
Updated · Mar 28, 2023
Updated · Jan 26, 2023
We’ve all been punished for things we didn’t do as kids. However, as you get older, you might begin wishing you could get away with just a scolding from mom. Thankfully, the “it wasn’t me, but him” argument doesn’t pass in most establishments. An ill-wisher will need much more to fool the bank that you took out that loan and not them.
That’s where other people’s information becomes a sort of twisted commodity. As more people fall victim to this crime, it begs the question - what is identity theft? How likely is it that you’re at risk?
You may be surprised at how common this crime actually is. One in every 15 people has experienced some form of identity fraud in the last year. It also resulted in $16.8 billion being stolen.
The best way you could avoid becoming a number in these statistics is by learning more. Being aware of the methods used by criminals is your first line of defense. This will give you some quick, actionable ideas that will massively improve your ID’s safety. So let’s dive right in!
By definition, identity theft is the illegal practice of using someone else’s personal information, usually for financial gain. Impersonators often hunt for driver’s license or Social Security numbers with the intention of taking out loans or purchasing merchandise. There’ve also been cases of criminals presenting stolen credentials to the police.
Speaking of law enforcement, you may be wondering what type of crime identity theft is. Thankfully, it’s a felony and often results in incarceration for several years. This will also depend on the impact it has had on the victim's life.
Despite what the penalty for identity theft is, fraudsters keep coming up with new ways to steal your data. Let’s take a look at some of the more common scams.
This method relies on using personal information to gain access to already existing user profiles. It usually focuses on withdrawing funds from bank accounts or running up huge bills. Once a criminal has taken over, they can change the email address associated with the profile, making it harder to realize what’s happening. This fraud is quite popular, as online transactions are becoming the more common method of payment.
Once the scammers get their hands on your name and Social Security number, they could file your tax return before you do. It’s also not uncommon for them to alter your income and withhold numbers in order to get more money. The good news is you can protect yourself and get a Tax ID pin number. Thanks to measures like this, there’s been a 57% decline in 2017 compared to 2015, saving taxpayers more than $20 billion.
The goal of this scam is not always money, but medical services or prescription drugs. In some cases, fraudsters may obtain expensive equipment and sell it on the black market. To avoid falling a victim to this scam, you need to protect your insurance member number and the identification number assigned to you by your healthcare provider.
You can do that by reviewing the claims you get in the mail. You can also go online to monitor all medical activity done in your name. Keep in mind this is one of the hardest scams to notice.
Hospitals account for 30% of all large data breaches. Now that you know what medical identity theft is, make sure to take the needed steps and keep your personal information safe.
This is one of the better-known scams. In this age of online and contactless payment, losing your card can seriously impact your finances. However, even without access to your physical card, fraudsters can still make unauthorized transactions - if they get their hands on your account number, PIN, and security code.
Regularly checking your card’s transfers is the best way to protect yourself from identity theft. You should also make sure to never submit your payment information to shady websites.
This scam is very straightforward and is actually the most common type of ID fraud. Your driver’s license might be sold off to a person physically similar to you - or the thief could use it to buy items under your name.
In case they’re caught for a traffic violation, you might even find yourself wanted by the police. Which in turn can affect your insurance prices. So keep a close eye on your driver’s license and consider a fraud alert on your credit file to protect yourself.
There are two ways as to how this type of identity theft is committed.
One breed of scammers would target shopping websites, set up a profile, and try to seem genuine for a while before proceeding with their scheme. The other would take over existing client accounts to purchase goods, using the original owner’s payment information. Conveniently, they’ll have the actual products delivered to a different address.
To protect yourself, avoid reusing your password and filling in your information on shady sites - no matter how enticing the discount they’re offering is.
According to the FTC, this is the fastest-growing type of ID fraud and it amounts to about 85% of all stolen identity cases. If a scammer obtains someone’s name, address, phone number, or, especially, Social Security number - they’ll create a new personal file with both real and fake data.
Then, these identities can help the scammer take out loans, access already available financial services, or apply for jobs. They can also simply sell them on the dark web. If you start receiving phone calls or emails, addressing you with a different name, that may be a sign your data has been stolen. Thankfully you can do a background check to see who the imposter is.
Now that we’ve gone through the definition of identity theft and some of the most popular scams, let’s see which groups of people are more likely to be targeted.
The highest risk group for identity scams are young adults. Research showed 40% of fraud victims in 2017 were between 20 and 29 years old. One of the reasons is that they tend to use cards as a payment method regularly, allowing fraudsters more chances to steal their data.
Young people are also more likely to reveal personal information online. This can happen through social media or when shopping from their smartphones while using public (and unprotected) Wi-Fi spots.
Seniors also tend to experience identity theft - about 18% of victims are over 79. Elderly people lost much more on average - $1,092 in comparison to $400 for young adults.
This group is preferred by scammers, as seniors are used to providing their medical and insurance data. They also tend to be less aware of the various methods a fraudster may use.
As they’re less likely to need credit, elderly people don’t monitor their accounts as closely. This makes them an ideal target for identity theft and fraud. Scammers often establish relationships over the phone or by email and manipulate them into sharing personal information. More than 30% of bank account takeovers are of people over 60.
We’re also seeing a rise in child identity theft - Experian studies indicate this crime can affect 1 in 4 kids under 18 years of age. Medical and school information is getting digitized and youngsters are showing up online at an earlier age. This allows hackers more ways of getting their hands on valuable personal data.
A child’s Social Security number might seem next to useless at first. In reality, it can be used to take out loans or government benefits and this can remain unnoticed for years. Reports show that more than 1 million children in the U.S. suffered identity fraud - resulting in $2.6 billion in losses. It makes sense, then, to teach your kids to be cautious about revealing personal information.
People who make more than $75,000 represent 10% of all fraud victims. The reasoning behind it is clear - they are more profitable targets.
Wealthy people also often use credit cards and have multiple accounts, which gives thieves more access points.
If your password is your birthday or, even worse, simply “password” - you may want to consider something more original. A computer would need less than 10 minutes to crack that. And, if you use the same password for more than one website - you’re at big risk of making it into the ID theft statistics. To improve your safety, create a strong password.
Now that we know what identity theft is, you may be wondering who would commit such a crime.
We tend to imagine such a person as a hardened criminal without morals. However, the average fraudster has no history of crime, is between 31 and 45 years old, and a bit more likely to be male.
Even more unexpectedly, identity theft stats reveal it’s fairly possible you know the scammer - especially in cases of child or senior fraud.
If your kid’s SSN was stolen, there’s a 33% chance it was a family friend who did it... and an 18% chance it was your spouse. Seniors can often be coerced into sharing their data by those caring for them.
If a fraudster has already gotten their hands on your information, you need to take action as soon as possible. Knowing what an FTC identity theft report is and how to use it may be crucial for damage control.
You can use this report to:
Additionally, we suggest visiting identitytheft.gov - the government’s website, specifically designed to handle such cases. You can get a personal recovery plan and other information to help you. However, looking up more identity theft articles may also be useful when getting to know what your options are.
Alright, so we already know the definition of identity theft. We also discovered why scammers may need your information. Now let’s see how they can actually obtain it.
First, let’s look at the good old-fashioned physical ID theft. It’s no longer as popular as it used to be, but it’s still worth a mention.
This method relies on discarded sensitive information. Thieves usually lurk around business trash, dive into the dumpster, and look for anything that could be useful - paperwork or mail. Shredding all personal documents is a key way to protect yourself.
If someone’s standing next to you while you’re filling in documents or providing information over the phone, they may be trying to steal it. Always keep an eye on your surroundings when you’re using personal data.
Digital data breaches are a more common way of extracting valuable personal information. There are several distinct approaches a scammer may use.
Has a Nigerian prince ever contacted you with promises of riches in exchange for some personal information? If you didn’t respond to that email - congrats, you’ve successfully fended off a phishing attack!
In this type of ID fraud, criminals usually present themselves as a trustworthy institution or person. They can reach out to you by email, phone, or even in social media and request your data or persuade you to open malicious links and attachments. After all, it’s much easier to fool a person than to successfully bypass a computer’s defenses.
Some phishing attackers use social networking to learn more about their victims beforehand. When they finally reach out, the danger may not be so plainly obvious.
Fraudsters also use a technique called reconnaissance so the user won’t notice the signs of identity theft. When attacking businesses, they phish for any information about important employees and even the company’s lingo in order to be able to write believable emails.
Attackers may go so far as to create a website, visually similar to that of the organization they’re impersonating. They also often use misspelled domain names to fool people into opening their links.
A couple of variations have managed to spring forth from this type of ID theft scam. These include:
Despite the long list, there still are ways to protect yourself from this type of ID theft. The first step is being aware of what phishing messages usually sound like. Additionally, you can use an email filter and avoid potentially malicious websites.
Malware is one of the most popular means of a cyber attack.
Malware is any program, designed to harm your computer. It can be installed on your device through a USB or CD drive, and more commonly - via the internet.
The thing about malicious links and infected attachments is they look like normal ones. You won’t even realize your computer has been infected unless you know how to scan for them.
There’s a wide variety of malware programs, but facts point to Trojan horses and spyware as the most likely culprits when it comes to identity theft.
To protect yourself from malware, it’s highly recommended to be careful with the websites you visit and the files you download. Scanning your system with a good antivirus program can also come in handy.
Keylogging is by definition almost exclusively a tool for identity theft. Although it can be used for legitimate monitoring in business, criminals have realized its potential and hijacked it for less than noble purposes.
Keystroke logging is usually a malicious spyware program that records all keystrokes on a computer without the user’s knowledge. It can capture your personal details, payment information or passwords and send it to criminals. It’s not hard to see why this could be a problem.
Detecting these programs can also be hard, as they don’t really pop up on your desktop. One sign you may be the victim of this ID scam is if there’s a delay in symbols appearing on the screen as you type.
The good news is there are several antivirus programs that can find and remove the keylogger. To avoid getting infected in the first place, the best measure you can take are to avoid:
On the proactive side of things - you should keep your operating system, web browsers, and other software products up to date. The latest versions contain new security patches that will put your security at least partially on autopilot.
A good anti-spyware program can also help.
Now we know:
Knowing all this drastically lowers the chances of actually having to deal with such an issue.
As in that awkward class in seventh grade, the most important thing to remember is to use protection and not to share too much with strangers. Or, in other words, the best way to avoid suffering your mother’s wrath is to make sure her vase stays intact in the first place.
Christina Vukova
Technology's awesome! We were lucky to be born in the era of inventions. I mean - Oculus Rift, self-driving Teslas, that weird dog-like Boston Dynamics robot that gets kicked around... It's starting to look more and more like magic, just as Arthur C. Clarke predicted! What I'm trying to say is that writing for TechJury has combined two of my greatest passions. As an engineer, I feel compelled to take things apart and look into how they work. And as an overly talkative person, I just have to share what I've learned with you! When I'm not working, I enjoy literature (of any kind), music (of the heavier kind), nature (of the greener, lack-of-sand-y kind) and binge-watching TV series (of the GOT kind).
Latest from Author
Your email address will not be published.
Updated · Mar 28, 2023
Updated · Mar 23, 2023
Updated · Mar 22, 2023
Updated · Mar 21, 2023