Select Page

Identity Theft & Fraud

Avoid becoming a victim, and what to do if it happens to you.

Identity Theft

Choose a topic to learn more about.

What is Identity Theft?

Identity theft occurs when someone uses your personal information, such as your name, Social Security number, or bank account number without your permission to commit fraud or other crimes. Examples include the use of your name and personal information to open new credit card accounts, establish new bank accounts, forge checks, and even apply for loans. Some clues that could indicate your identity may have been stolen include failing to receive bills or other expected mail, receiving credit cards for which you did not apply, denial of credit for reasons that are not apparent, or receiving calls from debt collectors or companies about merchandise or services you did not purchase. While you can’t entirely control whether you will become a victim, there are steps you can take to minimize your risk.

Watch our identity theft protection video.

How Does Identity Theft Occur?

Skilled identity thieves use a variety of methods to steal your personal information, including:

  • Dumpster Diving. Thieves rummage through trash looking for bills or other documents containing personal information.
  • Skimming. A credit/debit card number is stolen when processing your card using a special storage device.
  • Phishing. A high-tech scam that uses spam or pop-up messages to deceive you into disclosing personal information.
  • Address Changes. Thieves frequently divert billing statements to another location by completing a false “change of address” form.
  • Physical Theft. This is committed by stealing wallets, purses, and mail, such as pre-approved credit card offers, bank statements, or new check orders.
  • Pretexting. This is a form of social engineering in which a thief lies about his identity or purpose to obtain an individual’s personal information.
What Can You Do To Help Fight Identity Theft?

First Keystone Community Bank has strict procedures for protecting and monitoring our clients’ accounts and personal information. The following are a few tips you can use to reduce the risk of identity theft:

  • Protect Your Social Security Number. Don’t carry your Social Security card in your wallet or write your Social Security number on a check. Give it out only when absolutely necessary.
  • Shred Documents. Shred financial documents and personal information before discarding.
  • Review Your Credit Report. Federal law requires the major nationwide credit reporting companies (Equifax, Experian, and TransUnion) to provide you with a free copy of your credit report every 12 months upon your request. Visit www.AnnualCreditReport.com or call 1-877-322-8228 to request your free copy.
  • Never Click on Links in Unsolicited E-Mails. E-mails requesting account information and passwords should be scrutinized carefully, particularly if the information is needed to “award a prize,” “verify a statement,” or “verify information on file.” These may be phishing scams. Use updated firewalls, as well as anti-spyware and anti-virus software to protect your home and business computers from viruses.
  • Protect Your Passwords. Use passwords that are hard to guess and memorize them. Avoid using predictable codes such as your birth date, mother’s maiden name, or Social Security number.
  • Keep Personal Information Secure.
  • Personal information not secured at home can be at risk, especially if you have roommates, employ outside help, or are having work done in your house.
  • Do not give out personal information on the phone, through the mail, or over the Internet unless you initiated the contact and know who you are dealing with.
  • Avoid disclosing personal information when using public wireless connections.
  • Deposit outgoing mail in post office collection boxes rather than in your curbside mailbox.
  • Monitor Financial Statements. Carefully monitor bank and credit card accounts regularly for unauthorized charges by checking account information over the phone, at ATMs, or on the Internet. Immediately report any suspicious activity to your financial institution. If you do not receive a statement or bill as scheduled, contact the company to determine why, as it may have been diverted by an identity thief.
What Should You Do If You Are a Victim of Identity Theft?

First Keystone Community Bank is ready to assist you where needed if you are an identity theft victim. Please ask us for an “Identity Theft Tool Kit” to help you get the process started. It is recommended that you follow these steps where necessary as soon as you become aware of identity theft:

  • Contact Financial Institutions. Contact First Keystone Community Bank immediately if the fraudulent activity is related to your bank account(s). Review the activity on all of your accounts, including checking and savings accounts, debit cards, loans, and other banking accounts and look for changed addresses, changed Personal Identification Numbers (PINs), or new cards ordered. Notify the fraud departments of credit card companies, as well as other banks and lenders, of the potential fraud. Close the accounts that you know or believe have been tampered with or opened fraudulently. Change your Online Banking username and password immediately.
  • Contact the Police. Immediately call the local police or the police in the community where the identity theft occurred and file a report. The police can initiate an investigation and you can obtain information from the police report, which you will likely need to address credit report and account issues.
  • Complete an Affidavit Form. First Keystone Community Bank, as well as many financial institutions and law enforcement agencies, may require you to complete an “Identity Theft Victim’s Complaint and Affidavit” form. The Federal Trade Commission (FTC) developed the Affidavit form for use by victims of identity theft.
  • Contact Credit Bureaus. Contact the toll-free number of any of the three consumer reporting agencies below to place a “fraud alert” on your credit report. You only need to contact one of the three agencies, because the first agency you contact is required to report the alert to the other two, which will then place an alert on their versions of your report.
  • Equifax: 1-800-525-6285 www.equifax.com
  • Experian: 1-888-397-3742 www.experian.com
  • TransUnion: 1-800-680-7289 www.transunion.com

Request a statement be shown on the report whereby creditors contact you to verify future credit applications. Once a fraud alert is placed, you are entitled to one free copy of your credit report from each of the agencies. Review each credit report carefully once received. Look for inquiries from companies you have not contacted, accounts you did not open, and debts on your accounts that you cannot explain. Continue to check your credit reports periodically to ensure no new fraudulent activity has occurred.

  • Contact the Federal Trade Commission. Report the criminal activity to the FTC by filing a complaint using the FTC’s online complaint form or by calling the Identity Theft Hotline at 1-877-ID-THEFT (438-4338) and speaking with a trained identity theft counselor. By sharing your identity theft complaint with the FTC, you will provide important information that can help law enforcement officials across the nation track down identity thieves. You can also provide a copy of your online complaint form to the police to incorporate into their police report.
  • Contact ChexSystems. First Keystone Community Bank uses ChexSystems to provide deposit account verification services. If your First Keystone Community Bank checks are used fraudulently, you may want to place a Consumer Reported Identity Theft Security Alert with ChexSystems or contact the company at 1-800-428-9623. Additional information is available at the National Check Fraud Center website.
  • Keep Records. Document the names, phone numbers, and dates for each person you speak to regarding the incident. You can download and print a “Chart Your Course of Action” form to record the steps you have taken to report the fraudulent use of your identity. Follow up on your phone calls with letters and keep copies of all correspondence.
  • Continue to Review All Accounts. Since identity theft can take time to completely resolve, carefully review all charges and transactions appearing on your account statements and online. Report any discrepancies immediately.

If you feel that you may be a victim of identity theft, please contact your bank representative as soon as possible so that we may take the proper precautions to help you.

Are There Other Identity Theft Resources?
Many government and nonprofit agencies have a wealth of helpful information on identity theft for consumers and businesses. To learn more, click on the following links:

FTC ID Theft Page

Annual Credit Report.com

Fraud

Choose a topic to learn more about.

Goals of a Payments Fraud Scam

Fraud criminals’ goals are simple. They’re either trying to get your money, get your information, or both.

Stealing Your Money

Scams aimed at stealing money involve a variety of techniques. The most common are:

  • Advance-fees scams – With these scams, the crook baits you by getting you all excited about receiving some large amount of money or a wonderful “free” prize. But before they can send you your treasure, there are certain “fees” that have to be paid “in advance.” The first fees are usually small (e.g., “for postage and handling,” “for taxes”), and you might be tempted to pay them. But it’s never the last fee and the amounts of the fees keep rising. Some victims have paid millions in these “fees” (yes — millions!) without ever receiving a thing.
  • Wire-back scam – In this situation, the crook sends you a check or puts money in an account in your name. You are then instructed to wire some of that money out (the crooks always give a very logical reasons for this). The payment for the funds they sent to you is returned because they were fraudulent to begin with, and you’re left to cover the amount of their fraudulent payment. The funds you wired are long gone, and you’re left holding the bag — an empty bag.
  • Check cashing scams – Helping someone new in town is considered neighborly. Crooks often take advantage of people’s goodwill by posing as a new friend and then asking for help with cashing a check. You take the crook (who you believe to be a friend) into your bank, you cash the check for them on the strength of your relationship with the bank, and you give the cash to the friend. The check is eventually returned, and since you endorsed it by signing the back, you legally guaranteed your own liability for the check. Your new friend is nowhere to be found, and you’re left having to repay the bank yourself.
  • Whether you’re being asked to send money to someone in advance, wire funds, or help someone cash a check drawn elsewhere, your anti-fraud antenna should go up immediately.
Stealing Your Information
  • Many people — especially young people — believe that because they don’t have a lot of money or assets themselves they don’t have to worry about criminals bothering them. This is an erroneous and dangerous assumption. Sometimes your good name is exactly what a crook is looking for.
  • Next to cash, a crook’s most valuable asset is a good and real financial identity. Many crimes require the use of an unblemished identity, and for that reason they’ve become a major black market commodity.
  • There are usually two sets of crooks involved with identity theft: the one who steals and then sells your identity, and the one who buys and uses it.
Phishing, Vishing and Smishing

With the advent of digital services, cybercriminals have created devious new ways of stealing victims’ personally identifiable information (PII). The terms used to describe this type of fraud follow a fishing theme (i.e., baiting a hook and casting a line in the water, hoping to lure fish to bite). First seen in emails, the technique has evolved, using the same basic bait-and-hook technique, customized as needed to work through phone and text messaging services.

PII is no longer the only thing at risk to an “ishing” attack. It is also used to lure victims to web sites where their electronic devices can be infected by Trojans or viruses. To add insult to injury, these techniques are only successful if the victim voluntarily complies with the crook’s request, not recognizing that these requests are illegitimate.

To avoid becoming a victim, don’t respond to these directives immediately. Question all unexpected requests for PII, instructions to call unrecognized phone numbers or directions to click on links. Contact authentic organizations through other channels and make sure the contacts and requests are legitimate before responding.

  • Phishing – Fraud operators bait victims by sending emails that appear to be from a reliable source, asking the recipients to respond to the email in various ways, e.g., send a return email with information or click on a link in the email. Those recipients who respond become victims. Able to send a large number of phishing emails in mass distributions, the crooks need only a small percentage of recipients to respond in order to make it a worthwhile catch.

Example: Victim receives an email from his bank telling him that he needs to update his password immediately or risk having his online banking service shut down. The victim clicks on the link in the email, which takes him to a fake (“spoofed”) bank site where he is instructed to enter his username and current password. He complies and in so doing, gives the fraud operator his on-line banking login information.

  • Vishing – Since Voice of Internet Protocol (VoIP) technology became available as an option to traditional telephone services, criminals recognized an opportunity to collect victims’ numeric PII (e.g. credit and bank account numbers, PINs, security codes, SSNs, dates of birth) through their telephone devices, by creating the illusion that they were interacting with a legitimate organization.

Example: Victim receives an automated phone message that there is a suspicious transaction on her credit card account and to please call a number to confirm the transaction is legitimate. The victim calls the phone number given and is asked to enter her credit card number and security code on the key pad so she can be “authenticated” as the real customer, which is how the crooks get her card information for future fraudulent transactions.

  • Smishing – It wasn’t long before smart phones and texting became a popular communication channel, and with it, scoundrels saw the chance to use SMS – Short Messaging Service – to convince texters to respond to fraudulent texted communications.

Example: Victim receives a text message that he is about to be charged for a service the victim never ordered. He is told that he needs to contact the company immediately to cancel the order or be responsible for the charge. The text includes a hyper-link, which the victim clicks on, taking him to a fake website that triggers the download of a program that breaches the security features of his phone.

Types of Payment Fraud Scams
  • Auction scams and advertising scams (sellers) – In a “wire-back scam,” often seen with auctions and classified ads (both print and online), a crook buys what you have to sell and gives you a check for much more than the amount of the item with some rational excuse (e.g., they were unsure of the shipping amount or thought there might be additional shipping fees associated with the purchase). The crook asks you to wire back whatever you don’t need. Sounds simple enough, so you send the item and wire back the extra money. But when the check returns as fraudulent, you’re out the amount you wired and probably also the item you sold.
  • “Call-back” scams – You get a call, a letter or an email directing you to call a number for some compelling reason. So you call, and after listening to a long message, you’re put on hold for a while. What you don’t realize is that you’ve dialed an expensive overseas pay-per-minute service that charges an exorbitant fee for every minute you’re connected. (Often this is an “809” or a “900” number.) You may not know you’ve been scammed until you get your whopping phone bill.
  • Charity scams – Americans in general are generous people and when they hear of someone in need, they are anxious to help. Crooks take advantage of this generosity by creating all sorts of heartbreaking stories to open people’s hearts – and wallets – relying on your trust that the bogus organization they’re describing is legitimate. The causes these crooks say they are representing most often include:
  • Sick or missing children
  • Hospitals needing life-saving equipment
  • Overcrowded orphanages
  • Victims of earthquakes, floods and other acts of Nature
  • There are legitimate needs out there, but be sure you are dealing with a reputable organization.
  • Fake government scams – Any contact from any government agency is bound to make us anxious to please, but government agencies do not use email to initiate contact with people, nor do they ask for personal or financial information.
  • FBI scams – The FBI will never email you to notify you of an inheritance or of money recovered from a drug sting, nor do they assess fines by email.
  • IRS Scams – The IRS does not discuss tax matters online or ask for personal or financial information via email.
  • Social Security scams – Like the IRS, the Social Security Administration will never request personal or financial information via email.
  • The lesson is the same with other government organizations: an email contact is unlikely to be legitimate, and any contact should be verified with the purported agency first by using a phone number from the telephone book or dialing 411. Do not use a phone number supplied in the letter or email to verify the agency’s legitimacy.
  • Handyman scams – Someone comes to your door and offers to do some needed maintenance like cleaning gutters, raking leaves, or shoveling snow, for a very attractive rate. They will ask for a check for payment, which gives them your name, address, the name of your bank and your checking account information. Elders are particularly attractive targets for this type of scam. (By the way, this is also a technique used by burglars to “case” a house as part of planning for a break-in later.)
  • Job scams – We’ve all seen the “work from your home” advertisements on online job boards and in the newspaper. With these, just filling out the application is a risk. If you’re asked for personal information that identifies you, like your social security or driver’s license number, or if the so-called employer wants to deposit money into your bank account as part of the job, move on. These are usually some form of “wire-back” scams. Examples of common job scams include:
  • Mystery shoppers – In this scam, the crooks ask you to test their “customer service” when using payment services. First, they send a check and ask you to cash it so that you will not have to use any of “your own money” for the job. You’re also given a number of wire service locations (or other electronic payment services) and instructed to pretend to be a customer by sending some of the money to a name and address at each location. At the end of all this, they tell you, you’ll be asked to “rate your customer service experience.” Your wires will go through, returning the money to the crooks, while the check initially deposited into your account will be returned as a fraudulent payment and charged against you.
  • Money manager or collection manager – With this scheme, your “job” is to monitor money being deposited into your account during the day. At the end of each day, you’re told, you’ll wire the majority of the money back to a certain location, keeping a percentage as your “fee”. Sound good? It won’t when the money deposited is charged back because the bank has discovered it’s fraudulent, and the money to repay the bank is gone in those wires you sent out each day. And it’s all on you now.
  • Lottery scams and sweepstakes scams – If you didn’t enter, you can’t win!! Especially foreign lotteries or sweepstakes. And if you did enter, you wouldn’t be required to send them money to pay taxes or anything else before receiving your prize. This is a classic “advance-fee scam.”
  • Nigerian or “419” scams – Among the most notorious “advance-fee scams,” “Nigerian”-type scams now originate in many other countries, but they are still named for the country where they started (“419” refers to the Nigerian criminal code that makes them illegal). The essence of these scams is to represent that there is a substantial amount of money that the perpetrator — supposedly a dignitary of some type — must route out of their country to a safe haven, and that they would gladly let you have a percentage of the money if you would only let them transfer the money into your account for safe keeping. In the beginning, the Nigerian scammers were just trying to get victim bank account information so they could then drain the victims’ accounts, but it wasn’t long before they realized the opportunity they had to get the victims to willingly send them the money. Since their inception – and with the increasing recognition of the traditional “Nigerian” scam – the scam stories have morphed into:
  • Orphan scams – The crooks represent themselves as youngsters who have just lost their parents and need to get their inheritance out of the country before a nefarious aunt or uncle gets control of the money. For a percentage of the inheritance …
  • Assassinated official or “coup” scams – With these, a high-ranking public or military official has been killed mysteriously (often in a plane or helicopter crash) along with their families. The message urges the recipient to allow them to wire money before the coup gets ahold of it …
  • Inheritance scams – If neither you nor your relatives have ever heard of the person or know of anyone else in the family related to them, no, you don’t have a long-lost relative who decided to leave you their fortune in another country.
  • Dying philanthropist scams – Here, after years of deceitful business practices, a rich foreigner learns he is dying of a terrible disease and has a change of heart. He’s looking for a trustworthy American so that the funds can be donated to charitable causes, with a fair percentage of the fortune to be kept by said trustworthy American for their troubles …

And the list continues. If you think it’s unlikely that a stranger in a foreign country would contact you and ask you to hang onto some money for them for whatever reason, you’re right. If it sounds to good to be true, it probably is…

  • Social engineering scams – “Social engineering” is a fancy term to refer to the way criminals convince people to do things that then allow the crook to commit a crime. In this age of immediacy and a desire for relationships (upon which social networking depends), trusting souls become all too vulnerable to these types of scams, which include:
  • Friend’s friend scams – A friend introduces you to a new friend of his. A couple of weeks later, that new friend needs helping cashing his “paycheck.” Your mutual friend isn’t around, he tells you, so can you help him? You take him to your bank and cash the check for him on the strength of your relationship with the bank. When the check returns for “forged endorsement” (or another reason) and the bank charges your account, your friend’s friend can’t be found to pay you back.
  • Sweetheart scams – You meet someone who’s new in town. You think they’re wonderful and you date for a while. Maybe you even move in together. Then one day your sweetheart asks if you’d help cash a check at your bank since she doesn’t have a local account. You do, and that’s the last time you see her. The check bounces a few days later and the bank comes to you for the money. Let’s just hope the money is all you’ve lost.
  • Relative-in-distress scams – This is one of the newer scams. Grandparents (or aunts or uncles) get a sudden urgent call or email from a “grandchild” saying they’ve been falsely arrested somewhere and they need money wired immediately for bail. The message asks to “please don’t tell mom and dad …”
  • Telemarketing, auction and ad scams (buyers) – You’re offered (or win the bid on) a product, and you provide payment information to place an order. The item either never arrives or what arrives is not what you thought you were getting. You try to contact the seller, but you can forget about getting your money back since the company is nowhere to be found.
Scams Perpetrated Against Seniors

Like anyone else, seniors can fall prey to almost any of the scams posted on this site, including identity theft, charity scams, relative-in-distress, and telemarketing fraud. However, some scams seem more often targeted toward vulnerable seniors such as:

  • Power of Attorney Fraud – The crook seeks to obtain a Limited or Special Power of Attorney, enabling them to access funds and other assets, including bank accounts and real estate, and make legal decisions that are not in the best interest of the victim.
  • Unsolicited Work – Fraudsters coerce, intimidate or otherwise manipulate individuals into agreeing to home repairs they often do not need. Sometimes they offer a very attractive rate and then perform a shoddy or incomplete job and leave the home in disarray, insisting on more money to complete the work and return the home to order. Frequently, they insist on cash and on accompanying the victim to the bank to withdraw funds.
  • Companion Scam – a stranger enters the victim’s life to win their affection and gain influence for the sole purpose of financially exploiting the senior victim. The perpetrator uses undue influence including threats (or real) physical and emotional abuse. Seniors, overwhelmed by intimidation, the fear of be left alone or the embarrassment of being duped, are less likely to report the activity to trusted family or law enforcement while there is still a chance to recover at least some of their assets.
  • Theft of Income – A perpetrator, who can sometimes include an unscrupulous caregiver or even a family member, commits theft by obtaining access to the senior’s pension or Social Security check, checking, savings or money market accounts, or credit or debit cards, repeatedly draining the victim’s funds every time they are replenished by the next month’s payments.
I Think I'm Being Scammed, What do I do?

Here are some general rules of thumb to avoid being defrauded:

  • If you suspect someone is trying to scam you, do not respond in any way. Ignore any suspicious emails, letters, and pop-ups boxes. If it’s a telephone call, hang up; if a person comes to your door, close the door and walk away. (If the person says they’re from an organization you recognize, report the incident to that organization immediately.) Resist the temptation to try to outsmart the perpetrator. Remember: you can’t con a con.
  • If you’ve already responded to a scam, end all further communication. A smart fraudster will try to re-establish contact with someone who gave them hope of succeeding in their scam. But don’t be tempted, no matter what they say. If necessary, cancel your email address or phone number to end contact with the person.
  • If you’ve given a fraudster:
  • Bank account information: contact your bank immediately. The bank can put a fraud alert on your accounts, close any account that were compromised, and help you change your passwords or PINs.
  • Credit or debit card information: contact the number on the back of your card. The credit or debit card company can close the card account.
  • Personal information (especially your social security number.) Call one of the credit bureaus (Experian, Equifax, or TransUnion). They can suggest the best way to protect your credit file from compromise.
  • If things have gone too far and you are already involved in communications with a fraud operator or have sent money and think you may have been scammed, let First Keystone Community Bank know immediately.
  • Review your credit reports at least annually for entries you do not recognize. Consumers have a right to an annual free credit report from each credit bureau. Any questionable entries should be reported to the appropriate company.
  • Limit the personal information you publish on social networking sites. Social networking sites are easy pickings for crooks. Use your privacy settings to limit access to your information to fewest number of people possible. And there is no reason anyone needs to know your social security number, your bank or card numbers, your mother’s maiden name, your birth place, your birth date and year, or your favorite passwords.
  • If someone tells you they represent a company that you deal with, contact that company using the phone number on your statement or in the phone book and ask to speak to their fraud or security department to report the contact. They will want to know if their company is being misrepresented by criminals.

Pin It on Pinterest