Scams can cause extreme financial and emotional distress to victims and their families. With technology, scammers have become more creative in accessing their victims by offering quick clicks and false credibility. Even young teens that navigate effortlessly online have a hard time distinguishing legitimate situations from scams. To help you and your family avoid becoming the victims of a scammer, I interviewed “William”* who shared his mother’s story. She was an educated professional that fell victim to multiple scams over five years. You won’t want to miss the true story about what happened to her. If your family hasn’t taken steps for increased awareness and cybersecurity, you’ll want to check out our Cybersecurity & Red Flags supplement. The perfect compliment to our free Connected Family Agreement, you can take the extra steps you need to protect your loved ones right now. Our guide offers tips to avoid hacking, scamming, malware, and phishing and is a must-have for today’s modern family. Today’s GKIS article shares the story of an elderly woman victimized by scammers, the types of scams to look out for, and tips on how to avoid becoming a victim yourself.[1]
*Names were changed to protect the privacy of the victims.
What are scams?
A scam is a dishonest scheme to cheat someone or steal money. With the help of technology, scammers have been able to target their victims in more creative, easier, and faster ways than ever before. According to an FBI report, 2020 scams resulted in a loss of over 4.2 billion dollars. With more baby boomers retiring and the pandemic resulting in more at-hone isolation, I suspect those losses rose in the last few years.[1,2]
Who Scammers Target
Although anyone can become a scam victim, research has shown that scammers tend to target kids, teens, and the elderly. A study conducted by the University of Iowa confirmed that a certain area of the prefrontal cortex of the brain is responsible for processing information and solving problems – tasks that help people consider whether information is true or not. Young people tend to be vulnerable to scams because this part of the brain is still developing, and older individuals are vulnerable when they demonstrate poor technological fluency, are isolated, or suffer from a decline in problem solving ability.[3]
The Story of William and His Mom
William is a middle-aged man who generously shared his story with us about his elderly mother, Mrs. Thorn, who was scammed out of tens of thousands of dollars over a five-year period. Despite his best efforts to protect and rescue her from the scammers, he struggled to keep her safe. Once one scammer got ahold of her and convinced her to send money, many other scammers started approaching her too. William suspects that the scams were somehow linked as if they shared her information with others. Below are some of the scams she fell victim to.
Different Types of Scams
Charity Scams
William described his mother as a generous individual. She was a nurse in Japan during the 1950s, and, after she retired, she continued helping others by volunteering at church and other organizations. As she got older, she would receive postcards in the mail from different charities, a common scam targeted at elders. Although her income from social security and savings was not a lot, she began “donating” money to those she perceived as less fortunate than herself.
Piecing together what happened with his mom’s checking and bank documents, William found that she initially sent small amounts of money ranging from $5-10. Once the scammers had her on the hook, however, they would groom her for larger and larger “charitable” donations.[4]
Lottery/Sweepstakes Scams
Another scam that William’s mother fell victim to was the lottery/sweepstakes scam, which also commonly targets elders. These types of scams claim that the victim has won a large amount of money or other prizes such as a new car. Once the victim is excited and eager to collect their prize, scammers require that they pay a fee or taxes. As the scammer reaches out with details, the victim often adopts an illusion of intimacy, meaning they feel they have a personal, caring relationship with the scammer. This false intimacy pulls the victim in deeper, often eliciting more and more personal information from the victim.
William confirmed that Mrs. Thorn spoke to the scammers about his efforts to block their access and protect her safety. Mrs. Thorn’s scammers not only instructed her not to tell anyone because it could be a nice surprise for her family, but they also offered specific suggestions on how to work around the safeguards her son put in place. They seemed to play on her wishes for independence and worked to create and escalate conflict between her and her son.
Our GKIS Connected Family Course can help you close screen risk gaps and improve family cooperation and closeness. If you have school-age children at home or love somebody who does, check it out. Not only does the course offer amazing safety home setup tips, but it helps parents create fun dialogues for better, healthier parent-child relationships.[4]
Government Impersonation Scams
William noticed that some of the scams his mom was involved with may be linked with others. For instance, to pay the taxes of her “prize,” the scammer would set Mrs. Thorn up to talk to an “IRS agent.” These types of scams are known as government impersonation scams which are types of very popular imposter scams. According to the FBI, government impersonation scams typically involve the scammer impersonating a government official who threatens to arrest or prosecute victims unless they pay a fee. William shared that they even tried to trick him with false threats of prosecution and arrest unless he agreed to cooperate.
Dr. Bennett shared that immigrants can easily be targeted with this type of scam as well. She shared a story of a colleague who was a Chinese immigrant who worked as a software engineer. This victim’s scammer posed as a member of the Chinese government and threatened the safety of her family if she didn’t pay overdue fines. The scammer demanded that she not tell her friends and family and immediately pay. She lost over $150,000 that was never recovered before she realized she’d been scammed.[4]
Phone Scams
William explains that although his mother’s scams initially started by mail, they soon turned into phone calls. He allowed me access to his mother’s journal which included notes on the people she spoke to and what they had asked her to do. Her notes reveal that she would talk to the same people over and over and eventually trusted them more than her own family and friends. The scammers were very persuasive and would instruct her how to wire funds to unfamiliar places and people, even going so far as giving her directions to wiring locations that her son had not blocked yet. William spent countless hours visiting banks, local wiring locations, and friends begging them to not help his mom transfer money or provide transportation. Although he spoke to his mom many times, he found that the scammers would get to her anyway with relentless pressure and creative arguments.
Scammers have no limits.
It was not until William caught his mom almost wire transferring $200,000 that he finally got the information he needed to gain conservatorship over Mrs. Thorn. By then, the scammers had even instructed her to how to send money from q reverse mortgage loan on her home to complete the transaction!
William said the scammers had no shame and would even help her find ways to continue participating in the scams even after he took steps to stop them. He shared that they would pressure her with false deadlines and threats, making her so anxious that she would rush into performing workaround instructions. Her journal reflects moments of intense anxiety as she tried to complete the complex transactions.
To emphasize how far scammers would go, he shared that, after he lowered his mom’s allowance to $25 a week and there was not much to get from her anymore, they still tried one last thing – the 976 phone scam. According to William, this is a scam where you call back a number with an area code of 976 and get charged a huge per-minute fee. The longer the scammer keeps the victim on the phone confused and anxious, the more money the scammer gets.
Avoid Being Next
William shared that his mom was scammed out of about $70,000 before it stopped. If it was not for her son’s compassionate and tireless commitment to protect her, it could have been far more. Other popular scams include shopping scams and job opportunity scams. If you are worried that bad actors can access your family members, check out our Screen Safety Toolkit. Our resource guide is perfect for those that need smart tech tools for filtering, monitoring, and management.
Tips to Outsmart the Scammers
Contact your phone carrier and internet service provider to research helpful tools for blocking unwanted and unknown calls, texts, and emails.
Remember, if it sounds too good to be true, it probably is.
Don’t act immediately, take a moment to research the situation and talk to someone who you trust.
Don’t give out personal information like your name, date of birth, social security number, address, or usernames or passwords. Legitimate organizations will not text, call, or email you to obtain private information.
Don’t complete forms from an email link. Instead, go directly to the website of the company you are dealing with and complete the business from there.
Call the company directly to confirm the request was legitimate before you offer information or complete forms. The IRS communicates through US mail, not by telephone or email. Call 800-366-4484 to report IRS-related phishing attempts and fraud.
Be sure to keep up with device updates for security patches, delete unused and unwanted apps, and change your passwords frequently.
Review your credit card statements regularly to catch unauthorized charges and periodically review your credit report.
Consider freezing your social security number for new financial transactions with Experian, Equifax, and TransUnion to escape identity theft.
Lastly, Google “scams” or a quote from any communication that may be a scam to learn more about the common scams that may target you.
Scams are no joke. Once you become a victim, serious damage can occur that can take years and years to repair. Check out our other GKIS article Child Identity Theft is on the Rise. Protect Your Family Against Cybercrime, to learn more about how fraudulent purchases made with your private information can change your life
Here are some other related articles offered on our GKIS website for more information on hacking, scamming, malware, and phishing. Learn more about the dangers of online to be prepared for anything that comes your way.
Imagine finding out that a cybercriminal has been recording you in your bedroom for months and can do anything with that footage. Or what if you turn on your computer to find that you can’t access anything unless you pay a ransom to a hacker. What if a predator could view and speak to your child through a camera in their bedroom? You can help protect your family from becoming victims of cyber-attacks and ensure peace of mind by referring to our Screen Safety Toolkit, a resource guide with our best recommendations, how-to information, and links to our favorite easy-to-use parental control systems. This article will detail the risks and worst-case scenarios of webcam hacking as well as provide tips to help ensure your cybersecurity and safety.
How do cybercriminals hack webcams?
Hacking requires a specialized skillset that is increasingly accessible for the average tech user. In the sub-world of black hat computer hacking (hacking tech with bad intent), accessing private webcams is considered fairly easy. Further, there are several different methods utilized by black hat hackers to gain access to and take control over a computer’s web camera.
Spyware
One of the prominent methods employed by hackers to gain access to private computer webcams is through the use of spy software and remote administration tools (RATs). Webcam spyware is a type of computer application or program that allows the user to remotely take control over another user’s webcam. This enables the hacker to see whatever or whoever is in front of the computer’s web camera.
An alarming feature of this software is that it often allows the user to remotely turn the hacked computer on. Turning a computer off when it’s not being used is not enough to protect users from being spied on.
Spyware can be installed in webcam attachments and hard-wired webcams. The hacker can control audio and microphones, camera angles, zoom features, and focus. They can also record the footage so they can blackmail the victim later. Surprisingly, webcam spyware is freely available for download on the internet and can be installed on most operating systems.[1]
Internet Connection
Another common method of webcam hacking involves the use of web cameras that rely on remote access through WiFi. A common example of this type of web camera includes wireless security devices such as the popular Ring video doorbell.
Unfortunately, while these devices are intended to provide security for the user, they can also provide black hat hackers access to your home. If a camera is connected to a home WiFi router, it is vulnerable to hacking, especially if proper precautions aren’t taken to secure it. To avoid this, it is important to set secure network passwords for home WiFi routers. The default factory setting login information for routers can be accessed by anyone who is willing to look up the manufacturer’s startup support webpage. Failing to change your default router login can leave your wireless security cameras open to malicious hackers.[1]
Trojan Viruses
Perhaps the easiest way for cybercriminals to hack into your computer’s webcam is through the use of a Trojan computer virus. A Trojan virus is a type of malware deliberately designed to cause damage by infecting and subsequently taking control over your device. It is aptly named after the famous ancient Greek war story of the Trojan Horse because it is an attack disguised as a gift.
Trojan viruses are so effective because people mistakenly infect their own devices with them by downloading software that they believe is safe. This typically occurs when visiting a website that invites you to download a seemingly innocent file that actually contains malware instead of Adobe flash reader. The malware then infects the device, allowing the creator of the virus to gain complete control and access to your webcam and private files without your knowledge.[1,2]
Worst-Case Scenarios
Cassidy Wolf, Miss Teen USA
One of the most famous cases detailing the devastation caused by webcam hacking involves former Miss Teen USA, Cassidy Wolf. In 2012, Cassidy Wolf opened an email that she had received from someone whom she did not know. She was horrified to discover an attachment within the email containing several nude photos of her that were taken in the privacy of her bedroom. The photos were taken via the webcam installed on her computer.
The hacker attempted to blackmail Wolf into engaging in sexual acts with him through her webcam. If she refused, he threatened to share the nude photos with her friends and family.
The hacker turned out to be one of Wolf’s former classmates, Jared James Abrahams, who had installed Blackshades malware onto her laptop. The FBI was able to identify Abrahams who had victimized up to 150 women in his sextortion scheme and was subsequently sentenced to 18 months in federal prison.[3]
This event coincided with an FBI crackdown that led to the arrests of over 100 cybercriminals who created and used Blackshades, an inexpensive and easily utilized remote access tool primarily designed to hack webcams to facilitate sextortion crime. Blackshades was available for a mere $40 and sadly, countless people were victimized by the cybercriminals who maliciously employed it. [3,4]
Ring Cameras
In 2019, a mother installed a Ring security camera in the bedroom of her 8-year-old daughter for extra security. In a disturbing exchange caught on video, the 8-year-old girl walked into her room hearing strange music playing from an unknown source. The music abruptly stopped, and a man’s voice was heard saying “hello there.” This strange man had live video access of the young girl and was able to verbally communicate with her, a feature deliberately programmed into the Ring security camera. The man repeatedly used racial slurs when speaking to the girl and over several minutes, tried to get her to do various things. There have been similar Ring camera hacking incidents in recent years.[5]
Steps to Protect Your Privacy and Boost Cybersecurity
Technology is a powerful tool and with the advent of virtual learning and Zoom conferences as a result of the COVID-19 pandemic, web cameras have become an essential part of our academic and professional lives. Cases of webcam hacking are obviously terrifying, but there are simple steps that you can take to protect yourself and your family from attacks by cybercriminals.
Use Software Updates
Keep up with computer and software update alerts. They often contain patches For Weak Spots (points of entry easily exploited by hackers).
Secure Your WiFi with Password Protection
Once you have installed your router, create a new secure password to deter cybercriminals from being able to easily hack your devices.
Avoid Suspicious Downloads
Hackers can access your devices by getting you to unknowingly install malware, like Trojan viruses, through random links and downloads. Never click on links from websites that require you to download a file or program in order to access their site. Also, avoid downloading attachments and opening links sent via email from people you do not know and trust.
Invest in Security Software
While there are free security software services available, investing in subscription software will provide better cybersecurity. Approach your cybersecurity with the same regard as you do for your home security. Good security software will help protect you by blocking malware that would potentially give hackers access to your devices.
Use Legitimate Tech Support
Be careful of who you allow access to your devices. When IT support is needed, only use trusted and reputable services. Avoid using freelance computer technicians. There have been instances where freelance technicians who were hired to fix devices have instead installed malware onto the client’s computers for nefarious purposes.
Install a Physical Webcam Cover
The most surefire way to ensure that cybercriminals are not spying on you through your device’s camera is to install a physical covering over the lens. When most web cameras are on, a light next to the lens turns on signaling that the camera is in use. However, hackers can disable this light, so relying on that alone is not enough to ensure your privacy. There are products available specifically designed as device camera coverings that attach to your devices right over the camera lens. The covering can be slid open when you want to use your camera and closed when you do not. You can also just simply cover your web camera lens with a post-it note or a piece of opaque tape.
GKIS Screen Safety Toolkit
Our Screen Safety Toolkit is an invaluable resource for providing you and your family with enhanced cybersecurity. Researching digital safety tools can be an overwhelming process. But thankfully, we’ve done the work for you! If you have screen-loving kids or teens, sound parenting strategies are not enough for fostering online safety. You also need smart tech tools for filtering, monitoring, and management. The GKIS Screen Safety Toolkit is a family-tested, outcome-based resource guide with our best recommendations, how-to information, and links to our favorite easy-to-use parental control systems.
GKIS Cyber Security Supplement
Our Cybersecurity & Red Flags Supplement is comprised of three helpful tools in one service. You can protect your family from hacking, scamming, malware, and phishing with our cybersecurity and best practices checklist. Our GKIS online safety red flags for kids & teens provides parents with Dr. Bennett’s clinical teaching list that will help parents educate their kids about red flags to be aware of and alert them to the tricks that are often employed by online predators and other cybercriminals. Additionally, our GKIS online safety red flags for parents will provide parents with Dr. Bennett’s clinical expertise, which she’s developed over 25+ years as a clinical psychologist, in identifying behavioral red flags that may signal your child is suffering from digital injury.
Other helpful GKIS resources
You can find more valuable information regarding screen safety in Dr. Bennett’s parenting guide, Screen Time in the Mean Time. Additionally, you can check out this article How Cybercriminals Steal Sensitive Data to learn more about the potential risks to your cybersecurity so that you can be better equipped to protect yourself and your family.
Thanks to CSUCI intern, Mackenzie Morrow for researching the dangers of webcam hacking as well as cybersecurity measures to prevent it and co-authoring this article.
I’m the mom psychologist who will help you GetKidsInternetSafe.
We know there are dangerous sites on the internet. But most of us have never accessed the dark web, where visitors are anonymous and access to the unthinkable is possible. Recently I visited and discovered that kids and teens easily access it to purchase illegal goods such as fake ids and drugs. Find out what is on the dark web, how easy it is for kids to access it, and what you can do to prevent it in today’s GKIS article. Caution: this article contains graphic descriptions of illegal activities, sex, and violence.
What is the dark web?
The dark web is the part of the internet that is not visible to regular search engines (like Google or Chrome) and requires the use of a special browser named Tor. Once Tor is downloaded and opened, you have arrived at what many call “Onionland.” Tor uses the onion router hidden service protocol, meaning that the Tor servers derived from the onion router offer users complete anonymity. Also, every website ends with .onion instead of .com, .org, or .gov.
The dark web is a criminal underworld where bad actors online sell and purchase illegal goods like drugs, weapons, counterfeit money, bank accounts, passports and ID’s, and much more. Dark web online shops are set up with customer reviews very much like Amazon which gives users the confidence to purchase from specific vendors. There is even a darker side to the dark web which consists of images and videos of gore, pornography, child sexual abuse, bestiality, and even live murder shows called red rooms where paying customers can tell the person torturing the victim what to inflict on the victim next or how they would like to see the victim killed.
Clear Web Versus Deep Web
The clear web is the part of the internet that can be accessed from any browser. It’s the smallest part of the web, which is astonishing because it seems that the content there is infinite but in actuality, it only accounts for about 4% of the content on the web. Some browsers, like Google, will censor certain websites. The search engine used by Tor, Duck Duck Go, does not censor and will not save your search history.
Then there is the deep web which is not to be confused with the dark web. The deep web is the largest part of the web. It consists of all the content that is not indexed and will not appear on regular search engines. Many government and private company websites exist there, where you would need an exact address to access them. Accessing without permission is illegal.
Is it easy to access the Dark Web?
It is very easy to access the dark web. I’ve included the steps here so you can recognize them if you ever come across these searches on your child’s browser.
To access the dark web, all you have to do is:
Purchase a VPN for extra security and anonymity (optional)
Download Tor
Access Hidden Wiki Links
Use the links on Hidden Wiki to help guide you through the dark web
Create an anonymous email
Purchase bitcoin (which is an online currency)
Find an online store through the hidden wiki that carries the products or services you are looking for
Using the hidden wiki as a guide, you can follow the steps above by merely clicking links and it will guide you through. You can easily find the hidden wiki by typing “hidden wiki” on the search bar in the Tor app.
Dark Web Dangers
Fake IDs and Drugs
So, as a GKIS intern, how do I know that teens are accessing the dark web? I became interested when high school students that I worked with all had fake IDs and were getting into L.A. clubs. I asked how they got them, and they told me from the dark web using bitcoin. They also disclosed that they illegally purchase study drugs like Adderall and Modafinil as well as club drugs like cocaine and molly. I was shocked yet intrigued, so I followed these directions on how to get onto the dark web. I couldn’t believe how easy it was to access.
When I brought up my idea about writing about the dark web at our intern meeting, Dr. B worried we’d be publishing a how-to article. But I argued, and the other interns agreed, that there are plenty of YouTube videos showing the step-by-step process of accessing the dark web. Parents need to know about this!
It is mind-boggling how dangerous access to the dark web can be. As if purchasing illegal drugs from anonymous criminal vendors isn’t enough, consider that purity is not guaranteed. Drugs like cocaine and heroin have been known to be laced with fentanyl, an extremely powerful opiate that kills even the most severe addicts. And consider the risks teens take in 21-and-older clubs. Interaction with adults on the dark web can lead to any type of exploitive situation online and offline.
Violence and Pornography
Consider what watching violence and pornographic material can do to a child’s developing brain. For some kids, watching explicit material can lead to stress symptoms characteristic of clinical disorders such as acute stress disorder and PTSD. For others, they may become desensitized to shocking online content which may lead to craving and seeking increasingly dangerous content to experience that same rush. This type of explicit material can have a similar effect as addictive drugs due to the release of dopamine and endorphins.
Dopamine helps the brain recognize incentive salience. Incentive salience is the desiring attribute that includes a motivational component to a rewarding stimulus. In other words, dopamine is released when a reward is anticipated, and it motivates us to keep seeking that anticipated reward.
When shocking material is viewed, the opiate system in our brains begins to activate by releasing endorphins. Endorphins gives a sense of euphoria and eases pain, which is what heroin does. So, more and more shocking material may be craved due to dopamine released from the anticipation of viewing the shocking stimulus – and endorphins help ease the pain that the shocking stimulus caused. Endorphins are also what causes the “runners high” that people talk about after a good amount of cardiovascular exercise. So when we experience pain, endorphins are released to help ease the pain.
Hate Groups
An extremist group discussed in the media recently, the “Proud Boys,” is a group that is known for supporting President Trump and for their extremist chauvinist beliefs. If you search for their website on Google, you will likely not be able to find it. But if you use the search engine Duck Duck Go, it shows up right at the top.
Hate groups design their content to radicalize vulnerable adults and youth to their agenda. There have been many incidences where radical Islamic groups have radicalized western youth to fight for their cause. They do this on the clear web too. But when they need to be more discreet, they can use the deep web by creating a .onion site.
Facebook and other social media sites are on the deep web and their web address is www.facebookcorewwwi.onion. It is important to talk about these issues and set rules with your kids. because if they do not learn it from you they will learn from someone else who may not have the best intentions.
Without parent management tools, like those we recommend in our GKIS Screen Safety Toolkit, kids can spend hours over months interacting with extremists. These interactions can be moved offline and can result in child and teen trafficking as well as other crimes.
How You Can Keep Your Kids Safe From the Dark Web
If your kids have open access to the internet, GetKidsInternetSafe has an entire toolkit to get safety dialed in. Check out our GKIS Course Bundle in the plus and deluxe package options, which offers all of our GKIS courses plus bonuses for families with kids of all ages. Our course bundle option offers parent and teen education, communication tools, parenting tools, and tech tool recommendations. Our course summary page with the details can be found HERE.
Thanks to Andres Thunstrom for contributing to this GKIS article. Andres has been advised to never visit the dark web again. J
I’m the mom psychologist who will help you GetKidsInternetSafe.
Kids are the number one target for identity theft due to the chances that the crime won’t be detected until the child reaches adulthood and seeks their first loan. This cybercrime involves the theft and fraudulent use of a child’s personal information (like name, social security number, address, and date of birth) to open lines of credit, take out loans, or access financial accounts. This scary issue is the drive behind developing our Cybersecurity and Red Flags Supplement, a comprehensive tool to detect online scams before the worst can happen. Find out more about cybercrime and what you can do to prevent it with this GKIS article.
Identity Theft
Identity theft can be used for many types of crimes, including:
taking out a loan
buying lines of credit
accessing the victim’s financial accounts
securing a driver’s license or employment or
seeking medical care.
Personal information can be stolen from virtual sources, like screen devices, websites, and email accounts, or in real life (IRL) from skimming information from your ATM card with a special device or stealing it from your home, wallet, trash, or mail.
Who is vulnerable?
Unsuspecting victims can be tricked into revealing private information by phishing scammers. These cybercriminals impersonate legitimate companies asking for passwords and credit information necessary to process a fake change of address form, application for credit, or to avoid an IRS tax lien or fake criminal charges.
Vulnerable populations include young people, the elderly, and immigrants or workers here on a visa.
Why is it important to check for identity theft?
Once discovered, it may take several costly months or even years to get credit and criminal records cleaned up and sorted out. Your child’s financial options may be blocked or delayed when deadlines, like college and employment, are most critical.
Can you imagine dealing with that in your overtasked, underfunded life? There are companies that offer cyber protective services and others that help you clean up the catastrophic results of cybercrime.
The Child Identity Theft Bill
In 2015, I received a phone call from Assemblymember Jacqui Irwin’s office asking for a statement about a Child Identity Theft bill (AB1553) that she is sponsoring. Asm. Irwin served as Chair of the Assembly Select Committee on Cybersecurity in Sacramento.
This bill served to “amend the Civil Code to require credit agencies to allow parents or guardians to create a new credit report for a minor child for the purpose of placing a security freeze on the child’s credit. Without a credit report to freeze, protection is difficult.” She was asking for my statement and support and wondering if I knew any child victims of identity theft.
After sending out an inquiry on my GetKidsInternetSafe Facebook page, it didn’t take long before I’d uncovered three victims who were willing to share their stories. Two involved child identity theft for financial cybercrime and the other involved identity theft on social media for cyberbullying. I’m sharing the financial theft stories to demonstrate how easy it is to become a victim and suggest steps you can take to protect your kids starting today.
Megan’s Story
My first respondent was a dad whose stepdaughter had recently graduated from nursing school. When the family went to their credit union in preparation for purchasing a car, they discovered that the stepdaughter’s credit report was pages and pages long with a sub-par (mid 5’s) credit rating.
It turned out that a criminal out of Phoenix had fraudulently opened several lines of credit with her social security number. From Sprint to multiple department stores, the crook had charged a debt of over $60,000. The family filed a police report to start the long process of calling creditors and clearing her name.
Although they had the criminal’s address, they elected not to press formal charges. When I spoke to the stepfather, he did not know whether the criminal was ever charged. He also said they never discovered how or when the fraud started, but it seemed to be a single party that may have gotten her personal information when she applied for a loan for nursing school.
The fraud seemed to stop once the credit agencies were notified, and an alert was placed on her account. Ultimately, it took the family over twenty hours of filing time plus another fifteen hours from a private credit fraud service to get her credit repaired. A year after the discovery, they had finally gotten her credit score back to the 700s with letters from the creditors with apologies. Nightmare!
Jose’s Story
The second identity fraud victim shared a truly tragic tale that has spanned over thirty years. Jose, who is 40 years old now, was 13 years old when he was first contacted by the IRS and told that he owed over $10,000 in back taxes. Despite all efforts to get clear of fraud, he still has issues like denied credit (including a first-time home buyer loan because it looked like he already owned properties) to two court-ordered paternity tests for mistaken-identity child support cases.
Jose also shared a story about being pulled over on an arrest warrant while he was on his way to becoming a priest. The officer said if it turned out he was lying about the fraud, he would arrest him and make him apologize directly to his lieutenant. He responded to the police officer that if HE was correct, the officer would have to go to church and apologize directly to his bishop. He laughed when he said the officer lived up to his promise.
Despite his resilient attitude, Jose has had to change phone numbers and bank accounts, can’t pay anything with checks, and has elected to put all property in his wife’s name. Considering the decades of victimization, he has had to endure, he goes to great lengths to protect his children’s personal information.
What can a parent do to avoid child identity theft?
Protect personal information at home with tools such as a locking mailbox, an in-home safe for storage, and a shredder for the disposal of personal documents.
Install cybersecurity safeguards on-screen media like passcodes and screensavers, firewalls, antivirus and encryption software, and secure passwords.
Educate your children about maintaining privacy and using discretion online. That means cautioning them about disclosing their name, address, school, date of birth, or any other personally identifying information in images (t-shirts with their school logo) or texting or posting. Geotagging on photos and social media should be turned off to hide location.
Setup up filtering and monitoring software and parent protection options like those from our Screen Safety Toolkit to block inappropriate contacts on the Internet and monitor your children’s activities, particularly in chat rooms, social media, texting, and instant messaging.
Teach your children about cybersecurity issues and skills to protect against hacking, phishing, and malware. Good habits include consistently downloading updates for security patches, using strong passwords and changing them often, and not clicking on embedded links or opening attachments from unknown sources.
If you are traveling…
Don’t post pictures that can reveal travel data, like boarding passes, passports, or travel or hotel vouchers. Not only can criminals benefit from knowing the details of your trip, but they may also read personal information from barcodes to steal your identity. The best option, wait until you’re home to post travel photos.
Avoid public WiFi. Hackers can access your private information using a man-in-the-middle attack (MITM). This means the criminal intercepts the link between your device and the server. This breach is like eavesdropping and can result in your private information being accessed and even altered. Malware can even be delivered to your device. A MITM attacker may set up a fake access point named similarly to the public network connection (called an “evil twin”) or engage in “packet sniffing” or “sidejacking,” which means using a tool to capture network traffic at the Ethernet frame level. Simple shoulder surfing at coffee shops or on airplanes can also result in privacy breaches. If you have to use public WiFi, practice situational awareness, and verify the WiFi name with staff at the public site. Avoid online tasks that involve private information like online banking or using private transaction information like date of birth, credit card numbers, tax IDs, or social security numbers. Always log out when using a hotspot to avoid the hacker continuing the session. Consider setting up a secure virtual private network (VPN) to encrypt inbound and outbound data. However, VPNs can decrease your bandwidth. Public WiFi may not be encrypted, but most major websites that use a password, like Amazon and PayPal, have encryption. If the URL has an “S” (for “secure”) at the end, as in HTTPS, then there’s some level of encryption.
Avoid using public computers for the same reasons it’s risky to use public WiFi. The software could be silently running in the background, thus capturing data from your online activities.
If your child is traveling with you, turn off location settings so criminals can’t intercept your location data and use it for targeted attacks. On Snapchat, this is called going “ghost mode.” Of course, if your child is on an independent walkabout, you may want to leave location services on so you can track them for safety.
Freeze your child’s credit.
Contact one of the three major credit card companies to see what kind of protection options they offer, like a credit freeze, which has been demonstrated to be one of the most effective strategies for preventing child identity theft. Each state has laws on how a credit freeze can be done. Remember, once a freeze has been implemented you must order a “thaw” on the account before applying for credit.
Equifax: This website explains what is needed to mail in the request. According to the person I spoke to there is no fee for minors.
Experian: This link explains what is needed to mail in the request. After 3 tries I gave up trying to upload the docs online. I couldn’t reach anybody, so I sent in a check for $10 plus 7.25% tax (Ventura County).
Transunion: I had better luck with Transunion when I called the number 888-909-8872. A polite and helpful representative informed me that neither of my minor children had credit files (a good start). He then offered the procedure necessary to get a free security freeze on my child’s account by mailing a letter with the following information:
Send in 2 pages: 1st page: Cover letter listing the minor info: full name, address, last four of social and file # (rep will give you) plus reason for security freeze (“Proactively protecting my child against fraud) plus requester info (parent): Full name, address, relationship. 2nd page: Official request in letter style format mentioning enclosure copy of minor’s social security card and birth certificate.
GetKidsInternetSafe was created to inform parents about proven preventative strategies before tragedy strikes. To get a head start today, check out my GKIS Connected Family Online Course.
Imagine paying someone to body shame you every hour of the day. Shame! Shame! Shame! … Introducing the Fitbit! This device is a constant reminder of just how unfit you are. Many of us resist stepping on that scale, because we really don’t want to know our day-by-day weight. But we are willing to buy a shame generator. Why do we need a Fitbit to tell us that our jeans don’t fit anymore?
What is a Fitbit?
A Fitbit is a small electronic device you wear on your wrist that tracks your daily activity, exercise, food, weight, burned calories, heart rate, and sleep.
A Fitbit syncs wirelessly to your smartphone or computer. Fitbit software then provides customized graphs and charts that show your progress. Each time you reach a milestone, you get an achievement badge notification, which you can share with friends. You can also sync with other Fitbits to have a group challenge. You can taunt, cheer, and message your friends to make it more competitive.
Why do we want a Fitbit?
Fitbits are selling like hot bread on a rainy day. According to the Fitbit reports, 4.5 million devices were sold in the second quarter of 2015. The company expects to gain revenue in the range of $1.6 billion to $1.7 billion for the whole year.
A Fitbit can make us feel like we are finally doing something to improve our health. I have a friend that pesters me to get one. He wants me to be as fit as him, but in reality, I’m in a better shape. Since he bought this device, his self-esteem has shot through the roof. The device sends him daily notifications to let him know how great he is.
The Fitbit is fashionable, and it’s the latest technology in the fitness industry. It comes with different colors to match your clothes and looks like a watch. As we see more people purchasing it, we feel like we need one.
The risks of the Fitbit
Shame generator: Although the Fitbit provides positive inspiration for some users, it creates shame and anxiety in others. It’s intended to incentivize you towards a healthier lifestyle. However for many, instead of feeling rewarded by Fitbit data for a life well-lived, many feel punished instead for not living up to goals and expectations. What happens when you didn’t reach your daily steps or when you did not receive that accomplishment badge you were running for?
For me, the Fitbit is a shame generator. When it grasps on to your wrist, it sends subliminal messages that we may interpret as, “Are you not working out because you are too lazy?” or “Isn’t your friend doing better than you?” Some of us with a more self-deprecating way of thinking will interpret the messages as, “You are not completing your daily goals because you are fat!” Just think about the amount of times you’ve stepped on a scale and made a bad remark about your physique.
And if it’s not enough to shame you real-time on your wrist, Fitbit will also link to your social media accounts. No longer do you need to soak in shame or self-approval alone. The Fitbit’s social media options allow you to announce to friends and family each daily failure or accomplishment. Compulsive fitness wrist checking with a side of compulsive checking for social media likes. Delicious!
Compulsive data tracking: I first decided to write about this topic when Dr. Bennett told the story during our meeting about a friend who bought their 5 and 7 year olds FitBits. She felt that teaching a child to compulsively track data about their bodies sends the wrong fitness message. Good health is more about enjoying activity in the moment rather than chasing data points on graphs.
But the Fitbit is designed to create compulsive use. According to Dr. Bennett, the Fitbit uses randomized “chatter” messages at a variable ratio of reward to keep people locked on Fitbit data in the same way video game developers and other marketers sell their products. A variable ratio of reward means that the consumer gets rewarded at irregular intervals during use. This method is proven to inspire compulsive use. Using a variable ratio of reward on slot machines is how casinos make money. The hope of an occasional payout keeps gamblers gambling even when they are losing their bottom line.
Privacy and data theft: Like other consumer products that make up the Internet of Things, The Fitbit is collected very personal data that is being stored and analyzed by unknown eyes. At first one might think the data is meaningless. However, consider what kind of information that could be extrapolated from your email address, heart rate, weight, sleeping patterns, and exercise patterns, including your GPS history. It’s one thing for a corporate entity to have that kind of personal data, but there have been several malicious hacks to Fitbit users to date. Fitbit says they are working on a more secure system but also admit that staying ahead of hacker attacks is a bit of a cat and mouse game.
I have to admit, even with my knowledge of the risks, I’m still tempted to get one because I think is a remarkable piece of technology. But two things keep me from paying for one, I am cheap and I’m majoring in psychology. This combination makes me feel like the Fitbit is unnecessary and potentially harmful to my privacy and self-concept. I refuse to pay more than a hundred dollars to know how many steps I take. If somebody gifted me the Fitbit, I would kindly accept it. But truthfully I think I’d find myself resenting the compulsion to consume unnecessary fitness data.
How to be fit without a Fitbit
By buying this device your fitness habits are unlikely to change. You need to take initiative. If you know that you need to sleep more, then do it. I believe that we already know how much sleep, food, and physical activity is necessary for optimal health. Why do not need a hundred dollar device to tell us what we already know?
If you buy a Fitbit because you think it will make you lose weight, the truth is you are only buying a trackingThe Fitbit provides data, but you must do the work.
What is the point of keeping track of your steps? Stop stressing about the amount of steps you didn’t walk and instead enjoy the walk real-time by practicing mindfulness exercises. As you walk … observe, listen, and feel your surroundings. Don’t let technology distract you from the real-time rewards of a beautiful walk in the sunshine.
Let the mirror and the fit of your clothing inform you about your progress. Why do you need artificial intelligence to tell you how good you look?
If you want a group challenge, why not plan a date with your friends. Go out and actually interact with them. Taking the time for a fun activity with your friends is far more fun than online competition.
Take control of your life and research what is good for your health. Avoid paying money for something you can get for free.
Most importantly, this device is basically a notebook. Why not get an actual notebook to record your progress? It is more accurate and less expensive.
Remember, SHAME IS LAME. What do you think? Scroll down and leave a comment letting us know if you love your Fitbit for rewarding good fitness or your are building resentment from the shame factor. 🙂 If you want to read more about the Internet of Things, check out Dr. Bennett’s article, “Why I Think Hello Barbie is Not a Smart Toy to Buy.”
Thank you to Cristian Garcia, CSUCI intern, for authoring this awesome GKIS article!
I’m the mom psychologist who will help you GetKidsInternetSafe.