Tagged: identity theft Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 9:00 am on November 19, 2025 Permalink | Reply
    Tags: , , identity theft,   

    The Data You Forgot Is the Data AI Remembers 

    By Greg Collier

    Your photos, posts, and even private documents may already live inside an AI model—not stolen by hackers, but scraped by “innovation.”

    The Internet Never Forgets—Especially AI:

    You post a photo of your dog. You upload a résumé. You share a few opinions on social media. Months later, you see a new AI tool that seems to know you—your writing tone, your job title, even your vacation spot.

    That’s no coincidence.

    Researchers are now warning that AI training datasets—the enormous data collections used to “teach” models how to generate text and images—are riddled with personal content scraped from the public web. Your name, photos, social posts, health discussions, résumé data, and family info could be among them.

    And unlike a data breach, this isn’t theft in the traditional sense—it’s collection without consent. Once it’s in the model, it’s almost impossible to remove.

    What’s Going On:

    AI companies use massive web-scraping tools to feed data into their models. These tools collect everything from open websites and blogs to academic papers, code repositories, and social media posts. But recent investigations revealed that these datasets often include:

    • Personal documents from cloud-based PDF links and résumé databases.
    • Photos and addresses from real estate sites, genealogy pages, and social networks.
    • Health, legal, and financial records that were cached by search engines years ago.
    • Private messages that were never meant to be indexed but became public through broken permissions.

    A single AI model might be trained on trillions of words and billions of images, often gathered from sources that individuals believed were private or expired.

    Once that data is used for training, it becomes embedded in the model’s neural weights—meaning future AI systems can reproduce fragments of your writing, code, or identity without ever accessing the source again.

    That’s the terrifying part: the leak isn’t a single event. It’s permanent replication.

    Why It’s So Dangerous:

    • No oversight: Most data scraping for AI happens outside traditional privacy laws. There’s no clear consent, no opt-out, and no transparency.
    • Impossible recall: Once data trains a model, it can’t simply be “deleted.” Removing it requires retraining from scratch—a process companies rarely perform.
    • Synthetic identity risk: Scammers can use AI systems trained on real people’s information to generate convincing impersonations, fake résumés, or fraudulent documents.
    • Deep profiling: AI models can infer missing details (age, income, habits) based on what they already know about you.
    • Corporate resale: Some AI vendors quietly sell or license models trained on public data to third parties, spreading your information even further.

    A 2025 study by the University of Toronto found that 72% of open-source AI datasets contained personal identifiers, including emails, phone numbers, and partial credit card data.

    Real-World Consequences:

    • Re-identification attacks: Security researchers have demonstrated that they can prompt AI models to output fragments of original documents—including medical transcripts and legal filings.
    • Voice and likeness cloning: Models trained on YouTube or podcast audio can reproduce a person’s speech patterns within seconds.
    • Phishing precision: Fraudsters use leaked data from AI training sets to craft hyper-personalized scams that mention real details about a victim’s life.
    • Corporate espionage: Internal business documents, scraped from unsecured cloud links, have surfaced in public datasets used by AI startups.

    In short, the internet’s old rule—“Once it’s online, it’s forever”—just evolved into “Once it’s trained, it’s everywhere.”

    Red Flags:

    • AI chatbots or image tools generate content that includes names, places, or images you recognize from your own life.
    • You see references to deleted or private material in AI-generated text.
    • Unknown accounts start using your likeness or writing style for content creation.
    • You receive “hyper-specific” phishing emails mentioning old information you once posted online.

    Quick Tip: If you’ve ever uploaded a résumé, personal essay, or family blog, assume it could have been indexed by AI crawlers. Regularly check what’s visible through search engines and remove outdated or sensitive posts.

    What You Can Do:

    • Limit exposure: Review what’s public on LinkedIn, Facebook, and old blogs. Delete or privatize posts you no longer want online.
    • Use “robots.txt” and privacy settings: These can block crawlers from indexing your content—it won’t erase what’s already scraped, but it stops future harvesting.
    • Opt-out of data brokers: Many sites (Spokeo, PeopleFinder, Intelius) sell personal info that ends up in AI datasets.
    • Support privacy-centric AI tools: Favor companies that publicly disclose training sources and allow data removal requests.
    • Treat data sharing like identity sharing: Every upload, caption, or bio adds to a digital fingerprint that AI can replicate.

    If You’ve Been Targeted:

    1. Search your name and key phrases from private documents to see if they appear online.
    2. File a takedown request with Google or the website hosting your data.
    3. If you suspect your likeness or writing is being used commercially, document examples and contact an intellectual-property attorney.
    4. Report data leaks to the FTC or your country’s data-protection authority.
    5. Consider using identity-protection monitoring services that scan for AI-generated profiles of you or your business.

    Final Thoughts:

    The most dangerous data leak isn’t the one that happens overnight—it’s the one that happens quietly, at scale, in the name of “progress.”

    AI training data leaks represent a new era of privacy risk. Instead of stealing your identity once, machines now learn it forever.

    Until global regulations catch up, your best protection is awareness. Treat every upload, every public résumé, and every online comment like a permanent record—because, for AI, that’s exactly what it is.

    Further Reading:

     
  • Geebo 8:00 am on October 14, 2025 Permalink | Reply
    Tags: , identity theft, , ,   

    Scammers Targeting Open Enrollment 

    Scammers Targeting Open Enrollment

    By Greg Collier

    As open enrollment ramps up across the country, the Wisconsin Better Business Bureau is alerting consumers to a growing wave of fraudulent outreach targeting those updating Medicare or Healthcare.gov coverage. Although the warning originated in Wisconsin, the tactics being reported are not confined to any one state. Similar scams can occur nationwide whenever enrollment periods open and consumers are more likely to engage with unfamiliar contacts.

    The scheme typically begins with an unsolicited phone call or text message offering to assist with switching to a supposedly better or cheaper plan. The caller often insists that coverage is expiring or that immediate action is required. Once trust is gained, the individual is asked to confirm personal details such as a Medicare ID number or Social Security number. Some scammers go as far as verifying existing addresses to appear legitimate before advancing to sensitive questions.

    Reports show that these contacts can sound convincing. In some cases, the caller pretends to be checking on delivery of a new Medicare card. In other instances, text messages urge the recipient to call immediately to prevent cancellation of benefits. Once the conversation shifts toward payment requests or demands for account verification, the deception becomes clearer, although not always before harm occurs.

    What makes these scams particularly dangerous is what happens afterward. Stolen Medicare and Social Security numbers are not left unused. They can be employed to submit fraudulent medical claims in the victim’s name or redirect benefits without consent. In some cases, scammers initiate unauthorized plan changes that interfere with legitimate coverage. What begins as a brief interaction can lead to months of identity recovery, financial disputes, and corrections to medical records.

    The BBB emphasizes that legitimate assistance with plan enrollment is available through official channels only when the individual reaches out first. Licensed representatives for Healthcare.gov or Medicare are not permitted to charge for enrollment support and will not initiate contact unexpectedly. Any offer that relies on urgency, pressure, or promises of incentives in exchange for personal data should be seen as a serious warning sign.

    Even offers that appear generous, such as complimentary health screenings or gifts for switching plans, may be tactics designed to collect private information or filter out individuals based on health status. Some brokers try to identify only healthy applicants to manipulate their client pool, which is prohibited by Medicare rules.

    Consumers are encouraged to avoid clicking on links in suspicious messages or responding to unfamiliar communications about benefits. When in doubt, it is safest to visit Medicare.gov or Healthcare.gov directly rather than relying on third parties. Those who receive unexpected messages regarding employer-provided benefits should confirm legitimacy with their workplace before taking any action.

    Health care enrollment is already complex without the added risk of fraud. A cautious approach can prevent not only frustration but also long-term damage to personal identity, financial security, and access to care.

     
  • Geebo 8:32 am on October 2, 2025 Permalink | Reply
    Tags: identity theft, , ,   

    Moving Scams Surge This October 

    Moving Scams Surge This October

    By Greg Collier

    October is one of the busiest months of the year for residential moves, and consumer protection organizations are cautioning that the chaos of relocating often creates opportunities for scams. The process of packing, transporting, and resettling can be stressful and time-consuming, which makes it easier for fraudulent operators to take advantage of people at a vulnerable time.

    Reports from consumer complaint channels describe a range of deceptive practices. In some cases, individuals receive an initial estimate that changes once belongings are loaded onto a truck, leaving them pressured into paying more. Others have described paying a deposit to secure a moving date only to have the movers never arrive. Hidden fees and unexpected charges also appear frequently in scam reports.

    To reduce the risk of being defrauded, consumer advocates emphasize the importance of thoroughly researching moving companies before signing a contract. Official resources such as the Better Business Bureau website allow people to review company ratings and read past experiences from other customers. Checking whether a company is properly licensed and insured is also a key step, particularly for interstate moves that require registration with federal regulators.

    Certain warning signs can indicate that a moving business may not be legitimate. A quote that appears unusually low, a lack of a physical address, missing registration or insurance information, and websites riddled with poor grammar are potential indicators of trouble. Movers who arrive in unmarked rental trucks or those who discourage written contracts also raise concern.

    In addition to spotting red flags, there are proactive measures that can help protect both possessions and finances. Securing everything in writing, including quotes and terms, reduces the risk of unexpected charges. Reliable movers typically provide written documentation of services and estimates based on the weight of belongings. Insurance coverage is also important, as standard policies may not fully cover high-value items unless additional protection is purchased.

    Safeguarding valuables is another crucial step. Important documents, jewelry, cash, and personal mementos should not travel with movers but should instead remain with the owner or be shipped separately with tracking and insurance. Maintaining a detailed inventory of belongings, labeling boxes, and noting contents helps track items during transit.

    Beyond financial loss, moving scams can also place individuals at risk of identity theft. Fraudulent operators may request Social Security numbers, banking information, or photocopies of identification under the pretense of processing insurance or confirming a reservation. Once this data is in the wrong hands, it can be used long after the move to open accounts, commit fraud, or cause lasting damage to a person’s financial security. Consumers are advised to be extremely cautious about what personal information they provide to moving companies and to question any requests that seem unnecessary for the transaction.

    When moving across state lines, consumers should verify a company’s federal identification number through the U.S. Department of Transportation and the Federal Motor Carrier Safety Administration. These checks provide reassurance that the mover has met regulatory requirements and can be held accountable if issues arise.

    As moving season peaks, the reminder is clear. Taking the time to investigate, document, and safeguard can prevent costly and stressful outcomes when entrusting personal belongings to a moving service.

     
  • Geebo 8:00 am on September 29, 2025 Permalink | Reply
    Tags: , identity theft, ,   

    Fake Collector Targets Old Loan Debt 

    Fake Collector Targets Old Loan Debt

    By Greg Collier

    A Kansas man recently lost $1,500 to a debt collection scam that relied on fabricated paperwork and a sense of urgency to convince the victim of its legitimacy. The case, reported by the Better Business Bureau, involved fraudulent claims of a decades-old loan.

    The scam began when the victim received emails suggesting that a loan of more than $13,000, dating back twenty years, remained unpaid. The sender presented themselves as both a courthouse official and a lawyer, weaving together an appearance of authority. Within days, the victim was persuaded to hand over banking information under what was described as a settlement arrangement.

    The scheme was bolstered with documents designed to look authentic. These included official-looking logos and even a notary stamp, elements carefully chosen to create the illusion of legitimacy. The scammers also attempted to reframe the payment demand as a bargain, falsely claiming that the debt had doubled and the requested amount was a reduced figure.

    Targeting such an old debt is a tactic commonly used to create intimidation and confusion. Many consumers are uncertain about financial records from decades past, and scammers rely on that uncertainty to discourage verification. In reality, even legitimate debts of that age are often considered time-barred and are no longer legally enforceable.

    The damage in this case extended beyond the immediate financial loss. By handing over banking information, the victim exposed themselves to possible identity theft, which can lead to new fraudulent charges and long-term risks beyond the original payment.

    Eventually, the target became wary and researched the organizations involved. This led to the discovery that the businesses had no verifiable addresses, confirming the suspicion that the collection attempt was fraudulent.

    The Better Business Bureau has warned that such scams are effective because they exploit both fear and confusion. Consumers are advised to be cautious when contacted about old debts and to request written validation before engaging. Researching the credibility of any collection agency and refusing to share sensitive financial details under pressure are vital steps in avoiding similar schemes.

    This case is part of a broader pattern of fraud in which criminals pose as figures of authority and attempt to frighten victims into fast decisions. Just as with fake tax collection calls or phishing emails that mimic banks and government agencies, the strategy depends on creating panic and preventing careful verification. Recognizing these patterns can help consumers respond with caution and avoid becoming the next target.

     
  • Geebo 8:00 am on September 15, 2025 Permalink | Reply
    Tags: identity theft, , ,   

    Fake Jury Duty Sites Steal Your Identity 

    By Greg Collier

    Scam artists continue to adapt their methods, and one of the most common schemes circulating today is the jury duty scam. This long-running tactic has seen many variations over the years, but a new twist has emerged in Wisconsin that raises the stakes by targeting both money and personal identity.

    Traditionally, this scam involves a phone call from someone pretending to be an authority figure. The caller claims the recipient has missed jury duty and now faces arrest or a significant fine. The tone is often urgent, creating fear and confusion that push victims into making quick decisions. While these calls are not new, recent reports show scammers are now supplementing their threats with fake websites. These sites are designed to look official and can trick people into sharing sensitive personal information. Victims are sometimes told to enter details such as their birth date or Social Security number in order to determine the amount they supposedly owe. In some cases, the scammers claim that thousands of dollars are due for failing to appear for jury service.

    The persistence of the jury duty scam is tied to its ability to exploit trust in legal institutions and fear of legal consequences. Reports of this fraud have surfaced in many states over the years, showing that no region is immune. Scammers target a wide range of people, from younger adults who may not yet understand jury procedures to older individuals who may be more inclined to believe a caller claiming to represent the courts. Beyond the immediate demand for payment, the risks extend to long-term identity theft. Victims may later discover fraudulent credit accounts opened in their names, complications with tax filings, or even false criminal records, all of which can create years of stress and financial damage.

    The addition of fraudulent websites makes the scam especially dangerous. While previous versions largely focused on extracting immediate payments, this variation introduces the risk of long-term identity theft. Once personal information is provided, it can be used or sold, leading to problems that may linger for years. That kind of damage goes far beyond the loss of money, forcing individuals into the ongoing burden of monitoring and protecting their identity.

    It is important to remember that legitimate jury summonses or failure-to-appear notices are always sent through the mail. Courts do not issue arrest threats over the phone or demand payment through unconventional means such as cryptocurrency kiosks. Anyone receiving a suspicious call should avoid engaging, hang up, and independently verify information by contacting the local court using official contact details. Above all, consumers should never visit websites provided in unsolicited calls, texts, or emails.

    This latest twist underscores how scams evolve in order to stay effective. Raising awareness within families and communities is a critical step toward reducing the number of victims. By sharing knowledge of these tactics, people can recognize the warning signs and resist high-pressure demands. The jury duty scam remains one of the most widespread frauds in circulation today, and knowledge is the best defense against its changing forms.

     
  • Geebo 8:00 am on September 5, 2025 Permalink | Reply
    Tags: identity theft, , quiz, ,   

    Quizzes That Put Your Privacy at Risk 

    By Greg Collier

    Social media often presents itself as a harmless space for lighthearted interaction. Among the most popular features are quizzes that ask questions ranging from travel habits to favorite fictional characters. While they may appear entertaining, these activities can present real risks when it comes to online security. According to a recent report from FOX5 Las Vegas, cybercriminals are increasingly using these quizzes to gather information that can be exploited for identity theft and account breaches.

    Questions about travel, for example, may indicate whether someone possesses a passport or other forms of identification. Details about a hometown, school, or even where a relationship began can serve as valuable clues to common security questions used for account recovery. Seemingly playful questions about favorite characters or entertainment choices may also reveal hints that help criminals guess or refine password attempts.

    The information given in these quizzes may appear trivial, but once placed in the wrong hands, it can be exploited to commit identity theft or gain access to sensitive accounts. What makes this even more concerning is that criminals rarely rely on a single source. Information shared through quizzes can be combined with details found in public records, leaked databases, or shopping and job websites. When layered together, these fragments create a fuller profile that makes it easier for someone with malicious intent to compromise personal or financial security.

    The most effective approach is to avoid providing personal information in these quizzes altogether. Adjusting privacy and security settings to the highest available levels is also strongly recommended. Beyond individual action, awareness is critical. Sharing the risks with others helps limit the reach of cybercriminals who frequently exploit social connections to target additional victims.

    Online engagement can be enjoyable, but the need for vigilance has never been greater. Thinking carefully about the information shared publicly is one of the simplest and most powerful tools available for protecting personal data. A good rule of thumb is that if something online feels harmless or “just for fun,” it is worth pausing to ask who benefits from the information before participating.

     
  • Geebo 8:00 am on August 21, 2025 Permalink | Reply
    Tags: baggage tags, boarding pass, identity theft, , ,   

    The Baggage Tag Scam You Didn’t Expect 

    By Greg Collier

    A recent report from Moneywise highlights how something as simple as a discarded airline baggage tag can open the door to fraud and identity theft. The adhesive tags that airlines place on luggage are meant to ensure that bags are routed correctly, but they also contain more personal information than many travelers realize.

    These tags often display details such as the passenger’s name, flight number, date of travel, and destination. Some may also include the booking reference, place of origin, and even the weight of the bag. With that much data available, scammers are finding ways to exploit travelers who carelessly toss away their tags after a flight.

    The issue arises when fraudsters collect tags from trash bins at airports or hotels. Using the information, they attempt to impersonate travelers by filing false baggage claims, requesting reimbursement for items that were never theirs. This creates fraudulent payouts and complicates the process for genuine passengers who need to be compensated for legitimate losses.

    Boarding passes present similar risks. Both paper and digital versions can reveal key information that criminals can use to hijack accounts, steal frequent flyer miles, or commit broader identity theft. A simple scan of the barcode with a mobile app, or even a quick glance over someone’s shoulder while in line, can give a scammer access to sensitive details.

    What makes this even more concerning is how interconnected today’s travel systems have become. Many airline loyalty accounts are linked to hotel programs, rental car memberships, and even stored credit cards. That means one compromised boarding pass or baggage tag could provide a scammer with enough information to move beyond false baggage claims and into broader identity theft or account takeovers. Once inside a loyalty account, criminals can drain accumulated points, make unauthorized bookings, or harvest more personal data to use in phishing schemes.

    This type of fraud underscores the importance of treating baggage tags and boarding passes as personal documents. Careless disposal or public sharing, including posting photos on social media, can expose travelers to unnecessary risks. Instead, travelers are advised to keep these items secure until they are home and then properly shred or destroy them.

    While the threat of identity theft may feel like one more thing to worry about when traveling, it is a reminder that security extends beyond passports and credit cards. A few simple precautions with items that might seem harmless can make the difference between a safe trip and one complicated by fraud.

     
  • Geebo 8:01 am on August 11, 2025 Permalink | Reply
    Tags: dark web, identity theft, , scam hunters, , trauma bonding   

    Even Scam Experts Can Get Scammed 

    Even Scam Experts Can Get Scammed

    By Greg Collier

    A recent report from The Guardian highlights how even those who are knowledgeable about scams can still fall victim. The subject of the report is a woman from the UK who has spent years warning others about online fraud, only to later find herself targeted in a sophisticated identity theft scheme.

    Her journey began with an online presence built after serious health challenges, which she shared publicly to connect with others. This openness attracted the attention of a romance scammer who attempted to exploit her by using a fabricated story to create a sense of connection. Recognizing the signs, she ended contact and began using her social media platform to educate others about such tactics, especially a method known as trauma bonding, where scammers exploit a victim’s personal hardships to gain trust.

    Over time, she gained thousands of followers and actively worked to track and expose fraudsters. Her growing public role in anti-scam advocacy made it seem unlikely that she would fall victim herself. However, she later received a letter, appearing to come from HMRC, requesting identification documents for a tax rebate. HMRC, short for Her Majesty’s Revenue and Customs, is the UK’s equivalent to the Internal Revenue Service in the United States, responsible for collecting taxes and administering certain government programs. The letter was convincing enough that she sent the requested information.

    It soon became clear that the letter was fraudulent. Criminals used her details to create a fake business in her name, which was likely involved in money laundering. Multiple fraudulent loan applications followed, damaging her credit score and leading to legal threats over debts she never incurred. Police were able to shut down the fake business, but her personal details were found to be for sale on the dark web. Stolen information is often traded in bulk on these underground marketplaces, where criminals purchase it to commit identity theft, open fraudulent accounts, or conduct financial scams. Once data appears there, it can circulate for years, being reused by different groups for various schemes.

    While she was able to prove she was the victim of fraud, preventing further financial loss, the incident demonstrates that experience and awareness do not make someone immune to scams. Even individuals who deal with scams on a regular basis can be caught off guard by convincing tactics and realistic forgeries.

    Her decision to share her experience publicly was driven by the hope that it might prevent others from suffering the same fate. As her story shows, anyone can be targeted, and anyone can fall victim, regardless of how prepared or informed they believe themselves to be.

     
  • Geebo 8:00 am on August 5, 2025 Permalink | Reply
    Tags: , identity theft, , ,   

    Jury Duty Scam Gets a Tech Upgrade 

    By Greg Collier

    The jury duty scam has been a persistent threat for years, often beginning with a phone call from someone claiming to be a law enforcement officer. The caller accuses the recipient of failing to report for jury duty and threatens immediate arrest unless a fine is paid. These calls can be very convincing, with scammers using spoofed caller IDs to make it appear as if the call is coming from a local police department. Victims are often pressured into making quick payments using gift cards, wire transfers, or mobile payment apps. The urgency and fear created by the call are intended to override a person’s judgment, making them more likely to comply.

    A new variation of this scam is now emerging, according to a warning from the Federal Trade Commission. Instead of instructing targets to make a payment directly over the phone, scammers are directing them to visit a fraudulent website. This site is designed to mimic an official government page, complete with realistic-looking seals and professional design elements. The individual is asked to enter sensitive personal information, including their date of birth and Social Security number, under the pretense of verifying their identity or calculating a fine. In some cases, the site demands payment through non-traditional methods such as cryptocurrency or through so-called government kiosks, which do not actually exist.

    This approach allows scammers to collect personal data as well as money, potentially leading to both financial loss and identity theft. The presence of a convincing website may give the impression of legitimacy, especially to individuals who are unfamiliar with how official government sites operate.

    Once this personal information is collected, the consequences can extend far beyond the initial scam. Scammers may use the data to open fraudulent credit accounts, file false tax returns, or even commit medical identity theft. Victims often do not realize their identity has been compromised until they receive collection notices, are denied credit, or encounter issues with government agencies. The damage can take years to fully resolve.

    Anyone who receives such a call should avoid engaging with the caller or visiting the provided website. If there is any concern about jury duty status, the appropriate course of action is to contact the local court directly using a verified phone number or official website.

     
  • Geebo 8:00 am on August 1, 2025 Permalink | Reply
    Tags: , identity theft, , PPP Loans,   

    PPP Scam Targets Texas Bank Accounts 

    By Greg Collier

    It has been five years since the onset of the COVID-19 pandemic, but the ripple effects continue to impact Americans. One troubling development is a scam that has resurfaced across the country, now affecting communities in Texas. Individuals who received Paycheck Protection Program (PPP) loans are being contacted by scammers posing as their bank, asking for sensitive financial information.

    These fraudulent calls have recently begun targeting residents in the Abilene area. The scammers are not operating at random. Instead, they appear to be using publicly available information released by the Small Business Administration. The list includes names, loan amounts, and financial institutions involved in distributing PPP funds. Criminals are taking this data and impersonating bank representatives in an effort to gain access to recipients’ online banking systems.

    Once contact is made, victims are pressured to hand over account details such as passwords or authentication codes. These details are then used to initiate unauthorized transactions and siphon funds. Although the scam is tailored to PPP recipients, the broader tactic of impersonating a bank and spoofing phone numbers to appear legitimate is not new. Spoofed calls can make it seem like they are coming from a trusted local number or even the recipient’s own bank.

    The situation highlights the importance of verifying who you are speaking to before sharing any personal or financial information. Financial institutions will not request passwords or secure access codes over the phone. Customers who receive such requests are encouraged to end the call and contact their bank directly using a verified phone number listed on the institution’s official website or documents.

    Local financial institutions are not taking the matter lightly. Some banks have started collaborating with trade organizations to push for the removal of sensitive PPP data from public access. This step aims to reduce the likelihood of criminals using that information to manipulate and defraud recipients.

    For individuals who may have already fallen victim to this scam, there are steps that can be taken to recover. Under federal law known as Regulation E, consumers have 60 days from the date of their bank statement to report unauthorized electronic transfers. If reported in time, banks are required to investigate and may be obligated to reverse the fraudulent transactions. Victims can also report the incident to the Small Business Administration’s Office of Inspector General or file a complaint through the Consumer Financial Protection Bureau’s IdentityTheft.gov portal, which offers resources and action plans for dealing with financial fraud and identity theft.

    In the meantime, those who believe they have received a scam call or have been victimized are encouraged to use resources like the BBB Scam Tracker website. Sharing experiences can help others stay informed and may aid in shutting down fraudulent activity more quickly.

    Although the PPP program was designed to offer relief during a national emergency, it has unfortunately become a tool for exploitation. As long as that data remains public, scammers will continue to find ways to use it against the very people it was intended to help.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel