Identity Theft & Fraud
Identity Theft and Fraud
Identity theft occurs when someone uses your personal information such as:
Social Security number
Credit card number or other identifying information without your permission to commit fraud or other crimes
Types of Identity Theft
Thieves rummage through trashcans for pieces of unshredded personal information that they can use or sell.
Crooks seek out and steal from unattended/unlocked mailboxes to obtain pre-approved credit offers, bank statements, tax forms, and/or convenience checks.
ATM Theft, Skimming
Thieves secretly attach electronic devices on an ATM to capture numbers when customers swipe their cards. This may include a tiny camera to record the PIN number a customer enters for the transaction. The skimming device may be taped over the card reader.
A dishonest employee.
An individual who fraudulently poses as someone who had a legitimate or legal reason to access the victim's personal information (e.g., landlord, an employer, marketer, etc.).
Direct Access to Personal Documents in the Home
Unfortunately, there are identity thieves who can gain legitimate access into someone's home and personal information through household work, babysitting, healthcare, friends or roommates, etc.
Stolen purses and wallets usually contain plenty of bankcards and personal identification. A thief can have a field day using this information to obtain credit under the victim's name or to sell the information to an organized-crime ring.
Types of Online Fraud
Online Banking is generally safe, but it is good to be careful when you are online. Below are some types of online fraud.
Cyber-thieves use a software application that can be remotely installed on your computer without you knowing. This special snoopware lets the thief access everything you do online. Be wary of email attachments and Web sites you don't know.
Thieves have purchased sensitive personal information about someone (e.g., name, address, phone numbers, Social Security number, birth date, etc.) from an online broker.
Thieves who appear to be trusted financial institutions use phony emails to hook someone into giving them your financial and personal information.