Absolute Beginners Guide to Security, Spam, Spyware & Viruses
If you wanted to pretend you were me, what would it take to fool my devastatingly gorgeous girlfriend? Well, you'd need to learn to walk, talk, and look like me. Plus you'd need plastic surgery to web up your toes like mine (my grandmother said I'd never drown!). And you'd have to be a good kisser. It would take some effort. But if you wanted to convince my bank that you were me, it wouldn't be quite as difficult. You'd need my wallet, my address, a good forged driver's license, and certainly the ability to sign like me. It would be an easier impersonation, but still would take some effort. But what if you had my online banking user ID and password and an Internet connection? You could log on to the Web as if you were me and then it would be bye-bye savings account and the $637.34 in it. That's what's called simple identity theft . You obtain the electronic keys to my digital piggybank, smash it open , and disappear into the bits and bytes flowing across the Internet. But identity theft can be more complex. It's not always just a smash and grab proposition. It starts with a thief obtaining your personal information, such as your name , Social Security number, credit card numbers , or other identifying information. They then get financial and identity tools issued to them in your name, including bank accounts, checks, and even government-issued documents. Think of it as creating a clone of a person's paper trail. A crook can then apply for credit and nurture and protect the accounts, perhaps even making small payments to generate more credit. They might do this over the course of two to three years to generate a decent credit portfolio. The big pay off comes when they cash out, making a purchase worth $20,000 to $100,000 and then disappear, leaving you on the hook to pay off the debt and deal with a devastated credit history. Some identity theft basics are discussed next . Later in the chapter, specific technology threats that impact identity theft are covered. Techniques Thieves Use to Steal Your Identity
Identity thieves use a myriad techniques to steal your identity. To start, all they need is some initial seed information to build on. Think about the kind of information organizations ask you for when you apply for anything: perhaps a membership, say with your health club; a financial tool such as a credit card or bank account; or even an entry for a contest. The basics would be your name, address, and phone number. While this information can be publicly available to anyone who cares to look, you become vulnerable when a potential identity thief can pair it with more detailed information about you. Your birth date might be common knowledge among your friends and family but no one else needs to know. Be careful about providing any piece of identification or information that wouldn't be listed publicly. After a thief has gathered the basics on you and has one critical identity tool, such as a driver's license number or Social Security number, they can then use that to research more information about you and create an identity document. What they do is build a portfolio on you until they have enough information to apply for a credit or financial tool in your name. After they have that, all they need to do is use the tool and nurture it. They'll make deposits and withdrawals in an account. Or use a credit card to make modest payments and pay off the balance. This can go on for months. Slowly they build up creditworthiness that allows them to apply for more credit. The endgame is to create such a large credit facility that they can cash out. They'll extract the most money they can out of the credit tools they have nurtured and leave you on the hook. When the credit-offering organization attempts to collect, they will come to you and not the thief because by their records it looks like you are the one who has been using its credit services. How They Become You: Identity Theft Techniques
According to the U.S. Federal Trade Commission, here's how thieves get their hands on your identity:
Preventative Measures: How to Not Become a Victim
Avoiding identity theft takes just a few slight adjustments in the way you run your life. Here are some tips:
Signs You're a Victim
Victims often don't know they have become victims of identity theft until it's too late. Here are some signs you might already be a victim or might be at risk:
What to Do If You're an Identity Theft Victim
You're going to be very busy if you discover you have been victimized by an identity thief. Clearing your name is not easy and can take a lot of time. Some key steps you should take to make the process easier are
Tip
|