Participants: Cordell Thomas
Series Code: TITTB
Program Code: TITTB000010
00:01 On Take it to the Bank,
00:02 you'll find ways to get out of debt. 00:09 Solve your credit card problems. 00:14 How to make and stick with the budget? 00:19 Simple ways to save. 00:25 Buying or selling a home and many more financial matters 00:29 on Take it to the Bank. 00:32 Hi, my name is Cordell Thomas, 00:34 and welcome to Take it to the Bank. 00:36 Today we are gonna talk about something 00:38 that I think is of vital importance 00:39 to each one us. 00:40 We talked about information that's out there about you, 00:44 consumer information, your privacy, 00:45 and I think what we need to do 00:47 now is talk about ID theft and fraud 00:50 which is a real part of our existence. 00:52 We work so hard to... 00:55 Hopefully we work so hard to develop our budgets, 00:58 we work so hard to develop 01:00 an understanding of what money we can put away into savings, 01:03 and what we can do with our budgets, 01:05 and what we can do with our investments. 01:08 But there is an element out there 01:11 that would like to get in between us and our funds 01:14 and they're using many different methods 01:16 that are available to them. 01:18 We live in a technological age 01:20 where at the moment you hit a submit key, 01:23 that information is gone in minutes. 01:25 We live in an age where information you place 01:27 out there on the internet, once you release it, 01:30 you can never get it back. 01:31 And we need to understand 01:33 that there is an important element 01:34 for each one of us to understand 01:36 when it comes to our personal information. 01:39 Think about it. 01:41 Close to 40 percent of individuals 01:43 that are out there right now have no clue 01:45 that their identity has been stolen 01:47 for three months. 01:49 It takes up to 40 percent of those individuals 01:51 three months to know 01:53 that their identity has been stolen. 01:54 Guess what happens in three months? 01:57 A lot of things can happen 01:58 in reference to inappropriate charges on your credit. 02:03 A lot of other things that can, 02:05 they can happen from that standpoint 02:06 and your information has already probably been sold 02:09 on a global basis to these markets 02:12 that are looking for that type of information. 02:14 It is a real part. Here is another statistic. 02:17 Close to 20 percent of individuals 02:20 don't know for up to four years 02:22 that their identity has been stolen. 02:24 Four years, and that is a stark reality 02:27 because, you know, if it's been four years, 02:30 you know, how much damage has been done? 02:33 It's essential that we get into the habit, 02:35 on an ongoing basis, on a regular basis 02:38 to take a look at our credit report. 02:41 You have to be in touch with that 02:43 because you shouldn't be one of those individuals 02:47 that doesn't know for an extended amount of time. 02:50 Okay, I have a short story for you, 02:54 and I must share this with you because it impacted my family 02:58 and in-law had the same issue happened to her, 03:00 ID theft, and what happened? 03:02 She was fortunate, 03:04 these thieves actually had a scammer. 03:05 I think, they had a skimmer 03:07 that was out there with her at the actual bank. 03:09 When she went to a bank 03:10 to find out about getting a loan 03:13 for an additional property she wanted to purchase. 03:15 It was interesting because we don't know 03:17 exactly what happened, 03:19 but her credit card information or her social security number 03:23 or whatever that information was out there. 03:25 There were some warning signs 03:27 because that individual who stole her identity 03:30 tried calling her mother-in-law 03:32 to find out some details about her life 03:34 such as mother's maiden name, 03:36 and such as where she actually lived, 03:38 and the number of the house, 03:39 and a couple of other bits of information 03:41 that could have secured their ability 03:44 to completely steal her information. 03:47 But something came up 03:48 because one of the credit agencies 03:50 that or applied to saw a warning sign 03:53 because the address that they used 03:55 on the actual application was an uninhabited building 04:00 in the downtown location where they lived. 04:03 So that popped up a warning sign 04:04 and the actually contacted her 04:06 and said, "Hey, you don't live here 04:07 but somebody's applied for credit in your name 04:09 and that was a beginning of the potential nightmare. 04:13 She didn't know exactly what to do 04:15 as many of us don't because we don't think 04:16 it's going to happen to any one of us. 04:18 And she called me up and said "Hey, Cordell, what do I do?" 04:20 What are the things that I should take care of 04:22 in reference to protecting myself." 04:24 And there is three things 04:25 you should remember to do if in fact you find 04:29 that your identity has been compromised. 04:30 Number one, contact the police department. 04:33 Call them immediately. 04:34 They have a department open 24/7 04:37 that will handle your specific fraud complaint 04:40 and file a report on your behalf. 04:42 And you'll find that's going to be 04:43 important support mechanism, 04:45 and the report will be very helpful 04:48 when you approach your creditors, 04:50 and as well approach the credit bureaus 04:53 which leads to the second thing you should do. 04:55 Number two, contact the credit bureaus, 04:58 they have each one of the three have a 800 number for frauds, 05:02 specifically for fraud, 05:03 and I believe that those numbers 05:05 are now 24/7 numbers. 05:07 So you don't have to wait overnight 05:09 or you don't have to wait over a weekend. 05:11 You can pick up and call them 05:13 and let them know that you believe 05:14 that your identity has been compromised, 05:17 and they can pretty much put a freeze on your account, 05:20 and they'll ask for another lot of information about you 05:24 so that they can actually distinguish 05:27 who you are and filter out anyone 05:29 that may be calling in about credit on your name. 05:32 The third thing and the most important thing 05:35 you should also do is contact your creditors. 05:41 The interesting thing is what transpired 05:44 after these things occurred and she got these phone calls, 05:47 there is all of a sudden all around the city 05:49 that she lived applications started popping up. 05:53 Back at this department store, 05:54 at this organization, at many different places, 05:58 and it was interesting as I sat at the dining table 06:01 with her one time, a creditor called her 06:03 and said, "Hey, did you open this account 06:06 over this location?" 06:08 "No I didn't." 06:09 And they verified and went through 06:11 all of her security information 06:12 and they were able to shut that down. 06:14 In her situation she was very lucky 06:17 because the day they were trying to do something, 06:20 that credit card company was able to look 06:23 at some features that are warning signs 06:26 for this person to try to apply 06:28 for credit in this person's name. 06:31 Many different things can occur. 06:33 The fact is you need to be aware 06:35 of what's going on with your specific information. 06:39 You need to protect information that's out there about yourself 06:42 and you need to do as much as you possibly can 06:44 to protect yourself from having your identity stolen. 06:49 Key. 06:51 Now as we continue this conversation, 06:56 I want to give you a few statistics as a result 07:00 of what happens with ID theft. 07:03 For example, victims, 07:05 those who are victims spend between 3000 and 5000 hours 07:10 repairing the damage that's already been done. 07:12 32 percent of these respondents in the survey said 07:15 it took between four and six months 07:18 to deal with their case 07:19 and another 23 percent reported dealing with their case 07:23 from seven months to a year. 07:27 There is monitory cost for identity theft. 07:30 Up to $15, 000 per business, 07:32 victims lose an average of between $1,300 to $14,000 07:38 worth of wages fighting these specific cases, 07:41 and victims spend an average of $1,300 plus 07:45 and expenses related to their case. 07:48 There are practical and emotinous damage done 07:51 with identity theft. 07:52 47 percent of people said that they couldn't get credit 07:56 or had trouble getting credit or a loan 07:58 as a result of identity theft. 08:00 19 percent of victims have higher credit rates 08:03 and 16 percent have higher insurance rates 08:05 based on identity theft. 08:07 70 percent of victims have trouble getting rid of 08:10 or never get rid of negative information on their records. 08:15 Another 45 percent of victims 08:17 feels the sense of denial and disbelief. 08:21 85 percent of individuals find anger and rage 08:24 because of these things 08:26 that are going on in their lives, 08:27 their personal lives from somebody outside 08:29 that really doesn't even know who they are. 08:31 And then of course, 60 percent of individuals responded saying 08:36 that I feel unprotected by the authorities. 08:40 Uses of victim information is quite interesting. 08:43 More than a third of the victims reported 08:45 that their identity thieves committed check account fraud. 08:50 66 percent of victims, 08:52 their personal information was used to open new credit 08:58 in their name. 08:59 28 percent of victims, their personal information 09:03 was used in the purchase of cell phones. 09:05 And if you talk to police, 09:07 you know where these cell phones go. 09:08 These stolen cell phones show up in places 09:10 that they are not supposed to or inappropriate areas. 09:13 And then of course 12 percent of victims 09:14 end up of having warrants, 09:16 warrants issued in their name for financial crimes 09:19 committed by the identity thief. 09:25 This next statistic is quite interesting 09:28 because it has to do with impostor characteristics 09:30 in relationship to the victim. 09:32 Check this out, 09:33 43 percent of victims believe that they know the person 09:38 who stole their identity. 09:41 Up to 25 percent of victims believe the impostor 09:43 is someone who is in a business 09:46 that holds their personal identifying information. 09:48 Consider that. 09:50 We've heard of many of these organizations 09:53 from credit organizations to health organizations 09:57 to many different organizations that have had their data bases 10:01 hacked into and stolen. 10:03 Before you know it, 10:04 that information is all over globe with people 10:06 picking and choosing the personal information on you 10:09 and using it to create a whole new identity. 10:14 16 percent of identity theft victims 10:16 are also victims of domestic harassment 10:18 and abuse by the same perpetrator. 10:22 Responsiveness of victims. 10:25 Police department seemed to be getting more responsive. 10:27 What was interesting with the case with my in-law 10:30 that she was able to call the police department 10:33 at around 11:30 at night, 10:35 and was able to get a fraud investigator, 10:38 and within hours they actually came to her front door, 10:41 and were able to say we can take a report 10:43 but because you don't yet have the information 10:46 from your creditors we would advice you wait, 10:49 and then come in with that information, 10:51 so we can complete the report on your behalf. 10:54 20 percent of victims will have their misinformation 10:57 and errors removed from their credit report 11:00 so it takes vigilance from your perspective 11:03 to ensure that information is taken care of and removed. 11:08 But the quicker you find out about this, 11:11 the quicker you handle this, 11:12 the quicker you are aware of this 11:14 is a better off that you will be. 11:17 Now, I do want to bring in 11:20 Jessica Duong who is our identity theft 11:22 and fraud expert, and I have a question for her. 11:25 What should someone do 11:27 if they suspect that their ID has been compromised? 11:30 Jessica, can you give us an answer. 11:35 The first thing you should do is to go to the police station, 11:39 and file a police report. 11:41 Next there are several different websites out there 11:44 that I'll provide for you, 11:46 and you can put it up for your viewers. 11:49 For example the Federal Trade Commission 11:51 has lots of great resources, 11:55 they have different affidavits that you can printout, 11:58 and fill out, and report any discrepancies. 12:01 Also we work with a company called Kroll, 12:04 they are experts, they're licensed investigators, 12:08 they have attorneys working with them, 12:10 and they are throughout the world 12:13 basically researching, 12:15 and looking out for their clients 12:17 to make sure that if something happens 12:20 to your personal information, 12:22 they can restore your information for you. 12:26 Thank you, Jessica. 12:27 We're gonna actually come back to you in a few minutes, 12:29 we have another question for you but excellent. 12:32 It's interesting what she said because victims of ID theft 12:35 must act quickly to minimize the damage. 12:38 As in my in-law, 12:40 she was able to respond very quickly 12:42 because she had warning signs, 12:43 there are things that are out there. 12:45 There're unexpected calls coming from different locations 12:48 and doing different things. 12:49 People are looking for information 12:51 to complete a profile on who you are 12:54 so they can take that profile and use it as their own. 12:58 So the three things that you do 12:59 as Jessica indicated is number one, 13:02 you need to contact, 13:03 report it to the major credit bureaus. 13:06 Contact the fraud department, 13:07 they're open 24/7 of each of the credit bureaus, 13:10 and report that your identity has been stolen. 13:14 Ask them specifically, just remember fraud alert, 13:17 ask them to place a fraud alert in your files. 13:22 There are three agencies Transunion, 13:26 Experian and of course Equifax. 13:28 Second, file a police report with the local police 13:32 or police where the identity theft occurred. 13:37 Get a copy of a police report, 13:39 and retain it for your records, credit card companies, 13:41 and financial institutions may acquire you 13:44 to show a copy of this report 13:46 to verify that the crime actually happened 13:49 so you need to go, and talk to the police, 13:51 and you need to ask specifically 13:53 for the fraud department. 13:56 Then the third area, 13:57 and the most important is to contact your creditor 14:00 for any accounts that had been fraudulently access 14:03 or open contact, 14:04 the billing enquires and securities department 14:06 for the appropriate creditors or financial institution. 14:10 Close the accounts, and use passwords 14:14 now new passwords, 14:16 not necessarily a mother's maiden name 14:17 that's what everyone uses, 14:19 and that's probably why they were calling 14:21 her mother in-law to find out what is your mom's maiden name. 14:25 And they know the typical questions to ask, 14:27 so change the passwords 14:29 to something a little bit more difficult and challenging. 14:31 Hey, that can be interesting to deal with 14:35 because I figure out passwords that I can't even remember 14:38 so I do is I put them in a safe place, 14:41 and I ensure that I can have access to it when I needed. 14:46 Ask that the old accounts be processed as account closed 14:50 at consumer's request. 14:53 Having a card lost or stolen reference 14:55 because when this statement is reported to credit bureaus, 14:59 it can be interpreted as blaming you for the loss. 15:03 Carefully monitor all of your mail, 15:05 your credit card bills, 15:06 and report immediately to your company 15:09 or your creditor that you see some new fraudulent activity 15:12 and maintain vigilance. 15:14 Remember, there is a Bible verse 15:16 that we talk about in 2 Timothy 4:7, 15:19 and it says therefore I have fought the good fight, 15:23 I have finished the race, I have kept the faith 15:26 therefore there is in store for me a reward. 15:28 I have finished the race. This is a race of endurance. 15:33 I have mentioned before that I have run marathon, 15:36 and it is an interesting capacity 15:39 when you hit that wall. 15:40 It's interesting when you deal with challenges 15:43 during the course of that race, and throughout your life, 15:46 throughout your financial life, 15:47 you're going to deal with many different obstacles 15:51 that you may seem way out of control, 15:53 but, believe me there are options, 15:57 there are things you can do, 15:58 there are things that you can... 16:00 Places you can access and information you can get 16:03 that will help alleviate some of the tensions. 16:06 And as long as you know the top three things 16:08 you need to do in identity theft situation, 16:10 then you know exactly what to do. 16:13 So again what are the three things? 16:15 Contact the police department number one. 16:17 What's number two? 16:19 You want to go and report it 16:20 to the fraud department at your credit bureaus. 16:24 And number three, what is that? 16:26 You need to report it to all of your creditors. 16:29 In that case you're doing as much as you possibly can 16:32 to minimize the problem that's there. 16:35 Now there are some other things you can do 16:37 but before we get into that specific element, 16:40 I'm going to actually go back and have a conversation 16:44 with Jessica with the question is, 16:46 what additional resources are available 16:49 to assist with fraud. 16:53 Jessica, can you address that question? 16:57 The four different types of policies 16:59 that insurance companies have come up 17:00 with is reimbursement, resolution, 17:06 monitoring and restoration. 17:09 What we recommend is to have a combination 17:12 of a monitoring service, 17:14 and then a restoration service when you become a victim, 17:17 experts can restore your information for you. 17:21 Thank you, Jessica, 17:23 it's gratifying to have the resources 17:26 of an expert like Jessica. 17:27 She's been very helpful. 17:28 In fact when the situation happened with my in-law, 17:30 I gave my in-law the information 17:32 that I had in the top of my head, 17:34 but it drove me to begin to understand 17:37 how much this credit card and identity theft 17:40 is really impacting us. 17:42 And I was able to call up Jessica 17:44 and say that I have a problem. 17:47 I have a in-law that has, had her identity stolen. 17:50 She jumped right on the issue 17:52 and gave me a plethora of information, 17:55 a lot of information that was quite beneficial for me 17:58 to also send to my in-law. 18:01 It's real, it happens. 18:03 Be vigilant, follow your credit, 18:06 follow all of your reports. 18:08 Get the free copies of your reports. 18:10 Watch out for new accounts being set up in your name. 18:14 It's really difficult to turn things around 18:17 from that standpoint. 18:19 And then one of the other things 18:20 I would ask you to be careful of is, 18:24 if you're not vigilant, 18:25 you might find warrants for your arrest popping up, 18:28 because these individuals are not nice 18:31 when they get access to a new identity, 18:33 they use it for bad things. 18:35 It's imperative that as you run this race, 18:39 you run it with diligence 18:41 and run it as smart as you possibly can. 18:46 Now I'm going to talk to you 18:48 about something that's important, 18:50 and it's actually a learning curve for me 18:52 because as I learn more about technology, 18:55 there is this new area of identity theft 18:59 that is very important to be aware of. 19:03 There is a difference between 19:06 the typical types of identity theft, 19:08 and internet identity theft. 19:12 The one major difference and one main difference 19:15 between internet identity thefts, 19:18 and basic ID theft in fraud is this. 19:23 With internet identity theft, 19:25 we don't have to wait for a thief 19:27 to physically steal our information, 19:30 instead we may be unwittingly 19:33 handing over the information ourselves. 19:35 What do I mean by that? 19:37 In internet protocol, our identity on the internet 19:40 is made up of several things. 19:42 It's made up of IP address 19:44 or an internet protocol address. 19:47 It's made up of the physical address 19:49 that we live. 19:51 It's made up of usernames and passwords and pin numbers, 19:55 personal identification numbers, 19:57 and social security numbers, 19:58 and birth dates, and account numbers, 20:01 and mother's maiden names, and etcetera. 20:04 Did you know that all of that information 20:06 is out there about you? 20:10 However because we use the internet 20:12 for all sorts of financial transactions, 20:15 criminals are developing sophisticated techniques 20:20 to steal our digital identities. 20:23 Internet ID theft statistics 20:26 show their aim is to use our identities 20:29 to open credit card accounts, bank loans, mortgages, 20:33 and in fact any transaction that will make money. 20:38 Now there are three different forms of how they trick us 20:42 into giving them information. 20:45 Information about us can be stolen 20:47 by computer criminals from the data bases of banks, 20:51 remember I talked about other organizations 20:54 that have had their data bases hacked. 20:57 Their prime target is hacking into the information 21:01 that these major organizations have about us 21:04 so they go after banks, and retailers and ISPs, 21:09 internet service providers 21:11 as well as data clearing houses. 21:15 However there is an easier way for the thief 21:19 that is to come and steal the information from us 21:22 or trick us into providing that information. 21:25 Three different ways I'm gonna provide to you. 21:27 The first one is fishing, 21:30 not fishing going out and throwing out a lure, 21:32 but it's pretty much as same it's 'PHISHING'. 21:39 Just like fishing, sometimes it's called spoofing. 21:42 It's like a lure that's thrown out there 21:44 to catch you as a victim. 21:47 This lure often comes in the form of spam email 21:50 of popup warnings that look like 21:53 legitimate companies that we worked with, 21:56 and the purpose of the phishing lure 21:58 is of such, the purpose is to have you click on a link, 22:04 and to verify and or to cancel a purchase 22:08 that you may have unwittingly made. 22:10 You didn't make the purchase but they act as if you did. 22:14 It might be a popup link to get you to click on 22:18 an update of personal information. 22:21 It may be a request to validate your account 22:24 information to prevent it from being cancelled. 22:27 They put it out there as a sense of urgency, 22:29 and you feel wow, if I don't do anything, 22:31 something's gonna happen, 22:32 and you click on it and unwittingly 22:34 what happens is where the moment 22:36 we click on the link we are directed to a website 22:40 that looks just like our companies website. 22:42 I have actually been phished before, 22:45 and went to a website of a banking organization, 22:50 and it looked just like the original, 22:52 but guess what? 22:54 I knew something was wrong 22:55 because they were asking for information 22:56 that the bank's website never really asks for. 22:59 They never send out an email saying hey, 23:02 we need this information from you. 23:05 And they are asking this type of information 23:08 such as warning signs, security number, 23:12 social security number, 23:13 credit card number or a password. 23:16 When you see that type of thing happening, 23:18 there is a problem. 23:20 Call your bank first, 23:21 and check with them before doing anything 23:24 that might give out personal information. 23:27 57 million people have experienced phishing attacks, 23:32 1.78 million adults have fallen victim to the same 23:35 and it's the cost of phishing right now 23:38 has added up to $1.2 billion plus. 23:42 Look, legitimate companies 23:44 will never ask for our personal information in that manner. 23:48 Second, identity theft statistics on pharming. 23:53 Okay, am I playing a game here with words? 23:56 Not really. This is actually out there. 23:58 Pharming, not "farming" but "pharming" 24:04 if I spell it wrong, please forgive me. 24:07 Identity theft through pharming 24:09 is great deal different than just phishing. 24:11 What's the difference? 24:12 In pharming, a cyber criminal cracks 24:15 the vulnerability 24:16 of an internet service providers DNS server. 24:19 What am I saying? 24:20 They are cracking into a company's information 24:24 and domain name, 24:25 and what they do is once they crack 24:26 into the company's information, 24:28 they steal the company's domain name. 24:32 And so, once they have hacked into it, 24:34 they take the company's name and make it their own. 24:39 So when you click on it, 24:40 anyone going to that genuine site 24:43 of that organization 24:44 is redirected to an identical bogus site. 24:48 That bogus site then takes your information, 24:51 and pin number, and account number 24:54 which the "pharmers" immediately use 24:59 to go back to the genuine site and make purchases. 25:03 Am I confusing you or what not, but it's getting that technical 25:07 and having an understanding 25:09 of what's actually going on out there is critical. 25:12 Pharming is a big, big issue right now 25:16 where a lot of companies are dealing with these issues, 25:21 where their domain name is stolen from them, 25:24 and then their customers that have worked with them 25:27 and been with them for long time 25:29 are forwarded to another site 25:31 which those people take their information 25:34 and then use it to go to the original site 25:37 to make purchases that they take 25:39 and uses their own. 25:41 Phishing, Pharming, 25:48 and then there is number three, ID theft of spam and spyware. 25:55 This is very interesting. 25:56 We can inadvertently download spyware 26:00 by just clicking on a popup ad and viewing a spam email. 26:03 For example, spyware is technology 26:06 that suspiciously or gathers information 26:09 such as personal IDs 26:11 and passwords for bank accounts. 26:14 It can do this by logging all of our keyboard strokes. 26:19 It can log all of our keyboard strokes. 26:21 What you type in to the keyboard 26:23 or by using things called trogons 26:25 and other techniques to collect information from your PC. 26:30 This information is then passed back to the perpetrator 26:35 when we connect to the internet. 26:37 So it automatically goes back to them. 26:40 Spam and spyware risks 26:41 are things that you need to be aware of that compromises 26:46 your personal information and creates problems for you 26:51 if you are not aware of what to look for. 26:52 So in this area of internet ID theft, 26:58 I asked you to do a couple of things. 27:00 If you have a computer and internet access, 27:04 I ask that you put up a firewall. 27:07 Talk to an expert on that, 27:09 someone that knows about computers 27:10 and they'll explain that for you. 27:12 Secondarily, get virus protection. 27:14 These viruses that come in on timely basis are things 27:17 that can hurt you, they can cause a lot of damage, 27:20 they can cause a lot of pain when you find all of a sudden 27:24 that something has happened in your credit file. 27:27 Secondarily, what I asked you to do 27:30 is maintain vigilance 27:31 when coming to your credit information. 27:34 Ask for that free copy of your file on a yearly basis. 27:40 Maintain interaction with your credit companies 27:44 and make sure you stay in touch 27:46 so that if and when something like this can happen, 27:50 you too can be a very educated consumer 27:55 when you begin the process 27:56 of taking it to the bank and saving. 28:00 God bless. |
Revised 2016-06-16