Stolen Photos & Identity TheftIdentity Theft Identity theft is when someone uses another person's personal identifying information, without their permission, to commit fraud or other crimes. In both the U.K. and the United States it is the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources.
According to estimates from the federal Bureau of Justice Statistics, nearly 17 million people experienced at least one incident of identity theft in 2012 (last year data available), causing financial losses totaling almost $25 billion. In 2013, the Federal Trade Commission (FTCFTC The Federal Trade Commission (FTC) is an independent agency of the United States government whose principal mission is the enforcement of civil (non-criminal) U.S. antitrust law and the promotion of consumer protection. The FTC can also act as a clearinghouse for criminal reports sent to other agencies for investigation and prosecution. To learn more visit www.FTC.gov or to report fraud visit ReportFraud.FTC.gov) reported that identity theft complaints are the most common consumer complaint, affecting Americans of all ages and backgrounds.
Unfortunately, all too often people post their most secret information on social media. From Date of birth, to parents, to social security numbers, people do not think through how much is accessible to scammers and identity thieves.
To address the growing threat of identity theft, in 2008, the United States Congress passed the Identity Theft Enforcement and RestitutionRestitution Restitution is where a court orders the defendant to give up his gains to the claimant (victim). It should be contrasted with Compensation, the law of loss-based recovery, in which a court orders the defendant to pay the claimant for their loss. Act (ITHERA), a federal law that seeks to strengthen efforts to prosecute identity theft while also improving restitution available to victims.
The Identity Theft Enforcement and Restitution Act
What Does The Act Do?
Identity theft was not a federal crime until Congress passed the Identity Theft Assumption Deterrence Act in 1998. However, under that law, certain federal charges could only be brought where the offense involved interstate or foreign communications and, in cases of computer fraudFraud In law, fraud is intentional deception to secure unfair or unlawful gain (money or other assets), or to deprive a victim of a legal right. Fraud can violate civil law (e.g., a fraud victim may sue the fraud perpetrator to avoid the fraud or recover monetary compensation) or criminal law (e.g., a fraud perpetrator may be prosecuted and imprisoned by governmental authorities), or it may cause no loss of money, property, or legal right but still be an element of another civil or criminal wrong. The purpose of fraud may be monetary gain or other benefits, for example by obtaining a passport, travel document, or driver's license, or mortgage fraud, where the perpetrator may attempt to qualify for a mortgage by way of false statements. A fraud can also be a hoax, which is a distinct concept that involves deliberate deception without the intention of gain or of materially damaging or depriving a victim., where the victim suffered at least $5,000 in damages.
When it was passed in 2008, the Identity Theft Assumption and Deterrence Act removed some of these barriers and further promoted prosecutions of identity theft by:
- Allowing prosecution of cases that do not involve interstate or foreign communications
- Removing the requirement to show $5,000 in damages
- Making it a felony to damage, in a one year period, 10 or more computers used by the federal government or financial institutions
- Expanding the definition of cyber-extortion
- Prohibiting conspiracies to commit computer fraud
- Expanding interstate and foreign jurisdiction for prosecution of computer fraud offenses
- Imposing criminalCriminal A criminal is any person who through a decision or act engages in a crime. This can be complicated, as many people break laws unknowingly, however, in our context, it is a person who makes a decision to engage in unlawful acts or to place themselves with others who do this. A criminal always has the ability to decide not to break the law, or if they initially engage in crime to stop doing it, but instead continues. and civil forfeitures of property used to commit computer fraud offenses
- In addition, the Act sought to more fully compensate victims of identity theft by authorizing courts to issue restitution orders that require payments to victims not just for the actual harm caused, but also for the time they spent fixing the damage caused by the theft of their identities.
What Can I Do If My Identity Has Been Stolen?
Along with protecting all of your financial assets, it is important to immediately report any identity theft to the proper authorities. This can help to protect you from further harm and will also enable the authorities to track down the perpetrators before they can harm anyone else.
To report identity theft, contact your local policeLocal Police The Local Police is your first responder in most countries. In most English-speaking countries and in Europe report to them first. In other countries look for your national cybercrime police units to report scams to. In the U.S., Canada, & Australia, you must report to the local police first. department or sheriff’s office. You should also file a complaint with the Federal Trade Commission. You can also file a report with your local FBI Office, which investigates violations of federal identity theft laws.
Keep in mind that, with the increased restitution available to victims under the Identity Theft Enforcement and Restitution Act, you may be able to recover not just for your actual losses, but for the time spent in trying to fix all of the damage done. That being said, it is important to keep track of all of your efforts and time spent remedying the harm caused by the theft of your identity.
If you’ve been a victim of identity theft, you may also want to speak with a consumer protection attorney in your area to ensure that your rights are protected and to determine what additional remedies may be available to you under federal or state law.
Stolen Identity? What to Do Next
Identity theft victims often don’t know their personal information has been compromised until the damage already has been done. Responding early to a stolen identity is key but it’s never too late to take action if you have been a victim of identity theft, including the use of your photos for impersonationImpersonation An impersonator is someone who imitates or copies the behavior or actions of another. There are many reasons for impersonating someone, such as: part of a criminal act such as identity theft, online impersonation scam, or other fraud. This is usually where the criminal is trying to assume the identity of another, in order to commit fraud, such as accessing confidential information or to gain property not belonging to them. Also known as social engineering and impostors..
Victims spend an average of $1,200 in out-of-pocket expenses and anywhere between 175 and 600 hours over months or years recovering from identity theft, according to the Federal Trade Commission. But left unchecked, identity theft victims lose an average of $10,000 per attack.
Follow these steps if you believe you are a victim of stolen identity, while taking detailed notes of actions and conversations and making copies of all written correspondence.
1. Review & Place a Fraud Alert on Your Credit Reports
The following information applies to United States residents, but similar services exist elsewhere.
- There are three companies that maintain credit reports, also called credit bureaus. Each is legally required to contact the other two once a fraud alert has been made, but contact any credit reporting companies that fail to provide a confirmation of your fraud alert.
- TransUnion: 1-800-680-7289; www.transunion.com; Fraud Victim Assistance Division, P.O. Box 6790, Fullerton, CA 92834-6790
- Equifax: 1-800-525-6285; www.equifax.com; P.O. Box 740241, Atlanta, GA 30374-0241
- Experian: 1-888-EXPERIAN (397-3742); www.experian.com; P.O. Box 9554, Allen, TX 75013Each of the three credit reporting companies is required to provide a free copy of your credit report once a fraud alert has been made. Review them carefully, looking for inquiries from companies you haven’t contacted, accounts you haven’t opened and debts on current accounts that don’t make sense.
- Get any inaccurate or fraudulent information, such as a misspelled name or incorrect Social Security number, removed. The FTC has instructions for doing this. Use an Identity Theft Report to protect your rights and recover from the crime.
- The initial fraud alert, recommended for those who think they may have been an identity theft victim, lasts for 90 days. This freezes the issuance of any new cards or credit increases for existing accounts and blocks any new credit applicationsApplications Applications or Apps An application (software), commonly referred to as an ‘app’ is a program on a computer, tablet, mobile phone or device. Apps are designed for specific tasks, including checking the weather, accessing the internet, looking at photos, playing media, mobile banking, etc. Many apps can access the internet if needed and can be downloaded (used) either for a price or for free. Apps are a major point of vulnerability on all devices. Some are designed to be malicious, such as logging keystrokes or activity, and others can even transport malware. Always be careful about any app you are thinking about installing.. An extended fraud alert may be obtained by sending the credit reporting bureau a copy of your Identity Theft Report (see link above) and remains in place for up to seven years.
- Check your credit reports often to detect any additional signs of identity theft.
2. Close All Accounts That May Have Been Tampered or Opened Fraudulently
- Contact each company or bank and speak with someone in the fraud or security department, following up in writing (this is important). Include copies of relevant supporting documents but keep the originals in a file. Send letters by certified mail, return receipt requested, so you can document what each company received and when.
- Ask the company for forms to dispute any transactions, such as debits or charges to your existing accounts, made by the identity thief. If they don’t provide such forms, use the FTC’s sample letter (DOC) to help you draft a formal dispute. Address the letter to the company’s “billing inquiries” department, not the address for payments.
- For new unauthorized accounts, file your dispute directly with the company or file a police report (see #4) first and then provide a copy of the “Identity Theft Report” to the company. Filing such an official police report first often gives you greater protection, since companies presented with an Identity Theft Report are required to stop reporting fraudulent information.
- But if you would rather just file a dispute directly with the company first, ask if the company accepts the “ID Theft Affidavit” (PDF) provided by the FTC. If not, ask a company representative for its fraud dispute forms.
- After resolving your identity theft dispute, ask for written confirmation that the company has closed the fraudulent accounts and discharged fraudulent debts. Keep this in your records as proof against any potential future errors in your credit report.
- Use new PIN numbers and passwords when opening new accounts, avoiding personal information such as your birth date or mother’s maiden name.
3. File a Complaint with the Federal Trade Commission (FTC)
- Filing an identity theft complaint with the FTC not only helps you recover from the crime but also assists law enforcement officials track down and apprehend identity thieves. You may file your complaint online, by telephone or by mail.
- 1-877-ID-THEFT (438-4338), TYY: 1-866-653-4261; www.ftccomplaintassistant.gov; Identity Theft Clearinghouse, Federal Trade Commission, 600 Pennsylvania Avenue NW, Washington, DC 20580.
You may update your complaint by calling the Identity Theft Hotline above.
- Your printed FTC ID Theft Complaint form can be used to: (1) blockBlock Blocking is a technical action usually on social media or messaging platforms that restricts or bans another profile from seeing or communicating with your profile. To block someone on social media, you can usually go to their profile and select it from a list of options - often labeled or identified with three dots ••• fraudulent information from appearing on your credit report; (2) prevent fraudulent debts from reappearing on your credit report; (3) prevent companies from attempting to collect debts resulting from identity theft and (4) expedite the process of placing an extended fraud alert on your credit report.
4. File a Police Report
- Contact your local police department or sheriff’s office and file an official report about your identity theft. Most law enforcement agencies will let you file the report over the phone or via the internet if you’re unable to file it in person. If the police are reluctant to take your report, contact another jurisdiction such as your state police department. You can also check your state Attorney General’s office to see if your state requires police departments to file identity theft reports.
- Bring a printed copy of your FTC ID Theft Complaint form and any supporting information if you file your report in person, as these will help expedite the process.
- Ask the officer to include the ID Theft Complaint with the police report and ask for a copy of the Identity Theft Report (the police report) in order to better help you dispute fraudulent accounts or charges. If the officer is unable to give a copy of the police report (as is the case in some jurisdictions), as him or her to sign your ID Theft Complaint and write the police report number in the “Law Enforcement Report” section of the FTC document.
5. Additional Actions
- Stop payment on checks if an identity thief stole checks or opened bank accounts in your name. Contact one of the following check verification companies to report fraudulent activity: Telecheck (800-710-9898), Certegy (800-437-5120).
- If debt collectors contact you about fraudulent debts, inform them in by phone and in writing that your identity has been stolen. Include supporting documentation, such as a police report, in your letter.
- Contact your local postal inspector if you believe mail in your name is being sent to another address and ask to have it sent to your correct address.
- Contact the Social Security Administration (SSA) if you believe your Social Security number has been used to fraudulently obtain benefits: 800-269-0271, www.socialsecurity.gov/oig.
- If your passport was stolen or you suspect someone has obtained a passport in your name, contact the US State Department: 877-487-2778, www.travel.state.gov.
- Contact your local department of motor vehicles if your driver’s license was stolen or you suspect someone has fraudulently used your driver’s license number. Most states allow identity theft victims to place a fraud alert on their license.
6. Photo Theft & Impersonation
- First determine which photos have been stolen and where they are being used. Document each case – printout or do a screen grab.
- Second, notify the websites, social media, or services where your stolen photos are appearing.
- In most cases a claim of impersonation or identity theft will be sufficient to have them removed. However, in select cases you may have to follow a copyright complaint using a Digital Millennium Copyright Act “Take Down” notice. These can be found online and modified for your purposes. You would address the DMCA notice to the website owners, Hosting Company, and any others that have the ability to remove your photos. A failure to properly respond by removing the photos can result in significant additional liability for the website owner.
- Declare the unlawful use of your photos to your family and friends, so that if they see them they will both be aware and can alert you to additional locations.
- This may be a long process, and if your photos are in the hands of African Fraudsters, it may be a never ending one since they reuse archived photos thousands of times,
I have been trying to tell someone that a Minks Dean is on Facebook using Gregory Phillips identity. The police can’t even get him so he would stop.
you are not trying very hard, we have a whole reporting section on our website connected to the SCARSSCARS SCARS - Society of Citizens Against Relationship Scams Inc.
A government registered crime victims' assistance & crime prevention nonprofit organization based in Miami, Florida, U.S.A. SCARS supports the victims of scams worldwide and through its partners in more than 60 countries around the world. Incorporated in 2015, its team has 30 years of continuous experience educating and supporting scam victims.
Visit www.AgainstScams.org to learn more about SCARS. network. Use that.
no usar tinder cuatro persobas que conoci eran falsas identisades
This is great especially the photo theft law holding the thief and the website liable.