Identity Theft

What You Need to Know About Identity Theft

Posted on
by

shutterstock_193458053

Identity theft usually involves taking and using the identity of another person without his or her permission.  This stolen identity is often used to commit fraudulent acts (identity fraud). Armed with a person’s name, contact information, credit card information and social security number, identity thieves can commit crimes at the victim’s expense, in his or her name.

Ronald Noble, founder of RKN Global, identifies identity theft as one of the most serious crimes, both because of the financial harm it can cause to victims and because it can empower criminals to commit other types of crime.

The most common types of identity theft are:

  • Credit card theft – Credit card theft often goes undetected because many people do not check their monthly credit card statements, and therefeore do not notice small, incremental charges that are made by thieves.  People who spend a few thousands of dollars each month are unlikely to notice 10-dollar charges, for example.

This type of identity theft made Russians Vladimir Drinkman, Roman Kotov and Alexandr Kalinin famous when they successfully stole credit card numbers which collectively had $300 million dollars worth of credit. They then turned these numbers to a middle-man who would encode them onto blank plastic cards and sell them on online forums.

Anup Patel was a criminal who innovated an original scheme to steal credit card information.  Along with an accomplice, he attached a “skimmer” mechanism to ATM machines and cameras nearby that enabled him to read the credit card numbers and the PIN codes associated with them whenever someone went to use the ATM.    

The skimmer idea was adapted by some employees in varied establishments, where waiters would double-swipe a credit-card—once legitimately, and the second time using a skimmer to capture the credit card information.   With this information in hand, he or she could commit future fraud on those credit cards. In 2011, twenty-eight people were caught working together caught in such a scheme in different businesses where they had access to high-limit credit cards. Together, they made a million dollars’ worth of luxury purchases on the stolen cards.

  • Child identity theft – Child identity theft offers thieves a unique opportunity to create a new identity that often can take years to trace.  The reason child identity theft is so attractive to criminals is because most of the victims are not going to actively to make the types of transactions and applications that would involve their credit until they are older.  This gives thieves a window of opportunity to commit long-term fraud without detection.

A three-pronged variation on this theme expands the reach of child identity theft.  It has three main steps: make up, pump up and run up. Child identity theft involves the thieves committing child identity theft to “make up” a believable identity. False identity in hand, they “pump up” the value of the identity by establishing a good credit rating, which is what banks use to assess loan application and credit card limits.

They then can get more cards approved using that identity, leading to the last stage, where they “run up” large debts which they never pay back. This type of elaborate plan has affected thousands.

  • Social identity theft – Social identity theft involves using a victim’s name, private information and even photos to make a fake account on social media. Because of its popularity, this method has even inspired the creation of a widely popular show, “Catfish.”

This allows criminals to hide behind your identity to make friends and engage in relationships. They can send messages to your friends and relatives, asking for help or money. Alternatively, they can use your identity on social media to access other information about you, enabling access to your credit cards, health insurance or tax details.  Some schemes hold your account  hostage until you pay a ransom to unfreeze it.

Other common kinds of identity theft are medical – where criminals steal health insurance information to make false charges against a victim’s health insurance company, tax-related – which allows thieves to file fake tax returns and get the victim’s refund check, and criminal identity theft – which allows criminals to attach victims’ identity to their own criminal records.

RKN Global’s founder, Ronald Noble, notes that identity theft thrives on opportunity.  Precautions and victimization are inversely proportional: The more one can take precautions against identity theft, the less vulnerable he or she will be.

Continue reading