Identity fraud, according to Wikipedia is “a form of fraud in which someone pretends to be someone else by assuming that person’s identity, typically in order to access resources or obtain credit and other benefits in that person’s name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if he or she is held accountable for the perpetrator’s actions.”
But how can an identity be ‘stolen’? In a time when almost anything can be done on a computer, phishing is a common process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communication claiming to be from a popular social web site, for example, can be used to lure the unsuspecting public.
Usually in the form of an e-mail or instant message, phishing typically directs recipients to enter details at a fake website which has been designed to closely resemble a legitimate one. The fraudsters then have the information they need to pose as the person who supplied the details, and the information is used for activities such as opening accounts or purchasing items fraudulently.
The public is regularly warned of such threats, but what about those phone calls we may innocently answer…
Remember this call?
Your cellphone rings. The caller ID is hidden…
“Hello.”
“Good afternoon Mrs Jones, I am phoning you from VMC Mobile. Your number has been selected and you qualify for two free tickets to the fourth game of the world cup”
“Tell me more.”
“First I need you to confirm your ID number please.”
You wait for the caller to read out your ID number so that you can confirm it. Nothing is forthcoming.
“Your ID number please,” the caller continues.
If you unthinkingly rattle off your ID number, followed by your address and any other information you are asked to ‘confirm’, you are supplying the caller with enough information for them to effectively pose as you!
Are you a victim?
Jayson O’Reilly, regional manager Africa, McAfee describes identity theft as a serious crime that can cost victims a lot of time and money by destroying their credit and ruining their reputations.
“Identity thieves and hackers target home computers because they know families often do not maintain adequate security protection on their PCs. This makes these family users easy and lucrative targets. Many hackers access your personal information in order to steal your identity and your money. Others might want to use your home computer as a shield to mask their identity as they steal from others,” says O’Reilly. “Phishing is a particular type of identity theft: the online method of fraudulently obtaining personal information for identity theft, such as passwords, social security numbers, and credit card details, by sending spoofed
e-mails that look like they come from trusted sources, such as banks or legitimate companies.”
According to O’Reilly typically, phishing e-mails request that recipients click on the link in the e-mail to verify or update contact details or credit card information. Like spam, identity theft e-mails are sent to a large number of e-mail addresses with the expectation that some percentage of recipients will read the messages and disclose their personal information.
Wally Gast, regional profit centre manager at Chartis South Africa, Personal Lines, Africa Region, defines identity theft as “the unauthorised and illegal use of personal information to obtain a loan or open credit accounts that the victim did not authorise.”
According to Gast, identity theft is on the rise, not only because of the vast amount of personal information that can be accessed via the Internet, but also the ‘low tech’ ways that this crime can be committed.
“This can happen when people lose or have their ID books stolen, when criminals go through your garbage to find old accounts and statements or swipe your mail for the same purpose. People really need to take care with documents when they throw them away. Shredding documents before disposal is a very good idea,” says Gast.
“We also take note of notorious cases where the Department of Home Affairs has issued duplicate identification books using the identification number of an innocent person. There are also a lot of cases where people have discovered they are ‘married’ to someone only when they start getting massive bills in the post. It is worthwhile to have protection against this type of crime especially as it is so prevalent in South Africa. Getting your identity back can take weeks of personal time and could cost tens of thousands of Rands in legal fees,” he adds.
O’Reilly further points out that this form of cybercrime is a federal crime in the United States and the country’s Federal Trade Commission has named identity fraud as the most popular form of consumer fraud.
In South Africa the issue continues to plague general trade, with authorities continuing to receive more complaints than in the past. It is particularly prevalent within the world of finance and fraudsters have emerged far more tech-savvy than in the past. It occurs when a criminal uses personal information to produce false FICA documents, to steal financial resources,” he adds.
Get protected
“As with any threat, the more a person is empowered with knowledge, the better. An example of identity fraud is when someone steals personal information, opens a credit account in your name without permission, and charges merchandise to those accounts. Conversely, identity fraud does not occur when a credit card is simply stolen. Stealing one’s credit card may be consumer fraud, but is not identity fraud” he adds.
Aside from being informed and staying informed, the consumer and user of information, communication and digital lifestyle technology has various options available to ensure that they do not fall victim to this fraud. The problem cannot completely be eradicated, but there are a number of steps that can be taken to reduce risk.
“Criminals can commit identity theft relatively easily because of lax credit industry practices, careless information-handling practices in the workplace, and the ease of obtaining personal information. But you can reduce your risk of fraud by following a few very practical tips. The most important advice we can give you is to check your credit report at least once a year. If you are a victim of identity theft, you will catch it early by checking your credit report regularly,” Gast concludes.
Buyer beware
* When using your credit and debit cards at restaurants and stores, pay close attention to how the magnetic stripe information is swiped by the waiter or clerk. Dishonest employees have been known to use small handheld devices called skimmers to commit fraud.
* When creating passwords and PINs (personal identification numbers), avoid using common information or combinations that would easily be linked to your details.
* Install a firewall on your home computer to prevent hackers from obtaining personal identifying and financial data from your hard drive. This is especially important if you connect to the Internet by DSL or cable modem.
* Install and update virus protection software to prevent a worm or virus from causing your computer to send out files or other stored information.
* Subscribe to an Identity Protection Services that offers insurance against identity theft.
Proactive steps for victims of ID theft
* Report the theft to local law enforcement representatives.
* File a complaint and complete the ID theft affidavit.
* Inform all relevant institutions of the fraudulent activity – both telephonically and in writing.
* Send follow-up letters to the credit bureaus detailing the status of resolution with institutions and creditors.
Telephone tactics
* When a caller asks you to ‘confirm’ any information, they need to supply that information first and you either confirm it as correct or not.
* Private information, eg, your full name, phone numbers, e-mail address, credit card numbers, postal address and e-mail address, could be used for identity theft. Do not give these out over the phone unless you have made the call and you are certain of whom you are talking to.
* Ask the caller to identify themselves by name and company. If you have any suspicion, ask to be transferred to their superior, and ask for a reference number for the call.
For more information contact:, Ideco, +27 (0)11 745 5600, www.ideco.co.za
Tel: | +27 12 749 2300 |
Email: | [email protected] |
www: | www.ideco.co.za |
Articles: | More information and articles about Ideco Biometrics |
© Technews Publishing (Pty) Ltd. | All Rights Reserved.