Identity theft is one of the fastest growing crimes and is now costing the public a minimum of £1.6 million A DAY. Some insurance companies may cover the losses to individuals, but these costs are ultimately passed on to the public. Whether you are a victim or not, on average you will still be contributing to recuperating these losses at approx £35 per UK person per year.
What is Identity Theft
Identity theft is falsely taking on an identity to gain or attempt to gain, some advantage or goods. Pretending to be someone in private is not a crime. You could state you were Mickey Mouse or the President of the United States. It’s when you try to use that persona for gain that a crime occurs, or when you possess or create documents or articles to pursue this persona.
Identity Theft is not a statutory or common law crime in its own right. It is a name given to the method criminals are now using to perpetrate various types of fraud and theft.
Stealing the information to perpetrate that persona can also be a crime.
The Identity Cards Act, 2006, creates offences relating to possession, control, and intent to use false identity documents or genuine documents relating to someone else. These documents refer to identity documents such as Passports, Driving Licences, Immigration documents or Identity cards, including documents issued in other countries.
The Fraud Act, 2006, creates a new offence of fraud committed in one of three ways. By making a false representation with intent to gain, cause loss or risk to another; by failing to disclose information; and by abuse of position. Offences are also created regarding obtaining services dishonestly, possessing equipment to commit fraud, and making and supplying of articles for use in fraud.
Identity theft does not necessarily have to affect an individual. Corporate Identity Theft is possible where a companies name and business has been misused and others are conned into believing the company legitimate.
Protecting Yourself
Your personal information is a valuable commodity to the criminal. This information is often gained from sources you make available. Your rubbish, document left lying around, giving information carelessly to persons in the street, on the phone, or by mail.
Providing information carelessly to on-line communities and forums can result in Identity theft.
Do not believe that Identity Theft is a new age crime confined to the realms of computer hackers. All it needs is for someone to pick up a utility bill with your name and address on it for the problems to start.
Start with the obvious
- Prevention is better than cure. On average a victim can spend anywhere between six months and two years recovering from identity theft.
- If a regular bank statement or utility bill does not arrive on time then contact the company or bank.
- Check all bank statements when they arrive, or use online banking to monitor your accounts.
- When disposing of any document with your personal information on it then shred it properly.
- When you answer the phone to someone purporting to be from a company, bank or official body, do not give out any personal information. They may ask for some form of confirmation of your identity, i.e., your mother’s maiden name, etc, before they can continue. Remember, they phoned you. You do not really know who they are.
- Do not use mother’s maiden name, etc., as a password. How many genealogy sights are there on the web???
- Do not let your credit/debit cards out of your sight when paying for goods. If paying for a meal at a restaurant the go to the cashier with your card. Do not let them late it away from the table.
- If you live in a building shared by others then request with you bank that you collect any newly issued card direct from them.
- If you move house then let Banks, Credit companies, catalogue companies etc, that you have moved. Request mail redirection from the Post Office.
- If you believe you mail is being stolen or intercepted then report this immediately to the Royal Mail on 03457 740 740.
- Obtain a copy of your personal Credit File from one of the three credit reference agencies (Experian, Call Credit, Equifax) to see which companies have accessed your file.
- Do not carry important documents around with you unnecessarily, especially your passport. Keep these safe until needed. If any identification documents are stolen or lost the report this immediately to the issuing authority. This includes any work identification badges or documents.
- If your credit or bank card is stolen report it immediately. Keep emergency telephone numbers handy. Further information can be found at Card Watch web site.
Are you a Victim?
- You identity entries on bank statements from companies you do not normally deal with.
- You have been refused credit, loans, or financial service, despite having a good credit history.
- You receive receipts, bills or invoices for goods you never requested.
- You start receiving letters from Lawyers and debt collection companies.
- You receive some form of “follow up courtesy call” from a company you’ve never dealt with.
- Destroy old bank cards properly and remember to sign new ones.
What can you do about it?
- If you are a victim of Identity Theft then act immediately by contacting the company or Bank with whom your suspicions were first raised.
- Obtain a copy of your credit file from Call Credit, Equifax or Experian.
- Keep copies and details of all transactions between yourself and the companies you are dealing with.
And Finally
Social Engineering
Kevin Mitnick was regarded as one of the most feared men in the united States because of his prowess at ‘Hacking’ into computers. Although he was adept at this he found it easier for people to give him the information. He became proficient at Social Engineering, where he would pretend, by phone, in person or letter to be someone else who was permitted to have that information.
He states in his book ‘The Art of Deception’,
“Individuals may follow every best security practice recommended by experts, lavishly install every recommended security product, and be thoroughly vigilant about proper security system configurations and applying security patches…………………Those people are still completely vulnerable”
......................................................................................... Like and Follow us on facebook