Monday, December 16, 2013

Is Someone Else You Too?


What is the fastest growing crime in America right now? If you don’t know, its identity theft. If you’re relived it’s not a violent crime, don’t relax just yet. Even though identity theft is, for the most part, a non-violent crime, the effects of being victimized could be a long drawn nightmare which could ruin your life financially and emotionally.
A crime quickly catching up to 2nd place, are personal violation crimes. These crimes include cyberstalking, cyberbullying, and voyeurism.  I have classified these three crimes into one because they are similar in that, to be committed, they require the same thing as identity theft, your information. (See the post titled Cyberstalking).
According to the U.S. Postal Inspection Service and the Federal Trade Commission, approximately 9.9 million Americans were victimized by this faceless crime and 6.6 million are victims of cyberstalking.  It’s also estimated that hundreds of thousands more American have been victimized and aren’t yet aware they have been victimized or did not reported the crime.
So what is my point? The message I am trying to get out is that the newest, hottest, and most lucrative commodity on the black market now is….INFORMATION, namely, your information! Information is now sold on the internet and used for profit, all with the anonymity if internet IP addresses.  Yes, back in the day, stealing things to fence and money was popular for criminals but, it required physical action and involved the risk of getting caught. Well, not anymore. Now that we now live in a different time, thanks to technology, society’s insistence on convenience, and the belief that “it will never happen to me”, society has made identity theft and personal violation crimes a tempting easy score.
These crimes require less effort and the risks are greatly diminished because the criminal can perpetrate his crime from anywhere in the world while sitting in his easy chair. All he needs is information people readily put out in the open. Most times, this information that is made public seems harmless and meant for friends and family. Today’s criminal are a lot more savvy than the criminals of yesteryear, they slowly collect any little tidbits the victims puts out on social media, until the criminal can literally piece together the victim’s life.
It’s easier than you think to get your name address, phone number, email, marital status, family members, income level, place of work, type of vehicle, favorite hangouts, whether your armed, current location, and even your mother’s maiden name. Perfect for applying for a credit card in your name, taking out a loan, or even buying a car. A pervert can also take advantage of targeting you for stalking or voyeurism with a little software and some ingenuity either for self-gratification or to sell online.
If a criminal works the local areas, dumpster diving, mailbox picking, and contest entry boxes are ridiculously easy sources for personal information.
Scenario 1: Susie receives a credit card application in the mail and fills it out, signs it, and puts it back in the mailbox, (a habit we still cling to). A mailbox picking criminal takes her application and changes the delivery address to a temporary PO Box or checks her mailbox every day to receive the actual card. A savvy criminal, he calls Susie representing the credit card company to “confirm” that she did apply for the card, and states that they need some additional security information, he asks Susie to verify her social security number, her cell phone number and another credit card number to transfer a balance from because he now reduced her APR to 5% on transfers. Susie excitedly obliges and gives him the additional information. He then tells Susie it will take an additional seven days to receive the card. That gives the criminal an extra seven day to splurge on Susie’s new credit card.
A month later, Susie receives the credit card bill for $10,000.00 for credit card purchases she never made. Her credit bureau will be notified, and the criminal will be enjoying the fruits of Susie’s labor while Susie is left to fight with the credit bureaus, credit card company and stores who will all deny any blame and offer little or slow help.

While Susie is returning from work, she stops in a mom & pop convenience store for a coffee. The sees a contest poster and application for an all-expense paid trip to Disney Land. Susie thinks she could use something like that after the credit card fiasco and fills out the application and drops it in the box. The drawing will be in two months. The next day, the criminal goes to the store and picks up the application drop box. He takes the applications and gathers all the information and posts them online for sale to others. He keeps a few applications, one is Susie’s. He extracts the information and checks it with the other personal files he’s gathered from trash bins and dumpsters. Bingo! He has other info on Susie, plus a credit card application she through away last week.  All he needs now is her place of business, work phone, and mother’s maiden name.
He goes on Facebook and searches for Susie, bingo! Her profile shows she works at a restaurant in town. He does a Google search for restaurant phone number. Back on her profile, Susie friended her mother, who has her maiden name listed for search purposes.  Two months goes by and Susie didn’t win the trip but did receive another credit card bill from a company she never applied with. This one is a maxed out Platinum card and has a 26 % interest rate and tons of fees. Susie has no idea how this is happening and has no way to make it stop.
To try to catch up on her exploding bills, Susie applies for a loan and is denied because of her debt. She later gets turned down for a car loan. The bill collector calls are increasing along with bills for a flat screen TVs, clothing, spa services, and a paint job of a Mayan goddess on a low rider. As a final straw, Susie’s wages are garnished temporarily after a lien was placed on her home.
Think this scenario is far fetched? If you do, your doubt may be what makes you vulnerable, the criminals are thriving on society’s doubt, carelessness, and lack of understanding. Think about how much this whole scenario cost Susie then ask yourself this question, what would be cheaper? Being a victim of identity theft or a shredder and a little more attention to your personal information? Are you posting too much on social media and giving out personal information too freely. There is enough information on you online already, don’t add to it, because someone could be making their living with your information.

TYPES OF IDENTITY THEFT

There are several types of identity theft which a criminal may use to facilitate these crimes. The crimes include illegal immigration, receiving government benefits, getting medical treatment,  espionage, and terrorism. Identity theft could also be used to blackmail you or someone in your family. Below are some of the types of identity theft.
  • Identity Cloning
    Occurs when a person takes someone else’s identity and assumes the victim’s identity in his or her daily life. This could be used to hide from the authorities. For example, an illegal alien could be hiding under a citizen’s name and receiving free benefis.
  • Financial Identity Theft
    The use of someone else’s financial information to steal his or her identity. With this information, the criminal can steal money, open new accounts, or launder money from criminal activity, and eventually ruin your credit.
  • Criminal Identity Theft
    This happens when a criminal steals personal information or uses a fake ID to steal someone else’s identity. An arrest warrant could be given for the arrest of the victim who is thought to be the criminal. The criminal is free from facing the consequences.
     

METHODS OF IDENTITY THEFT

Identity theft can happen a number of different ways. These methods are usually carried out by physical contact with actual paperwork or through electronic means. Either way, the results are the same.
  • Dumpster Diving
    A criminal literally searches through garbage bins and dumpsters for personal information.
  • Account Hijacking
    The fastest growing form of identity theft, some 2 million people were victimized last year alone. Account hijacking occurs when a criminal obtains your personal banking information and uses it to take over your bank accounts. 
  • Pickpocket
    Physically stealing payment information or identification.
  • Shoulder Surfing
    Eavesdropping or looking over someone’s shoulder for personal information.
  • Hacking
    Taking information from computers through viruses and Trojan horses, and spyware.
Phishing
Impersonating a reputable institution to gain trust, and then asking for information. For example, someone sends out a phishing email imitating your credit card company. This e-mail will contain a link that asks you to update your information. This link will take the victim to a look-a-like website of the company. Once that personal information has been entered, the thief now has access to the information provided by the victim.
So how do you protect yourself against these crimes?
·         Avoid carrying your Social Security card or passport unless they are needed.
·         Never print your Social Security Number or driver’s license number on your checks.
·         Carry as few credit cards as possible and periodically check to make sure you still have them.
·         Write “See Photo ID,” on the back of your credit cards instead of your signature. If a thief steals your card, it cannot be used without your identification.
·         Shred any documentation with your identifiers on it or other personal information. A cross shredder is best.
·         Use USPS mail collection boxes or a P.O. Box instead of your home mailbox.
·         Don’t leave mail in your mailbox overnight or over the weekend.
·         Use firewall software to protect information safe on your computer. Keep virus and spyware software programs updated.
·         Don’t give out personal information on the phone, mail or over the internet unless you initiated the contact.
·         Know your billing cycles and contact creditors. Review bank and credit card statements carefully.
·         Reduce the number of preapproved credit card offers you receive: 888-5OPT-OUT (you will be asked for your SSN)
Check your credit report annually.
Helpful links.
Don’t ever rely solely on your institution to fix an identity theft problem immediately. Their websites may imply they are there to help you in a crisis, but they must also initiate an investigation to ensure they are not being the victimized by fraud. That investigation will take at the very least, a month. Your may even feel like your institution is interrogating you during their investigation. In the mean time, the criminal will be running up bills for you. Take action as soon as you realized you’ve been victimized. Start with the police and follow the path uphill. Keep records of every case or incident number you are given. The links above will give you some direction and the steps to take.
Knowledge is power.

1 comment:

  1. Someone stole my mail last July, I believe they tried to open a Visa account under my name and also tried applied for an Exxon gas card. In August, I got approval for a JC Penny card I didn't apply for and cancelled it. I now have a PO box. Thanks. J.G.

    ReplyDelete