Fake IDs, Fake Passports Easy To Make or Buy

Robert Siciliano Identity Theft Expert

Fake IDs aren’t just a tool to get in a bar, they are a significant threat to personal security and national security.

Who in their teens and college years didn’t have a fake ID? I did.

At 17, I was 23! That meant I could buy alcohol, go to bars and take others to “R” rated movies. It also meant I was a ROCK STAR. For a minute.

A friend of mine peeled apart Massachusetts IDs and melted crayons together to create colors that matched the IDs colors. He would apply the crayon to the face of the ID and alter the persons age. For example if you were born in 1968, he would color the left side of the 8 the same color as the ID making it a 3. 1963 gave you five extra years to party!!

Then he’d just seal it back up and voila! You were a ROCK STAR.

CNN reported the Government Accountability Office did a test. An investigator used a fake ID to get a real passport. Once he had the passport he bought an airline ticket and went through security. How stupid big is that hole in security?

Former DHS Secretary Chertoff said, and I agree; “I’m going to submit to you that in the 21st Century, the most important asset that we have to protect as individuals and as part of our nation is the control of our identity, who we are, how we identify ourselves, whether other people are permitted to masquerade and pretend to be us, and thereby damage our livelihood, damage our assets, damage our reputation, damage our standing in our community.”

The problem here is the speed of technology has far outpaced the security of our identifying documents. Anyone with a computer, scanner, printer, laminators and for crying out loud CRAYONS can create breeder documents getting real IDs.

This makes it very difficult to prevent identity theft when anyone can be you any time.

What contributes to the problem is there are thousands of variations of birth certificates, dozens of social security cards and a couple hundred different drivers’ licenses in circulation. Very little security and no significant standards preventing counterfeiting. I’m sure plenty will argue this point with me, however the fact remains, fake IDs are everywhere.

Identity theft protection becomes very difficult.

While technology certainly exists to properly identify and authenticate through numerous technologies, privacy advocates and ignorant politicians will fight till the death to prevent their implementation for 2 reasons; 1. Cost, which is a naive argument. 2. Privacy issues.

Cost; spend whatever it takes to properly identify and authenticate. Privacy; is DEAD. Security is the issue we need to be concerned about. Manage out circumstances and tighten things up. The UAE has an “Identity Card” in place that is the best active solution I’m aware of.

There are hundreds of solutions being proposed every day, but cost and privacy continue to creep up. One argument some have is technologies such as RFID and biometrics are the equivalent to the Mark of The Beast. That just goes right over my head.

The Real ID Act has been passed, slammed and revisited. It is the first step towards effective authentication. Fight it as you might, its coming.

Robert Siciliano Identity Theft Speaker discusses Identity Theft and the rampant use of Social Security numbers Here

I’m excited to work with uni-ball in 2009 in a partnership to help raise awareness about the growing threat of identity theft and provide tips for protecting yourself. Check out uniball-na.com for more information

Identity Theft Expert and MyLaptopGPS Note That Rise in Security Technology Spending Needs to Encompass Laptop Computers

(BOSTON, Mass. – March 13, 2009 – IDTheftSecurity.com) Research announced in March shows that IT spending on so-called Identity and Access Management (IAM) technologies is set to grow at a compound annual growth rate of nearly 30 percent. Widely televised and quoted personal security and identity theft expert Robert Siciliano observed that this IAM spending needs to encompass the security of portable computing assets. He directed organizations of all kinds to laptop tracking and data retrieval technology from laptop computer security firm MyLaptopGPS.

“Perhaps the easiest point of entry for identity thieves seeking to steal information is the mobile computing device,” said Siciliano. “Typically a cinch to steal, laptop computers are often home to valuable data. IT departments concerned with managing identities and access on their systems are therefore remiss to neglect their fleets of mobile computing equipment; smart organizations in fact restrict the use of their laptops — and track them.”

CEO of IDTheftSecurity.com and a member of the Bank Fraud & IT Security Report‘s editorial board, Siciliano leads Fortune 500 companies and their clients through presentations that explore security solutions for businesses and individuals. Author of “The Safety Minute: 01” and a longtime identity theft speaker, he has discussed data security and consumer protection on CNBC, NBC’s “Today Show,” FOX News Network, and elsewhere.

IAM known as “provisioning” recently accounted for approximately 60 percent of global IAM market revenue, according to a press announcement regarding an associated report by the industry research firm RNCOS. User provisioning, as defined by RNCOS, is a type of identity management software whereby users may be represented by multiple objects on multiple systems in a computer database.

This projected increase in IAM spending is in response to rising concern over identity theft and data breaches, RNCOS noted. For instance, during the six months immediately preceded February of 2009, the illegal trade of personal information in online chat rooms increased by approximately 25 percent, according to research from Affinion Security Center, whose press announcement noted a 50 percent year-over-year increase in identity theft complaints reported to the Federal Trade Commission in 2008.

“With an explosion in the use of mobile computing devices, sensitive data is bound to find its way onto them,” said MyLaptopGPS’ chief technology officer, Dan Yost, who invited readers to visit the MyLaptopGPS blog. “In other words, the spike in identity theft only makes sense. But the reality must change, and simple measures for laptop computer security can slow, even reverse, the trend.”

The theft rate for laptop computers equipped with MyLaptopGPS is just 0.4 percent, or 32 times lower than the average. Additionally, Yost pointed to SafeRegistry™, a comprehensive system from MyLaptopGPS for inventorying entire fleets of mobile computers, as well as a full line of highly renowned SafeTags™, which are police-traceable property tags designed to secure iPods™, cell phones, BlackBerry™ devices and other mobile property.

Yost’s expertise has been featured twice in CXO Europe. Furthermore, in December of 2008, he and Siciliano co-delivered a presentation titled “Information in the Modern Age: Maintaining Privacy in an Era of Medical Record Identity Theft” at the 4th Annual World Healthcare Innovation & Technology Congress in Washington, D.C., where Former U.S. Congressman Newt Gingrich delivered the keynote address.

Readers who belong to LinkedIn® are encouraged to join the MyLaptopGPS group there. Featured in Inc. Magazine and TechRepublic, MyLaptopGPS maintains the Realtime Estimated Damage Index (REDI™), a running tally of highly publicized laptop and desktop computer thefts and losses and these losses’ associated costs. A log of these high-profile laptop thefts is available at MyLaptopGPS’ website.

Readers may download a demo of MyLaptopGPS. They also have the opportunity to read one of two reports tailored to the type of organization they run.

MyLaptopGPS combines Internet-based laptop GPS tracking with other functionalities to secure mobile computing devices. A user launches MyLaptopGPS’ features remotely, protecting data even while the machine is in a criminal’s hands. Once connected to the Internet, the software silently retrieves and then deletes files from machines as it tracks the stolen or missing hardware — at once returning the data to its rightful owner and removing it from the lost mobile computing device.

YouTube video shows Siciliano on a local FOX News affiliate discussing the importance of securing mobile computing devices on college campuses, where laptop theft can run rampant. To learn more about identity theft, a major concern for anyone who’s lost a laptop computer or other mobile computing device to thieves, readers may go to video of Siciliano at VideoJug.

###

About MyLaptopGPS

Celebrating 25 years in business, Tri-8, Inc. (DBA MyLaptopGPS.com) has specialized in complete system integration since its founding in 1984. From real-time electronic payment processing software to renowned mid-market ERP implementations, the executive team at MyLaptopGPS has been serving leading enterprises and implementing world-class data systems that simply work. With MyLaptopGPS™, Tri-8, Inc. brings a level of expertise, dedication, knowledge and service that is unmatched. MyLaptopGPS™’s rock-solid performance, security, and reliability flow directly from the company’s commitment to top-notch software products and services.

About IDTheftSecurity.com

Identity theft affects us all, and Robert Siciliano, CEO of IDTheftSecurity.com and member of the Bank Fraud & IT Security Report‘s editorial board, makes it his mission to educate Fortune 500 companies and their clients. A leader of personal safety and security seminars nationwide, Siciliano has been featured on “The Today Show,” CNN, MSNBC, CNBC, “FOX News,” “The Suze Orman Show,” “The Montel Williams Show,” “Maury Povich,” “Sally Jesse Raphael,” “The Howard Stern Show,” and “Inside Edition.” Numerous magazines, print news outlets, and wire services have turned to him, as well, for expert commentary on personal security and identity theft. These include ForbesUSA TodayEntrepreneur, Woman’s DayMademoiselleGood HousekeepingThe New York TimesLos Angeles Times,Washington TimesThe Washington PostChicago TribuneUnited Press InternationalReuters, and others. For more information, visit Siciliano’s Web site,blog, and YouTube page.

The media are encouraged to get in touch with any of the following individuals:

John Dunivan

MyLaptopGPS Media Relations

PHONE: (405) 747-6654 (direct line)

jd@MyLaptopGPS.com

http://www.MyLaptopGPS.com

Robert Siciliano, Personal Security Expert

CEO of IDTheftSecurity.com

PHONE: 888-SICILIANO (742-4542)

FAX: 877-2-FAX-NOW (232-9669)

Robert@IDTheftSecurity.com

http://www.idtheftsecurity.com

Brent Skinner

President & CEO of STETrevisions

PHONE: 617-875-4859

FAX: 866-663-6557

BrentSkinner@STETrevisions.com

http://www.STETrevisions.com

http://www.brentskinner.blogspot.com

Mom Was Wrong. Strangers Good. People We Know Bad.

Robert Siciliano Identity Theft Speaker

An axiom in business is that we buy from and do business with those who we know like and trust. In the 21st century we have seen CEOs, investment bankers, politicians and those in the highest positions of trust completely screw everyone who put them on their pedestal.

Madoff pleads guilty for orchestrating a 65 billion dollar Ponzi scheme and 3 rows of investors in attendance at his trial clapped, applauded and sang. These are people that bestowed an incredible amount of money in a man that is probably a psychopath.

What does this say about us as a species that trusts so much?

Charles Ponzi began his scheme 100 years ago and was caught 10 years later. The SEC stepped in and stopped him. The SEC didn’t stop Madoff. They allowed him to prosper, until his operation imploded.

Growing up most of us were schooled on “Stranger Danger” because our parents were also told not to talk to strangers. Strangers are “strange” therefore dangerous. At least that seemed to be the theory. Unfortunately I’ve seen all too often that people we know are sometimes the baddest apples in the bunch. Kids coaches, swim teacher, clergy etc.

In a Wall Street Journal article Bruce Schneier makes the point that people are over all good and generally honest. So approaching a stranger probably wouldn’t mean imminent danger. Basically true.

On the other hand if someone pursues or approaches you, they are essentially paying unwanted attention to you, or distracting you from the truth. Maybe getting ready to take advantage of you in some devious way.

We see this all the time when law enforcement sets up a 14 year old female named Dixey14 in a chatroom and she’s (or he) is quickly approached by 50 men with webcams snapping pictures of themselves. So in this sense talking to strangers is bad. Video Here

Nigerian identity theft 419 scams are based on one single principle to be successful; get to know your mark, get them to like you and they will trust you. Done. They start off a stranger, then become their victims night in shining armor coming to your emotional (and financial) rescue. Scambaiter video Here

I’ve talked over and over about insiders at a company maliciously hacking away at the network and stealing data. They aren’t strangers, they are the funny drunk dudes at the Christmas party.

You want to prevent being scammed? Prevent Data theft? Prevent identity theft? Prevent being hacked?

Do not exclusively rely on any one system to protect you. Don’t expect the government and their bazillion bureaucratic agencies to protect you. Don’t think law enforcement or any other authoritative agency will be there when a predator strikes.

All existing systems work often, and fail as much.

Security is about layers. The more layers of protection you have in place, the more difficult you make it for the bad guy to get access. Redundancy, predictive, proactive thinking.

Someone pour me a scotch. Single malt.

Oh, and I’m very excited to work with uni-ball in 2009 in a partnership to help raise awareness about the growing threat of identity theft and provide tips for protecting yourself. Check out uniball-na.com for more information

Robert Siciliano Identity Theft Expert Discussing Bernie Madoff Con Man Here

Criminals Target ATMs to Steal Vital Personal Financial Information From Customers

Robert Siciliano Identity Theft Expert Speaker

Skimming is one of the financial industry’s fastest-growing crimes, according to the U.S. Secret Service. Also, the worldwide ATM Industry Association reports over $1 billion in annual global losses from credit card fraud and electronic crime associated with ATMs.

Skimming is a relatively low tech crime. It can occur in a few different ways. The most common is when a store clerk takes a wedge card skimmer

and runs your card through and skims the information off the magnetic strip.

Once the thief has the credit or debit card data they can place orders over the phone or online.

They can also rip the data from the wedge and burn to blank “white” cards. These white cards are effective at self checkouts or when the thief knows the clerk and they “sweetheart” the transaction. These white cards can also be pressed with foils to look like a legitimate credit card.

Then there is a more sophisticated skim. Thieves actually place a hard device on the face of the ATM that looks like the ATM. It’s almost impossible for a civilian to know the difference unless they have an eye for security, or the skimmer is of poor quality.

Often the thieves will mount a small pinhole camera on the side of the ATM in a brochure holder to extract the victims pin number.

Its not just ATMs that are potential marks, gas pumps are just as vulnerable. See video of me discussing Here and another article Here

ADT Unveils Anti-Skim Tool

ADT has a new technology that prevents ATM of skimming. I haven’t seen it yet, but it sounds promising. The ADT Anti-Skim™ ATM Security Solution helps prevent skimming attempts and detects skimming devices on all major ATM makes and models.

ADT’s anti-skim solution is installed inside an ATM near the card reader, making it invisible from the outside. The solution detects the presence of foreign devices placed over or near an ATM card entry slot, without disrupting the customer transaction or operation of most ATMs. Also, the technology helps prevent card-skimming attempts by interrupting the operation of an illegal card reader.

The ADT Anti-Skim ATM Security Solution:
• Helps protect the integrity of cardholders’ personal financial information during ATM transactions.
• Can trigger a silent alarm for command center response and coordinate video surveillance of all skimming activities.
• Requires no software adjustments to the ATM.
• Does not connect to or affect the ATM communications network.
• Has more than 40,000 successful ATM applications worldwide.

Prior to its North American introduction, the ADT Anti-Skim ATM Security Solution was successfully field tested on dozens of ATMs of four major U.S. financial institutions in controlled pilot programs. Testing pilots yielded positive results, with no known skimming compromises occurring.

Again, I haven’t seen it. But would like a first hand demonstration. ADT, Have your peeps call my peeps.

Robert Siciliano Identity Theft Expert discussing ATM skimming Here

Recession Turns IT Workers Into Hackers

Robert Siciliano Identity Theft Expert

What a nasty headline for an article.

From ABCnews.com the journalist roasts IT professionals on a spit. And the comments were all inspiring.

As the recession rears its ugly head, disgruntled ex employees are in the best position to drop a bomb in the companies network or suck all the data out with a few terabyte drives.

A recent study by McAfee and Purdue University put the tally of fraud, data loss and damage done at 1 trillion dollars. A thousand billion sounds like a lot of money.

To paraphrase some of the comments;

No matter how you look at it, when heads start to roll, most people that are about to be let go feel unjust and express hostility towards the employer (often, rightly so). These are the same people who were loyal company employees for years. Unfortunately, these are no win-win situations when it comes to the downsizing and companies should take proper actions to address it.

Your system admin is the gate keeper. Anyone who has access to sensitive data can potentially abuse the privilege. The loan officer, the loan processor, the secretary, the human resources gal two cubes down the hall, the cleaning people that take out our trash at night… Without proper controls in place anybody can be the bad guy. On the other hand, with adequate management these issues can be avoided, even when it comes to IT employees.

Manage your end points, your USB devices, your computer ports, your printers… Segregate your system administration roles. Tools are there. And who is going to implement them? Your IT guy. (thank you Sashimi11)

With the incredible amount of layoffs occurring, companies are bound to layoff an employee who will exact some revenge. Some say “Companies whose knee-jerk response is to cut costs by canning employees deserve some wrath”. But, in the end, the wrath doesn’t get you your job back. (thank you Patches777)

Most are working individuals, doing what they do best. All the while staying under the radar, and afraid, just like everyone else, of the threat of layoffs. The latter doesn’t mean an internal flip is switched and they bug out and start stealing trade secrets. (thank you kyleratliff)

On another note, as budgets are cut and IT pros are let go, the show must go on.

Bill Lynch of RazorThreat said to me “We are encountering lots of very frustrated CIO’s who are caught on the horns of a dilemma…their IT budgets and headcount are being slashed but their CEO’s are simultaneously demanding that they reassure them and the Board of Directors that they are not vulnerable to the same kinds of cyber attacks that have plagued some big firms lately.

They know they cannot afford to buy complex, expensive and difficult to deploy new security software and the people to manage them and yet they have to stand before the Board and profess that their networks are secure”.

The fact is, data breaches will continue and IT will often be to blame. There is a light at the end of the tunnel. There are numerous technologies that won’t break the bank and will keep the BOD happy. Companies have to consider numerous threats of theft and mayhem. Review security policies and who has access to what and why. In the end make sure employees are let go with dignity and respect.

Robert Siciliano Identity Theft Speaker discussing Credit Card Fraud Here

Neighborhood Identity Thieves From Hell

Robert Siciliano Identity Theft Expert Speaker

Keep your friends close and your enemies closer. Unfortunately your enemies could be living in your home or across the street. As the economy tanks, people get desperate and thieves victims become those in their lives.

With all the hullabaloo about criminal hackers and identity thieves organizing as webmobs from all over the world, people often forget that it’s the people in our lives that are the closest to us who often perpetrate these crimes.

Especially in tough times, identity thieves could be someone in your inner trusted circle. I’ve consulted on stories where the dad stole his child’s identity. Those closest to us at home or work have direct access to our data.

“Familiar” Identity theft happens because the thief goes through a process of rationalizing their ability to commit the crime. The process is often referred to as the “Fraud Diamond”.

First they have Incentive. They say “I want to or have a need to commit this crime”. Next is Opportunity. They see a hole or weakness in the system they can easily exploit. And of course Rationalization; “I have convinced myself it is worth the risks”. Lastly, Capability; they determine they are the right person for the job and can pull off the scam.

Here a local neighborhood was terrorized by a drug addicted mom and dad who had a penchant for technology and used their skills to feed their habit.

Much of the crimes they committed could have been prevented.

1. Get a credit freeze or fraud alert
2. Invest in a locking mail box
3. Shred all throwaway paper work
4. Turn off the paper
5. Turn on WPA security for your wireless network
6. Pay attention to all your statements and refute unauthorized charges
7. As a national spokesperson for uni-ball, I recommend using a uni-ball® pen, which contains Uni “Super Ink” formula, to write checks and sign important documents. This specially-formulated ink won’t wash out and protects against check washing. Those closest to you have access to your canceled checks and can rewrite to themselves.

Robert Siciliano Identity Theft Speaker Expert discussing family identity theft Here

Twitter Is a Security Mess

Robert Siciliano Identity Theft Speaker Expert

Mischievous Hack attacks on Twitter are increasing and it seems there is no end in sight. While twitters developers are working to make it more secure, the open nature of the application fuels mischievous and even criminal hacking.

Twitter is microblogging. In 140 characters or less you tell your followers what you are doing or point them towards something that may enhance their lives. Most Tweeple are twits and say nothing of value. Their tweets are mundane and serve no benefit to anyone.

If you don’t use Twitter thats OK. But there is a chance you eventually will. Many thought they’d never use Facebook, but millions do. Micro blogging is a weird phenom that makes sense to many, and not at all to most.

Users can get tweets via email, on your phone or via SMS texts. People have sent tweets while giving birth, in the crowd watching the Obama inauguration, celebrating New Years, and just about anything you can think of.

I’m on Twitter. I spend my energies informing my readers about security. The most effective tweets have a pithy title related to an article, blog post or TV appearance. All security related.

Since Twitters inceptions hundreds of 3rd party applications have been built around Twitter. Apps that enhance, manage or are just for fun. Much of twitters technology is an open book which has allowed hackers both good and bad to build these apps, and of course wreak havoc.

One such hack is using a Twitter accounts mobile phone number to spoof messages to the users followers.

Other Twitter hacks have included full account take over where messages were sent to all followers of Obama, Britney Speakers, Fox and a CNN anchor.

Recent studys also show that Twittersquating, when brand names are hijacked is also a problem on Twitter

So if you decide to Twitter, know that its not very secure and be cautious about plugging your mobile number into the system.

Robert Siciliano Identity theft Speaker Expert discussing Scams Cons and Schemes Here

Identity Theft Tax Time Scams

Identity Theft Speaker Expert Robert Siciliano

We are approaching tax time. Scammers are ramped up and looking for your money. Learn these tips and watch your back. Protect and prevent Identity Theft.

1. Text messaging scams or Phexting Like phishing but texting); Criminal hackers have access to technology that generates cell phone numbers and access to mass text messaging services. They send texts that install keyloggers or direct you to websites that steal your data.

2. Tax Preparer Scams; Reports of tax preparers who tell their clients they have to pay back their 2008 stimulus checks, then pocket the money

3. Basic Phonescams; Using the telephone for scams is back. Scammers call your home posing as local fire dept collecting your personal information for their records in case their is an emergency

4. Caller ID Spoof; New technologies that allow anyone any time to mask what shows on your caller ID and pose as an official, lottery or authority to get you to reveal data or write checks.

5. Late Payment Scam; As people fall behind on their utilities or taxes, lists are created and available either internally or as public record. These lists fall into the wrong hands and thieves call you to collect.

6. Affinity Fraud; The Madoff scandal has inspired a new generation of cons to adopt the Ponzi once again

7. Advanced Fee Fraud; Now more than ever if it seems to good to be true it is. Desperate times mean desperate people are making bad decisions and getting taken to the cleaners

8. Work at Home Scams; Millions of people laid off, millions looking for a job. There isnt a newspaper in the country that doesnt have a work at home scam ad.

9. Foreign lottery scams; The promise of money is overseas, not here at home and criminals are using the phone, email and snail mail to find their victims.

10. Identity Theft; Identity theives raised the bar in 2008 and ID Theft went up 22%. It will go up again in 2009.

11. Check Washing; Checks lost, stolen, pulled from the rubbish, stolen from your home or the entity you wrote it to are equal to cash when they are written with a pen that the ink washes out of.

Check washing is almost a billion dollar problem. I’ll have a video for you soon on this.

Uni-ball pens makes a cool pen that prevents “check washing”. Check washing is using household chemicals that literally wash the ink out of the paper, but the thief will leave your signature in place or do other things to reissue the check and get themselves paid.

Uni-ball pens with Uni-Super Ink help prevent identity theft,” Says Steve Gradman, who is senior brand manager of uni-ball. Their goal is to help ease the minds of individuals when writing sensitive materials – from legal and medical documents to checks and tax forms. It’s a simple, inexpensive pen, but it packs a lot of punch when it comes to identity theft prevention.”

As an advocate for uni-ball, I will happily be sharing many more exciting product offerings designed to help your business and your family protect yourselves! Have a question about identity theft, Email me!”

Who knew a pen packed a punch! Cool! I say if you can stop “check washing” with a pen for a few bucks then thats a smart investment.

I got a pen (a few actually, a couple in the home office, one in the kitchen, one in the car, 2 in my laptop bag because I’m always losing them when I travel.) I’ve known about check washing but haven’t seen lots of reports on it, because banks don’t like talking about it and the victims are embarrassed by it. So its not often reported in the media.

I found him on Twitter if you tweet.

When a scammer tries to wash or lift the inked information written on the document, the ink remains “trapped” within the fibers of the paper, thereby discouraging the efforts of identity thieves.

THIEVES INITIATE NEW IDENTITY THEFT SCAMS IN TIME FOR TAX SEASON

uni-ball® teams with Identity Theft Resource Center and Identity Theft Expert Robert Siciliano to Warn Consumers of Latest Scams and Offer Anti-Theft Solutions 

Oak Brook, Ill. – March 4, 2009 – Tax time scams are at an all-time high, according to Robert Siciliano, well-known identity and security theft expert and author of the book “The Safety Minute: How to Take Control of Personal Security and Prevent Fraud.”  As economic pressures continue to increase, Siciliano says criminal activities such as sophisticated, organized theft, including the number of new scams intended to trick consumers this tax season, are expected to rise as well. 

“More than 155 million tax forms were filed last year,” said Siciliano, “the majority of them without incident.1  But people need to understand that thieves are inventing new ways to steal identities each and every day.  And since tax time is a key period when we see a spike in identity theft, it’s crucial that we get the word out now and educate people about the latest scams.”  

As part of the its ongoing campaign to elevate awareness about the growing threat of identity theft, uni-ball®, a leading brand of pens, many of which contain specially formulated ink that helps prevent check fraud, is working with the Identity Theft Resource Center (ITRC) and Siciliano to help stop identity thieves in their tracks.   As CEO of IDTheftSecurity.com, Siciliano has seen first-hand the brute blow identity theft delivers to its victims, and has helped scores of them dig out from the financial and emotional turmoil of being scammed.  

Together, the ITRC, Siciliano and uni-ball are issuing the following warnings, asking consumers to be on high alert during tax time for these identity theft scams and more:

·         Professional Thieves and Targeted Attacks.  The ITRC anticipates an increase in more sophisticated ways to “mine” information, sometimes by organized crime groups. Cybercrime, which includes transporting or selling large amounts of personal information from one group both nationally and internationally, will continue and expand. Part of this trend includes “skimming” (duplicate scanning of credit cards or debit cards), and the use of fake fronts on payment scanners and ATM machines. 

uni-ball® teams with Siciliano to promote simple anti-theft solutions during tax season – Add One

·         Tax Preparer Scams.  Most recently, there are reports of tax preparers telling clients they must pay back their 2008 stimulus payments and then pocketing the money.  Not all professional tax preparers have your best interest at heart, according to the ITRC.  Make sure you do research and choose your tax preparer wisely.

·         Check Fraud. As it becomes more difficult to get new lines of credit, identity thieves may be increasingly drawn to commit check fraud. These crimes may take the form of stolen checks, using checks thrown into the trash by unknowing consumers, or a type of identity theft known as “check washing.” Check washing occurs when checks or other tax-related documents are stolen from the mail or by other means and the ink is erased using common household chemicals, allowing thieves to endorse checks to themselves.   This is where something as simple and inexpensive as a uni-ball pen can help.  Select Uni-ball pens contain specially formulated gel ink (trademarked Uni-Super Ink™) that is absorbed into the paper’s fibers and can never be washed out. 

·         Late Payment Scam.  As people fall behind on their utilities or taxes, lists are created and available either internally or as public record. These lists can fall into the wrong hands and thieves call unassuming people to collect.

  • Text Messaging Scams: Phexting.  Criminal hackers have access to everything these days, including the technology that generates cell phone numbers, as well as access to mass text messaging services. Once the data is secured, they are able to send text messages that install keyloggers (a method of capturing and recording user keystrokes) or direct you to Web sites that steal personal data.

·         Internet Scams: Phishing.  Phony e-mails that try to trick customers into giving out personal information are the hottest, and most disturbing, new scam on the Internet. “Phishing” frauds attempt to make Internet users believe they are receiving email from a specific, trusted source, or that they are securely connected to a trusted Web site, when that is not the case.  This scam is generally used as a means to convince individuals to provide personal or financial information that enables the perpetrators to commit credit card, bank fraud or other forms of identity theft.

“Identity theft is a giant octopus,” said Siciliano.  “Educate yourself on the many facets of the problem and learn your options to defend yourself from each leg of this monster.  Doing something as simple as paying attention to the pen you use could save you thousands of dollars and endless hours of headaches.  Personally, I never write checks or sign important documents without using a uni-ball gel pen with specially formulated Uni-Super Ink.”  

“Uni-ball pens with Uni-Super Ink help prevent identity theft,” said Steve Gradman, senior brand manager of uni-ball.  “Our goal is to help ease the minds of individuals when writing sensitive materials – from legal and medical documents to checks and tax forms.  It’s a simple, inexpensive pen, but it packs a lot of punch when it comes to identity theft prevention.

uni-ball®teams with Siciliano to promote simple anti-theft solutions during tax season – Add Two 

Many uni-ball pens, including the uni-ball 207 gel pen, the Jetstream, Jetstream RT and Vision Elite roller ball pens, use specially formulated inks that contain tiny color pigments.  This exclusive “Super Ink™” helps prevent document and check fraud by absorbing into the paper fibers. When an individual tries to wash or lift the inked information written on the document, the ink remains “trapped” within the fibers of the paper, thereby discouraging the efforts of identity thieves.

Identity theft rose 22 percent in 2008, and Siciliano predicts it will go up again in 2009.   “Now is the time to become educated in order to prevent this offensive crime,” he said.

 For more information on how to protect yourself this tax season, visit www.uniball-na.com

### 

1 http://www.irs.gov/newsroom/article/0,,id=188359,00.html 

About uni-ball®

uni-ball® is a world leader in providing an optimal writing experience, offering writing instruments with superior functionality and affordability.  From the JetStream® pen’s smooth write to the intense color and superior performance of the uni-ball 207 gel pen, the brand allows one to enjoy the ultimate in writing performance coupled with a distinctive, contemporary style.  Newell Rubbermaid Office Products, marketer and distributor of uni-ball® pens in North America, is a worldwide leader in the manufacturing and marketing of writing instruments, art products and office organization and technology products, including such well known brands as Paper Mate®, Sharpie®, DYMO® Parker®, Waterman®, EXPO®, uni-ball®, and Rolodex®, among others. Visit www.uniball-na.com for more information.

About Robert Siciliano

Robert Siciliano “The Lifesaver” is an expert on personal security and identity theft. He has 25 years of experience in self-defense, security work, martial arts and white collar crimes.  An author, sought after media personality and identity theft speaker, Robert has been seen on the Today Show, CBS Early Show, CNN, MSNBC, FOX, CNBC, USA Today, Forbes, Good Housekeeping, Readers Digest, Consumer Digest, Boston Globe, Washington Post, Chicago Tribune, ABC News.com, TechRepublic, Search Security, AP, UPI, Reuters, and Entrepreneur. Robert recently released his third book, “The Safety Minute: How to Take Control of Personal Security and Prevent Fraud”.

About the ITRC

The San Diego-based Identity Theft Resource Center (ITRC) is a non-profit (501(c) 3) organization established in December 1999, to support victims of identity theft in resolving their cases, and to broaden public education and awareness in the understanding of identity theft. It is the on-going mission of the ITRC to assist victims, educate consumers, research identity theft and increase public and corporate awareness about this problem.  

Identity Theft Crime Victims Bill of Rights

Robert Siciliano Identity Theft Expert Speaker

A consortium of a number of companies in the identity theft prevention space have banded together to create a “Bill of Rights” for victims of identity theft. A Bill of Rights would provide victims of identity theft the needed leverage in response to a breach of their information that leads to numerous forms of identity theft. The consortium has some work to do to get the attention of legislators before it becomes law. This is certainly a noble effort that if passed will provide significant relief to victims.

I speak to victims on a weekly basis and the stresses of being victimized takes its toll. When a thief is functioning in society as you, fraudulently, irresponsibly and of course illegally, they tarnish every aspect of your life. There is an overwhelming sense of helplessness for many victims due to the notion that they are guilty until proven innocent. While this will in essence “take an act of congress” to become law, a good faith implementation of the bill by industry and government would certainly provide needed relief to those affected.

The Santa Fe Group, a financial services consulting firm, and The Santa Fe Group Vendor Council, a consortium of leading service providers to the financial services industry, today released the first comprehensive Bill of Rights for victims of identity theft. The Bill of Rights calls for consistent processes for handling identity crime incidents in addition to amendments to privacy legislation and regulation so victims can more easily access and correct their personal information records.

The five basic rights address the need for legislation that enables individual victims of identity theft to access and correct personally identifiable information (PII) records. The Bill of Rights white paper, titled Victims’ Rights: Fighting Identity Crime on the Front Lines, is now available.

The Identity Crime Victims Bill of Rights advocates improved protection and support for victims and includes:
• Assessment of the nature and extent of the crime that removes the procedural “Catch-22s” when validating identity
• Full restoration of victims’ identities to pre-theft status, including the ability to expunge records
• Freedom from harassment from collection agencies, law enforcement and others
• Prosecution of offenders and accountability for businesses that fail to reasonably secure personal information
• Restitution that includes repayment for financial losses and expenses

The white paper effort was led by the Identity Management Working Group of The Santa Fe Group Vendor Council chaired by Rick Kam, President of ID Experts

“Despite new additions to the Fair and Accurate Credit Transaction Act of 2003 (FACT), such as free credit reports and the ability to place fraud alerts after identity theft, victims are still subject to inconsistent and unfair treatment from state and federal agencies, law enforcement and businesses,” said Rick Kam, President of Portland-based ID Experts, a leader in data breach prevention and remediation. “We created the Bill of Rights to empower victims by granting them the same rights as victims of other crimes.”

According to Javelin Strategy and Research, 9.9 million Americans were victimized by identity crimes in 2008, an increase of 22% from 2007, with annual costs to consumers and businesses of more than $49 billion. In their journey to recover their identities, victims face a disjointed maze of privacy laws and information sources. Law enforcement processes are not always in place, and organizations often won’t share evidence with victims. As a result, a victim’s life can be disrupted for years.

“Victim empowerment is key to thwarting identity crime,” said Catherine A. Allen, Chairman and CEO of The Santa Fe Group. “With the Identity Crime Victims Bill of Rights, we’ve launched a national call to action, laying the groundwork for meaningful and much-needed legislation while building awareness of the issue in the media and among consumers and businesses. Our intent is that victims of all types of identity crime be provided with the same rights afforded to them via the FACT Act for resolving credit issues.”

Robert Siciliano Identity Theft Expert Speaker discusses identity theft victims Here and Here