by: Mike Miller
6/13/2016

Following up on an earlier blog entry, 15 Tips to Prevent Identity Theft, I thought I would show you a number of examples of how thieves rip off your identity.  Identity thieves may use a variety of methods to gain access to your information, including; 

1. Skimming - thieves steal credit/debit card numbers by using a special storage device attached to ATM machines. The device reads the magnetic strip on your card which thieves use to commit fraud. 

2. Phishing - by pretending to be financial institutions or companies, thieves can send spam or pop-up messages to get you to reveal your personal information. Be sure your firewall, anti-virus, and anti-spyware software is up to date. Use identity theft protection. Never click on links in pop-up windows or in spam e-mail. 

3. Changing Your Address - thieves divert your billing statements to another location by completing a change of address form. 

4. Old-Fashioned Stealing - wallets and purses, mail, bank and credit card statements, pre-approved credit offers, new checks, tax information, personnel records, or bribe employees who have access. 

5. Pretexting - thieves use false pretenses to obtain your personal information from financial institutions, telephone companies, and other sources. 

6. Fishing - thieves use string to lower pieces of cardboard covered with glue down blue mail boxes and open envelopes that stick looking for personal information they can steal. 

7. Dumpster Diving – thieves will go through your trash looking for bills, credit cards and other information. Shred anything containing your personal information including credit card offers and “convenience checks” that you don’t use. 

8. Information retrieval - thieves desire your hard drive with personal information on it. Have your hard drive professionally erased before disposing it. 

9. Victim research - thieves access government registers, Internet search engines, and public records to gain pieces of your personal information. 

10. Remote thievery - thieves can read contactless or smartcard credit cards remotely with a compact radio frequency device. 

11. Shoulder surfing - the thief simply eavesdrops on transactions you make in public and pick up whatever useful information you disclose. 

12. Computer identity theft - with the use of computer viruses and hacking attacks, thieves can get personal information from your computer. 

13. Employment scams - these scams advertise a bogus job and request personal information. Never give out personal identification information without knowing whom you are dealing with. 

14. Social networking - thieves regularly troll social networking sites to steal personal information so they can use to commit fraud.