{"id":23181,"date":"2020-05-04T10:10:55","date_gmt":"2020-05-04T18:10:55","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=23181"},"modified":"2022-04-13T12:25:02","modified_gmt":"2022-04-13T20:25:02","slug":"identity-theft-protection-how-to-know-if-your-identity-has-been-stolen","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/","title":{"rendered":"What Everyone Should Know about Identity Theft and Protection"},"content":{"rendered":"\n<p>If you caught someone nonchalantly copying all of the details from your checkbook, from the account number to your transaction history, you\u2019d be outraged (and rightly so).&nbsp; There\u2019s no legitimate reason for someone to do that, so the person\u2019s motives would obviously be suspect.&nbsp;<\/p>\n\n\n\n<p>Unfortunately, life is not that simple anymore.&nbsp; Much of your life (including banking) takes place online, which means that you\u2019re leaving behind a digital footprint of your personal activity, including financial details.&nbsp; If any of that personal information should fall into the wrong hands \u2014 even something as innocuous as your login credentials for an utterly non-essential site \u2014 the effect could be surprisingly disruptive to you.<br><br>Identity theft at its simplest level occurs when someone acquires a meaningful portion of your personal data, and uses it for his or her own gain, or to your detriment.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Identity Theft Happens, and What Happens Next&nbsp;<\/h2>\n\n\n\n<p>Your personal information can fall into the wrong hands in any number of ways.&nbsp; The really high-profile, headline-grabbing cases involve breaches of major sites or retailers (as happened with Experian and Target), which compromised millions of users\u2019 personal information. Aside from those \u201chome runs\u201d of hacking, a lot of your <a href=\"https:\/\/www.malwarebytes.com\/identity-theft\/\">ordinary activities<\/a> \u2013 visiting the wrong websites or installing shady apps \u2013 can infect your devices with spyware or keyloggers, and <a href=\"https:\/\/www.spokeo.com\/compass\/whos-emailing-me\/\">p<\/a>hishing attacks do the same by sending you malicious links in emails, texts and social media messages. &nbsp; <a href=\"https:\/\/www.spokeo.com\/compass\/internet-safety-how-to-prevent-hacking-on-home-network\/\">Vulnerable Wi-Fi networks<\/a> and hotspots are another fruitful source of targets for scammers.&nbsp;&nbsp;<\/p>\n\n\n\n<p>However criminals get your information, there are two ways they can exploit it. One is to use it fraudulently themselves, to acquire credit, merchandise or less-obvious things like your tax refund or medical coverage under your name.&nbsp; They may even use your identity to commit, or conceal, crimes.&nbsp;<\/p>\n\n\n\n<p>Almost invariably, whether they use it first or not, they\u2019ll also turn to a second source of profit from your information: selling it on the \u201c<a href=\"https:\/\/www.spokeo.com\/compass\/how-to-find-out-if-your-information-is-on-the-dark-web-and-what-to-do\/\">dark web<\/a>.\u201d<\/p>\n\n\n\n<p>Once your information hits the dark web, criminals can buy it \u2013 and that of hundreds of thousands of people like you \u2013 for pennies on the dollar, then use automated software to raid your accounts.&nbsp; At that kind of scale, even a small amount from each account adds up quickly.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Signs Your Identity Has Been Stolen<\/h2>\n\n\n\n<p>The dark web is an essential source of profit for the criminal community but how will you know if you\u2019re the victim of identity theft?&nbsp; The Federal Trade Commission has compiled a <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/0271-warning-signs-identity-theft\">useful list<\/a> of some of the most common \u201cred flags.\u201d&nbsp;<\/p>\n\n\n\n<p>These include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Unexplained withdrawals from your accounts, or unfamiliar charges on your credit cards<\/li><li>Merchants suddenly refusing your checks<\/li><li>Surprise medical bills for services you haven\u2019t used<\/li><li>An insurer refusing you over a condition you don\u2019t have<\/li><li>The IRS telling you more than one return was filed in your name<\/li><li>Debt collectors calling about debts that aren\u2019t yours.&nbsp;<\/li><\/ul>\n\n\n\n<p>These are just a handful of the most obvious signs, and of course there are many others.&nbsp; <em>Any<\/em> unexplained changes in your credit report, or charges or withdrawals on any of your accounts, should ring a warning bell.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Monitor Your Identity Proactively<\/h2>\n\n\n\n<p>Dark web monitoring provides your earliest and best warning against identity theft and helps break the cycle before it gets started.&nbsp; This type of service sniffs out identity theft at one of its few points of vulnerability: those marketplaces on the dark web where buyers and sellers meet to exploit personal information for commercial gain.&nbsp; It\u2019s a shady corner of the internet where users are anonymous, sites appear and disappear without warning, and criminals abound. At some point buyers and sellers have to make a connection, and when they do your information becomes visible and detectable.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Best Practices for Identity Theft Prevention<\/h2>\n\n\n\n<p>Proverbially, an ounce of prevention is better than a pound of cure.&nbsp; That\u2019s especially valid in the case of identity theft, where the \u201ccure\u201d involves you spending months of your time, and potentially a <em>lot<\/em> of money, restoring your credit and your good name. There are several ways you can limit your vulnerability to identity theft.&nbsp;&nbsp;<\/p>\n\n\n\n<p>A good starting point is to simply avoid reusing the same <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-remember-passwords\/\">usernames and passwords<\/a> across multiple sites. This all-too-common practice means scammers can simply have a program try these passwords on millions of other sites (it\u2019s called \u201ccredential-stuffing\u201d) and find where else they work. These additional sites yield more information, which can also then be resold at a profit on the dark web.&nbsp;<\/p>\n\n\n\n<p>Don\u2019t visit shady sites or install dubious apps, and \u2014 above all \u2014 <a href=\"https:\/\/www.spokeo.com\/compass\/what-is-email-spoofing-learn-how-to-protect-yourself\/\">don\u2019t click random links<\/a> when they show up in your messages or emails.&nbsp; Install security apps on your mobile devices, so you can track, lock or erase them if they go missing.&nbsp; You might even consider <a href=\"https:\/\/www.spokeo.com\/compass\/will-using-a-vpn-improve-your-internet-security\/\">using a VPN<\/a> to protect yourself online.&nbsp;<\/p>\n\n\n\n<p>Offline security works in much the same way.&nbsp; Buy a cross-cut shredder, and use it before you discard bills, bank statements or any other documents that contain personally identifying information.&nbsp; Where possible, get e-statements instead of paper ones.&nbsp; If you live in an area with outdoor mailboxes, consider renting an inexpensive P.O. box to receive physical mail.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What to Do if You Are a Victim of Identity Theft<\/h2>\n\n\n\n<p>When identity monitoring shows that your information has been captured and sold, act fast.&nbsp; You\u2019re entitled to one free credit check per year from each of the three main credit reporting agencies, Experian, Equifax and TransUnion, so take advantage of this service.&nbsp; Make a note of any questionable or fraudulent activity, and then go to the federal <a href=\"https:\/\/www.identitytheft.gov\/\">IdentityTheft.gov<\/a> website to file a report.<br><br>The site will help you craft a recovery plan to thwart the scammers as much as possible, and minimize the impact on your life, finances and reputation.&nbsp; Some common steps include:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Filing a police report and fraud affidavit<\/li><li>Contacting creditors, and speaking to their fraud departments.&nbsp; If your credit report shows new, fraudulent applications, speak to the \u201cnew applications\u201d department, as well, to have those nipped in the bud.<\/li><li>Obtaining letters from your creditors affirming that the fraudulent charges have been wiped from your account<\/li><li>Placing an \u201c<a href=\"https:\/\/www.consumer.ftc.gov\/articles\/0279-extended-fraud-alerts-and-credit-freezes\">extended fraud alert<\/a>\u201d on your credit file.<\/li><\/ul>\n\n\n\n<p>Once it\u2019s out \u201cin the wild,\u201d your information can and will be passed around for years, and problems can recur at any time.&nbsp; An extended fraud alert tells financial services to actively verify your information before granting new credit, for a full seven years.&nbsp; It also allows you two free credit reports each year instead of one, and bars you from (easily misappropriated) pre-approved credit offers for five years, unless you request otherwise.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Bottom Line<\/h2>\n\n\n\n<p>While there are measures you can take to proactively deter identity theft, the unfortunate reality is that there is no silver bullet. Along with some of the measures we\u2019ve discussed, it\u2019s important to bolster your security with a trusted partner who will be your eyes and ears on the dark web.<\/p>\n\n\n\n<p>The first step in a rigorous identity protection is searching the entire Web, including the dark web, to see if your personal information has been compromised.&nbsp; Since most law-abiding people don\u2019t know how to access the dark web, let Spokeo be your partner in searching and monitoring the dark web.&nbsp;<\/p>\n\n\n\n<p>We are gradually rolling out the new features of our identity protection service in phases to target exactly this type of criminal activity on the dark web.&nbsp; As part of your Spokeo membership, the first phase will allow you to set up monitoring alerts in your <a href=\"https:\/\/www.spokeo.com\/user\">user dashboard<\/a> for personal and financial data, including email addresses, phone numbers, bank accounts and credit cards.&nbsp; Armed with that knowledge, you can move quickly to alert your banks, insurers or credit providers that you and they are at risk of potential fraud.<\/p>\n\n\n\n<p>Spokeo can alert you that your identity is at risk, helping you minimize the costs and time involved in protecting your identity from fraud before too much damage is done. You\u2019ll even have access to Certified Identity Resolution Specialists who can help guide you through the recovery process.&nbsp; <a href=\"https:\/\/www.spokeo.com\/contact\">Contact us today<\/a> to learn more about our Identity Protection services.&nbsp;&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">References:<\/h3>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/entechus.com\/anatomy-of-a-data-breach-what-we-learned-from-target\/\">https:\/\/entechus.com\/anatomy-of-a-data-breach-what-we-learned-from-target\/<\/a><\/li><li><a href=\"https:\/\/www.wired.com\/story\/wired-guide-to-data-breaches\/\">https:\/\/www.wired.com\/story\/wired-guide-to-data-breaches\/<\/a><\/li><li><a href=\"https:\/\/www.malwarebytes.com\/identity-theft\/\">https:\/\/www.malwarebytes.com\/identity-theft\/<\/a><\/li><li><a href=\"https:\/\/www.csoonline.com\/article\/3249765\/what-is-the-dark-web-how-to-access-it-and-what-youll-find.htmlhttps:\/\/www.investopedia.com\/insights\/what-dark-net\/\">https:\/\/www.csoonline.com\/article\/3249765\/what-is-the-dark-web-how-to-access-it-and-what-youll-find.htmlhttps:\/\/www.investopedia.com\/insights\/what-dark-net\/<\/a><\/li><li><a href=\"https:\/\/www.consumer.ftc.gov\/articles\/0271-warning-signs-identity-theft\">https:\/\/www.consumer.ftc.gov\/articles\/0271-warning-signs-identity-theft<\/a><\/li><li><a href=\"https:\/\/www.experian.com\/blogs\/ask-experian\/what-is-identity-theft\/\">https:\/\/www.experian.com\/blogs\/ask-experian\/what-is-identity-theft\/<\/a><\/li><li><a href=\"https:\/\/www.nbcnews.com\/storyline\/smart-facts\/identity-theft-facts-risks-what-consumers-can-do-n859011\">https:\/\/www.nbcnews.com\/storyline\/smart-facts\/identity-theft-facts-risks-what-consumers-can-do-n859011<\/a><\/li><li><a href=\"https:\/\/www.consumer.ftc.gov\/articles\/0271-warning-signs-identity-theft\">https:\/\/www.consumer.ftc.gov\/articles\/0271-warning-signs-identity-theft<\/a><\/li><li><a href=\"https:\/\/www.equifax.com\/personal\/education\/identity-theft\/types-of-identity-theft\/\">https:\/\/www.equifax.com\/personal\/education\/identity-theft\/types-of-identity-theft\/<\/a><\/li><li><a href=\"https:\/\/money.usnews.com\/money\/personal-finance\/family-finance\/articles\/things-to-do-after-your-identity-is-stolen\">https:\/\/money.usnews.com\/money\/personal-finance\/family-finance\/articles\/things-to-do-after-your-identity-is-stolen<\/a><\/li><li><a href=\"https:\/\/www.investopedia.com\/insights\/identity-theft-who-to-call-for-help\/\">https:\/\/www.investopedia.com\/insights\/identity-theft-who-to-call-for-help\/<\/a><\/li><li><a href=\"https:\/\/www.usa.gov\/identity-theft\">https:\/\/www.usa.gov\/identity-theft<\/a><\/li><li><a href=\"https:\/\/www.malwarebytes.com\/identity-theft\/\">https:\/\/www.malwarebytes.com\/identity-theft\/<\/a><\/li><\/ul>\n","protected":false},"excerpt":{"rendered":"<p>If you caught someone nonchalantly copying all of the details from your checkbook, from the account number to your transaction history, you\u2019d be outraged (and rightly so).&nbsp; There\u2019s no legitimate&hellip;<\/p>\n","protected":false},"author":112,"featured_media":23528,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[614],"tags":[592],"class_list":["post-23181","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-safety","tag-recruiting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Everyone Should Know about Identity Theft and Protection - The Compass Blog | Digital Identity and People Search | Spokeo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Everyone Should Know about Identity Theft and Protection - The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"og:description\" content=\"If you caught someone nonchalantly copying all of the details from your checkbook, from the account number to your transaction history, you\u2019d be outraged (and rightly so).&nbsp; There\u2019s no legitimate&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-04T18:10:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-13T20:25:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/WhatEveryoneShouldKnowAboutIdentityTheft_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"411\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/\",\"name\":\"What Everyone Should Know about Identity Theft and Protection - The Compass Blog | Digital Identity and People Search | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/WhatEveryoneShouldKnowAboutIdentityTheft_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1\",\"datePublished\":\"2020-05-04T18:10:55+00:00\",\"dateModified\":\"2022-04-13T20:25:02+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/WhatEveryoneShouldKnowAboutIdentityTheft_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/WhatEveryoneShouldKnowAboutIdentityTheft_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1\",\"width\":800,\"height\":411},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Everyone Should Know about Identity Theft and Protection - The Compass Blog | Digital Identity and People Search | Spokeo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/","og_locale":"en_US","og_type":"article","og_title":"What Everyone Should Know about Identity Theft and Protection - The Compass Blog | Digital Identity and People Search | Spokeo","og_description":"If you caught someone nonchalantly copying all of the details from your checkbook, from the account number to your transaction history, you\u2019d be outraged (and rightly so).&nbsp; There\u2019s no legitimate&hellip;","og_url":"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2020-05-04T18:10:55+00:00","article_modified_time":"2022-04-13T20:25:02+00:00","og_image":[{"width":800,"height":411,"url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/WhatEveryoneShouldKnowAboutIdentityTheft_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/","url":"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/","name":"What Everyone Should Know about Identity Theft and Protection - The Compass Blog | Digital Identity and People Search | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/WhatEveryoneShouldKnowAboutIdentityTheft_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1","datePublished":"2020-05-04T18:10:55+00:00","dateModified":"2022-04-13T20:25:02+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/identity-theft-protection-how-to-know-if-your-identity-has-been-stolen\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/WhatEveryoneShouldKnowAboutIdentityTheft_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/WhatEveryoneShouldKnowAboutIdentityTheft_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1","width":800,"height":411},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/WhatEveryoneShouldKnowAboutIdentityTheft_2260x1160-1-scaled.jpg?fit=800%2C411&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-61T","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/23181","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=23181"}],"version-history":[{"count":1,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/23181\/revisions"}],"predecessor-version":[{"id":23254,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/23181\/revisions\/23254"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/23528"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=23181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=23181"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=23181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}