

If you do not feel safe, try using another machine.Īnother method you can use is to try to use cash for your transactions, or use a pre-paid credit card. Remember, it is better to be safe than sorry. If he/she is not willing to do so, let the person go first. If someone stands too close to you, do not be afraid to ask the person to move back.
SOMEONE STOLE MY CHECKBOOK PASSWORD
To prevent this from happening, you should be aware of your surroundings when you are accessing any accounts that require you to enter a password or PIN in public. Although this can typically occurs in a public setting, where the victim is and their credentials are in plain sight, it may also occur through a video camera setup by the criminal. The identity thief attempts to get close enough to you so that when you enter password information, such as a PIN number, the thief records the password. This attack may occur anytime you use a password or a device that stores PIN numbers, such as at an ATM. Also verify with others or verify with the company the person is representing that such information is really needed. If in doubt, do not be afraid to obtain the person’s contact number let him/her know that you will call him/her back. Do not give out any personal information to anyone you do not know. Social engineering is commonly known as a “con game” and is perpetrated by “con-men.” See also Pretexting. Usually, social engineers know some information that lead the victim to believe they are legitimate and give the information asked. Social engineering is the practice of someone either in person, over the telephone, or computer, uses means to deceive someone else into divulging sensitive information. To read other recommendations see the section entitled Reduce Your Exposure to Mail Theft found on the Preventing Identity Theft web page. Set up to receive your bills and make payments online. Use a locking mailbox if possible, or rent a box at the post office. For instance, do not leave your mail in the box for extended periods. Other steps can be taken to protect yourself. If you suspect that someone has been taking mail out of your mailbox, contact the post office immediately. To protect yourself, you should monitor your mail. At times, identity theft criminals have been known to re-route your mail without your knowledge or permission by submitting a change of address to the post office. As in dumpster diving, a thief can take your credit card bills, bank statements anything that can be used to steal your identity. Mail theft occurs when someone targets your mailbox and removes mail that has pertinent information on it. If you suspect you are a victim of identity theft, see the section What to Do If Your Identity Is Stolen. Keep track of your credit report and report any discrepancies to your credit card company and credit bureaus.

Another method to use is to go paperless by receiving statements and making your payments online. To protect yourself, you should shred everything before disposing of it with a cross-cut paper shredder. For each scheme, we provide recommendations on the methods you can use to thwart criminals from obtaining and using your information.ĭumpster diving occurs when someone goes through someone else’s garbage to obtain personal identifiable information off items found in the trash, such as credit card bills, utility bills, medical insurance, and bank statements. The following is a listing of just some of the most common methods identity criminals have been known to use to obtain your personal identifiable information.

This can range from non-technological to technological schemes. There are many different types of schemes identity criminals use. Identity theft begins when someone takes your personally identifiable information such as your name, Social Security Number, date of birth, your mother’s maiden name, and your address to use it, without your knowledge or permission, for their personal financial gain.
