Email this Article Email   

CHIPS Articles: Facts About Identity Theft

Facts About Identity Theft
By Barbara Figueroa, Lani Gordon, Jim Hoskins, Steve Muck, Charles H. Vaughan - January-March 2011
How do thieves steal an identity? Identity theft starts with the misuse of an individual's personally identifiable information (PII), such as name and Social Security number (SSN), date of birth, mother's maiden name, credit card numbers or other financial account information. For identity thieves, this information is as good as gold.

Skilled Identity Thieves May Use a Variety of Methods to Obtain Personal Information, including:
• Dumpster Diving: They rummage through trash looking for bills or paper with personal information on it.
• Skimming: They steal credit/debit card numbers by using a special storage device when processing a card.
• Phishing: They pretend to represent financial institutions or companies and send spam or pop-up messages to trick people into revealing their personal information.
• Changing Addresses: They divert billing statements to another location by completing a change of address form.
• Old-Fashioned Stealing: They steal wallets and purses; mail, including bank and credit card statements; pre-approved credit card or loan offers; and new checks or tax information. They steal personnel records or bribe employees who have access to PII.

Useful Identity Information:
• The Federal Trade Commission (FTC) reports that approximately 3.6 percent of the U.S. adult population has experienced identity theft. Identity theft of children and the deceased are on the rise. Additionally, medical identity theft is a growing concern.
• The most common forms of identity theft are the fraudulent use of PII to open a new line of credit and the use of credit/debit card account numbers to make purchases.
• The full SSN, linked to a name, is a key element to committing identity theft.
• Crimes occur more often offline than online.
• A significant amount of PII, including Social Security numbers, can be found in public records.
• Risk is greatest when information is stolen by someone targeting the data, e.g., by a hacker or a burglar.
• Most victims find out about identity theft through an adverse action such as a creditor demanding payment on a delinquent bill.
• Half of known identity thieves are known by their victims; one-fourth are dishonest employees.
• The President's Identity Theft Task Force recommended that federal agencies reduce the unnecessary use of Social Security numbers, which it calls "the most valuable commodity for an identity thief."
• Phishing attacks aimed at identity theft affect one in four individuals per month.
• Two-thirds of attacks appear to be from legitimate companies.
• Consumer credit card liability is $50.
• Consumer debit card liability is $50 if reported within 48 hours, $500 if reported within 60 days. After 60 days the victim may lose all the money in the account — in addition to the overdraft amount.
• The Identity Theft Enforcement and Restitution Act of 2008 makes it easier to prosecute thieves and compensate victims for time and trouble.


WHAT DO THIEVES DO WITH A STOLEN IDENTITY?
Once they have your personal information, identity thieves use it in a variety of ways.

Credit Card Fraud:
• They may open new credit card accounts in their victim's name. When they use the cards and do not pay the bills, the delinquent accounts appear on their victim's credit report.
• They may change the billing address for a credit card so that the victim no longer receives bills, and then run up charges on the account. It may be some time before the victim realizes there is a problem because the bills are sent to a different address.

Related CHIPS Articles
Related DON CIO News
Related DON CIO Policy
CHIPS is an official U.S. Navy website sponsored by the Department of the Navy (DON) Chief Information Officer, the Department of Defense Enterprise Software Initiative (ESI) and the DON's ESI Software Product Manager Team at Space and Naval Warfare Systems Center Pacific.

Online ISSN 2154-1779; Print ISSN 1047-9988