Identity Theft and Fraud
Use these helpful tips so you won’t become a victim of identity theft
Use these helpful tips so you won’t become a victim of identity theft
As one of the fastest-growing crimes in the U.S., identity theft is a significant issue for financial institutions and a risk that every NASB employee and the customer must be constantly aware of and continuously seeking to deter and detect. Identity theft is a federal crime. It occurs when one person’s identification (which can include name, social security number, or any account number) is used or transferred by another person for unlawful activities.
Identity thieves seek to open new accounts in your name. They often apply for new credit cards using their victim’s personal information, make charges, and leave the bills unpaid. It is also common for them to set up telephone or utility service in their victim’s name and not pay for it. Some victims have found that identity thieves applied for loans, apartments, and mortgages. Thieves have also been known to print counterfeit checks in a victim's name.
Identity thieves also seek to gain access to your existing accounts. They want to steal money from your bank accounts, make charges on your credit cards, and use your checks and credit to make down payments for cars, furniture, and other expensive items. They may even file for government benefits, including unemployment insurance and tax refunds using your social security number.
It is not uncommon for identity theft to go undetected for months and even years. Victims of identity theft may not realize that their identity has been stolen until they are denied credit or until a creditor attempts to collect an unpaid bill. Most victims have no idea how the identity thief obtained their personal information.
Among those who think they know what happened, many believe the identity theft occurred when their purse or wallet was stolen or lost.
Dumpster diving involves rummaging through trash to obtain your personal information. Identity thieves can rummage through interior office trash cans or through exterior dumpsters. Either way, the objective is to gather the information that has been carelessly thrown away.
Shoulder surfers are identity thieves that acquire personal information through eavesdropping. They may be listening when you provide your account number or Social Security Number to the bank teller. They may stand behind your desk and observe your computer screen when you log in to Online Banking.
Thieves steal mail from unlocked mailboxes to obtain newly issued debit cards, bank or insurance statements, investment reports, benefits documents, or tax information. Unfortunately, even locked mailboxes may not stop the most determined thief.
Group identity theft has become a major problem for consumers. A thief gains access to a place that keeps records for many people. Targets have included stores, fitness centers, car dealers, schools, hospitals, and even credit bureaus. Thieves may either use the stolen identities themselves or sell them to other criminals.
Victims of identity theft often find that someone they know has committed the crime. Roommates, hired help, and landlords all have access to your home, and it is possible for them to access private information. Identity theft within families is also fairly common. This causes particular difficulties because victims may be reluctant to notify the authorities or press charges. People are especially vulnerable to identity theft when ending relationships with roommates and spouses.
Pretext calling is the act of creating and using an invented scenario (the pretext) to persuade the victim to release confidential information or perform an action. Identity thieves will contact you through the mail, telephone, or e-mail, and attempt to get you to reveal your personal information, usually by asking you to "verify" some data. Pretext callers may even go so far as to use a Caller ID spoofing service to adopt the phone number of the business or person they are attempting to impersonate.
With the growth of online banking comes online fraud. These schemes vary from web sites that "look" like the actual financial institution to an email asking for personal banking information.
Phishing involves identity thieves sending a seemingly legitimate e-mail request for account information, often under the guise of asking you to verify or reconfirm confidential personal information such as account numbers, social security numbers, passwords, and other sensitive information. Many times a sense of “urgency” is added to the e-mail by including a statement that your account will be terminated unless a response is made. Similar to phishing, vishing involves sending a seemingly legitimate e-mail or text message, indicating you should contact the bank to, for example, reactivate your debit card. On calling the telephone number, you are greeted with a welcome message and asked to enter your social security number and debit card number to resolve a 'pending security issue.' The ultimate goal of phishing and vishing is to use the information you provided to gain unauthorized access to your bank account or to engage in illegal acts such as opening a new account in your name.
Home computers can be infected with viruses that transmit your data to cyber-thieves using a software application that is remotely installed on your computer without you knowing. This special snoop ware lets the thief access everything you do online, including your user ids and passwords. Be wary of email attachments and websites you don’t know.
If you fall victim to an attack, act immediately to protect yourself.
Equifax
800-525-6285
P.O. Box 740250
Atlanta, GA 30374
Experian
888-397-3742
P.O. Box 1017
Allen, TX 75013
TransUnion
800-680-7289
P.O. Box 6790
Fullerton, CA 92634
Report all suspicious contacts to the Federal Trade Commission through the Internet at www.consumer.gov/idtheft, or by calling 1-877-IDTHEFT.