123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Education >> View Article

How Identity Theft Works And How To Protect Yourself

Profile Picture
By Author: Jim DeSantis
Total Articles: 103
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Identity theft is one of the fastest growing crimes in America. Every day thousands of people suffer immediate financial hardship and long-term difficulty because their personal information has been compromised. But there are free steps you can take to protect yourself.

For the seventh straight year, the Federal Trade Commission says identity theft is the largest consumer complaint and the fastest growing crime in America. In 2007, the FBI reported that identity theft affected 9.91 million Americans. There are probably many more cases that went unreported. It accounted for $52,600,000,000 (billion) in losses in 2007.

In a way we can thank the U.S. Congress for the increase in identity theft. Congressionally-mandated use of the Social Security number as an identifier facilitates the horrendous crime of identity theft. Thanks to Congress, an unscrupulous person may simply obtain someone's Social Security number in order to access that person's bank accounts, credit cards, and other financial assets. Many Americans have lost their life savings and had their credit destroyed as a result of identity theft. Yet the ...
... federal government continues to encourage such crimes by mandating use of the Social Security number as a uniform ID!

In the rush to respond to identity fraud, too often organizations believe that credit monitoring is the beginning and end of the solution. The fact is that credit monitoring is only one of the necessary elements. Credit reports only inform you AFTER fraud has occurred. Because of their commitment to safeguarding the financial security of working families, labor unions are now advocating that their members place identity theft protection high on their priority lists. Effective identity theft protection for union members should include a wide array of proactive and responsive components.

Identity thieves and hackers target home computers because they know families often do not maintain adequate security protection on their PCs. This makes these family users easy, lucrative sources. Many hackers access your personal information in order to steal your money and your identity or use your home computer as a shield to mask their identity as they steal from others.

Credit reports contain all the information any thief would need to steal existing accounts, or to swipe your identity completely and cause major financial harm. There are several ways those in the credit reporting industry manage to balance the need for accurate account information to issue credit ratings, while keeping enough information hidden to protect you from theft. But, not all systems are hacker proof. Data security standards are extremely high, and audits are frequent but not all systems are hacker proof.

Group identity theft has also become a major problem for consumers. A thief gains access to a place that keeps records for many people. Targets have included stores, fitness centers, car dealers, schools, hospitals, and even credit bureaus. Thieves may either use the stolen identities themselves or sell them to other criminals.

One of the most used scams is called "Pretexting". The identity thief poses as a legitimate representative of a survey firm, bank, Internet service provider, employer, landlord, or even a government agency. The thief contacts you through the mail, telephone, or e-mail, and attempts to get you to reveal your information, usually by asking you to "verify" some data.

They usually ask for your full name, social security number, and date of birth. Then, they want bank and credit card numbers and expiration dates, any financial records they can get you to reveal.

They are many ways to protect yourself. Most of all, never give your information to a stranger, especially via email or telephone, and always contact the institution they claim to represent to check legitimacy.

Jim DeSantis

Jim DeSantis is a retired broadcast journalist. For his free report - How To Protect Yourself From Identity Theft - visit Jim's website at

Total Views: 354Word Count: 650See All articles From Author

Add Comment

Education Articles

1. Mlops Online Course | Mlops Online Training
Author: visualpath

2. How To Transform Traditional Business Into Digital Business
Author: Sandeep Bhansali

3. The Importance Of Synonyms For Ielts
Author: lily bloom

4. The Importance Of Early Dyslexia Diagnosis And Intervention
Author: Bradly Franklin

5. 10 Ways To Support Students Who Struggle With Reading Comprehension Skills
Author: James Carter

6. Dsssb Coaching In Rohini – Your Pathway To Success
Author: Bharat Soft Tech

7. Become A Java Pro: The Ultimate Guide To Java Design Patterns
Author: login 360

8. 5 Reasons Why Jaipur’s Top Coaching Institutes Are Perfect For Ssc, Bank & Railways Preparation
Author: power minds

9. Mastering The Gre With Edunirvana - Your Pathway To Graduate Success
Author: sharvani

10. Which Is The Best Icse School For Primary Education In Bhopal?
Author: Adity Sharma

11. Paying For Assignment Help: A Guide To Making The Right Choice
Author: liam taylor

12. Golang Training In Hyderabad | Golang Online Training
Author: Hari

13. The Top No1 Terraform Training Institute In Hyderabad
Author: SIVA

14. Best Ai With Aws Training Online | Aws Ai Certification
Author: Madhavi

15. Generative Ai Training | Best Generative Ai Course In Hyderabad
Author: Renuka

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: