About
Subscribe

Low tech augments identity thefts

Admire Moyo
By Admire Moyo, ITWeb news editor
Johannesburg, 29 Nov 2010

Identity thefts are on the rise, not only because of the vast amount of personal information that can be accessed via the Internet, but also the 'low tech' ways that this crime can be committed, according to management company, Ideco.

The company defines identity theft as a form of fraud in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name.

“The victim of identity theft - here meaning the person whose identity has been assumed by the identity thief - can suffer adverse consequences if he or she is held accountable for the perpetrator's actions.”

It also explains, in a time when almost anything can be done on a computer, phishing is a common process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

“Communication claiming to be from a popular social Web site, for example, can also be used to lure the unsuspecting public,” states Ideco.

“Usually in the form of an e-mail or instant message, phishing typically directs recipients to enter details at a fake Web site, which has been designed to closely resemble a legitimate one. The fraudsters then have the information they need to pose as the person who supplied the details, and the information is used for activities such as opening accounts or purchasing items fraudulently.”

In that vein, the identity management company urges the public to be wary of such threats.

However, it also warns that the scammers have developed new methods that are difficult to detect, for example, the phone calls people may innocently answer.

Ruining reputations

Jayson O'Reilly, McAfee's regional manager of Africa, describes identity theft as a serious crime that can cost victims a lot of time and money by destroying their credit and ruining their reputations.

“Identity thieves and hackers target home computers because they know families often do not maintain adequate protection on their PCs. This makes these family users easy and lucrative targets.

“Many hackers access your personal information in order to steal your identity and your money. Others might want to use your home computer as a shield to mask their identity as they steal from others.”

He also points out that phishing is a particular type of identity theft: “The online method of fraudulently obtaining personal information for identity theft, such as passwords, social security numbers, and credit card details, by sending spoofed e-mails that look like they come from trusted sources, such as banks or legitimate companies.”

Wally Gast, Regional Profit Centre manager at Chartis SA, Personal Lines, Africa Region, defines identity theft as “the unauthorised and illegal use of personal information to obtain a loan or open credit accounts that the victim did not authorise.”

“This can happen when people lose or have their ID books stolen, when criminals go through your garbage to find old accounts and statements or swipe your mail for the same purpose.

“People really need to take care of documents when they throw them away. Shredding documents before disposal is a very good idea,” says Gast.

He says it is, therefore, worthwhile to have protection against this type of crime, especially as it is so prevalent in SA. Getting your identity back can take weeks of personal time and could cost tens of thousands of Rands in legal fees.

O'Reilly stresses that this form of cyber crime is a federal crime in the US with the country's Federal Trade Commission naming identity fraud as the most popular form of consumer fraud.

In SA, he notes, the issue continues to plague general trade, with authorities continuing to receive more complaints than in the past, pointing out that it is particularly prevalent within the world of finance and fraudsters have emerged far more tech-savvy than in the past.

“It occurs when a criminal uses personal information to produce false FICA documents, to steal financial resources,” he adds.

When using your credit and debit cards at restaurants and stores, O'Reilly advises consumers to pay close attention to how the magnetic stripe information is swiped by the waiter or clerk. Dishonest employees have been known to use small hand-held devices called skimmers to commit fraud, he notes.

“Install and update virus protection software to prevent a worm or virus from causing your computer to send out files or other stored information. Subscribe to an identity protection services that offers insurance against identity theft“, O'Reilly says.

Proactive steps to take

In regards to the proactive steps for victims of ID theft, Ideco advises the public to report the theft to local enforcement representatives and file a complaint and complete the ID theft affidavit.

“Inform all relevant institutions of the fraudulent activity - both telephonically and in writing and also send follow-up letters to the credit bureaus detailing the status of resolution with institutions and creditors,” it says.

For the telephone tactics, the company says, when a caller asks you to 'confirm' any information, they need to supply that information first and you either confirm it as correct or not.

”Private information like your full name, phone numbers, e-mail address, credit card numbers, postal address and e-mail address, could be used for identity theft. Do not give these out over the phone unless you have made the call and you are certain of whom you are talking to.

“Ask the caller to identify themselves by name and company. If you have any suspicion, ask to be transferred to their superior, and ask for a reference number for the call.”

Share