Free Essay

Identity Theft Report

In:

Submitted By Sajo0o0
Words 4801
Pages 20
Introduction

Over the centuries, the term ‘identity theft’ has meant many things. People have pretended to be other when committing crimes to avoid sentencing. Identities have been stolen in order to obtain certain medical care or drugs that would be unavailable otherwise. In this day and age, identity theft has become synonymous with finances. Thieves all over the world are using various methods to gain access to your money; and they’re more successful at it now than ever before. According to a 2013 Javelin report, 13.1 million people in the United States suffered financially because of identity fraud. According to multiple reports, that number is expected to rise in 2014 and beyond.

As we get smarter about how financial identity theft is committed, criminals become smarter about gaining our sensitive information. When we became good about shredding old credits cards and bank statements, they used e-mail and phone schemes to coax us into giving our information to them. Companies invest millions of dollars into new technologies meant to keep criminals out of databases, and criminals simply bypass these obstacles with combinations of cutting-edge and archaic techniques. It’s a vicious cycle that seems to have no end. So how can we as consumers protect ourselves from these identity thieves? Consumers must take a more active role in their financial lives, especially when it comes to online transactions. People often rely on stores and banks to protect their identities online. This is a huge mistake, as 97 percent of companies are getting breached. A problem this widespread is not one that can be taken lightly. And we at SERGS security group want to be one of the extra layers of security you use to protect your financial identity. We cannot guarantee that your information won’t be stolen at some point. No one can. But by monitoring online activity, communicating with financial institutions, and educating clients about fraud we can help limit or eliminate financial damage done by these thieves.

Purpose and Scope
The purpose of the report is to inform young professional seniors in San Francisco State University of the dangers and risks of identity theft before graduating, and how to protect their identity personally and professionally.

Procedures
Primary data was collected by SERGS Security in the form of quantitative surveys as well as qualitative customer feedback reports.
Data was also gathered from secondary sources including:
UTICA
BROWN
Technometrics
FTC
USDOJ

Key Findings

What is Identity Theft
Identity theft is one of the fastest growing crimes in the United States. In 2013, 13.1 million consumers suffered identity fraud – the second highest level on record, and it is increasing year over year (See figure1). There are many definitions of identity theft, however this type of crime typically involves illegally utilizing somebody else’s personal information for both personal and or financial gain.

Figure 1
Identity Theft Forms

Non-Technological Forms

Mail Theft
Under US Code - Section 1708, the opening of mail not directly addressed to you is an unlawful Federal offense, punishable by law, this offense is most commonly referred to as mail theft. The punishment for mail theft can be anywhere from a fine or up to 5 years in federal prison. Unwatched mailboxes are a hotbed for identity thieves to obtain sensitive documentation such as credit card bills, insurance information, utility bills, bank statements, preapproved credit cards, and paystubs, for their own personal gain. “Even if you receive credit card offers which you have not authorized, mail thieves may intercept these mail offers and set up a credit card in your name if they have enough information on you.” Identity theft criminals will often use documentation such as utility bills to re-route your mail so that they may continue to obtain personal identifiable information and financial records. At times, identity theft criminals have been known to re-route your mail without your knowledge or permission by submitting a change of address to the post office.

Dumpster Diving
Similar to identity theft, dumpster diving occurs when someone goes through someone else’s garbage in order to obtain personal identifiable information off items found in the trash. Thieves will often search for sensitive financial records, bills, and insurance information. This has become a much easier crime to commit since trash and recycling cans will sit on the sidewalk the night before their trash pickup. Since the sidewalk is public property, you are not protected when someone goes through your discarded trash.

Subscription Fraud
Subscription fraud happens when someone signs up for service (e.g., a new phone, extra lines) with no intent to pay. Often times this will occur as a result of mail fraud or dumpster diving, after the criminal has already submitted a change of address to the post office and is receiving your mail regularly.

Shoulder Surfing
Shoulder surfing may occur anytime you use a password to access an online account or a device where you are required to enter your PIN number, such as at an ATM. In this case, the identity thief attempts to get close enough to you so that when you enter password information, such as a PIN number, the thief is able to see over your shoulder and document your password or PIN. While this typically occurs in a public setting, where the victim is and their credentials are in plain sight, it may also occur through a video camera set up by the criminal. Under the guise of the victim’s identity, identity theft criminals may use this information to access your personal and financial bank accounts. This is most dangerous when paired with mail theft or wallet snatching.

Stealing Personal Items
One of the more dangerous forms of identity theft comes from purse and wallet snatching. While credit purchases can usually be recovered, debit card purchases are often more difficult since thieves need a PIN number to clear a purchase. If a victim is carrying their social security card in their wallet at the time of theft, recovering ones identity can be quite grueling and extensive.

Social Engineering
According to UTICA, “Social engineering is the practice of someone either in person, over the telephone, or computer, uses means to deceive someone else into divulging sensitive information.” Oftentimes this occurs when the attacker already knows some information about the victim, which they then use to deceive the victim into believing they are legitimate representers of the victims bank, creditor, or insurance provider. Commonly referred to as a “con game,” social engineering is perpetrated by “con-men”. Unlike hackers, who manipulate loopholes within a technological framework, social engineers exploit human interaction within the system. In this case the fraudster pretends to be someone he or she is not, such as the account holder, or a phone repair person, to access a customer's account. Recently, this technique has been used by "pretexters" in some high-profile cases of accessing phone records to spy on fellow board members and reporters.

Technological Forms

Credit Card Theft
Credit card fraud is an element of identity fraud. It can have far reaching effects, since the information on the card can be used to perpetrate other types of identity theft crimes. From using the signature on the back of a card that is stolen, to loaning a credit card to a friend or family member can cause someone to obtain what they need to open another credit card accounts or bank accounts in the victim’s name.

Skimming
This can happen anytime you use your credit or debit card. The theft occurs when the device which reads your credit card information from the magnetic strip on the back of the card records you’re the information the card’s code numbers to another electronic storage device. This enables the criminal to make a copy of your card to make unauthorized purchases. Skimming can occur through a number of different ways, whether it is a recording device set up on an ATM machine or a salesman who secretly swipes your card onto his personal digital card reader.

Pretexting
Pretexting occurs when a thief has done prior research on your personal information, and uses this information to bait you to release more sensitive information, such as a credit card number or Social Security Number. The schemer will call you on the telephone, and lead you to believe they are a business that requires this information. Most people tend to believe them, since they have their name, address, and telephone number.

Man in the Middle Attack
This type of theft involves criminally intercepting communication between two parties and recording the information without the two parties ever knowing about it. The criminal then uses this information to access accounts and possibly steal the user’s identity.

Phishing Schemes
These are the most common types of computer identity theft schemes. In these types of frauds, the thief tricks you into giving your personal identifying information. Criminals are able to do this by installing malicious software or physically stealing personal information off your computer. These types of attacks occur through a number of different mediums including cell phone messages, Internet social networks, emails, text messages, and standard mail.

Malware Based Phishing
This scheme occurs when the thief attaches a harmful computer program made to look helpful onto emails, websites, and other electronic documents on the Internet. This type of computer program is called malware. The malware uses key loggers and screen loggers to record your keyboard strokes and sites that you visit on the Internet. The malware sends the information to the schemer who is located at another location using the Internet. These attacks have been responsible for recent major security breaches at companies such as Home Depot and Target.

Search Engine Phishing
This type of phishing occurs when thieves create websites that contain “too good to be true” offers, services, and other incentives. The website is legitimately indexed into search engines such as yahoo or Google so that during the normal course of searching for products or services individuals can find these offers. Once the individual access the website the user is given incentives and persuaded in such a way that the individual becomes susceptible to give up his or her personal identifying information to take advantage of the offer being given.

Vishing
This scheme is also known as “voice phishing.” It occurs when the thief contacts an individual over the telephone. In this instance, the schemer poses as an individual working for a legitimate organization such as a government agency, a financial institution, a payment services organization, or another well-known company. The goal is to get you to disclose your personal identifying information.

Another tactic used is to make pre-recorded messages urging you to contact a certain phone number. A popular technique in this form of the crime is to pose as a bank alerting the victim to fraudulent charges.

SMiShing
In this scheme, the identity thief sends spam text messages posing as a financial institution or other legitimate entity. The text message has a sense of urgency, and can scare you into thinking there is a serious emergency by leading you to believe you will suffer financial losses or fees if there is no response. This may lead you to disclose personal identifying information by clicking on the link that appears on the text message.

Pharming
This can happen when a hacker tampers with a website host file or domain name system so that URL address requests are rerouted to a fake or spoofed website created by the hacker to capture personal identifying information from victims. The victim then thinks that they are on a trusted website, and are more willing to enter their personal information, such as credit card numbers, social security numbers, and addresses. The hacker then uses that information to commit identity theft.

Home routers are frequently targeted for pharming attacks. The hacker installs a fake version of the router’s firmware that behaves almost identically to the original one. The settings page of the router and firmware appear to be the same as they were before the attack. Especially in home cases, these invasions can be next to impossible to detect and lay dormant until a user enters sensitive information.

Keystroke Logging
Keystroke logging is what identity thieves use to secretly track the keys on your computer keyboard as they are struck. Not a big deal if your daughter is typing a report on Spain, but much more so if you’re typing in passwords, PINs, or other personal information thieves can then use to steal your identity.

What to do to Avoid Being Targeted

“Nothing will guarantee that you will never become an identity theft victim. With the widespread availability of personal information and the increasing exposure from data breaches, the risk is ever-present. But there is much you can do to protect yourself, your family, and your business…Robust prevention activities can limit your chances of becoming a victim of identity theft.” 9

Although there is no guarantee that you will never fall to some sort of identity theft, you can take preventive measures to lower the risk, and to mitigate possible damage before it occurs. Since you now know, why and how identity theft is committed, it is a great time to learn how to lower the chances of becoming prey.

Safeguard Your Information
SSN fraud is extremely dangerous, it serves as the key to all your financial, and personal information, and often it is the beginning point for fraud.

Be vigilant with copies of your SSN, and make sure to destroy them when they have served their purpose. It is in-fact extremely important to shred all sensitive information, as your trash is most likely easily accessible by anyone.

Never carry unnecessary items in your wallet, especially forms of identification. This includes unneeded credit cards.

When asked to provide sensitive information such as the SSN, do not be afraid to question about how, and by whom the information will be used. This includes all of your personal information such as, the date of birth, mother's maiden name, etc.

Cancel unnecessary credit cards, and monitor the rest. This will help you catch fraudulent charges, no matter how small.

Try to stick to a three credit card maximum as it will be easier to monitor.

Let your credit card issuer know when, and where you are traveling.

Do not do the following
Never give out your credit card, or personal information to people who call you, no matter how legitimate they sound.
Never write down the pin numbers on your credit/debit cards.
Never keep your account information in an easily accessible place.
Never carry any “cheat sheets” with your passwords in your wallets.

DO the following
Keep receipts.
Purchase a shredder, and shred all the sensitive materials.
Review financial statements each month, this may help you identify fraud, in a timely manner.
Review your credit reports
You can find a free credit report website on http://www.ftc.gov/, which at the moment is annualcreditreport.com 10
Never give out your credit card information on a free credit report website, you are legally entitled to one free credit report per year.
Purchase a locking mailbox, or retrieve mail as soon as possible after delivery.
You can ask the USPS to hold mail during time away from home, so the mail does not accumulate, they will hold your mail from three, to thirty days, free of charge.
Be cautious of ATM's- some could be defaced (Skimming)
Opt out of sharing your information (FTC) http://www.ftc.gov/ 10
It is important to destroy Hard drives before discarding your electronics, because all of the stored information will be easily accessible by anyone.
Privacy screens will help in dealing with shoulder surfing by making the screen unreadable at certain angles. 12
If you get something that looks like a lottery material from a foreign country through the postal mail, take it to your local postmaster, where they will assess legitimacy of the letter. 9
Internet Safety

Phishing
Install and keep the firewall on your computer updated, it is a very important tool in defending your machine from unauthorized access. 12
Best way to combat phishing is to only open emails, links, and attachments from trusted sources. 11
Pay attention the the website URL, if unsure, you could report suspicious websites, and emails to phishing@visa.com 11

Digital Wallets
Safeguard sensitive data, and know who to call if there are issues, before anything happens.

Online
Keep all your software up to date.
Use pop-up blockers to reduce the chance of clicking a malicious link.
Only download files from trusted sources, and only on trusted machines.
Sign up for email/text alerts from your bank, and keep track of your purchases.
9 http://www.utica.edu/academic/institutes/cimip/idcrimes/prevention.cfm
10 http://www.usa.gov/topics/money/identity-theft/prevention.shtml
11 http://www.visasecuritysense.com/en_US/preventing-fraud.jsp
12 http://www.consumer.ftc.gov/articles/0060-10-ways-avoid-fraud

Steps to Take if You have Been Victimized
Even if you are very careful about your personal and financial information you still can become a victim. But if you are diligent about checking your banking accounts, monthly bills, and review your credit report periodically, you will detect identity theft early. Early detection makes the process of correcting accounts and credit problems much easier.
The steps you will need to take to recover from identity theft depend on the type of fraud that occurred to you. For example if you notice in your monthly statements an error on an existing credit card, monthly bill or financial account. The following steps should be taken if you discover that your identity has been stolen:
1- Act immediately if you notice any error in your statements and call companies with affected accounts.
2- If you have been victimized, close compromised accounts.
3- If you review your monthly statement and find an item you wish to dispute, call the credit card company immediately.
4- Contact the fraud departments of the three major credit bureaus and place a fraud alert in your file as well as a credit freeze. If you think someone has misused your personal or financial information, call one of these companies and ask them to put an initial fraud alert on your credit report. Here are the three major companies: a- Equifax b- Experian c- TransUnion Placing a fraud alert is free. The initial fraud alert stays on your credit report for 90 days. You must provide proof of your identity. The company you call must tell the other companies about your alert. (FTC)
5- Order copies of your credit report. Get your credit report and check for inquiries that you do not recognize and any new accounts opened in your name. Because new accounts may take up to six months to show up on the report, continue to monitor your credit report. Get the 3-in-1 Credit Report and see your credit history as reported by the three major nationwide credit reporting companies that I mentioned above.
6- Report the crime to the police or sheriff's department that has jurisdiction in your case and request a police report. Though the authorities are often unable to assist you, a police report may be necessary to help convince creditors that someone else has opened an account in your name.
7- Submit an Identity Theft Report with the Federal Trade Commission, which is charged with handling most identity theft complaints (FTC). Call the FTC's identity theft and file a complaint. The FTC does not resolve individual consumer problems itself, but your complaint may lead to law enforcement action.
8- Document the events and your actions in writing and keep the records in a safe place. You should document the time and money you spend relating to the theft. Because recovering from identity theft can be a long and complicated process, it's important to keep a record of all communications. Send all letters by certified mail and keep copies. If you think your case might lead to a lawsuit, keep track of how much time you spend dealing with the problem.(USDOJ)
9- Contact the local post office if you suspect your mail has been redirected do to an identity thief submitting a change of address form.

Steps for Other Types of Fraud That May Occur

Fraud Using your Social Security Number
Contact the Social Security Administration if you suspect your Social Security Number has been used fraudulently. Also, if your Social Security number has been used to commit identity theft, contact the Federal Trade Commission (FTC). You can order a copy of your earnings and benefits statement to check whether someone has used your Social Security number to get a job or to avoid paying taxes.

Fraud Involving Your Driver's License Number
If your driver's license number has been used to open accounts or verify checks, contact your state's Department of Motor Vehicles.

Fraud Involving Your Passport
Notify the U.S. State Department's Passport Services Department of the identity theft so that it can intercept anyone ordering a new passport in your name.

Fraud Involving a Business Scam
If the fraud was perpetrated as part of a business scam, contact the National Fraud Information
Center at 800-876-7060.

Bankruptcy Filed Using Your Name
If someone filed for bankruptcy using your name, write to the U.S. Trustee in the region where the bankruptcy was filed. A listing of the U.S. Trustee Program's Regions can be found at www.usdoj.gov/ust, or look in the blue pages of your phone book under US Government: Bankruptcy Administration. Your letter should describe the situation and provide proof of your identity.

Important Contact Information
There are a number of helpful services to help you respond if you have been a victim of identity theft. Below is a list of resources that we have compiled.
Federal Trade Commission's Identity Theft Hotline
877-IDTHEFT (877-438-4338)

Equifax fraud division
800-525-6285

Experian fraud division
888-397-3742

Trans Union fraud division
800-680-7289

When Contacting the Credit Reporting Agency, You Should Request the Following:
Instruct them to flag your file with a fraud alert including a statement that creditors should get your permission before opening any new accounts in your name.
Ask them for copies of your credit report(s). (Credit bureaus must give you a free copy of your report if it is inaccurate because of suspected fraud. ) Review your reports carefully to make sure no additional fraudulent accounts have been opened in your name or unauthorized changes made to your existing accounts.
NOTE: In order to ensure that you are issued free credit reports, we strongly encourage you to contact the agencies DIRECT LINE. We do not recommend that you order your credit report online.
Be diligent in following up on your accounts. In the months following an incident, order new copies of your reports to verify your corrections and changes, and to make sure no new fraudulent activity has occurred.
If you find that any accounts have been tampered with or opened fraudulently, close them immediately. To ensure that you do not become responsible for any debts or charges, use the ID Theft Affidavit Form developed by the Federal Trade Commission to help make your case with creditors.
Software programs that execute keystroke logging, and then transmit the data to identity thieves for storage, can be downloaded onto your computer through email attachments, links, or fraudulent websites without you knowing they’re there.

Services Offered by SERGS Security Group
It's essential that you use a trusted service for your ID theft protection that stands behind its service with a guarantee or insurance. SERGS Security Group searches multiple records for misuse of your personal data. It will also have convenient, helpful customer service for quick setup and assistance if you need it as well as someone who will work closely with you in the unlikely event that you are victim of identity theft while under our watch. Below are services we provide to our customers:

Security
SERGS Security Group will be able to react quickly to potential threats. We will have means to alert you of any potential issues. We also will post fraud alerts on your credit card as well.

Recovery Assistance
Although it's best to never need recovery assistance, it's essential that you find a service that provides concrete and well-practiced procedures to help minimize damage in the event that someone steals your identity. SERGS Security Group will be able to provide you with the specific steps it takes to freeze your credit cards, alert your banking institutions, notify credit bureaus and so forth.

Information Protection
SERGS Security Group protects more information than others do. While most companies monitor credit reports, we offer additional services to protect other documents and data. Identity theft is more than a financial concern. Criminals can use your personal information to hide their own identity. If this is a concern to you, SERGS Security Group covers criminal and public records.

Help & Support
An identity protection service is only as good as its customer support. SERGS Security Group will have prompt and helpful support that you can reach at any time. Information and education is on our website www.SERGS.com.

Additional Features
SERGS Security Group includes extra features to help you prevent ID theft, such as removing your name from mailing lists. We also offer specialized plans to help you keep your entire family safe from identity theft. SERGS Identity Theft Protection puts your good name under lock and key. If you are concerned about the safety of your identity, join SERGS Identity Theft Protection.

Conclusion
Identity theft crimes can affect individuals where it matters most, disrupting their personal and financial activities. Considering the sensitive nature of these crimes across the globe and the vulnerability of the average person to become a victim, it is of the utmost importance for individuals to protect themselves. Becoming familiar with common methods of identity theft and ways to prevent them can result in massive savings in terms of time and financial resources. Protection from identity fraud can be achieved through a combination of diligent and vigilant maintenance of financial and personal information as well as utilizing the services of a security firm such as SERGS.
At SERGS, we strive to provide our clients with individualized measures to protect and maintain their identity both online and offline. Our global services are provided in an effort to prevent our clients from becoming victims of identity theft as well as provide emergency support for our clients who believe they have been victimized. As technology advances and more personal and financial services are taking place online and through cellular phones, it is increasingly important for individuals to maintain and protect their most valuable assets, their identities. Recommendations The following recommendations have been designed in order to better prepare young professionals to protect their identities and maintain control of their personal and financial information. Protect your online identity: The recent shift of consumer attitudes towards online services as a result of an increase in environmental consciousness, coupled with added convenience and security, allows for online predators to find new prey every day. Users of online services such as social media, online shopping, and banking websites must practice vigilance to ensure that they are not falling victim to the aforementioned techniques of identity theft online. Practice vigilance in filing and disposing of sensitive materials: While many personal services are offered online and the use of physical bills and statements is not as often as it once was, post mail is still widely used for correspondence containing sensitive information. The proper disposal of unnecessary materials containing the name, address or any other sensitive personal information limits an individual’s exposure to identity theft. Keeping organized files for documents pertaining to sensitive information also reduces the chances of personal information falling into the wrong hands. Use a trusted service: Although the risk of being affected by identity theft has been rapidly rising, many individuals cannot find the time or resources to take the necessary measures to protect themselves from being victimized. The process of retrieving one’s identity in the case of a theft can also be very daunting, requiring the victim to overcome numerous bureaucratic hurdles and obstacles involving different financial institutions and government agencies. Through using a trusted security service, individuals can minimize their exposure to risk as well as rest easy knowing that they are protected in the case of their identity being compromised. Services such as those offered by SERGS security group provide clients with cutting edge security measures to protect them from being victimized as well as access to a team of specialists to help retrieve the compromised information.

Similar Documents

Premium Essay

Identity Theft Paper

...Identity Theft John Smith Concepts and Applications of Information Technology 7 April 2012 Richard Jones Identity Theft Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can damage your finances, credit history, and reputation. It can take time, money, and patience to resolve. Once identity thieves have your personal information, they can drain your bank account, run up charges on your credit cards, open new utility accounts, or get medical treatment on your health insurance. Furthermore, the internet offers access to a world of products and services, entertainment and information. At the same time, it creates opportunities for scammers, hackers, and identity thieves (Privacy and Identity). Identity thieves are resourceful. They dig through your garbage, the trash of businesses, or public dumps. They may work or pretend to work for legitimate companies, medical offices, clinics, pharmacies, or government agencies, or convince you to reveal personal information. Some thieves pretend to represent an institution you trust, and try to trick you into revealing personal information by email or phone. Some of the clues that your identity has been stolen are for example: withdrawals from your bank account that you can’t explain; don’t get your bills or other mail; debt collectors call you about debts that aren’t yours; unfamiliar accounts or charges on your credit report; medical...

Words: 908 - Pages: 4

Premium Essay

Identity Theft

...Identity Theft Introduction Today, the United States is facing an ever-growing number of identity theft crimes. According to the Federal Trade Commission (FTC), nearly 10 million Americans suffered the consequences of this crime in 2004, and the commission received more than 5,000 telephone calls per week related to identity theft in 2005. According to the FTC(2006) most victims of identity theft are quite unaware of how their personal information was obtained. Identity theft happens when someone steals your personal information and uses it without your permission. It’s a serious crime that can wreak havoc with your finances, credit history, and reputation and can take time, money, and patience to resolve. (Identity Theft/ Consumer Information). The sharing of information on transaction identities is necessary for operation of these payment systems. However, this information sharing can facilitate fraud in the form of identity theft. Information sharing can also create conflicts of interest that may not be easily resolved through the operation of the marketplace. Thoughtful public policy should be aimed at resolving these conflicts. The ultimate goal of regulation should not be absolute privacy of consumers or complete suppression of identity theft, but instead the promotion of efficient confidentiality of personal information . Too much white space. What is Identity Theft? Identity theft is a crime when someone without permission uses of another person’s...

Words: 1740 - Pages: 7

Free Essay

Identity Theft

...Dangers of Identity Theft Sharae Ernst IFSM 201 – Summer 2012 8/3/2012 “Identity theft occurs when someone uses your personally identifying information (PII), like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.” (Fighting Back Against Identity Theft: Federal Trade Commission). According to the Federal Trade Commission, identity theft complaints have decreased since year 2008 (314,521 to 250,854). It is estimated by the FTC that as many as 9 million Americans have their identities stolen each year. As information technology progresses along with society, there is always an increased risk of having one’s identity stolen. “Identity theft was the number one complaint category in the CSN for calendar year 2010 with 19% of the overall complaints, followed by Debt Collection (11%); Internet Services (5%); Prizes, Sweepstakes and Lotteries (5%); Shop-at-Home and Catalog Sales (4%); Imposter Scams (4%); Internet Auction (4%); Foreign Money Offers and Counterfeit Check Scams (3%); Telephone and Mobile Services (3%); and Credit Cards (2%).” (Consumer Sentinel Network Data Book: For January - December 2010, 2011). Although the numbers have slightly decreased, overall, identity theft is on the rise. “According to a February 2012 Javelin Study, identity theft rose 13% from 2010 to 2011.  More than 11.6 million adults became a victim of identity theft in the United States during 2011.” (Coping with Identity Theft: Reducing...

Words: 1352 - Pages: 6

Free Essay

Protective Identity Theft Measures

...Easy Measures for Increasing Identity Theft Protection Introduction Imagine getting ready to purchase a home. Your family has outgrown the house you are currently living in, and a bigger home would be a perfect fit for your family. Since you have owned your home for many years and made your payments on time (along with your other bills), you feel applying for a home loan will be easy. With banks offering lower interest rates and trying to obtain business from customers, now is the time (you feel) to apply for a home loan. You walk into the bank and meet with the local loan officer. After explaining your financial and work situation, the loan officer provides an interest rate and term on a home loan. You find the home loan favorable and wish to proceed with the home loan. The loan officer is happy to proceed and explains that a credit report will need to be pulled. You agree to have your credit report pulled, as you feel your credit score is in good shape. The loan officer pulls your credit report and you see a look of concern come across his face. The loan officer prints your credit report and proceeds to tell you that due to your high debt, failure to make payments, and low credit score; the bank cannot offer you a loan. You now have this look of horror on your face as you do not know how you have late payments, your debt is high, and your credit score is low. You ask to see your credit report. When you review the credit report, you realize these unpaid, high-balance...

Words: 3176 - Pages: 13

Free Essay

Identity Theft Research Paper

...Identity Theft Abstract This research paper will examine what is known about identity theft. The paper begins with defining the crime and its background, followed by a review of the patterns and incidences of identity theft. This review will include data on the extent and costs of this crime. Discussion will then focus on victims and perpetrators of identity theft. Common techniques used by identity thieves will be explored along with tips to protect consumers and businesses from having their identities stolen or data breached. Legislation in place to prevent and prosecute identity theft will be discussed. How to report identity theft is also explained. Defining Identity Theft The U.S. Department of Justice defines identity theft, also called identity fraud, as “all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain” (U.S. Department of Justice, 2015). Identity thieves use personal data such as Social Security numbers, bank account or credit card numbers to personally profit at the victim’s expense. These breaches allow thieves to take funds out of bank accounts or in the worst cases, take over a victim’s identity completely, running up huge debts and committing crimes using the victim’s name. Victims not only suffer the out-of-pocket financial losses, but they may have to rebuild their reputation in the community due...

Words: 4583 - Pages: 19

Free Essay

The Eruption of Identity Theft

...Eruption of Identity Theft The Eruption of Identity Theft Thomas J. Moore Saint Petersburg College, Tarpon Springs CJE1669 - Identity Theft Investigations (Online) Thomas 5/21/13 The idea of identity theft is nothing new; it has been around for centuries in one form or another. I would say that Martin Biegelman defines identity theft in a way in which we can all understand, he says that identity theft is the seizure of a person’s private information to mimic that person in a legal sense. So many people are asking the question, why is it so easy for criminals to obtain a victim’s personal information? Well because unlike your fingerprints, which are distinctive to you plus cannot be handed to someone else for their use, but your social security number, your bank account or credit card number, as well as other important recognizing data that could be used , if they had fallen into the wrong hands, that means that someone would profit at your expense. In my view, I say it is so easy for criminals to obtain a victim’s personal information because some of the basic methods that are being used to obtain ones identity such as: stealing ones wallet, digging through the trash for credit card receipts, and as low as a dishonest employee taking information from their own work place. In Martin Biegelman’s Identity Theft Handbook...

Words: 559 - Pages: 3

Free Essay

Identity Theft

...Speech On Identity Theft A. Today is the big day. You have been saving for several months for a down payment to purchase your new car. You go to the dealership, pick out the car and fill out all the required paperwork. You start daydreaming about driving off the lot when the finance manager comes in and says the one word you were not expecting, DENIED. You have no idea what is going on because you know you have perfect credit. After some time consuming effort, you realize you are a victim of identity theft. B. The purpose of my speech is to inform the audience about identity theft. C. Identity theft can happen to anyone in this room. Your roommate, friend or a total stranger can gain access to your personal information. If you ever plan on taking out a student loan, purchasing a car or home, you should listen carefully to this speech. D. I was almost a victim of identity theft. Several years ago someone stole my checkbook. The person who found it started writing checks from my account to purchase a few very expensive items at my expense. I had no idea this was happening until I went to the ATM to withdraw some money. I called my bank and found out that my account was $2000.00 overdrawn. Fortunately, I reported it the police in a timely manner and they were able to apprehend the person before more damage could be done. The police told me about identity theft and how lucky I was. After the incident I started doing research on identity theft so I could...

Words: 1389 - Pages: 6

Premium Essay

Identity Theft White Collar Crime

...Identity Theft David Arcila Professor Jim Manning White Collar Crime 08/14/13 “But he that filches from me my good name, robs me of that which not enriches him, and makes me poor indeed.” – Shakespeare, Othello, act III. Sc. 3. “Once in a time before identity theft was a federal crime, there was a particular case where a convicted felon stole more than $100,000 of credit card debt, motorcycles, federal home loans, houses, and handguns in the victim’s name.” (Knox, Jeffrey) “He also called his victim to taunt him and let him know that he could do this as long as he wanted to because identity theft was not a federal offense yet.” (Knox, Jeffrey) “Both the victim and his wife spent more than four years and more than $15,000 trying to repair their reputation and credit.” (Knox, Jeffrey) “As for the criminal, the offender served a small prison sentence for trying to buy the firearm but other than that made no repayments to the couple for the damage he caused.” (Knox, Jeffrey) “This was one of the many cases that made Congress decide to implement a new federal law in 1998 against identity theft.” (Knox, Jeffrey) Identity theft is a type of crime where someone’s identity is stolen in order to pretend to be the victim’s identity. “Many times the offender obtains valuable resources such as credit card and debit card information or social security numbers in order to gain economic through deception or fraud...

Words: 2364 - Pages: 10

Premium Essay

Identity Theft Research Paper

...PREVENTING IDENTITY THEFT Matthew Cao Edina High School Abstract Identity theft is a frequent occurrence in today’s age of technology. Identity theft is when someone impersonates another person without their permission and could be for any reason. It can happen through database breaches or simply losing important personal information, and can happen to anyone. However, there are preemptive measures and steps if identity is stolen. There is also legislation to minimize the risk and cost of identity theft. What is identity theft? In 2017, over 15 billion dollars were stolen from 13 million victims of identity theft. Identity theft is any case where someone pretends to be someone else for any reason, and can happen to anyone. The most common reason for someone to steal someone else’s identity...

Words: 1309 - Pages: 6

Premium Essay

Identity Theft in Online Business

....1 2. Theory and Concept……………………………………………………….…. .3 3. Key Findings……………………………………………………………………..4 3.1 Issues of Online Identity Theft …………………………………………...4 3.2 Trends of Online Identity Theft……………………………………………5 4. Case Study………………………………………………………………………..7 4.1 Background…………………………………………………………………..8 4.2 Analysis……………………………………………………………………….8 5. Recommendations and Conclusions……………………………………..…9 Executive Summary Identity theft make a lot of customers and organisations suffer serious loss both financially and emotionally. It is necessary to build acknowledge of identity theft to protect the interest of customers and organisations. This report finds the different methods and trends of identity theft and gives some advices for protection. A case study of TJX breach case shows the harm of identity theft in an organisation. 1. Introduction The internet technology has greatly changed the world in which human live since 1990s. Nowadays, internet has gone deep into people’s daily life and its high productivity, efficiency and convince make people deeply rely on it. Online business and social network have become the most important contributions of internet. As the growth of e-commerce and number of users of social networking websites, the target of identity theft has broadened. In e-commerce, identity theft threats not only the customers’ information and property safety but also the interest of corporate. On the social networking...

Words: 2731 - Pages: 11

Free Essay

Business Management

...next. Credit card fraud is a common form of identity theft. The cards that were stolen will get used quickly, usually for a few large purchases, or several small ones. Most credit card companies are wise to this, and watch for "unusual buying patterns," but don't count on that. Let them know as soon as you hang up with your bank. Make a report with your local police department. Get the report number, and a hard copy of the report. Every company you work with to fix an identity theft issue will want a copy of this, so make several. Always keep the original. Contact your insurance agent. Most homeowner's policies have some sort of identity theft coverage. This would be a great time to find out what it covers. The Federal Trade Commission published a brochure in 2008. It warned consumers to be careful what they buy. They said most identity theft products don't really do anything you can't do yourself for free. Contact the Federal Trade Commission (1-877-IDTHEFT). The FTC collects information about identity theft for studies and analysis. They may send you a copy of Take Charge: Fighting Back Against Identity Theft, a booklet to help victims recover. Call your other card issuers. Call the library if you had a library card. Call Blockbusters if you had a movie rental card. Call your car rental company, campus security, Victoria's Secret, everybody who gave you some sort of credit or ID card...even those shopper/savings cards. Identity thieves have run up all sorts of bills in their...

Words: 1186 - Pages: 5

Premium Essay

Identity Theft and Fraud

...Ricardo Hernandez SS3150 ITT Holly Hale-Hang, MAEd March 5, 2014 One person should also carry a current amount of credit card in there wallet, everything else should put inside a safe. Always monitor the bank statement and etc. Checking the mail for missing account statements is another way to protect from identity theft and fraud. If someone going on vacation that person should ask the post office to hold all their mail until that person came back, to prevent identity theft and frauds. People should invest in a shredder to shred unwanted information. Use a secure website to access information, never enclose personal information by the phone. Check bank statement and credit card statement very careful each month to see any unwanted purchase. If that person sees any unwanted purchase notices their credit card immediately. Thesis: One day you receive a call from your bank, stating you had just made a purchase for a random estimate of 5,000 dollars. But you did not go on a shopping spree. Your identity just has stolen. How secure is your identity? Do you ever wonder about your identity? Ways to prevent/protect yourself from identity theft and frauds. I. One thing you should be aware about is your bank account. A. Once your ATM has been compromises change your pin right away. B. Get new ATM cards if it has been compromised. C. Contact the bank if you see any suspense in your bank account. I. Another way is keeping your social security secure in a...

Words: 2515 - Pages: 11

Free Essay

Identity Theft

...Identity theft Identity theft is a major issue in our society today. It’s criminal and deceitful. It comes in all shapes and sizes, and outcomes are devastating. I currently work at a bank and dealing with identity theft occurs in my day to day tasks. I constantly have to watch all the checks that I cash and deposit to make sure that they are ending up where they are meant to. Also, forgery and duplicating checks is a big issue. We have to make sure the signatures match, as well as verify some other things on people’s accounts. Identity theft could be reduced if all the available tools were used. It is important to everyone, that this issue is addressed in its entirety. We, as a bank offered some identity theft block, free to our customers up to a year. This was a program where people watched your credit report and if anything suspicious came up they alerted you right away. I think that this was a good start to protecting yourself. But the banking industry should have some broader solutions for helping with identity theft. There are some new computer systems that I’m aware of. These new technologies will be able to help prevent fraud. Pictures of people’s IDs are coming up on the screens at banks so that we don’t have to ask for IDs. This makes it a lot easier to do our jobs as tellers. Identity theft has grown a lot since the use of the internet has become so much more common. Before, all someone had to do was go dumpster diving or look over someone’s shoulder. With the...

Words: 703 - Pages: 3

Free Essay

Identity Theft

...Identity Theft: Fastest Growing Crime Tracy A. Baggett DeVry University Keller Graduate School of Management Identity Theft; Fastest Growing Crime Imagine waking up to news that you had accumulated hundreds of thousands in debt after someone used your identity for unauthorized purchases. This is exactly what happened to John Harrison, a Connecticut salesman. Jerry Phillips, the twenty year old who stole John Harrison’s identity went on a shopping spree that included purchases to Home Depot, JC Penny, Sears, Lowes and even bought two cars from Ford, a Kawasaki and a Harley. In just four months Jerry Phillips was able to accumulate $ 265,000 in purchases. Jerry Phillips was later arrested and imprisoned for three years. He even went as far as to apologize to John Harrison saying, “Sorry. You know, I wish I could make it up to you.” John Harrison felt that the nightmare was over with the criminal behind bars and even verbally acknowledging his regret over the crime. But despite all of this and a letter from the Justice Department confirming that John Harrison was a victim, he still found himself owing $140,000 to different creditors. How about waking up in the middle of the night realizing that federal agents just entered your home with guns pointed certainly qualifies as one of the most horrifying ordeals in anyone’s life. This is exactly what happened to Carlos Gomez, a UPS driver accused of being involved in a million dollar money laundering operation headed by a Wachovia...

Words: 3754 - Pages: 16

Free Essay

Id Theft

...IDENTITY THEFT Fraud- intentional deception made for personal gain or to damage another individual. Fraud is a crime and a civil law violation. (1) Fraud affects individuals, businesses and the economy as a whole. Every year millions of dollars are lost due to activities of scammers using countless illegal techniques to achieve their goals. As hard as people work to make money and as difficult as it is to save it, the last thing they want to do is lose any of it through fraud. Financial fraud is the number one consumer complaint, and the biggest danger all the people face nowadays is identity theft, one of the most pervasive and insidious crimes. Identity theft occurs when someone assumes some or all of your identity to engage in criminal behavior. The first case of identity theft is described in the Bible when Jacob covered his hands and neck with goat skin in order to trick his father into giving him a blessing of a firstborn, in order to acquire all the property and livestock his father owned. In early American history, identity theft was focused on voters’ registration and ballot stuffing. Then in1930’s, brought 21’st amendment to the United States Constitution brought the new law that repealed prohibition. Alcohol was legal again, but drinking age was determined by individual state, until 1984 when US Congress passed the National Minimum Drinking Age Act. Between these times worst crime committed was underage drinking using fake ID. Usage of assumed name and identification...

Words: 2899 - Pages: 12