You’ve just moved. Again. A new base, a new mailbox, a new school sign-up. In the middle of unpacking boxes and switching to a new TRICARE region, there’s barely time to catch your breath — let alone monitor every unfamiliar phone call or credit card charge.
Maybe you’ve stopped screening calls like you used to or maybe you’ve let autopay handle your finances this month. It’s easy to miss a red flag — or worse, engage with something you shouldn’t.
That’s exactly how scammers slip through the cracks.
Anyone who grew up alongside the evolution of dial-up to Starlink knows better than to wire money to a whining Nigerian prince, but scammers have evolved far beyond those early internet cons.
Tactics have become more sophisticated, and phone and email filters are constantly playing catch-up. With caller ID spoofing and AI-generated messages, it’s getting harder to tell what’s real and what’s a scam.
Phishing emails are the most common entry point for identity theft in the world, according to the Cybersecurity & Infrastructure Security Agency (CISA). These messages are crafted to look official, complete with logos, familiar language, and links that closely mimic legitimate websites.
Military personnel were even the target of a scam that the Federal Trade Commission flagged in 2023. In this scheme, fraudsters pose as representatives from the Defense Finance and Accounting Service (DFAS), claiming there’s a problem with your pay and pressuring you to confirm personal information or send money through third-party apps. The FTC and most financial institutions emphasize: they’ll never call out of the blue or request payment through apps like Zelle or PayPal. What sounds like a routine customer service message might actually be a red flag.
How to protect yourself
Fortunately, staying safe from identity theft doesn’t require a degree in cybersecurity — just a healthy dose of skepticism and a willingness to second-guess anything that feels off.
Secure your devices and logins: Use multi-factor authentication on accounts like MyPay, TRICARE, and VA. Avoid public Wi-Fi for anything sensitive unless you have a VPN (your TAD hotel lobby isn’t the place to check your bank balance). And yes, those software update pop-ups matter. Keep your antivirus protection and operating system up to date.
Monitor your financial accounts: Make it a habit to scan your bank and credit card statements regularly. Set up transaction alerts so you know if something weird pops up. Some third-party identity monitoring services, like LifeLock, can notify you anytime your social security number is used in an application for a new account. This can help you catch fraud before it snowballs. And if something does seem off? Fortunately, your bank and the major credit bureaus have systems in place to help, especially when caught early.
Be skeptical of unfamiliar contacts: Scammers count on you being too busy (or too polite) to second-guess a sketchy message. Don’t click links in unsolicited texts or emails, no matter how official they seem. If someone calls claiming you have an overdue tax bill or a warrant out for your arrest, hang up and call back using the organization’s publicly listed number. If it’s legit, they’ll understand. If it’s not, enjoy the relief of having dodged a scam.
Use resources designed for military families: Free active-duty credit monitoring is available, and you can check your credit report annually at annualcreditreport.com. DFAS also offers guidance on their website; this one is worth bookmarking before you actually need it.
If you think your information has been compromised, act fast. Report suspicious activity to your bank and credit card company immediately. File a report with the FTC on their website, and place a credit freeze or fraud alert with the three major credit bureaus.
Unfortunately, protecting yourself from identity theft isn’t a one-and-done task. It takes ongoing awareness. So, stay alert, ask questions, and trust your gut. But also know that you can contact your base legal office or Military OneSource for guidance and support.
Read comments