Nine million Americans a year become victims of identity theft, according to the Federal Trade Commission. Identity theft takes place when criminals secure enough personal data about someone to use his identity for financial gain: for example, by renting out an apartment, signing a cell-phone contract, or taking out a credit card using the victim's name, Social Security and other information.
Victims
According to a study by the Robert H. Smith School of Business, identity theft victims tend to be high-income earners, well educated, living in the west or the south, with Internet access at home. Most of them are male, white, and between 31 and 55. The study recommends that people in high-risk categories make an extra effort to protect personal information.
Hard Copy Theft
According to the Federal Deposit Insurance Corporation, most identity thieves gain their information by stealing printed documents rather than electronic data. Thieves do this by dumpster-diving to find bills and credit card statements people have thrown away; physical theft of wallets or mails; or sometimes by giving the post office a change of address form to divert mail to a post office box they control.
Phishing
Phishing may be the best-known form of identity theft because it shows up in e-mail so often. A phishing e-mail, as the Federal Trade Commission states, may tell the recipient that his account has been changed or closed, and that he needs to click on a link immediately to set things straight. The link will steer the recipient to a phony website where the thieves will ask for a variety of useful information such as passwords, account numbers, and the victim's birth date or Social Security number.
Pretexting
Pretexting is the law-enforcement term for identity thieves who pose as the victim to con information out of financial institutions, telephone companies or other businesses, according to the Federal Trade Commission. If an identity thief can obtain basic information about someone, he can then contact that person's bank, pose as the person and ask for information such as the victim's account numbers.
0 comments:
Post a Comment