id theft and medical identity theft are leading fraud crimes

Medical identity theft is the most expensive identity theft crime and costs each identity theft victim approximately twenty thousand dollars. In addition, the crime of medical identity theft has vast ramifications for identity fraud victims-even death. This article provides an overview of these fraud crimes, cites an identity theft case with a link to the full story, discusses the reasons why criminals are motivated to steal identities, and offers educational resources for identity theft prevention.

Demand for a fraudulent identity

An identity is a terrible thing to lose.

Fraud crime leader, identity theft is in demand for a variety of reasons. A fraud criminal may want to steal an identity of one with a spotless credit record in order to borrow money, purchase a home, start a business or accumulate credit cards and credit lines for future purchases. All of these acts committed in “your” name place you in a horrible position when the identity thief grabs the property and runs or fails to honor the borrowing agreements-and of course this is exactly what  you can expect from an identity theft fraud criminal.

Some individuals simply want to use a stolen identity for the purpose of working in the U.S.A.

The illegal alien identity thief

The illegal aliens who storm the borders and come to the U.S. sometimes become identity theft criminals-in addition to their crimes of coming into the country illegally and without proper documentation.

In fact, illegal aliens are often the criminals responsible for stealing an identity for the purpose of working illegally in this country. For instance, the Swift and Company meat packing plant bust during 2006  involved 1,265 illegals and 65 were charged with identity theft.

Medical identity theft can harm you or kill you

Perhaps the most dangerous identity theft of all is medical identity theft.  One whose identity is stolen may have his insurance policy information taken by the thief and this fraud crime could result in the identity theft victim losing his/her ability to receive medical treatment due to the confusion caused by two people claiming ownership of the same medical policy. Finally, the id theft victim can have his medical records co-mingled with those of the identity thief who receives fraudulent treatment-under your policy.

What if you need emergency treatment as the insurance company, medical information bureau, medical records departments at the medical treatment facilities, and others attempt to straighten out the mess?  You could die while waiting on the pseudo bureaucracy to straighten out the mess.

You are much better off avoiding identity theft, I promise.

You can prevent identity theft through pro active, privacy living and data information management, while using proven business and personal privacy principles and concepts.

Readers may opt to receive a free e-mail series on identity theft prevention.

You may be interested in reading about how I recommend preventing identity theft.  I wrote Privacy Crisis; Identity Theft Prevention Plan and Guide to Anonymous Living. The e-book is available for purchase and immediate download.

Grant Hall


Can a stalking victim disappear and never be found?

Fearful of being harmed or murdered by a stalking ex husband? Many stalking crimes result in injury or death to the stalking victim. This article provides an overview the problems of a persistent, obsessive stalker and provides references and information on how to disappear completely and never be found.

Behavioral aspects of an abusive ex husband or ex boyfriend

Relationships are difficult to terminate. An abusive ex will typically have good traits as well as his undesirable ones. Everyone has some good in them. However, the controlling and abusive ex may become a danger to the abused woman.

The abused woman must decide

Codependents have addictive characteristics to dependent relationships. Though difficult to break off, an abusive relationship may be unhealthy long-term, and present a danger.

Abused women make their decisions on whether to stay or leave the woman abuser.

Counseling and support

Counseling for abused women and telephone hot line support may provide immediate comfort to the abused woman. Peer support offers mutual understanding of the abusive relationship.

Breaking free from an abusive ex and how to stop stalking

Once an abused woman makes a decision to leave her abusive ex, she will want to prevent stalking by making certain to break the paper trail to her identity. This is important because controlling ex husbands often become a stalking nightmare for an abused woman who may soon find herself a stalking victim unless she learns how to disappear and never be found.

Review these chapters of Privacy Crisis:

Chapter 3, Using I.D. to Disappear

Chapter 7, The Anonymous Resident

Chapter 10, Driving Secretly

Chapter 15, Anonymous Banking

Privacy Crisis: Identity Theft Prevention Plan and Guide to Anonymous Living by Grant Hall is available for purchase and immediate download.


Domain privacy for business identity theft protection

Business identity theft crimes cost upwards of ten thousand dollars on average. This article provides domain privacy recommendations for business identity theft protection.

Private Registration of a business

The private registration of a business or professional practice with privacy as a priority is the first important step to avoid identity theft.

Through the use of a Nevada Limited Liability and the Trust Manager Principle, a business or profession can remain anonymous.

Selection of an Internet Service Provider

Hold the ISP account in an entity name or use a nominee for high-level business privacy. An identity thief will have no idea who is behind the domain name when he traces your computer IP address to the ISP account.

The hosting company

Select a hosting company that will allow for payment of services through anonymous bill payment methods. Money orders are fine and they leave no trace to your source of funds. Your bank secrecy plan which you should have in place, will remain intact.

Private domain registration

The important points to emphasize for private domain registration are security and anonymity. Block access to those who want to look up who is behind the domain (security) and register the domain through the use of  the trust manager principle and hold the domain in a Nevada LLC (anonymity).

Resources and references for these terms and business identity theft prevention principles

An identity thief who accesses “whois” will be unable to determine who is behind a business or professional practice when these business privacy principles are utilized.

Refer to these chapters of Privacy Crisis: Identity Theft Prevention Plan and Guide to Anonymous Living.

Chapter 14, Computer and Internet Privacy

Chapter 21, Business Entities

Chapter 23, Career Privacy Options

Chapter 24, Nominees: Invitation for Disaster

Thanks.

Grant Hall



a cyber stalker victim may become a murder victim

The stalking victim may be stalked, harmed and eventually killed as this article provides documentation of a stalker killer criminal.

Stalking victims may become homicide victims

As about one in ten women are stalked during their lives, vast numbers of women are in danger of being stalked. Sometimes the stalker commits murder.

A stalker may come into the stalking victims life through work, personal relationships or through online contact as was the case with murder victim, Nimzay Aponte. See the website below for the story:

http://www.nbcnewyork.com/news/local-beat/Bronx-Woman-Killed-by-Internet-Stalker-Cops.html

The excerpt below is a direct quote form the above website concerning the murder of stalking victim, Nimzay Aponte.

“A Bronx woman who was stabbed by a man who stalked her online was able to lead police to her killer by whispering his name before she died, law enforcement officials said.

Nimzay Aponte, 23, was attacked around lunchtime Tuesday as she sat in a Bronx park while taking a break from a job fair.  A male friend sitting next to her on a park bench was also slashed, police said.

Police said the suspect, Raymond Dennis, had somehow figured out Aponte was attending the job seminar and found her in the park. There, stabbed her in the chest and her 25-year-old friend in the arm. The friend was listed in stable condition Friday. Police say Dennis and Aponte met once and then she rebuffed him and then he tracked her down.

As she was dying, Aponte whispered  “Mike did it,” referring to a person she met online. It’s not clear how the two connected online. The Associated Press reports they chatted on AOL. The New York Daily News reported they met on AOL and Local-Hookupz.com and the New York Post said they connected on MySpace.”

Cyber stalking prevention

Prevent cyber stalking by adhering to these privacy rules:

1.) Use a nominee or a separate entity to hold an internet service account. A serious stalker criminal will have the means and persistence to track your name through the IP address of your computer all the way to your ISP. You are in danger of the stalker finding your home address unless you practice privacy living principles.

Prevent cyber stalking by reading chapter 14, Computer and Internet Privacy of Privacy Crisis; Identity Theft Prevention Plan and Guide to Anonymous Living.

2.) Purchase online products anonymously. Review chapters 15 and 16 of Privacy Crisis. These chapters provide anonymous banking and private bill payment information.

3.) Never provide online strangers with a home address. See chapters 7 and 8 of Privacy Crisis for home privacy principles and concepts.

A Privacy Consultation is available when you have an emergency with a persistent stalker ex or other dangerous stalker.

While most answers to all privacy living and stalker questions are in the book, Privacy Crisis, a consultation may be advisable when there is a stalking emergency.

Thanks for reading.

Grant Hall

contact@PrivacyCrisis.com

Prevent medical identity theft inside jobs

This article provides privacy living information to prevent medical identity theft from the medical providers and their staff.

Patient identity protection from medical insiders

Think that nice clerk who demands all of your most personal and confidential data has your best interests in mind? Maybe. But, you had better be on guard as medical insiders sometimes become identity thieves, particularly those with access to medical patients’ identities. One such insider, a medical clerk abused patients’ identification information to try and rack up a big score.

Medical office clerk or identity thief?

The following story is a direct quote from this website:

http://blog.timesunion.com/crime/4823/4823/

“A medical records clerk from St. Peter’s Hospital was arrested on charges of stealing patients’ personal information and using it to open credit card accounts, police said, and more unknowing victims could be out there.

Albany County Sheriff’s deputies arrested Johnathan Harwood, 23, of Van Buren Avenue, on Monday for opening credit accounts using stolen Social Security numbers and then purchasing merchandise over the Internet. Police said Hardwood was also using the computers at the hospital to purchase items online.

Undersheriff Craig Apple said Harwood was purchasing small items such as books, to see if he could get away with the crime. “He was testing the waters,” the undersheriff said.

The man, who had worked in the Medical Records Unit for a little less than a year, was discovered when an item he bought online was sent to a victim’s house, Apple said.

The victim reported it to police, who were able to track it back to the computer used to make the purchase. St. Peter’s Hospital administrators immediately suspended Harwood after his arrest. He has since been fired.

Harwood was charged with five counts of second-degree forgery and three counts of second-degree identity, both felonies, and three counts of second-degree criminal impersonation, a misdemeanor. He was arraigned in Albany City Court and released for a future court date since he has no previous criminal record.

Apple said the sheriff’s office is looking for more people who may have had their identities stolen by Hardwood. Those who think they may be affected should call 765-2351.”

In order to prevent identity theft and medical identity theft crimes, the patient will necessarily have to adopt a high-level privacy living lifestyle. And in view of the average medical identity theft crime damage of $20,000.00, a family should keep their identity information confidential while providing only the most basic identity data to medical providers.

Protect identity by not providing  a Social Security number to medical providers

The most vulnerable of all identity documents is the Social Security number. And almost all medical provider forms ask patients for the SSN. All you have to do is say no! Or you may leave yourself wide open to a medical identity thief who may steal your identity to open credit card accounts or credit lines in your name or otherwise abuse your personal and confidential identity information.

The following excerpt is taken from this website:

http://cbs2chicago.com/local/identity.theft.investigation.2.1592890.html

Below are direct quotes from the story. The Social Security number is a dangerous number to share.

“It was clear-cut identity theft; a janitor in the Northwestern Medical Faculty Building is accused of rummaging through patient files, stealing Social Security numbers.”

Anonymous living practices will provide consumer privacy without the threat of medical identity theft.

Our e-book, Privacy Crisis; Identity Theft Prevention Plan and Guide to Anonymous Living provides effective information for living under the radar. You can purchase the book and be reading how to avoid medical identity theft or begin living secretly in just FIVE MINUTES from NOW.

Medical identity theft protection without id theft insurance premiums

Principles of privacy living will provide medical identity theft protection while eliminating the need for id theft insurance. This article outlines consumer privacy living principles that prevent and  eliminate medical id fraud.

Social Security number and date of birth

These two crucial identifiers provide a medical identity thief with a pathway to your personal and confidential data that may be retrieved through the tapping of various databases. Avoid providing the date of birth unless absolutely necessary when obtaining medical treatment. I NEVER provide an SSN to a medical provider.

Home address and home telephone number

Neither is necessary for a medical provider to have and substitutes may be used instead of the real thing. Learn how to use a mail nominee and obtain telephone service anonymously.

Privacy living is essential for avoiding medial identity theft.

Identity theft insurance or identity protection through consumer privacy

Take charge of your medical identity theft protection program by self insuring your identity. Through privacy living, you can avoid a privacy invasion and thwart the efforts of an identity thief.

Identity theft insurance companies require personal and confidential information prior to the issuance of an id theft policy. Do you really want many thousands of employees of a giant corporation knowing where you live? Aside from the obvious dangers of having strangers know where you sleep, identity theft insurance is NOT the gateway to avoiding identity theft or medical identity theft in particular. Instead of turning your life’s most personal and private data over to strangers, we advise an identity theft self insurance plan. CLICK HERE to learn how to protect your identity and prevent identity theft.

Prevent medical identity theft with patient behavior modification

Patient behavior modification is crucial to avoiding medical identity theft.  The average medial id theft costs $20,000.00 so it is worth your while to prevent medical identity theft rather than try to correct such an expensive identity theft crime when it happens.

Patient behavior and assertiveness training

Prevent medical identity theft through privacy living principles and concepts. Forget worthless identity theft insurance policies and their privacy-invasive requirements, and those expensive, perpetual, insurance policy premiums.

Keep your personal and confidential data private and you will successfully avoid identity theft. Take a look at this article for clarification:

http://www.privacycrisis.com/blog/?p=173

Filling out the forms and Ms. Clerk III

Every medical office, hospital admissions department, or outpatient surgery center has a senior clerk who thinks she has a right to your most private information. Do Not provide your home address, home telephone number, Social Security number or your bank account information. It is none of their business. And you may save $20,000.00 or more as you avoid identity theft.

Medical insurance policy and medical insurance id card

Provide your insurance id card only when you are ready to receive medical services. Do not provide it to a clerk over the telephone. In fact, be careful which medical providers have your information as many medical identity theft criminal cases are the result of an inside job.

The following website provides specific case examples of medical identity theft inside job cases and the examples following the URL are direct quotes from this same website.

http://www.bcbs.com/blueresources/anti-fraud/prevent-medical-identity-theft.html

“Lind Weaver, 57, a horse farmer in Palm Coast, Florida, received a hospital bill for the amputation of her right foot—a surgery she’d never had. Anndorie Sachs, a 28-year-old mother of four from Utah, got a call from a social worker saying that the newborn she’d supposedly just delivered—and abandoned—had tested positive for methamphetamines. Jo-Ann Davis, 41, a veterinary technician from Moon Township, Pennsylvania, was almost arrested for allegedly scamming pharmacies out of painkillers.

All three women were victims of medical identity theft, a fast-growing but little-known crime in which a thief uses a person’s name and social-security or health-insurance number to get medical treatment or charge insurance companies for phony services.”

Cash is king or a sure way to prevent medical id theft

Do you want to minimize your chances of becoming a medical identity theft victim? Pay cash for medical services. That way, there will be no record of your insurance information within the medical provider databases.

Rather than pay with greenbacks, borrow the money interest free by charging the medical services on a credit card. That may not be risky as fewer people will ever see your credit card information than those who will have access to your insurance data. And if you have any suspicion  that the charge card might be abused, simply call the bank and have the account number changed. When you time your medical service charges correctly as per the charge cycle, you may have up to seven weeks from the charge day until payment is due-interest free when you do it this way.

You may be interested in our free identity theft info series that is offered by e-mail. If so, CLICK HERE.

Our best-selling identity theft prevention book, Privacy Crisis; Identity Theft Prevention Plan and Guide to Anonymous Living is available for purchase and immediate download. Buy the e-book HERE.

Grant Hall


Harassment stalking and how to avoid a telephone stalker

This piece will provide telephone privacy information for the purpose of stopping a telephone stalker. Harassment stalking is a crime and telephone stalking crimes should be taken seriously by a stalking victim.

Telephone stalking crimes

Are you being stalked? Receiving harassing telephone calls? Take your stalking ex’s telephone stalking seriously as it is a stalking crime that may lead to your physical harm.

The following citation is taken from the website below and a description of telephone stalking crimes is provided, and this is  a direct quotation from this same website.

http://www.privacyrights.org/fs/fs14-stk.htm

  • Harassing Telephone Calls in Interstate Communications. This statute makes it a federal crime to use a telephone or other telecommunications device to annoy, abuse, harass, or threaten another person at the called number. (47 U.S.C. Section 223(a)(1)(C))

Anonymous telephone calls

Avoid a telephone stalker by making anonymous telephone calls that cannot be traced to your person, home, or place of business. Receive calls only from a very select group of people.

Pay phones

Pay phones are scarce these days and those that are still standing do not generally offer the best location for a pleasant conversation. Often, they are positioned outside in noisy areas and the environment is less than desirable for a phone conference. Hotels may have private pay phones that will work well for outgoing business and personal calls.

Cell phones

Buy a cell phone over the counter at a retail store, avoid providing your true name, load it with an anonymous cell telephone card. The phone card must be purchased with cash to preserve your telephone privacy. Avoid cell telephone contracts.

Voice mail

Buy a stand alone voice mail number with no connection to you to avoid the telephone stalker’s potential privacy invasion into your life.

Land line telephones

Perhaps you want one at the office or other business cite.

I would not advise having a land line phone in the home as the phone stalker can trace the phone number to your front door when he gets the phone number.

Significant stalking behavior patterns to consider

This information is included for reference and information purposes and is quoted verbatim from the website listed below:

http://www.janedoe.org/know/stalking.htm

A stalker’s behavior might include:

• Following
• Waiting outside of a home or workplace
• Making harassing or persistent phone calls
• Sending letters or emails
• Sending unwanted gifts or flowers
• Contacting, threatening, or harassing friends and family
• Hurting or killing pets
• Vandalizing property
• Manipulative behavior, for example, threatening suicide in order to force contact
• Spreading lies about a victim, for example, filing false reports, posting or distributing personal or false information
• Collecting information about the victim’s personal life and habits
• Subscribing to services in the victim’s name
• Interfering with utilities or services, for example, having phone service disconnected
• Impersonating the victim or family member
• Accessing personal information through computer files or email accounts

Thanks for reading.

Our e-book Privacy Crisis provides anonymous living information for those who want to avoid a stalker. You may be interested in purchasing the book HERE. Or we offer a Free Stalking Prevention and Stalking Solutions information series by e-mail HERE.

Privacy Consultations have provided assistance to stalking victims who are in danger. You may be interested in a privacy consultation for a solution to an emergency.

Grant Hall

How can an abused woman escape domestic violence?

This article provides a way for an abused woman to escape her abusive ex within a short period of time. Specific recommendations are provided for the initial escape and references and resource links are contained  in the article.

Help hot lines and domestic violence shelters

Those who operate these domestic violence facilities are to be commended for their efforts. And to be fair, these companies provide their share of help to abused women. In fact, the hot line may have provided substantial supportive counseling prior to the time the abused woman is ready and willing to end the domestic violence against her by making a clean getaway from her abusive husband or ex boyfriend.  Once this decision is made by the battered woman, it is time to establish a defensive plan-an immediate, emergency plan to stop stalking efforts of her abusive ex who will surely come looking for her once he discovers she has left the nest.

Stopping Stalking

Nipping the stalking problem in the bud is the best strategic plan If it can be accomplished. This means the stalking victim should, if possible, learn how to lose her stalker ex immediately upon leaving the home where the domestic violence took place.

Create a new identity and become a roommate

Begin the escape plan by becoming known by a pen name or alternate name in order to break the paper trail to the real you. How will your stalking ex pick up the trail on Mary Sue Davidson when she is now known as Kathy Washington in her new apartment which she shares with a roommate who has all house utilities in her name?

For more information, please review this article on harassment stalking:

http://ezinearticles.com/?Stop-Stalking-Problems-When-You-Create-a-New-Identity&id=3633281

Privacy living tactics

Once an escape has been made, the staking victim and former abused woman will need to adopt high-level privacy living principles in order to establish bank secrecy, ensure home privacy, develop workplace anonymity, and learn to travel secretly.

Further reading is recommended for those who desire information on stalking harassment. We offer a FREE E-MAIL COURSE. To subscribe, click HERE.

Stalking victims and others who have suffered stalking harassment or those who want to learn about privacy living may be interested in visiting our website, www.PrivacyCrisis.com.

Our e-book, Privacy Crisis; Identity Theft Prevention Plan and Guide to Anonymous Living is a stalking book that will provide all the information necessary to prevent stalking or lose an obsessive ex or other stalker who wants to make you his stalking victim. You can purchase the e-book and begin reading it in just Five minutes from now.

IF you question whether you should take the crime of stalking or the crime of domestic violence seriously, please be advised that stalkers are very persistent in some cases and have been known to stalk their victims from one year to as long as forty years.  Consider this piece of stalking information and these stalking statistics taken as direct quotes from the website below:

http://new.abanet.org/domesticviolence/Pages/Statistics.aspx

“Stalking According to the Stalking Resource Center:

  • 1,006,970 women and 370,990 men are stalked annually in the United States.
  • 1 in 12 women and 1 in 45 men will be stalked in their lifetime.
  • 77% of female and 64% of male victims know their stalker.
  • 87% of stalkers are men.
  • 59% of female victims and 30% of male victims are stalked by an intimate partner.
  • 81% of women stalked by a current or former intimate partner are also physically assaulted by that partner.
  • 31% of women stalked by a current or former intimate partner are also sexually assaulted by that partner.
  • The average duration of stalking is 1.8 years.
  • If stalking involves intimate partners, the average duration of stalking increases to 2.2 years.
  • 61% of stalkers made unwanted phone calls; 33% sent or left unwanted letters or items; 29% vandalized property; and 9% killed or threatened to kill a family pet.
  • 28% of female victims and 10% of male victims obtained a protective order. 69% of female victims and 81% of male victims had the protection order violated.

Stalking Resource Ctr., The Nat’l Ctr. for Victims of Crime, Stalking Fact Sheet, http://www.ncvc.org/src/Main.aspx (citing Patricia Tjaden & Nancy Thoennes, U.S. Dep’t of Justice, NCJ 169592, Stalking in America: Findings from the National Violence Against Women Survey (1998)”

THANKS.

Grant Hall