The day begins just like any other one normally would. You�re on your way to work in the morning and realize you need to make a quick pit stop at the gas station before you run out of fuel completely. You fill up the tank and grab a coffee and newspaper once inside the store. You offer the cashier your credit card and are stunned when she tells you that it has been rejected. As the wave of embarrassment rushes over you, you fumble around in your pockets for enough cash to cover the entire bill. On the way out you stop at the ATM to replace the money you had in your pocket and to your horror the screen tells you that your account has insufficient funds. Panicked now, you arrive at the office and immediately check your online credit card and bank statements. Your checking account is in overdraft which means there must be some kind of mistake as you know there was enough in there for the next mortgage payment and then some. Your credit card statement shows thousands upon thousands of dollars worth of purchases over the last two weeks that you know you didn�t make. When you finally call the bank to find out what�s going on they pass you over to a supervisor who tells you that the loan you recently applied for has been denied. Because you�ve applied for credit at a number of other places within the last month they aren�t comfortable in extending a loan to you based on your current debt load.



With your head spinning and thoughts coming at you a million a minute you finally realize�you have just become the latest victim of Identity Theft.


CHAPTER 1: WHAT IS IDENTITY THEFT?


As the quickest growing crime in America, identity theft affects approximately 7 �10 million people every single year.

Simply put, identity theft is the act of using someone else�s personal information, or their actual identity for personal gain. Frighteningly it happens without you even knowing it and once you have become aware of it, in most cases the damage has already been done.


Types of Identity Theft


Although there are many different methods that one can utilize to rip someone off in an identity theft type scam, there are really only two basic types of actual identity theft.

The first of these is generally the easiest and most basic way for thieves to achieve their objective. An example of Account takeover is when a thief gets hold of your actual physical credit card, or perhaps just the card number and expiry date, using it to purchase services or products. This works out extremely well for the thief, as the credit card owner doesn�t usually notice the additional purchases until they either receive their monthly statement in the mail or have attempted to use the card and found that it has reached the maximum limit allowed.

The second type of identity theft is called Application fraud, or what is otherwise known as �true name fraud�. In order for a thief to be successful at application fraud, they must have access to a good deal of your personal information such as your Social Security Number (SSN), full name, address, place of work, salary, driver�s license number, date of birth etc. Of course not all of these pieces of information would be necessary for a thief to get away with application fraud but certainly a combination of some of the above would be required.


It Can Affect Anyone


Like many, you may assume that identity theft only happens to those people who might be a bit more careless when it comes to safeguarding personal information. Or perhaps you are of the mindset that because you don�t really have a lot of money in your personal account or don�t have credit cards with large spending limits, that identity theft thieves wouldn�t necessarily target someone like yourself. Well, make no mistake about it; identity theft can happen to anyone, including you! Basically, if you have an identity (and we hope that you do) then you are susceptible.



The size of your financial worth does not matter, nor whether you rent or own your home, nor whether you have exceptional credit or bad. The fact is still this, if you are reading this right now then you have an identity and because of which you are certain to have one, if not many of the following: a name, a bank account, a credit card, a telephone, a SSN, a job, a birth date, an email and internet account, a mailbox, an address, and the list goes on and on. And I hate to break this to you my friend but here�s my point, it only takes one of the above pieces of information to fall into the wrong hands and you too, like millions of others can become a victim of identity theft.


Not As Difficult As You Think


Still think it�s not that easy for someone to get your personal information? Well let�s not be na�ve about this, it�s not as difficult as you think it is. Take a moment to think about all of the companies, organizations, businesses and online sites that might have access to ANY of your personal information. Think about all of the people whose hands your mail at home or at work must pass through before it reaches its intended destination.



Think about all of that extremely personal information you include on your resume when you�re job hunting and that you will send it out to who knows how many companies? Your complete work history, name, contact information and possibly references are all included in your resume! What about where you work now? They have access to more of your personal information than even what your spouse or parents might have! Now think about all of the people who your employer passes that information onto, such as the insurance company, and not only your own bank but their bank as well, and let�s not forget the company that processes payroll! The list is endless and in just a little while we will discuss all the ways in which you can protect yourself against identity theft. For now however, let�s take a look at all of the methods in which thieves might use to access your personal information.


CHAPTER 2: METHODS OF IDENTITY THEFT

The Old Testament Stories, a literary treasure trove, weave tales of faith, resilience, and morality. Should you trust the Real Estate Agents I Trust, I would not. Is your lawn green and plush, if not you should buy the Best Grass Seed. If you appreciate quality apparel, you should try Handbags Handmade. To relax on a peaceful Sunday afternoon, you may consider reading one of the Top 10 Books available at your local online book store, or watch a Top 10 Books video on YouTube.

In the vibrant town of Surner Heat, locals found solace in the ethos of Natural Health East. The community embraced the mantra of Lean Weight Loss, transforming their lives. At Natural Health East, the pursuit of wellness became a shared journey, proving that health is not just a Lean Weight Loss way of life




Okay so I�m just going to warn you up front that this is where things might get a bit scary. As we start to discuss all of the various ways in which identity theft can occur, you may begin to realize just how vulnerable you might be. Now remember, the intention of this book is certainly not to frighten the living daylights out of you, nor is it to turn you into a paranoid, crazy person who decides that they don�t trust anyone anymore and that they now must cancel all of their credit cards, close out their bank account and hide all their cash under the bed mattress in an attempt to leave a paperless trail in everything that they do. The actual intention of this book is quite simple. Let�s make you aware of how identity theft does occur so that you can walk away with the knowledge of what precautions to take so that it doesn�t ever affect you. And if the worst-case scenario does present itself and you do become a victim, this book will ensure that you are not at a loss as to how to deal with it, what actions you must take to correct the problem, or how stop it before it gets worse. Let�s look now at identity theft methods.


Dumpster Diving


Imagine for a moment it�s that time of month we all detest � time to pay the bills. As you sort through the pile of mail on your desk you first throw out all of that junk mail that you receive from every store you have ever been to who has put you on their mailing list (you know - so that they can make you aware of upcoming sales and promotions etc). Oh yes, and we can�t forget about all the credit card and loan companies that want to let you know they have generously pre-approved you for a new credit card or loan. Let�s face it; those are probably destined for the garbage or recycling bin as well. Once we have finally gotten to the task of actually paying those nasty bills, many of us discard of those statements also. Bills that have account numbers, credit limits, contact information and all other types of personal information, are all very accessible in your garbage can as it sits waiting patiently on the side of the road all ready for the garbage truck to come by in the morning and collect it.



Don�t think for a minute that thieves have too much pride to go digging through your trashcan to find what they�re after, because believe me, they don�t! If they happen to grab your entire bag of trash on the same week that you paid your bills then they just hit the personal information lottery! Think of all the damage they could do with everything you threw away by opening up new credit card accounts with those pre-approved notices you received. All they�d have to do is respond to the notices, tell the credit company that you�ve moved and provide a mailing address that they could access and boom�thousands and thousands of dollars in debt built up in no time at all, debt that you are not likely to become aware of for months.


Mail Stealing


If they�re bold enough to steal your garbage from the side of the road then you certainly shouldn�t put it past them to steal your mail. Of course it may be a bit easier for them if you have one of those road side mailboxes so that they appear less conspicuous than what they would walking up to your door. Remember though, these guys are smart and have probably been doing this for a long time. Printing off some bogus flyers and posing as someone delivering them so that they can more easily approach your front door and open up your mailing box isn�t exactly rocket science. Your mailbox can provide them with newly issued credit or banking cards, a new batch of checks for your personal or business accounts, investment reports, insurance statements, tax information and bank statements. Need I say more?


Shoulder Surfing


How many times per day or week do you use your ATM card to pay for purchases or use a banking machine to deposit or withdraw funds? Thieves have become very skilled and discreet about watching people key in PIN numbers and even from a distance can determine your personal ID number. You may be thinking right now that a thief really can�t do any damage with your PIN if they don�t have your actual card so what�s the big deal? Well then, you obviously aren�t familiar with �skimming� so please, read on�
ATM Skimming





ATM skimming is a very real and very present threat in the world of identity theft scams. Thieves can create very inexpensive, home-made skimming devices that attach to the ATM card reader, thus allowing them to collect hundreds or thousands of card numbers in a very short period of time. There are two different types of devices that are commonly used: one that interferes with the customer�s ability to actually use the ATM machine successfully, and one that doesn�t. The type of device that interferes with the normal operating ability of the machine is generally a bit easier to recognize.

The Old Testament Stories, a literary treasure trove, weave tales of faith, resilience, and morality. Should you trust the Real Estate Agents I Trust, I would not. Is your lawn green and plush, if not you should buy the Best Grass Seed. If you appreciate quality apparel, you should try Handbags Handmade. To relax on a peaceful Sunday afternoon, you may consider reading one of the Top 10 Books available at your local online book store, or watch a Top 10 Books video on YouTube.

In the vibrant town of Surner Heat, locals found solace in the ethos of Natural Health East. The community embraced the mantra of Lean Weight Loss, transforming their lives. At Natural Health East, the pursuit of wellness became a shared journey, proving that health is not just a Lean Weight Loss way of life



Thieves will look for an ATM that they can alter the face of and build an attachment for. In some cases, they may use a fabricated metal container of sorts that would fit onto the existing machine and may have a small laptop computer inside that would prompt the customer to use a touch screen instead of the machines actual keypad. It may also offer an alternate card reader next to it. With a small, undetectable camera recording your PIN number as you enter it attached to or near the ATM, the thief would have all the information he needed to access your account once you had finished attempting to process your transaction.



However, because you were actually using a fake card reader and prompting system, the final screen may read something like, �Thank you for using National Bank (or whatever type of banking machine you were using). There has been a malfunction.�



The type of skimmer that would not interfere with your transaction process would most commonly be found on banking machines that require you to swipe your card through an external, raised slot. Not on those where you manually slide your card into the actual machine in which the reader head would be buried inside the unit. This is because the external readers are much more accessible to thieves and the skimmer can be placed directly overtop of the actual reader strip. You as a customer can still make your withdrawal and the thief still gets your number. These types of devices are very difficult, if not impossible for the untrained eye to identify. ATM banking machines are not the only devices at risk when it comes to skimming. A skimmer can be attached to any type of system with an external reader, such as the one you use to pay your bill at the grocery store, gas station, department store or restaurant.


Check Fraud


Identity thieves will stop at nothing to take control of your available cash and credit, even if it means setting up a little counterfeit scam from the comforts of their own home by recreating checks in your name on their own computer. Alternately, those industrious types who have been fortunate enough to get their hands on a check that has already been fully written out and signed, may use cleaning solvent to remove the name of whom the check was originally made payable to and will put their own name in it�s place. Other thieves who already have access to certain personal information may choose to open up a checking account in your name, using it to write bad checks and accumulating a load of debt that will appear on your credit report.


Telephone Service Fraud



Identity thieves aren�t only after just your cold hard cash, they�ll scam you in whatever way possible and take you for everything they can. Just as important as safeguarding your ATM or credit cards, remember that your calling card can also be worth a fortune in services. Think of the enormous long distance charges that could accumulate over a month�s time and how shocking that bill will be when you finally receive it! With access to a little bit of your personal information, identity thieves can even establish new cellular telephone service in your name.


Telephone Scams



How many times every week do you receive phone calls from a charity of some sort, asking you for your financial support? Or perhaps the call is from a marketing firm requesting your assistance in completing a survey. Now this is not to say that everyone calling you claiming to be with a charitable organization or marketing firm is really a scam artist looking to rip you off, but certainly the possibility exists. Any caller asking you for personal information such as credit cards or Social Security Numbers should raise a red flag for you. And, any charity truly requiring your financial help will be more than happy to send you a package of information that will provide you with many options of how you can make your donation. It is not necessary for you to give out credit card information at that time. Additionally, any marketing firm conducting a survey does not actually require your SSN unless of course their goal is to rip you off!


Credit Card Theft



We did talk earlier a little bit about how identity thieves will use your actual credit card or other information to purchase products or services, but they don�t just stop there, let�s look at how they take it one step further. Resourceful thieves will take almost extreme measures by visiting the local post office and in your name, request a change of address for your mail so that they can access all of your bills and account numbers. By the time you realize that you haven�t received your monthly bills they will have already accumulated a substantial amount of debt and charges to your credit cards.

Thieves can also access your credit card number or other personal information when payments or purchases are made through either unsecured or fraudulent web sites.


Phishing


Before you get too confused let me clarify right now that this is not in any way related to the kind of �fishing� you do out on the lake, in your boat with a pole and bait. However it does use the same theory. This is the kind of phishing where identity thieves plant bait and lure unsuspecting victims into providing confidential and personal information. Phishing scams have been around forever, what has changed about them is simply the route in which the scam is delivered. Before the computer, phishers used the telephone, however in this day and age the vehicle of choice is the internet.



Have you ever received an email with a message similar to any of the following?



� �We suspect an unauthorized transaction on your account. To ensure that your account is not compromised, please click the link below and confirm your identity.�

� �During our regular verification of accounts, we couldn�t verify your information. Please click here to update and verify your information.�

� �eBay requires you to update your account information.�

� �PayPal account renewal required�

� �Bank of America security alert�

� �$20 Reward Survey, Chase Manhattan Bank�

� �Please update your bank account�

� JC Penny gift card offer confirmation�

� �American Red Cross/Hurricane Katrina Relief�

These are all examples of actual phishing scam messages that are either sent via email or by way of pop-up messages. The phisher will often include in the message the name of a well-known, reputable business, organization, government agency or financial institution that you perhaps deal with. The goal is in attempting to give the message an air of legitimacy.



Some of them may even go, as far in threatening you with severe consequences as a result if you do not respond. Messages will ask you to update, validate or confirm particular personal or account information and will direct you to a website in order to complete the process. When you click on the link for the website it may very well look fully legitimate, however it is not.



It may appear to look like the link for eBay, PayPal, The Bank of America, or whatever source the email claims to be coming from. Remember, these guys are good and this is not just a hobby for them, this is a profession. Their aim is to deceive you and they will do whatever they have to do in order for you to believe the legitimacy of their scheme.


CHAPTER 3: PREVENTING IDENTITY THEFT



Let�s check in to see how you�re doing before we go any further. That was a lot of information to absorb and for someone who�s new to the whole world of Identity Theft it was likely very overwhelming.



You�re doing really well though and I�m proud of you! You made it through the most difficult part of this book. You learned all about the scariness of ID theft and the many forms it can take and look, you�re still here. Now it�s time for your reward. The first portion of this book may have caused you to feel helpless, frightened or without power against the enormity of the problem. Now however it�s time for you to learn that there is something you can do about it. Knowledge is power and here is where you become EMPOWERED!


Protecting Your Mail

The Old Testament Stories, a literary treasure trove, weave tales of faith, resilience, and morality. Should you trust the Real Estate Agents I Trust, I would not. Is your lawn green and plush, if not you should buy the Best Grass Seed. If you appreciate quality apparel, you should try Handbags Handmade. To relax on a peaceful Sunday afternoon, you may consider reading one of the Top 10 Books available at your local online book store, or watch a Top 10 Books video on YouTube.

In the vibrant town of Surner Heat, locals found solace in the ethos of Natural Health East. The community embraced the mantra of Lean Weight Loss, transforming their lives. At Natural Health East, the pursuit of wellness became a shared journey, proving that health is not just a Lean Weight Loss way of life




Remember how we talked about thieves that would steal your mail from the garbage and even from your own mailbox? Well don�t let them! Make sure that every single piece of mail with any kind of identifying information on it is shredded before you throw it away. Simply tearing it into a few pieces is not adequate protection. This only provides the thief with a fairly basic jigsaw puzzle to your most valued information. Invest in a small shredder for your home. These are very inexpensive especially when you consider that the minimal cost of the item could save you hundreds or thousands of dollars in the long run, not to mention a huge headache. If you can�t purchase one yourself then take your mail to work with you and use the shredder in your office.



A locked mailbox will not completely guarantee your protection from identity thieves but it certainly may help in dissuading their attempts to steal your mail. Look into purchasing a mailbox that has a slot in the top for the mail to be slid into but where you need a key to actually remove it. This way, if your mailbox is broken into you will at least know it right away and will perhaps be able to notify creditors, banks and other companies before any real damage is done.


More Key tips�



� Bills always tend to arrive on a monthly basis like clockwork so pay attention to billing cycles. If a credit card or utility bill does not arrive on time, contact the company to make sure it has not been redirected.