0% found this document useful (0 votes)
242 views7 pages

Id Theft

Uploaded by

rowaxad868
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
242 views7 pages

Id Theft

Uploaded by

rowaxad868
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

4.

14 Identity Theft (ID Theft)


 This term is used to refer to fraud that involves someone pretending to be
someone else to steal money or get other benefits.
 ID theft is a punishable offense under the Indian IT Act (Section 66C and Section
66D).
 The statistics on ID theft proves the severity of this fraud and hence a non-profit
organization was found in the US, named as Identity Theft Resource Center
(ITRC), with the objective to extend the support to the society to spread
awareness about this fraud.
 Federal Trade Commission (FTC) has provided the statistics about each one of
the identity fraud mentioning prime frauds presented below.
1. Credit card fraud (26%):
2. Bank fraud (17%): Besides credit card fraud, cheque theft and Automatic Teller
Machines
(ATM) pass code theft have been reported that are possible with ID theft
3. Employment fraud (12%): In this fraud, the attacker borrows the victim’s valid SSN to
obtain a job.
4. Government fraud (9%): This type of fraud includes SSN, driver license and income
tax fraud.
5. Loan fraud (5%): It occurs when the attacker applies for a loan on the victim’s name
and this can occur even if the SSN does not match the name exactly.
It is important to note the various usage of ID theft information.
1. 66% of victims’ personal information is used to open a new credit account in their
name.
2. 28% of victims’ personal information is used to purchase cell phone service.
3. 12% of victims end up having warrants issued in their name for financial crimes
committed by the identity thief.
Personally Identifiable Information (PII)
The fraudsters attempts to steal the elements mentioned below, which can express the
purpose of distinguishing individual identity:
1. Full name;
2. national identification number (e.g., SSN);
3. telephone number and mobile phone number;
4. driver’s license number;
5. credit card numbers;
6. digital identity (e.g., E-Mail address, online account ID and password);
7. birth date/birth day;
8. birthplace;
9. face and fingerprints.
The information can be further classified as
(a) non-classifi ed and
(b) classified.
1. Non-classified information
• Public information:
• Personal information:
• Routine business information:

• Private information:

2. Classified information
• Confidential: Information that requires protection and unauthorized disclosure could
damage national security (e.g., information about strength of armed forces and
technical information about weapons).
• Secret: Information that requires substantial protection and unauthorized disclosure
could seriously damage national security (e.g., national security policy, military plans
or intelligence operations).
• Top secret: Information that requires the highest degree of protection and
unauthorized disclosure could severely damage national security (e.g., vital defense
plans and cryptologic intelligence systems).

ID theft fraudsters and/or industrial/international spies target to gain the access to


private, confidential, secret and top secret information.

Types of Identity Theft


1. Financial identity theft;
2. criminal identity theft;
3. identity cloning;
4. business identity theft;
5. medical identity theft;
6. synthetic identity theft;
7. child identity theft.

What Is Identity Theft?


Identity theft happens when someone uses your personal information without
your permission—such as your Social Security number, bank account
number, and credit card information— to gain financial benefits or commit
fraud. Thieves can use your information to access personal accounts, open
up new accounts without your permission, make unauthorized transactions,
or commit crimes.

Thieves can steal anything from a credit card or bank account number to a
driver's license or passport. Victims of identity theft often end up with
damaged credit, incorrect information added to their records, or wrongful
arrest.

To protect yourself, stay informed about data breaches, report any security
incidents, and consider freezing your credit.

 Identity theft occurs when someone steals your personal information


and credentials to commit fraud.
 There are various forms of identity theft, but the most common is
financial.
 Identity theft protection keeps track of people's credit reports, financial
activity, and Social Security number use.
 Recovering from the damage caused by identity theft can take
substantial time and effort.
 If you are the victim of identity theft, contact the Federal Trade
Commission at IdentityTheft.

Types of Identity Theft


There are several types of identity theft, including:

Financial Identity Theft


Financial identity theft occurs when someone uses another person's identity
or information to obtain credit, goods, services, or benefits. This is the most
common form of identity theft.1

Social Security Identity Theft


Thieves use stolen Social Security numbers to apply for credit cards and
loans resulting in unpaid balances. Fraudsters can also use your number to
receive medical, disability, and other benefits.

Medical Identity Theft


In medical identity theft, someone poses as another person to obtain free
medical care or benefits.3

Synthetic Identity Theft


Synthetic identity theft is a type of fraud in which a criminal combines real
(often stolen) and fake information to create a new identity for fraudulent
accounts and purchases. Synthetic identity theft allows criminals to steal
money from credit card companies and lenders who extend credit to them
based on their fake identities.3

Child Identity Theft


Child and teen identity theft involves using a child's identity for personal gain.
This is common, as children typically do not have the capability to take steps
to create obstacles for the perpetrator.

The fraudster may use the child's name and Social Security number to obtain
a residence, find employment, obtain loans, or avoid arrest on outstanding
warrants. Often, the victim is a family member, the child of a friend, or
someone else close to the perpetrator. Some people even steal the personal
information of deceased loved ones.3

Tax Identity Theft


Tax identity theft occurs when someone uses your personal information to file
a bogus state or federal tax return in your name and collect a refund.3
Criminal Identity Theft
In criminal identity theft, a criminal poses as another person during an arrest
to try to avoid a summons, prevent the discovery of a warrant issued in their
real name, or avoid an arrest or conviction record

Examples of Identity Theft


It can be difficult to know if you've been a victim of identity theft, especially if
you don't check your financial statements regularly. Some clear indicators of
identity theft include:

 Bills for items that you didn't buy that you discover on your credit card
statement, online account, or via invoices by email or U.S. mail
 Calls from debt collectors on accounts you didn't open
 Loan application denials despite thinking your credit is in good standing
 Bounced checks
 A warrant for your arrest
 Unfounded medical bills and explanations of benefits (EOBs) from an
insurance company
 Utilities being shut off
 Difficulty signing into accounts
 Inexplicable hard inquiries into your credit report
 New credit cards in your name that you didn't apply for

How to Protect Yourself From Identity Theft

 Monitor your accounts regularly: Review your credit report for


suspicious activity and check bank and credit card statements often to
ensure there are no unauthorized transactions
 Use strong passwords: Avoid easy passwords that contain personal
or identifiable information. Create passwords with letters, numbers, and
symbols.
 Enable two-factor authentication (2FA): Activate 2FA when available
on accounts to add an extra layer of security.
 Be cautious online: Limit sharing personal information on social media
and try to always be connected to a secure and private internet
connection.
 Stay Informed About Data Breaches: Keep an eye on news about
data breaches involving companies where you have accounts and take
action if your information may have been compromised.
 Watch for phishing scams: Always verify links and sources before
providing any details.
 Consider Credit Freezes: A credit freeze will restrict access to your
credit report making it hard for a thief to open an account with your
information

Recovering From Identity Theft


Recovery can be a lengthy process. After filing a report with the FTC, take
these steps:

1. Place fraud alerts on all of your credit reports. Fraud alerts are an
added layer of protection in that lenders must confirm your identity
before opening an account, usually via phone.
2. Freeze your credit reports. Freezing your reports prevents access to
any credit information. Your credit report is removed from circulation so
that a lender cannot access it. If access is denied, no account in your
name can be opened.
3. Contact all of the companies involved in the identity
theft. Demonstrate to them that you are a victim of such theft, that you
did not open any accounts, and that no purchases of goods or services
are legitimate.
4. File complaints and dispute charges. Share any other reports you
have filed, such as police reports or reports with the FTC. The Fair
Credit Billing Act and the Electronic Funds Transfer Act work in your
favor.
5. Contact all credit reporting agencies. Dispute any incorrect charges
and information on your credit reports.
6. Contact your bank(s) and credit card companies. Request that they
close your current credit and debit cards and issue you new ones.
7. Change all of your login and password information. Update
passwords and turn on 2FA.
8. Monitor your credit reports. Keep an eye out to ensure that your
personal and financial information remains secure and unavailable to
thieves.

Identity theft is when someone uses another person's personal information for
their own benefit without permission. There are many techniques that
criminals use to steal identities, including:
Techniques of ID Theft
1. Human-based methods:
• Direct access to information:
• Dumpster diving:
• Theft of a purse or wallet:
• Mail theft and rerouting:
• Shoulder surfing:
• Dishonest or mistreated employees:
• Telemarketing and fake telephone calls:

 Physical theft: Dumpster diving, mail theft, skimming, and changing


addresses.
 Document theft: Stealing data from an ID document, such as a passport or
driver's license

 Computer-based technique:
• Backup theft:
• Hacking, unauthorized access to systems and database theft:
• Phishing:
• Pharming:
• Hardware:

 Technology-based: Phishing, pharming, DNS cache poisoning, wardriving,


spyware, malware, and viruses

You might also like