REGION – Criminals have renewed their attack against Medicare beneficiaries. This message is for you, even if you are not receiving Medicare benefits; sharing it with friends and family members on Medicare may save them from being on the losing side of the scam.
AARP Vermont is aware of the return of this scam, first reported in this column in 2020. Victims receive a notification call from Medicare announcing a change in the Medicare identity card to one that includes an RFID chip, similar to the chip that is present on most credit, debit, and ATM cards. The recipient’s caller ID displays the actual telephone number for Medicare: 800-633-4227.
In reality, this is a scam. Medicare is not currently changing the identity card to a “chip card,” and Medicare will not notify you of changes via telephone or email. The same is true of all government agencies. Notice of change comes by USPS letter, the news, and through organizations such as AARP. If you receive this call, do not provide any information or engage in conversation. Comments you make will be recorded and added to other information that has been collected on your identity.
The danger of this scam is that criminal purchases or billing for services might appear on your Medicare coverage statement, including those that require co-payments or deductibles. As the account holder, you are liable for payment unless you are able to prove otherwise.
If you are a scam victim, report the scam by calling Medicare. The agency can replace your Medicare number, issue a new card, and provide protection against fraud committed with the old card.
This situation is an example of “phishing” and identity theft, the most frequently reported scam in the country. Identity theft involves two distinct actions: data breaches and data use. Data breaches are the release of PII, Personally Identifiable Information, by purposeful or accidental action. They occur daily through criminal access to a company data bank or unprotected home computers, interception of email or phone calls, information given to strangers on the phone or via the internet, or personal posts on social media. Equifax, Facebook, Walmart, TJX, Amazon, Microsoft, Rutland Regional Medical Center, IRS, and Stanford University are some examples of where data breaches have occurred. Combine those with the information people willingly provide to callers on criminal web sites or post on social media accounts, and the picture becomes clear. The potential for criminal use of our private information exists and the data breaches reveal that much of our lives and personal information are already accessible.
Since protecting ourselves from identity theft is impossible, we need to turn our attention to preventing and responding to data use.
The first best step is to contact the major credit bureaus and order credit freezes. A credit freeze locks out access to credit reports, which are used to determine risk and credit worthiness. Freezes do not interfere with current activity such as the use of credit cards; they impact new credit or activity. Credit bureaus can be contacted at the following: Equifax, Experian, Innovis, or TransUnion. There is no cost for a credit freeze.
The second step in self-defense is to create or verify online access to all financial accounts including banks, investment firms, and credit cards (Medicare and medical insurance plans as well). Then develop a routine of regularly monitoring your account activity and searching for transactions that are out of place.
Finally, get free copies of your credit reports from www.annualcreditreport.com. This site is sanctioned by the Federal Government and will not barrage you with unwanted advertising. Review the content of the reports for errors or omissions and request corrections if problems are discovered.
Note: You will be asked for personal information when establishing freezes or requesting credit reports. It is safe to respond.
Elliott Greenblott is a retired educator and coordinator of the AARP Vermont Fraud Watch Network. Questions or concerns? Contact firstname.lastname@example.org.