SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
PREVENTING IDENTITY THEFT:
                                  a GUIDE for CONSUMERS




  NATIONAL CRIME PREVENTION COUNCIL
NATIONAL CRIME PREVENTION COUNCIL



The National Crime Prevention Council (NCPC) is a
private, nonprofit tax-exempt [501(c)(3)] organization
whose primary mission is to enable people to create
safer and more caring communities by addressing the
causes of crime and violence and reducing the oppor-
tunities for crime to occur. NCPC publishes books,
kits of camera-ready program materials, posters, and
informational and policy reports on a variety of crime
prevention and community-building subjects. NCPC
offers training, technical assistance, and a national
focus for crime prevention: it acts as secretariat for
the Crime Prevention Coalition of America, more than
360 national, federal, state, and local organizations
committed to preventing crime. It hosts a number of
websites that offer prevention tips to individuals,
describe prevention practices for community building,
and help anchor prevention policy into laws and
budgets. It operates demonstration programs in
schools, neighborhoods, and entire jurisdictions and
takes a major leadership role in youth crime preven-
tion and youth service; it also administers the Center
for Faith and Service. NCPC manages the McGruff®
“Take A Bite Out Of Crime®” public service advertising
campaign. NCPC is funded through a variety of gov-
ernment agencies, corporate and private foundations,
and donations from private individuals.




This publication was made possible through Cooperative         Copyright © 2005 National Crime Prevention Council
Funding Agreement No. 2002-DD-BX-K004 from the
Bureau of Justice Assistance, Office of Justice Programs,      All rights reserved.
U.S. Department of Justice. Opinions are those of NCPC or
cited sources and do not necessarily reflect U.S.              Printed in the United States of America
Department of Justice policy or positions. The Bureau of       July 2005
Justice Assistance is a component of the Office of Justice
Programs, which also includes the Bureau of Justice            National Crime Prevention Council
Statistics, the National Institute of Justice, the Office of   1000 Connecticut Avenue, NW, Thirteenth Floor
Juvenile Justice and Delinquency Prevention, and the           Washington, DC 20036-5325
Office for Victims of Crime.                                   202-466-6272
                                                               www.ncpc.org

                                                               ISBN 1-59686-011-1
INTRODUCTION
Few crimes have made people more anxious more
quickly as the sudden onslaught of identity theft.
It’s in the newspapers every day and on the news every night. People are

worried that someone’s going to run up charges on their credit cards or fleece

their bank accounts while their backs are turned. And there’s some reason to

worry: All a thief has to do is steal something as basic as a Social Security

number to become a real public enemy. And while these crimes are relatively

easy to commit, investigating and prosecuting them are complex and time-

consuming matters. So it’s up to all of us to be identity-smart and make sure

we keep this crime from spreading. It’s a battle we can win. Follow the tips in

this booklet, be careful, and we’ll keep a big step ahead of identity thieves. It’s

up to all of us to prevent identity theft.

                    —Al Lenhardt, president and CEO, National Crime Prevention Council




                                                                                         1
WHAT’S IDENTITY THEFT?

    The U.S. Department of Justice defines identity theft this way:
    “Identity theft is a crime. Identity theft and identity fraud are terms used
    to refer to all types of crime in which someone wrongfully obtains and
    uses another person’s personal data in some way that involves fraud or
    deception, typically for economic gain.”



                                               FACTS AND FIGURES
                                               These statistics about identity theft
                                               are worth knowing.
                                               According to the U.S. Postal Service, there were
                                               almost ten million incidents of identity theft in
                                               the United States in 2004, a huge figure
                                               dwarfed only by its cost to consumers—$5 bil-
                                               lion. And limiting your use of your personal
                                               computer may not help much: a study released
                                               in January 2005 by the Better Business Bureau
                                               and Javelin Strategy and Research reported
                                               that most identity thefts take place offline, not
                                               online—just the opposite of what many folks
                                               might think. In fact, the study found, the theft
                                               of online information accounted for only 11.6
                                               percent of identity fraud cases.




2
§ Half of all identity theftsthe
                                                     committed by someone
                                                                                 are

                                                             victim knows.




Nonetheless, a rash of headline-grabbing        In another study, covering 2004, the FTC
scandals involving thefts of millions of per-   reported that of 635,000 complaints regis-
sonal records, together with the advent of      tered with the agency, 61 percent involved
phishing and pharming thefts (see page 5),      fraud and 39 percent were identity theft
may well change that figure dramatically in     complaints. This study also revealed the fol-
2005. One other troubling finding: the study    lowing:
found that half of all identity thefts are
                                                I Credit card fraud was the most common
committed by someone the victim knows.
                                                  form of identity theft, accounting for 28
                                                  percent of thefts reported.
In spring 2003, the Federal Trade
Commission (FTC)—the federal agency             I Phone or utilities fraud was next,
responsible for tracking identity theft—con-      accounting for 19 percent of identity
ducted a major study of this crime. Among         thefts reported.
its findings:                                   I Bank fraud followed, accounting for 18
                                                  percent of identity thefts reported.
I 12.7 percent of respondents reported that
  they had been victims of identity theft at
  some time over the past five years. This      The FTC also presented some figures about
  implies that at least 27 million              identity theft committed over the Internet.
  Americans had their identities stolen.
                                                Of 205,568 Internet-related complaints, 90
I Victims reported that they spent 30           percent of the victims reported they had
  hours, on average, cleaning up after an       suffered a financial loss. The average loss
  identity crime at an average cost of          was $1,440.
  $500.
                                                According to the FTC, the highest reports of
                                                identity theft occurred in Phoenix-Mesa-
                                                Scottsdale, AZ; Riverside-San Bernardino-
                                                Ontario, CA; and Las Vegas-Paradise, NV.
                                                While sunny Phoenix and Las Vegas are
                                                retirement meccas, the FTC found that of all
                                                those who reported being victimized in the
                                                United States, only 9 percent were 60 and
                                                over while the largest number, 29 percent,
                                                were in the 18 to 29 age group.


                                                                                                3
A CROOK’S BAG OF TRICKS

    Watch Out for Thefts Like These
    Here’s a sample of the way identity thieves commit   I Steal the Social Security numbers and iden-
    their crimes.                                          tities of children who are especially vulnera-
                                                           ble because they don’t have credit histories
    I File a change of address form in your name to        and it may be many years before the theft is
      divert mail and gather personal and financial        discovered
      data
                                                         I Lift names and Social Security numbers
    I Steal credit card payments and other outgoing        from such documents as a driver’s license,
      mail from private, curbside mailboxes                employee badge, student ID card, check, or
                                                           medical chart
    I Lift driver’s license numbers, Social Security
      numbers, phone numbers, or other identifiers       I Use personal information from a Who’s
      from checks                                          Who book or a newspaper article

    I Steal mail, especially envelopes containing bill   I Use the personal information of a relative or
      payments, from unlocked, unguarded, “out             someone he or she knows well, perhaps by
      boxes” at work                                       being a frequent visitor to their home

    I Go “dumpster diving” by digging through            I Pretend to be government officials or legiti-
      garbage cans or communal dumpsters in search         mate business people who need to gather
      of cancelled checks, credit card and bank state-     personal information from credit reporting
      ments, or preapproved credit card offers             agencies or other sources

    I Steal discarded applications for preapproved       I Hack into a computer that contains your
      credit cards and fill them out with a different      personal records and steal the data
      address
                                                         I Buy records stolen by a fellow employee
    I Steal wallets and purses—and all the credit and      who’s been bribed
      identification cards inside them
                                                         I “Shoulder surf” by watching from a nearby
    I Take important documents such as birth certifi-      location as he or she punches in a telephone
      cates, passports, copies of tax returns and the      calling card number or listens in on a con-
      like during a burglary of your house                 versation in which the victim provides a
                                                           credit card number over the telephone in a
    I Steal Social Security cards
                                                           public place




4
§ Identity thievesnumbers and
                                                       Social Security
                                                                        may steal the

                                                              identities of children who are
                                                              especially vulnerable because
                                                              they don’t already have credit
                                                              histories and it may be many
                                                              years before the theft is
                                                              discovered.




                                                   I Send fraudulent spam emails that promise
                                                     huge prizes or bargains in return for person-
                                                     al and financial information

                                                   I “Skim,” in which a dishonest merchant
                                                     secretly copies the magnetic strip on the
I Use the camera in a cell phone to photograph       back of your credit or debit card in order to
  someone’s credit card or ATM card while he or      make a counterfeit card that can then be
  she is using an ATM machine or buying some-        sold
  thing in a store
                                                   I Send a fake electronic IRS form to gather
I “Phish” by sending a legitimate-looking email      personal information and financial data
  that directs you to a phony website that looks     (Note: The IRS never requests information
  legitimate and asks for your personal and          by email.)
  financial data

I “Pharm,” a tactic by which criminals “hijack”
  whole domains to their own sites and gather
  the personal and financial data of users who
  believe they’re communicating through their
  customary service provider


                                                                                                     5
More Scams


      Financial Crimes                          When Money’s
      Identity thieves also include crimes      Not the Object
      like these in their repertoire of dirty
                                                Sometimes, the thieves aren’t after
      tricks.
                                                money. They may use your identity to
      I They make long-term financial           commit crimes like these:
        commitments, like taking out
                                                I They may threaten national security
        mortgages or buying cars, using
                                                  or commit acts of terrorism. The
        their victim’s credit history.
                                                  September 11 hijackers used fake IDs
      I They establish, use, and abandon          to board their planes.
        dozens of charge accounts—with-
                                                I They use stolen personal information
        out paying.
                                                  to forge military identification cards,
      I They may run up huge amounts              as recently happened at an army base
        of debt, then file for bankruptcy         near Washington, DC. This was a
        in their victim’s name, ruining           potential threat to national security.
        their victim’s credit history and
                                                I They pile up traffic tickets in your
        reputation.
                                                  name with no intent to pay them.

                                                I They commit felonies using your
                                                  identity. Victims of identity theft have
                                                  been arrested, even jailed, for crimes
                                                  they didn’t commit.

                                                I They may obtain a passport in your
                                                  name to bring someone into the
                                                  country for any one of a number of
                                                  illegal reasons—human trafficking, for
                                                  example.




6
HOW TO PREVENT IDENTITY THEFT

Follow these tips to help ensure that you               E-Commerce
don’t become a victim.
                                                        I Make sure nobody is standing right
                                                          behind you when you’re using an ATM
Mail Matters                                              machine. He or she may be trying to pho-
I Don’t put outgoing mail, especially bill payments,      tograph your card number and password
  in personal curbside mailboxes. Use United States       with a camera cell phone. Always shield
  Postal Service mailboxes instead, or, better yet,       your hand and the screen, even if no
  drop off your mail inside a post office.                one’s right behind you.

I Use a locked mailbox with a slot at home, if at all   I Pay your bills online using a secure site if
  possible.                                               that service is available.

I Don’t put outgoing mail in an unguarded “out          I Don’t give out your credit card number on
  box” at work.                                           the Internet unless it is encrypted on a
                                                          secure site.
I Don’t write your account number on the outside
  of envelopes containing bill payments.

I When you’re out of town, have the post office
  hold your mail for you or have someone you trust
  pick it up every day.




                                                                                                         7
HOW TO PREVENT IDENTITY THEFT



                                                        I Minimize the number of identification and credit
     Personal Finance                                     cards you carry with you. Take only what’s
     I Examine your credit reports from the major         absolutely necessary.
       national credit reporting firms (see page 10)
       at least once a year to make sure no one has     I Cancel all credit cards that you have not used in
       established credit in your name or is ruining      the last six months. Open credit is a prime target
       your credit after stealing your identity. The      if an identity thief spies it in your credit report.
       recently enacted Fair and Accurate Credit        I Write to the Direct Marketing Association to
       Transactions Act requires that each of the         have your name taken off direct mail lists. This
       three major credit reporting agencies pro-         will stop the dangerous flow of preapproved
       vide consumers with a free credit report           credit card offers to your address. This is where
       once a year.                                       to write:
     I If you have to give out personal or financial            Direct Marketing Association
       information from a public phone or by cell               Mail Preference Service
       phone, make sure no one is listening or wait             PO Box 643
       until you’re in a more secure location.                  Carmel, NY 10512

     I Shred all financial statements, billing state-   I Call the credit reporting industry at 888-567-
       ments, and preapproved credit card offers          8688 as an extra measure to stop credit card
       and the like before throwing them in the           and insurance solicitations from coming to your
       trash. Cross-cut shredding is best. No shred-      home.
       der? Use scissors to cut documents.

                                                        Banking
                                                        I Use traveler’s checks instead of personal bank
                                                          checks.

                                                        I Examine all of your bank and credit card state-
                                                          ments each month for mistakes or unfamiliar
                                                          charges that might be the sign of an identity
                                                          thief at work.




28
I Make sure you know when your bills and           I Identity thieves have been known to take
  bank statements normally arrive. If one is         Social Security numbers from medical charts in
  late, call to find out why. It may have fallen     hospitals, where the numbers are frequently
  into the wrong hands.                              used as patient identifiers. If you’re hospital-
                                                     ized, tell your doctor or nurse to be careful
I Use direct deposit, whenever possible,
                                                     with your chart!
  instead of a paper paycheck.
                                                   I Destroy the hard drive of your computer if you
I Don’t have new checks mailed to you at
                                                     are selling it, giving it to charity, or otherwise
  home; pick them up at the bank.
                                                     disposing of it. Don’t just erase the hard drive;
I Be alert if you get a call from someone pur-       physically remove it.
  porting to be from your bank who asks for
                                                   I Keep your personal information confidential
  personal data to update your “records.” This
                                                     and learn as much as you can about the vari-
  is almost always a scam. If you’re in doubt,
                                                     ous kinds of scams being perpetrated to steal
  hang up and call the bank yourself.
                                                     your identity. The newspapers are full of tips.


Strictly Confidential                              Top Security
I Commit all passwords to memory. Never
                                                   I Don’t carry your Social Security card with you.
  write them down or carry them with you.
                                                     Keep it in a safe place at home.
I Don’t give out your financial or personal
                                                   I Don’t carry automotive insurance policies in
  information over the phone or Internet,
                                                     your car. Keep them locked up at home.
  unless you have initiated the contact or
  know for certain with whom you                   I Don’t keep your car registration in your car. If
  are dealing.                                       possible, carry it in your wallet.

I Don’t exchange personal information for          I Keep your wallet in your front pocket so a
  “prizes.” Ask to have the offer put in writing     pickpocket can’t take it. Hold your purse close
  and mailed to you so you can consider it           against your body through its straps.
  more carefully.
                                                   I Burglar-proof your home, then burglar-proof
I Give out your Social Security number only          what’s inside your home, especially your finan-
  when absolutely necessary. Treat it as confi-      cial records and important documents (put
  dential information.                               them inside a locked filing cabinet or safe).



                                                                                                          9
REPAIRING THE DAMAGE

        If you’re the victim of identity theft, you’ve got your work cut out for you. Not only
        will you have to cope with the emotional toll of being a victim of crime, but it will
        take all the effort you can muster to repair the damage done to your good name and
        credit. Here’s where to start.

        Contact the Credit
                                                              Work With Your
        Reporting Agencies
                                                              Creditors
        As soon as you know your identity has been
        stolen, call one of the three major credit report-    If you discover unauthorized charges on your
        ing agencies. The law requires the agency you         credit report or any billing statement, contact
        call to contact the other two. The agencies will      the fraud department of the creditors you
        flag your account; this means that any business       believe have been robbed in your name. You
        that wants to view your credit report to give         have 60 days from the date you normally
        you credit will first have to verify your identity.   receive your bill to notify them. If you notify
        Upon request, the three agencies will then send       your creditors within this time frame, your
        you two free reports over the next 12 months.         loss for unauthorized charges will be limited
        (Beginning in September 2005, the Fair and            to $50.
        Accurate Credit Transactions Act requires the
        three major credit reporting agencies to
        provide you with a free report once a year
        regardless of whether you’ve been a victim
        of fraud, but you must request them from
        www.annualcreditreport.com or 877-322-8228.)
        The three major credit reporting agencies and
        their toll-free numbers for reporting fraud are
        listed below.


        Equifax             Experian           TransUnion
     800-525-6285        888-397-3742        800-680-7289


10
CATCHING THE CRIMINALS

                                                         Call the Police
 Check Your Bank Accounts
                                                         As soon as you can, contact your local police or
 If someone is illegally using your bank account,        sheriff’s department. The police should take your
 close the account right away and ask your bank          report and give you a copy, or at least the num-
 to notify its check verification service. The service   ber of the report. You should also consider
 will notify retailers not to honor checks written       reporting the crime to your state law enforce-
 on this account. In most cases, the bank is             ment, since many states have recently tough-
 responsible for any losses. To find out whether         ened their laws against identity theft. You will
 someone is passing bad checks in your name, call        need a police report to pursue your case with
 the Shared Check Authorization Network at 800-          creditors who have been victimized in your
 262-7771.                                               name. You may also want to contact the office
                                                         of your state attorney general for consumer
 If you think someone has opened a new checking          fraud information. For a list of state attorneys
 account in your name, you can ask for a free            general, go to www.naag.org.
 copy of your consumer report from Chex Systems
 (800-428-9623, www.chexhelp.com), the con-              Be sure to give the police copies of all the docu-
 sumer reporting service used by many banks. If          ments that support your claim. You may want to
 your bank doesn’t use Chex Systems, ask for the         provide them with a notarized copy of the
 name and number of the consumer reporting               Federal Trade Commission’s ID Theft Affidavit,
 service it uses.                                        available from www.consumer.gov/idtheft.

                                                         Because an identity is frequently stolen in one
 What’s the Law?                                         place and used in another, you may also have to
                                                         contact the police in the place where the crime
                                                         took place. Your local law enforcement or the
                                                         creditors affected can tell you if this is the case.
  The federal Identity Theft and Assumption
  Deterrence Act of 1998 (18 U.S.C. Section
  1028) makes it a federal crime when anyone
 “knowingly transfers or uses, without lawful authority, a means of identification of another person
 with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of
 federal law, or that constitutes a felony under any applicable state or local law.”

                                                                                                                11
Other Numbers To Call                            I The Secret Service is responsible for
                                                          investigating financial fraud, but it doesn’t
                                                          investigate individual crimes unless a
       I Call the Social Security Administration’s        large amount of money is involved or a
         Fraud Hotline at 800-269-0271 if your            ring of thieves is operating. For more
         Social Security number has been stolen.          information, go to www.treas.gov/usss.
       I Call the U.S. Postal Inspection Service if     I Report your case to the Federal Trade
         you suspect that a thief has used your           Commission, which maintains a database
         mailing address to commit a crime. Call          that law enforcement agencies use to hunt
         888-877-7644 for the number of your              down identity thieves. To report your theft
         local office.                                    or to get more information on what to do,
       I Call the Internal Revenue Service at 800-        call the FTC’s toll-free hotline at 877-
         829-0433 if you believe your identification      IDTHEFT.
         has been used in violation of tax laws.




     Tips for Reporting Identity Theft

     I Act as soon as you discover the theft. Time is   I Use the Federal Trade Commission’s ID
       of the essence to prevent further fraud or         Theft Affidavit (see page 11) and get it
       damage to your credit, and acting quickly          notarized.
       may be necessary to protect your rights.
                                                        I Always use certified mail, return receipt
     I Keep a record of all conversations with name,      requested, so that you have a record of
       agency, phone number, date, and time.              who received your mail and when.

     I Keep copies of all emails.                       I Above all, be persistent. It can take time
                                                          and effort to clean up the mess left behind
     I Never mail originals. Always send out copies,
                                                          by the criminal who stole your identity,
       notarized if necessary.
                                                          but only you can do the job.



12
RESOURCES
                                                 I The Federal Trade Commission,
                                                    www.consumer.gov/idtheft
THREE STEPS TO
PREVENTION                                       I The Office for Victims of Crime at the U.S.
                                                    Department of Justice,
                                                    http://ovc.ncjrs.org/findvictimservices/default.html.
This booklet has talked about what you can
do to protect yourself against identity theft.
But there’s also strength in numbers: What
                                                 I The U.S. Department of Justice,
else can you and your family, friends, and
                                                    www.usdoj.gov/criminal/fraud/idtheft.html
neighbors do to fight this type of crime?
Here are some suggestions.

                                                 I The National Criminal Justice Referral Service,
1    Adopt the measures suggested in this
     booklet. Set half an hour aside for
     three days to make the phone calls
                                                    www.ncjrs.org/spotlight/identity_theft/facts.html.

     and take the other steps suggested in
     this booklet (such as stowing your          I The Identity Theft Resource Center,
     important papers in a secure place at          www.idtheftcenter.org/vg17A.shtml
     home).


                                                 I The National Crime Prevention Council’s website.
2    Share this booklet with your family
     and friends and see if they can come
     up with other ways to prevent identi-
                                                    Go to www.ncpc.org, click on “What We Offer,”
                                                    go to “What You Can Do,” and click on “Protect
     ty theft.                                      Yourself Against Identity Theft.”



3    Organize a meeting in your school,
     community center, senior citizen’s
     center, church, or synagogue and
     invite a police officer to come and tell
     people about the identity theft prob-
     lem and what they can do to prevent
     the crime.
NATIONAL CRIME PREVENTION COUNCIL
1000 Connecticut Avenue, NW, Thirteenth Floor
Washington, DC 20036 www.ncpc.org

Mais conteúdo relacionado

Mais procurados

Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crBrady Allen
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft pptCut 2 Shreds
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringGAURAV. H .TANDON
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid Ithewie
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09jwnollet
 
Data theft
Data theftData theft
Data theftLaura
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Robert Bromwich
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft carlgiardina
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...VogelDenise
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention- Mark - Fullbright
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingMatt Smith
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft Rahmat Inggi
 
A LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUNDA LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUNDFelipe Prado
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!tomciolkosz
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactRob Taylor
 

Mais procurados (20)

IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_crWww geometry net_detail_basic_e_embezzlement_white_collar_cr
Www geometry net_detail_basic_e_embezzlement_white_collar_cr
 
Identity theft ppt
Identity theft pptIdentity theft ppt
Identity theft ppt
 
H -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroringH -Tech frauds of identity theft, Identity cloning and address mirroring
H -Tech frauds of identity theft, Identity cloning and address mirroring
 
Identity Theft: How to Avoid It
Identity Theft: How to Avoid ItIdentity Theft: How to Avoid It
Identity Theft: How to Avoid It
 
Idt Jc 02 09
Idt Jc 02 09Idt Jc 02 09
Idt Jc 02 09
 
Data theft
Data theftData theft
Data theft
 
Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?Identity Theft and Society: What's in it for me?
Identity Theft and Society: What's in it for me?
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Social networking and identity theft
Social networking and identity theft Social networking and identity theft
Social networking and identity theft
 
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...Secret service, fbi invesigating claim that mitt romney's tax returns were st...
Secret service, fbi invesigating claim that mitt romney's tax returns were st...
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Identity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullyingIdentity Theft nigerian fraud cyberbullying
Identity Theft nigerian fraud cyberbullying
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 
A LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUNDA LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUND
 
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!Preventing Nonprofit Banking Fraud and the Tools You Can Use!
Preventing Nonprofit Banking Fraud and the Tools You Can Use!
 
Identity Theft It's Devasting Impact
Identity Theft It's Devasting ImpactIdentity Theft It's Devasting Impact
Identity Theft It's Devasting Impact
 
Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)Electronic fraud by prof godwin oyedokun (1)
Electronic fraud by prof godwin oyedokun (1)
 

Destaque

Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012The Texas Network, LLC
 
2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft Information2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft InformationLynn Kronk
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kitupsettinginfo
 
How to Prevent Identity Theft
How to Prevent Identity TheftHow to Prevent Identity Theft
How to Prevent Identity Thefthotspotshield
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudEnglish Online Inc.
 
Privacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID ActPrivacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID ActAmin Bandeali
 
Identity theft blue4it nljug
Identity theft blue4it nljugIdentity theft blue4it nljug
Identity theft blue4it nljugBrian Vermeer
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminarronwolfinger
 
Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Brian Vermeer
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theftvcrisafulli
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Riskmilfamln
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Showrobinlgray
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_pointefandeye
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationMonikaPenkova
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft PresentationRandall Chesnutt
 
E-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesE-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesNurul Izzah
 

Destaque (20)

Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft Information2014 legalshield and Identify Theft Information
2014 legalshield and Identify Theft Information
 
Social Illness-Cyber Crime
Social Illness-Cyber CrimeSocial Illness-Cyber Crime
Social Illness-Cyber Crime
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
How to Prevent Identity Theft
How to Prevent Identity TheftHow to Prevent Identity Theft
How to Prevent Identity Theft
 
How to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and FraudHow to Prevent Identity Theft and Fraud
How to Prevent Identity Theft and Fraud
 
Privacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID ActPrivacy Identity Theft National ID Card and REAL ID Act
Privacy Identity Theft National ID Card and REAL ID Act
 
Identity theft blue4it nljug
Identity theft blue4it nljugIdentity theft blue4it nljug
Identity theft blue4it nljug
 
Identity Theft Consumer Seminar
Identity Theft Consumer SeminarIdentity Theft Consumer Seminar
Identity Theft Consumer Seminar
 
Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015Faculty presentation 21 st december 2015
Faculty presentation 21 st december 2015
 
Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017Identity theft: Developers are key - JFokus 2017
Identity theft: Developers are key - JFokus 2017
 
Consumer Protection: Identity Theft
Consumer Protection:  Identity TheftConsumer Protection:  Identity Theft
Consumer Protection: Identity Theft
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Indentify Theft Slide Show
Indentify Theft Slide ShowIndentify Theft Slide Show
Indentify Theft Slide Show
 
Identity theft power_point
Identity theft power_pointIdentity theft power_point
Identity theft power_point
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Malaysia's National Cyber Security Policy
Malaysia's National Cyber Security PolicyMalaysia's National Cyber Security Policy
Malaysia's National Cyber Security Policy
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
E-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation IssuesE-Commerce Integration and Implementation Issues
E-Commerce Integration and Implementation Issues
 

Semelhante a PREVENTING ID THEFT GUIDE FOR CONSUMERS

A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect youIdentity Theft Protection
 
Research Paper on White Collar Crime
Research Paper on White Collar CrimeResearch Paper on White Collar Crime
Research Paper on White Collar CrimeRebekahSamuel2
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Gary Kazmer
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Versiondanc752
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentationpat7777
 
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxSheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxmaoanderton
 

Semelhante a PREVENTING ID THEFT GUIDE FOR CONSUMERS (9)

A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
Identity theft fraud laws how the legal system can protect you
Identity theft fraud laws   how the legal system can protect youIdentity theft fraud laws   how the legal system can protect you
Identity theft fraud laws how the legal system can protect you
 
Research Paper on White Collar Crime
Research Paper on White Collar CrimeResearch Paper on White Collar Crime
Research Paper on White Collar Crime
 
Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3Privacy Presentation for SOCAP-3
Privacy Presentation for SOCAP-3
 
Hr Idt Presentation Employee Version
Hr Idt Presentation   Employee VersionHr Idt Presentation   Employee Version
Hr Idt Presentation Employee Version
 
Risk Managers Presentation
Risk Managers PresentationRisk Managers Presentation
Risk Managers Presentation
 
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docxSheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
Sheet1x1x2x3x4LHSRHSslackObjective function121015110Material 53420.docx
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
What is fraud
What is fraudWhat is fraud
What is fraud
 

PREVENTING ID THEFT GUIDE FOR CONSUMERS

  • 1. PREVENTING IDENTITY THEFT: a GUIDE for CONSUMERS NATIONAL CRIME PREVENTION COUNCIL
  • 2. NATIONAL CRIME PREVENTION COUNCIL The National Crime Prevention Council (NCPC) is a private, nonprofit tax-exempt [501(c)(3)] organization whose primary mission is to enable people to create safer and more caring communities by addressing the causes of crime and violence and reducing the oppor- tunities for crime to occur. NCPC publishes books, kits of camera-ready program materials, posters, and informational and policy reports on a variety of crime prevention and community-building subjects. NCPC offers training, technical assistance, and a national focus for crime prevention: it acts as secretariat for the Crime Prevention Coalition of America, more than 360 national, federal, state, and local organizations committed to preventing crime. It hosts a number of websites that offer prevention tips to individuals, describe prevention practices for community building, and help anchor prevention policy into laws and budgets. It operates demonstration programs in schools, neighborhoods, and entire jurisdictions and takes a major leadership role in youth crime preven- tion and youth service; it also administers the Center for Faith and Service. NCPC manages the McGruff® “Take A Bite Out Of Crime®” public service advertising campaign. NCPC is funded through a variety of gov- ernment agencies, corporate and private foundations, and donations from private individuals. This publication was made possible through Cooperative Copyright © 2005 National Crime Prevention Council Funding Agreement No. 2002-DD-BX-K004 from the Bureau of Justice Assistance, Office of Justice Programs, All rights reserved. U.S. Department of Justice. Opinions are those of NCPC or cited sources and do not necessarily reflect U.S. Printed in the United States of America Department of Justice policy or positions. The Bureau of July 2005 Justice Assistance is a component of the Office of Justice Programs, which also includes the Bureau of Justice National Crime Prevention Council Statistics, the National Institute of Justice, the Office of 1000 Connecticut Avenue, NW, Thirteenth Floor Juvenile Justice and Delinquency Prevention, and the Washington, DC 20036-5325 Office for Victims of Crime. 202-466-6272 www.ncpc.org ISBN 1-59686-011-1
  • 3. INTRODUCTION Few crimes have made people more anxious more quickly as the sudden onslaught of identity theft. It’s in the newspapers every day and on the news every night. People are worried that someone’s going to run up charges on their credit cards or fleece their bank accounts while their backs are turned. And there’s some reason to worry: All a thief has to do is steal something as basic as a Social Security number to become a real public enemy. And while these crimes are relatively easy to commit, investigating and prosecuting them are complex and time- consuming matters. So it’s up to all of us to be identity-smart and make sure we keep this crime from spreading. It’s a battle we can win. Follow the tips in this booklet, be careful, and we’ll keep a big step ahead of identity thieves. It’s up to all of us to prevent identity theft. —Al Lenhardt, president and CEO, National Crime Prevention Council 1
  • 4. WHAT’S IDENTITY THEFT? The U.S. Department of Justice defines identity theft this way: “Identity theft is a crime. Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.” FACTS AND FIGURES These statistics about identity theft are worth knowing. According to the U.S. Postal Service, there were almost ten million incidents of identity theft in the United States in 2004, a huge figure dwarfed only by its cost to consumers—$5 bil- lion. And limiting your use of your personal computer may not help much: a study released in January 2005 by the Better Business Bureau and Javelin Strategy and Research reported that most identity thefts take place offline, not online—just the opposite of what many folks might think. In fact, the study found, the theft of online information accounted for only 11.6 percent of identity fraud cases. 2
  • 5. § Half of all identity theftsthe committed by someone are victim knows. Nonetheless, a rash of headline-grabbing In another study, covering 2004, the FTC scandals involving thefts of millions of per- reported that of 635,000 complaints regis- sonal records, together with the advent of tered with the agency, 61 percent involved phishing and pharming thefts (see page 5), fraud and 39 percent were identity theft may well change that figure dramatically in complaints. This study also revealed the fol- 2005. One other troubling finding: the study lowing: found that half of all identity thefts are I Credit card fraud was the most common committed by someone the victim knows. form of identity theft, accounting for 28 percent of thefts reported. In spring 2003, the Federal Trade Commission (FTC)—the federal agency I Phone or utilities fraud was next, responsible for tracking identity theft—con- accounting for 19 percent of identity ducted a major study of this crime. Among thefts reported. its findings: I Bank fraud followed, accounting for 18 percent of identity thefts reported. I 12.7 percent of respondents reported that they had been victims of identity theft at some time over the past five years. This The FTC also presented some figures about implies that at least 27 million identity theft committed over the Internet. Americans had their identities stolen. Of 205,568 Internet-related complaints, 90 I Victims reported that they spent 30 percent of the victims reported they had hours, on average, cleaning up after an suffered a financial loss. The average loss identity crime at an average cost of was $1,440. $500. According to the FTC, the highest reports of identity theft occurred in Phoenix-Mesa- Scottsdale, AZ; Riverside-San Bernardino- Ontario, CA; and Las Vegas-Paradise, NV. While sunny Phoenix and Las Vegas are retirement meccas, the FTC found that of all those who reported being victimized in the United States, only 9 percent were 60 and over while the largest number, 29 percent, were in the 18 to 29 age group. 3
  • 6. A CROOK’S BAG OF TRICKS Watch Out for Thefts Like These Here’s a sample of the way identity thieves commit I Steal the Social Security numbers and iden- their crimes. tities of children who are especially vulnera- ble because they don’t have credit histories I File a change of address form in your name to and it may be many years before the theft is divert mail and gather personal and financial discovered data I Lift names and Social Security numbers I Steal credit card payments and other outgoing from such documents as a driver’s license, mail from private, curbside mailboxes employee badge, student ID card, check, or medical chart I Lift driver’s license numbers, Social Security numbers, phone numbers, or other identifiers I Use personal information from a Who’s from checks Who book or a newspaper article I Steal mail, especially envelopes containing bill I Use the personal information of a relative or payments, from unlocked, unguarded, “out someone he or she knows well, perhaps by boxes” at work being a frequent visitor to their home I Go “dumpster diving” by digging through I Pretend to be government officials or legiti- garbage cans or communal dumpsters in search mate business people who need to gather of cancelled checks, credit card and bank state- personal information from credit reporting ments, or preapproved credit card offers agencies or other sources I Steal discarded applications for preapproved I Hack into a computer that contains your credit cards and fill them out with a different personal records and steal the data address I Buy records stolen by a fellow employee I Steal wallets and purses—and all the credit and who’s been bribed identification cards inside them I “Shoulder surf” by watching from a nearby I Take important documents such as birth certifi- location as he or she punches in a telephone cates, passports, copies of tax returns and the calling card number or listens in on a con- like during a burglary of your house versation in which the victim provides a credit card number over the telephone in a I Steal Social Security cards public place 4
  • 7. § Identity thievesnumbers and Social Security may steal the identities of children who are especially vulnerable because they don’t already have credit histories and it may be many years before the theft is discovered. I Send fraudulent spam emails that promise huge prizes or bargains in return for person- al and financial information I “Skim,” in which a dishonest merchant secretly copies the magnetic strip on the I Use the camera in a cell phone to photograph back of your credit or debit card in order to someone’s credit card or ATM card while he or make a counterfeit card that can then be she is using an ATM machine or buying some- sold thing in a store I Send a fake electronic IRS form to gather I “Phish” by sending a legitimate-looking email personal information and financial data that directs you to a phony website that looks (Note: The IRS never requests information legitimate and asks for your personal and by email.) financial data I “Pharm,” a tactic by which criminals “hijack” whole domains to their own sites and gather the personal and financial data of users who believe they’re communicating through their customary service provider 5
  • 8. More Scams Financial Crimes When Money’s Identity thieves also include crimes Not the Object like these in their repertoire of dirty Sometimes, the thieves aren’t after tricks. money. They may use your identity to I They make long-term financial commit crimes like these: commitments, like taking out I They may threaten national security mortgages or buying cars, using or commit acts of terrorism. The their victim’s credit history. September 11 hijackers used fake IDs I They establish, use, and abandon to board their planes. dozens of charge accounts—with- I They use stolen personal information out paying. to forge military identification cards, I They may run up huge amounts as recently happened at an army base of debt, then file for bankruptcy near Washington, DC. This was a in their victim’s name, ruining potential threat to national security. their victim’s credit history and I They pile up traffic tickets in your reputation. name with no intent to pay them. I They commit felonies using your identity. Victims of identity theft have been arrested, even jailed, for crimes they didn’t commit. I They may obtain a passport in your name to bring someone into the country for any one of a number of illegal reasons—human trafficking, for example. 6
  • 9. HOW TO PREVENT IDENTITY THEFT Follow these tips to help ensure that you E-Commerce don’t become a victim. I Make sure nobody is standing right behind you when you’re using an ATM Mail Matters machine. He or she may be trying to pho- I Don’t put outgoing mail, especially bill payments, tograph your card number and password in personal curbside mailboxes. Use United States with a camera cell phone. Always shield Postal Service mailboxes instead, or, better yet, your hand and the screen, even if no drop off your mail inside a post office. one’s right behind you. I Use a locked mailbox with a slot at home, if at all I Pay your bills online using a secure site if possible. that service is available. I Don’t put outgoing mail in an unguarded “out I Don’t give out your credit card number on box” at work. the Internet unless it is encrypted on a secure site. I Don’t write your account number on the outside of envelopes containing bill payments. I When you’re out of town, have the post office hold your mail for you or have someone you trust pick it up every day. 7
  • 10. HOW TO PREVENT IDENTITY THEFT I Minimize the number of identification and credit Personal Finance cards you carry with you. Take only what’s I Examine your credit reports from the major absolutely necessary. national credit reporting firms (see page 10) at least once a year to make sure no one has I Cancel all credit cards that you have not used in established credit in your name or is ruining the last six months. Open credit is a prime target your credit after stealing your identity. The if an identity thief spies it in your credit report. recently enacted Fair and Accurate Credit I Write to the Direct Marketing Association to Transactions Act requires that each of the have your name taken off direct mail lists. This three major credit reporting agencies pro- will stop the dangerous flow of preapproved vide consumers with a free credit report credit card offers to your address. This is where once a year. to write: I If you have to give out personal or financial Direct Marketing Association information from a public phone or by cell Mail Preference Service phone, make sure no one is listening or wait PO Box 643 until you’re in a more secure location. Carmel, NY 10512 I Shred all financial statements, billing state- I Call the credit reporting industry at 888-567- ments, and preapproved credit card offers 8688 as an extra measure to stop credit card and the like before throwing them in the and insurance solicitations from coming to your trash. Cross-cut shredding is best. No shred- home. der? Use scissors to cut documents. Banking I Use traveler’s checks instead of personal bank checks. I Examine all of your bank and credit card state- ments each month for mistakes or unfamiliar charges that might be the sign of an identity thief at work. 28
  • 11. I Make sure you know when your bills and I Identity thieves have been known to take bank statements normally arrive. If one is Social Security numbers from medical charts in late, call to find out why. It may have fallen hospitals, where the numbers are frequently into the wrong hands. used as patient identifiers. If you’re hospital- ized, tell your doctor or nurse to be careful I Use direct deposit, whenever possible, with your chart! instead of a paper paycheck. I Destroy the hard drive of your computer if you I Don’t have new checks mailed to you at are selling it, giving it to charity, or otherwise home; pick them up at the bank. disposing of it. Don’t just erase the hard drive; I Be alert if you get a call from someone pur- physically remove it. porting to be from your bank who asks for I Keep your personal information confidential personal data to update your “records.” This and learn as much as you can about the vari- is almost always a scam. If you’re in doubt, ous kinds of scams being perpetrated to steal hang up and call the bank yourself. your identity. The newspapers are full of tips. Strictly Confidential Top Security I Commit all passwords to memory. Never I Don’t carry your Social Security card with you. write them down or carry them with you. Keep it in a safe place at home. I Don’t give out your financial or personal I Don’t carry automotive insurance policies in information over the phone or Internet, your car. Keep them locked up at home. unless you have initiated the contact or know for certain with whom you I Don’t keep your car registration in your car. If are dealing. possible, carry it in your wallet. I Don’t exchange personal information for I Keep your wallet in your front pocket so a “prizes.” Ask to have the offer put in writing pickpocket can’t take it. Hold your purse close and mailed to you so you can consider it against your body through its straps. more carefully. I Burglar-proof your home, then burglar-proof I Give out your Social Security number only what’s inside your home, especially your finan- when absolutely necessary. Treat it as confi- cial records and important documents (put dential information. them inside a locked filing cabinet or safe). 9
  • 12. REPAIRING THE DAMAGE If you’re the victim of identity theft, you’ve got your work cut out for you. Not only will you have to cope with the emotional toll of being a victim of crime, but it will take all the effort you can muster to repair the damage done to your good name and credit. Here’s where to start. Contact the Credit Work With Your Reporting Agencies Creditors As soon as you know your identity has been stolen, call one of the three major credit report- If you discover unauthorized charges on your ing agencies. The law requires the agency you credit report or any billing statement, contact call to contact the other two. The agencies will the fraud department of the creditors you flag your account; this means that any business believe have been robbed in your name. You that wants to view your credit report to give have 60 days from the date you normally you credit will first have to verify your identity. receive your bill to notify them. If you notify Upon request, the three agencies will then send your creditors within this time frame, your you two free reports over the next 12 months. loss for unauthorized charges will be limited (Beginning in September 2005, the Fair and to $50. Accurate Credit Transactions Act requires the three major credit reporting agencies to provide you with a free report once a year regardless of whether you’ve been a victim of fraud, but you must request them from www.annualcreditreport.com or 877-322-8228.) The three major credit reporting agencies and their toll-free numbers for reporting fraud are listed below. Equifax Experian TransUnion 800-525-6285 888-397-3742 800-680-7289 10
  • 13. CATCHING THE CRIMINALS Call the Police Check Your Bank Accounts As soon as you can, contact your local police or If someone is illegally using your bank account, sheriff’s department. The police should take your close the account right away and ask your bank report and give you a copy, or at least the num- to notify its check verification service. The service ber of the report. You should also consider will notify retailers not to honor checks written reporting the crime to your state law enforce- on this account. In most cases, the bank is ment, since many states have recently tough- responsible for any losses. To find out whether ened their laws against identity theft. You will someone is passing bad checks in your name, call need a police report to pursue your case with the Shared Check Authorization Network at 800- creditors who have been victimized in your 262-7771. name. You may also want to contact the office of your state attorney general for consumer If you think someone has opened a new checking fraud information. For a list of state attorneys account in your name, you can ask for a free general, go to www.naag.org. copy of your consumer report from Chex Systems (800-428-9623, www.chexhelp.com), the con- Be sure to give the police copies of all the docu- sumer reporting service used by many banks. If ments that support your claim. You may want to your bank doesn’t use Chex Systems, ask for the provide them with a notarized copy of the name and number of the consumer reporting Federal Trade Commission’s ID Theft Affidavit, service it uses. available from www.consumer.gov/idtheft. Because an identity is frequently stolen in one What’s the Law? place and used in another, you may also have to contact the police in the place where the crime took place. Your local law enforcement or the creditors affected can tell you if this is the case. The federal Identity Theft and Assumption Deterrence Act of 1998 (18 U.S.C. Section 1028) makes it a federal crime when anyone “knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of federal law, or that constitutes a felony under any applicable state or local law.” 11
  • 14. Other Numbers To Call I The Secret Service is responsible for investigating financial fraud, but it doesn’t investigate individual crimes unless a I Call the Social Security Administration’s large amount of money is involved or a Fraud Hotline at 800-269-0271 if your ring of thieves is operating. For more Social Security number has been stolen. information, go to www.treas.gov/usss. I Call the U.S. Postal Inspection Service if I Report your case to the Federal Trade you suspect that a thief has used your Commission, which maintains a database mailing address to commit a crime. Call that law enforcement agencies use to hunt 888-877-7644 for the number of your down identity thieves. To report your theft local office. or to get more information on what to do, I Call the Internal Revenue Service at 800- call the FTC’s toll-free hotline at 877- 829-0433 if you believe your identification IDTHEFT. has been used in violation of tax laws. Tips for Reporting Identity Theft I Act as soon as you discover the theft. Time is I Use the Federal Trade Commission’s ID of the essence to prevent further fraud or Theft Affidavit (see page 11) and get it damage to your credit, and acting quickly notarized. may be necessary to protect your rights. I Always use certified mail, return receipt I Keep a record of all conversations with name, requested, so that you have a record of agency, phone number, date, and time. who received your mail and when. I Keep copies of all emails. I Above all, be persistent. It can take time and effort to clean up the mess left behind I Never mail originals. Always send out copies, by the criminal who stole your identity, notarized if necessary. but only you can do the job. 12
  • 15. RESOURCES I The Federal Trade Commission, www.consumer.gov/idtheft THREE STEPS TO PREVENTION I The Office for Victims of Crime at the U.S. Department of Justice, http://ovc.ncjrs.org/findvictimservices/default.html. This booklet has talked about what you can do to protect yourself against identity theft. But there’s also strength in numbers: What I The U.S. Department of Justice, else can you and your family, friends, and www.usdoj.gov/criminal/fraud/idtheft.html neighbors do to fight this type of crime? Here are some suggestions. I The National Criminal Justice Referral Service, 1 Adopt the measures suggested in this booklet. Set half an hour aside for three days to make the phone calls www.ncjrs.org/spotlight/identity_theft/facts.html. and take the other steps suggested in this booklet (such as stowing your I The Identity Theft Resource Center, important papers in a secure place at www.idtheftcenter.org/vg17A.shtml home). I The National Crime Prevention Council’s website. 2 Share this booklet with your family and friends and see if they can come up with other ways to prevent identi- Go to www.ncpc.org, click on “What We Offer,” go to “What You Can Do,” and click on “Protect ty theft. Yourself Against Identity Theft.” 3 Organize a meeting in your school, community center, senior citizen’s center, church, or synagogue and invite a police officer to come and tell people about the identity theft prob- lem and what they can do to prevent the crime.
  • 16. NATIONAL CRIME PREVENTION COUNCIL 1000 Connecticut Avenue, NW, Thirteenth Floor Washington, DC 20036 www.ncpc.org