Why are computer users more susceptible to being a victim of identity theft?

Definitionidentity theft

  • Share this item with your network:

Why are computer users more susceptible to being a victim of identity theft?

By
  • Ben Lutkevich, Technical Writer

What is identity theft?

Identity theft, also known as identity fraud, is a crime in which an imposter obtains key pieces of personally identifiable information (PII), such as Social Security or driver's license numbers, to impersonate someone else.

The stolen information can be used to run up debt purchasing credit, goods and services in the name of the victim or to provide the thief with false credentials. In rare cases, an imposter might provide false identification to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen.

Types of identity theft

The two categories of identity theft are:

  1. True-name identity theft means the thief uses PII to open new accounts. The thief might open a new credit card account, establish cellular phone service or open a new checking account to obtain blank checks.
  2. Account-takeover identity theft is when the imposter uses PII to gain access to the person's existing accounts. Typically, the thief will change the mailing address on an account and run up a bill before the victim realizes there is a problem. The internet has made it easier for identity thieves to use the information they've stolen since online transactions are made without any personal interaction.

There are many different examples of identity theft, including:

  • Financial identity theft. This is the most common type of identity theft. Financial identity theft seeks economic benefits by using a stolen identity.
  • Tax-related identity theft. In this type of exploit, the criminal files a false tax return with the Internal Revenue Service (IRS), for example, using a stolen Social Security number.
  • Medical identity theft. This is where the thief steals information, such health insurance member numbers, to receive medical services. The victim's health insurance provider may get fraudulent bills. This will be reflected in the victim's account as services they received.
  • Criminal identity theft. In this example, a person under arrest gives stolen identity information to the police. If this exploit is successful, the victim is charged instead of the thief.
  • Child identity theft. In this exploit, a child's Social Security number is misused to apply for government benefits and open bank accounts or other services. Criminals often seek the information of children because the damage may go unnoticed for a long time.
  • Senior identity theft. This type of exploit targets people over the age of 60. Senior citizens are often identified as easy theft targets. It is important for seniors to be aware of the evolving methods thieves use to steal information.
  • Identity cloning for concealment. In this exploit, a thief impersonates someone else to hide from law enforcement or creditors. Because this isn't always financially motivated, it's hard to track and there often isn't a paper trail for law enforcement to follow.
  • Synthetic identity theft. In this type of exploit, a thief partially or completely fabricates an identity by combining different pieces of PII from different sources. For example, the thief may combine one stolen Social Security number with an unrelated birthdate. Usually, this type of theft is difficult to track because the activities of the thief are recorded files that do not belong to a real person.

Identity theft techniques

Although an identity thief might hack into a database to obtain PII, experts say it's more likely the thief will obtain information using social engineering techniques. These techniques include the following:

  • Mail theft. This is stealing credit card bills and junk mail from a victim's mailbox or from public mailboxes on the street.
  • Dumpster diving. Retrieving personal paperwork and discarded mail from dumpsters is an easy way for an identity thief to get information. Recipients of preapproved credit card applications often discard them without shredding them first, which increases the risk of credit card theft.
  • Shoulder surfing. This happens when the thief gleans information as the victim fills out personal information on a form, enters a passcode on a keypad or provides a credit card number over the telephone.
  • Phishing. This involves using email to trick people into offering up their PII. Phishing emails may contain attachments bearing malware designed to steal PII or links to fraudulent websites where people are prompted to enter their information.

How to tell if your identity has been stolen

In 2017, major credit bureau Equifax experienced a data breach that exposed 147 million people's data. A settlement of $425 million was agreed upon to help the victims affected. It is still regarded by some as the most significant instance of identity theft in recent history due to the large-scale damages and significance of the breached organization. This breach occurred due to a number of security lapses by Equifax.

Warning signs of being an identity theft victim include:

  • victims notice withdrawals from their bank account that weren't made by them;
  • an impacted credit score;
  • victims don't receive bills or other important mail containing sensitive information;
  • victims find false accounts and charges on their credit report;
  • victims are rejected from a health plan because their medical records reflect a condition they don't have;
  • victims receive an IRS notification that another tax return was filed under their name; and
  • victims are notified of a data breach at a company that stores their personal information.

Impact and prevention

In addition to losing money and accruing debt, victims of identity theft can incur severe intangible costs. These include damage to reputation and credit, which can prevent victims from getting credit or finding a job. Depending on the circumstances, identity theft can take years to recover from.

To protect yourself from identity theft, experts recommend individuals regularly check credit reports with major credit bureaus, pay attention to billing cycles and follow up with creditors if bills do not arrive on time.

Additionally, people should:

  • destroy unsolicited credit applications;
  • watch out for unauthorized transactions on account statements;
  • avoid carrying Social Security cards or numbers on them;
  • avoid giving out PII in response to unsolicited emails; and
  • shred discarded financial documents.

Many state attorney general websites also offer identity theft kits designed to educate people on identity theft prevention and recovery. Some offerings include helpful documents and forms. The Identity Theft Affidavit, for example, is the form used to officially file a claim of identity theft with a given business. This form in particular is most often used when new accounts have been opened using a victim's personal data, not when an existing account has been illegally accessed.

If an individual experiences tax-related identity theft, they should continue to pay and file taxes, even if they must file paper returns.

Why are computer users more susceptible to being a victim of identity theft?
Tips to keep your identity from being stolen

Identity theft recovery

Depending on the type of information stolen, victims should contact the appropriate organization and inform it of the situation. This could be a bank, credit card company, health insurance provider or the IRS. Victims should request to have their account frozen or closed to prevent further fraudulent charges, claims or actions.

In the U.S., identity theft victims should file a complaint with the Federal Trade Commission (FTC) and inform one of the three major credit bureaus -- Equifax, Experian or TransUnion -- to have a fraud alert or security freeze placed on their credit records.

Victims can visit the FTC website to obtain a recovery plan and put it into action. The plan includes the collection of forms and letters necessary to guide the victim through the recovery process.

If PII is compromised in a data security breach, victims should follow up with the company responsible about what assistance and protections it may have in place for victims and their data.

Identity theft laws and penalties

Governments respond to identity theft crimes differently. In the U.S., two laws largely define the legal proceedings around identity theft: the Identity Theft and Assumption Deterrence Act of 1998 and the Identity Theft Penalty Enhancement Act of 2004.

The Identity Theft and Assumption Deterrence Act prohibits "knowingly transferring or using a means of identification with the intent to commit, aid or abet any unlawful activity that constitutes a violation of federal law or that constitutes a felony under any applicable state or local law."

The Act also increased sentence lengths by varying degrees for general and terrorism-related offenses. It also established penalties for aggravated identity theft. Aggravated identity theft refers to the use of another person's identity to commit felonies.

Penalties for identity theft are wide-ranging and can be severe. They vary based on offense. Some penalties for identity theft include:

  • In certain first-offense scenarios, thieves may be sentenced to probation if they didn't cause significant harm. Those on probation may still be responsible for fines and restitution.
  • Being issued felony and misdemeanor charges is the most common consequence for perpetrators.
  • The thief may be required to compensate the victim for financial losses, including lost wages, legal fees and potentially emotional distress costs.
  • Perpetrators of identity theft in the U.S. are often face imprisonment, with the minimum sentence being two years for aggravated identity theft. This penalty increases with case severity.

Identity theft insurance

Some identity theft resources, such as insurance, can help victims. Identity theft insurance can help victims expediate slow and costly recovery processes. Identity theft insurance usually only covers recovery costs, not the damages caused directly by the theft. Depending on the policy, expenses covered may include the following:

  • lost wages
  • childcare costs
  • credit monitoring services
  • legal fees
  • copies of credit reports

Identity theft insurance is available either as an endorsement to homeowners or renters insurance policies, or as a standalone policy. They often have deductibles of $100 to $500. They also usually have benefit limits of $10,000 to $15,000. This means damages that exceed the limit are not fully covered and the victim must pay the difference.

Victims seeking an alternative to insurance or help beyond insurance can use identity theft protection services. These services differ from identity theft insurance policies in that they may provide reimbursement of stolen funds, restoration services and credit monitoring services for a fee.

Why has the Internet increased the risk of identity theft?

An important factor in this is the vast amount of personal information that can be harvested online from various sources including social media platforms, company websites, public registers and online marketplaces. Once this data is in the hands of criminals, it can be used to impersonate businesses and individuals.

Who is most likely to be a victim of identity theft?

Social media users are a high-risk group for identity theft. Those who use social media are among the most likely to experience fraud. Javelin Strategy found that individuals who have an active social media presence had a 30 percent higher risk of being a fraud victim than those who weren't active.

What makes a person a more likely target for identity theft?

Wealthy individuals or those people who might generally be expected to be wealthy, such as individuals with college degrees, are more likely to be targets of identity theft. Although it's not only the wealth of these people that make them a target, it's the fact that they often have more accounts as well.

How does technology affect identity theft?

With encryption, identity thieves cannot access customers' private information like their Social Security numbers, account or routing numbers, or credit or debit card PINs. Encryption is used at the point-of-sale during a transaction as well as when the information from the sale is sent to the bank for payment.