Crimes of Identity, schemes most used to create a New Identity

by | Jun 1, 2022 | Anonymous Living, Anonymous Travel, New Identity | 1 comment

Identity Crimes: Types and Prevention

Identity crimes encompass various methods used by criminals to obtain and misuse personal information. These crimes can lead to financial losses, damaged credit, and long-term complications for victims. Understanding the different types of identity crimes and taking proactive measures to prevent them can significantly reduce the risk of falling victim to these schemes.

Identity Theft: An Overview

Identity theft involves the unauthorized acquisition of personal information, such as a person’s name, Social Security number, date of birth, mother’s maiden name, and address. The stolen information is then used to create a new identity for financial gain, often without the victim’s knowledge or consent.

Non-Technical Schemes to Create a New Identity

Dumpster Diving

Dumpster diving involves sifting through garbage to find personally identifiable information from items like credit card bills, utility bills, medical insurance policies, and bank records. Thieves search through discarded documents to gather enough information to steal an identity or commit fraud.

Preventive Measures:

  • Shred all documents with a cross-cut paper shredder before discarding them.
  • Go paperless to receive statements and make payments online.
  • Regularly check your credit report and alert your credit card issuer and credit bureaus to any discrepancies.

Mail Theft

Mail theft occurs when someone steals your mail to obtain personal information, such as credit card statements, utility bills, or checks. Thieves can use this information to commit various forms of fraud.

Preventive Measures:

  • Use a locked mailbox or rent a post office box if possible.
  • Collect your mail promptly and avoid leaving it in the box for extended periods.
  • Set up online accounts for receiving bills and making payments.
  • Contact the post office immediately if you suspect mail theft.

Social Engineering

Social engineering involves manipulating individuals into divulging sensitive information through deception, often by posing as a trustworthy entity. This can occur in person, over the phone, or via computer.

Preventive Measures:

  • Be cautious about sharing personal information with strangers.
  • Verify the identity of anyone requesting sensitive information by asking for a callback number and confirming their credentials.
  • Stay vigilant and avoid providing personal information without proper verification.

Shoulder Surfing

Shoulder surfing happens when someone observes you entering a password or PIN, such as at an ATM or on a computer. This can occur in public places where people are in close proximity.

Preventive Measures:

  • Be aware of your surroundings when entering passwords or PINs.
  • Shield the keypad or screen from view when entering sensitive information.
  • Politely ask people to step back if they are too close.
  • Use cash or prepaid credit cards for transactions in public places.

Personal Property Theft

Identity thieves can steal your personal information by taking your wallet or purse, which often contains essential documents like credit cards and identification.

Preventive Measures:

  • Keep purses locked and secure, and carry them close to your body.
  • Men should button their wallets’ back pockets or carry them in front pockets.
  • Limit the number of credit cards you carry and avoid carrying your Social Security card.
  • Immediately notify your credit card company, bank, and credit bureaus if your wallet or purse is stolen.

Technological Schemes

Credit or Debit Card Theft

Credit card fraud involves using stolen credit card information to make unauthorized purchases or open new accounts in the victim’s name. Thieves can obtain this information through various means, including skimming devices and online breaches.

Preventive Measures:

  • Write “CID” on your card’s signature panel instead of signing it to require merchants to ask for additional ID.
  • Avoid giving your card to others, even for legitimate transactions.
  • Use prepaid credit cards for online purchases to minimize the risk.

Skimming

Skimming occurs when a device reads your credit card information from the magnetic stripe. Thieves can then create a clone of your card for illegal purchases.

Preventive Measures:

  • Regularly check your credit reports to detect unauthorized transactions.
  • Use cash or prepaid credit cards to minimize the risk of skimming.
  • Be cautious when using ATMs or card readers and report any suspicious devices.

Pretexting

Pretexting involves criminals using some of your personal information to trick you into revealing more sensitive data. They often pose as legitimate companies or organizations to gain your trust.

Preventive Measures:

  • Verify the identity of anyone requesting information by contacting the company directly.
  • Avoid sharing personal information without proper verification.
  • Report suspected pretexting scams to the Federal Trade Commission.

Man-in-the-Middle Attacks

In these attacks, criminals intercept communication between two parties to steal information. This can happen during online transactions or through unsecured networks.

Preventive Measures:

  • Always verify the URL of websites, especially for financial transactions.
  • Use secure, encrypted connections when accessing sensitive information.
  • Avoid using public Wi-Fi networks for transactions involving personal data.

Phishing

Phishing scams manipulate you into providing personal information through deceptive emails, text messages, or websites. These scams often mimic legitimate organizations to gain your trust.

Preventive Measures:

  • Verify the legitimacy of requests for sensitive information.
  • Check for secure website indicators like the padlock symbol.
  • Avoid providing personal data unless you are sure the request is genuine.
  • Report phishing attempts to relevant authorities and organizations.

Pharming

Pharming redirects you to a fake website designed to steal your information. Hackers tamper with a website’s host file or domain name system to achieve this.

Preventive Measures:

  • Check for secure website indicators and contact the website owner or organization to verify the request.
  • Avoid providing sensitive information on suspicious websites.
  • Report any suspicious activity to the relevant authorities.

Vishing

Vishing involves phone calls or robocalls that trick you into revealing personal information. Thieves often pose as representatives from legitimate organizations to gain your trust.

Preventive Measures:

  • Use caller ID to screen calls and verify the caller’s identity.
  • Avoid sharing personal information over the phone unless you initiate the call.
  • Report unwanted calls to your State Attorney’s Office.

SMiShing

SMiShing involves spam text messages that trick you into providing personal information. These messages often create a sense of urgency to prompt a quick response.

Preventive Measures:

  • Do not respond to unknown numbers or click on suspicious links.
  • Verify the legitimacy of requests by contacting the organization directly.
  • Report SMiShing attempts to relevant authorities and organizations.

Malware Phishing

Malware phishing attaches malicious software to emails or websites to steal your information. These programs can record keystrokes and monitor online activity.

Preventive Measures:

  • Verify the legitimacy of any download requests by contacting the organization directly.
  • Avoid responding to suspicious emails and downloading attachments from unknown sources.
  • Use antivirus software and keep it updated to detect and remove malware.

Spam Phishing

Spam phishing involves sending numerous spam emails to trick you into revealing personal information. These emails often offer fake opportunities or pose as legitimate organizations.

Preventive Measures:

  • Verify the legitimacy of offers by researching the company and checking websites like Scambusters.org.
  • Avoid clicking on links or downloading attachments from unknown sources.
  • Report spam phishing attempts to relevant authorities and organizations.

Targeted Phishing

Targeted phishing scams target businesses, requesting employees provide login information. These scams can compromise personal and company data.

Preventive Measures:

  • Always verify such requests with the organization directly.
  • Educate employees about the risks of targeted phishing and how to recognize suspicious emails.
  • The report targeted phishing attempts to relevant authorities and organizations.

Protecting Your Identity

Check your credit reports regularly and report any suspicious activity to the appropriate authorities. Our website’s Preventing Identity Theft section offers additional tips and resources. Amicus International Consulting provides expert services to protect your identity. Contact us for more information.

Additional Identity Crime Prevention Tips

Monitor Your Financial Accounts

Regularly monitoring your bank accounts, credit card statements, and financial transactions can help detect unauthorized activities early. Set up alerts for any unusual activity or transactions on your accounts.

Preventive Measures:

  • Check your financial accounts online regularly.
  • Set up email or text alerts for any suspicious transactions.
  • Report any unauthorized transactions to your financial institution immediately.

Use Strong Passwords

Strong passwords can significantly enhance your online security. Avoid using easily guessable information like birthdays or common words. Use a mix of letters, numbers, and special characters to create a robust password.

Preventive Measures:

  • Use unique passwords for different accounts.
  • Change your passwords regularly.
  • Consider using a password manager to keep track of your passwords securely.

Secure Your Devices

Ensure that your computers, smartphones, and other devices are secure. Use antivirus software, keep your operating systems updated, and enable security features like firewalls and encryption.

Preventive Measures:

  • Install and regularly update antivirus software.
  • Enable firewalls and encryption on your devices.
  • Avoid downloading software or apps from untrusted sources.

Be Cautious with Public Wi-Fi

Public Wi-Fi networks are often less secure and can be a target for hackers. Avoid accessing sensitive information or conducting financial transactions on public networks.

Preventive Measures:

  • Use a virtual private network (VPN) when accessing public Wi-Fi.
  • Avoid logging into sensitive accounts on public networks.
  • Turn off automatic Wi-Fi connections on your devices.

Protect Your Social Media Information

Social media platforms can be a rich source of information for identity thieves. Be cautious about what you share online and review your privacy settings regularly.

Preventive Measures:

  • Limit the personal information you share on social media.
  • Review and update your privacy settings.
  • Be cautious about accepting friend requests or connecting with unknown individuals.

What to Do If Your Identity Is Stolen

Despite your best efforts, identity theft can still occur. Knowing how to respond quickly can minimize the damage and help restore your identity.

Immediate Steps to Take

  1. Report the Theft:
    • Contact your bank, credit card companies, and other financial institutions immediately.
    • Report the theft to the Federal Trade Commission (FTC) at IdentityTheft.gov.
  2. Place Fraud Alerts:
    • Contact one of the three major credit bureaus (Equifax, Experian, TransUnion) to place a fraud alert on your credit reports.
  3. Review Your Credit Reports:
    • Obtain and review your credit reports from all three major credit bureaus.
    • Look for any unauthorized accounts or transactions.
  4. File a Police Report:
    • File a report with your local police department.
    • Provide as much information as possible and obtain a copy of the report.
  5. Create an Identity Theft Report:
    • Create an identity theft report through the FTC’s website.
    • Use this report to help remove fraudulent accounts and resolve identity theft issues.

Long-Term Recovery Steps

  1. Monitor Your Credit:
    • Continue monitoring your credit reports and financial accounts regularly.
    • Consider enrolling in a credit monitoring service.
  2. Dispute Fraudulent Accounts:
    • Contact businesses where fraudulent accounts were opened.
    • Provide them with your identity theft report and request that the accounts be closed.
  3. Correct Your Credit Reports:
    • Work with the credit bureaus to correct any inaccuracies on your credit reports.
    • Provide them with copies of your identity theft report and police report.
  4. Prevent Future Theft:
    • Take steps to secure your personal information and prevent future identity theft.
    • Follow the preventive measures outlined in this blog.

Conclusion

By understanding the various types of identity crimes and taking proactive steps to safeguard your personal information, you can significantly reduce the risk of becoming a victim of identity theft. Stay vigilant, and take advantage of the resources and preventive measures available to protect your identity.

Amicus International Consulting is here to help you with expert services to secure your identity and provide guidance on preventing identity theft. Contact us for more information.

If you would like to work with a professional team that can help make your transition to a life of freedom, contact Amicus Int. for New Identity services today.