On Take it to the Bank, 00:00:01.36\00:00:02.70 you'll find ways to get out of debt. 00:00:02.73\00:00:06.27 Solve your credit card problems. 00:00:09.80\00:00:12.34 How to make and stick with the budget? 00:00:14.88\00:00:17.35 Simple ways to save. 00:00:19.95\00:00:22.08 Buying or selling a home and many more financial matters 00:00:25.05\00:00:29.66 on Take it to the Bank. 00:00:29.69\00:00:32.49 Hi, my name is Cordell Thomas, 00:00:32.53\00:00:34.06 and welcome to Take it to the Bank. 00:00:34.10\00:00:36.40 Today we are gonna talk about something 00:00:36.43\00:00:38.00 that I think is of vital importance 00:00:38.03\00:00:39.37 to each one us. 00:00:39.40\00:00:40.74 We talked about information that's out there about you, 00:00:40.77\00:00:44.14 consumer information, your privacy, 00:00:44.17\00:00:45.87 and I think what we need to do 00:00:45.91\00:00:47.28 now is talk about ID theft and fraud 00:00:47.31\00:00:50.21 which is a real part of our existence. 00:00:50.25\00:00:52.68 We work so hard to... 00:00:52.71\00:00:55.35 Hopefully we work so hard to develop our budgets, 00:00:55.38\00:00:58.25 we work so hard to develop 00:00:58.29\00:01:00.26 an understanding of what money we can put away into savings, 00:01:00.29\00:01:03.12 and what we can do with our budgets, 00:01:03.16\00:01:05.36 and what we can do with our investments. 00:01:05.39\00:01:08.10 But there is an element out there 00:01:08.13\00:01:11.10 that would like to get in between us and our funds 00:01:11.13\00:01:14.60 and they're using many different methods 00:01:14.64\00:01:16.54 that are available to them. 00:01:16.57\00:01:18.54 We live in a technological age 00:01:18.57\00:01:20.58 where at the moment you hit a submit key, 00:01:20.61\00:01:23.01 that information is gone in minutes. 00:01:23.04\00:01:24.98 We live in an age where information you place 00:01:25.01\00:01:27.85 out there on the internet, once you release it, 00:01:27.88\00:01:30.09 you can never get it back. 00:01:30.12\00:01:31.92 And we need to understand 00:01:31.95\00:01:33.29 that there is an important element 00:01:33.32\00:01:34.92 for each one of us to understand 00:01:34.96\00:01:36.73 when it comes to our personal information. 00:01:36.76\00:01:39.66 Think about it. 00:01:39.69\00:01:41.03 Close to 40 percent of individuals 00:01:41.06\00:01:43.26 that are out there right now have no clue 00:01:43.30\00:01:45.83 that their identity has been stolen 00:01:45.87\00:01:47.84 for three months. 00:01:47.87\00:01:49.20 It takes up to 40 percent of those individuals 00:01:49.24\00:01:51.47 three months to know 00:01:51.51\00:01:53.17 that their identity has been stolen. 00:01:53.21\00:01:54.71 Guess what happens in three months? 00:01:54.74\00:01:57.18 A lot of things can happen 00:01:57.21\00:01:58.55 in reference to inappropriate charges on your credit. 00:01:58.58\00:02:03.08 A lot of other things that can, 00:02:03.12\00:02:04.99 they can happen from that standpoint 00:02:05.02\00:02:06.76 and your information has already probably been sold 00:02:06.79\00:02:09.86 on a global basis to these markets 00:02:09.89\00:02:12.26 that are looking for that type of information. 00:02:12.29\00:02:14.13 It is a real part. Here is another statistic. 00:02:14.16\00:02:17.57 Close to 20 percent of individuals 00:02:17.60\00:02:20.04 don't know for up to four years 00:02:20.07\00:02:22.10 that their identity has been stolen. 00:02:22.14\00:02:24.31 Four years, and that is a stark reality 00:02:24.34\00:02:27.51 because, you know, if it's been four years, 00:02:27.54\00:02:30.68 you know, how much damage has been done? 00:02:30.71\00:02:33.88 It's essential that we get into the habit, 00:02:33.92\00:02:35.82 on an ongoing basis, on a regular basis 00:02:35.85\00:02:37.99 to take a look at our credit report. 00:02:38.02\00:02:41.29 You have to be in touch with that 00:02:41.32\00:02:43.02 because you shouldn't be one of those individuals 00:02:43.06\00:02:47.06 that doesn't know for an extended amount of time. 00:02:47.10\00:02:50.23 Okay, I have a short story for you, 00:02:50.27\00:02:54.37 and I must share this with you because it impacted my family 00:02:54.40\00:02:58.17 and in-law had the same issue happened to her, 00:02:58.21\00:03:00.44 ID theft, and what happened? 00:03:00.48\00:03:02.54 She was fortunate, 00:03:02.58\00:03:04.21 these thieves actually had a scammer. 00:03:04.25\00:03:05.95 I think, they had a skimmer 00:03:05.98\00:03:07.32 that was out there with her at the actual bank. 00:03:07.35\00:03:09.25 When she went to a bank 00:03:09.28\00:03:10.62 to find out about getting a loan 00:03:10.65\00:03:13.19 for an additional property she wanted to purchase. 00:03:13.22\00:03:15.36 It was interesting because we don't know 00:03:15.39\00:03:17.63 exactly what happened, 00:03:17.66\00:03:19.89 but her credit card information or her social security number 00:03:19.93\00:03:23.43 or whatever that information was out there. 00:03:23.47\00:03:25.83 There were some warning signs 00:03:25.87\00:03:27.30 because that individual who stole her identity 00:03:27.34\00:03:30.74 tried calling her mother-in-law 00:03:30.77\00:03:32.11 to find out some details about her life 00:03:32.14\00:03:34.31 such as mother's maiden name, 00:03:34.34\00:03:36.24 and such as where she actually lived, 00:03:36.28\00:03:38.21 and the number of the house, 00:03:38.25\00:03:39.58 and a couple of other bits of information 00:03:39.61\00:03:41.32 that could have secured their ability 00:03:41.35\00:03:44.35 to completely steal her information. 00:03:44.39\00:03:47.26 But something came up 00:03:47.29\00:03:48.62 because one of the credit agencies 00:03:48.66\00:03:50.03 that or applied to saw a warning sign 00:03:50.06\00:03:53.19 because the address that they used 00:03:53.23\00:03:55.36 on the actual application was an uninhabited building 00:03:55.40\00:04:00.24 in the downtown location where they lived. 00:04:00.27\00:04:02.97 So that popped up a warning sign 00:04:03.00\00:04:04.67 and the actually contacted her 00:04:04.71\00:04:06.04 and said, "Hey, you don't live here 00:04:06.07\00:04:07.61 but somebody's applied for credit in your name 00:04:07.64\00:04:09.84 and that was a beginning of the potential nightmare. 00:04:09.88\00:04:13.42 She didn't know exactly what to do 00:04:13.45\00:04:14.98 as many of us don't because we don't think 00:04:15.02\00:04:16.45 it's going to happen to any one of us. 00:04:16.48\00:04:18.95 And she called me up and said "Hey, Cordell, what do I do?" 00:04:18.99\00:04:20.89 What are the things that I should take care of 00:04:20.92\00:04:22.82 in reference to protecting myself." 00:04:22.86\00:04:24.19 And there is three things 00:04:24.23\00:04:25.69 you should remember to do if in fact you find 00:04:25.73\00:04:29.20 that your identity has been compromised. 00:04:29.23\00:04:30.70 Number one, contact the police department. 00:04:30.73\00:04:33.13 Call them immediately. 00:04:33.17\00:04:34.50 They have a department open 24/7 00:04:34.54\00:04:37.74 that will handle your specific fraud complaint 00:04:37.77\00:04:40.81 and file a report on your behalf. 00:04:40.84\00:04:42.44 And you'll find that's going to be 00:04:42.48\00:04:43.85 important support mechanism, 00:04:43.88\00:04:45.81 and the report will be very helpful 00:04:45.85\00:04:48.38 when you approach your creditors, 00:04:48.42\00:04:50.69 and as well approach the credit bureaus 00:04:50.72\00:04:53.52 which leads to the second thing you should do. 00:04:53.56\00:04:55.16 Number two, contact the credit bureaus, 00:04:55.19\00:04:58.16 they have each one of the three have a 800 number for frauds, 00:04:58.19\00:05:02.36 specifically for fraud, 00:05:02.40\00:05:03.77 and I believe that those numbers 00:05:03.80\00:05:05.57 are now 24/7 numbers. 00:05:05.60\00:05:07.84 So you don't have to wait overnight 00:05:07.87\00:05:09.27 or you don't have to wait over a weekend. 00:05:09.30\00:05:11.07 You can pick up and call them 00:05:11.11\00:05:13.11 and let them know that you believe 00:05:13.14\00:05:14.64 that your identity has been compromised, 00:05:14.68\00:05:17.18 and they can pretty much put a freeze on your account, 00:05:17.21\00:05:20.12 and they'll ask for another lot of information about you 00:05:20.15\00:05:24.52 so that they can actually distinguish 00:05:24.55\00:05:27.06 who you are and filter out anyone 00:05:27.09\00:05:29.19 that may be calling in about credit on your name. 00:05:29.22\00:05:32.79 The third thing and the most important thing 00:05:32.83\00:05:35.70 you should also do is contact your creditors. 00:05:35.73\00:05:41.87 The interesting thing is what transpired 00:05:41.90\00:05:44.21 after these things occurred and she got these phone calls, 00:05:44.24\00:05:47.58 there is all of a sudden all around the city 00:05:47.61\00:05:49.84 that she lived applications started popping up. 00:05:49.88\00:05:53.31 Back at this department store, 00:05:53.35\00:05:54.88 at this organization, at many different places, 00:05:54.92\00:05:58.95 and it was interesting as I sat at the dining table 00:05:58.99\00:06:01.49 with her one time, a creditor called her 00:06:01.52\00:06:03.32 and said, "Hey, did you open this account 00:06:03.36\00:06:06.93 over this location?" 00:06:06.96\00:06:08.30 "No I didn't." 00:06:08.33\00:06:09.66 And they verified and went through 00:06:09.70\00:06:11.03 all of her security information 00:06:11.07\00:06:12.43 and they were able to shut that down. 00:06:12.47\00:06:14.34 In her situation she was very lucky 00:06:14.37\00:06:17.57 because the day they were trying to do something, 00:06:17.61\00:06:20.48 that credit card company was able to look 00:06:20.51\00:06:23.91 at some features that are warning signs 00:06:23.95\00:06:26.28 for this person to try to apply 00:06:26.31\00:06:28.68 for credit in this person's name. 00:06:28.72\00:06:31.29 Many different things can occur. 00:06:31.32\00:06:33.09 The fact is you need to be aware 00:06:33.12\00:06:35.62 of what's going on with your specific information. 00:06:35.66\00:06:39.19 You need to protect information that's out there about yourself 00:06:39.23\00:06:42.60 and you need to do as much as you possibly can 00:06:42.63\00:06:44.73 to protect yourself from having your identity stolen. 00:06:44.77\00:06:49.14 Key. 00:06:49.17\00:06:51.21 Now as we continue this conversation, 00:06:51.24\00:06:56.24 I want to give you a few statistics as a result 00:06:56.28\00:07:00.58 of what happens with ID theft. 00:07:00.62\00:07:03.65 For example, victims, 00:07:03.69\00:07:05.45 those who are victims spend between 3000 and 5000 hours 00:07:05.49\00:07:10.09 repairing the damage that's already been done. 00:07:10.13\00:07:12.53 32 percent of these respondents in the survey said 00:07:12.56\00:07:15.90 it took between four and six months 00:07:15.93\00:07:18.40 to deal with their case 00:07:18.43\00:07:19.77 and another 23 percent reported dealing with their case 00:07:19.80\00:07:23.64 from seven months to a year. 00:07:23.67\00:07:27.88 There is monitory cost for identity theft. 00:07:27.91\00:07:30.18 Up to $15, 000 per business, 00:07:30.21\00:07:32.75 victims lose an average of between $1,300 to $14,000 00:07:32.78\00:07:38.35 worth of wages fighting these specific cases, 00:07:38.39\00:07:41.52 and victims spend an average of $1,300 plus 00:07:41.56\00:07:45.66 and expenses related to their case. 00:07:45.69\00:07:48.26 There are practical and emotinous damage done 00:07:48.30\00:07:51.53 with identity theft. 00:07:51.57\00:07:52.93 47 percent of people said that they couldn't get credit 00:07:52.97\00:07:56.47 or had trouble getting credit or a loan 00:07:56.50\00:07:58.41 as a result of identity theft. 00:07:58.44\00:08:00.41 19 percent of victims have higher credit rates 00:08:00.44\00:08:03.04 and 16 percent have higher insurance rates 00:08:03.08\00:08:05.45 based on identity theft. 00:08:05.48\00:08:07.55 70 percent of victims have trouble getting rid of 00:08:07.58\00:08:10.95 or never get rid of negative information on their records. 00:08:10.99\00:08:15.52 Another 45 percent of victims 00:08:15.56\00:08:17.83 feels the sense of denial and disbelief. 00:08:17.86\00:08:21.13 85 percent of individuals find anger and rage 00:08:21.16\00:08:24.63 because of these things 00:08:24.67\00:08:26.00 that are going on in their lives, 00:08:26.03\00:08:27.40 their personal lives from somebody outside 00:08:27.44\00:08:29.44 that really doesn't even know who they are. 00:08:29.47\00:08:31.37 And then of course, 60 percent of individuals responded saying 00:08:31.41\00:08:36.24 that I feel unprotected by the authorities. 00:08:36.28\00:08:40.85 Uses of victim information is quite interesting. 00:08:40.88\00:08:43.89 More than a third of the victims reported 00:08:43.92\00:08:45.62 that their identity thieves committed check account fraud. 00:08:45.65\00:08:50.03 66 percent of victims, 00:08:50.06\00:08:52.43 their personal information was used to open new credit 00:08:52.46\00:08:57.97 in their name. 00:08:58.00\00:08:59.77 28 percent of victims, their personal information 00:08:59.80\00:09:03.14 was used in the purchase of cell phones. 00:09:03.17\00:09:05.91 And if you talk to police, 00:09:05.94\00:09:07.28 you know where these cell phones go. 00:09:07.31\00:09:08.64 These stolen cell phones show up in places 00:09:08.68\00:09:10.21 that they are not supposed to or inappropriate areas. 00:09:10.25\00:09:13.18 And then of course 12 percent of victims 00:09:13.21\00:09:14.78 end up of having warrants, 00:09:14.82\00:09:16.15 warrants issued in their name for financial crimes 00:09:16.18\00:09:19.82 committed by the identity thief. 00:09:19.85\00:09:25.63 This next statistic is quite interesting 00:09:25.66\00:09:28.13 because it has to do with impostor characteristics 00:09:28.16\00:09:30.83 in relationship to the victim. 00:09:30.87\00:09:32.43 Check this out, 00:09:32.47\00:09:33.80 43 percent of victims believe that they know the person 00:09:33.84\00:09:38.34 who stole their identity. 00:09:38.37\00:09:41.14 Up to 25 percent of victims believe the impostor 00:09:41.18\00:09:43.55 is someone who is in a business 00:09:43.58\00:09:46.15 that holds their personal identifying information. 00:09:46.18\00:09:48.78 Consider that. 00:09:48.82\00:09:50.15 We've heard of many of these organizations 00:09:50.19\00:09:53.05 from credit organizations to health organizations 00:09:53.09\00:09:57.26 to many different organizations that have had their data bases 00:09:57.29\00:10:01.40 hacked into and stolen. 00:10:01.43\00:10:03.26 Before you know it, 00:10:03.30\00:10:04.63 that information is all over globe with people 00:10:04.67\00:10:06.90 picking and choosing the personal information on you 00:10:06.94\00:10:09.80 and using it to create a whole new identity. 00:10:09.84\00:10:14.48 16 percent of identity theft victims 00:10:14.51\00:10:16.28 are also victims of domestic harassment 00:10:16.31\00:10:18.38 and abuse by the same perpetrator. 00:10:18.41\00:10:22.95 Responsiveness of victims. 00:10:22.98\00:10:25.32 Police department seemed to be getting more responsive. 00:10:25.35\00:10:27.52 What was interesting with the case with my in-law 00:10:27.56\00:10:30.23 that she was able to call the police department 00:10:30.26\00:10:33.40 at around 11:30 at night, 00:10:33.43\00:10:35.63 and was able to get a fraud investigator, 00:10:35.66\00:10:38.27 and within hours they actually came to her front door, 00:10:38.30\00:10:41.50 and were able to say we can take a report 00:10:41.54\00:10:43.74 but because you don't yet have the information 00:10:43.77\00:10:46.47 from your creditors we would advice you wait, 00:10:46.51\00:10:49.58 and then come in with that information, 00:10:49.61\00:10:51.05 so we can complete the report on your behalf. 00:10:51.08\00:10:54.92 20 percent of victims will have their misinformation 00:10:54.95\00:10:57.89 and errors removed from their credit report 00:10:57.92\00:10:59.99 so it takes vigilance from your perspective 00:11:00.02\00:11:03.69 to ensure that information is taken care of and removed. 00:11:03.73\00:11:08.50 But the quicker you find out about this, 00:11:08.53\00:11:10.97 the quicker you handle this, 00:11:11.00\00:11:12.57 the quicker you are aware of this 00:11:12.60\00:11:14.44 is a better off that you will be. 00:11:14.47\00:11:17.74 Now, I do want to bring in 00:11:17.77\00:11:20.14 Jessica Duong who is our identity theft 00:11:20.18\00:11:22.38 and fraud expert, and I have a question for her. 00:11:22.41\00:11:25.91 What should someone do 00:11:25.95\00:11:27.38 if they suspect that their ID has been compromised? 00:11:27.42\00:11:30.89 Jessica, can you give us an answer. 00:11:30.92\00:11:32.42 The first thing you should do is to go to the police station, 00:11:35.86\00:11:39.53 and file a police report. 00:11:39.56\00:11:41.36 Next there are several different websites out there 00:11:41.40\00:11:44.50 that I'll provide for you, 00:11:44.53\00:11:46.80 and you can put it up for your viewers. 00:11:46.84\00:11:49.90 For example the Federal Trade Commission 00:11:49.94\00:11:51.81 has lots of great resources, 00:11:51.84\00:11:55.01 they have different affidavits that you can printout, 00:11:55.04\00:11:58.18 and fill out, and report any discrepancies. 00:11:58.21\00:12:01.78 Also we work with a company called Kroll, 00:12:01.82\00:12:04.85 they are experts, they're licensed investigators, 00:12:04.89\00:12:08.12 they have attorneys working with them, 00:12:08.16\00:12:10.09 and they are throughout the world 00:12:10.13\00:12:13.09 basically researching, 00:12:13.13\00:12:15.60 and looking out for their clients 00:12:15.63\00:12:17.83 to make sure that if something happens 00:12:17.87\00:12:20.44 to your personal information, 00:12:20.47\00:12:22.10 they can restore your information for you. 00:12:22.14\00:12:24.27 Thank you, Jessica. 00:12:26.54\00:12:27.88 We're gonna actually come back to you in a few minutes, 00:12:27.91\00:12:29.64 we have another question for you but excellent. 00:12:29.68\00:12:32.25 It's interesting what she said because victims of ID theft 00:12:32.28\00:12:35.48 must act quickly to minimize the damage. 00:12:35.52\00:12:38.82 As in my in-law, 00:12:38.85\00:12:40.59 she was able to respond very quickly 00:12:40.62\00:12:42.49 because she had warning signs, 00:12:42.52\00:12:43.89 there are things that are out there. 00:12:43.93\00:12:45.26 There're unexpected calls coming from different locations 00:12:45.29\00:12:47.96 and doing different things. 00:12:48.00\00:12:49.56 People are looking for information 00:12:49.60\00:12:51.20 to complete a profile on who you are 00:12:51.23\00:12:54.60 so they can take that profile and use it as their own. 00:12:54.64\00:12:58.11 So the three things that you do 00:12:58.14\00:12:59.81 as Jessica indicated is number one, 00:12:59.84\00:13:02.34 you need to contact, 00:13:02.38\00:13:03.71 report it to the major credit bureaus. 00:13:03.75\00:13:06.01 Contact the fraud department, 00:13:06.05\00:13:07.65 they're open 24/7 of each of the credit bureaus, 00:13:07.68\00:13:10.85 and report that your identity has been stolen. 00:13:10.89\00:13:14.29 Ask them specifically, just remember fraud alert, 00:13:14.32\00:13:17.69 ask them to place a fraud alert in your files. 00:13:17.73\00:13:22.00 There are three agencies Transunion, 00:13:22.03\00:13:26.27 Experian and of course Equifax. 00:13:26.30\00:13:28.90 Second, file a police report with the local police 00:13:28.94\00:13:32.81 or police where the identity theft occurred. 00:13:32.84\00:13:37.41 Get a copy of a police report, 00:13:37.45\00:13:39.01 and retain it for your records, credit card companies, 00:13:39.05\00:13:41.78 and financial institutions may acquire you 00:13:41.82\00:13:44.45 to show a copy of this report 00:13:44.49\00:13:46.82 to verify that the crime actually happened 00:13:46.86\00:13:49.49 so you need to go, and talk to the police, 00:13:49.52\00:13:51.89 and you need to ask specifically 00:13:51.93\00:13:53.63 for the fraud department. 00:13:53.66\00:13:56.13 Then the third area, 00:13:56.16\00:13:57.83 and the most important is to contact your creditor 00:13:57.87\00:14:00.74 for any accounts that had been fraudulently access 00:14:00.77\00:14:03.07 or open contact, 00:14:03.10\00:14:04.51 the billing enquires and securities department 00:14:04.54\00:14:06.71 for the appropriate creditors or financial institution. 00:14:06.74\00:14:10.61 Close the accounts, and use passwords 00:14:10.65\00:14:14.12 now new passwords, 00:14:14.15\00:14:16.05 not necessarily a mother's maiden name 00:14:16.08\00:14:17.82 that's what everyone uses, 00:14:17.85\00:14:19.19 and that's probably why they were calling 00:14:19.22\00:14:21.42 her mother in-law to find out what is your mom's maiden name. 00:14:21.46\00:14:25.29 And they know the typical questions to ask, 00:14:25.33\00:14:27.33 so change the passwords 00:14:27.36\00:14:29.03 to something a little bit more difficult and challenging. 00:14:29.06\00:14:31.70 Hey, that can be interesting to deal with 00:14:31.73\00:14:35.30 because I figure out passwords that I can't even remember 00:14:35.34\00:14:38.47 so I do is I put them in a safe place, 00:14:38.51\00:14:41.21 and I ensure that I can have access to it when I needed. 00:14:41.24\00:14:46.92 Ask that the old accounts be processed as account closed 00:14:46.95\00:14:50.75 at consumer's request. 00:14:50.79\00:14:53.86 Having a card lost or stolen reference 00:14:53.89\00:14:55.86 because when this statement is reported to credit bureaus, 00:14:55.89\00:14:59.19 it can be interpreted as blaming you for the loss. 00:14:59.23\00:15:03.16 Carefully monitor all of your mail, 00:15:03.20\00:15:05.13 your credit card bills, 00:15:05.17\00:15:06.50 and report immediately to your company 00:15:06.53\00:15:09.10 or your creditor that you see some new fraudulent activity 00:15:09.14\00:15:12.71 and maintain vigilance. 00:15:12.74\00:15:14.21 Remember, there is a Bible verse 00:15:14.24\00:15:16.04 that we talk about in 2 Timothy 4:7, 00:15:16.08\00:15:19.41 and it says therefore I have fought the good fight, 00:15:19.45\00:15:23.28 I have finished the race, I have kept the faith 00:15:23.32\00:15:26.45 therefore there is in store for me a reward. 00:15:26.49\00:15:28.79 I have finished the race. This is a race of endurance. 00:15:28.82\00:15:33.16 I have mentioned before that I have run marathon, 00:15:33.19\00:15:36.56 and it is an interesting capacity 00:15:36.60\00:15:39.33 when you hit that wall. 00:15:39.37\00:15:40.77 It's interesting when you deal with challenges 00:15:40.80\00:15:43.24 during the course of that race, and throughout your life, 00:15:43.27\00:15:46.37 throughout your financial life, 00:15:46.41\00:15:47.91 you're going to deal with many different obstacles 00:15:47.94\00:15:50.98 that you may seem way out of control, 00:15:51.01\00:15:53.62 but, believe me there are options, 00:15:53.65\00:15:57.49 there are things you can do, 00:15:57.52\00:15:58.85 there are things that you can... 00:15:58.89\00:16:00.56 Places you can access and information you can get 00:16:00.59\00:16:03.32 that will help alleviate some of the tensions. 00:16:03.36\00:16:06.29 And as long as you know the top three things 00:16:06.33\00:16:08.16 you need to do in identity theft situation, 00:16:08.20\00:16:10.63 then you know exactly what to do. 00:16:10.67\00:16:13.47 So again what are the three things? 00:16:13.50\00:16:15.90 Contact the police department number one. 00:16:15.94\00:16:17.87 What's number two? 00:16:17.91\00:16:19.24 You want to go and report it 00:16:19.27\00:16:20.81 to the fraud department at your credit bureaus. 00:16:20.84\00:16:24.51 And number three, what is that? 00:16:24.55\00:16:26.45 You need to report it to all of your creditors. 00:16:26.48\00:16:29.38 In that case you're doing as much as you possibly can 00:16:29.42\00:16:32.85 to minimize the problem that's there. 00:16:32.89\00:16:35.56 Now there are some other things you can do 00:16:35.59\00:16:37.06 but before we get into that specific element, 00:16:37.09\00:16:40.70 I'm going to actually go back and have a conversation 00:16:40.73\00:16:44.47 with Jessica with the question is, 00:16:44.50\00:16:46.84 what additional resources are available 00:16:46.87\00:16:49.87 to assist with fraud. 00:16:49.90\00:16:53.01 Jessica, can you address that question? 00:16:53.04\00:16:54.84 The four different types of policies 00:16:57.35\00:16:59.08 that insurance companies have come up 00:16:59.11\00:17:00.92 with is reimbursement, resolution, 00:17:00.95\00:17:06.45 monitoring and restoration. 00:17:06.49\00:17:09.49 What we recommend is to have a combination 00:17:09.52\00:17:12.13 of a monitoring service, 00:17:12.16\00:17:14.00 and then a restoration service when you become a victim, 00:17:14.03\00:17:17.23 experts can restore your information for you. 00:17:17.27\00:17:20.54 Thank you, Jessica, 00:17:21.64\00:17:23.00 it's gratifying to have the resources 00:17:23.04\00:17:26.07 of an expert like Jessica. 00:17:26.11\00:17:27.44 She's been very helpful. 00:17:27.48\00:17:28.81 In fact when the situation happened with my in-law, 00:17:28.84\00:17:30.85 I gave my in-law the information 00:17:30.88\00:17:32.31 that I had in the top of my head, 00:17:32.35\00:17:34.02 but it drove me to begin to understand 00:17:34.05\00:17:37.09 how much this credit card and identity theft 00:17:37.12\00:17:40.86 is really impacting us. 00:17:40.89\00:17:42.49 And I was able to call up Jessica 00:17:42.52\00:17:44.49 and say that I have a problem. 00:17:44.53\00:17:47.43 I have a in-law that has, had her identity stolen. 00:17:47.46\00:17:50.10 She jumped right on the issue 00:17:50.13\00:17:52.27 and gave me a plethora of information, 00:17:52.30\00:17:55.27 a lot of information that was quite beneficial for me 00:17:55.30\00:17:58.94 to also send to my in-law. 00:17:58.97\00:18:00.98 It's real, it happens. 00:18:01.01\00:18:03.55 Be vigilant, follow your credit, 00:18:03.58\00:18:06.01 follow all of your reports. 00:18:06.05\00:18:08.08 Get the free copies of your reports. 00:18:08.12\00:18:10.15 Watch out for new accounts being set up in your name. 00:18:10.19\00:18:14.26 It's really difficult to turn things around 00:18:14.29\00:18:17.86 from that standpoint. 00:18:17.89\00:18:19.23 And then one of the other things 00:18:19.26\00:18:20.86 I would ask you to be careful of is, 00:18:20.90\00:18:24.53 if you're not vigilant, 00:18:24.57\00:18:25.90 you might find warrants for your arrest popping up, 00:18:25.93\00:18:28.60 because these individuals are not nice 00:18:28.64\00:18:31.61 when they get access to a new identity, 00:18:31.64\00:18:33.68 they use it for bad things. 00:18:33.71\00:18:35.74 It's imperative that as you run this race, 00:18:35.78\00:18:39.75 you run it with diligence 00:18:39.78\00:18:41.68 and run it as smart as you possibly can. 00:18:41.72\00:18:46.02 Now I'm going to talk to you 00:18:46.05\00:18:48.49 about something that's important, 00:18:48.52\00:18:50.79 and it's actually a learning curve for me 00:18:50.83\00:18:52.76 because as I learn more about technology, 00:18:52.79\00:18:55.53 there is this new area of identity theft 00:18:55.56\00:18:59.17 that is very important to be aware of. 00:18:59.20\00:19:03.14 There is a difference between 00:19:03.17\00:19:06.34 the typical types of identity theft, 00:19:06.37\00:19:08.68 and internet identity theft. 00:19:08.71\00:19:12.95 The one major difference and one main difference 00:19:12.98\00:19:15.35 between internet identity thefts, 00:19:15.38\00:19:18.49 and basic ID theft in fraud is this. 00:19:18.52\00:19:23.73 With internet identity theft, 00:19:23.76\00:19:25.29 we don't have to wait for a thief 00:19:25.33\00:19:27.56 to physically steal our information, 00:19:27.60\00:19:30.00 instead we may be unwittingly 00:19:30.03\00:19:33.23 handing over the information ourselves. 00:19:33.27\00:19:35.64 What do I mean by that? 00:19:35.67\00:19:37.01 In internet protocol, our identity on the internet 00:19:37.04\00:19:40.38 is made up of several things. 00:19:40.41\00:19:42.18 It's made up of IP address 00:19:42.21\00:19:44.91 or an internet protocol address. 00:19:44.95\00:19:47.62 It's made up of the physical address 00:19:47.65\00:19:49.72 that we live. 00:19:49.75\00:19:51.09 It's made up of usernames and passwords and pin numbers, 00:19:51.12\00:19:55.32 personal identification numbers, 00:19:55.36\00:19:57.19 and social security numbers, 00:19:57.23\00:19:58.86 and birth dates, and account numbers, 00:19:58.89\00:20:01.03 and mother's maiden names, and etcetera. 00:20:01.06\00:20:04.60 Did you know that all of that information 00:20:04.63\00:20:06.43 is out there about you? 00:20:06.47\00:20:10.27 However because we use the internet 00:20:10.31\00:20:12.84 for all sorts of financial transactions, 00:20:12.87\00:20:15.54 criminals are developing sophisticated techniques 00:20:15.58\00:20:20.08 to steal our digital identities. 00:20:20.12\00:20:23.75 Internet ID theft statistics 00:20:23.79\00:20:26.15 show their aim is to use our identities 00:20:26.19\00:20:29.06 to open credit card accounts, bank loans, mortgages, 00:20:29.09\00:20:33.09 and in fact any transaction that will make money. 00:20:33.13\00:20:38.07 Now there are three different forms of how they trick us 00:20:38.10\00:20:42.40 into giving them information. 00:20:42.44\00:20:45.64 Information about us can be stolen 00:20:45.67\00:20:47.51 by computer criminals from the data bases of banks, 00:20:47.54\00:20:51.48 remember I talked about other organizations 00:20:51.51\00:20:54.62 that have had their data bases hacked. 00:20:54.65\00:20:57.29 Their prime target is hacking into the information 00:20:57.32\00:21:01.66 that these major organizations have about us 00:21:01.69\00:21:04.43 so they go after banks, and retailers and ISPs, 00:21:04.46\00:21:09.33 internet service providers 00:21:09.36\00:21:11.27 as well as data clearing houses. 00:21:11.30\00:21:15.80 However there is an easier way for the thief 00:21:15.84\00:21:18.97 that is to come and steal the information from us 00:21:19.01\00:21:22.38 or trick us into providing that information. 00:21:22.41\00:21:25.68 Three different ways I'm gonna provide to you. 00:21:25.71\00:21:27.55 The first one is fishing, 00:21:27.58\00:21:30.52 not fishing going out and throwing out a lure, 00:21:30.55\00:21:32.82 but it's pretty much as same it's 'PHISHING'. 00:21:32.85\00:21:38.99 Just like fishing, sometimes it's called spoofing. 00:21:39.03\00:21:42.73 It's like a lure that's thrown out there 00:21:42.76\00:21:44.87 to catch you as a victim. 00:21:44.90\00:21:46.97 This lure often comes in the form of spam email 00:21:47.00\00:21:50.81 of popup warnings that look like 00:21:50.84\00:21:53.48 legitimate companies that we worked with, 00:21:53.51\00:21:55.98 and the purpose of the phishing lure 00:21:56.01\00:21:58.45 is of such, the purpose is to have you click on a link, 00:21:58.48\00:22:04.72 and to verify and or to cancel a purchase 00:22:04.75\00:22:08.19 that you may have unwittingly made. 00:22:08.22\00:22:10.59 You didn't make the purchase but they act as if you did. 00:22:10.63\00:22:14.90 It might be a popup link to get you to click on 00:22:14.93\00:22:18.10 an update of personal information. 00:22:18.13\00:22:20.97 It may be a request to validate your account 00:22:21.00\00:22:24.01 information to prevent it from being cancelled. 00:22:24.04\00:22:27.14 They put it out there as a sense of urgency, 00:22:27.18\00:22:29.44 and you feel wow, if I don't do anything, 00:22:29.48\00:22:31.31 something's gonna happen, 00:22:31.35\00:22:32.68 and you click on it and unwittingly 00:22:32.71\00:22:34.68 what happens is where the moment 00:22:34.72\00:22:36.79 we click on the link we are directed to a website 00:22:36.82\00:22:40.19 that looks just like our companies website. 00:22:40.22\00:22:42.66 I have actually been phished before, 00:22:42.69\00:22:45.93 and went to a website of a banking organization, 00:22:45.96\00:22:50.60 and it looked just like the original, 00:22:50.63\00:22:52.73 but guess what? 00:22:52.77\00:22:54.14 I knew something was wrong 00:22:54.17\00:22:55.50 because they were asking for information 00:22:55.54\00:22:56.87 that the bank's website never really asks for. 00:22:56.91\00:22:59.54 They never send out an email saying hey, 00:22:59.57\00:23:02.48 we need this information from you. 00:23:02.51\00:23:05.11 And they are asking this type of information 00:23:05.15\00:23:08.62 such as warning signs, security number, 00:23:08.65\00:23:12.35 social security number, 00:23:12.39\00:23:13.89 credit card number or a password. 00:23:13.92\00:23:16.22 When you see that type of thing happening, 00:23:16.26\00:23:18.63 there is a problem. 00:23:18.66\00:23:20.00 Call your bank first, 00:23:20.03\00:23:21.86 and check with them before doing anything 00:23:21.90\00:23:24.67 that might give out personal information. 00:23:24.70\00:23:27.90 57 million people have experienced phishing attacks, 00:23:27.94\00:23:32.17 1.78 million adults have fallen victim to the same 00:23:32.21\00:23:35.71 and it's the cost of phishing right now 00:23:35.74\00:23:38.08 has added up to $1.2 billion plus. 00:23:38.11\00:23:42.58 Look, legitimate companies 00:23:42.62\00:23:44.69 will never ask for our personal information in that manner. 00:23:44.72\00:23:48.89 Second, identity theft statistics on pharming. 00:23:48.92\00:23:53.33 Okay, am I playing a game here with words? 00:23:53.36\00:23:56.13 Not really. This is actually out there. 00:23:56.16\00:23:57.97 Pharming, not "farming" but "pharming" 00:23:58.00\00:24:04.87 if I spell it wrong, please forgive me. 00:24:04.91\00:24:07.34 Identity theft through pharming 00:24:07.38\00:24:09.04 is great deal different than just phishing. 00:24:09.08\00:24:11.58 What's the difference? 00:24:11.61\00:24:12.95 In pharming, a cyber criminal cracks 00:24:12.98\00:24:15.05 the vulnerability 00:24:15.08\00:24:16.58 of an internet service providers DNS server. 00:24:16.62\00:24:19.52 What am I saying? 00:24:19.55\00:24:20.89 They are cracking into a company's information 00:24:20.92\00:24:24.09 and domain name, 00:24:24.13\00:24:25.46 and what they do is once they crack 00:24:25.49\00:24:26.83 into the company's information, 00:24:26.86\00:24:28.60 they steal the company's domain name. 00:24:28.63\00:24:32.57 And so, once they have hacked into it, 00:24:32.60\00:24:34.24 they take the company's name and make it their own. 00:24:34.27\00:24:39.21 So when you click on it, 00:24:39.24\00:24:40.61 anyone going to that genuine site 00:24:40.64\00:24:43.11 of that organization 00:24:43.14\00:24:44.75 is redirected to an identical bogus site. 00:24:44.78\00:24:48.72 That bogus site then takes your information, 00:24:48.75\00:24:51.82 and pin number, and account number 00:24:51.85\00:24:54.06 which the "pharmers" immediately use 00:24:54.09\00:24:59.06 to go back to the genuine site and make purchases. 00:24:59.09\00:25:03.93 Am I confusing you or what not, but it's getting that technical 00:25:03.97\00:25:07.10 and having an understanding 00:25:07.14\00:25:09.20 of what's actually going on out there is critical. 00:25:09.24\00:25:12.64 Pharming is a big, big issue right now 00:25:12.67\00:25:16.71 where a lot of companies are dealing with these issues, 00:25:16.75\00:25:21.35 where their domain name is stolen from them, 00:25:21.38\00:25:24.89 and then their customers that have worked with them 00:25:24.92\00:25:27.46 and been with them for long time 00:25:27.49\00:25:29.02 are forwarded to another site 00:25:29.06\00:25:31.39 which those people take their information 00:25:31.43\00:25:34.63 and then use it to go to the original site 00:25:34.66\00:25:37.57 to make purchases that they take 00:25:37.60\00:25:39.70 and uses their own. 00:25:39.73\00:25:41.60 Phishing, Pharming, 00:25:41.64\00:25:48.24 and then there is number three, ID theft of spam and spyware. 00:25:48.28\00:25:55.08 This is very interesting. 00:25:55.12\00:25:56.92 We can inadvertently download spyware 00:25:56.95\00:26:00.02 by just clicking on a popup ad and viewing a spam email. 00:26:00.06\00:26:03.76 For example, spyware is technology 00:26:03.79\00:26:06.80 that suspiciously or gathers information 00:26:06.83\00:26:09.50 such as personal IDs 00:26:09.53\00:26:11.90 and passwords for bank accounts. 00:26:11.93\00:26:14.30 It can do this by logging all of our keyboard strokes. 00:26:14.34\00:26:19.17 It can log all of our keyboard strokes. 00:26:19.21\00:26:21.11 What you type in to the keyboard 00:26:21.14\00:26:23.55 or by using things called trogons 00:26:23.58\00:26:25.78 and other techniques to collect information from your PC. 00:26:25.81\00:26:30.39 This information is then passed back to the perpetrator 00:26:30.42\00:26:35.12 when we connect to the internet. 00:26:35.16\00:26:37.66 So it automatically goes back to them. 00:26:37.69\00:26:40.40 Spam and spyware risks 00:26:40.43\00:26:41.90 are things that you need to be aware of that compromises 00:26:41.93\00:26:46.37 your personal information and creates problems for you 00:26:46.40\00:26:51.07 if you are not aware of what to look for. 00:26:51.11\00:26:52.87 So in this area of internet ID theft, 00:26:52.91\00:26:58.45 I asked you to do a couple of things. 00:26:58.48\00:27:00.65 If you have a computer and internet access, 00:27:00.68\00:27:04.79 I ask that you put up a firewall. 00:27:04.82\00:27:07.29 Talk to an expert on that, 00:27:07.32\00:27:08.99 someone that knows about computers 00:27:09.02\00:27:10.36 and they'll explain that for you. 00:27:10.39\00:27:12.13 Secondarily, get virus protection. 00:27:12.16\00:27:14.30 These viruses that come in on timely basis are things 00:27:14.33\00:27:17.93 that can hurt you, they can cause a lot of damage, 00:27:17.97\00:27:20.80 they can cause a lot of pain when you find all of a sudden 00:27:20.84\00:27:24.57 that something has happened in your credit file. 00:27:24.61\00:27:27.61 Secondarily, what I asked you to do 00:27:27.64\00:27:30.11 is maintain vigilance 00:27:30.15\00:27:31.51 when coming to your credit information. 00:27:31.55\00:27:34.85 Ask for that free copy of your file on a yearly basis. 00:27:34.88\00:27:39.99 Maintain interaction with your credit companies 00:27:40.02\00:27:44.16 and make sure you stay in touch 00:27:44.19\00:27:46.39 so that if and when something like this can happen, 00:27:46.43\00:27:50.70 you too can be a very educated consumer 00:27:50.73\00:27:55.14 when you begin the process 00:27:55.17\00:27:56.71 of taking it to the bank and saving. 00:27:56.74\00:27:59.97 God bless. 00:28:00.01\00:28:01.71