Identity Theft Awareness
Defend yourself with knowledge, awareness, and detection.
Book the real Danny Lents to speak to your group about identity theft.

ID Theft Speaker

Almost 10 million Americans become victims of identity theft each year. I became a victim in 2001. I've researched identity theft extensively to protect myself and help others. I want to help you avoid this nightmare.

Your odds of becoming a victim are greatly reduced with knowledge, awareness, and detection. Take action now to avoid becoming the next identity theft victim.

Book the real Danny Lents to speak to your group about identity theft:

dlents@IdTheftAwareness.com

Seminar Flyer (pdf file)

What Is Identity Theft?

Short answer: Someone uses your identity to spend money and perform unlawful acts under your name and credit history.

Legal answer: Identity theft occurs when someone knowingly transfers or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law. See TITLE 18,PART I, CHAPTER 47 § 1028 for a detailed definition.

In October 1998, Congress passed the Identity Theft and Assumption Deterrence Act of 1998 to address the problem of identity theft. Specifically, the Act amended 18 U.S.C. § 1028 to make Identity Theft a federal crime. It's a felony with a 15-year maximum sentence. In July 2004, President Bush signed the Identity Theft Penalty Enhancement Act that guarantees a minimum of two years in prison for those who use identity theft to commit a crime, including terrorism.

Watch this informative 10 minute video from the Federal Trade Commission about identity theft.

How Bad Is Identity Theft?

The Federal Trade Commission (FTC) started collecting identity theft statistics in November, 1999. The numbers probably represent a small part of the problem, but it is clear that identity theft is on the rise. The FTC receives thousands of identity theft complaints each year:

This graph shows the number of identity theft complaints per year.
ID Theft Statistics 2014

Top 20 States for Reported ID Theft in 2020

There have been several studies attempting to quantify the impact of identity theft. Annual statistics vary, but most agree with:
  • greater than $50 billion loss to businesses and consumers
  • 8 to 10 million American victims

What can identity thieves do?

Identity thieves have a buy now pay never shopping binge at your expense. California State Senator Debra Bowen notes that "Identity theft is one of the easiest, most risk-free crimes thieves can commit. They don't need a gun, a knife, or a getaway car. All they need is someone's Social Security number and a pen." identity thieves can use your stolen identity information to :

  • open credit card accounts - the most frequent abuse
  • open phone and utilities accounts
  • get a bank loan or checking account
  • file a tax return to get a refund
  • buy a car
  • claim benefits
  • work with children
  • and the most amazing part of all -- they can go to jail under your name!

Identity Theft Warning Signs

  • You receive bills from accounts you didn't open.
  • You see unauthorized charges on your accounts -- credit card, phone, bank, etc
  • Collection agencies are calling you about debts you're unaware of.
  • You are missing checks from your checkbook.
  • Bills and statements are not arriving in the mail at the expected time.
  • Your credit report has unknown entries -- accounts, addresses, employment history, etc.
  • You get turned down for a loan or job based on false entries in your credit report.
  • You receive credit cards you didn't apply for.
  • Your social security earnings and benefit statement shows you made more than you expected for one or more years.
  • The IRS contacts you about income you have not reported.
  • Debt collectors are contacting you about debts that you are unaware of.
  • Replacement credit card is not received before your current card expires.

How does identity theft happen?

Most identity theft victims do not know how their identity was stolen. Today's society of easy and legal access to information makes it easier than you may think. Data gathered through the Internet and electronic databases are potential sources for identity thieves, but low-tech means of stealing your information are more prevalent. Many times your identity thief is someone you know.

Dumpster Diving for Identity Theft Info

An individual or business that fails to properly dispose of personal identification information, by shredding or mutilating, could find themselves susceptible to a "dumpster diver"--an individual who retrieves discarded material looking for anything of value.

Dumpster divers obtain account numbers, social security numbers, addresses, and dates of birth from financial, medical, and personal records--all of which they can use to assume an identity.The tax return season is like Christmas for identity thieves since so many people clean out their files.

You may follow a strict discipline of shredding sensitive documents, but what about the businesses that maintain your personal information. How do they dispose of records with your information?

Dumpster diving is a popular activity for thieves. An Internet search reveals several dumpster diver clubs you can join. You know you have reached a low point in life when you are a member of a dumpster diver club!

Stealing Your Mail For Identity Theft Info

Identity thieves check mailboxes looking for all kinds of interesting treasures. How many pre-approved credit card offers did you receive in the mail last week? Did you receive any statements containing your social security number, account numbers, etc.? Did you mail any bills with sensitive information? Your identity thief would love to find a check in one of your bill payments.

Did you help the identity thief by raising the red flag on your mailbox to announce that your information is ready to be taken?

Your identity thief may take an easier route by simply submitting a change of address to temporarily divert your mail to a mailbox of a vacant house that he has access to. He only needs a week in most cases to receive a few pre-approved credit card offers. The post office will mail a change of address acknowledgement to both the new and old addresses. Contact your post office immediately if you receive this notice unexpectedly. You can report mail theft and false change of address online at the U.S. Postal Inspection Service web site.

Identity Thieves Buy Fake Drivers Licenses & Social Security Cards

Unethical businesses sell valid-looking drivers licenses and social security cards by publishing a ridiculous disclaimer that states the cards are novelty ID cards for novelty purposes only. One web site charges $79 for a drivers license and $99 for a Social Security card -- steep prices for novelty items.

Digital Copy Machines Save Data For Your Identity Thief

Many digital copy machines have a hard drive that stores an unencrypted image of any document that has been copied, scanned, or emailed. You can imagine the sensitive personal identifying information and company proprietary data that may be stored on the unsuspecting copy machine hard drive!  Who gains access to your sensitive data when the copy machines are sold with hard drives containing all that unencrypted data? Many copy machines are connected to a network. Is the network secure enough to prevent opportunities for thieves to gain access to copier hard drives?.

Here is a link to a very interesting April 2010 CBS News piece on copier security. They point out that over 60% of Americans don't realize there are hard drives in copiers.

Insiders Sell Your Data To Identity Thieves

Your personal and sensitive information is maintained in records in several places. Your employer, dentist, doctor, county clerk and creditors just to name a few have information that is very valuable to an identity thief. Does your dentist lock up his patient records to keep the night time cleaning crew from stealing your information? A identity thief may be able to convince an employee to copy a few records for a few hundred dollars. Who's going to know?

Identity Thieves Use The Internet

There are web sites that sell your Social Security number. You can search for someone's birth date and even do a public records search. Many people put their actual birth date on social media sites like Facebook. Visit Google and search for your area code and phone number. You'll probably get a link to your name, address, zip code and a map to your house. Google provides a web site to remove your phone number from their search engine.

Pretext Calling

Some identity thieves are very skilled at calling you or businesses to collect information about you. They call under the pretext of being someone else or you. They're looking for account numbers, your mother's maiden name, birth date, etc. Each call yields a little more identity information. Finally, they have enough info to convincingly assume your identity.

Please remember that financial institutions will never solicit sensitive information through email or the telephone.

Identity Thieves Get Your Credit Reports

Identity thieves obtain credit reports by abusing their employer's authorized access to credit reports or by posing as a landlord, employer or someone else who may have a legitimate need for and a legal right to the information. Your credit report provides all the information required to steal your identity - social security number, birthday, phone number, account listing, employer, addresses, etc.

Identity Theft Scams

The Internet is full of scams and fraudulent efforts. Visit Fraud Watch International to view a list of currently used scams. Here are a few of the popular scams.

Nigerian E-mail

This scam is sent out to identity theft victims via letter, e-mail, and fax. It consists of an urgent message stating the sender has a large sum of money and needs help transferring it out of Nigeria or some other place. As a reward for your help, the sender promises to pay you a few million dollars. Of course you only have to provide your bank account number, social security number, etc.

Online Auction Fraud

The fraud involves a fake ad on eBay to let someone "win" the bid and send in their money, but never send out the merchandise.

Phishing

Phishing ( pronounced "fishing") is a high-tech scam that uses spam email or pop-up messages to deceive you into disclosing your credit card numbers, bank account information, Social Security number, passwords, or other sensitive information used in identity theft.

Phishers send an email or pop-up message that claims to be from a business or organization that you deal with - for example, your Internet service provider (ISP), bank, online payment service, or even a government agency. The message usually says that you need to update or validate your account information. It might threaten some dire consequence if you don't respond. The message directs you to a Web site that looks just like a legitimate organization's site, but it isn't.

What is the purpose of the bogus site? To trick you into divulging your personal information so the operators can steal your identity. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them. Read about recent phishing attacks at www.antiphishing.org/

Report phishing attacks to the company that is being hijacked and to the Anti-Phishing Working Group

Watch this video from the Department of Defense about phishing.

Please remember that the financial institutions will never solicit sensitive information through email or the telephone.

You've Won A Prize

The identity thieves call you with the exciting news of a prize you just won. All they need is a credit card number, social security number, etc, to validate the award.

I Need Your Credit Card Security Code

This identity theft scam usually happens over the phone. Their goal is to get the security code on your credit card. Visa and Master Card use the last three numbers on the back of the card. American Express uses four digits on the face of card located above the credit card number

The identity thief has already obtained your credit card number and address through another means. Now he just needs to convince you to provide the security code.

Normally, the identity thief claims to work at your credit card company and calls you about an automatic alert generated by the system on a suspicious purchase on your card. The fake purchase is usually an anti-telemarketing device just under $500. Of course you inform them of the fraudulent charge and you want it removed immediately. The identity thief is very willing to take care of the problem for you. He just needs... you guessed it... the security code on your card as proof that you have the card in your possession.