February 4, 2023
ID fraud that damages as many as 10 million people a year. In a word, there are various types of ID fraud, and the degree of damage and the difficulty of dealing with problems also vary. Let's see what they have.

ID fraud

ID fraud that damages as many as 10 million people a year. In a word, there are various types of ID fraud, and the degree of damage and the difficulty of dealing with problems also vary. Let’s see what they have.

Types of ID fraud

There are three main types of ID fraud. The first is the type where an already opened account is abused, and the latter two are the types where a new account is opened by spoofing.

Abuse your existing account : Shop with someone else’s credit card, steal money from your bank account with a debit card, and so on. With regard to credit card misuse, federal law stipulates that the maximum damage burden for consumers is $ 50 per case, and major credit card companies usually do not even demand that $ 50, so there is no consumer damage. Most of the time. Credit companies themselves keep an eye on consumer usage patterns to prevent damage to their own, so they can often be found at a relatively early stage. In most cases, you will not cause any major damage because you only need to open a new credit card account, assign a new number, and transfer your history to the new card account.

Impersonating a public agency : Impersonating another person with government documents, providing information about another person when caught by the police, impersonating another person, and getting tax credits. This is not something you can notice if you check your online history or statement like the credit card fraud above. It is often discovered long after the damage has occurred.

Opening a new account : A type of scam that impersonates another person, creates a credit card, contracts a loan, receives medical services at a hospital, rents an apartment, etc. .. Since the bill is not paid, the credit report of the person who was involved in the ID fraud will record payment delays, collector notifications, bad debt records, etc., and the credit score will worsen. This is the type of ID fraud that takes the longest to solve.

Some types of ID fraud can easily solve the problem, but the most troublesome type of problem, especially removing accounts that have not been paid after being opened by ID fraud, from the victim’s credit report, etc. The process requires a lot of time and effort.

Causes of ID fraud

There are various causes of ID fraud. Some people are afraid of ID fraud and do not shop on the Internet, but in reality, many ID frauds occur in places that are not related to the Internet, or even if they are related, they cannot be prevented by stopping online shopping.

<Around me>

  • Obtain personal information and financial information from direct mail, account statements, etc.
  • People who have access to their personal information, such as family members, relatives, and friends, steal the information.
  • Get the personal information that remains inside by stealing PCs, mobile phones, memory sticks, hard drives, etc., or picking up things that have been thrown away.
  • Steal or pick up purses and bags. Get personal information from credit cards, debit cards, driver’s licenses, social security cards, passports and more.
  • Steal mail from the mailbox, steal bank account numbers and personal information. The payment envelopes I put in the mailbox for the mail delivery person to take, and the new checkbooks sent by mail have been stolen.


  • Secretly read and steal personal information typed on a PC using spyware etc.
  • Obtain personal information from publicly available public databases such as county tax records and real estate registrations
  • Send an e-mail disguised as a financial institution, enter personal information such as account number, password, credit card number, etc. and steal it (phishing fraud). Pretending to be a job search site, uploading resumes and stealing personal information.
  • Hacking online stores and corporate databases that store personal information and stealing personal information

<Stores and restaurants>

  • When a customer has a machine read a credit card or debit card at a gas station, the magnetic information is read by a tool called a skimmer installed in the machine. In restaurants and stores, magnetic information may be read instantly using a skimmer so that the clerk cannot see it.
  • Anyone with access to the employee database steals employee personal information
  • Employees of a company that accepts personal information such as application forms and application forms illegally use customer’s personal information

Countermeasures against ID fraud

Shred documents with personal information : financial documents such as banks and investment accounts, pre-approved credit card direct mail, medical documents, personal check copies, invoices, insurance documents , It is basic not to throw out expired credit cards as they are. Here are the priorities for what information should be shredded:

  • Low priority : name, address, phone number
  • Medium Priority : Information such as date of birth, place of birth, mother’s maiden name, etc. that is required when changing passwords
  • High Priority : Social Security Numbers, Driver’s License Numbers, Account Numbers, PINs and Passwords

Opt out : There are also ways to reduce the amount of paperwork you shred. The credit card direct mail we get is sent by credit card companies by purchasing a list of individuals that match their target from the credit bureau. Opting out of this list means that your name and address will no longer be on the list and, as a result, you will not receive such direct mail from your credit card or loan company.

Opt out from www.optoutprescreen.com . This site is a joint venture of Equifax, Exprian, Trans Union and others. There are other sites that accept opt-out for a fee, but the best option is to do it for free at the above site of the original family.

You can request a 5-year opt-out online. You can opt out permanently by mailing the application with your signature. You can also opt in (get your name on the list) at any time if you want to receive direct mail, such as refinancing your loan or switching to a better credit card.

Use a mailbox with a lock : You can shred or not shred what you receive by opening it, but it doesn’t start if it’s stolen before you get it.

Post your shipment to the mailbox : Similar to the above, you may have your envelope stolen in your mailbox for someone to take with you. In particular, they are checked along with the invoice. It may also be an application to open an account. If you have to reach the recipient, we will send you a Certified Mail from the post office. Even if it doesn’t arrive, if something is inconvenient to be seen by others, I will post it to the mailbox. If neither is the case, it’s a good idea to use your home mailbox.

Keep sensitive information, such as your account number, in a lockable location: It’s unlikely that a thief will get your information stolen, but if someone comes in or out to refurbish, repair, or maintain your home. You will need to be careful not to put your personal information in a careless place.

Don’t carry a social security card : Some people have a number card issued by a social security office in their wallet. It is unlikely that you will have to show this card, and if you lose your wallet or it is stolen, you will expose your debit card, credit card, driver’s license and even your social security number to others. It could spread the damage. Memorize the number as much as possible and keep your social security card in a safe place.

Don’t provide your social security number unnecessarily : If you are asked to enter your social security number, we have the right to refuse. Also, if you’re an organization that takes security and liability seriously, you shouldn’t ask for it unnecessarily unless you really need it. On the contrary, it is difficult to manage. Generally, a social security number is required for government-related documents such as tax procedures and passports, financial institutions such as banks and investment companies, and insurance-related processing. In other cases, don’t fill it out and ask why you need it. Unexpectedly, I get a reply saying “You can leave it blank”.

Check company information management and shred policies : Although policies can be checked online at large banks, personal information and financial information are inevitably provided by companies with few transactions or unknown organizations. If you have to do so, it is a good idea to check the information management and information destruction policies of the company or organization. If you feel uneasy, don’t provide information.

Complete a complete list of wallet contents : A list of credit cards, debit cards, driver’s licenses, health insurance cards, etc. and account numbers in your wallet so that you can quickly cancel your account or certificate if you lose your wallet. Keep your contacts in a safe place. The fastest way is to keep a copy of the front and back of each card.

See if the card reader looks unnatural : There is an increasing number of ways to attach a small device called a skimmer to a card reader at a gas station or a cashier at a gas station to instantly read and store card information. It may be inconspicuous and difficult to distinguish, but at least check the reader for any unnatural shape.

Be careful when a clerk goes to the back with a card: There have also been cases where a clerk who received a credit card went into the back and read the card information with a skimmer hidden under clothes. Be vigilant when the card goes out of your reach. If it’s a reliable restaurant or hotel, it’s okay (even if there’s one bad person, it’s stolen), but if you’ve never been to a suspicious store, you dare to pay in cash. May be safe.

When providing personal information online, go to the site yourself : Do not provide personal information on the page you reach by clicking the link in the email message. Even if you see a link called www.bankofamerica.com in your message, it’s very easy to set it to take you to a completely unrelated site called www.badguy.com when you click on it. It’s also easy to create a truly authentic site using the Bank of America logo on your own. When providing personal information, you can type www.bankofamerica.com yourself and follow the site from the top page (use the in-site search) instead of the site that was guided from somewhere. ) And make sure that the URL address starts with https: // (https s is security s, indicating that the site uses a security-enabled protocol. However, this can also be forged.)

Do not post personal information on social media sites : If you use social media such as Facebook, you should not post personal information such as your birthday. If you really want to post it, it is a good idea to post the wrong information such as one day difference or one year difference. Also, the choice of information sharing on your site should always be set to protect your privacy.

Use strong passwords: Passwords are a headache for many. If it is too complicated, you will not be able to remember it, and saving it somewhere or writing it on paper will cause a secondary risk. Avoid passwords that could be easily compromised if your personal information, such as your birthday or your child’s name, is stolen. Recently, an increasing number of sites are requesting passwords that include both uppercase and lowercase letters and numbers and special characters.

A good way is to think of the phrase first and then generate the password from it. For example, from the phrase “It’s so hard to remember password!”, Take the first letter of each word and create the string Ishtrp. Replace the first I with a similar number 1, replace the last password with a capital letter PW, and add the exclamation mark as a special character at the end to create a very strong password, 1shtrPW !, and remember it. Is not so difficult. Try it.

Leave a Reply

Your email address will not be published. Required fields are marked *