Search
5

Current Media Releases and Blog Posts...

Search
Close this search box.
Financial Crimes & Identity Theft Victims

Financial Crimes & Identity Theft Victims

What you should do if your identity has been stolen :

Identity theft is the most frequent complaint at the Federal Trade Commission for the last 15 years.  It costs victims thousands of dollars to repair their credit on top of the financial loss from the theft.  Identity theft has become so common that we all need to understand it and take action to keep safe. Identitytheft.gov  can help you report and recover from identity theft.

You can report it to local law enforcement in one of two ways:

  • Report the crime on-line  – This report is for financial records or documentation of the incident and generally, no follow-up investigation will be conducted.  It is for your records, for getting reimbursed, and to satisfy your bank’s or insurance company’s requirements.
  • If you have suspect information or evidence, call 303-660-7500 and a deputy will respond to take a report. Use this method if you have information that can be followed-up on by a local law enforcement agency.  

Other things to do:

  • Change passwords, PINs and secret questions and “flag” your account at the credit bureaus.
  • Report the identity theft to the FTC at www.Identitytheft.gov and create a recovery plan.


Criminals try to get your personal identifying information by:

  • Looking through your trash and stealing your mail.
  • Copying or “skimming” your credit card numbers.
  • Hacking into the financial records of a business or bank or credit card company.
  • Stealing your wallet, purse, or laptop, or breaking into your home or your car.
  • Tricking you into giving the information to them.
  • Buying the information from other criminals, or from someone at your workplace.
  • Through “data breaches” at a business.
  • Sometimes family members or people you trust will abuse that trust to get it.


What the criminals do with your information:

  • Criminals create fake identities through the use of any personally identifying information they can obtain and use it to their benefit.