Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit

Size: px
Start display at page:

Download "Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE. Allegheny County District Attorney Investigations Unit"

Transcription

1 Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit

2 Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person s personal data in some way that involves fraud or deception, typically for economic gain. -U.S. Department of Justice

3 In 2017, the number of identity theft victims in the U.S. rose to 16.7 million! Cost of lost data amounts to over $17 billion. Children most targeted over 1 million children were victims in million Americans faced increased risk due to Equifax hack. Account takeovers increased 61% over 2015 totaling $1.4 million incidents. 13% of people who reported to law enforcement did NOT want a report taken. 61% of victims between 30 and 59 years old. 1 in 5 people think stealing online information is not as bad as stealing property in real life. -Javelin Strategy

4 Most at risk? Children 35% higher risk than adults. Smart phone owners 33% higher risk than general public. Persons with personal information on a social media site. Deceased people account for 25% of all identity theft. College students because they have good credit. Victims of data breaches have much higher risk.

5 Discovery Is KEY!! 50% of victims discover their identity has been stolen within three months. 15% of victims do not discover their identity has been stolen for 4 or more years. Over 50 million Americans are utilizing a credit monitoring service. 44% of consumers view their credit reports using AnnualCreditReport.com or CreditKarma.com

6 Most Common Theft Methods: Skim information from transactions inside a store. Paper mail theft. Data breach. Hacking computer networks and databases. Redundant IT equipment (external memory sources). Shoulder surfing Dumpster diving

7 Top States for ID Theft Florida Georgia California Arizona Texas 26% of victims had to borrow money from family or friends 22% lost time at work 15% sold possessions to pay for expenses caused by ID theft 7% obtained a payday loan to make ends meet. -Experian

8 Synthetic Identity Theft Emerging as a major fraud activity in the past 5 to 7 years. Fraud that involves the use of a fictitious identity. Thieves create new identity using combination of real and fabricated information, or sometimes entirely fictitious information. Typically fraudsters obtain a real Social Security number and pair it with a name not associated with that number. They usually seek SSN that aren t being used regularly, such as children or the deceased. Children s SSNs are 51x more likely to be used in this type of fraud. Often the fraud will remain unnoticed for years. Fraudsters build a credit profile for SSN by applying for credit (which is declined). Once file has been established, new credit is granted for that person.

9 Piggybacking Fraudsters exploit the authorized user process by actively recruit cardholders with good credit to add unknown persons/identities (synthetic identity) to their credit cards, often just for a few days. A credit card may or may not be issued to authorized user. The point is that the new person sits on the account for a period of time and inherits the cardholders credit history. Once tradelines are reported to credit bureau, the synthetic identity can be removed by credit history is retained. Legitimate cardholders will receive a fee for this service. This often leads to bust out schemes where unsecured credit is issued to synthetic identity; these credit cards/lines are maxed out, paid with a counterfeit check

10 Card Cracking Schemes Account fraud where a fraudster convinces an account holder to act as an unknowing accomplice in stealing money from your financial institution or a post on social media announcing a contest to win money or a gift card. Offers of quick cash You give fraudster your checking account info including debit card number, PIN and online banking info. Checks deposited into your account remotely. Checks are counterfeit but funds are available now. Fraudsters immediately withdraw money via ATM. Or they ask you to wire them the money. Once checks are returned, your account goes into the negative. You get a kickback or quick cash you were promised. You report your debit card as stolen or compromised.

11 Medical Identity Theft

12 70 million medical records stolen in Anthem breach. 2.3 million people in America were victims of medical identity theft in 2014 up 22% from the previous year. 20% of victims reported receiving incorrect diagnosis because of incorrect information on their medical history. 65% of victim paid an average of $13,500 to pay bills associated with medical ID theft. 47% of victims were exploited by family. Consequences include: Incorrect treatment for victims; False health insurance claims filed; Denial of legitimate medical claims; Arrest for illegal activity by fraudster.

13 What to look for An Explanation of Benefits (EOB) form from your insurance for treatment you never received. Bills/collection calls from doctors or hospitals where you never had service. Notices from your health insurer that you are close to you exceeding your spending cap. What to do HIPPA requires medical service providers to inform you of their privacy practices INCLUDING how to access your medical record. You will have to fill out a form and may have to pay a fee. Does your insurance have online access to your medical records? Get a copy of your MIB (Medical Information Bureau) record. This bureau is used by insurance agencies to share information. You have the right to get one free copy per year.

14 Child Identity Theft

15 Minor s identifying information used by another person for imposter s benefit. 1.3 million children have their identity stolen annually; 50% of those are under the age of 6. Children 19 and younger represent 8% of total victims. Often the perpetrator is known to the child (family member, daycare provider). Targets children because of the length of time it takes to discover the theft. Foster children most at risk.

16 Senior Identity Theft In 2014, reports of identity theft targeting people 50 and older represented about 36% or 2.6 million instances. More susceptible to acts of deception and manipulation. Worked diligently their whole life to achieve good credit. Seniors rarely check their credit reports.

17 49% of individuals 50 years and older are victims. Often scammers are known to the senior (in home aids, doctor s offices). Perpetrators often send mailings to seniors causing them to provide their information voluntarily. More susceptible to acts of deception and manipulation. Florida is state with highest reported senior ID theft cases. Seniors rarely check their credit reports.

18 Seniors Targets of: Medical identity theft Estate identity theft (theft after death) Tax fraud Phone scams Military identify theft (to claim military benefits) Wire transfer fraud Familiar fraud (perpetrators are relatives or friends)

19 Government Identity Theft Also known as Documents/Benefits Theft Stealing personal information to obtain government assistance such as: Social Security retirement benefits; Social Security disability benefits; Medical insurance; Welfare benefits. In 2014, the IRS reported paying out $5.2 BILLION in fraudulent federal tax returns. IRS claims to have stopped an additional $24 BILLION from being refunded to fraudsters. SSA and IRS do not make initial contact using .

20 IRS Tax Fraud Number of affidavits filed with IRS for the first 9 months of 2016 which claimed ID theft dropped 50% to 237,750 from 512,278 in Through September of 2016, 787,000 fraudulent returns requesting over $4 billion were stopped. Dollar amount of fraudulent refunds for 2016 tax year approximated $239 million down from $829 million in IRS now holds Security Summit each year to better combat fraud.

21 Financial Identity Theft Individuals or businesses can be affected. Personal information everywhere! Billion dollar business. Most common type of identity theft!

22 WHO?? Retail Merchants and Their Employees Restaurant Employees Bank Employees Drug Addicts Terrorist Groups Organized Crime Members Illegal Immigrants Your Family Members Your Employees Neighbors

23 WHERE?? Your mailbox Your trash Retailers Restaurants Grocery stores Hospital or health care facilities Discarded/stolen computers Internet Your motor vehicle ATM machines On the telephone Software sharing programs

24 HOW?? Phishing Theft of your trash ( Dumpster Diving ) Purse or wallet theft Dishonest employees Public Records Shoulder surfing Pharming Skimming devises Counterfeit documents EBay & Craigslist scams

25 Identity Theft Schemes Database Hacking Social Engineering Skimming Spam - Spyware Dishonest Employee Fraudulent new accounts Counterfeit Cards/Checks

26 CARD SKIMMING Suspect uses a wedge to store information. contained on credit card strip. Downloads info later to computer. Uses info to create counterfeit cards with your personal information.

27 Suspect uses a wedge to store information. contained on credit card strip. Downloads info later to computer. Uses info to create counterfeit cards with your personal information.

28 Why is skimming so popular? Equipment available over Internet Equipment user friendly Equipment mobile If discovered, its difficult to determine the owner Skimmed information can be sent via anywhere in the world shortly after it is stolen. Victims have no idea their information has been compromised until they receive their financial statements.

29 Restaurants Hotels Gas Stations ATM Machines WHY? Most Common Places High customer volume Credit card often used for payment High employee turnover Convert placement possible

30

31 ATM SKIMMING INSTALLING SKIMMER AT THE DRIVE UP ATM

32 CREDIT CARDS Magnetic strip on back made up of tracks similar to an audio tape Information read by swiping card through a reader device Information includes: Your name Account number Issuing bank

33 Standard ATM machine?

34 False front is attached to ATM with card reader to copy magnetic strip info on your card

35 Look at the pamphlet holder

36 Note the hole in the side

37 Camera/transmitter housed inside

38 Camera can view keypad and monitor and send wireless picture up to 200 meters.

39 Digital Robbery Thermal Imaging Allows ATM Theft From a Distance ATM pins can be stolen using a thermal imaging camera. When ATM users press keys to enter their PIN, they leave behind a residual heat from their fingers.

40 TOOLS OF THE TRADE

41 PHISHING The theft of personal information using s that look legitimate million phishing s are sent EVERY DAY with losses total more than $1 billion dollars a year. will reference a link which will take the victim to an authentic looking web site for a major company. When victim provides personal information, it is used by the thief to commit identity theft.

42 UNKNOWN S/SPAM Could launch bad Spyware. Could cause victim to respond to fraud scheme (i.e. Phishing ). Could cause victim to give up personal info when making a purchase. Best practice is to delete unknown or suspicious looking s.

43 Example of an Unknown Opening this file will launch illicit program

44 Phishing Scenario involving ebay Victim receives an allegedly from ebay and clicks on the link

45 Victim inputs their login information which is captured by the thief

46 Thief captures additional information on the next screen and then redirects victim to legitimate site

47 EBay is shutting down 30 phishing sites per day! Fake ebay site Real ebay site

48 PHARMING Computer hacker using a malicious code acquires domain or host name information for a legitimate website and then redirects traffic to another identical looking (bogus) website. Usually banking or retail websites. Most often used to steal passwords, PIN numbers or bank information. US Airways, QVC, PNC Bank, American Express

49 Vishing Social Engineering Using the telephone in an attempt to scam the user into surrendering private information that will be used for identity theft. The scammer usually pretends to be a legitimate business, and fools the victim into thinking he or she will profit. Often uses VoIP Voice Over IP or Caller ID spoofing

50 SMS SMiShing SMiSHing scams frequently seek to direct the text message recipient to visit a website or call a phone number, at which point the person being scammed is enticed to provide sensitive information such as credit card details or passwords.

51 Example SmS SMiShing TEXTS Congratulations, your entry in our store drawing has won you a $100 gift card. Please click the link to accept your prize. This is an alert notice concerning a large withdrawal from your account. Please respond with your account number to confirm you made the withdrawal. As a valued customer, we are now offering access to our new app. Please click on the link to install. You have been selected for jury duty. If you cannot make it, please call xxxx and have your name and social security number ready.

52 Consumers Rights for Unauthorized Debit and Credit Card Use

53 Fair Credit Reporting Act (FCRA) governs consumers right for fraudulent use of credit cards. Electronic Funds Transfer Act (EFTA) governs consumers right for fraudulent use of debit cards. Consumer protection is stronger for credit cards: Charge-back rights; Credit dispute rights; Credit line available now.

54 Debit and Credit Cards Not Equal Debit Cards: If you report within 2 days of discovery, loss is limited to $50; If you report between 3-60 days, loss limited to $500; After 60 days, no protection for fraudulent use of card! Credit Cards: Regardless of report date, loss is limited to $50. If credit card company has a zero liability policy, you still must report losses within 60 days of the fraudulent charges.

55 Corporate Responsibility Businesses maintain personal identifying information for clients and employees. Many cases of employees stealing this information to sell for profit or for this personal gain. Secure information kept in paper or electronic format. Hackers often gain access to databases. Businesses have a responsibility to notify law enforcement and FTC if they are aware that any personal identifying information could have been compromised.

56 Safeguarding Information Keep only what personal information is necessary. Properly dispose of sensitive material by shredding it. Utilize anti-virus software and firewalls. Limit access of sensitive information. Conduct background checks on all potential employees. Regularly educate and train employees on security issues. Require strong passwords that are not to be shared. Have a plan to respond to security incidents.

57 Social-Media and Identity Theft Fraudsters are taking note of personal information such as your birth date on socialmedia sites. Use the highest privacy setting available. Do not accept friend invites from strangers. ANTIVIRUS SOFTWARE!

58 Preventing Identity Theft Promptly remove mail from mailbox and deposit outgoing mail in secure receptacles. Empty your purse/wallet of extra credit or ID cards including your social security card. Make a copy of all items in your wallet and keep in secure location. Examine all credit card and bank statements each month. Do not use birthdates, phone numbers or house numbers as PIN. Never write down your PIN.

59 Report stolen credit cards or any transactions that you did not make immediately. Never respond to unknown or phishing s. Shred all solicitations, bills and document with any financial information using a cross cut shredder when discarding.

60 Make inquiries on unexpected bills. If providing financial information over the Internet, ensure the information is encrypted and the site is secure ( Never give out information over the phone. Always shield your hand and the screen when using the ATM machine, even if no one is around. Consider placing a fraud alert on your account with all three major credit bureaus. Never leave transaction receipts behind. Order and review your credit report once a year at or

61 Important Contacts Equifax Experian Transunion FTC FTC-HELP IFCC For victims of fraud on the Internet

62 Remember... Get good anti-virus software on your computer and smart phone. Secure your Social Security card and other unneeded credit cards. Monitor your credit report at least once a year.

63 Questions???

64 Detective Jackelyn Weibel Allegheny County District Attorney s Office 1444 Hillsdale Avenue Pittsburgh, PA (412) jweibel@da.allegheny.pa.us

Identity Theft: World s Fastest Growing Crime!!

Identity Theft: World s Fastest Growing Crime!! Identity Theft: World s Fastest Growing Crime!! Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit 1 Identity theft and identity fraud are terms used to refer to all

More information

Occupational Fraud. Asset Misappropriation Fraudulent Statements Corruption 3/20/ ACFE Report to the Nations

Occupational Fraud. Asset Misappropriation Fraudulent Statements Corruption 3/20/ ACFE Report to the Nations Detective Jackelyn Weibel, CFE Allegheny County District Attorney Investigations Unit Occupational Fraud Asset Misappropriation Fraudulent Statements Corruption 2012 ACFE Report to the Nations The typical

More information

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki:

c» BALANCE C:» Financially Empowering You Identity Theft Podcast [Music plays] Nikki: Identity Theft Podcast [Music plays] Nikki: You re listening to Identity theft protection. Hi. I m Nikki, your host for today s podcast. Identity theft occurs when someone uses your name, social security

More information

IDENTITY THEFT PROTECT YOUR MONEY

IDENTITY THEFT PROTECT YOUR MONEY IDENTITY THEFT PROTECT YOUR MONEY WHAT IS IDENTITY THEFT Identity Theft is a common term used for all types of crimes in which someone wrongly obtains and uses another personal data in some manner that

More information

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018

IDENTITY THEFT. Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 IDENTITY THEFT Robb Cummings Director, Business Development Spring 2018 KASFAA Conference April 5, 2018 What is Identity Theft? Identity (ID) theft is a crime where a thief steals your personal information,

More information

Identity Theft: Protecting, Monitoring and Resolving

Identity Theft: Protecting, Monitoring and Resolving Identity Theft: Protecting, Monitoring and Resolving Presented by: James J. Holtzman, CFP, CPA Personal Chief Financial Officer and Shareholder Legend Financial Advisors, Inc. James J. Holtzman, CFP, CPA

More information

Identity thieves use a variety of ways to gain access to your personal information:

Identity thieves use a variety of ways to gain access to your personal information: How Identity Theft Occurs Identity thieves use a variety of ways to gain access to your personal information: Steals information from employers, bribe an employee who has access records, or hacks into

More information

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office

Identity Theft: Prevention & Recovery. Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office Identity Theft: Prevention & Recovery Kathi Gosnell Investigator Consumer Protection Division Iowa Attorney General s Office What is identity theft? Stealing personal information and using without permission

More information

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity SAFEGUARDING YOUR CHILD S FUTURE Child Identity Theft Child identity theft happens when someone uses a minor s personal information to commit fraud. A thief may steal and use a child s information to get

More information

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME

WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME WHEN BAD THINGS HAPPEN TO YOUR GOOD NAME Corporal Mark Kincaid Hampton Police Division Community Relations Unit What is Identity Theft? Someone uses your name or personal information to: Open credit card

More information

Financial Crime: Awareness & Prevention. Jon Jarosinski

Financial Crime: Awareness & Prevention. Jon Jarosinski Financial Crime: Awareness & Prevention Jon Jarosinski 1 Objectives Current trends in financial crime How to identify scams Ways you can protect yourself Agenda ID Theft Scams & Con Schemes Credit & Debit

More information

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently

Protect Your Identity. Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently Protect Your Identity Tips and Tools for Safeguarding Your Personal Information from Being Used Fraudulently What Is ID Theft? Many people are falling victim to a new breed of criminal known as identity

More information

Recognizing Credit Card Fraud

Recognizing Credit Card Fraud 1 Recognizing Credit Card Fraud Credit card fraud happens when consumers give their credit card number to unfamiliar individuals, when cards are lost or stolen, when mail is diverted from the intended

More information

UNIT 3-4 Preventing Identity Theft

UNIT 3-4 Preventing Identity Theft UNIT 3-4 Preventing Identity Theft Identity theft occurs when someone uses your personal information without your permission to commit fraud or other crimes. The perpetrator may use your personal information

More information

GREENPATH FINANCIAL WELLNESS SERIES

GREENPATH FINANCIAL WELLNESS SERIES GREENPATH FINANCIAL WELLNESS SERIES IDENTITY THEFT Empowering people to lead financially healthy lives. TABLE OF CONTENTS What is Identity Theft?...2 How Identity Theft Occurs...3 How Identity Thieves

More information

Identity Protection 101: Protect your good name from identity theft.

Identity Protection 101: Protect your good name from identity theft. Identity Protection 101: Protect your good name from identity theft. What is ID theft? Identity Theft: a criminal obtains your personal information and uses it for his/her own gain. Name Birth date Social

More information

Drexel and FMFCU. Presented By

Drexel and FMFCU.   Presented By Drexel and FMFCU www.fmfcu.org/drexel Identity Theft & Fraud Identity Theft & Fraud Don t Be The Next Victim! Identity Theft & Fraud What is Identity Theft? Leading Generation Targeted Federal Trade Commission

More information

Get the most out of your membership

Get the most out of your membership PRIVACY & SECURITY Get the most out of your membership W H AT W E V E D O N E TO G E T H E R S O FA R : Opened a new account! Reviewed the fee schedule, including any fees associated with your account

More information

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions

FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions FPP Virtual Session July 2018 Helping You and Your Clients Avoid Identity Theft Juan Omar Matos, Guidewell Financial Solutions Barry Altland Director, Partner Engagement Who/What is FPP? A Thank You to

More information

2) The proper use and control of credit is the best way to build a good credit history. Answer: TRUE Diff: 1 Question Status: Previous edition

2) The proper use and control of credit is the best way to build a good credit history. Answer: TRUE Diff: 1 Question Status: Previous edition Personal Finance, 6e (Madura) Chapter 7 Assessing and Securing Your Credit 7.1 Background on Credit 1) If you refrain from using any credit, it will assure you the lowest possible interest rate when you

More information

GreenPath Financial Wellness Series

GreenPath Financial Wellness Series GreenPath Financial Wellness Series IDENTITY THEFT Through financial knowledge and expertise, we provide high-quality products and services that enable people to enjoy a better quality of life. Smart financial

More information

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath...

Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... UPDATE 2 October 13, 2017 Here is some more information on the Equifax Breach and how you may protect yourself in the aftermath... What could happen? The Equifax breach gave criminals access to vital personal

More information

Protecting Yourself from Fraud including Identity Theft Advanced Level

Protecting Yourself from Fraud including Identity Theft Advanced Level Protecting Yourself from Fraud including Identity Theft Advanced Level Fraud Fraud an intentional effort to deceive another individual for personal gain Arrests for crimes not committed Damaged financial

More information

Three D s of safeguarding your personal data

Three D s of safeguarding your personal data Three D s of safeguarding your personal data Ways you can deter, detect and defend ONE DAY IS TODAY FINANCIAL PREPARATION GUIDE PRODUCTS AND FINANCIAL SERVICES PROVIDED BY THE COMPANIES OF ONEAMERICA 3D

More information

Tax-Related Identity Theft

Tax-Related Identity Theft Tax-Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984-3410 Jason@FreemanLaw-Pllc.com www.freemanlaw-pllc.com Copyright Freeman

More information

Jason B. Freeman, J.D., CPA

Jason B. Freeman, J.D., CPA Tax Related Identity Theft Jason B. Freeman, J.D., CPA Freeman Law, PLLC 2595 Dallas Pkwy., Suite 420 Frisco, Texas 75034 (214) 984 3410 Jason@FreemanLaw Pllc.com www.freemanlaw Pllc.com Copyright Freeman

More information

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation

Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft. MaryPIRG Foundation Identity Theft Handbook Steps to Protect Yourself What to Do If You Are a Victim Policies to Reduce Identity Theft MaryPIRG Foundation What Is Identity Theft? Identity theft is the crime of stealing an

More information

It s not going away. (c) 2014 huberis.net. Identity Theft

It s not going away. (c) 2014 huberis.net. Identity Theft It s not going away Identity Theft San Francisco Bay ISSA 03/12/2014 First, the Scary Statistics From Bureau of Justice Statistics www.bjs.gov 2012 About 7% of persons age 16 or older were victims of identity

More information

Year-end 2016 fraud update: Payment cards, remote banking and cheque

Year-end 2016 fraud update: Payment cards, remote banking and cheque Year-end 2016 update: Payment cards, remote banking and cheque 30 March 2017 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments

More information

Learn about identity theft. Investor education

Learn about identity theft. Investor education Learn about identity theft Investor education Protecting a vital asset: Your identity A 2015 report on identity theft by Javelin Strategy & Research found that more than 12 million Americans were the

More information

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow

Identity Theft. Help Your Students Avoid This Epidemic Sun Ow Identity Theft Help Your Students Avoid This Epidemic Sun Ow 34% of identity theft victims are college students Did You Know Only 24% of fraudulent charges were first caught by a consumer s financial institution

More information

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft?

Slide 1. Slide 2. Slide 3. Identity Theft Coverage. Today s Agenda. What is Identity Theft? What is Identity Theft? Slide 1 Identity Theft Coverage Presented by Hartford Steam Boiler Inspection & Insurance Company Copyright 2010 The Hartford Steam Boiler Inspection and Insurance Company Slide 2 Today s Agenda What is

More information

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office

10/27/2017. Identity Theft. Consumer Protection Section. Ohio Attorney General s Office Identity Theft Consumer Protection Section Ohio Attorney General s Office 1 What is Consumer Protection? Ensures a safe marketplace for consumers. Enforce laws related to: Home improvement work Seeing

More information

Introduction to Fraud Detective Kirby Shoemake

Introduction to Fraud Detective Kirby Shoemake Introduction to Fraud Detective Kirby Shoemake Fraud In criminal law, fraud is an intentional deception or coercion made for personal gain and to damage another individual in some way shape or form. Types

More information

Protecting against and recovering from fraud and identity theft WHAT TO DO

Protecting against and recovering from fraud and identity theft WHAT TO DO Protecting against and recovering from fraud and identity theft WHAT TO DO Our commitment At J.P. Morgan, protecting your information and assets is our top priority. As a client, you benefit from the controls

More information

Identity Theft: Help Your Students Avoid This Epidemic

Identity Theft: Help Your Students Avoid This Epidemic Identity Theft: Help Your Students Avoid This Epidemic John Brown Great Lakes Educational Loan Services jwbrown@glhec.org Financial Aid Evolution: Change Agents OASFAA Fall Conference 2015 34% of identity

More information

Identity Theft.

Identity Theft. Identity Theft www.kofetime.com 1 Some Facts about Identity Theft: 30.8 million Americans have been victims of identity theft in the last three years, including 11.6 million people in the last year alone.

More information

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan

Identity Theft & Identity Fraud. By Kevin Sullivan. Page 1 Anti-Money Laundering Training, Kevin Sullivan Identity Theft & Identity Fraud By Kevin Sullivan Page 1 Table of Contents What is Identity Theft?... 3 What is Identity Fraud?... 4 How is Personal Information Stolen?... 5 How Your Personal Information

More information

2017 annual fraud update:

2017 annual fraud update: 2017 annual update: Payment cards, remote banking, cheque and authorised push payment scams March 2018 The threat from is always changing, but the finance industry is continuously enhancing its response,

More information

Scam Type #1: Wire Fraud Scams

Scam Type #1: Wire Fraud Scams 2015 Scam Type #1: Wire Fraud Scams The Goal of Wire Fraud Scams is to have the victim wire or otherwise send money to the Scammer through non-refundable, non-traceable methods such as Wire Transfer; Money

More information

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved.

Identity Theft. Emergency Repair Kit Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit 2008 Beavercreek Marketing, a division of Beavercreek Inc. All rights reserved. Identity Theft Emergency Repair Kit I Think I m a Victim of Identity Theft! What Should

More information

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations

How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations How To Protect Students Against Identity Theft and Complying with Safeguarding Regulations 2017 BY: KAREN REDDICK NATIONAL CREDIT MANAGEMENT 888-692-3964 kreddick@ncmstl.com 1 WHAT DO THESE STARS HAVE

More information

FINANCIAL SERVICES & IDENTITY FRAUD SEMINAR PRESENTERS: MARTHA JOHNSTON, DIRECTOR OF EDUCATION FINANCE AUTHORITY OF MAINE

FINANCIAL SERVICES & IDENTITY FRAUD SEMINAR PRESENTERS: MARTHA JOHNSTON, DIRECTOR OF EDUCATION FINANCE AUTHORITY OF MAINE FINANCIAL SERVICES & IDENTITY FRAUD SEMINAR PRESENTERS: MARTHA JOHNSTON, DIRECTOR OF EDUCATION FINANCE AUTHORITY OF MAINE Introductions 2 Name Teaching responsibilities Seminar Topics 3 Financial Services

More information

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You.

Contents. Table Of. Glossary. Identity Theft? What is. How Do I Prevent Identity Theft? What Do I Do if My. Identity is Stolen? Help You. Identity theft has been the most frequent consumer complaint received by the Federal Trade Commission for the past 13 years. 1 There are a number of ways to steal personal information ranging from stealing

More information

January to June 2016 fraud update: Payment cards, remote banking and cheque

January to June 2016 fraud update: Payment cards, remote banking and cheque January to update: Payment cards, remote banking and cheque October 1. Introduction Financial Fraud Action UK (FFA UK) is responsible for leading the collective fight against in the UK payments industry.

More information

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA

CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX USA CONSUMER FRAUD GLOBAL HEADQUARTERS THE GREGOR BUILDING 716 WEST AVE AUSTIN, TX 78701-2727 USA VII. CREDIT CARD FRAUD SCHEMES Introduction Consumers make purchases using credit every day. Credit card companies

More information

Identity Theft Information for Tax Professionals. August 2017

Identity Theft Information for Tax Professionals. August 2017 Identity Theft Information for Tax Professionals August 2017 2017 Filing Season! Processed 135.6 million tax returns! Issued 97 million refunds! Dispersed $270 billion in refunds! Average refund: $2,700!

More information

Your Guide to. Credit Card Skimming: How to Spot and Avoid Fraudulent Charges

Your Guide to. Credit Card Skimming: How to Spot and Avoid Fraudulent Charges Your Guide to Credit Card Skimming: How to Spot and Avoid Fraudulent Charges The term skimming, as applied to credit cards, involves stealing card account data during a legitimate transaction. It is then

More information

ID Theft Security. Michael G. Solomon. CISSP PMP CISM

ID Theft Security. Michael G. Solomon. CISSP PMP CISM ID Theft Security Michael G. Solomon CISSP PMP CISM www.solomonconsulting.com ID Theft Security What is Identity Theft? And what s the big deal? How can I protect myself? How about my clients? Am I responsible

More information

Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch

Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer Survey presented by RateWatch Accurate Financial Data Since 1989 Security Breaches and Identity Theft Consumer Actions and Opinions Provided with permission to Mauch Chunk Trust Company Source: Security Breaches & Identity Theft Consumer

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN SOUTHEAST DIRECTORS AND SUPERVISORY COMMITTEE CONFERENCE SEPTEMBER 18, 2017 Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer

More information

WHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise

WHAT DO MANY OF US HAVE IN COMMON WITH. Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise WHAT DO MANY OF US HAVE IN COMMON WITH Tiger Woods Oprah Winfrey Martha Stewart Warren Buffet Tom Cruise IDENTITY THEFT: protecting ourselves and our clients Presented by: Eric Albert, Rhonda Davis, Kevin

More information

The Cost of Identity Theft to Business What Business Owners Must Know Now

The Cost of Identity Theft to Business What Business Owners Must Know Now The Cost of Identity Theft to Business What Business Owners Must Know Now An Introduction to the Fair and Accurate Credit Reporting Act (FACTA): What Business Owners Must Know Now It often seems that there

More information

ID Theft Protection Kit

ID Theft Protection Kit ID Theft Protection Kit Congratulations. You ve taken a big step in protecting the power of your credit and your identity. Identity theft is a serious crime. Victims can spend a significant amount of time

More information

Chart 1 How Fraudulently Used Consumer Information is Obtained M A Y

Chart 1 How Fraudulently Used Consumer Information is Obtained M A Y M A Y 2 0 0 6 Payments Fraud: Consumer Considerations by Terri Bradford, Payments System Research Specialist, Federal Reserve Bank of Kansas City, and Bruce Cundiff, Research Analyst, Javelin Strategy

More information

Ohio Conference of Payroll Professionals

Ohio Conference of Payroll Professionals Ohio Conference of Payroll Professionals Dennis Bell October 16, 2014 What is identity theft? Identity theft occurs when someone uses your personal information such as your name, Social Security Number

More information

Charge It Right. FDIC Money Smart for Young Adults. Building: Knowledge, Security, Confidence

Charge It Right. FDIC Money Smart for Young Adults. Building: Knowledge, Security, Confidence Charge It Right FDIC Money Smart for Young Adults PNC is proud to work with the FDIC to offer their Money Smart program to our customers, to support lifelong learning in Financial Education. Building:

More information

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service

v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service www.secretser v ice.gov Taking Charge What To Do If Your Identity Is Stolen U.S. Department of Homeland Security United States Secret Service message from director pierson Technological advances of the

More information

SCTEM. Preventing Fraud and Misuse in Your Card Program. Presented By: Gonca Latif-Schmitt, Managing Director Citi

SCTEM. Preventing Fraud and Misuse in Your Card Program. Presented By: Gonca Latif-Schmitt, Managing Director Citi SCTEM Preventing Fraud and Misuse in Your Card Program Presented By: Gonca Latif-Schmitt, Managing Director Citi Agenda Card Misuse vs. Card Fraud - Definition Card Misuse Card Program Risks Fraud Types

More information

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft.

PRACTICAL MONEY GUIDES. Identity Theft. How to safeguard your identity and financial information from theft. PRACTICAL MONEY GUIDES Identity Theft How to safeguard your identity and financial information from theft. Protect your finances and avoid fraud with these identity theft basics. What to Do If Your Identity

More information

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools

FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT ACCOUNT FRAUD. n Minimize Risk n Vigilance Works n Fraud Prevention Tools FRAUD ALERT! Cyber-Crime Impact on IDENTITY THEFT & ACCOUNT FRAUD n Minimize Risk n Vigilance Works n Fraud Prevention Tools As you probably already know one of the three major consumer credit reporting

More information

REPAIR KIT. Identity theft. SUBJECT: Identity Theft. BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING:

REPAIR KIT. Identity theft. SUBJECT: Identity Theft. BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING: SUBJECT: Identity Theft Identity theft REPAIR KIT BROUGHT TO YOU BY: Ohio Attorney General Richard Cordray WARNING: fastest growing white-collar crime in the US IDENTITY THEFT Message from your Attorney

More information

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE

OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE OLD DOMINION UNIVERSITY PCI SECURITY AWARENESS TRAINING OFFICE OF FINANCE August 2017 WHO NEEDS PCI TRAINING? THE FOLLOWING TRAINING MODULE SHOULD BE COMPLETED BY ALL UNIVERSITY STAFF THAT: - PROCESS PAYMENTS

More information

Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud. Capital of Texas Enrolled Agents CPE November 3, 2009

Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud. Capital of Texas Enrolled Agents CPE November 3, 2009 Everyone's at Risk - Combating the Increasing Threat of Identity Theft and Online Fraud Capital of Texas Enrolled Agents CPE November 3, 2009 When was the first significant instance of identity theft in

More information

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT

TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT TAKING CHARGE WHAT TO DO IF YOUR IDENTITY IS STOLEN FEDERAL TRADE COMMISSION FTC.GOV/IDTHEFT INTRODUCTION 3 IMMEDIATE STEPS 5 Place an Initial Fraud Alert 6 Order Your Credit Reports 8 Create an Identity

More information

jefferson bank visa business check card agreement

jefferson bank visa business check card agreement BUSINESS CHECK CARD AGREEMENT The following is the Agreement between the Business Owner (herein called Owner ) and Jefferson Bank governing the issuance and use of the Jefferson Visa Business Check Card

More information

Today s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center

Today s Speakers. Lisa Weintraub Schifferle. Eva Velasquez. Attorney Federal Trade Commission (FTC) CEO & President Identity Theft Resource Center Today s Speakers Lisa Weintraub Schifferle Attorney Federal Trade Commission (FTC) Eva Velasquez CEO & President Identity Theft Resource Center Overview What is identity theft? What is tax identity theft?

More information

When Your Child s Identity Is Stolen

When Your Child s Identity Is Stolen When Your Child s Identity Is Stolen What is child identity theft? CONSUMER INFORMATION SHEET 3B 2/16/08 Adults are not the only targets of identity theft. In fact, children under the age of 18 can also

More information

Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait!

Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! Receive a Completely Unexpected IRS Tax Refund in Your Bank Account? STOP!!! Don t Take the Bait! By Tom Bassett, J.D., CPA Trending Upward Again in 2018 Taxpayer Identity Theft As head of Commerce Trust

More information

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW

EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW EQUIFAX DATA BREACH WHAT YOU NEED TO KNOW The Denver District Attorney's Office has been working closely with the Colorado Bureau of Investigations to provide you the most up-to-date information on the

More information

Unit 5 - Your Money: Keeping it Safe and Secure

Unit 5 - Your Money: Keeping it Safe and Secure Unit 5 - Your Money: Keeping it Safe and Secure Credit Unions and Banks Banks For-profit companies owned by shareholders Credit Unions Not-for for-profit institutions owned and controlled by its own customers,

More information

Date Here. Welcome University of Michigan International Students

Date Here. Welcome University of Michigan International Students Date Here Welcome University of Michigan International Students U.S. Banking System Overview Banking is regulated by federal and state governments Privacy Disclosure Fraud protection Protection against

More information

What is Identity Theft?

What is Identity Theft? IDENTITY THEFT What is Identity Theft? Identity theft is a growing problem in today s information age. Criminals are becoming more sophisticated in their ability to use your personal information for their

More information

Identity theft can occur even if you have been careful about protecting your personal information.

Identity theft can occur even if you have been careful about protecting your personal information. Dear Customer, Identity theft can occur even if you have been careful about protecting your personal information. If you suspect you have been a victim of identity theft, a fraud, or a scam, we have prepared

More information

SureRent 2020 Private Landlord Tenant Screening Application Package

SureRent 2020 Private Landlord Tenant Screening Application Package Page 1 of 9 SureRent 2020 Private Landlord Tenant Screening Application Package Welcome to Alliance 2020. Your membership packet includes several forms that you must complete before service can be started,

More information

Bank Secrecy Act OFAC FinCEN

Bank Secrecy Act OFAC FinCEN Bank Secrecy Act OFAC FinCEN 2017 CREDIT UNION EMPLOYEE TRAINING Financial Crimes Identify Track Report Common BSA Acronyms CIP CDD CTR SAR FinCEN OFAC Customer Identification Program Customer Due Diligence

More information

MEDICAL IDENTITY THEFT Presented by:

MEDICAL IDENTITY THEFT Presented by: MEDICAL IDENTITY THEFT Presented by: Tami Flemmer, Risk Management Director Melissa Hauer, Corporate Counsel Ernie Thurman, Security Coordinator October 8, 2014 Medical Identity Theft OVERVIEW OF PRESENTATION

More information

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET

LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET LifeLock Product Features LIFELOCK BENEFIT ELITE FACT SHEET LIFELOCK ULTIMATE PLUS FACT SHEET LIFELOCK JUNIOR FACT SHEET 1-877-511-7906 LifeLock.com/Business FACT SHEET LifeLock Benefit Elite LifeLock

More information

Why your PSP should be your best defence against fraud

Why your PSP should be your best defence against fraud Why your PSP should be your best defence against fraud July 2017 processing.paysafe.com Why your PSP should be your best defence against fraud If recent crime statistics have taught us anything, it s that

More information

The fastest growing white-collar crime in the US. Identity theft REPAIR KIT. brought to you by: Colorado Attorney General John Suthers

The fastest growing white-collar crime in the US. Identity theft REPAIR KIT. brought to you by: Colorado Attorney General John Suthers The fastest growing white-collar crime in the US. Identity theft REPAIR KIT brought to you by: Colorado Attorney General John Suthers Message from Attorney General John Suthers Dear Coloradoans: Identity

More information

Credit Cards. The Language of Credit. Student Loans. Installment Loans 12/14/2016

Credit Cards. The Language of Credit. Student Loans. Installment Loans 12/14/2016 Quick Response Explain how you think credit cards work. How much do you have to pay every month? What happens if you pay late? What kinds of fees are involved? Unit 4 - Good Debt, Bad Debt: Using Credit

More information

ROCHESTER INSTITUTE OF TECHNOLOGY

ROCHESTER INSTITUTE OF TECHNOLOGY ROCHESTER INSTITUTE OF TECHNOLOGY Identity Theft Protection Table of Contents Introduction...2 Important Note About Passwords...2 General Information...2 Who is Covered and When...2 You Need to Enroll...3

More information

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet:

Equifax Phone: Address: Office of Fraud Assistance P.O. Box Atlanta, GA Internet: Before you start Telephone calls and other forms of direct communication: Use the worksheet included in this packet to keep a record of all conversations. When reporting fraud or communicating with law

More information

11/14/ FNBT FACT ACT

11/14/ FNBT FACT ACT 1 FNBT FACT ACT This class addresses the Fair Credit Reporting Act which governs the collection and use of information considered in connection with granting credit, providing insurance or offering employment.

More information

Understanding Identity Theft

Understanding Identity Theft Understanding Identity Theft Learn How to Protect Yourself and Your Business A FREE E-book by the Nations Authority on Collecting Money, Michelle Dunn Understanding Identity Theft, learn how to protect

More information

Identity Theft Protection Plans

Identity Theft Protection Plans Identity Theft Protection Plans V E R I F Y P R O T E C T R E C O V E R IN 2017, DATA BREACHES REACHED ECONOMIC PROPORTIONS A victim may need to spend time at work trying to recover their good name and

More information

IDShield National Plan Benefit Overview

IDShield National Plan Benefit Overview IDShield National Plan Benefit Overview IDShield is an industry leader in identity theft protection, monitoring and restoration services. Through IDShield, participants receive a comprehensive set of identity

More information

Frequently Asked Questions

Frequently Asked Questions Account to Account Transfers... 1 Bill Pay... 1 Branch Locations and Hours... 2 Credit Card Business... 2 Credit Card Personal... 3 Cybersecurity Information... 3 Debit Cards... 4 estatements/enotices...

More information

2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER

2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER 07/13/2017 Version 2 2018 ERO Compliance Training RETURNING CLIENTS REFUND TRANSFER 2018-2B SECTION ONE: 2018 Product Suite Our portfolio of financial services and our commitment to customer service will

More information

Preventing Senior Scams. Welcome. MoneyWi$e is a joint financial education project of Consumer Action and Capital One

Preventing Senior Scams. Welcome. MoneyWi$e is a joint financial education project of Consumer Action and Capital One Preventing Senior Scams Welcome MoneyWi$e is a joint financial education project of Consumer Action and Capital One Overview of topics Recognizing scams Protecting yourself from fraud Steps to take if

More information

CREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1

CREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1 CREDIT: HELPFUL OR HURTFUL? Ch 13 Section 1 DO NOW: T/F? 1. Using credit can lead to serious problems. 2. When you charge a purchase with a credit card, you can withhold payment if the product is defective.

More information

A Definitions: Europ Assistance USA, Inc East-West Highway, Suite 1000, Bethesda, Maryland 20814

A Definitions: Europ Assistance USA, Inc East-West Highway, Suite 1000, Bethesda, Maryland 20814 This website is owned and/or operated by Europ Assistance USA, Inc. and is subject to the terms of use, privacy policy, and other legal notices posted on their website, which you should read before proceeding.

More information

TRAVEL CARD PROGRAM POLICY AND PROCEDURES. West Chester University

TRAVEL CARD PROGRAM POLICY AND PROCEDURES. West Chester University TRAVEL CARD PROGRAM POLICY AND PROCEDURES West Chester University 201 Carter Drive, Suite 200 West Chester, PA 19383 PURPOSE To establish a methodology for use and define the limits of the West Chester

More information

Credit Matters Credit Concept Workshop Presentation Script (Part II of II)

Credit Matters Credit Concept Workshop Presentation Script (Part II of II) Credit Matters Credit Concept Workshop Presentation Script (Part II of II) (HAND OUT QUIZ PRIOR TO PRESENTATION) Opening Slide: WELCOME BACK TO THE SECOND PRESENTATION OF THE CREDIT CONCEPTS WORKSHOP SERIES.

More information

ID Theft Toolkit and Affidavit

ID Theft Toolkit and Affidavit ID Theft Toolkit and Affidavit Identification Theft Toolkit Safeguard yourself from ID Theft ID Theft the unauthorized and illegal use of your name, Social Security number or other personal information

More information

Services & Features for Employee Benefit Members

Services & Features for Employee Benefit Members Services & Features for Employee Benefit Members IDShield offers one of the most comprehensive products on the market for protecting and restoring your identity. The following is a list of IDShield s specific

More information

SCAMS TARGETING BANK CUSTOMERS

SCAMS TARGETING BANK CUSTOMERS 6. Lottery scams: You might be told you won a lottery (typically one that you never entered) and asked to first send money to the lottery company to cover certain taxes and fees. Similar examples involve

More information

Call for assistance with registration and activation. You will be asked for your Access Code if registering by phone.

Call for assistance with registration and activation. You will be asked for your Access Code if registering by phone. Your Community West Credit Union checking account is about to work for you. Now it s time to start taking advantage of the benefits and features your account offers: IDPROTECT identity theft monitoring

More information

Welcome to Money Essentials SM!

Welcome to Money Essentials SM! Money Essentials SM Welcome to Money Essentials SM! Money Essentials provides you with a valuable, easy to understand introduction to financial services and is designed to give you realistic choices in

More information

Savvy Saving Seniors Steps to Avoiding Scams and Fraud

Savvy Saving Seniors Steps to Avoiding Scams and Fraud Savvy Saving Seniors Steps to Avoiding Scams and Fraud April 24, 2014 Kathy Stokes, WISER Senior Fellow Women s Institute for a Secure Retirement Maggie Flowers, Senior Program Manager, Economic Security

More information