首页    期刊浏览 2025年07月19日 星期六
登录注册

文章基本信息

  • 标题:Identity Lost - preventing identity theft
  • 作者:Jim Greeley
  • 期刊名称:Airman
  • 印刷版ISSN:0002-2756
  • 电子版ISSN:1554-8988
  • 出版年度:2001
  • 卷号:Feb 2001
  • 出版社:Superintendent of Documents

Identity Lost - preventing identity theft

Jim Greeley

Identity thieves cash in many different ways, but the end result is the same -- red tape, pain and heartache for victims.

His wedding ring and his combat boots. That's what the crook left in Senior Airman Will Armstrong's gym locker. Everything else was gone -- car keys, house key, uniform, squadron hat and wallet. Gone.

The date is bumed into his memory -- Nov. 17, 1999 -- the day he lost his identity.

"It's been a living hell," said Armstrong (not his real name).

Armstrong took, in his mind, the right steps. He canceled his credit cards, called the bank and filed a police report. Inconvenient and a hassle, but not that bad, said the newly married airman.

When he was first ripped-off Armstrong was angry more than anything else. How could someone cut the lock off his locker, in a high traffic gym, on a secure Air Force base? Fortunately, everything could be replaced. At least the thief was "nice enough" to leave his wedding ring.

In truth, his nightmare was just beginning. The phone calls started two months later.

"Car and boat dealers were calling," Armstrong said. "Collection agencies were threatening me, and banks were calling to say I was bouncing checks all over town. I was scared."

He called the local cops for help and discovered there was a warrant out for his arrest. Fear turned to terror. Armstrong turned to the Air Force Office of Special Investigations.

"We discovered this thief was living large off other people's money for a decade," said Clint Cantrell, the OSI special agent who collared the guy who stole Armstrong's wallet and identity. "This guy was part of a large identity theft ring in New York and New Jersey."

More than 500,000 people will fall victim to identity theft this year, according to government estimates. Currently, the Air Force doesn't track statistics on identity theft victims, but OSI officials said the number of victims is expected to steadily rise.

Going high-tech

The traditional tricks of "dumpster diving" or stealing wallets are being supplanted by high-tech methods. In the most advanced cases, hackers have penetrated databases and downloaded credit card numbers and other information.

Armstrong's case was a low-tech job. However, in an October 1999 case, identity bandits hit more than 175 generals and admirals, stealing information via the Internet. The thieves used it to open almost 1,300 accounts -- more than $1.4 million in available credit.

A joint task force headed by the Secret Service caught the "slime-balls," but not before they ran up a $37,000 tab on 103 accounts.

These cases highlight one fact. Everyone is fair game for identity theft, Including those in the military. Actually, most airmen are prime targets, because the military stresses financial responsibility, which usually translates into a good credit record. Someone with good credit is ideal for this new brand of thief, according to Cantrell.

But, there are actions you can take to lower your risk.

"Zealously guard your personal information," said Special Agent Bill Blaisdale, chief of OSI's nonviolent crimes branch.

Before providing personal information, find out how It will be used and if it will be shared. Pay attention to credit card billing cycles and follow up if bills don't arrive on time. Carry fewer identification and credit cards in your wallet or purse. Also, shred any preapproved credit offers, bank statements and credit card billing information before discarding them.

"Thieves can make up to $30,000 a month doing this," Cantrell said. "For that kind of money, people will dig through trash. They'll break into your car. They're not even after your credit cards. They want your personal information."

The "beauty" of identity theft is most victims aren't even aware of the crime until it's too late. The average victim doesn't know they're a victim until some 14 months later.

To steal someone's identity all a person needs is a name, social security number, address and birthday. With that a thief can take over your financial accounts, open new accounts, apply for loans, buy a car or even rent an apartment.

Also, the penalties for identity theft aren't that harsh. In Armstrong's case, his identity thief plead guilty to a laundry list of charges and is slated to spend just five years in the pokey.

Take action fast!

If you have your identity stolen there are three immediate steps to take.

First, contact the fraud departments of each of the three major credit bureaus (Equifax, Experian and Trans Union). Tell them to flag your file with a fraud alert. Next, contact creditors of any accounts that have been tampered with or opened fraudulently. Third, file a police report.

Armstrong learned about identity theft the hard way, but he hopes other Air Force people can learn from his misfortune.

"If I try to write a check in a store, alarms start going off," Armstrong said. "My credit is ruined, and I have to pay for everything in cash. Be aware of everything. Just because you're on a base don't assume you're safe." *

Are you at risk?

Take this quiz to see how vulnerable you are to identity theft. Each statement represents an avenue for an identity theft. If you agree with any of them, add the points to your score.

* You always carry your military identification card in your wallet (10 points)

* Every week you receive several pre-approved credit offers C5 points; add 5 more if you don't shred them before tossing them)

* You carry your social security card in your wallet (10 points)

* You don't have a post office box or a locked, secured mailbox (5 points)

* You drop off your outgoing mail at an open, unlocked box (10 points)

* You don't shred or tear banking and credit information when you trash it (10 points)

* You provide your Social Security card number whenever asked (10 points; add 5 more if you give it orally without checking to see who might be listening)

* You're required to use your social security number as an employee number (5 points)

* Your social security number is printed on an employee badge you wear (10 points)

* Your social security number or driver's license number is printed on your checks (20 points)

* You're listed in a Who's Who guide (5 points)

* You carry your insurance card in your wallet, and it has your or your spouse's social security number (20 points)

* You haven't ordered a copy of your credit report for at least two years (10 points)

* You don't believe people would root around in your trash looking for credit or financial information (10 points)

Looking for help

Unlike other criminals, identity thieves can get a big head start. If your car isn't In the parking lot when you return, you know you've got problems. However, most identity theft victims don't realize they've been tagged until 14 months later. If you've been victimized, here are some Web sites that can help.

* Federal Trade Commission: www.ftc.gov

* Privacy Rights Clearinghouse: www.privacyrights.org

* Public Interest Research Groups: www.pirg.org

* Identity Theft Prevention and Survival: www.identityrheft.org

* Future Crime Prevention Association: www.futurecrime.com

The three major credit-reporting agencies provide reports for a nominal fee.

Contact them immediately if you're an identity theft victim.

* Equifax: 1-800-525-6285, www.equifax.com

* Experian: 1-888-397-3742, www.experian.com

* Trans Union: 1-800-916-8800, www.transunion.com

How vulnerable are you?

100-150: You're at a high risk. Get a paper shredder, become more security conscious and question why people need your personal data.

50-100: Your odds of being an identity theft victim are average, but higher if you have good credit.

0-50: You have a high security IQ, Don't let your guard down.

Source: Privacy Rights Clearinghouse/Utility Consumers Action Network

COPYRIGHT 2001 U.S. Air Force, Air Force News Agency
COPYRIGHT 2001 Gale Group

联系我们|关于我们|网站声明
国家哲学社会科学文献中心版权所有