To All Victims of Identity Theft in Atlanta

Identity stolen? Who to turn to and what to do next.

One of my blog readers from Atlanta contacted me recently. She was looking for a recommendation on an investigative firm to contact in Atlanta, so I thought I would share it publicly here. If you reside in Atlanta and need help with a case of identity theft, or you have another matter to discuss with a private investigator such as a pending divorce or child custody case, you can contact:

e-Investigations International
235 Peachtree St NE #400,
Atlanta, GA 30303
(404) 575-1919

As licensed private investigators, they deal with cases of identity theft (unfortunately) all the time. Atlanta seems to be a hot-spot for this kind of criminal activity. These guys can be trusted to give a fair up-front analysis of your case without charging you a dime, and if they agree to take on your case, you get a written no-hassle guarantee to go along with it. This retired old guy thinks that’s how all businesses should be run.

How do you know if you’ve been a victim of ID theft? There can be many signs, but in general, you should investigate whenever you feel that something is off:

  1. You receive a bill or invoice to your correct address, but the name or something else is off.
  2. You are declined for new credit when you know you should be approved.
  3. You receive collection notices by phone or mail from companies you don’t recognize.

If any of those warning signs happen to you, it’s always a good idea to look deeper. A call to a PI may not be your first choice, but at the very least you should check your credit reports from all major credit bureaus to ensure that no new credit lines have been opened without your knowledge. If that already sounds overwhelming to you, you should really be calling a PI.

An ounce of prevention…
Remember dear readers, preventative measures can easily be taken. Just by changing a few of your regular habits you can ward off most attacks. Criminals are usually quite lazy and will try to rip off the person who is least prepared. For example, when you are shopping, use a credit card instead of writing checks or using a debit card. 9 times out of 10 you’re better off because of liability limitations: banks are more strict whereas credit card companies are way more lenient.

Other services
My friends in Atlanta also specialize in computer forensic work. In case you have never heard of that before, it involves being able to collect court-admissible evidence from computers and technological devices. They are brilliant at this and have taken on some tough cases before with great results.

Ramblings of a retired detective..
That reminds me of the time I was called to investigate a matter regarding a recently terminated employee, who we’ll call “Fred” for the sake of confidentiality. It seems that Fred was publicly reprimanded at work for constantly showing up late to meetings, and he decided to get back at his boss for embarrassing him. Fred thought it would be a good idea to get his boss fired by uploading pornographic pictures to his work computer and then emailing them to women at the company. What Fred did not realize was that a digital trail was left behind that connected the dots and proved that the pictures were originally downloaded from Fred’s machine. Poor Fred. Poor, fired, Fred.

A Closer Look at Identity Theft

This is a form of theft where a person steals the identity of someone and tries to pretend that they are someone else. It’s very common and it can be stopped using online computer security. Certain laws exist to protect the public. Identity theft is a serious case and is illegal. A person who is caught impersonating someone else can be imprisoned for very many years.

Facts About This Form of Theft

  • People try to impersonate other people so as to gain access to some resources.
  • If one is held responsible for the perpetrator’s actions, he or she can face serious charges.
  • It normally takes place when one gains access to other person credit cards, important information such as social security number (SSN) or even their name without permission.
  • It is very hard for victims to know whether their personal information was obtained by another person.
  • Research shows that the chances of one becoming a victim of this type of theft is about 2%.
  • Some go as far as hacking credit cards to obtain information illegally which is termed as a cyber crime. Online computer security ensures that you’re not a victim of such predicaments.DIFFERENT TYPES
  • There are various types of this form of theft in the world.
  • Financial theft where one uses another person’s identity to falsely obtain services, goods and credit.
  • Criminal theft involves a person who poses as another person to take a fall for a crime they never committed.
  • Medical identity theft involves a person who uses another person’s identity with the aim of obtaining drugs or medical care.
  • The next type is identity cloning which involves a person who uses another person’s information to try and assume their identity in daily life.
  • Child theft involves illegal immigration of children. Those caught in the offense normally face serious charges and imprisonment for many years.

The last type is synthetic theft which is very common today. It normally involves fabricated identities which makes it very difficult to track such criminals.

Techniques Used To Exploit Personal Information

  • Use of public records to get information about all citizens and innocent individuals.
  • Skimming of information from credit cards by use of card readers.
  • There have been many cases of stealing of credit cards which is normally related to this type of theft.
  • Use of redundant storage media and IT equipment to retrieve personal information.
  • Some even engage themselves in odd practices like dumpster diving.
  • Question schemes are also used by some people with Ill motives.
  • Some even steal personal information from computers by using malwares.
  • ¬†Observation of users typing their passwords, credit card numbers and very important credentials.
  • Using some credit card readers to acquire very important data wirelessly.
  • Hacking of computer softwares ,systems and networks to try and obtain personal data.
  • Some advertisements like job offers can also be used.
  • Some organizations which store valuable personal information can also be infiltrated.
  • Some social network websites can also be used to acquire some personal details of various users.Over the years, online computer security has been used by many people to try and curb this vice.