protecting y our identity during a disaster · storm. along with the physical break in the 17th...

21
Protecting Your Identity During a Disaster Version 1.1 September 18, 2005 an eGuide Written by Michael J. Santarcangelo, II, CISSP John Sileo, Author The Bald Security Expert Stolen Lives: Identity Theft Prevention Made Simple www.baldsecurityexpert.com www.thinklikeaspy.com © 2005. All Rights Reserved. This eGuide may be freely shared and distributed to anyone who can benefit from this information pro- vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Upload: others

Post on 24-Jul-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

Protecting Your Identity During a Disaster

Version 1.1

September 18, 2005

an eGuide Written by

Michael J. Santarcangelo, II, CISSP John Sileo, Author

The Bald Security Expert Stolen Lives: Identity Theft Prevention Made Simple

www.baldsecurityexpert.com www.thinklikeaspy.com

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 2: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

At 2:00 p.m., Monday, August 29, officials confirmed that the boundary separating New Orleans from Lake Ponchartrain had ruptured, flooding a city poorly prepared for such a storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to function—including those between lawfulness and crime.

As of this writing, identity theft has not been a widely reported side-effect of Katrina. But the average detection time for identity theft is months, not days. Protecting the financial assets and credit worthiness of the victims is an important step in helping them get back on their feet.

How devastating would it be to apply for a line of credit to help your family recover from the hurricane only to find out that your credit now belonged to a thief?

We wrote this guide to quickly get the most important - and validated - information into the hands of people who need it. As soon as we started writing, however, we quickly learned that our task goes far beyond hurricane Katrina - and that we are all faced with the risk of a disaster, further complicating the threat of identity theft.

This guide covers only the most basic and highest priority actions that the victims of a disaster should take to protect their identities. We have included a section on how to prepare yourself to protect your identity before a disaster - since being prepared is the single best action your can take.

We have only included what we consider to be the most important suggested actions; victims have other, more pressing matters on their hands than covering all ID theft pos-sibilities. This is in no way an exhaustive guide nor does it replace good legal counsel. Please refer to the section on Further Resources at the back of this guide for more information.

In addition to this guide, we have established a FREE and moderated forum to foster discussion, clarify points and further unite security and identity theft professionals with anyone interested in protecting their identity. Please join us at:

www.securitysynergy.comTo join the free forum, select the trial membership

Lastly, we wrote this guide based on our experiences and insights - but also from the heart. We consider this to be a work in progress and sincerely hope that it helps you or people you know. Please let us know if you found this eGuide on identity theft valuable - and how we can improve it for those affected by this and other disasters.

John D. Sileo and Michael J. Santarcangelo, II

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 2

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 3: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

Table of Contents

Using This eGuide! 5

1. Before a Disaster! 6

Understand identity 6

Simplify your identity and Reduce Opportunities for Theft and Fraud 6

Destroy Old Files and Documents 7

Lock Up Vital Documents That You Do Not Destroy 8

Secure Electronic Data 9

2. During the Disaster! 10

Bring Your Critical Identification With You 10

Be Mindful of Where You Are and What Information You Share 10

Protect Your Electronic Data 11

Sign Checks and Contracts with a Permanent Marker 11

3. After the Disaster! 12

Learn to Recognize Scams 12

Be Careful When Using the Internet for Information and Assistance 13

Place a Fraud Alert on Your Credit History 13

Order & Monitor Your Credit History from One Credit Bureau 14

Monitor Your Statements Online 15

Electronic Data Recovery 15

4. If Your Identity Has Been Stolen! 16

Place a Fraud Alert with One Credit Bureau 16

Contact New Creditors 16

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 3

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 4: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

Contact Existing Creditors 17

File a Police Report 17

Fill out an ID Theft Affidavit 17

5. Additional Resources! 18

Join the FREE discussion at SecuritySynergy.com 18

Think Like a Spy 18

Ask the Security Expert 18

Additional Resources on the Internet 19

About the Authors ! 20

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 4

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 5: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

Using This eGuideProtecting your identity is not rocket science. There are simple steps that, if taken, greatly reduce the likeliness your identity will be stolen. However, when facing the im-pact of a disaster, your guard may be lowered and you ironically become more vulner-able.

We wrote this guide to provide basic information that allows you to reclaim your thinking in the moment and take some simple steps to prevent a disaster within a disaster. The following sections are organized by priority from the vantage point of the victims—ad-dressing what they need to know first. While this can easily be read from beginning to end, depending on your situation, you may desire to start on a different section.

Section 1 discusses steps that can be taken today to prevent identity theft if you are faced with a disaster. By following these basic suggestions, you will be able to more ef-fectively protect yourself - even before the disaster strikes.

Section 2 discusses what steps you should take during the disaster. If you are already prepared, this section will be a quick reminder of the actions you can take to protect your identity without having to think about it.

Section 3 gives suggestions on what steps you should take immediately following the disaster. Quick action on your part will help protect your identity and prevent “a disaster within a disaster.”

Section 4 gives a very brief checklist of tasks for people who have already had their identities stolen. If you are the victim of identity theft, there are more exhaustive steps you will need to follow, but we provide the basics to help get you started - when time is of the essence.

Section 5 gives further resources for identity theft prevention and education. You can use this section to learn more - and learn how to get involved to help protect yourself and others.

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 5

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 6: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

1. Before a DisasterOnce a disaster strikes, especially with the force of Hurricane Katrina, people lose con-trol over their personal and private information. Businesses become vulnerable to the theft of customer and employee data. For these reasons, it is especially important to take preventative steps to protect private information before a disaster strikes. The sug-gestions included in this guide are meant to point you in the right direction, and should be supplemented by a full privacy audit.

For a comprehensive list of steps that you should take to protect your personal or busi-ness information, please refer to the recently released book, Stolen Lives: Identity Theft Prevention Made Simple.

Understand identityThe single best way to protect yourself is to understand what is it you are protecting. Whether you realize it or not, your identity is comprised of many pieces of information, some more private than others.

As a first step in protecting yourself, spend the time to understand what names, num-bers and attributes make up your identity so that you can protect them. Some examples of identity are your full name, Social Security Number (SSN), bank account numbers, date of birth, address, mother"s maiden name, computer passwords, Internet pass-words, ATM PINs, credit card numbers, driver"s license number, phone number, cell phone number, email address, computer IP address, frequent flyer numbers, garage door opener codes, vehicle VIN #, family member"s names & information, photograph, thumbprint, retinal pattern, voice qualities, and DNA.

Realize that a majority of identity theft happens from physical documents like bank and social security statements, mail, credit cards, checks, etc. This means that physically locking up your documents or destroying files and cards that you no longer need is vital.

Simplify your identity and Reduce Opportunities for Theft and FraudOnce you have gained an understanding of the multiple pieces of information that com-prise your identity - and are therefore targets for the theft of your identity - you can take steps to streamline your identity and reduce the opportunity for someone else to steal it.

In the security world, we call this “hardening” - the act of reducing vulnerability in an ef-fort to provide more protection. While nothing is ever perfect, if you reduce chances for an identity thief to be effective -- or make them work too hard, you have given them a reason to go someplace else.

What does it mean to simplify? It means you need to consider where and how you give out your information - and what information you ELECT to share with other people. Per-haps you should consider closing down Internet accounts you no longer use, change passwords more often and review your credit history to determine if you should close some accounts.

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 6

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 7: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

Note: sometimes closing accounts can lead to a DECREASE in your credit score and overall credit worthiness. Do not take this action without advice from your accounting or legal professional.

Destroy Old Files and DocumentsA paper shredder is the best means of destroying documents, disks and credit cards. Choosing which documents to keep and which to destroy is a personal choice, and can be difficult. The more you destroy, the less you will need to secure (see the next step). If you like to keep documents for longer periods, we recommend buying a larger fire-rated filing cabinet or fire-safe and storing these documents securely rather than destroying them.

Place the shredder near to where you open mail or file documents so that you shred what would have normally been thrown away. If you have several locations throughout the house where you deal with these types of documents, collect the papers at each lo-cation and shred them once or twice a week before they go into the trash. Make sure that the shredder isn"t where small children can get to it. If you don"t want to buy a shredder, make sure you tear the documents into small pieces.

Here is a quick list of some of the most vulnerable items that go out in the trash and are good candidates for the shredder:

• Pre-approved credit card offers • Credit card receipts

• Convenience checks from credit card companies

• Pay stubs

• Copies of mortgage and loan docu-ments

• Utility bills

• Social Security annual statements • Phone bills

• Credit card statements • Cell phone bills

• Cancelled checks • Insurance/Medical statements

• Bank statements • Car registration/insurance

• Brokerage statements • Expired driver"s licenses

• Copies of tax records or notes • Expired credit cards

The best way to determine what historical financial documents to destroy is by asking your tax accountant or lawyer. If you do not have someone to ask, or you run out of

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 7

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 8: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

time, lock the documents up rather than destroying them. As long as they are protected, you can always get advice later and take the right action.

Start shredding any papers that are going in the trash immediately -- don"t wait! Be gen-erous with what you shred--overcompensating won"t hurt you (unless you shred some-thing you need).

As you file your latest statements, cancelled checks, tax information, etc., decide if it is time to destroy the outdated copies of these documents. Check with your accountant so that you know what to keep for tax purposes, etc.

Use your new shredder as a reason to clean off the piles of identity on your desk, in your files, and throughout the house. Remember, 50% of identity theft is committed by someone that the victim knows. Identity theft inside of the home is often committed by domestic help, contracted workers, guests and even friends and family. By shredding and locking those sensitive documents, you lessen the temptation for dishonest visitors.

Lock Up Vital Documents That You Do Not DestroyBuy a fire-safe or fire-rated filing cabinet for your home. This is where you will store your essential identity documents. Save money by purchasing a filing cabinet that is also fire-rated and eliminates the need for a fire-safe and a locking filing cabinet. Your safe or cabinet should meet these minimum requirements:

• Able to withstand 1500 F for 30 minutes

• Lockable by key or combination

• Heavy enough to discourage theft or be secured to the ground

• Preferably waterproof (in case of fire or other disaster, your house will get wet)

It is nice to buy stackable units so that your safe storage can expand as your docu-ments expand.

If possible, it would be smart to store a copy of your most vital documents (photocopy of driver"s license, birth certificate, last will and testament, home and car titles, etc.) in a different geographic location. Many of the documents that would be stored in your local bank, for example, are not much safer there in a natural disaster than they are in your home. Think about the documents you would need were a disaster to occur and keep a copy out of harms way. If you bank with a regional or national bank, ask them about get-ting a safety deposit box at a branch location outside of your area.

Make a photocopy of the contents of your wallet so that you have an easy place to find information if you need to cancel or suspend accounts. Include the phone numbers of credit card companies, your banks and brokerages. Store these copies with the items listed above.

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 8

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 9: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

Secure Electronic DataWe now store and process much of our personal information on our computers, laptops, cell phones and Personal Digitial Assistants (PDAs). Consider investing in a hardware or software firewall and anti-virus to protect your computer and valuable information.

Before selling or donating your computer, make sure you have formatted the hard drive so that your data cannot be reconstructed. If you are throwing away or selling a cell phone, make sure you clean all of your contacts and information off first.

This is an area with a lot of important considerations. Come to the forum at Security Synergy to learn more about how to protect your electronic data.

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 9

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 10: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

2. During the DisasterThese steps are designed for you to take during the disaster, or in some cases, imme-diately after the health and safety of you and those around you is ensured.

Don"t wait for the disaster - during a moment of crisis, you need to act quickly to protect your life and the lives of others. By being prepared, you will be able to follow these sim-ple steps to protect yourself.

Bring Your Critical Identification With YouDuring and after a disaster, you will need to prove who you are. Can you imagine the stress and agony of not being able to return back to your home or claim your property simply because you can"t prove who you are?

As you are heading for shelter and protecting your family, remember to grab your impor-tant information, which may include:

• wallet

• purse

• checkbook

• passport

• pictures

Please note - we believe you should take steps first and foremost to protect your life and the health and safety of those around you. Hopefully by being prepared, you will have your important information gathered and ready to go, so you can simply take it with you. DO NOT PUT YOURSELF AT MORE RISK - if you are out of time, save your life.

Now that you have all of this information with you - be certain to protect it accordingly. If possible, avoid keeping all of the information in the same wallet, purse or pocket. If a thief is able to gain your social security card, passport, drivers license and a credit card at the same time, they have hit the jackpot!

Bring your documents with you - but then protect them, since they are the key to your identity.

Be Mindful of Where You Are and What Information You ShareEven during a disaster, there are people who will take advantage of the situation and often, those affected by it. The best way to protect yourself is to take some deep breaths and BE PRESENT in the situation.

Your information and your identity is valuable to you. You have a right to protect your-self, even as you are getting help. It"s important to recognize that during a disaster, res-cuers and other help may have a reason for asking information about who you are - es-pecially if they are distributing aid. That said, when asked for information you consider to be too personal, your default answer should be NO.

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 10

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 11: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

We"re not suggesting that you should be mean or refuse help. The likeliness is that someone is actually there to HELP you. If they are trying to help, then don"t be afraid to politely ask questions. You have a right to know why they are collecting your information and how they will protect it.

NOTE: Scam artists expect that you may be suspicious and ask some questions. As a result, they are usually prepared to give a few well rehearsed answers (for the com-monly asked questions) in an effort to convince you they are legitimate. Let your in-stincts guide you in this situation.

If polite questions don"t work, get aggressive. Politely ask to speak to a supervisor. Ask for the location of the management office, take a telephone number of someone to speak to. Ask for the person"s name, compare it to a picture ID and then write down all of the information, as well as a description of what the person looked like.

Protect Your Electronic DataIf you have your information on a laptop, cellphone, Personal Digital Assistant (PDA) or other electronic device - it may be a target for thieves. In a disaster, some thieves will steal anything of perceived value. While their initial intention is not to steal your identity, they will quickly realize the value of the information you have on your device and if they don"t use it themselves, they will sell it to someone else who will.

We have seen in recent disasters the ability of many families and friends to stay in con-tact and exchange information through email and other Internet resources. Be mindful of how you use these resources -- remember, your identity is comprised of many things -- including email addresses, passwords and other pieces of information you may need to use.

Use the same approach you would when using the Internet. If something seems too good to be true - it is. Avoid sites and situations that seem suspicious, out of place or otherwise “not right.”

Sign Checks and Contracts with a Permanent MarkerTo be safe, write and sign your checks and contracts with a permanent marker (some-thing like a Sharpie would be excellent). This will prevent or slow down the efforts of scammers who will “dip” your checks and documents in acid to remove the writing, ex-cept for your signature. This would allow them to perpetrate fraud under your name - without having to actually forge your signature. Don"t give them that chance!

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 11

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 12: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

3. After the DisasterIn the initial hours, days and even months after the disaster, your identity may be a ripe target for identity thieves. By following these basic steps after the disaster, you will pro-tect yourself and your identity, greatly reducing the likeliness it will be stolen.

Learn to Recognize ScamsWhen identity thieves need information, they ask for it. They “socially engineer” or con their victims with a variety of tools, some of which include:

• Impersonating someone that has access or power

• in a disaster, they may pretend to be someone offering help

• Accumulating important data over several conversations

• Identity theives are smart - they know some basic information and will learn more by watching you, talking with you and looking around

• Rushing or forcing you into a decision, especially during an actual disaster or crisis

• Using “scare tactics” to put you into crisis mode

• Intimidating you to convince you to back down

• Putting you at ease by claiming that it is for security purposes or to prevent fraud

• Dropping the names of colleagues, especially those in authority

• Gaining your trust by baiting you with accurate background data

• Just because someone “seems” to know important information about you doesn"t mean they should be trusted

• They provide diversions by starting the conversation with small talk and end with a memorable, totally unrelated story (our brain remembers the beginning and end of a conversation, but tends to forget the middle)

Most importantly, thieves exploit our human biases and weaknesses. They take advan-tage of our pre-conditioning, our basic assumptions about people:

• Humans are trusting by nature

• Giving this small piece of information, by itself, can"t hurt me

• People are generally good

• Don"t question people with authority

• Helping people is admirable

• Don"t slow down a person who"s in a hurry

• Sharing information makes me feel important

• Confrontation is unhealthy

• Saying “no” is bad

• Asking for identification or verification is pushy

We have already seen people taking advantage of these biases and weaknesses with Hurricane Katrina. Fraudulent web-sites have been constructed requesting donations

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 12

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 13: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

for organizations that do not exist. People are offering help to victims of Katrina in order to get their personal information to be used for identity theft.

If it seems too good to be true, it is! Trust your instincts.

The key here is to be skeptical if anyone is asking for your personal information. Ask enough questions that you can verify who they are, their intentions and their credibility. Do not just give away information in exchange for a promise (e.g., “this is how you will get a reimbursement from the government”). Make sure they are who they say they are.

Be Careful When Using the Internet for Information and AssistanceThe Internet has become a valuable tool for us to connect with others and get the assis-tance and information needed to begin the process of restoring your life. Unfortunately, the Internet is also a place where some criminals will work to deceive you and steal your money, information or worse -- your identity!

Here are some simple tips to follow to protect yourself online:1. “look for the lock” - this indicates that the connection between your browser and the server gathering information is protected. This is not perfect, but it is a minimum step. If you don"t see the lock (or other sign of protection), you might want to think twice before entering personal information.

2. Watch out for PHISH - phishing is when a scammer sends you an email that appears to be legitimate (from the government, from your bank, from the Red Cross or other); it somehow asks you for information or to take a specific action - and then provides you a link to follow for more information.

DO NOT follow these links. If the message seems legitimate to you, then close the message, open your browser and go to the website the way you normally would - either through a bookmark or by typing in the address you know to be good.

When in doubt, you can always contact your financial institution by calling the number printed on your credit card, check or bank statement.

Place a Fraud Alert on Your Credit HistoryA credit report is a history of how you pay off your credit. There are currently three credit bureaus in the United States--Equifax, Experian and TransUnion. If you own a home, have a credit card, lease a car, or apply for or use credit of any sort, your use of credit is reported to one, two or all three of these credit bureaus. In addition, they collect infor-mation on how timely you pay your bills, how often you are tardy, how frequently your credit is checked by companies and any changes of address, employment or personal information.

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 13

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 14: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

Call one of the three Credit Reporting Bureaus listed below (based on the first letter of your last name) and ask them to put a 90-day fraud alert on your credit history. Ask them to attach a “victim"s statement” to your account (see the section on what to do if you are a victim of identity theft).

Please be aware that placing a Fraud Alert on your credit report can slow down the process of receiving credit.

In most cases, new lines of credit (credit cards, loans, etc.) will not be extended until the company extending credit has confirmed the new account with you by phone. This is certainly an inconvenience, but a far lesser inconvenience than having your identity sto-len.

Which Credit Bureau to Call:

Last Name Begins With Credit Bureau Phone Number

A-H Equifax 1-800-525-6285

I-P Experian 1-888-397-3742

Q-Z TransUnion 1-800-680-7289

Order & Monitor Your Credit History from One Credit BureauOrder & Monitor Your Credit History from One Credit Bureau. By law, you are entitled to one free report from each agency once a year. The easiest way to get a report is to visit www.annualcreditreport.com or call 1-877-322-8228. You can also request your first re-port when you are placing a Fraud Alert on your account in Step 1, above.

Review Your Credit Report for Signs of Theft or Fraud:

• Once you receive your first credit report, read completely through the entire report and the definitions that the credit reporting agency gives you so that you understand how to interpret the information.

• While reviewing your report a second time, use a highlighter to mark any accounts that you don"t recognize or that appear to contain inaccurate information (e.g., negative credit feedback where there should be none or an account you don"t remember setting up).

Resolve Issues on Your Credit Report:

• Contact the credit bureau about any accounts that you have highlighted because you don"t recognize them or because of erroneous information. Be aware that some com-panies give you a credit card with their name on it (like Sears) that is issued by an-other company (GE Capital). The credit bureau should help you work through the questionable information.

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 14

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 15: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

• If the account appears to be one that you didn"t authorize or set up, report it to the credit bureau immediately.

Monitor Your Statements OnlineHalf of the battle in minimizing identity theft is catching it quickly after it happens. Online bank, credit card and brokerage statements will allow those with internet access to monitor and detect suspicious transactions on a daily basis. In a study conducted by Javelin Strategy and Research, people who monitored their accounts online had an av-erage of $551 stolen and discovered the fraud in an average of 18 days. Those who monitored through paper statements had an average of $4,543 stolen and it took them an average of 114 days to detect the fraud. Rapid detection is half the battle!

To monitor your transactions and statements online, you will first need internet ac-cess. Please note: If you do not have internet access, call your bank, credit card com-pany and/or brokerage company on a regular basis to check for any fraudulent charges or withdrawals that have occurred.

If you know the company that issued your credit card (MBNA, Capital One, Chase, Citi-bank, etc.) call and ask their customer service department to help you set up Internet access to your account. This process can be different by corporation, so we cannot cover all of the different ways in this short guide.

You also have the option of canceling your credit card accounts, but this can reflect negatively on your credit report and can lower your available credit (which could be helpful in the recovery process). Suspend the account, place a fraud alert on the ac-count or have them issue a new credit card (if they will send it to your temporary ad-dress), but cancel the account only as a last resort.

Make sure you alert your bank and/or brokerage that you feel your identity has been stolen, and ask them what steps they recommend.

Electronic Data RecoveryIf you have recovered a hard drive from a computer after the disaster - it may or may not work. If the data is important enough to you, you may want to seek out a data re-covery expert - but please know, this will not be cheap!

If you see an add on the Internet to recover your data for what seems to be a bargain price, please be skeptical. It may be the work of a team of people volunteering their time and talent to help you. Unfortunately, it could also be the work of thieves looking to get your information, which they may use against you.

When in doubt, seek the counsel of your attorney or come to the forums and work with trusted people to get a validated answer.

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 15

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 16: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

4. If Your Identity Has Been StolenIf your identity has been stolen, take the following steps first. When you have completed these items, visit the recovery websites listed in Further Resources. These are only the highest priority steps. Keep a log of every step you take, who you speak with, the date and time of your conversation and the results of your call. This log of contacts could be invaluable later. Make sure that you ask thorough questions of each contact so that you understand the changes that you are making and how it affects your credit.

Place a Fraud Alert with One Credit BureauImmediately place a fraud alert with one of the three credit reporting bureaus. A fraud alert requests that creditors contact you before issuing credit or opening new accounts in your name. If you report it to one bureau they are required to forward it to the other two bureaus.

Which Credit Bureau to Call:

Last Name Begins With Credit Bureau Phone Number

A-H Equifax 1-800-525-6285

I-P Experian 1-888-397-3742

Q-Z TransUnion 1-800-680-7289

Request the Bureau place a fraud alert on your credit file. Have them add a victim"s statement to your report that reads:

“I am a victim of identity theft. Please do not extend credit of any sort with-out contacting me in person. Please use the following numbers to reach me. Do not use the regular work and phone numbers listed on my account as they are no longer in service.[Give them all possible phone numbers where you can be reached].”

Be aware that placing a fraud alert on your credit report can slow down the process of receiving credit. While this can be

an inconvenience, it will protect your identity.

Contact New CreditorsYou should immediately contact all new creditors that have been set up fraudulently. If the identity thief opened a credit card account, call the credit card company and alert them to the problem. Request that they close the account immediately. They may ask for supporting documents such as fraud affidavits and police reports (discussed below).

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 16

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 17: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

Contact Existing CreditorsIf the thief is using your existing accounts (credit cards, lines of credit, etc), contact each company and have your old accounts closed. Request that they tag the accounts with “Account closed at consumer"s request” so that it is clear that you were not at fault. Make sure that you add a password to all existing accounts to provide an additional layer of security.

File a Police ReportImmediately report the crime to a police department in the state where your identity documents were stolen. It is unlikely that they will pursue the thief, but you must have a police report to begin repairing your credit. Make sure that you include these in the po-lice report:

• All fraudulent account numbers that were established.

• All documented proof you have that the accounts are fraudulent

• Any information that you have on the thief or the crime

• Get a copy of the report; this is vital

Fill out an ID Theft AffidavitThe FTC makes a copy of this available at www.ftc.gov/bcp/conline/pubs/credit/affidavit.pdf. You will use this document repeatedly in the next few weeks.

There are many more steps to this process, but you have completed the most important items first. Please consult the section on further resources for additional recovery steps.

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 17

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 18: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

5. Additional Resources

Join the FREE discussion at SecuritySynergy.comwww.securitysynergy.com

If you want to discuss these concepts with John, Michael and others like you - then come join in the discussion. You must be registered to participate, but your privacy will be protected and the information will not be used to solicit you.

To join in the free forum discussion, go to www.securitysynergy.com and click on the register me button and select a FREE trial membership. Your request will be reviewed and approved by an administrator and you will be able to join the forum.

Please register with your real name.

Think Like a SpyLinks to the latest information, websites, resources and a regular newsletter with up-dates on identity theft prevention tips and fraud alerts.www.thinklikeaspy.com

Ask the Security ExpertFor information, resources and the ability to get FREE advice on information security issues - go to the Bald Security Expert.

www.baldsecurityexpert.com

You can ask the Bald Security Expert your question here:

http://www.baldsecurityexpert.com/resources/AsktheExpert/expert-form.html

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 18

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 19: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

Additional Resources on the Internet

Basic theft recoverywww.ftc.gov/idtheft!

Detailed theft recovery www.ftc.gov/bcp/conline/pubs/credit/idtheft.htm!

The most current and credible statistics and prevention strategieswww.javelinstrategy.com/reports/2005IdentityFraudSurveyReport.html !

State-by-state statisticswww.consumer.gov/idtheft/CY2004/statemap.pdf!

Government statistics and informationwww.consumer.gov/idtheft/stats.html www.usdoj.gov/criminal/fraud/idtheft.html

Keeping track of frauds and scamswww.fraudwatchinternational.com

The latest major identity theft stories in the presswww.consumersunion.org/campaigns/financialprivacynow/newsroom.html

The best place to take legislative actionwww.financialprivacynow.org

Great overall websites for consumer rights and identity theft preventionwww.privacyrights.org www.idtheftcenter.org

Detailed information of Phishing and Pharming schemes:www.antiphishing.org

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 19

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 20: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

About the Authors

During 2003, John Sileo"s identity was stolen and used to commit a series of crimes, including $300,000 worth of embezzlement. While the thief operated behind the safety of John"s identity, John was held legally and financially responsible for the felonies committed. Forced to defend his innocence, John spent two stressful years and $9,000 on a criminal lawyer to keep from going to jail.

During that time, John became an expert in identity theft prevention and mitigation strategies. The methods of survival he developed dur-ing this experience are the basis of this book, and are responsible for the successful capture and conviction of his imposter.

John is often asked to speak to associations, corporations and consumers about identity theft prevention and broader issues of privacy. His company provides consulting serv-ices to businesses that wish to proactively protect private information. By applying Think Like a Spy™ methodologies developed for this book, John trains corporations on how to quickly detect and deter data theft and financial fraud on all rungs of the corporate lad-der (from the mailroom to the boardroom).

John graduated with honors from Harvard University and served as a Rotary Ambassa-dorial Scholar to New Zealand. He is the founder of four successful businesses and the acting president of two others. He lives with his wife and two daughters in Colorado.

John can be reached by email: [email protected]

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 20

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/

Page 21: Protecting Y our Identity During a Disaster · storm. Along with the physical break in the 17th Street Canal levee, many other boundaries ceased to functionÑincluding those between

Michael J. Santarcangelo, II, CISSP is an expert on cyber-security and information assurance who brings an unparalleled brand of passion mixed with enthusiasm and honest optimism to his speaking engagements. Drawing on his experience forged “in the trenches” as a consultant to top companies across the country (Arc-tic Region Supercomputing Center (ARSC), Albany Molecular, DoD, Sprint, Global Crossing and others) and guiding them through effec-tive, balanced solutions to security problems, he brings a “real” per-spective, while addressing the role of people, process and technol-

ogy in improving security. The combination of Michael"s business expertise and techni-cal know-how will bring to your group a speaker who really knows information security.

Michael is not only known for his excellent content, but his delivery style. His fast paced and energetic style entertains and captivates audiences as he explains security con-cepts (that most people are scared of) - in a way that is easy to understand. Your group with leave Michael with the confidence to protect themselves and their families.

Michael is the founder of the security-focused services and educational firm The Mi-chaelangelo Group (www.michaelangelogroup.com). His passion for security and desire to improve the profession led him to form the Security Inner Circle (www.securityinnercircle.org) to unite professionals across public, private and academic sectors. Michael is active in security organizations, including serving as a founding president of the Tech Valley (New York) ISSA Chapter and as a secure member of In-fraGard. He also serves on three International committees dedicated to advancing the field of information security.

Michael holds a Bachelor of Science Degree in Policy Analysis from Cornell University.

Michael can be reached by email: [email protected]

Version 1.0 ! ! ! ! ! ! ! ! ! ! ! 21

© 2005. All Rights Reserved.This eGuide may be freely shared and distributed to anyone who can benefit from this information pro-

vided credit is given to the authors. The most current version of this document will be located at www.securitysynergy.com/eGuides/