You could become a Victim of Criminal Identity Theft

A recent investigation by the LA Times reviled that 1,480 people were wrongful incarcerated totaled in L.A. County over the last five years. “Many of those wrongly held inside the county’s lockups had the same names as criminals or had their identities stolen — problems that took days or weeks for authorities to sort out.”

Criminal identity theft occurs when a criminal fraudulently identifies himself to police as another individual at the point of arrest. The charges may then be placed under the victim’s name. Often the victims of Criminal Identity Theft do not find out about the wrongful record until they are arrested.

If your driver license or other ID is lost or stolen, you need to file a police report. You need to monitor your driving record, credit reports and financial statements for evidence of identity theft. If find evidence that you are a victim, you again need to file a police report.

Victims of Identity Theft need to:

  1. Place a fraud alert on your credit reports, and review your credit reports
  2. Close the accounts that you know, or believe, have been tampered with or opened fraudulently.
  3. File a complaint with the Federal Trade Commission.
  4. File a report with your local police or the police in the community where the identity theft took place.

Additional information:

Privacy Rights Clearinghouse: What to do if it happens to you

FTC: Recover from Identity Theft

If you are wrongfully arrested, call an attorney. If you don’t have an attorney, consider getting Legal Shield.

Advertisements

About Bruce Demarest

Bruce Demarest is a Identity Theft Protection Specialist. He has designed and taught classes to educate individuals and businesses in identity theft risk management. The individuals have learned how to continuously monitor their financial identities from credit fraud, plus how to monitor their personal identifying information for unauthorized use. His business clients have become compliant with the federal & state privacy laws. He has conducted information security audits to identify their potential problems and has designed security policies, programs, and practices to address those problem areas.
This entry was posted in Identity Theft Protection and tagged , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s