Identity Theft - Dont Blame The Internet

Identity theft ? also known as ID theft, identity fraud and ID fraud ? describes a type of fraud where a criminal adopts someone else's identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.

In the UK identity theft is increasing at the rate of 500% each year and, according to Which Magazine, 25% of the population have either suffered from identity theft or know someone who has.

In the USA, a report issued by the Better Business Bureau revealed that, in 2004, over 9 million Americans became victims of identity theft with the total sum defrauded being $52.6 billion.

With figures like this, it's no surprise that there is a certain amount of concern regarding computer and internet security. After all, the internet is basically a mechanism for exchanging information and the possibility that some of the information exchanged may be more than intended is never far from many internet user's minds.

It's easy to imagine criminal masterminds worldwide using the internet to hack into computers in order to gain access to information with which to advance their devilishly cunning schemes. However, as revealed in the report, the facts of the matter are a little more down to earth and the internet, far from making you more at risk to identity theft, can help to significantly cut your losses if you do fall victim this form of fraud.

According to the Better Business Bureau's research the main methods by which criminals gain access to information used for identity theft fraud are as below:

  • Lost or stolen wallet, chequebook or credit card. 28.8%
  • Accessed as part of a transaction. 12.9%*
  • Accessed by friend, acquaintance or relative. 11.4%
  • Don't know, refused, no answer. 11.1%
  • Information accessed by corrupt employee. 8.7%
  • Stolen paper mail or fraudulent change of address. 8.0%
  • Obtained some other way. 7.4%
  • Computer spyware. 5.2%
  • Information stolen from garbage. 2.6%
  • Computer viruses and/or hackers. 2.2%
  • Emails sent by criminals posing as legitimate business. 1.7%
  • * 12.9% due to transactions ? 10.4% offline transactions, 2.5% online transactions.

    In total, when the instances where information was accessed during transactions are subdivided into online and offline transactions, only 11.6% of the information used to carry out identity theft fraud was obtained from computers.

    Of this more than half was obtained by the use of spyware, viruses or hacking ? the risk of which can be greatly reduced by installing the appropriate protection software and ensuring that this is kept up to date.

    Not only did the survey reveal that the internet was not a major source of illegally obtained personal information, but it was also found that those fraud victims who checked their financial records using the internet, ATM machines or other electronic methods suffered financial losses which were, on average, 8 times lower than those of victims who used traditional paper statements to monitor their accounts. This very significant reduction was attributed to the rapid discovery of the fraud due to "real time" monitoring.

    Of course, that's not to say that you shouldn't exercise caution when using the internet or take care to protect the personal information which you may have stored on your PC. However, as long as you install suitable virus, firewall and spyware protection, and keep this continually updated the internet can should be more of a help than a hindrance when it comes to avoiding identity fraud.

    Hamish Hayward
    Don't become a victim. Find out the facts about identity theft.

    In The News:

    This RSS feed URL is deprecated, please update. New URLs can be found in the footers at

    New York Times

    EPA Chief's Spending on Security: Nearly Double His Predecessors'
    New York Times
    Scott Pruitt, the head of the Environmental Protection Agency, spent roughly $3.5 million in taxpayer funds on his personal security detail during his first year in office, 1.7 times what his predecessors spent each year on average, according to ...
    EPA spent $3.5 million to protect Scott Pruitt, nearly twice the typical security costCNBC
    Scott Pruitt's security detail cost nearly $3.5 million his first year, agency reportsWashington Post
    EPA spent nearly $3.5M on Pruitt securityCNN
    Reuters -CBS News -Politico -EPA
    all 131 news articles »


    GDPR Inc.: Profiting From Strict New Security Rules
    The strict European Union–mandated online security law—which affects how companies gather and handle information about Europeans—has “helped us grow our company significantly,” says Hilary Wandall, chief data governance officer at TrustArc, ...


    Apple sees steep increase in US national security requests
    Apple said it received as many as 16,249 national security requests affecting up to 8,249 accounts during the second half of 2017. The number of requests rose 20 percent compared with the first half of 2017, when Apple received 13,499 such requests.
    Apple sees steep increase in US national security-related data requestsBusiness Insider
    Steam Link (BETA) - Apps on Google PlayGoogle Play
    Steam LinkSteam
    all 158 news articles »


    Amazon Alexa Security - - How To Stop Hacks On Voice Assistants
    Smart speakers such as the Amazon Echo have already shown themselves to be untrustworthy. Only a few months ago, consumers complained about sinister laughter coming from the Amazon Alexa assistant. The always listening devices have also been ...
    An Amazon Echo recorded a family's conversation, then sent it to a random person in their contacts, report saysWashington Post
    Woman says her Amazon device recorded private conversation, sent it out to random contactKIRO Seattle

    all 538 news articles »


    Corporate File Systems Tell A Different Security Story
    At the same time, over the last several years, data security spending has been on a growth trajectory and is expected to reach almost $100 billion worldwide in 2018, according to Gartner. It's hopeful to think that increased investments in security ...

    The Onion (satire)

    Jared Kushner's Security Clearance Restored
    The Onion (satire)
    White House senior advisor Jared Kushner had his security clearance restored after temporarily losing it amid the uncertainty of the special counsel's ongoing investigation. What do you think? “I know I feel safer already knowing he is back at the helm.”.

    WSOC Charlotte

    Ramping up efforts for school security is top priority for CMS
    WSOC Charlotte
    Sources told Channel 9 the district will hire full-time police officers whose entire job will focus on school security. Parents are breathing a sigh of relief at CMS' effort to ramp up school safety. Friday's school shooting at a middle school in ...

    and more »


    E3 Lays Out Security Guidelines for This Year's Show
    By Michael Koczwara Things have gotten a little more strict when it comes to security on the show floor of this year's E3. Backpacks will no longer be allowed on the show floor unless you are part of the media or an exhibitor at the show. Anyone else ...

    The Hill

    Homeland Security announces 15000 additional seasonal visas for companies at risk of failure
    The Hill
    The Department of Homeland Security (DHS) announced Friday that it would allow 15,000 more seasonal workers into the country in 2018 under the H-2B visa program, available to businesses at risk of failing without the increased workforce. In a statement ...
    Homeland Security releases 15000 additional H-2B visasThe Boston Globe

    all 52 news articles »


    EPA has spent more than $3.5 million on Pruitt's security in first year in office
    The agency says that Pruitt needed 24/7 security - more than previous administrators - in response to an "unprecedented number of threats" against him. Because of the threats, the EPA says, Pruit and his security team needed to fly first class and the ...

    Google News

    Mail Forwarding - Why Would You Do It?

    First of all we need to get some terms stated.... Read More

    Crack The Code - Thats A Direct Challenge

    I Challenge You To Crack The Code ------------------------------------- I had... Read More

    How to Protect Your Child from the Internet

    When the Internet first came about, it was realized it... Read More

    Behavior to Stay Safer Online

    1. Importance of a Virus Scanner: A Antivirus program can... Read More

    How Can Someone Get Private Information From My Computer?

    From the "Ask Booster" column in the June 17, 2005... Read More

    40 Million People Hacked - YOU as Identity Theft Victim

    Saturday, MasterCard blamed a vendor of ALL credit card providers... Read More

    Computer Viruses, Worms, and Hoaxes

    In recent days, I was one of the unfortunate persons... Read More

    A New Low

    A new variation of the Nigerian Scam theme ... Read More

    Virus Nightmare..Lessons Learned

    I got a virus the other day, Thursday I believe... Read More

    Money Mule Email Scam Hits U.S.

    Imagine this ? you open up your email box and... Read More

    Why Corporations Need to Worry About Phishing

    Phishing is a relatively new form of online fraud that... Read More

    Protecting Your Identity On The Internet

    Afraid that someone is monitoring your PC or installed a... Read More

    Is My PC Vulnerable on the Internet?

    No longer are viruses the only threat on the internet.... Read More

    Is Spyware Watching You?

    Imagine my surprise when I received a phone call from... Read More

    Message Board Security Problems

    Security leaks can be a big problem for any site... Read More

    How to Get Rid of New Sobig.F Virus?

    As you know, this time the virus under the name... Read More

    Dont Get Hacked - A Guide to Protecting Your Business from Thieves

    You've seen it in the news - 40 million credit... Read More

    Fishing for Fortunes. Scam!

    Spelt phishing, but pronounced as above, this despicable act is... Read More

    Firewalls: What They Are And Why You MUST Have One!

    A firewall is a system or gateway that prevents unauthorized... Read More

    Social Engineering - The Real E-Terrorism?

    One evening, during the graveyard shift, an AOL technical support... Read More

    Corporate Security for Your Home Business

    The words Corporate Security may conjure up images of a... Read More

    7 Ways to Spot a PayPal Scam E-Mail

    Paypal is a great site and is used by many... Read More

    Dont be a Dork ? Protect Yourself

    There are folks out there who use their powers for... Read More

    Consumers: Shop Online and Get Information Safely

    Do you really have to know how feeds work? Not... Read More

    Breaking Into Your PC: News...

    You'd better learn news from media, not from emails, security... Read More