{"id":938,"date":"2010-06-09T17:10:30","date_gmt":"2010-06-09T12:10:30","guid":{"rendered":"http:\/\/ivyproschool.com\/blog\/?p=938"},"modified":"2024-11-09T16:46:58","modified_gmt":"2024-11-09T11:16:58","slug":"how-identity-theft-works","status":"publish","type":"post","link":"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/","title":{"rendered":"How Identity Theft Works ?"},"content":{"rendered":"<p>You work hard every day to make a living and support yourself and\/or your family. If you&#8217;ve read the HowStuffWorks <a href=\"http:\/\/money.howstuffworks.com\/credit-report.htm\">credit report<\/a> and <a href=\"http:\/\/money.howstuffworks.com\/credit-score.htm\">credit score<\/a> articles, then you know how to keep your credit clean so you can enjoy the benefits of all of that hard work. What happens, though, when you find out that someone has used your name to get a <a href=\"http:\/\/money.howstuffworks.com\/credit-card.htm\">credit card<\/a> and has run up thousands of dollars in charges that you are now going to have to convince the credit card company that you are <em>not<\/em> responsible for? What if they opened <a href=\"http:\/\/money.howstuffworks.com\/bank.htm\">bank<\/a> accounts in your name, committed crimes using your name, or worse?!<!--more Click here to continue--><\/p>\n<p>I\u00ad\u00adnnocent people are being arrested because someone is committing crimes using their names. Can you prevent this from happening? Can you protect yourself from these white collar criminals? What is law enforcement doing about it?<\/p>\n<p>In this article, we&#8217;ll look into the dark world of identity theft to which we can all fall victim. We&#8217;ll find out how others can get access to your personal identification information, how you can protect yourself, and what to do if you become a victim.<\/p>\n<p><strong>Types of Identity Theft<\/strong><strong><br \/>\n<\/strong>Identity theft can enter into many areas of our lives. It involves any instance where a person uses someone else&#8217;s identification documents or other identifiers in order to impersonate that person for whatever reason. According to a <a href=\"http:\/\/money.howstuffworks.com\/framed.htm?parent=identity-theft.htm&amp;url=http:\/\/www.ftc.gov\/os\/2003\/09\/synovatereport.pdf\">September 2003 survey conducted by the Federal Trade Commission<\/a>, an estimated 10 million people in the United States found out they were victims of identity theft in the previous year. More appropriately titled <strong>identity fraud<\/strong>, your identity might be stolen in order for someone to commit:<\/p>\n<ul>\n<li><strong>Financial fraud<\/strong> &#8211; This type of identity theft includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more. In fact, a total of 25 types of financial identity fraud are investigated by the <a href=\"http:\/\/money.howstuffworks.com\/framed.htm?parent=identity-theft.htm&amp;url=http:\/\/www.ustreas.gov\/usss\/index.shtml\">United States Secret Service<\/a>. While financial identity theft is the most prevalent (of the approximate 10,000 financial crime arrests that Secret Service agents made in 1997, 94 percent involved identity theft), it certainly isn&#8217;t the only type. Other types of identity theft, however, usually involve a financial element as well &#8212; typically to fund some sort of criminal enterprise.<\/li>\n<li><strong>Criminal activities<\/strong> &#8211; This type of identity fraud involves taking on someone else&#8217;s identity in order to commit a crime, enter a country, get special permits, hide one&#8217;s own identity, or commit acts of terrorism. These criminal activities can include:<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>You work hard every day to make a living and support yourself and\/or your family. If you&#8217;ve read the HowStuffWorks credit report and credit score articles, then you know how to keep your credit clean so you can enjoy the benefits of all of that hard work. What happens, though, when you find out that someone has used your name to get a credit card and has run up thousands of dollars in charges that you are now going to have to convince the credit card company that you are not responsible for? What if they opened bank accounts in your name, committed crimes using your name, or worse?!<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-938","post","type-post","status-publish","format-standard","hentry","category-it-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding Identity Theft and How to Protect Yourself<\/title>\n<meta name=\"description\" content=\"Explore how identity theft works, its types, and preventive steps you can take to safeguard your personal information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Identity Theft and How to Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"Explore how identity theft works, its types, and preventive steps you can take to safeguard your personal information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/\" \/>\n<meta property=\"og:site_name\" content=\"R vs Python: Which Analytics Tool Should You Choose for Data Science?\" \/>\n<meta property=\"article:published_time\" content=\"2010-06-09T12:10:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-09T11:16:58+00:00\" \/>\n<meta name=\"author\" content=\"puja\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"puja\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-identity-theft-works\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-identity-theft-works\\\/\"},\"author\":{\"name\":\"puja\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/1a7cb5a55a6acaab2b33dbb3739e680c\"},\"headline\":\"How Identity Theft Works ?\",\"datePublished\":\"2010-06-09T12:10:30+00:00\",\"dateModified\":\"2024-11-09T11:16:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-identity-theft-works\\\/\"},\"wordCount\":427,\"commentCount\":0,\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-identity-theft-works\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-identity-theft-works\\\/\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-identity-theft-works\\\/\",\"name\":\"Understanding Identity Theft and How to Protect Yourself\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\"},\"datePublished\":\"2010-06-09T12:10:30+00:00\",\"dateModified\":\"2024-11-09T11:16:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/1a7cb5a55a6acaab2b33dbb3739e680c\"},\"description\":\"Explore how identity theft works, its types, and preventive steps you can take to safeguard your personal information.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-identity-theft-works\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-identity-theft-works\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/how-identity-theft-works\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Identity Theft Works ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/\",\"name\":\"Ivy Professional School | Official Blog\",\"description\":\"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/#\\\/schema\\\/person\\\/1a7cb5a55a6acaab2b33dbb3739e680c\",\"name\":\"puja\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/de912f2133e74586cca328a8b80e9337a3eade3e229fa6edab8a2131769ab7e9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/de912f2133e74586cca328a8b80e9337a3eade3e229fa6edab8a2131769ab7e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/de912f2133e74586cca328a8b80e9337a3eade3e229fa6edab8a2131769ab7e9?s=96&d=mm&r=g\",\"caption\":\"puja\"},\"url\":\"https:\\\/\\\/ivyproschool.com\\\/blog\\\/author\\\/puja\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Identity Theft and How to Protect Yourself","description":"Explore how identity theft works, its types, and preventive steps you can take to safeguard your personal information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Identity Theft and How to Protect Yourself","og_description":"Explore how identity theft works, its types, and preventive steps you can take to safeguard your personal information.","og_url":"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/","og_site_name":"R vs Python: Which Analytics Tool Should You Choose for Data Science?","article_published_time":"2010-06-09T12:10:30+00:00","article_modified_time":"2024-11-09T11:16:58+00:00","author":"puja","twitter_card":"summary_large_image","twitter_misc":{"Written by":"puja","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/#article","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/"},"author":{"name":"puja","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/1a7cb5a55a6acaab2b33dbb3739e680c"},"headline":"How Identity Theft Works ?","datePublished":"2010-06-09T12:10:30+00:00","dateModified":"2024-11-09T11:16:58+00:00","mainEntityOfPage":{"@id":"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/"},"wordCount":427,"commentCount":0,"articleSection":["IT Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/","url":"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/","name":"Understanding Identity Theft and How to Protect Yourself","isPartOf":{"@id":"https:\/\/ivyproschool.com\/blog\/#website"},"datePublished":"2010-06-09T12:10:30+00:00","dateModified":"2024-11-09T11:16:58+00:00","author":{"@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/1a7cb5a55a6acaab2b33dbb3739e680c"},"description":"Explore how identity theft works, its types, and preventive steps you can take to safeguard your personal information.","breadcrumb":{"@id":"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ivyproschool.com\/blog\/how-identity-theft-works\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ivyproschool.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Identity Theft Works ?"}]},{"@type":"WebSite","@id":"https:\/\/ivyproschool.com\/blog\/#website","url":"https:\/\/ivyproschool.com\/blog\/","name":"Ivy Professional School | Official Blog","description":"Confused between R and Python for your data science journey? Discover the key differences in data visualization, handling capabilities, speed, and ease of learning.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ivyproschool.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/ivyproschool.com\/blog\/#\/schema\/person\/1a7cb5a55a6acaab2b33dbb3739e680c","name":"puja","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/de912f2133e74586cca328a8b80e9337a3eade3e229fa6edab8a2131769ab7e9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/de912f2133e74586cca328a8b80e9337a3eade3e229fa6edab8a2131769ab7e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/de912f2133e74586cca328a8b80e9337a3eade3e229fa6edab8a2131769ab7e9?s=96&d=mm&r=g","caption":"puja"},"url":"https:\/\/ivyproschool.com\/blog\/author\/puja\/"}]}},"_links":{"self":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/comments?post=938"}],"version-history":[{"count":1,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/938\/revisions"}],"predecessor-version":[{"id":12497,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/posts\/938\/revisions\/12497"}],"wp:attachment":[{"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/media?parent=938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/categories?post=938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivyproschool.com\/blog\/wp-json\/wp\/v2\/tags?post=938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}