Tip #22: Do not share personal information on social networks. Before you register with websites, make sure you read the privacy policies that secure your personal information. Unlike the common stereotype, identity thieves do not always monitor or hack your digital devices from a third world country; the majority of thieves are usually neighbors, friends, relatives and roommates because you leave yourself open to them.
Experts can help you read the document and attend to the temporal pronouns and verb tenses used, which are the primary components in an argument. They can help expose what to avoid and what is dangerously revealing. You don't need to lie in a court document to win a case, or misconstrue the meaning behind a script--just state what you want to say in a specific way.
Since our methods to identify fraud continue to improve, so do the ways of fraudsters to outwit fraud detection. In recent years, fraud examiners and crime fighters look at the dates, times, verbiage and content provided in new communication mediums, such as through emails, letters, texts and phone calls.
If a document does not come from a law enforcement agent and given to you personally, call and ask if the individual who sent you that document exists. If you have a gut feeling that a situation is either too good or too impossible to be true, research what you have, analyze what you hold in your hands, compare and contrast dates, times, faces, words and signatures--chances are that you are the victim of a fraud scheme.
We live in the 21st century, where identities and personal information are a more powerful source of monetary exchange than money. How many of you out there know who your spouse or best friend is: how many names they use, what information they have about you, and how easily they can manipulate it? How many of you were ever in such a vulnerable position as to trust someone enough to find yourselves sleeping with the enemy?