Identity Theft


Published on

Identity theft occurs when an unauthorized person uses your name, date of birth, social security number or other forms of identity to obtain credit in your name without your consent. Some identity theft methods include phishing, vishing, pretexting, shoulder surfing, dumpster diving, atm skimming and more. Stay alert and informed and protect yourself and your identity.

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Identity Theft

  1. 1. Identity Theft<br />Consumer Affairs Branch<br />Fairfax County Department of<br />Cable and Consumer Services<br /><br />
  2. 2. WHAT IS IDENTITY THEFT?<br />Identity Theft Is A Crime<br />Identity theft is the fastest growing crime in America.<br />Identity theft is a crime under the Virginia Identity Theft Protection Act. (Code of Virginia, Section 18.2-186.3)<br />There were 6,349 Identity Theft victims in Virginia from January 1–December 31, 2008. This is an increase of 1,030 from 2007.<br /><br />
  3. 3. WHAT IS PERSONAL IDENTIFYING INFORMATION?<br />Name<br />DOB<br />Social Security Number<br />Driver’s License Number<br />Bank Account Numbers<br />Credit Card Numbers<br />Passport Number<br />PIN<br />Fingerprint<br />Voiceprint<br />Electronic ID Number<br />Retina or Iris Image<br />Biometric Data<br /><br />
  4. 4. How Does Identity Theft Occur?<br /> When a thief misuses personal identifying information to get goods, services, benefits, or documents using someone else’s identity to:<br />Get a Social Security Card.<br />Get a driver’s license.<br />Open bank or credit card accounts.<br />Secure loans on cars and housing.<br />Obtain employment.<br />Commit a crime using your identity.<br /><br />
  5. 5. GAMES IDENTITY THIEVES PLAY<br />Phishing<br />Fraudulent process of acquiring sensitive information (usernames, passwords or credit card details) by masquerading as a trustworthy entity. Phishing is typically carried out by email, and directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one.<br />Vishing<br />Voice phishers ask you to call a phone number to verify information. When you call, the scammer will ask for your personal or financial information so they can access your bank accounts.<br /><br />
  6. 6. GAMES IDENTITY THIEVES PLAY<br />Pretexting <br />Someone calls you by phone posing as a legitimate business or company. They ask for personal information in an attempt to steal or use your identity. <br />Shoulder Surfing<br />Eavesdroppers or “shoulder surfers” listen to your conversation when you give out personal information in a public area, or watch you punch in your telephone calling card number or credit card number. <br /><br />
  7. 7. House Stealing<br />Scam artists assume the identity of a homeowner by using fake IDS. They transfer the deed into their name by forging signatures. <br />Dumpster Diving <br />Dumpster divers go through garbage cans, communal dumpsters or trash bins to get unshredded bills, credit card statements, or anything with personal identifying information. <br /><br />GAMES IDENTITY THIEVES PLAY<br />
  8. 8. Wi-Fi<br />Hackers cruise around looking for unsecured networks at airports, coffee shops, hotels, bookstores, schools, and other locations to launch attacks. Secure your network. <br />ID Spoofing<br />An ID spoofing service allows a caller to change what someone sees on their call display when they receive a phone call. They can make any number appear on a Caller ID system. <br /><br />GAMES IDENTITY THIEVES PLAY<br />
  9. 9. Skimming<br />Identity thieves capture your credit or debit card numbers by using a special device that reads and stores the information from the card’s magnetic strip.<br />ATM Machines<br />The camera views the keyboard and monitor and sends a wireless picture of your transaction.<br /><br />GAMES IDENTITY THIEVES PLAY<br />
  10. 10. What to Do if You Become a Victim<br />Contact one of the three credit reporting agencies to place a fraud alert on your credit report. <br />Keep track of when the alert expires so you can ask for another one if necessary. <br />Keep a detailed record of all conversations and keep copies of all correspondence.<br /><br />
  11. 11. What to Do if You Become a Victim<br /><br />In Fairfax County, file a report with the Financial Crimes Division of the Fairfax County Police Department at 703-246-7800, or file on-line at: <br /><br />File a complaint with the Federal Trade Commission. The FTC maintains a database of identity theft cases. Call the FTC at 1-877-ID-THEFT.<br /><br />
  12. 12. What to Do if You Become a Victim<br />Once you have filed a police report or obtained a court order expunging a record, apply for an Identity Theft Passport from the Virginia Office of the Attorney General.<br />1-800-370-0459 <br /><br /><br />
  13. 13. Be Alert!<br />Bills that don’t arrive on time or don’t come at all. <br />Receiving credit offers or cards you didn’t apply for.<br />Being denied credit.<br />Less favorable credit terms, or a high interest rate.<br />Calls or letters from debt collectors or businesses about merchandise or services you didn’t buy.<br /><br />
  14. 14. Contact the Fairfax County Consumer Affairs Branch for more information:<br /> 12000 Government Center Parkway, Suite 433<br />Fairfax, Virginia 22035<br />703-222-8435 TTY 711<br /><br /><br /><br />Contact Consumer Affairs<br />