Home  |  About Us  |  Contact Us  |  Links  |  Shopping  |  Members Section/Log In   

Identity theft is like the perfect storm.


It has many of the key ingredients to cause harm. Be sensible and take action to increase your own protection. Learn why Core Identity Protection is the right choice.

Consider the following...

Personal information is everywhere and is easily accessible to identity thieves.

Identity theft continues to be a rampant and troubling crime in America.

Each year, an estimated 10 million people are victimized.

Identity theft can affect your ability to conduct normal daily affairs.

How It Occurs

Unfortunately, information can be uncovered and used in simple and complex ways. Some of the possibilities include:

Credit Card Fraud

Simply obtaining a credit card number or the card itself can allow criminals to make unauthorized charges to your account. Numbers are found on receipts or your monthly statements in the mail or cards are lost or stolen from wallets or obtained from new cards arriving in the mail. Credit card fraud can occur at a merchant or over the telephone or internet where you do not need to be present to purchase goods.

Skimming
Is a type of credit card fraud which occurs in the course of a normal, legitimate transaction and involves copying the magnetic stripe from a genuine payment card and transferring the information to a substitute counterfeit card.

Dumpster Diving
The simple process of digging through trash can uncover important personal details. It is important to shred important documents or mail that you have prior to disposing it. Most important is to shred "pre-approved" credit offers which arrive in the mail frequently and without warning.

Computer Hacking
Today's vast databases of personal information are targets for criminals who can hack into computer systems with limited technology skills. Before you buy goods on the internet, be selective and provide your details only to reputable companies that have proper security measures in force. Similarly, information can be obtained on your home computer and you should take steps to prevent access by turning off your computer, buying a personal firewall, or storing important information off line.

Social Engineering
Sometimes it is possible to extract information from you when you divulge information to a person who purports to be with a legitimate company, a practice also known as "pretexting". Pretexting is the illegal practice of getting your personal information under false pretenses. By giving personal information over the phone, you might accidentally be giving important details to a criminal. The criminals then use this information to obtain further information about you or may already have sufficient details on you to commit an identity crime.

False Identification
After a criminal has personally identifiable information, they can obtain false drivers licenses, birth certificates, passports, medical ID cards, etc. The Federal Trade Commission maintains information at its Identity Theft Data Clearinghouse web-site http://www.consumer.gov/idtheft that indicates types of identity fraud and their relative frequency. One interesting statistic depicts the difficulty of preventing identity fraud whereby approximately 12% of victims have a personal relationship with their assailant.


IFI Home  |  About IFI  |  Careers  |  News  |  Privacy  |  Terms and Security