.
"When she claimed my identity and I claimed it back, she was informed that I was claiming it too," said Gutierrez, a 31-year-old elementary schoolteacher. "She knew I was aware and that I was trying to fight, and yet she would keep fighting. It is not like she realized and she stopped. No, she kept going, and she kept going harder."
A 32-year-old illegal immigrant named Benita Cardona-Gonzalez is accused of using Gutierrez's identity during a 10-year period when she worked at a Topeka company that packages refrigerated foods. For years, large numbers of illegal immigrants have filled out payroll forms using their real names but stolen Social Security numbers. However, as electronic employment verification systems such as E-Verify become more common, the use of fake numbers is increasingly difficult. Now prosecutors worry that more people will try to fool the systems by assuming full identities rather than stealing the numbers alone.
For victims, total identity theft can also have serious health consequences if electronic medical records linked to Social Security numbers get mixed up, putting at risk the accuracy of important patient information such as blood types or life-threatening allergies.
Federal Trade Commission statistics show that Americans reported more than 279,000 instances of identity theft in 2011, up from 251,100 a year earlier. While it is unclear how many of those cases involve total identity theft, one possible indicator is the number of identity theft complaints that involve more than one type of identity theft — 13 percent last year, compared with 12 percent a year earlier.
Nationwide, employment-related fraud accounted for 8 percent of identity theft complaints last year. But in states with large immigrant populations, employment-related identity fraud was much higher: 25 percent in Arizona, 15 percent in Texas, 16 percent in New Mexico, 12 percent in California.
Prosecutors say that the longer a person uses someone else's identity, the more confident the thief becomes using that identity for purposes other than just working. Once they have become established in a community, identity thieves don't want to live in the shadows and seek a normal life like everybody else. That's when they take the next step and get a driver's license, a home loan and health insurance.
"And so that is a natural progression, and that is what we are seeing," said Assistant U.S. Attorney Brent Anderson, who is prosecuting the case against Gutierrez's imposter. Gutierrez first learned her identity had been hijacked when she was turned down for a mortgage more than a decade ago. Now each year she trudges to the Social Security Administration with her birth certificate, driver's license, passport and even school yearbooks to prove her identity and clear her employment record.
She spends hours on the phone with creditors and credit bureaus, fills out affidavits and has yet to clean up her credit history. Her tax records are a mess. She even once phoned the imposter's Kansas employer in a futile effort to find some relief.
Both women claimed they were identity theft victims and sought to get new Social Security numbers. The Social Security Administration turned down the request from Gutierrez, instead issuing a new number to the woman impersonating her. And in another ironic twist, Gutierrez was forced to file her federal income tax forms using a special identification number usually reserved for illegal immigrants.
"It is such a horrible nightmare," Gutierrez said. "You get really angry, and then you start realizing anger is not going to help. ... But when you have so much on your plate and you keep such a busy life, it is really such a super big inconvenience. You have to find the time for someone who is abusing you."
When Gutierrez recently got married, her husband began researching identity theft on the Internet and stumbled across identity theft cases filed against other illegal immigrants working at Reser's Fine Foods, the same manufacturer where Cardona-Gonzalez worked. He contacted federal authorities in Kansas and asked them to investigate the employee working there who had stolen his wife's identity.
The alleged imposter was arrested in August, and her fingerprints confirmed that immigration agents had encountered Cardona-Gonzalez in 1996 in Harlingen, Texas, and sent her back to Mexico. Cardona-Gonzalez did not respond to a letter sent to her at the Butler County jail, where she is awaiting trial on charges of aggravated identity theft, misuse of a Social Security number and production of a false document.
Her attorney, Matthew Works, did not respond to phone calls and emails seeking comment. Court filings indicate the two sides are negotiating a plea agreement. Citing privacy issues, the Social Security Administration declined to discuss the Gutierrez case. Reser's Fine Foods did not return a message left at its Topeka plant.
Anderson expects more cases of total identity theft "because we all know what is going on out there — which is thousands and thousands of people who are working illegally in the United States under false identities, mostly of U.S. citizens, and very little is being done about it. But we are doing something about it, one case at a time."





Saturday, October 20, 2012



A former Internal Revenue Service employee has been sentenced to two years in prison for identity theft and filing fraudulent income tax returns.

George Albright, 57, of Antioch, Tenn., was sentenced last week by a federal judge in in Nashville after he pleaded guilty in May to one count of filing a false tax return and one count of using the identities of others to do so.
Albright was employed by the IRS as a taxpayer service representative from 1995 until March 2012. He admitted that, between February 2008 and January 2011, he used his position as an IRS employee to obtain the names and identifiers of taxpayers from IRS records. He then used this information to file several fraudulent federal income tax returns. Albright directed that the tax refunds from those returns, totaling $9,669.00, be electronically deposited into bank accounts under his control.
In imposing the two-year sentence, U.S. District Judge Todd Campbell noted that Albright, who has no prior criminal history, had engaged in an egregious abuse of the public trust.
“Tax fraud, or any crime committed by a government employee, occupies a high priority for federal investigators and prosecutors in this district,” said U.S. Attorney Jerry Martin in a statement. “Anyone filing a fraudulent tax return and anyone employed in a position of public trust should take note of the prison sentence they risk if they engage in this sort of criminal conduct, even if they have no criminal record. They should also be reminded that there is no parole in the federal system.”
Albright will remain under federal supervision for one year after completing his prison sentence. He was also ordered to forfeit the computer that he used to commit the crimes and will be required to repay the tax refunds he stole.
NOTICE

The IRS does not send taxpayers unsolicited emails about their tax accounts, tax situations or personal tax issues. If you receive such an email, most likely it's a scam.
IRS impersonation schemes flourish during filing season. These schemes may take place via phone, fax, Internet sites, social networking sites and particularly email.
Many impersonations are identity theft scams that try to trick victims into revealing personal and financial information that can be used to access their financial accounts. Some email scams contain attachments or links that, when clicked, download malicious code (virus) that infects your computer or direct you to a bogus form or site posing as a genuine IRS form or web site.
Some impersonations may be commercial Internet sites that consumers unknowingly visit, thinking they're accessing the genuine IRS website, www.IRS.gov. However, such sites have no connection to the IRS.

Consumer Alert

October 2012
Taxpayers should be on the lookout for a new, email-based phishing scam now circulating that targets Department of Defense military members, retirees and civilian employees. The email appears to come from Defense Finance and Accounting Services and displays a .mil email address. The email states that those receiving disability compensation from the Department of Veterans Affairs (VA) may be able to obtain additional funds from the IRS. Email recipients are then asked to send various VA and IRS documents containing their personal and financial information, such as copies of VA award letters or their income tax returns, to an address in Florida.
The information on these documents is then used by the scammers to commit identity theft. Typically, identity thieves use someone’s personal data to empty the victim’s financial accounts, run up charges on the victim’s existing credit cards or apply for new loans, credit cards, services or benefits in the victim’s name.
BOSTON (CBS) – We’ve all heard of identity theft and having our financial information stolen. But now there’s a new, scary twist on this crime.
Thieves are stealing medical identities, and that’s leaving victims with big bills and the potential for medical catastrophes.
It’s called medical ID theft; someone stealing your identification to get expensive health services.
For an average person whose identity is stolen, their exposure is about $2,000. However, someone’s medical identity that is stolen could have an exposure of about $20,000.
“We have 24 counts of fraud on using my social security number for various things, mostly medical identity theft; medical charges,” a college professor named Lisa told WBZ-TV’s Joe Shortsleeve.
Lisa is on the hook for $50,000 for services and drugs obtained in half-dozen states.
“It’s always an emotional burden because you are always on guard and you never know when she is going to strike again,” Lisa said of the woman using her identity.
Christine O’Neill, the FBI’s supervisory agent for health care fraud in Boston told the I-Team that medical ID theft can start with a single stolen wallet, or with organized crime rings breaching huge data systems.
Investigators have seen employees inside health care offices with access to all the patients personal information stealing it, which happened at Health Sports and Rehab physical therapy office in Dorchester.
Court records obtained by the I-Team show Laverne Miskel pled guilty to stealing personal information while interning there.
Owner Andrew Watson said Miskel worked in tandem with a boyfriend on the outside to create bogus checks.
The result can be a financial headache that can take years to untangle. What’s worse is if someone uses your medical information to go get health treatment; that can cause a life or death situation.
If somebody had a different blood type, that information is going to taint your medical history. So in an extreme case, if somebody was in an accident and they go to seek treatment and that blood type has been changed, they could be given a wrong blood type for a transfusion
Making matters worse, Pam Dixon, a nationally recognized expert on medical ID theft, says getting records corrected is next to impossible.
Under the federal privacy law, hospitals are not supposed to give people records that are not about them, and once a thief has used your file, it’s not actually you anymore, even though it is,” Dixon said.
Agent O’Neill believes medical facilities could make one small security change to reap big benefits.
“Ask for somebody’s license and other identifiers when they come to seek treatment,” she suggested.
The FBI says the best way to protect yourself is to shred every health care bill you receive, and to scrutinize those invoices to confirm each charge is for care you receive.
10:06AM EDT October 10. 2012 - WASHINGTON -- More than a quarter-million Medicare beneficiaries are potential victims of identity theft and hampered in getting health care benefits because the government won't issue new IDs, according to an investigation report released today.
Medicare officials say it's too expensive and too many agencies are involved to reissue those numbers to patients victimized by identity theft — about 284,000 beneficiaries, according to a report by the Department of Health and Human Service's inspector general.
Beneficiary numbers are directly connected to a patient's Social Security number, and the government is unable to create a new Social Security number for a patient whose Medicare identity has been stolen, according to the report, which was obtained by USA TODAY.
And beneficiaries can do little more than report abuse of their beneficiary numbers because the government does not provide them with updates about investigations or amend their records with correct billing information. That, investigators say, slows down access to care.
The Centers for Medicare and Medicaid Services (CMS) "should mitigate the damage of medical identity theft by ensuring that beneficiaries retain their access to services if their Medicare numbers have been misused by others," the report states.
Investigators suggested that the CMS, which administers Medicare, place an indicator in breached records or records known to have been used fraudulently so claims processors know when a legitimate claim should go through. The agency agreed to consider that suggestion, the report said.
The report also said the government should find a way to issue new numbers, even if it means moving away from using Social Security numbers.
Investigators also found that though the government has created a database that includes the 284,000 breached or stolen beneficiary numbers, contractors have not received guidance about what to do with that list. In some cases, contractors continue to send out government checks even after the numbers have been compromised.
The government said the system is being fixed now.
Medicare should also correct beneficiaries' billing records when fraudulent activity has occurred, investigators recommended, but the CMS disagreed.
"Our major concern is that CMS's adjustment of beneficiary billing records could have a negative impact on criminal and civil prosecutions and on the underlying integrity of the Medicare claims processing system," wrote Marilyn Tavenner, acting administrator for CMS.
In 2011, the government recovered a record-breaking $4.1 billion in health care fraud money. Between 2009 and 2011, it collected $7.20 for every dollar spent on fighting fraud -- a jump of $5.10 for every dollar spent between 1997 and 2008, according to inspector general reports.

Compromised Medicare identities

The following numbers show cases Medicare classifies as having been involved in identify theft, believed to have been involved in identity theft and vulnerable to identity theft.
Risk level Beneficiaries Providers
High 56,164 1,383
Medium 213,792 3,547
Low 13,616 32
Total 283,572 4,962
Source: Department of Health and Human Services
Events Akron BBB Secure Your ID Day
895 E Tallmadge Avenue
Akron, OH 44310
10/20/12 at 9:00 AM - 12:00 PM
Your BBB along with Neoshred will be providing Free Public Document Shredding at our Fall 2012 Secure Your ID Day. The event will take place on Saturday October 20, 2012 from 9am-12pm at 895 E. Tallmadge Avenue, Akron, OH 44310. This free service is to help promote proper document destruction which is one step consumers should take to protect themselves from possible Identity Theft. Simply bring your documents to the location listed above the day of the event and we will shred them for you on the spot free of charge & provide you with some useful consumer tips as well. There is a limit of 10 boxes/bags per person however if you are going to greatly exceed the limit please contact NeoShred directly at 330 253-8260 to make arrangements.
Sponsored By:
Better Business Bureau & NeoShred
For More Information Contact: Amanda Warner 330-253-4590
awarner@akronbbb.org

Sunday, October 7, 2012

Personal Records Breached

So far this year, government agencies have more than doubled their totals from last year, reaching 9.6 million in just the first five months of 2012. Who knows where we'll be by the end of the year -- or how many innocent people will be exposed to fraud and identity theft due to the negligence of government employees or third-party vendors?
And remember, these are just the breaches we know about. In some states, government agencies are not legally required to publicly report data breaches, or to notify potential victims that their personal information has been exposed. To take one little-known example, local governments in California are exempted from that state's breach notification law -- "a big exception, in my opinion," as Clearinghouse founder and director Beth Givens told us, since local governments "compile a great deal of personal information." Furthermore, out of 268 breach incidents reported since 2009, the 67 of the public agencies responsible (and I use that term loosely) couldn't even figure out how many records were lost. That fact alone will tell anyone with basic math skills and a lick of common sense that this epidemic is much worse than we know.
What's even more astonishing than the total number of personal records breached is how the databases were compromised in the first place. Despite what news reports, urban legend, and simple logic might lead you to believe, sophisticated, premeditated attacks by hackers accounted for only 40 breaches since 2009, a mere 15 percent of the total.


IRS Warnings




Identity Theft Scams

The IRS has issued several consumer warnings about the fraudulent use of the IRS name or logo by scamsters trying to gain access to consumers’ financial information in order to steal their identity and assets. Scamsters will use the regular mail, telephone, fax or email to set up their victims. When identity theft takes place over the Internet (email), it is called phishing.
The IRS does not initiate taxpayer communications through email. Unsolicited email claiming to be from the IRS, or from an IRS-related component such as EFTPS, should be reported to the IRS at phishing@irs.gov.
Additionally, clicking on attachments to or links within an unsolicited email claiming to come from the IRS may download a malicous computer virus onto your computer.

Tax-filing and Payment Extensions Expire Oct. 15; Check Eligibility for Overlooked Tax Benefits; Choose e-file; Payment Options Available

IR-2012-73, Sept. 28, 2012
WASHINGTON — The Internal Revenue Service today urged taxpayers whose tax-filing extension runs out on Oct. 15 to double check their returns for often-overlooked tax benefits and then file their returns electronically using IRS e-file or the Free File system.
Many of the more than 11 million taxpayers who requested an automatic six-month extension this year have yet to file. Though Oct. 15 is the last day for most people, some still have more time, including members of the military and others serving in Iraq, Afghanistan or other combat zone localities who typically have until at least 180 days after they leave the combat zone to both file returns and pay any taxes due. People with extensions in parts of Louisiana and Mississippi affected by Hurricane Isaac also have more time, until Jan. 11, 2013, to file and pay.
Check Out Tax Benefits
Before filing, the IRS encourages taxpayers to take a moment to see if they qualify for these and other often-overlooked credits and deductions:
  • Benefits for low-and moderate-income workers and families, especially the Earned Income Tax Credit. The special EITC Assistant can help taxpayers see if they’re eligible.
  • Savers credit, claimed on Form 8880, for low-and moderate-income workers who contributed to a retirement plan, such as an IRA or 401(k.
  • American Opportunity Tax Credit, claimed on Form 8863, and other education tax benefits  for parents and college students.
E-file Now: It’s Fast, Easy and Often Free
The IRS urged taxpayers to choose the speed and convenience of electronic filing. IRS e-file is fast, accurate and secure, making it an ideal option for those rushing to meet the Oct. 15 deadline. The tax agency verifies receipt of an e-filed return, and people who file electronically make fewer mistakes too.
Everyone can use Free File, either the brand-name software, offered by IRS’ commercial partners to individuals and families with incomes of $57,000 or less, or online fillable forms, the electronic version of IRS paper forms available to taxpayers at all income levels.
Taxpayers who purchase their own software can also choose e-file, and most paid tax preparers are now required to file their clients’ returns electronically.
Anyone expecting a refund can get it sooner by choosing direct deposit. Taxpayers can choose to have their refunds deposited into as many as three accounts. See Form 8888 for details.
Quick and Easy Payment Options
For unemployed workers who filed Form 1127-A and qualified to get an extension to pay their 2011 federal income tax, Oct. 15 is also the last day to pay what they owe, including interest at the rate of 3 percent per year, compounded daily. Doing so will avoid the late-payment penalty, normally 0.5 percent per month.
Taxpayers can e-pay what they owe, either online or by phone, through the Electronic Federal Tax Payment System (EFTPS), by electronic funds withdrawal or with a credit or debit card. There is no IRS fee for any of these services, but for debit and credit card payments only, the private-sector card processors do charge a convenience fee. For those who itemize their deductions, these fees can be claimed on Schedule A Line 23. Those who choose to pay by check or money order should make the payment out to the “United States Treasury”.
Taxpayers with extensions should file their returns by Oct. 15, even if they can’t pay the full amount due. Doing so will avoid the late-filing penalty, normally five percent per month, that would otherwise apply to any unpaid balance after Oct. 15. However, interest and late-payment penalties will continue to accrue.
Fresh Start for Struggling Taxpayers
In many cases, those struggling to pay taxes qualify for one of several relief programs, including those expanded earlier this year under the IRS "Fresh Start" initiative.
Most people can set up a payment agreement with the IRS on line in a matter of minutes. Those who owe $50,000 or less in combined tax, penalties and interest can use the Online Payment Agreement to set up a monthly payment agreement for up to six years or request a short-term extension to pay. Taxpayers can choose this option even if they have not yet received a bill or notice from the IRS.
Taxpayers can also request a payment agreement by filing Form 9465-FS. This form can be downloaded from IRS.gov and mailed along with a tax return, bill or notice.
Alternatively, some struggling taxpayers qualify for an offer-in-compromise. This is an agreement between a taxpayer and the IRS that settles the taxpayer’s tax liabilities for less than the full amount owed. Generally, an offer will not be accepted if the IRS believes the liability can be paid in full as a lump sum or through a payment agreement. The IRS looks at the taxpayer’s income and assets to make a determination regarding the taxpayer’s ability to pay.

If you have any questions in regards to this information please contact:  A Merika Tax Financial and ID Theft Protection  @ 216-744-8126 or visit our website  www.idtheft-amerikatax.com

Details on all filing and payment options are on IRS.gov.


Watch for Identity Theft using Google Alerts

How to Watch for Identity Theft Using Google Alerts.
Google Alerts is a great way to set up a virtual personal watchdog that will constantly look for attempts at identity theft.
This is much better than checking these values by hand periodically, since Google Alerts lets you set it and forget it. You'll be notified as soon as a thief posts your data online for others to use.


1. Know how to set up Google Alerts. Read How to Use Google Alerts if you don't know what to do.

2. Set up Google alerts for your key personal data. Here are some of the alerts you might consider running:
Your name
Your phone number
Your address (home and place of work)
Your date of birth (just to be safe)
Your license plate number
Your drivers license number
Your email address

3.  Read the alerts that Google will email you when the information you listed becomes published anywhere on the web that Google crawls. If any of these alerts are sent to you in a way you think indicates a potential identity theft, take immediate action. Check the link(s) provided in the Google alerts. Look for anything unusual either within the sites you're sent to, or look for a pattern in general relating to the type of sites you're being alerted to (such as financial institutions, sites that hold security information, etc.) Be especially alert if the returns with your personal details suddenly spike. You might get an occasional ping with your personal details from Google Alerts but if you notice a sudden increase in the amount of returns reaching your in-box, this is a cause for concern and should be investigated quickly.

4.  Seek help from a ID Theft Victim Assistance Representative or the local police if you're not sure how to respond to an alert where identity theft appears to have occurred. You may need to respond quickly if it appears that fraud may be happening using your personal details.

Tips:  Be careful about what warnings you set. Because your search history is saved, and Google alerts are sent to your email address, you can inadvertently expose information you want to keep private using these techniques if someone were to access your email. Some things to avoid using in these alerts:
Your social security number
Your credit card numbers 
Your bank account numbers 
Your mother's maiden name, since banks and some other institutions use this as an identity check. Be aware of when you've put your own personal information out there on social networking sites, for domain addresses, etc. Try to be vigilant about checking privacy boxes to keep as much personal information as possible away from public eyes. It is important to refine searches to help Google Alerts be the most efficient in returning the personal information. For example, you can enclose your name or address in quotation marks. You can also use plus and minus signs to narrow the returns to particular terms, names or information.
Warnings:  Be aware that search terms don't always turn up the results you're seeking. This means that you may need to cover a few different ways of inputting your personal information or find some keywords that are good to accompany your personal details. Keep tweaking to get the best results.  Things You'll Need:
Google Alerts
Internet access

Any further information or assistance   Call 216-744-8126  A Merika Tax Financial and ID Theft Protection.   www.idtheft-amerikatax.com



Monday, October 1, 2012

19 Action News

19 Action News CLEVELAND, OH (WOIO) - The identity of a Most Wanted fugitive who stole millions of dollars will be revealed today. Bobby Thompson: Elusive fugitive pleads not guilty in court U.S. Marshals capture elusive fugitive Updated: Tuesday, May 8 2012 4:03 PM EDT2012-05-08 20:03:21 GMTMay 08, 2012 4:03 PM EDT May 08, 2012 4:03 PM EDT Late Monday night, the United States Marshals Service captured one of Americas Most Wanted and elusive fugitives who is accused of stealing millions of dollars that had been donated for the sole purposeMore >> A mystery man who got busted in Oregon then extradited back to Cleveland faced a judge Tuesday and pleaded not guilty to several charges including fraud, theft, and corruption.More >>U.S. Marshal Peter J. Elliott will have a press conference to announce that the fugitive known as "Bobby Thompson" has been positively identified. Thompson, 66, had been one of America's Most Wanted fugitives and the subject of a nationwide manhunt before being caught in Oregon last April. He's accused of scamming millions of dollars out of Ohioans -- money that had been donated for the sole purpose of aiding U.S. veterans. He was listed as one of America's Most Wanted and elusive fugitive. "Bobby Thompson," which was an alias, was on the run for over the last two years where he assumed numerous fictitious names and was known to alter his appearance. He was charged with unlawful flight to avoid prosecution, identity theft, fraud and money laundering. In the early 2000s, the subject, using the alias Bobby Thompson, founded the U.S. Navy Veterans Association (USNVA), a charitable organization whose stated mission was to provide assistance to veterans and members of the U.S. Armed Forces. The USNVA claimed to have a national headquarters in Washington D.C., but its base of operations was the Tampa, FL., area. From its inception to the summer of 2010, it is estimated the USNVA received close to $100 million dollars in nationwide donations. Officials in several states are investigating the USNVA and it is believed little, if any, of the money actually benefited veterans or current service members. In August 2010, "Thompson" was charged in Ohio with various offenses relating to this fraudulent activity. A co-conspirator is currently serving a five year prison sentence in Ohio for her role in this scam after pleading guilty in June 2011. "Thompson", the alleged mastermind of this plot, fled in June 2010, when he learned of the criminal investigation. "Thompson" was featured on America's Most Wanted on two separate occasions, with the most recent being March 2011. Copyright 2012 WOIO. All rights reserved.

Saturday, September 29, 2012

Identity Theft Laws and Your Rights

Although identity theft is an old profession, new identity theft laws are just being introduced. This crime has just recently been raised to new levels of awareness due to its growth and impact on individuals and businesses. New laws are introduced to recognize identity theft as a crime and provide tougher punishment for criminals convicted of identity theft. There are also Federal and State identity theft laws requiring businesses to take certain responsibility for protecting consumer personal information collected in the course of their business transactions. Let's first cover the federal identity theft laws as described in the Federal Trade Commission's web site: CREDIT Fair Credit Reporting Act The Fair Credit Reporting Act (FCRA) establishes procedures for correcting mistakes on your credit record and requires that your record only be provided for legitimate business needs. The Federal Trade Commission (FTC), the nation’s consumer protection agency, enforces the FCRA with respect to consumer reporting companies. The Fair Credit Reporting Act requires each of the nationwide consumer reporting companies – Equifax, Experian, and TransUnion – to provide you with a free copy of your credit report, at your request, once every 12 months to help you detect errors and identity theft. The FCRA promotes the accuracy and privacy of information in the files of the nation’s consumer reporting companies. Fair and Accurate Credit Transaction Act The 2003 addition of FACTA (Fair and Accurate Credit Transaction Act) to The Fair Credit Reporting Act (FCRA) and identity theft laws was intended to fight identity theft. While FCRA was originally created with the objective to promote the accuracy, fairness, and privacy of consumer information in the files of reporting agencies, the FACT Act was specifically intended to fight identity theft by giving consumers certain rights if they become or suspect of becoming an identity theft victim. Fair Credit Billing Act This law establishes procedures for resolving billing errors on your credit card accounts. It also limits a consumer's liability for fraudulent credit card charges to $50. The law applies to "open end" credit accounts, such as credit cards, and revolving charge accounts such as department store accounts. It does not cover installment contracts. Fair Debt Collection Practices Act The Fair Debt Collection Practices Act prohibits debt collectors from using unfair or deceptive practices to collect overdue bills that your creditor has forwarded for collection. Personal, family, and household debts are covered under the Act. Electronic Fund Transfer Act The Electronic Fund Transfer Act provides consumer protection for all transactions using a debit card or electronic means to debit or credit an account. It also limits a consumer's liability for unauthorized electronic fund transfers. Criminal The criminal identity theft laws are tightly related to and directly deal with the identity theft issue. Identity Theft and Assumption Deterrence Act This act is also known as the "Identity Theft Act" and deals directly with the identity theft issue. This law makes it a federal crime when someone: "knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law." Identity Theft Penalty Enactment Act This law was passed on July 15, 2004 when President Bush signed a law requiring tougher punishment for criminals convicted of identity theft. This law increases existing penalties for the identity theft crime, identifies aggravated identity theft as a criminal offense, and establishes mandatory penalties for aggravated identity theft. Privacy and Information Security These identity theft laws relate to certain government agency and private organization responsibilities with regards to personal information privacy and protection: Red Flags Rules The Red Flags rules are the set of identity theft laws that financial institutions and creditors must follow to implement the necessary controls to prevent, detect and respond to identity theft. Driver's Privacy Protection Act of 1994 This law puts limits on disclosures of personal information in records maintained by departments of motor vehicles. Family Education Rights and Privacy Act of 1974 This law puts limits on disclosure of educational records maintained by agencies and institutions that receive federal funding. Gramm-Leach-Bliley Act This law requires the FTC, along with the Federal banking agencies, the National Credit Union Administration, the Treasury Department, and the Securities and Exchange Commission, to issue regulations (to be codified at 16 CFR Part 313) ensuring that financial institutions protect the privacy of consumers' personal financial information. Such institutions must develop and give notice of their privacy policies to their own customers at least annually, and before disclosing any consumer's personal financial information to a nonaffiliated third party, must give notice and an opportunity for that consumer to "opt out" from such disclosure. Health Insurance Portability and Accountability Act of 1996 Also known as HIPAA, this privacy rule regulates the security and confidentiality of patient information. It took effect on April 14, 2001, with most covered entities (health plans, health care clearinghouse and health care providers who conduct certain financial and administrative transactions electronically) having until April 2003 to comply. It requires standards for privacy of individual identifiable health information. Payment Card Industry (PCI) The PCI Data Security Standards (DSS) are explicit guidelines for securing credit card information. MasterCard, Visa, American Express, JCB, and Discover created these standards. These new rules affect any U.S. organization regardless of size that processes, stores, or transmits credit card data. The bank that processes the organization’s transactions may fine an organization that fails to comply with the PCI standards and suffers a data breach. Nonprofit organizations are not exempt.

Wednesday, September 26, 2012

Protect your home for about $1.00 per day with ADT.

More News U Can Use

A wave of refund tax fraud is fueling demand for stolen IDs. Scamsters had tricked the Internal Revenue Service out of $12.1 million worth of refunds using the stolen names and Social Security numbers of 5,108 dead people–likely taken from the Social Security Death Index. But that, as they say, is yesterday’s news. The IRS told Congress during recent hearings that it has set up a new computer screen to flag fraud relating to the tax returns of recently deceased taxpayers and Internet genealogy sites like Rootsweb.com have limited free access to the death index. So it appears there’s some progress, at least, on that front. Meanwhile, the fraudsters are collecting lists of living identity theft victims, either by planting employees in jobs with access to personal data or corrupting employees who already have such jobs. Former federal prosecutor Latour “L.T.” Lafferty, head of the white collar and corporate compliance practice at Florida’s Fowler White Boggs, reports that he has been hired in the past year by two local employers to investigate employee theft of information. In one case, he found, an employee had used her smart phone to take pictures of records. (The iPhone takes such good pictures that you can actually take a picture of your W-2 with it, and have the information entered into Intuit’s TurboTax app.) “The old identity theft,’’ Laferty observes, “was `may we send you a fake email and find out if you’re dumb enough to give me a Social Security number’ or going through your trash.’’ The new trend, he says, is for employees to steal names and numbers in bulk and then use TurboTax or other software to file large numbers of refund claims. (If they get in a bogus 1040 before the real, live taxpayer, or smartly pick the identity of an American who doesn’t have to file, they may be able to get thousands of dollars back.) In testimony last month before a Senate Finance subcommittee, Tampa Police Department Detective Sal Augeri said that after the information about deceased people had run dry, area thieves turned to individuals who worked in local assisted living facilities and then to other businesses, medical offices and schools. Companies with rich personal data on clients, including banks and health care providers, are the most vulnerable, Lafferty says. But other Tampa area businesses have been hit too. One woman running credit checks on customers gave her access to the crucial personal information. She pleaded guilty in December and was sentenced to three years. So just how much of this is going on? Hard to say. IRS Deputy Commissioner for Services and Enforcement Steven T. Miller told the House Oversight and Government Reform Committee last week that the “IRS has seen a significant increase in refund fraud schemes in general and schemes involving identity theft in particular.” With the help of new identity theft screening filters, he said, as of March 9, 2012, the IRS had stopped 215,000 questionable 2011 refunds worth $1.15 billion from going out. How many refunds have gotten through those filters? He didn’t say and the IRS likely doesn’t really know.

Monday, September 24, 2012

Keep Your Home Secure

Call Now: 888-927-3201

Fraudulent Credit Card Applications



Find out how easy it is for a thief to use your information to apply for a department store credit card and purchase a brand new wardrobe on your dollar. Watch how LifeLock identity theft protection services can help keep you protected. Identity thieves have multiple ways they can steal your personal information and use it to open credit cards, take out loans and even commit crimes in your name. The effects could be devastating. All an identity thief needs is a small amount of your personal information, like your Social Security number and name.
Luckily, LifeLock can help. LifeLock is the industry leader in identity theft protection. The LifeLock team of identity theft protection specialists can help stop identity thieves using advanced technology and services. Watch them in action now and see why industry-leading protection is just what your identity needs.

Visit www.idtheft-amerikatax.com and sign up today for the ultimate protection offered.  Protect yourself and your family for just pennies a day!!
For further information Call 216-744-8126
A Merika Tax Financial and ID Theft Protection

Sunday, September 23, 2012

IRS Installment Agreement

ABOUT THE
INSTALLMENT
AGREEMENT
Are you earning a good living but just
unable to pay your back taxes?
The Installment Agreement
may be the option.
The Installment Agreement allows taxpayers to pay their tax debt over time by making manageable payments. The Installment Agreement can put you back in control of your financial future.
                      Call to learn more about this program
A Merika Tax Financial and ID Theft protection
216-744-8126 or 216-744-8697
email: info@idtheft-amerikatax.com

Tuesday, September 18, 2012

VFW 2850 schedules seminar on identity theft, frauds and scams with emphasis on seniors
Cleveland, OH – Are you up on the current issues of identity theft?  On Friday the VFW Post 2850 will sponsor an hour-long conversation about identity theft, fraud and scams with a special emphasis on senior adults and veterans.
This community-wide event is scheduled for  this Friday, September 21, at 6 p.m. The event will be held at VFW Club on West 61st Street Cleveland, OH 44102
About 15 million U.S. residents have their identities used fraudulently each year. Many identity thieves target the elderly. According to the Federal Trade Commission “only about 8 percent of victims ever report this crime.”
John Meehan of "A Merika Tax Financial and ID Theft protection" will host the event, drawing from his years of  experience in dealing with tax issues involving fraud, fraud and identity theft. Snacks will be available and door prizes will be offered.
E-mail  info@idtehft-amerikatax.com
Friday  09/21/2012
VFW Post 2850 , 3260 W 61st Street, Cleveland, OH  44102
is sponsoring a FTC Identity Theft Seminar,
Community  awareness on current issues involving  identity theft.
No, It couldn’t happen to me!!
 Time:  6pm to 7pm…..  1.00 registration fee at the door……..  Open to the public

Identity Theft

Wednesday, September 12, 2012

FTC Announcement

The Federal Trade Commission announced in March 2012 that identity theft was the No. 1 complaint received by the agency in 2011.

Fastest Growing Crime in America

Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!

Tuesday, September 11, 2012

Elderly and Senior Citizens Identity Theft Issues

Elders and ID Theft
  • Fourteen residents at two Northern Kentucky nursing homes couldn’t figure out why they were being billed for large-screen televisions, clothes dryers, and hundreds of thousands of dollars in electronics. It turned out that employees had stolen their identities and got credit cards in their names. One of the thieves had prior arrests for theft, domestic violence, and drug charges but had been hired using someone else’s stolen identity.
  • An aide in an assisted living facility stole the identity of an 89-year-old resident and used it to run up over $3,500 in fraudulent credit card charges for jewelry, furniture, and clothing. She also wrote checks to herself from a bank account belonging to the victim and diverted the woman's mail from the facility to her own home. • After a home care provider was charged with felony residential burglary, felony elder abuse, false imprisonment, and preventing her elderly client from seeking help by cutting his phone line, it was learned that she’d been working for the last six months under the name of her sister, a certified home care provider. The offender had a previous conviction and had served jail time under her sister’s name.
  • In 2004, hackers gained access to a database that contained the names, addresses, telephone and Social Security numbers, and birth dates of 1.4 million recipients of In-Home Support Services in California. The data was being used for research purposes by the University of California, Berkeley. Although investigators haven’t determined if the personal information has been misused, the California Department of Social Services, which operates the program, has encouraged all recipients to obtain credit reports to make sure that they haven’t been victimized. Because it took a month to detect the compromise, it’s unlikely that the culprits will be found.
Although research indicates that elders are at no greater risk of identity theft than non-elders, the scenarios above suggest why elders may be vulnerable to certain forms of ID theft. Linda Foley, executive director of the San Diego-based Identity Theft Resource Center, has suggested other reasons:
  • Many hospitals and nursing homes use patients' Social Security numbers as identification information; some even print the numbers on patients’ wristbands.
  • Many seniors carry their Medicare cards, which include Social Security numbers, with them in case of emergency.
  • Seniors are more susceptible to muggers because of frailty.
There’s also the issue of access. Elders with disabilities are likely to have in-home helpers, including personal care attendants, friendly visitors, meal services, etc. The current shortage of in-home helpers has resulted in more seniors hiring “independent providers” directly from newspaper ads or referral services. These workers, who are less likely to have been screened or to be supervised by agencies, have access to elders’ homes, property and documents. Police are also reporting that more attendants are working under assumed names.
The families of the deceased are particularly vulnerable. According to the Identity Theft Resource Center (2007), thieves watch obituaries, steal death certificates, and obtain information about the deceased from Social Security Death Index files. Because the Social Security Administration does not promptly transmit Death Master Files to financial institutions, accounts and credit files may stay open for years. Thieve access the accounts, leaving surviving spouses or other family members with debt or other problems. Family members of deceased persons may also commit ID theft. This is particularly like when the deceased suffered from lengthy illnesses or if there was conflict prior to the death.
The Web site of Michigan’s attorney general describes a case involving three people who were arrested for stealing the identities of more than 100 decedents. One of the alleged perps worked in a hospital emergency room and sent text messages containing dying patients’ personal identifying information to her grown son, which he and his wife used to get credit cards. They also used information they found in obituaries to conduct research on the hospital's database.
An AARP-commissioned study, which used Federal Trade Commission (FTC) complaint data from 2001, found that complainants age 50 and older were more likely than younger people to report certain ID theft crimes (Walters & Jackson, 2003):
  • Fraudulently using a complainant's existing credit card account
  • Fraudulently establishing a new credit card account in the complainant's name
  • Fraudulently opening a wireless account in the complainant's name
  • Fraudulently using a complainant's information to commit check fraud
  • Fraudulently taking out a personal or business loan in the complainant's name
  • Stealing a complainant's identifying information and using it in unsuccessful attempts to commit fraud
Seniors have also been shown to be less likely to take steps to prevent ID theft or mitigate its impact. An AARP study found that seniors are less knowledgeable than others about tools to protect their financial identities and reduce their risk of victimization, despite the fact that many are very fearful of being victimized.

Visit us at the VFW for this event on 09/21/2012


Monday, September 10, 2012

A federal court in Central Islip, N.Y., has permanently barred a tax preparer who allegedly claimed improper Indian Employment Tax Credits for her clients.


Diana D. Bertocci-Aliffi was barred from preparing federal tax returns for others, the Justice Department said Friday. The civil injunction order, to which Aliffi agreed without admitting the government’s allegations, was signed by Judge Joanna Seybert of the U.S. District Court of the Eastern District of New York.
The government complaint in the case alleged that Aliffi, of East Rockaway, N.Y., claimed false Indian Employment Tax Credits for customers who were not eligible for the credits. The IETC is a credit for employers of certain qualified employees who are or whose spouses are members of an enrolled Indian tribe. It is not a credit for Native Americans who have no qualified employees.
Advertisement
According to the complaint, Aliffi falsely told her clients, many of whom lived on or near the Shinnecock Indian Reservation in Southampton, N.Y., that they were eligible for the credit simply because they were Native Americans and lived on or near a reservation. Aliffi allegedly prepared federal income tax returns for these customers and improperly claimed the IETC on the returns. Aliffi also allegedly fabricated wage income and tax withholding on other customers’ tax returns in order to obtain larger tax refunds.
The government complaint alleged that Aliffi was incarcerated from February to August 2009 after pleading guilty in a New York state court to 76 counts of grand larceny, identity theft and forgery related to her tax preparation activities. According to the complaint she had stolen her clients’ personal information to file false federal and New York State tax returns, applied for refund anticipation loans using the false returns, and then diverted part of those loans to her own bank accounts.

Sunday, September 9, 2012

IRS Overwhelmed on Tax Fraud Identity Theft


It’s nerve racking to realize that the IRS increasingly struggles to control taxpayer identity theft. Since 2008, the IRS has identified 470,000 incidents of identity theft affecting more than 390,000 taxpayers. “Victims of tax-related identity theft are the casualties of a system ill-equipped to deal with the growing proficiency and sophistication of today’s tax scam artists” said  Sen. Bill Nelson, who chairs the newly formed Subcommittee on Fiscal Responsibility and Economic Growth.
Identity theft harms innocent taxpayers through (1) employment and (2) refund fraud, according to the GAO. In refund fraud, an identity thief uses a taxpayer’s name and Social Security number to file for a tax refund, which the IRS discovers after the legitimate taxpayer files. In the meantime, the victim is out the money due her, causing Sharon Hawa of the Bronx, N.Y. to take on a second job. Ms. Hawa testified before the Subcommittee, describing how she had become an ID theft victim for the second time in three years (the first in 2009) after thieves twice filed tax returns in her name and received her tax refunds. Painstakingly proving her identity to the IRS, time after time over a 14-month period, was only a small part of the stress and utter frustration in the first fraud.  And  then, as if that trauma hadn’t sufficiently wreaked havoc in Ms. Hawa’s life, it happened a second time.
In employment fraud, an identity thief uses a taxpayer’s name and SSN to obtain a job. When the thief’s employer reports income to the IRS, the taxpayer appears to have unreported income on his or her return, leading to enforcement action. Think of your stress level when you open that envelope from the IRS demanding taxes for money you didn’t earn and don’t have!
The GAO states that the IRS’s ability to address identity theft issues is constrained by several factors, one being that privacy laws limit the sharing of ID theft information with other agencies. Another problem is the timing of fraud detection efforts; more than a year may have passed since the original fraud occurred.  The resources necessary to pursue the large volume of potential criminal refund and employment fraud cases are another constraint.
It’s imperative that we taxpayers take responsibility and implement the steps necessary to protect ourselves. There is very little that is more damaging and dangerous to your identity than losing your tax records. After all, tax records generally contain the most sensitive personally identifying information that you own, including Social Security Numbers (for you, your spouse and maybe even your kids), names, addresses, employers, net worth, etc. Because of this high concentration of sensitive data, tax time is like an all-you-can-eat buffet for identity thieves. Here are some of the dishes on which they greedily feed:
·         Tax documents exposed on your desk (home and work)
·         Private information that sits unprotected in your tax-preparer’s office
·         Improperly mailed, emailed and digitally transmitted or filed records
·         Photocopiers with hard drives that store a digital copy of your tax forms
·         Copies of sensitive documents that get thrown out without being shredded
·         Improperly stored and locked documents once your return is filed
·         Tax-time scams that take advantage of our propensity to do whatever the IRS says (even if it’s not really the IRS asking)
Your tax returns are the Holy Grail of identity theft because they contain virtually every piece of information a tax fraudster needs to BECOME you. But you don’t have to be a victim; you simply need to take responsibility for what is rightfully yours – your identity.