How You Can Avoid Identity Theft From Creative Criminals
Criminals are increasingly creative in the methods by which they steal your identity, your money, and your life. They are usually several steps ahead of the average consumer. With how many of the following “creative” schemes are you familiar?
* “Mail theft”
One of the positive things criminals have done, if I may say so, is add “creative” terms to our vocabulary. It always amazes me how intelligent and creative criminals can be! – Always one step ahead of their next victim, and ultimately, the law!
Whether they go after your mail, or go “dumpster-diving”, or go “shoulder surfing”, or “pharming”, the end results are always the same: They become successful over another innocent victim!
Identity criminals are basically lazy people, in my opinion. Rather than getting a legitimate job, they would rather come up with “creative” schemes to part their victims from their personal information and their money.
One of the laziest ways they steal our identity, usually with our unwitting help, is through “Dumpster-diving”. They simply sort through a person’s trash for paper records such as credit card offers, bank statements, past paid bills, or anything that has your personal and financial information. Sometimes they can obtain a full profile of us from separate documents (such as church records, car repair records, personal letters, medical records, etc.) they find. And businesses as well as consumers fall victim to this one form of theft.
Mail theft is a low-tech method lazy criminals use to go after your personal and financial information. As with “dumpster-diving”, it another easy way for criminals to get what they want with hardly any effort on their part, thanks to our unwitting help. For example, we leave a red flag on our mailbox to alert the mail carrier that there is out-going mail to be picked up. Or the mail carrier might do likewise to alert us to pick up our mail. Unfortunately, criminals love this because they tell them that the mailbox is ripe for the picking. A friend of mines calls this “The Low-Handing Fruit Scheme”.
“Shoulder-surfing” is a low-tech, low-touch technique criminals use to get your information – and they boldly do so in public places usually right under our noses or over our shoulders. Typically they would watch or listen carefully as we key our credit card number or password into a keypad, or give our account number over the telephone. And don’t for a moment think that they have to be standing within earshot to steal your info. No!
Sophisticated shoulder surfers have been known to use bioculars, telescopes, or super-sensitive listening devices to steal your info from across the room or across the street. Sometimes they will record the sounds for accurate playback. Recording of the keypad sounds help them analyze those tones for replicated PIN numbers and passwords. Some criminals standing nearby may even use their camera-cellphone to record the numbers they see or take a picture over your shoulder.
“Some Of The Most Popular ‘Identity Methods You Should Be Aware Of”
“Pharming” comes in several version. I’ll just discuss one here. Similar to “Phishing”, “Pharming” is an electronic scam in which criminals attempt to steal personal and financial information from numerous people simultaneously through something known as “Domain Spooling”. Here the hackers take over a DNS server and redirect user information to a new website that they use to gather illegal information.
“Phishing” also bears mentioning here. It is a scam in which you, the consumer, are tricked into entering your personal and financial information (account numbers, Social Security number, PIN number, password, etc.) via a bogus email and website form. The email looks as if it was sent from a company with whom most consumers may have an affiliation, such as AOL , PayPal , eBay , or a major bank or credit card company; but, in reality, are nothing more than identity thieves hiding behind the email.
“Skimming” is a another growing identity theft scam where criminals quickly and temporarily steal a credit card and run it through a credit card reader known as a skimmer that has been reprogrammed to steal information off the card. Often, this takes place at a hectic retail store where a consumer might not notice that their credit card has been taken from them for a few moments.
And the list goes on. I’m sure that by the time you read this, there will be several new types to describe new and creative way these cybercriminals have come up with to part you from your personal information and your money. It’s seem to be a losing battle – but don’t give up hope yet. There are several resources that will come to your aid.