Victim Statement
This is a statement attached to your credit report when you think your identity may have been stolen. Creditors will contact you with information if an account has any large changes or if a new account is being opened.
A truncated credit card number is what you see on many receipts and other papers that have your credit card number on them. All the digits, except for the last four, appear as “x”. This is done to protect you from an unauthorized person seeing your credit card number.
Two-factor authentication is any authentication protocol that requires two independent ways to establish identity and privileges. This contrasts with traditional password authentication, which requires only one “factor” (knowledge of a password) in order to gain access to a system.
Skimming is another method identity thieves use to get your personal information. Typically it is accomplished by running your credit card, ATM card, driver’s license, etc. through a card reader, aka “skimmer”. The information is then stored for later use. Often the perpetrators are an employee of a restaurant, a gas station, or any other place, where you give your card to someone else to process a transaction. Once your information is skimmed, they can then make purchases or even use the information to steal your good name or create a replica of your card.
Shoulder surfing is the name given to the procedure that identity thieves use to find out your passwords, personal identification number, account numbers and more. Simply, they look over your shoulder–or even watch from a distance using binoculars, in order to get those pieces of information that help them steal your money, or even worse, your identity.
Phishing is the practice of “fishing” for victims and luring these unsuspecting Internet users to a fake Web site. This is accomplished by using authentic-looking email with the real organization’s log with the purpose being to steal passwords, financial or personal information, or introduce a virus attack.
Link masking is the tactic used by phishing e-mails to get victims thinking that they are being directed to one site, when in fact, they are being directed to another. For example, although the link: www.microsoft.com would lead you to believe that if you click on it, you would be directed to Microsoft’s site, it really takes you to a page within this site.
Identity Fraud is when a thief uses personal information that he has made up, rather than that which belongs to a real person. It is different than identity theft in that the perpetrator is not assuming the identity of another “real” person, but rather they are trying to “mask” their identity and trying to assume the identity of a fictitious person. Identity Theft is where a crook obtains key pieces of personal information, such as Social Security number, drivers license information, name, address, mothers maiden name, and more so that they can impersonate a real person. The crook can then assume that persons identity. There are really two variants here: a crook can open new accounts in a victims name, this is referred to true account identity theft, or the crook can use the personal information to gain access to victims existing accounts, which is often referred to as account takeover identity theft.
Examples:
- All of these are examples of what would be considered identity theft.
- A crook taking your credit card and making an unauthorized purchase. Credit card fraud is the most common form of identity theft, accounting for almost one third of all reported cases.
- Someone obtains enough of your personal information to use your name and without your permission opens a utility or cell phone account in your name.
- Someone impersonates you and is employed using your name.
The FCRA is a U.S. federal law that gives everyone the right to see what the CRAs have on file in their credit report. It also outlines a periodic free copy of a credit report. And if inaccuracies are found, they have the right to dispute them.
The unauthorized disclosure of information that compromises the security, confidentiality, or integrity of personally identifiable information.
Example:
- Such information may include, but not be limited to, Social Security number, name and addresses, date of birth, health care, bank account information, etc.