In this document, forensic document examiner, Mark Songer, provides an introduction to the science of forensic handwriting analysis. He discusses the steps that a forensic document examiner follows,…
In this article, forensic document examiner, Mark Songer D-ABFE, CFC, discusses some of the methods used by identity thieves to acquire personal data and strategies that individuals can use to guard against identity theft.
With the announcement earlier in 2014 of a major data security breach from Home Depot, it seems that identity thieves never fall short of finding an endless supply of victims. The retailer stated that over 56 million credit and debit card numbers were compromised over a five-month period in one of the worst breaches of customer data ever recorded. The data theft began in April as hackers installed malware onto the retailer’s computer servers. Home Depot has assured consumers whose data was breached and exploited that the malware was removed. Home Depot has offered a year of free credit report monitoring to customers who risked their financial information during those five months. [1] However, this can be of little comfort for those who were victimized by the breach and expected better protection and privacy as a consumer.
According to a report written by the Department of Justice’s Bureau of Justice Statistics, it is estimated 16.6 million people experienced some type of identity theft in 2012. The financial fallout of these crimes was calculated at a staggering $24.7 billion dollars. What may be considered equally frightening is the way victims were said to have commonly discovered that they were indeed victims; through the monitoring of their financial institutions. [2] Financial institutions, such as US Bank, tote on their website that they are using “state-of-the art tools and monitoring systems to ensure your identity is safe… [3] However, with identity theft bringing in billions of dollars a year, one can speculate that consumers still have quite a way to go to help prevent their own identity from being stolen and exploited.
Though this seems to be the most prevalent way a criminal can tap into privacy of a consumer, there are a few other notable ways that identity crimes have been successful. Synthetic identity, mass marketing and senior citizen identity frauds are other ways that crooks invade the everyday lives of an unsuspecting victim. Financial institutions are not the only groups to have specialty units targeting identity theft. Federal, state and local law enforcement agencies have employed officers solely to target these crimes in their jurisdictions. [4]
Synthetic identity theft has become the antithesis to what we would call “true identity theft.” With synthetic identity theft, a criminal will use a fake name, address or phone number with the victim’s real social security number. This is a combination of real and fake information to obtain a fake or synthetic identity. As opposed to true identity theft in which a crook will take all of your real information to use for misappropriated gain. However, both of these types of identity theft allow the criminal to obtain credit, apply for mortgages, and obtain other goods and services in with the victim’s social security number.
Credit bureau monitoring does not help consumers figure out if they have a synthetic identity. Here’s why: since synthetic identity has your social security number, but not your name, it creates a sub-file that is linked to your credit report. This sub-file is hidden from your main credit file so it would not be something you would see yourself if you pulled up your credit report online. Bigger problems occur if there is negative reporting on that sub-file which could impact your credit score. And, because of the nature of a sub-file, credit monitoring or a fraud alert will not stop the criminal from continuing to use the fake credentials. [5]
Synthetic identity theft and fraud can be problematic for the credit bureaus to detect and resolve. The information they are using is partially correct so it creates a problem for the credit agency to try and fit the pieces of the puzzle. Considering the amount of credit profiles that are being updated every day, one can speculate that it probably takes some time for this type of fraud to be resolved.
Another troublesome venture for criminals trying to steal your identity is the use of mass marketing fraud. This crime is generally any type of fraud scheme that uses one or more mass-communication techniques and technologies. This can be the Internet, use of telephone, the mail, and group meetings with the intent to fraudulently solicit, conduct transactions or transmit monetary proceeds to a financial institution or others knowingly involved in the scheme. [6]
According to the Department of Justice Criminal Fraud website, mass-marketing fraud schemes generally fall into three main categories: advance-fee fraud, bank and financial account schemes and investment opportunities.[6]
An example of an advance-fee fraud scheme is an online business opportunity that affords a victim to work from home. These ventures solicit individuals to pay upfront monies that range from a few hundred to a few thousand dollars to set up their business. Unknowing to the consumer, they are being scammed. By the time the victim realizes that it is a scam, the fraudster’s contact information no longer is valid and has already moved on to the next victim.
The Department of Justice’s fraud website compiled a helpful list of steps that consumers can take to help individuals recognize if they are being used in mass marketing schemes. These can include, but are not limited to:
While mass marketing identity theft continues to be profitable for thieves, it is senior citizens that remain the largest target of identity theft crimes. According to the Federal Trade Commission’s 2013 statistical report, identity thefts from senior citizens are their top consumer complaint. Seniors represent nearly 36 percent of all identity theft victims. Another 49 percent of victims over 50 years of age are victims of fraud that entails a criminal lying about their identity and delivering documents or requests for personal information.[7]
Seniors can be targeted by phone calls, mail or emails. Scammers contact seniors claiming to be a legitimate company, a government entity or financial institution. Victims are then tricked into sharing their account passwords, social security numbers, bank account numbers, and credit card numbers. Armed with the illegally obtained information, criminals can obtain government documents, new credit card accounts or other financial transactions in the victim’s name.
Several schemes that prey on the elderly are reverse mortgage scams, funeral and burial frauds, healthcare or prescription medicine fraud, along with host of telemarketing schemes. The elderly can also fall victim to identity theft from a person pretending to help with groceries, but is a thief or even a store employee that makes off with their purse. Wallets and purses provide thieves with PIN numbers, checks, credit cards, driver’s licenses and other personal identification. Some useful tips to prevent this type of theft include:
If you have become a victim of identity theft, it is important to report it to the proper authorities. Notifying your bank is foremost when finding that monies have been stolen from your account. Stop payment on any outstanding checks that may not have cleared, change your Automated Teller Machine (ATM) card, account, and Personal Identification Number (PIN). Also, contact other financial institutions that had accounts set up without your knowledge and close those accounts immediately. Finding the check verification companies that have been used in setting up an account or used in the purchase of goods or services need to be informed. 9Utility and cell phone service accounts that have been illegally obtained in your name should be shut off. This is a jumping off point to begin to rectify the problems that victimized consumers must deal to gain some control over their identity.
The California Public Interest Research Group (CalPIRG) and the Privacy Rights Clearinghouse offers the following comprehensive list of other actions to be taken according to the type of identity theft that has occurred:
Under the Identity Theft and Assumption Deterrence Act, the FTC is responsible for receiving and processing complaints from people who believe they may be victims of identity theft, providing informational materials to those people, and referring those complaints to appropriate entities, including the major credit reporting agencies and law enforcement agencies. The FTC offers more information on their identity theft Website.
You may also need to contact other agencies for other types of identity theft:
The 3 major credit-reporting companies in the United States each have designated fraud units.
Equifax
Experian
Transunion
In this document, forensic document examiner, Mark Songer, provides an introduction to the science of forensic handwriting analysis. He discusses the steps that a forensic document examiner follows,…
This article provides an introduction to the processes utilized by forensic experts performing Questioned Document Examinations. Robson Forensic experts specializing in questioned documents frequently…
In this article, Forensic Document Examiner, Mark Songer provides an overview of the cases where forensic document examination can be applied, the techniques and technologies used, and standards that…