SlideShare a Scribd company logo
1 of 10
Cable Services Dirty Little Secret
 Unlike true identity theft, this scam involves
cable company employees.
 Victims of this scam usually have existing
cable services or have applied for new
services (online or in-store).
 Like most scams, this one is driven by greed.
 It’s unclear the extent corporate
management may know about Cable Flipping
as the scam is blended into the process of
fixing real Identity Theft.
 You contact the cable service for an upgrade
or to fix an existing cable box issue
 Cable employees greedy for larger
commissions actually create a new account
with your new services.
 They re-assign your previous account number
with all your billing information to a empty
home or random address in another part of
town or different state.
 Bills for the former debt are now going to a
bad address
 Eventually the unpaid delinquent account is
turned over to a collection agency.
 The agency has all your contact information
from the contract.
 They accuse you of not paying your bill etc.
 Even if you prove you have an existing
account they still call and attempt to
collect.
 The collection agency then requires the
following;
 A police report listing yourself and them (cable
svs) as victims of identity theft.
 They also require you complete an Identity Theft
Victim’s Complaint and Affidavit, also listing
yourself and them(cable svs) as victims of
identity theft.
 A copy of your Drivers License and something
with your SSN listed.
 The employees get a large commission with
new service rather than a simple upgrade.
 The cable company reports the loss for
either a tax write off or insurance claim
 If you don’t follow their directions, they can
ruin your good credit until you do.
 You rarely if at all will see a cable service
report to one of the Three National Credit
Bureaus.
 The Collection Agency they use, will report
you.
 If you suspect your existing cable service may
have scammed you, contact your local police
department and provide your concerns.
 Try to locate a previous bill. Check the account
number. Is it different?
 Limit what you write in the original FTC/Police
report, for example:
“My identity may have been used or manipulated
to obtain cable services without my consent”
“I believe my existing cable service may have used
my identity to create a separate service without
my consent. They require I submit this statement”
 Federal Trade Commission
 The Better Business Bureau
 Consumer Financial Protection Bureau
 www.AnnualCreditReport.com
 Request the cable company turn over the
address and information that was used to law
enforcement.
 If necessary request local law enforcement to
require the cable company to provide the
application re: FACTA 609.e Disclosures to
Consumers
 ‘Businesses shall provide a copy of application and
business transaction records in the control of the
business entity’
 This will confirm if the account was established
Internally or Externally
 Cable Flipping is an industry wide problem, not
limited to specific states.
Compiled and designed by Mark Fullbright , Certified Identity
Theft Risk Management Specialist™ (CITRMS) as a free service for
consumers to protect themselves from business scams.
Stay Safe, Stay Secure

More Related Content

What's hot

Department of Defense Publishes Proposed Rule on Counterfeit Electronics
Department of Defense Publishes Proposed Rule on Counterfeit ElectronicsDepartment of Defense Publishes Proposed Rule on Counterfeit Electronics
Department of Defense Publishes Proposed Rule on Counterfeit ElectronicsPatton Boggs LLP
 
Vodafone complaint response
Vodafone complaint responseVodafone complaint response
Vodafone complaint responsePaul Brzeski
 
Vodafone complaint letter
Vodafone complaint letterVodafone complaint letter
Vodafone complaint letterPaul Brzeski
 
Key California 2009 Insurance Bills
Key California 2009 Insurance BillsKey California 2009 Insurance Bills
Key California 2009 Insurance BillsKenCooley
 
Fortify legal pty ltd presentation
Fortify legal pty ltd presentationFortify legal pty ltd presentation
Fortify legal pty ltd presentationscottishclans
 
Official Complaint Form Final Puc
Official Complaint Form Final PucOfficial Complaint Form Final Puc
Official Complaint Form Final PucRob WFlag
 

What's hot (7)

Department of Defense Publishes Proposed Rule on Counterfeit Electronics
Department of Defense Publishes Proposed Rule on Counterfeit ElectronicsDepartment of Defense Publishes Proposed Rule on Counterfeit Electronics
Department of Defense Publishes Proposed Rule on Counterfeit Electronics
 
Vodafone complaint response
Vodafone complaint responseVodafone complaint response
Vodafone complaint response
 
Vodafone complaint letter
Vodafone complaint letterVodafone complaint letter
Vodafone complaint letter
 
AM LAW FIRM
AM LAW FIRMAM LAW FIRM
AM LAW FIRM
 
Key California 2009 Insurance Bills
Key California 2009 Insurance BillsKey California 2009 Insurance Bills
Key California 2009 Insurance Bills
 
Fortify legal pty ltd presentation
Fortify legal pty ltd presentationFortify legal pty ltd presentation
Fortify legal pty ltd presentation
 
Official Complaint Form Final Puc
Official Complaint Form Final PucOfficial Complaint Form Final Puc
Official Complaint Form Final Puc
 

Viewers also liked

Preventing Deceased Identity Theft
Preventing Deceased Identity TheftPreventing Deceased Identity Theft
Preventing Deceased Identity Theft- Mark - Fullbright
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent ChargebacksSmall Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent Chargebacks- Mark - Fullbright
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps - Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Viewers also liked (7)

Business Identity Theft
Business Identity TheftBusiness Identity Theft
Business Identity Theft
 
KNOW YOUR RIGHTS
KNOW YOUR RIGHTSKNOW YOUR RIGHTS
KNOW YOUR RIGHTS
 
Preventing Deceased Identity Theft
Preventing Deceased Identity TheftPreventing Deceased Identity Theft
Preventing Deceased Identity Theft
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent ChargebacksSmall Businesses: Tips to Avoiding Fraudulent Chargebacks
Small Businesses: Tips to Avoiding Fraudulent Chargebacks
 
Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps Identity Theft - Proactive / Reactive First Steps
Identity Theft - Proactive / Reactive First Steps
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

Similar to Cable Flipping

How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SINEmilyMoar
 
Legal Credit Repair Services
Legal Credit Repair ServicesLegal Credit Repair Services
Legal Credit Repair Serviceslegal2
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims - Mark - Fullbright
 
What You Should Know About Your Credit Report
What You Should Know About Your Credit ReportWhat You Should Know About Your Credit Report
What You Should Know About Your Credit Report- Mark - Fullbright
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRon Drew
 
Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates- Mark - Fullbright
 
Your rights-under-the-fcra
Your rights-under-the-fcraYour rights-under-the-fcra
Your rights-under-the-fcraResolvly LLC
 
When Debt Collectors Call
When Debt Collectors CallWhen Debt Collectors Call
When Debt Collectors CallFairfax County
 
How Do I Replace The Compromised Current Credit Card With My New Card.pdf
How Do I Replace The Compromised Current Credit Card With My New Card.pdfHow Do I Replace The Compromised Current Credit Card With My New Card.pdf
How Do I Replace The Compromised Current Credit Card With My New Card.pdfDecs- We kill Debt
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do listSandy Kleinhenz
 
Advisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesAdvisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesRyan Renicker CFA
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca- Mark - Fullbright
 

Similar to Cable Flipping (20)

How to Protect your SIN
How to Protect your SINHow to Protect your SIN
How to Protect your SIN
 
Legal Credit Repair Services
Legal Credit Repair ServicesLegal Credit Repair Services
Legal Credit Repair Services
 
Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims Statement of Rights for Identity Theft Victims
Statement of Rights for Identity Theft Victims
 
What You Should Know About Your Credit Report
What You Should Know About Your Credit ReportWhat You Should Know About Your Credit Report
What You Should Know About Your Credit Report
 
RDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to DoRDrew Identity Theft -- What to Do
RDrew Identity Theft -- What to Do
 
Check Your Credit Report
Check Your Credit ReportCheck Your Credit Report
Check Your Credit Report
 
Training for Bank Employees
Training for Bank EmployeesTraining for Bank Employees
Training for Bank Employees
 
Training for Child Court Appointed Advocates
Training for Child Court Appointed AdvocatesTraining for Child Court Appointed Advocates
Training for Child Court Appointed Advocates
 
Your rights-under-the-fcra
Your rights-under-the-fcraYour rights-under-the-fcra
Your rights-under-the-fcra
 
When Debt Collectors Call
When Debt Collectors CallWhen Debt Collectors Call
When Debt Collectors Call
 
How Do I Replace The Compromised Current Credit Card With My New Card.pdf
How Do I Replace The Compromised Current Credit Card With My New Card.pdfHow Do I Replace The Compromised Current Credit Card With My New Card.pdf
How Do I Replace The Compromised Current Credit Card With My New Card.pdf
 
Building a Better Credit Report
Building a Better Credit ReportBuilding a Better Credit Report
Building a Better Credit Report
 
Identity theft to do list
Identity theft to do listIdentity theft to do list
Identity theft to do list
 
BBB Market Monitor: August 2018
BBB Market Monitor: August 2018BBB Market Monitor: August 2018
BBB Market Monitor: August 2018
 
Advisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud SchemesAdvisory to Financial Institutions on E-Mail Compromise Fraud Schemes
Advisory to Financial Institutions on E-Mail Compromise Fraud Schemes
 
DONCEAP - May - About Identity Theft
DONCEAP - May - About Identity TheftDONCEAP - May - About Identity Theft
DONCEAP - May - About Identity Theft
 
Dealing With ID Theft
Dealing With ID TheftDealing With ID Theft
Dealing With ID Theft
 
Seven Common Scams That Target Businesses
Seven Common Scams That Target BusinessesSeven Common Scams That Target Businesses
Seven Common Scams That Target Businesses
 
Special Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - caSpecial Report for Retail Businesses on IDENTITY THEFT - ca
Special Report for Retail Businesses on IDENTITY THEFT - ca
 
Identity Theft
Identity TheftIdentity Theft
Identity Theft
 

More from - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 

More from - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
DATA BREACH CHARTS
DATA BREACH CHARTSDATA BREACH CHARTS
DATA BREACH CHARTS
 

Recently uploaded

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 

Recently uploaded (20)

Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Cable Flipping

  • 1. Cable Services Dirty Little Secret
  • 2.  Unlike true identity theft, this scam involves cable company employees.  Victims of this scam usually have existing cable services or have applied for new services (online or in-store).  Like most scams, this one is driven by greed.  It’s unclear the extent corporate management may know about Cable Flipping as the scam is blended into the process of fixing real Identity Theft.
  • 3.  You contact the cable service for an upgrade or to fix an existing cable box issue  Cable employees greedy for larger commissions actually create a new account with your new services.  They re-assign your previous account number with all your billing information to a empty home or random address in another part of town or different state.
  • 4.  Bills for the former debt are now going to a bad address  Eventually the unpaid delinquent account is turned over to a collection agency.  The agency has all your contact information from the contract.  They accuse you of not paying your bill etc.  Even if you prove you have an existing account they still call and attempt to collect.
  • 5.  The collection agency then requires the following;  A police report listing yourself and them (cable svs) as victims of identity theft.  They also require you complete an Identity Theft Victim’s Complaint and Affidavit, also listing yourself and them(cable svs) as victims of identity theft.  A copy of your Drivers License and something with your SSN listed.
  • 6.  The employees get a large commission with new service rather than a simple upgrade.  The cable company reports the loss for either a tax write off or insurance claim  If you don’t follow their directions, they can ruin your good credit until you do.  You rarely if at all will see a cable service report to one of the Three National Credit Bureaus.  The Collection Agency they use, will report you.
  • 7.  If you suspect your existing cable service may have scammed you, contact your local police department and provide your concerns.  Try to locate a previous bill. Check the account number. Is it different?  Limit what you write in the original FTC/Police report, for example: “My identity may have been used or manipulated to obtain cable services without my consent” “I believe my existing cable service may have used my identity to create a separate service without my consent. They require I submit this statement”
  • 8.  Federal Trade Commission  The Better Business Bureau  Consumer Financial Protection Bureau  www.AnnualCreditReport.com
  • 9.  Request the cable company turn over the address and information that was used to law enforcement.  If necessary request local law enforcement to require the cable company to provide the application re: FACTA 609.e Disclosures to Consumers  ‘Businesses shall provide a copy of application and business transaction records in the control of the business entity’  This will confirm if the account was established Internally or Externally  Cable Flipping is an industry wide problem, not limited to specific states.
  • 10. Compiled and designed by Mark Fullbright , Certified Identity Theft Risk Management Specialist™ (CITRMS) as a free service for consumers to protect themselves from business scams. Stay Safe, Stay Secure