The person conducting the presentation should add their information here and include a short bio.
This page reflects the background of the detective that has implemented the “opt-out” process.
Explain the home page.
Explain that notes of many of the websites we will be discussing can be found at the US Privacy Associates website under the “resources” tab. This is to help keep the training flowing and reduce note taking by the attendee.
Explain that there are two Opt Out packages. One for the General Public and One for “Public Safety Officials.” The difference is verbiage in letters and the PSO book includes agency and rank.
This is what will be covered during the presentation.
This slide is designed to begin instructor/student interaction. Ask the question to the audience and share a story.
The gang area of the presentation can be used for the general public but is very helpful for law enforcement presentations.
This subject talks about the job of killing for a gang.
Gangster related movies that have become popular in our society.
A bullet proof vest customized with gang colors.
Raising the next generation around gang and street violence.
Humor.
Prison/street gang.
More stories about killing police officers.
This video shows how a death threat against an officer was planned. The officer eventually used the Opt Out e-book to protect his home address from Public record.
This slide is a motivational slide to ask the audience a question.
Explain to the audience the importance of having difference signatures. One for only at work. The “Online signature” is for anything placed on line. This includes signatures on documents when purchasing a home. A Non-important signature is usually for services that need a signature on a piece of paper. Usually just scribble.
This autograph is Randy Johnson. On the left is a FREE ballpark signature, on the right is a paid, approx. $350.00, autograph.
The use of a “Privately Owned” mailbox from the UPS Store can be used to look like an apartment complex to data vendors. The UPS store is a private company and tend not to release your personal information without your approval.
The goal is to “Stack” your home address on data vendor reports by using multiple privately owned mailboxes. Once one PO box is added to your data record it moves your true home address down on the list. When you add other P.O. boxes it continues to “Bump” the true home address down and eventually off the data vendor list.
The easiest way to “Stack” an address is by sending friends with “Privately Owned” magazines with your name on them. The magazines sell personal information to various data vendors therefore populating or “stacking” your home address on data vendor reports.
The address on the left is an obvious P.O. Box. The address on the right looks to be an apartment complex. 2903 N. Shoreline, Building 105, Apartment 254.
Everyone uses the P.O. box once it’s in place.
Once the P.O. box is in place I recommend using the online United States Postal Service form to complete a family move to the Privately Owned mailbox.
On this page notice the address. You may have to try entering the address various ways for it to be accepted. For example you may have to leave out the dash.
Notice this will cost one dollar to confirm the family move.
The credit card billing address must match the current or new address to continue with the family move.
This page offers you a chance to request free catalogs to be delivered to the privately owned mailbox. I recommend selecting all of them. When these companies sell your “new home” information it will be the privately owned mailbox that is populated on the data vendor sites.
This slide explains what the customer can expect from the USPS
This slide indicates what mail will be forwarded and for how long.
Tips for drivers license usage.
Tips for home food orders.
E-bay has the ability to track where items are shipped, so does PayPal. This information is available to some data vendors. UPS verifies people and residence via package delivery. If sent to the Privately Owned mailbox that information is what is released. Work mail should be sent to the P.O. box to thwart an unwanted co-worker from locating your home. Make sure insurance companies know the P.O. box is a mailing address and confirm your house is the covered address for the policy. Warranty card information on washers/dryers, computers etc. is used to up sell you or shared with data vendors.
Phone numbers can be tied to an address. Females have told phone companies their last names have changed so if the number is sold or listed people may not locate you via phone number. Always pay to have an unlisted phone number.
MagicJack is great for people with high speed internet. You can select an out of state phone number and set your address to another location.
Good video on the bad’s of VOIP phone’s.
Once a child has a phone in their name chances of them getting offered pre-approved credit rises. The number and their name may now be available in a data vendor list. Once the contract is expired keep the number but change phone carriers. This is known as “porting” a phone. Obtaining subscriber information is much more complicated on a “ported” phone. Start watching for credit mailings in your child’s name. This would indicate a possible compromise in your child’s identity.
When you purchase a cell phone tell the sales rep what name you want appearing on caller ID. If it’s after the sale contact customer service, many can update caller id info.
People who have “smartphones” or a phone that can receive emails can use a service called NowMessage to receive their voice mails as an email.
Be careful when opting out of some online companies. They may not have your email address but may want you to provide one to opt out. Use a non-working email address.
ALL mail should now go to the P.O. Box. It’ doesn’t matter what it is.
The only time you won’t use a PO box on an application is when purchasing a home. The lending company will require the home address be used. This is why you should use a trust fund. The US Code explains it’s a Federal violation to KNOWINGLY make a false statement for the purpose of influencing the action of a Federal Credit Union. Basically, don’t use this training to dodge paying bills.
This is from a Best Buy credit application
The actual law.
Headers are “pulled” from credit applications and applicant information is sold to data vendor companies to update your address for advertisement targeting. When you list a relative on a credit application, the credit companies continue to build a “Family Tree” of relatives around you. Ask if you may list a friend to be contacted.
Example of a family flow chart.
Contact numbers for the 3 credit bureaus.
A sample letter to initiate a credit freeze. It’s better to use the online service but letters and instructions are included in the Opt Out e-book.
Don’t provide home information to the listed locations unless using the privately owned mailbox.
Various online search companies
How zabasearch works. Search for Bobby Oxford in Illinois.
Name, home address, map and recorded date listed.
Sign up for ZabaSphere to know when people search your name.
If zabasearch refuses to remove personal information after sending a letter they do offer an online opt-out for 20.00 for two and a half years.
ZabaSearch is linked to Intelius. Their opt out info is in the privacy package.
Here is what Intelius request’s to opt out. I recommend calling them and telling them you have faxed proof and your info is still listed. Some operators remove it while you’re on the phone.
A list of the data vendors that require a letter be sent to opt out of their online data list.
Sample letter
Explain the DMA.org., optoutprescreen and privacy rights.org
This ties all the prior slides and information together. The WHY’s of what we provide.
Explain this is what a data vendor report contains. Point out that all of the information contained is what is needed to commit an identity theft.
Point out the address history and the reason for the PO boxes is to “Stack” the current address and historical address off this report.
Point out all of the available personal information. Note the family members are in blue links for more information and the Mothers maiden name is listed as well.
Tips for the recorders office.
Open Records video.
Open Records video.
Open Records video.
Trust fund information.
**Don’t use your name as the trust** Stress the importance of using a code name, family pets name,
The pictures here show Bret Michaels from the rock band Poison used the “Bret Michaels trust fund of 1993.” His information would have been harder to locate if he would have used something other than his name. Also not the direction of the “T” crossing in the autograph versus the legal signature.
Covering the use of magazines. Remember the magazine mailing address will be sold to data vendors to target you with advertisements.
Basic online safety.
Wireless safety
Wireless safety.
Wireless safety.
Continued thought and motivation slide to audience.
A person tears up a pre-approved credit offer.
Tapes it back together and completes the application process.
The credit card is issued.
Funny class break
The basic tips for prevention of ID theft.
Basic ID Theft tips.
Skimmer video.
Debit card pin #: Encourage people not to use debit at point of sale since they aren’t as protected as using a credit charge. Tell people to place a bogus pin number on the back of their debit card. If lost or stolen and the card is used in a debit machine that takes the card in, after 3 incorrect attempts with the bad pin # the card is removed from circulation. RFID is Radio Frequency Identification: RFID is a small chip with an antenna that emits personal information from credit cards to passport ID’s to card readers that convert the information into readable data.
Make sure people know about free child identification cards available online.