I logged in to my online account, changed the password, and added an extra security PIN recommended by the fraud department.
I then logged on to the Federal Trade Commission’s website to report the theft and learn how to protect myself. It includes step-by-step instructions and sample letters to guide victims through the recovery process.
He brings to his coaching and writing the latest and best practices in personal growth, communication, technology, sexuality, masculine/feminine dynamics and spirituality.
So I put another “coin” the in meter of the relationship by sending a quick text check-in and hope that the other person doesn’t come back with anything more than “I’m good. The words we use make up just seven percent of what is communicated.
A few weeks ago an unknown person walked into a mobile phone store, claimed to be me, asked to upgrade my mobile phones, and walked out with two brand new i Phones assigned to my telephone numbers.
My phones immediately stopped receiving calls, and I was left with a large bill and the anxiety and fear of financial injury that spring from identity theft.
A store employee explained that a thief claiming to be me had gone into a phone store and “upgraded” my two phones to the most expensive i Phone models available and transferred my phone numbers to the new i Phones.
I called my mobile carrier’s fraud department and reported what happened.
This post describes my experiences as a victim of ID theft, explains the growing problem of phone account hijacking, and suggests ways consumers and mobile phone carriers can help combat these scams.