Tagged: identity theft Toggle Comment Threads | Keyboard Shortcuts

  • Geebo 8:01 am on June 17, 2025 Permalink | Reply
    Tags: identity theft, passports, , ,   

    Fake Passport Sites Steal Your Data 

    Fake Passport Sites Steal Your Data

    By Greg Collier

    As international travel ramps up during the busy summer, scammers are exploiting time-sensitive travelers through deceptive passport and visa renewal websites. These fraudulent sites mimic the appearance of official U.S. government pages in order to trick users into paying for services and documents that should be free.

    The scams are designed to appear as legitimate resources, often using patriotic color schemes, official-looking language, and imagery that resembles government branding. People rushing to renew their documents may not notice the subtle warning signs, such as disclaimers stating the site is not affiliated with the U.S. Department of State. Many end up paying $88 for forms that are freely available through official government channels.

    These sites also gather a wide range of personal information under the guise of processing travel documents. This may include names, birthdates, addresses, and even Social Security numbers. Often, consumers receive nothing more than a PDF containing the same information they provided, which they still must take to a government office to complete the process. The fee is essentially for repackaging publicly available forms, while also exposing users to the risk of identity theft.

    To avoid falling victim to these scams, travelers should take a few precautionary steps. Always check that the website address ends in “.gov” before entering personal information or making a payment. Government websites in the United States exclusively use the “.gov” domain. Taking time to visit the U.S. Department of State’s official site can help prevent costly mistakes and provide accurate information about current passport processing times. Researching a website through the Better Business Bureau’s Scam Tracker can also help determine if others have reported fraudulent activity.

    As tempting as it may be to cut corners when time is limited, rushing through online forms can result in wasted money and serious privacy risks. Scammers know that urgency creates opportunity. Travelers who take a few extra moments to verify where they are submitting their information can avoid becoming the next target.

     
  • Geebo 8:00 am on June 11, 2025 Permalink | Reply
    Tags: , community colleges, identity theft, ,   

    AI Scammers Exploit Student Loans 

    AI Scammers Exploit Student Loans

    By Greg Collier

    A troubling new report from the Associated Press has shed light on a growing form of fraud that exposes how vulnerable and broken the U.S. student loan system truly is. In what has become an increasingly common scheme, criminals are using stolen identities and artificial intelligence to enroll in community college courses, trigger federal student aid disbursements, and disappear with the money. Real people are left with debt, damaged credit, and a grueling bureaucratic fight to clear their names.

    The scams often begin with unsuspecting victims learning they are “enrolled” at colleges they’ve never heard of, with student aid already distributed in their name. Some only discover the fraud after police or school officials question suspicious applications. Others only find out when checking their credit reports or receiving overdue payment notices. Victims have included people who never attended college at all.

    Criminals are exploiting weaknesses in the verification process, especially at community colleges, where tuition is lower and more of the financial aid is returned directly to the “student.” Scammers target asynchronous online classes, where AI-generated bots can enroll, submit generic homework assignments, and claim aid with minimal human oversight. Some colleges have reported entire classes populated by bots. Real students then struggle to register for needed courses, which fill up quickly because of fake enrollments.

    The problem is not limited to one region. In California alone, over a million fraudulent applications were filed in 2024, leading to hundreds of thousands of suspected fake enrollments. The state’s community college system, with its extensive online offerings and large number of campuses, has become a prime target. At least $11.1 million in aid was stolen from California schools in just one year, with no realistic chance of recovery.

    The federal government has acknowledged the scale of the problem. A new temporary rule requires first-time student aid applicants to provide government-issued identification, impacting roughly 125,000 students during the summer term. More permanent and advanced verification systems are said to be in development for future terms. But some worry these steps are too late, and possibly too little.

    Meanwhile, the system intended to help people access education continues to be manipulated. Criminal networks have used names of prison inmates and dead individuals, sometimes coordinating scams across multiple states. Convictions in Texas and New York have revealed fraud rings pursuing millions of dollars. Victims must navigate a slow and confusing process involving schools, loan servicers, and federal agencies, often without clear answers.

    Adding to the concern, the federal office charged with investigating aid fraud has been weakened. Hundreds of staffers were recently laid off or retired from the Federal Student Aid office and the Inspector General’s division. As federal oversight thins, fraudsters may find it even easier to exploit the system.

    The human cost goes beyond financial loss. Some victims, after years of effort, have only just had their fraudulent loans removed. Others are still trapped in the appeals process or seeing their credit scores drop. Some simply wanted to return to school to better their lives, only to find themselves blocked by full classrooms occupied by bots.

    The emergence of artificial intelligence and the increase in online education have opened new doors for opportunity, but also for abuse. What this crisis reveals is not just a failure of cybersecurity or oversight, but a fundamental question about the system itself. If fake students can apply, enroll, and receive aid undetected, how secure or fair is the student loan infrastructure? And if identity theft can leave people burdened with years of debt for schools they never attended, who is the system really serving?

    These scams are not just exploiting financial aid. They are exposing just how fragile the scaffolding of higher education financing has become.

     
  • Geebo 8:00 am on May 16, 2025 Permalink | Reply
    Tags: identity theft, , ,   

    Fake Process Servers Exploit Legal Fears 

    Fake Process Servers Exploit Legal Fears

    By Greg Collier

    A process server has a simple but important job. Their role is to deliver legal documents, such as court summonses or subpoenas, to individuals involved in a legal proceeding. This delivery must follow legal procedures to ensure the recipient is properly notified. Real process servers do not make threats, demand personal information, or call ahead with demands.

    The Better Business Bureau has issued a warning about a growing scam involving fake process servers. Scammers are contacting people by phone and falsely claiming to be process servers attempting to deliver legal papers. In many cases, the callers allege there is a lien against the victim’s home or that legal action is being taken for unpaid medical bills. The intent is to create panic, pushing the person to give up sensitive information.

    In some instances, these callers go beyond the initial target. They may contact relatives or friends, claiming those individuals could face consequences if they do not help reach the original target. These tactics are designed to amplify fear and force quick action. However, no actual legal documents are involved. The goal is identity theft or financial fraud.

    There are ways to identify a real process server from a scammer. A legitimate process server does not ask for Social Security numbers or banking information. They typically do not call ahead with warnings, nor do they try to verify private details over the phone. Most importantly, they serve papers in person and do not threaten arrest for noncompliance. Anyone concerned about potential lawsuits or liens can search court records directly through official court websites.

    Recognizing these signs can help prevent falling victim to this scam. As with many forms of fraud, the key is to stay calm, verify independently, and never give away personal information under pressure.

     
  • Geebo 8:00 am on May 14, 2025 Permalink | Reply
    Tags: , , identity theft, ,   

    Fake Refunds, Real Scams 

    Fake Refunds, Real Scams

    By Greg Collier

    There’s already enough anxiety around scams that threaten dire consequences, whether it’s arrest, fines, or lost accounts. But some scams take a different angle, promising something good instead. One such scheme making the rounds in Michigan and other parts of the country is the so-called refund scam, where fraudsters claim that you’re owed money. The offer sounds appealing, especially during times of economic strain, but it’s just another way to steal your personal or financial information.

    Unlike most scams where the fear of loss or punishment is used to manipulate victims, this one dangles the illusion of a reward. The person contacting you may claim to represent your bank, credit union, government office, or a well-known company. They reach out by email, text, phone call, or even social media, claiming you are due a refund or reimbursement. To receive the money, you are often asked to confirm or provide sensitive information like your bank details or Social Security number. In some cases, the scammer might say a small fee is required up front to process the refund.

    These communications often look convincing. The names and logos may resemble real institutions, and the messages might include enough detail to feel personal or urgent. But these tactics are designed to lower your guard. Once the scammer has what they need, the promised money never arrives. Instead, accounts may be drained or identities stolen. In some cases, victims are sent fraudulent checks that later bounce, leaving them responsible for the full amount.

    This type of fraud relies heavily on trust and distraction. The promise of a refund is meant to create a false sense of gain that distracts from the red flags. The safest response is skepticism. If you didn’t ask for a refund or file a claim, be wary of anyone who says you’re getting one. Contact the company directly using verified contact information if you suspect a message could be legitimate. Avoid calling numbers or clicking links provided in unsolicited communications.

    The Michigan Department of Insurance and Financial Services continues to receive reports of these scams. They remind residents that any unexpected communication offering money should be treated with caution. Financial institutions and legitimate businesses do not ask for sensitive information or advance fees to deliver refunds.

    Being cautious about these offers doesn’t mean you’re being paranoid. It means you’re protecting yourself from schemes that promise gain but deliver loss.

     
  • Geebo 8:00 am on May 12, 2025 Permalink | Reply
    Tags: identity theft, , , ,   

    Your Phone Number May Not Be Just Yours 

    By Greg Collier

    A recent case in Franklin County, Kentucky, highlights a troubling trend in mobile phone fraud known as SIM-swapping. Despite the name, this scam does not always involve the physical SIM card in a victim’s device. Even phones with eSIMs or those marketed as not using traditional SIM cards are still vulnerable. What matters to the scammer is control over the phone number, not the card itself.

    SIM-swapping, also called “porting out,” is when a fraudster convinces a mobile carrier to transfer someone’s phone number to a new account under the scammer’s control. Once the transfer is complete, the victim’s device is disconnected from service, while the scammer now receives all calls and text messages meant for the victim. This includes two-factor authentication codes and verification messages that many financial and online services rely on for security.

    In this instance, the couple discovered this scam when their phones lost service almost simultaneously. A message from their mobile provider followed, indicating that a request to change service providers had been received and was being processed. Within minutes, their numbers had been hijacked by individuals using different carriers. From that moment, their identities were essentially in someone else’s hands.

    The consequences were swift and invasive. The scammers attempted to open credit accounts in their names. As the couple scrambled to regain control, they encountered the frustrating reality of automated systems and long waits for human support. In today’s digital environment, losing access to a phone number is more than just an inconvenience. It can mean losing access to email, banking, and personal communications.

    Preventing SIM-swapping begins with strengthening account security. Users are advised to set up unique PINs or passcodes with their mobile carriers that must be provided before any changes are made to their accounts. Some carriers offer port protection or number lock features that make unauthorized transfers more difficult. It’s also critical to limit how much personal information is shared online, especially birthdates, phone numbers, and email addresses which can be used to impersonate a customer in support calls.

    Despite the technical-sounding name, SIM-swapping is a social engineering attack at its core. It preys not on vulnerabilities in the phone itself, but on human error and the weak points in customer service systems. As more services rely on mobile phones as a gateway to personal data, awareness and proactive security measures become all the more essential.

     
  • Geebo 8:00 am on April 29, 2025 Permalink | Reply
    Tags: , , identity theft, Real ID,   

    Real ID Deadline Nears Amid Scam Risks 

    By Greg Collier

    The May 7th deadline to upgrade a driver’s license or state ID to a Real ID is approaching quickly. With that deadline looming, the Better Business Bureau is warning that scammers are actively trying to take advantage of individuals eager to meet the requirement.

    A Real ID will be necessary to board domestic flights or enter federal facilities and military bases. On official websites, images of a Real ID feature a gold star in the upper right-hand corner, distinguishing it from licenses that do not meet federal standards.

    Obtaining a Real ID requires providing several sensitive documents. These include proof of identity such as a birth certificate or U.S. passport, proof of residency through items like a utility bill or credit card statement, a social security number, and documentation of any name changes since birth, such as a marriage certificate or court order. Individuals who hold a permanent resident card or employment authorization card will also need to present those.

    Because these documents contain all the information necessary for identity theft, the risk of falling victim to scams is elevated during this period. One of the most common scams involves fake websites that falsely claim to offer Real ID upgrades completely online. In reality, the Real ID application must be completed in person at an authorized location. Although many DMVs are offering Real ID services, it is important to confirm that the specific location you plan to visit participates.

    Individuals are often more vulnerable to scams when they are rushing, and the approaching deadline may lead some to fall for fraudulent offers. It is important to remember that the Real ID process cannot be completed solely online.

    For those who already possess a valid U.S. passport, the May 7 deadline poses less urgency. A passport can also be used for boarding domestic flights and accessing federal buildings or military bases.

    Travelers should keep in mind that it may take several weeks for a Real ID to arrive by mail after applying. To avoid travel disruptions, it is recommended to schedule an appointment at a local tag agency or visit the appropriate government website to find an authorized location.

    Applicants should be aware that while there are many legitimate resources available, fraudulent websites posing as government agencies are also common. Official information will always make clear that in-person verification is required.

    It is also important to note that obtaining a Real ID is not necessary to continue driving, voting, or applying for federal benefits. However, after May 7th it will be required for air travel and entry into certain federal facilities unless a valid passport is presented.

     
  • Geebo 8:00 am on April 14, 2025 Permalink | Reply
    Tags: , , identity theft, , Soup Can   

    What is the Soup Can Scam? 

    What is the Soup Can Scam?

    By Greg Collier

    The original brushing scam is deceptively simple. Third-party sellers, often operating through online marketplaces, send inexpensive items to people who never ordered them. The goal is not theft but visibility. Once the item arrives, the seller creates a fake customer profile using the recipient’s address, then posts a glowing review to artificially boost their product’s ranking. This tactic helps manipulate online algorithms, giving disreputable sellers a competitive edge by appearing more legitimate through fake feedback.

    However, scammers have evolved.

    A new variation on this scheme has surfaced, one that is less about product reviews and more about financial reconnaissance. In this version, the package is not meant to flatter a storefront’s reputation, but to quietly confirm whether a stolen credit card works. A small, low-cost item like a can of soup is purchased and sent to a real address, often with a different name on the label. If the transaction goes through and the package is delivered without raising suspicion, the scammer then feels emboldened to make larger purchases using the same card. The item is a test. The address is a probe. And the real target is someone whose financial information may already be compromised.

    For the recipient, it can be an unsettling experience. The presence of a package that was never ordered, addressed to a stranger but bearing one’s own address, triggers questions. Is it a simple mistake or something more sinister?

    Legally, the item becomes yours if it arrives at your doorstep unsolicited. You are not required to return it. Still, some recipients may prefer to notify the carrier or mark it for return, especially if the situation seems suspicious or if they suspect identity theft. The key is vigilance. A seemingly harmless delivery could be the beginning of a broader fraud attempt.

    Reports of these unexpected deliveries are increasing. While the sight of a random item like canned soup might seem absurd, it may be the precursor to more serious abuse of stolen data. Knowing the difference between a clerical error and a calculated move by a scammer is essential in an age where fraud is often disguised in the most mundane ways.

     
  • Geebo 8:00 am on April 8, 2025 Permalink | Reply
    Tags: identity theft, , , ,   

    Tax Season’s Hidden Dangers 

    Tax Season’s Hidden Dangers

    By Greg Collier

    As the tax season reaches its peak, state revenue departments across the country are issuing urgent warnings about a surge in scams targeting taxpayers. These schemes are increasingly sophisticated, often mimicking official communications in order to exploit individuals during a period of heightened financial activity and anxiety.

    In Georgia, residents have been targeted by an email campaign falsely claiming to originate from the “GA Taxation Office,” a non-existent entity. The email references coronavirus-related relief programs and asks recipients to provide high-resolution images of their driver’s license and Medicare card. The sender’s address resembles a government domain at first glance, but closer inspection reveals it originates from a fraudulent and unofficial source. The Georgia Department of Revenue has emphasized that it does not request sensitive personal information through unsolicited emails or messages.

    Meanwhile, in Utah, taxpayers have reported receiving letters that closely resemble official notices from the state. These fraudulent letters claim the recipient owes unpaid taxes and threaten legal action, property liens, or asset seizure unless immediate payment is made. These tactics are designed to provoke fear and elicit an immediate response, bypassing any verification steps. The Utah State Tax Commission has urged residents to confirm the legitimacy of any questionable tax notices by contacting their offices directly and to avoid engaging with any information listed in the fraudulent documents.

    In Michigan, officials are focused on combating tax-related identity theft, particularly schemes involving the unauthorized filing of tax returns to claim refunds. Cybercriminals are employing deceptive emails and messages that pressure recipients into disclosing personal information under the guise of urgency or legal threat. These scams often succeed when individuals let their guard down, especially when messaging appears to come from a trusted source. The Michigan Department of Treasury is reminding taxpayers to connect only through secure internet networks, avoid clicking suspicious links, and never respond to unsolicited messages requesting personal data.

    Each of these examples underscores the importance of vigilance. Scammers rely on confusion, fear, and the appearance of legitimacy to manipulate individuals into compromising their financial security. Taxpayers should be cautious when receiving unexpected communications about taxes, regardless of the format. Verifying the source through official state websites or direct contact with tax agencies is the most effective way to avoid becoming a victim.

    Tax season will always be a busy time for scammers. Staying informed and exercising caution are essential steps toward protecting your personal information and your refund.

     
  • Geebo 8:00 am on March 11, 2025 Permalink | Reply
    Tags: File Converters, identity theft, ,   

    The Hidden Risks of Online File Converters 

    By Greg Collier

    Converting a document into a different format seems like a simple task, until it isn’t. Many online services promise to do the job quickly and for free, making them an easy choice for those in a hurry. But the FBI is warning that these shortcuts could come with a heavy price.

    Cybercriminals have found a new way to exploit these online tools, embedding malware into downloaded files. While the converter may appear to function as expected, delivering the desired file type, it can also serve as a gateway for hackers to steal personal information. Once installed, malware can grant unauthorized access to sensitive details such as email credentials, banking information, and even social security numbers. Some cases have even led to full-scale ransomware attacks.

    Authorities say this type of scam is on the rise, appearing in cities across the country. Reports from Colorado indicate that cybercriminals are actively using file conversion services to compromise both personal and business networks. The first warning signs of an attack often come from antivirus software flagging an issue, IT departments detecting malware, or users noticing unusual changes to their online accounts.

    What makes these scams particularly dangerous is their international reach. Many perpetrators operate from abroad, making it difficult to track them down and prosecute. This means prevention is the best defense. Experts advise keeping antivirus software updated and scanning any file downloaded from the internet before opening it. Most importantly, taking a moment to verify the safety of an online tool before using it can make all the difference.

    For those who suspect they’ve fallen victim to this scam, immediate action is crucial. Changing passwords from a secure device, contacting banks to monitor account activity, and reporting the incident to the FBI’s Internet Crime Complaint Center are key steps to mitigating the damage.

    While online file converters can be tempting, the risks they pose should not be underestimated. A few extra moments of caution can help users avoid becoming the next target of cybercrime.

     
  • Geebo 9:00 am on February 17, 2025 Permalink | Reply
    Tags: , identity theft, , , , section 8 housing   

    Section 8 Scam Shocks Los Angeles Residents 

    Section 8 Scam Shocks Los Angeles Residents

    By Greg Collier

    Section 8 housing, formally known as the Housing Choice Voucher Program, is a federal assistance initiative designed to help low-income individuals and families afford safe and stable housing. Administered by local public housing agencies (PHAs) with funding from the U.S. Department of Housing and Urban Development (HUD), for now, the program provides subsidies that allow recipients to rent privately owned homes at a reduced cost. Demand for these vouchers is high, and in cities like Los Angeles, long waiting lists and limited availability create challenges for those seeking assistance.

    Unfortunately, the urgency and need surrounding affordable housing have made it a target for scammers. Over the weekend, dozens of people fell victim to a fraudulent flyer circulating online, which falsely advertised a voucher distribution event at a local recreation center. Upon arrival, hopeful applicants were met with a sign informing them that the event was a hoax.

    These scams are often designed to steal personal information for identity theft. Fraudsters may ask victims to provide sensitive details, such as Social Security numbers or bank account information, under the pretense of processing an application. Others may demand upfront fees for guaranteed placement on a waitlist, or offer fake ‘expedited processing’ services.

    To avoid falling for such scams, it’s crucial to verify any claims regarding Section 8 through official channels. Public housing agencies do not charge fees for applications or placement on a waitlist. Official information on the program, including application procedures and open enrollment periods, can be found through HUD’s website or directly from local housing authorities. In Los Angeles, the Housing Authority of the City of Los Angeles (HACLA) is responsible for administering Section 8 vouchers, and updates about the program are available on their official website.

    Individuals seeking assistance should be wary of unsolicited offers, especially those circulating on social media, and report suspicious activities to local authorities. While housing challenges remain a pressing issue, accurate information is the best defense against scams that prey on vulnerable communities.

     
c
Compose new post
j
Next post/Next comment
k
Previous post/Previous comment
r
Reply
e
Edit
o
Show/Hide comments
t
Go to top
l
Go to login
h
Show/Hide help
shift + esc
Cancel