Identity Theft & Document Scam Command Centre
Identity theft is rarely one event — it is a chain reaction.
Criminals collect fragments of data over time, then combine them to unlock accounts, open credit lines, redirect funds and impersonate you with authority.
Pattern to recognise: Fear + urgency + authority + request for personal data = identity harvesting.
🚨 If You Think Your Identity Is Compromised
Immediate Damage Control:
- Secure your email first (it is the master key).
- Change banking and payment passwords.
- Enable MFA using authenticator app.
- Contact your bank fraud team immediately.
- Check mobile provider for SIM swap.
- Review account recovery emails and new payees.
- Preserve evidence (screenshots, links, sender details).
📚 Deep Identity Scam Database
Each section explains: • How the scam works • Why it works psychologically • How criminals use the data afterwards • Red flag clusters • Prevention doctrine

