Although advice on how to address financial-oriented identity theft is common, for softer forms of identity theft, like social media account hijacking, there seem to be fewer resources available to victims. In this post, we explain various forms of online identity theft, how they affect you and how you can protect yourself from them. What is the scope of cyber identity theft?
Register official unit and senior leader accounts at the U. Army Social Media Directory. Ensure privacy settings on all professional and personal accounts are set to the maximum.
Impersonations The practice of impersonating Soldiers for financial gain is common. When impostor accounts are identified, it is important to report the accounts to the host platforms.
Identifying an impostor If you suspect you have identified an impostor account, you should confirm the account is not registered on the U.
It is important to know the warning signs of a scam or the common identifiers associated with an impostor account. The account has very few photos. The photos are posted in the same date range.
The account has few followers or comments. The account name and photos do not match. There are obvious grammatical errors. Key information is missing.
Official accounts will not send friend requests. If you receive a request from an account claiming to be a senior leader, report it.
Remember, anyone in the U. Army Family is vulnerable. Reporting impostors Soldiers, especially leaders, are prime targets for identity thieves who will use images posted online to create the fake accounts.
Most social media platforms have a reporting system that allows users to report an individual who is pretending to be someone else.