This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • Home
  • News
    • Security Newswire
    • Technologies
    • Security Blog
    • Newsletter
    • Web Exclusives
  • Columns
    • Career Intelligence
    • Security Talk
    • The Corner Office
    • Leadership & Management
    • Cyber Tactics
    • Overseas and Secure
    • The Risk Matrix
  • Management
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • More
  • Physical
    • Access Management
    • Video Surveillance
    • Identity Management
    • More
  • Cyber
  • Sectors
    • Education: University
    • Hospitals & Medical Centers
    • Critical Infrastructure
    • More
  • Exclusives
    • Security 500 Report
    • Most Influential People in Security
    • Top Guard and Security Officer Companies
    • The Security Leadership Issue
    • Annual Innovations, Technology, & Services Report
  • Events
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
    • Security 500 West
  • Resources
    • The Magazine
      • This Month's Issue
      • Digital Edition
      • Archives
      • Professional Security Canada
    • Videos
      • ISC West 2019
    • Photo Galleries
    • Polls
    • Classifieds & Job Listings
    • White Papers
    • Mobile App
    • Store
    • Sponsor Insights
    • Continuing Education
  • InfoCenters
    • Break-in Prevention
    • Building AppSec in Enterprises
    • Video Management Systems
  • Contact
    • Editorial Guidelines
  • Advertise
Home » Identity Theft: A New Security Challenge

Identity Theft: A New Security Challenge

September 20, 2001
Bruce Mandelblit
Reprints
No Comments


Starting in the early 1990s, a new type of criminal has emerged - the identity thief. There is nothing more crippling than having one's own identity taken away. What can security managers do to thwart this new threat?
"Someone used my Social Security number to get credit in my name. This has caused a lot of problems. I have been turned downed for jobs, credit and refinancing offers. This is stressful and embarrassing. I want to open my own business, but it may be impossible with this unresolved problem hanging over my head."

"My elderly parents are victims of credit fraud. We don't know what to do. Someone applied for credit cards in their name and charged nearly $20,000. Two of the card companies have cleared my parents' name, but the third has turned the account over to a collection agency. The agency doesn't believe Mom and Dad didn't authorize the account. What can we do to stop the debt collector?"

"Someone is using my name and Social Security number to open credit card accounts. All the accounts are in collections. I had no idea this was happening until I applied for a mortgage. Because these 'bad' accounts showed up on my credit report, I didn't get the mortgage."

The above are three actual complaints recently received by the Federal Trade Commission (FTC) regarding the fast growing crime of "identity theft."

Starting in the 1990's, a new type of criminal has emerged called identity thieves. Simply put, an identity thief obtains some piece of your personal information (such as your bank and credit card numbers, your Social Security number, and your name and address) and appropriates it, without your knowledge, to commit a crime of fraud or theft.

The FTC has become one of the leading agencies in the battle against identity theft. The FTC's booklet, "ID Theft: When Bad Things Happen To Your Good Name" is the definitive document on the subject of identify theft and its prevention. The information contained in this booklet, briefly summarized below, holds the keys for security professionals to understand this new type of crime.

First of all, how do the identity thieves obtain your personal data?

Actually, they use a variety of methods, both simple and high-tech, to get your vital information. These methods include:

  • Stolen wallets and purses that contain your ID and credit cards;
  • Stolen mail including your bank and credit card statements;
  • By completing a "change of address form" to divert your mail to another location.
  • "Dumpster diving" through your garbage;
  • By fraudulently obtaining your credit report by posing as a landlord or employer;
  • By getting your business or personnel resords at work;
  • By finding personal information in your home;
  • By using any personal information you share on the Internet; and
  • By buying your personal information from "inside" sources.
Once the identity thief obtains your personal information, they have many criminal uses for it such as:
  • They call your credit card company and, pretending to be you, ask to change the mailing address on your account. The impostor then runs up charges on your account. Since your statements are being mailed to a new address, it may take some time before you realize there is a problem;
  • They open a new credit card account, using your name, date of birth and Social Security number. When the impostor uses the credit card and does not pay the bills, this delinquents account is reported on your credit report.
  • The impostor establishes phone or wireless service in your name;
  • They open a bank account in your name and write bad checks on that account;
  • The identity thief files for bankruptcy under your name to avoid paying debts that have incurred under your name, or to avoid eviction.
  • They counterfeit checks or debit cards, and drain your bank account; and
  • The impostor buys cars by taking out auto loans in your name.
  • Now that you know the foundation of identity theft, what can you do to minimize your risk? The key to reducing your risk for identity theft is learning to manage your personal information wisely, including utilizing the following:
  • Before you reveal any personal information, find out how it will be used and whether it will be shared with others. Also, ask if you have a choice about the use of your information (i.e. can you choose to have it kept confidential);
  • Pay attention to your billing cycles. Follow up with creditors if your bills do not arrive on time. Remember a missing bill could mean an identity thief has taken over your credit card account and changed your bill address to cover his tracks;
  • Guard your mail from theft. Deposit outgoing mail in post office collection boxes or at your local post office. Promptly remove mail from your mailbox after it has been delivered;
  • Put passwords on your credit card, bank and phone accounts. Avoid using easily available information like your mother's maiden name, your birth date, the last four digits of your Social Security number or your telephone number, or a series of consecutive numbers;
  • Minimize the identification information and the number of cards you carry to what you will actually need;
  • Do not give out personal information on the telephone, through the mail over the Internet unless you have initiated the contact or know who you are dealing with. Please note that identity thieves may pose as representatives of banks, Internet service providers, and even government agencies to get you to reveal your Social Security number, mother's maiden names, as well as other identifying information. Legitimate organizations, with whom you do business, have the information they need and will not ask you for it.
  • Keep items with personal information in a safe place. To thwart an identity thief who may pick through your trash to capture your personal information, tear or shred your charge receipts, copies of credit applications, insurance forms, bank checks and statements that you are discarding, expired charge cards and credit offers you get in the mail;
  • Be cautious where you leave personal information in your home, especially if you have roommates, employ outside help or are having service work done in your home;
  • Find out who has access to your personal information at work and verify that the records are kept in a secure location;
  • Give your Social Security number only when absolutely necessary. Ask use other types of identifiers when possible; and
  • Do not carry your Social Security card - leave it in a secure place.
  • Order a copy of your credit report from each of the major credit card porting agencies (Equifax, Experian and Trans Union) every year. Make sure it is accurate and includes only those activities you have authorized. Remember that checking your credit reports on a regular basis can help you catch mistakes and fraud before that wreak havoc on your personal finances.
  • What if you are a victim of an identity thief?

    The exact procedures you should take to protect yourself may vary depending on your circumstances, however these three basic steps are appropriate in almost every case of identity theft:

  • First, contact the fraud department of each of the major credit bureaus, and tell them you are a victim of identity theft. Request that a "fraud alert" be placed in your file, as well as a victim's statement asking that creditors call you before opening any new accounts or changing your existing accounts. This can help prevent an identity thief from opening any additional accounts in your name;
  • Second, contact the creditors for any accounts that have been tampered with or opened fraudulently. It is particularly important to notify credit card companies in writing because that is the consumer protection procedure the law, the Fair Credit Billing Act, spells out for resolving errors on credit card statements; and
  • Third, file a report with your local police or the police in the community where the identity theft took place. Be sure to get a copy of the police report in case the bank, credit card company or others need proof of the crime.
  • The above information is a very brief and generic review of the issue of identity theft. All security professionals should contact the Federal Trade Commission at www.ftc.gov for further details on this quickly expanding area of criminal activity.

    Like any other type of crime - education, prevention and awareness are the keys to stopping identity theft in its tracks. I urge all my fellow security professionals to join me in this formidable, but critical, challenge.

    Subscribe to Security Magazine

    Recent Articles by Bruce Mandelblit

    A Must Have For Your Business Emergency Kit

    What Is Suspicious?

    A Hurricane of Emergency Lighting

    Spotting the Suspicious

    A Real-Life RoboCop?

    Bruce is the director of security for a large Central Florida resort, as well as a highly decorated Reserve Deputy Sheriff with a major law enforcement agency.

    Related Articles

    The Latest Tools of the Trade For Front Line Security

    You must login or register in order to post a comment.

    Report Abusive Comment

    Subscribe For Free!
    • Print & Digital Edition Subscriptions
    • Security eNewsletter & Other eNews Alerts
    • Online Registration
    • Mobile App
    • Subscription Customer Service

    More Videos

    Popular Stories

    Dispelling the Dangerous Myth of Data Breach Fatigue; cyber security news

    Major Retailer Macy's Is Hacked

    server room, cybersecurity, penetration testing,

    Explained: Firewalls, Vulnerability Scans and Penetration Tests

    cyber network

    How to Achieve Cybersecurity with Patience, Love and Bribery

    cybersecurity-blog

    European Hotel Group Suffers Data Breach Impacting 600,000 Hotels Worldwide

    cyber5-900px.jpg

    Cybersecurity Workforce Needs to Grow 145% to Close Skills Gap

    SEC2019_Everbridge_1119_360x184customcontent

    Events

    December 17, 2019

    Conducting a Workplace Violence Threat Analysis and Developing a Response Plan

    There are few situations a security professional will face that is more serious than a potential workplace violence threat. Every security professional knows and understands that all employers have a legal, ethical and moral duty to take reasonable steps to prevent and respond to threats of violence in their workplace.
    January 23, 2020

    The Value of a Unified Approach to Critical Event Management

    From extreme weather to cyberattacks to workplace violence, every organization will experience at least one, if not multiple, critical events per year. And in today’s interconnected digital and physical world, the cascading safety, brand, and revenue impacts of critical events are more severe.
    View All Submit An Event

    Poll

    Emergency Communications

    What does your enterprise use to communicate emergencies to company employees?
    View Results Poll Archive

    Products

    Effective Security Management, 6th Edition

    Effective Security Management, 6th Edition

     Effective Security Management, 5e, teaches practicing security professionals how to build their careers by mastering the fundamentals of good management. Charles Sennewald brings a time-tested blend of common sense, wisdom, and humor to this bestselling introduction to workplace dynamics. 

    See More Products
    SEC500_250x180 clear

    Security Magazine

    SEC-December-2019-Cover_144px

    2019 December

    This month, Security magazine brings you the 2019 Guarding Report, featuring David Komendat, Boeing CSO, and many other public safety leaders to discuss threats and solutions for 2020 and security officer training. Also, we highlight Hector Rodriguez, Director of Public Safety and Security at Marymount California University, CCPA regulations, NIST standards, VMS and much more.

    View More Create Account
    • More
      • Market Research
      • Custom Content & Marketing Services
      • Security Group
      • Editorial Guidelines
      • Privacy Policy
      • Survey And Sample
    • Want More
      • Subscribe
      • Connect
      • Partners

    Copyright ©2019. All Rights Reserved BNP Media.

    Design, CMS, Hosting & Web Development :: ePublishing