Criminal Identity Theft can happen to Anyone

Criminal identity theft occurs when a criminal fraudulently identifies himself to police as another individual at the point of arrest. The charges may then be placed under the victim’s name. Often the victims of Criminal Identity Theft do not find out about the wrongful record until they are arrested.

If your driver license or other ID is lost or stolen, you need to file a police report. You need to monitor your driving record, credit reports and financial statements for evidence of identity theft. If find evidence that you are a victim, you again need to file a police report.

Victims of Identity Theft need to:

  1. Place a fraud alert on your credit reports, and review your credit reports
  2. Close the accounts that you know, or believe, have been tampered with or opened fraudulently.
  3. File a complaint with the Federal Trade Commission.
  4. File a report with your local police or the police in the community where the identity theft took place.

When a criminal steals an identity and uses the information to comment crimes, often it is the victim who gets arrested. Rarely can the Identity Theft victim clear up the mess on their own. They will need to spend thousands in legal and other professional help to clear their name.

If you are wrongfully arrested, call an attorney. If you don’t have an attorney, consider getting LegalShield.

Additional information:

Privacy Rights Clearinghouse: What to do if it happens to you

FTC: Recover from Identity Theft

About Bruce Demarest

Bruce Demarest is a Identity Theft Protection Specialist. He has designed and taught classes to educate individuals and businesses in identity theft risk management. The individuals have learned how to continuously monitor their financial identities from credit fraud, plus how to monitor their personal identifying information for unauthorized use. His business clients have become compliant with the federal & state privacy laws. He has conducted information security audits to identify their potential problems and has designed security policies, programs, and practices to address those problem areas.
This entry was posted in Identity Theft Protection, Security Culture and tagged , , , , , , , , , , , , . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s