12 Identity Theft Crimes, Chapters 12.01-12.08 Flashcards
What is the definition of “Identity Theft”?
The theft of your personal information to commit fraud.
What could your stolen personal information be used to do?
(a) open a bank account or store account in your name, (b) use your existing accounts, (c) obtain medical services using your name
What are the consequences of identity theft?
(a) negatively affects your credit, (b) result in you being sued for debts that are not yours, (c) result in incorrect and potentially health-threatening information being added to your medical record, (d) may result in your arrest
What is the definition of “Identity Crime”?
“Identity crime” refers to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.
What government agency reports statistics on identity theft crimes?
The Federal Trade Commission
If an officer finds one or two forms of identification in another person’s possession, is that evidence that the subject is involved in identity theft?
No, but it is enough to justify a further investigation. (i.e., Could be holding an ID for a friend at an event)
Define the term “identifying information.”
Information that alone, or together with other information, identifies a person. It usually includes name, date of birth, fingerprint, voice print, retina or iris image, unique ID information with a financial institution, social security or other government-issued ID number
What is a “telecommunication access device”?
A card, plate, code, account number, PIN, electronic serial number, mobile identification number, or other telecommunications service, equipment or instrument identifier that allows you to gain access to an account to obtain money, goods, services, or other things of value (a “debit card”) or initiate a transfer of funds.
Does the use of only your name constitute identity theft?
No, because it is possible that someone else has the same name as you do.
As technology advances, what new types of scams have evolved?
Stealing information by listening in on cell phone conversations, reading other people’s emails, hacking into computers, conducting phone and email scams, taking advantage of careless online shopping and banking customers
How can identity theft crimes occur?
(a) Theft of a wallet, purse, or briefcase; (b) taking mail from a mailbox to get account numbers, name and address information, etc.; (c) the thieves file a change of address to have your mail transferred to another location; (d) dumpster diving; (e) pose as someone who needs a copy of your credit report; (f) inside your home; (g) thieves share your information online; (h) business record theft; (i) shoulder surfing; (j) spoofing; (k) skimmers at gas stations
What are spam texts and emails?
Texts and emails trying to sell you something
How can you cut down on spam?
(a) use filters; (b) think before you give info to someone you didn’t call – why do they need this? (c) Unsubscribe from unwanted emails, (d) Use email and phone’s “report junk” option to report unwanted emails, (e) forward unwanted texts to 7726 (SPAM)
What is a phishing scam?
Email or text message designed to trick you into giving them your personal information
How can you recognize a phishing scam?
(a) may say they’ve noticed suspicious log-in attempts and need you to confirm your information; may claim there is a problem with your account or payment information and want you to reenter it in an email or text (NEVER); (c) may want you to click on a link that is actually malware; (d) may say you have won something or are eligible for a government refund but they need your personal information to send it to you; may offer a link for “free” stuff that is actually malware