Prescription for Fraud

Magnolia Soria could hardly believe what the insurance auditor was telling her. The company had received several claims for health services supposedly provided by the Toronto-area occupational therapist, even though Ms. Soria had never met the patients, did not perform the work and had nothing to do with the invoices.

Read more:

Tom Blackwell, National Post

Business Guide to Social Media

Thank you for joining our newsletter, below are the three powerful articles we promised and the Social Media Guide to Growing Your Business:

Identity Theft Nightmare- Woman Jailed After Wallet Stolen

The reality of Identity Theft and what can happen to you. Very enlightening video.

Visit for breaking news, world news, and news about the economy


Work from Home with Prepaid Legal

Are you looking at owning your own business? Looking at working from home?

Take a look at these videos:

Visit us here to learn more

Small Biz Tech Tour

MONTCLAIR, N.J., Sept. 17 /PRNewswire/ — Entrepreneurs and industry experts are coming to Mountain View, California, Salt Lake City, Washington DC, Boston and Atlanta with expert advice on how small business owners can maximize technology to grow their business. The Small Biz Tech Tour (http://, making its first stop on Tuesday, September 28th at The Computer History Museum in Mountain View, California, is for those who want to learn how they can leverage technology as a strategic asset to grow their business.

The all day event features America’s leading experts on small business and technology, who will share their insight, lead discussions and show attendees how they can harness technology to save time, save money, boost productivity, increase revenue and better serve customers.

Speakers include Ramon Ray,, Walt Rivenbark, AT&T, Ellen Pack, Elance, Angus Thomson, Intuit, Tom Leung, Marchex, Donna Wells, Mindflash, Rachael King, Bloomberg Business Week, Jennifer Shaheen, Technology Therapy Group, Brenda Horton, Hware, Patrick Schwerdtfeger, Author, Doug Meyer, Sage, Brent Leary, CRM Essentials, Beth Goldstein and Barry Horowitz, Marketing Edge, Laurie McCabe, SMB Group, Raju Vegesna, Zoho, Shahab Kaviani, HyperOffice, Paul Rosenfeld, Fanminder, Jeremy Hanks, Doba , Greg Dotson, Blurb, Melinda Eerson “@smallbizlady,” MFE Consulting, Kelly Harman, Zephyr Strategy, Beth Silver, Doubet Consulting, Raj Prasad, WDFA Marketing, John Lawson, ColderICE, Jeff Keltner, Google, Jordan Guernsey, Moldingbox, Kels Goodman and Tim Dixon, Blendtec, Roger George and Ted Brufke, IBM Lotus Software, Kim Tubbs-Herron, Microsoft, and Dan McNelis, Dito.

Produced by, whose mission is to make technology simple for small business owners to understand, the tour is sponsored by AT&T, Intuit, Network Solutions, Microsoft, Epson, Marchex, Sage, Elance, Mashable, Small Business Trends, Snapp Conner PR, Washington Business Journal, ReTargeter, Salt Lake City Community College, Washington Business Journal, IT2Max, and,

“We’re excited that small businesses and entrepreneurs can hear from experts who can help them use technology to grow their businesses,” says Ramon Ray, Executive Producer of the Tour and Editor and Technology Evangelist for “Our New York events have grown each year and the loyal following of attendees and sponsors reinforces that we are resonating with businesses. Attendees should expect to learn, laugh, network and win tech goodies.”

“With more than 3 million small business customers across the U.S., AT&T is fully dedicated to serving the technology needs of small businesses by developing solutions to help them succeed, manage their business, grow and innovate,” says Walt Rivenbark, Executive Director of small business mobility applications for AT&T (Twitter: @mobileappguy). “Mobile applications, for example, enable small businesses to do more with less, work from virtually anywhere, and ultimately remain competitive in today’s marketplace. As a small business solutions provider, AT&T is pleased to be involved with the Small Business Technology Tour and share our insight and expertise with this community of entrepreneurs.”

Topics in Mountain View will include: Six Rules for Strategically Using Technology to GROW Your Business; How to Manage Your Business and Boost Customer Service through Mobile Technology, Inc.; 500 Power Panel: Technology Success is not an Accident; Using Technology To Do More With Less; Leveling the Playing Field: How Small Companies Can Beat Their Biggest Competitors; Why Email Marketing, Blogs and Web Sites are NOT Dead; How Local Businesses Can Get Local Customers Online; and Getting The Most From Cloud Computing: Insight From Ring Central, Google and Zoho.

Early Bird (before September 21st) registrants will pay $49 for the all-day event. For more information visit http://  .

New ID theft targets kids’ SS numbers

The latest form of identity theft doesn’t depend on stealing your Social Security number. Now thieves are targeting your kid’s number long before the little one even has a bank account.

Hundreds of online businesses are using computers to find dormant Social Security numbers — usually those assigned to children who don’t use them — then selling those numbers under another name to help people establish phony credit and run up huge debts they will never pay off.

Authorities say the scheme could pose a new threat to the nation’s credit system. Because the numbers exist in a legal gray area, federal investigators have not figured out a way to prosecute the people involved.

“If people are obtaining enough credit by fraud, we’re back to another financial collapse,” said Linda Marshall, an assistant U.S. attorney in Kansas City. “We tend to talk about it as the next wave.”

The sellers get around the law by not referring to Social Security numbers. Instead, just as someone might pay for an escort service instead of a prostitute, they refer to CPNs — for credit profile, credit protection or credit privacy numbers.

Julia Jensen, an FBI agent in Kansas City, discovered the scheme while investigating a mortgage-fraud case. She has given presentations to lenders across the Kansas City area to show them how easy it is to create a false credit score using these numbers.

“The back door is wide open,” she said. “We’re trying to get lenders to understand the risks.”

It’s not clear how widespread the fraud is, mostly because the scheme is difficult to detect and practiced by fly-by-night businesses.

But the deception is emerging as millions of Americans watch their credit scores sink to new lows. Figures from April show that 25.5 percent of consumers — nearly 43.4 million people — now have a credit score of 599 or below, marking them as poor risks for lenders. They will have trouble getting credit cards, auto loans or mortgages under the tighter lending standards banks now use.

The scheme works like this:

Online companies use computers and publicly available information to find random Social Security numbers. The numbers are run through public databases to determine whether anyone is using them to obtain credit. If not, they are offered for sale for a few hundred to several thousand dollars.

Because the numbers often come from young children who have no money of their own, they carry no spending history and offer a chance to open a new, unblemished line of credit. People who buy the numbers can then quickly build their credit rating in a process called “piggybacking,” which involves linking to someone else’s credit file.

Many of the business selling the numbers promise to raise customers’ credit scores to 700 or 800 within six months.

If they default on their payments, and the credit is withdrawn, the same people can simply buy another number and start the process again, causing a steep spiral of debt that could conceivably go on for years before creditors discover the fraud.

Jensen compared the businesses that sell the numbers to drug dealers.

“There’s good stuff and bad stuff,” she said. “Bad stuff is a dead person’s Social Security number. High-quality is buying a number the service has checked to make sure no one else is using it.”

Credit bureaus can quickly identify applications that use numbers taken from dead people by consulting the Social Security Administration’s death index.

Social Security numbers follow a logical pattern that includes a person’s age and where he or she lived when the number was issued. Because the system is somewhat predictable, sellers can make educated guesses and find unused numbers using trial and error.

A “clean” CPN is a number that has been validated as an active Social Security number and is not on file with the credit bureaus. The most likely source of such numbers are children and longtime prison inmates, experts said.

Robert Damosi, an analyst with Javelin Strategy & Research, said the crime can come back to hurt children when they get older and seek credit for the first time, only to discover their Social Security number has been used by someone else.

“Those are the numbers criminals want. They can use them several years without being detected,” Damosi said. “There are not enough services that look at protecting the Social Security numbers or credit history of minors.”

Since the mortgage meltdown of 2008, banks have tightened lending policies, but many credit decisions are still based solely on credit scores provided by FICO Inc. and the three major credit unions: Experian, TransUnion and Equifax.

Federal investigators say many businesses do not realize that a growing number of those credit scores are based on fraudulent information.

“Lenders don’t understand that when they pay money to go through a service, they may be receiving false information,” Jensen said. “They think when they order the information from credit bureaus, it must be true.”

Without special scrutiny, credit profiles created with the scheme are not immediately distinguishable from other newly created, legitimate files.

Investigators say the businesses clearly know they are selling Social Security numbers, but it’s difficult to prove. The sellers use complex disclaimers that disavow illegal activity and warn customers against using their numbers in place of Social Security numbers.

The businesses also instruct customers to provide false information when using the number to apply for credit. Customers are told to use their real name and date of birth, but to avoid listing any addresses or phone numbers they’ve used in the past. They’re also told to avoid any other information that connects the new, clean credit profile with the old, damaged one.

Craig Watts, a spokesman for credit reporting agency FICO Inc., said FICO has tools available for businesses to protect themselves from this type of fraud, but they are not cheap. And many lenders are slow to adopt FICO’s new formulas, which are updated every few years.

Some companies that sell the numbers have lavish, high-tech websites. Others run no-frills ads on sites like Craigslist.

Jim Buckmaster, president and CEO of the San Francisco-based Craigslist, recently told the AP in an e-mail that there were “fewer than 200″ classifieds on his site that used the word “CPN.”

Within an hour of that e-mail exchange, dozens of the ads in cities such as Las Vegas, Los Angeles and New York had been pulled from the site. Many were reposted the next day.

An AP reporter called several of the sites, but got only recordings asking callers to leave a message with contact information.

Experts say the fraud will be difficult to stop because it’s so easily concealed and targets such vulnerable people. Other than checking with the credit bureaus to see if there is a credit file associated with your child’s Social Security number, spokesmen at FICO, the Social Security Administration and the FTC said there are no specific tools for safeguarding the number.

“This is an invisible crime, with invisible victims who don’t have enough support out there to help them,” said Linda Foley of the ID Theft Resource Center in San Diego.

Article Source: KMOX

Copy Machines Store Your Private Info

The dangers of identity theft are well-publicized. We’ve all been warned to shred our documents, be on the lookout for fishing scams and check our credit report regularly.

But there is a new potential threat to our identity lurking in warehouses across the country. We’re talking about copy machines.

“Copy machines today are just like computers,” explained Boston security expert Robert Siciliano. “They have hard drives and can store data that can be extracted.”

Think about it. Your tax preparer, your mortgage broker, your doctor, chances are they have all made copies of documents containing your personal information. That means your social security number; your bank accounts and credit card information could all be sitting on a hard drive in an office copy machine. Most of us probably trust our accountant and our doctor but the real danger doesn’t surface until one of those professionals decides to trade in the copier for a new one. The old one ends up on the used copier market.

There are massive warehouses across the country filled with hundreds if not thousands of used copiers that are up for sale. Companies are supposed to wipe the hard drives clean, but that does not always happen.

Security expert John Juntunen demonstrated how easy it is to access that information. Like any other buyer can do, Juntunen easily connected his laptop to a copy machine. Almost instantly, he is able to download or print whatever is on the hard drive. He found a child support document and an IRA application for a woman named Marilynn Boyd. Boyd’s husband was stunned by what Juntunen found. “They have the address. They have the social security number. They have the date of birth. It’s ridiculous,” he said.

Juntunen found names and addresses on the hard drive of another used computer. Among the list of names was Caroline Kennedy along with her home and work phone number. In a statement, a spokesperson for Kennedy said she was surprised by the findings and was not aware of the potential danger.

“I think it’s an issue that’s going to have major ramifications,” explained Juntunen’s colleague Sean O’Leary. “I think it’s going to hit like a ton of bricks when it does hit,” he said.

There are privacy laws, particularly when it comes to medical records, but experts agree they are tough to enforce. The only way to protect yourself is to make sure anyone who handles your personal information is aware of the problem.

Many newer copiers now have security systems that help combat this problem, but that doesn’t alleviate the issue for thousands of used copiers that are currently for sale.

Article Source: wbztv
Joe Shortsleeve

7 Things to Stop Doing Now on Facebook

Using a Weak Password
Avoid simple names or words you can find in a dictionary, even with numbers tacked on the end. Instead, mix upper- and lower-case letters, numbers, and symbols. A password should have at least eight characters. One good technique is to insert numbers or symbols in the middle of a word, such as this variant on the word “houses”: hO27usEs!

Leaving Your Full Birth Date in Your Profile
It’s an ideal target for identity thieves, who could use it to obtain more information about you and potentially gain access to your bank or credit card account. If you’ve already entered a birth date, go to your profile page and click on the Info tab, then on Edit Information. Under the Basic Information section, choose to show only the month and day or no birthday at all.

Overlooking Useful Privacy Controls
For almost everything in your Facebook profile, you can limit access to only your friends, friends of friends, or yourself. Restrict access to photos, birth date, religious views, and family information, among other things. You can give only certain people or groups access to items such as photos, or block particular people from seeing them. Consider leaving out contact info, such as phone number and address, since you probably don’t want anyone to have access to that information anyway.

Posting Your Child’s Name in a Caption
Don’t use a child’s name in photo tags or captions. If someone else does, delete it by clicking on Remove Tag. If your child isn’t on Facebook and someone includes his or her name in a caption, ask that person to remove the name.

Mentioning That You’ll Be Away From Home
That’s like putting a “no one’s home” sign on your door. Wait until you get home to tell everyone how awesome your vacation was and be vague about the date of any trip.

Letting Search Engines Find You
To help prevent strangers from accessing your page, go to the Search section of Facebook’s privacy controls and select Only Friends for Facebook search results. Be sure the box for public search results isn’t checked.

Permitting Youngsters to Use Facebook Unsupervised
Facebook limits its members to ages 13 and over, but children younger than that do use it. If you have a young child or teenager on Facebook, the best way to provide oversight is to become one of their online friends. Use your e-mail address as the contact for their account so that you receive their notifications and monitor their activities. “What they think is nothing can actually be pretty serious,” says Charles Pavelites, a supervisory special agent at the Internet Crime Complaint Center. For example, a child who posts the comment “Mom will be home soon, I need to do the dishes” every day at the same time is revealing too much about the parents’ regular comings and goings. (See Full Story)