From Margie Tann - Independent Distributor with iSekurity
Identity Theft and Wi-Fi
Source: Privacy News / Kent Larson
January 24th, 2011
Let's assume that you wanted to take up a new career as an identity thief. Why? Well, it's lucrative.
Identity thieves simply pretend to be someone else, then open up credit cards and take out loans using the other person's identity. And - it is easy. All one needs need is to find someone's name, address, and Social Security number.
Third, it is safe. Only around 2% of identity thieves are ever caught. No wonder it is the fastest-growing crime in America!
Now, all the perpetrator needs to do is to decide how to go about getting the information on their victims. One popular method is the classic pick-pocketing. But that requires a fair amount of skill; besides, these kinds of thieves are much more likely to get caught with their actual fingers in someone else's pocket.
Somewhat better is "Dumpster-Diving," which involves going through someone else's garbage, looking for a scrap of paper with the right information. But, identity thieves tend to shy away from that method, as this seems messy and time-consuming.
Source: Privacy News / Kent Larson
January 24th, 2011
Let's assume that you wanted to take up a new career as an identity thief. Why? Well, it's lucrative.
Identity thieves simply pretend to be someone else, then open up credit cards and take out loans using the other person's identity. And - it is easy. All one needs need is to find someone's name, address, and Social Security number.
Third, it is safe. Only around 2% of identity thieves are ever caught. No wonder it is the fastest-growing crime in America!
Now, all the perpetrator needs to do is to decide how to go about getting the information on their victims. One popular method is the classic pick-pocketing. But that requires a fair amount of skill; besides, these kinds of thieves are much more likely to get caught with their actual fingers in someone else's pocket.
Somewhat better is "Dumpster-Diving," which involves going through someone else's garbage, looking for a scrap of paper with the right information. But, identity thieves tend to shy away from that method, as this seems messy and time-consuming.
No comments:
Post a Comment