Child Identity Theft

Home > Other > Child Identity Theft > Page 13
Child Identity Theft Page 13

by Robert P. Chappell


  Victims often feel lost and unsure of whom to go to. If you call your local police, they may or may not be experienced in investigating identity theft, while a federal police agency might say the dollar amount of the loss is too low for them to get involved. Dealing with these types of issues can cause a victim to lose focus on the fact that they might not be the only victim.

  Another contributing factor can be the lack of knowledge of exactly who stole your identity and how they committed the crime successfully. Not knowing this can give you the false sense of security that you were a random victim. The truth might be that the thief was someone who cleans your home, services your home, or burglarized your home, without stealing anything; or, it could quite possibly be a relative.

  Knowing how the theft was committed can be vital information because it can subtract the “random” effect and give immediate rise to the suspicion that other family members could be at risk. You can help yourself by reviewing the credit report you request very carefully to determine if there is any connection between the business where an account was opened, and the people with whom you associate.

  It is also important to look for a clue in what was purchased. If, for example, you discover a credit card was obtained in your name and the criminal used the card to purchase furniture, you should be asking yourself if you are aware of any relative or friend who may have recently purchased new furniture. If an account was opened in your name, does your credit report show what address the thief used? In cases such as child identity theft, the thief will believe that you will never find out about the theft, or convince himself or herself that they will be long gone by the time you do, so they might list their actual address.

  If you review your credit report and it says that a purchase was made in which a delivery was required, ask the reporting company to provide you with the address to which the delivery was made. If a purchase was made in your name, you have the right to know what address the item was shipped to. Ask the business to provide you with a copy of all records of purchase, payment, and delivery. Look for telephone numbers used. Do you recognize the telephone number used as a contact? Is it a friend, relative, or service provider that has access to your home? Ask the delivery drivers if they are able to provide a description of the individual(s) to whom the items were delivered. Each piece of information uncovered will help law enforcement move forward with your case.

  All of the questions mentioned above are important because they indicate that your family can be at greater risk for identity theft since you were victimized. While the fact that you have been victimized alone does not mean your family may have been, as well, it may mean that they might be next. The identity thief may have started his or her criminal intentions with you, but may have a plan to move to your spouse and children as his or her next victim. Keep in mind the criminal already has your home or other identifying address.

  To protect your family, take the following steps if you are victimized. First, request a credit report for all members in your household. Second, place a free ninety-day credit alert on the credit file of all family members by calling any one of the credit-issuing agencies. Next, report the victimization to the state, county, or local police. This protects you and your family from debt collectors and creditors. Last, but not least, go to the website for the Federal Trade Commission, www.ftc.gov, and file an identity theft complaint. Remember to obtain a copy of your complaint report for your records, and record all actions taken in your journal or log book.

  Question #51: Why are military parents often targeted for identity theft?

  In the late 1960s, the Department of Defense switched from using service numbers to identify military service personnel to using their Social Security Administration–assigned Social Security numbers for all tracking. This trend continued until 2009, when the Pentagon phased out the use of all but the last four digits of the number. According to the Army Times,4 this new 2009 four-digit system, used along with other identifying personal data, was accepted as “common practice in the private sector.”

  Service personnel, whether active duty, reserve, or National Guard, were identified for more than fifty years by their Social Security numbers for pay, medical services, insurance, identification, equipment issuance, and more. Having spent twenty-five years in the military reserves, I can tell you firsthand that your Social Security number was what you were identified by. From the medical and dental charts that documented every shot given and cavity filled, to the infamous Leave and Earnings Statement that was issued at each pay period, your Social Security number defined you.

  Identity thieves have always targeted service personnel. They share a similar characteristic with those who experience modern-day child identity theft. This characteristic is an extremely long period in which they are, or could be, disconnected from financial credit services, creating a prolonged period by which identity theft can be discovered. For military members, I am talking about overseas deployments. Whether these deployments were long tours away from home in a foreign country, or fighting in a combat zone, the deployment period left the servicemen disconnected from what could be occurring with their identity.

  A famous symbol of military members is the iconic green canvas “duffle” bag. Regardless of the service, Army, Air Force, Coast Guard, Marine Corps, or Navy, personnel were required to put their Social Security number on their bag. This number was accompanied by their name and rank. What a gift to a modern-day identity thief.

  Identity thieves could visit airline terminals, noting information on the bags as they moved throughout the airport. These bags contained the two critical pieces of information: name and Social Security number. The serviceman’s address, for an identity thief, was neither wanted nor needed, as they planned to divert credit card applications, loan applications, vehicle purchases, and business revolving account billing to their own address, or a fake address created for illegal purposes.

  Most identity thieves work very little for their income. In the case of military members, thieves visit secondhand military surplus stores that make their living selling used military personal equipment items, such as duffle bags. The criminals also sell any other type of personal equipment, such as old uniforms, helmets, belts, and other items, that also identified a serviceman’s name, rank, and Social Security number.

  If a serviceman bought an item they planned to use for work, they would still put their Social Security number, name, and rank on it. This identified it as theirs, as it was an accepted common practice through all services. Items without identification would quite often become the property of a general holding area, never to be reclaimed by its rightful owner.

  This same type of system followed service personnel into retirement. Airmen, soldiers, sailors, Marines, and Coast Guardsmen who left military service and sought follow-up medical care with the Veterans Administration were identified by their name, address, and Social Security number. The frequency of identity theft has forced the government as a whole to change.

  Question #52: Why is child identity theft a problem for military children?

  Military children face two distinct challenges in reference to child identity theft. The first is the fact that military families move so often. The second is the deployment of one or both parents for long periods of time. These two issues create insecurity and make these children vulnerable to child identity thieves.

  Military children of active-duty personnel have for many, many years been affectionately referred to as “military brats.” Their cultural identity involves high mobility and seldom settling down for more than a year or two. While children get used to the frequent moving or long periods without a parent, they never enjoy the lack of stability.

  Each and every military family finds themselves in the same situation. Military children become resilient and seem to find comfort in knowing other children around the world wherever they are stationed. This is quite possibly a small consolation, as frequent moves make them similar to foster children in one
aspect: moving often.

  In a military child’s educational lifetime, he or she may attend a new school each year. Moving often sends a child’s personal information out to more people, thus increasing your chances of theft. Each school attended maintains files and a database with each student’s personal information. While a file or transcript may be sent to a new school, student data is seldom completely deleted.

  Not only do current teachers have access to your child’s date of birth and Social Security number, but so do office staff, principals, and higher headquarters personnel, such as the local board of education. If you have a child who attended six different schools, for example, you would probably be amazed to find out that all six schools still maintain information on your child. The school system in which your child attended his or her school may be required to maintain past student information for audit purposes, or simply be negligent in not deleting it.

  A common misconception is that all military children go to military schools on active posts. While this was the norm years ago, it is not today. It is much more cost effective for the Department of Defense to pay a fee to the local school district for children of military servicemen to attend its schools than to hire educators, faculty, and maintenance employees to maintain schools on post. In most cases, military children attend public schools in the communities surrounding the military installation.

  In a military family, quite often one or both military parents are deployed. With identity theft at an all-time national high for children, military dependents need constant protection. The volatility of military life focuses attention in other areas, such as constant worry about the safe return of a loved one. Identity theft may have priority in civilian life, but again, as with foster children, many other issues of concern distract a military family from implementing a proper child identity theft plan.

  So what are military families to do? With frequent moves, families need to make checklists to ensure they do not forget anything with each relocation. In and among the checklist items should be child identity theft issues. Visit the school and meet with a school counselor, faculty member, or the principal to discuss your child’s records. Ask what documentation will be sent or hand carried to the new school and, more importantly, what will be left behind.

  Use this same mindset in dealing with any other connection your child may have with community entities. From doctor and dentist offices, to community libraries and sports leagues, find out what each has on file as documentation regarding your child, and why any information needs to remain in their records if you leave the area.

  You can also help other military families by finding the military community service entity on your post or base. Assist in developing checklists and policies that address child identity theft. You may find that you have to carry the torch and spread the word as identity theft thrives, but child identity theft lurks behind the scenes. Make it a priority issue for your installation.

  Question #53: My child has received a toy catalog in the mail in their name. Is this a sign that they have been targeted for identity theft?

  If your child receives a catalog in the mail from a toy store, you might ask yourself if he or she has been targeted for identity theft. This may, or may not, be the case. It is important to know your child’s mail-receiving patterns, store memberships, and web-surfing patterns and habits. This information will help you determine what is normal, what is unusual, and what you need to investigate.

  For a parent to worry about any aspect of their children’s lives is understandable. The good news is that parents and guardians are in the best position to know the signs of change in a child’s life. You can set family policies and double-check systems to help protect your children. One of your best protections will be mail policies.

  A good protective family policy addresses the proper way to check the mailbox for mail. If you currently allow your children to check the daily mail in the mailbox, do you have them bring it to you first for examination? Examining the mail gives you the opportunity to see who is sending information in your child’s name. This also provides you with an opportunity to review what individual or company is sending mail to your child, from what address the mail is being sent, and any identifying postmark on the letters or packages. One clue to look for in mail is bulk versus first class. If the mail you received is bulk mail, it most likely has been sent to more than just your child. This is the case with sale papers, circulars, and business mail.

  Personal mail is usually sent first class and specifically to your child. First-class mail is usually sent by businesses or individuals, and may often appear with handwritten information versus businesses that type or generate mailings by computer. Both can be concerning, but handwritten is more personal and may deserve more of your attention. In addition to identity theft, you could uncover a predator your child has met online who is now sending your child mail.

  If you allow your children to get the mail in your absence, instruct them not to open or tamper with any envelope or package that arrives at your home in his or her name until you can review it. While this may sound overprotective, it is intended to be. Children are creatures of habit, and if taught how to properly handle incoming mail correspondence at an early age, the proper plan will be in place to protect all members of your household from identity theft. If this step saves your child from becoming the victim of a crime, it is worth it. If you find a mailed item of concern, contact local law enforcement and secure the information for investigation.

  Catalogs you receive in the mail are just attempts to lure you into a store or to a website to purchase items, goods, or services. If your child receives a toy catalog and it is the only one they have received this month, you probably have little to worry about. If your child has registered at the store, or on their website as a customer, then you are probably fine, as well. If your child went to the store’s Facebook page and “liked” or “friended” the store, then it is unlikely your child has been victimized.

  What if you have done none of these steps, though? Could your child have been targeted for child identity theft? The answer is yes. In most cases, children involve themselves with computer-related scams through free offers, prize registrations, and game-related offers. The “spin-off” of registering may be magazine offers, unwanted subscriptions to services, and the theft of their identity.

  It is rare that a website or e-mail offer gives something for free without requiring an individual to enter his or her name, address, and probably their phone number. Some offers even ask for date of birth and/or Social Security number. Most websites or e-mails will claim that the reason for requiring personal information is to verify age. Regardless of whether or not the offer is legitimate, the potential for danger exists.

  Your best defense is to contact a business that sends your child mail and ask them how they obtained your child’s information. If the company received your child’s information because your child registered himself or herself, then you need to have a conversation with your child about the dangers of releasing identifying information to unknown individuals. If you have concerns, you can always contact your local postal inspector. Regardless of whether your child did or did not give the person or business his or her personal identifying information, I encourage you to advise the person you speak with to remove your child from all mailing lists and future offers. Mailings and “free” offers should be limited to the ones parents preapprove, and no more.

  4

  Dealing with Child Identity Theft

  This section will provide nuts-and-bolts advice on how to clean up the damage done to your child’s credit if he or she becomes a victim of identity theft.

  Question #54: What are the different types of child identity theft victims?

  There are two main types of victims; the first is a child whose parents discover he or she has been victimized while still a child. I call this individual a “child” victim, since knowledge is obtained while the child is still young. The second type of
victim is one who discovers, once he or she becomes an adult, that they were victimized as a juvenile. I will refer to these individuals as “adult/juvenile” victims.

  As one could imagine, there are no advantages to either status. Children victimized by adult financial predators suffer greatly regardless of when the damage is discovered. What does differ is the amount of damage done to each type of victim, and the cleanup effort required.

  The child victim designation means that somewhere from birth to eighteen years of age, a child was targeted by a thief and successfully robbed of their identity. The adult/juvenile victim is similar to a child victim if he or she was targeted, as well, at some point between birth and eighteen years of age and robbed of their identity. The distinction between the two types of victim is found at the point of discovery. To be a “child” victim means that your parents or guardians discovered that you were a victim of the crime while you were still a juvenile. In other words, before you turned eighteen years old, someone found out through some means that a thief had stolen and used your identity.

  In the case of an adult/juvenile victim, the child was victimized at some point from birth to eighteen years of age, but his or her identity theft was not discovered at any point during their youth. It was not until the child became an adult that, through some process, he or she found out they had been victimized. The process I am referring to may include being overlooked for a job, being turned down for credit, being refused a security clearance, being denied entry into college, or being arrested for a crime he or she did not commit. These are a few examples of how an adult/juvenile victim discovers he or she was victimized.

 

‹ Prev