SlideShare une entreprise Scribd logo
1  sur  8
Global Perspectives, Problems with
Social Networking
Assignment:
Social Networking & Identity Theft
Introduction – What is Identity Theft..?
 Identity theft is a crime in which a criminal obtains key pieces of personal
information, such as identification numbers or banking details, in order to
pose as someone else.
 The information can be used to...
– Gain access to the victim’s financial (bank or credit card) accounts.
– Obtain credit and purchase merchandise, or make cash advances.
– Secure social benefits, such as social security and drivers license numbers, or
obtain health and/or state welfare services.
 Identity theft can also provide a thief with false credentials for immigration
or other applications.
2 7/16/2015
One of the biggest problems with identity theft is that the victims of identity theft
are often accused and charged with crimes committed in the victim’s name.
The most common types of Identity Theft
The two main types of identity theft are:
 Account takeover identity theft
– A situation where an imposter uses the stolen personal
information to gain access to the person’s existing accounts.
Often the identity thief will use the stolen identity to acquire
even more credit products by changing the victim’s address so
that you credit card bills are not sent to the victim.
 True name identity theft
– When an imposter uses the information to open new accounts.
Such as a new credit card account, or cellular services, or even to
open a new checking account in order to obtain blank checks.
3 7/16/2015
Alarming statistics about Identity Theft |1
 A recent study from Javelin Strategy and Research shows that over 12 million Americans using social
media services were victims of Identity Theft in 2012.
 According to a report issued from the FBI in 2013, Identity Theft is the fastest growing crime in
America.
7/16/20154
34%
24%
20%
Target of an
identity threat
54% Had an account accessed
without their permission
15%
Socially engineered to
disclose password or
other information
13%
Asked to visit a
scam website via
a private message
70%Psychological
Manipulation
Phishing Scams
Alarming statistics about Identity Theft |2
 A PC World poll conducted in 2012 reports that one-third of members using social
networking sites have at least three pieces of personal information posted on
their profile that can make stealing their identity easy.
– 80% of those polled said they were concerned about their privacy, while 60% said they
had no idea what their privacy settings were and who could see their personal
information on those sites.
 A study conducted at Indiana University indicates that 16% of students became
victims of a controlled phishing scam, of which 72% believed it was their friend
who sent them the fraudulent link.
 The highest percentage of victims were age 20-29. It is thought that this age
group more susceptible because they are less likely to regularly track bank
account and credit card activity, pay for identity theft monitoring services, or use
discretion when sharing information on social media
5 7/16/2015
Research shows that millions of people are affected each year, costing victims anywhere from 30~130 hours
of personal time and thousands of dollars to recover and repair their identities.
What some people think about Identity Theft..
 Really no big deal.
 Only individuals who lack basic common sense become victims of Identity
Theft.
 Primarily a crime targeting the elderly.
 Statistics are inconsistent and often fabricated by companies selling Identity
“Theft Prevention” services.
 It will never happen to me.
 A low-risk, high reward crime.
 If you steal someone’s identity you can spend all the money you want without
having to pay.
6 7/16/2015
Regardless of the many opinions on the subject, prudence is often equally as
rewarding as risk..
Consequences and penalties of Identity Theft
 Before the Restitution Act of 2008, in the United States prosecutors
had to prove $5,000 in damages before accusing someone of Identity
Theft.
 Under the new law prosecutors merely need to prove that personal
data was intentionally accessed.
 Depending on the nature and degree of theft penalties may vary:
– Repayment of the victim’s losses.
– Repayment of the victim’s losses, plus a $5,000 penalty and 2 years
imprisonment.
– $100,000 in penalties and 5 years imprisonment.
7 7/16/2015
How to prevent identity theft on Social Media sites
 Install theft protection software on all of the computers you use to access social media
accounts.
 Make sure never to click the box to save your password when you are on a public, work or
laptop computer.
 Avoid giving out personal information on social media sites, such as address, phone number
or your birth date.
 Change your privacy settings on all your social media accounts, so that you have control of
all the information that is posted.
 Type in the name of the social media site, or use a bookmark, instead of clicking on email
links.
 Create complicated passwords when you sign up for social media accounts.
8 7/16/2015
Tip: Some hackers use the "Forgot your Password" link in order to break into your account.
Make sure your security question is not something that could be easily found, such as your
mother's maiden name, your birth date or the city where you were born. Make up your own
questions, or make up the answers so scams cannot use your personal information against
you.

Contenu connexe

Tendances

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
Aryan Ragu
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
pooja_doshi
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
Randall Chesnutt
 

Tendances (20)

Phishing attacks ppt
Phishing attacks pptPhishing attacks ppt
Phishing attacks ppt
 
Phishing
PhishingPhishing
Phishing
 
Social engineering presentation
Social engineering presentationSocial engineering presentation
Social engineering presentation
 
Identity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your RiskIdentity Theft: How to Reduce Your Risk
Identity Theft: How to Reduce Your Risk
 
Phishing attack
Phishing attackPhishing attack
Phishing attack
 
Social engineering attacks
Social engineering attacksSocial engineering attacks
Social engineering attacks
 
Identity Theft
Identity Theft Identity Theft
Identity Theft
 
WhatsApp Forensic
WhatsApp ForensicWhatsApp Forensic
WhatsApp Forensic
 
Phishing Attack : A big Threat
Phishing Attack : A big ThreatPhishing Attack : A big Threat
Phishing Attack : A big Threat
 
Phishing
PhishingPhishing
Phishing
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Footprinting and reconnaissance
Footprinting and reconnaissanceFootprinting and reconnaissance
Footprinting and reconnaissance
 
Cyber crime types
Cyber crime typesCyber crime types
Cyber crime types
 
PPT on Phishing
PPT on PhishingPPT on Phishing
PPT on Phishing
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Computer & internet Security
Computer & internet SecurityComputer & internet Security
Computer & internet Security
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
What is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | EdurekaWhat is Phishing? Phishing Attack Explained | Edureka
What is Phishing? Phishing Attack Explained | Edureka
 
Cyber security & Importance of Cyber Security
Cyber security & Importance of Cyber SecurityCyber security & Importance of Cyber Security
Cyber security & Importance of Cyber Security
 

En vedette

Resilency
 Resilency  Resilency
Resilency
price56
 
Best professional indemnity insurance quote
Best professional indemnity insurance quoteBest professional indemnity insurance quote
Best professional indemnity insurance quote
kelly657
 

En vedette (9)

DCI NetApp Benefits
DCI NetApp BenefitsDCI NetApp Benefits
DCI NetApp Benefits
 
Comparision
ComparisionComparision
Comparision
 
The New Enterprise Data Platform
The New Enterprise Data PlatformThe New Enterprise Data Platform
The New Enterprise Data Platform
 
Condition monitoring of steam turbines
Condition monitoring of steam turbinesCondition monitoring of steam turbines
Condition monitoring of steam turbines
 
Construction Insurance
Construction Insurance Construction Insurance
Construction Insurance
 
Pre-Con Ed: Covering Your "Assets" - Don't get Caught with Your [Software] Pa...
Pre-Con Ed: Covering Your "Assets" - Don't get Caught with Your [Software] Pa...Pre-Con Ed: Covering Your "Assets" - Don't get Caught with Your [Software] Pa...
Pre-Con Ed: Covering Your "Assets" - Don't get Caught with Your [Software] Pa...
 
Resilency
 Resilency  Resilency
Resilency
 
Best professional indemnity insurance quote
Best professional indemnity insurance quoteBest professional indemnity insurance quote
Best professional indemnity insurance quote
 
Believe In Story - The Power of Content Creation Management
Believe In Story - The Power of Content Creation ManagementBelieve In Story - The Power of Content Creation Management
Believe In Story - The Power of Content Creation Management
 

Similaire à Social networking and identity theft

Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
Barry Caplin
 

Similaire à Social networking and identity theft (20)

How to Prevent ID Theft
How to Prevent ID TheftHow to Prevent ID Theft
How to Prevent ID Theft
 
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity TheftYour Employees at Risk: The New, Dangerous Realities of Identity Theft
Your Employees at Risk: The New, Dangerous Realities of Identity Theft
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 
Youth Protection Guide - Canada
Youth Protection Guide - CanadaYouth Protection Guide - Canada
Youth Protection Guide - Canada
 
Identity theft 10 mar15
Identity theft 10 mar15Identity theft 10 mar15
Identity theft 10 mar15
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
What You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity TheftWhat You Need to Know to Avoid Identity Theft
What You Need to Know to Avoid Identity Theft
 
Identity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing BlogIdentity Privacy 101 - Quicken Loans Zing Blog
Identity Privacy 101 - Quicken Loans Zing Blog
 
Identity Fraud and How to Protect Yourself
Identity Fraud and How to Protect YourselfIdentity Fraud and How to Protect Yourself
Identity Fraud and How to Protect Yourself
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
The Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nzThe Identity Theft Checklist – Guidance for the general public.nz
The Identity Theft Checklist – Guidance for the general public.nz
 
Identity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - BasicsIdentity Theft Awareness 101 - Basics
Identity Theft Awareness 101 - Basics
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Seniors And Crime Prevention
Seniors And Crime PreventionSeniors And Crime Prevention
Seniors And Crime Prevention
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Identity Theft - Canada
Identity Theft - CanadaIdentity Theft - Canada
Identity Theft - Canada
 
Child ID Theft Report 2012
Child ID Theft Report 2012Child ID Theft Report 2012
Child ID Theft Report 2012
 
Misuse of personal information
Misuse of personal informationMisuse of personal information
Misuse of personal information
 
Fraud Awareness
Fraud AwarenessFraud Awareness
Fraud Awareness
 
Cyber Crime Identity Theft
Cyber Crime Identity Theft Cyber Crime Identity Theft
Cyber Crime Identity Theft
 

Dernier

Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
ritikaroy0888
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
Cara Menggugurkan Kandungan 087776558899
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
eliklein8
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
SocioCosmos
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
eliklein8
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
ZurliaSoop
 

Dernier (20)

Busty Desi⚡Call Girls in Sector 49 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 49 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 49 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 49 Noida Escorts >༒8448380779 Escort Service
 
Film show production powerpoint for site
Film show production powerpoint for siteFilm show production powerpoint for site
Film show production powerpoint for site
 
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...Panjim Goa Escort Girls ✿✸ 9971646499  ₢♚ Call Girls Panjim Goa Direct Cash O...
Panjim Goa Escort Girls ✿✸ 9971646499 ₢♚ Call Girls Panjim Goa Direct Cash O...
 
Film show evaluation powerpoint for site
Film show evaluation powerpoint for siteFilm show evaluation powerpoint for site
Film show evaluation powerpoint for site
 
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...College & House wife  Call Girls in Paharganj 9634446618 -Best Escort call gi...
College & House wife Call Girls in Paharganj 9634446618 -Best Escort call gi...
 
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verifiedKarol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
Karol Bagh, Delhi Call girls :8448380779 Model Escorts | 100% verified
 
Film the city investagation powerpoint :)
Film the city investagation powerpoint :)Film the city investagation powerpoint :)
Film the city investagation powerpoint :)
 
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
💊💊 OBAT PENGGUGUR KANDUNGAN SEMARANG 087776-558899 ABORSI KLINIK SEMARANG
 
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
Call Girls in Chattarpur (delhi) call me [9953056974] escort service 24X7
 
Capstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdfCapstone slidedeck for my capstone project part 2.pdf
Capstone slidedeck for my capstone project part 2.pdf
 
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdfSociocosmos empowers you to go trendy on social media with a few clicks..pdf
Sociocosmos empowers you to go trendy on social media with a few clicks..pdf
 
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
Unlock the power of Instagram with SocioCosmos. Start your journey towards so...
 
Film show pre-production powerpoint for site
Film show pre-production powerpoint for siteFilm show pre-production powerpoint for site
Film show pre-production powerpoint for site
 
Film show post-production powerpoint for site
Film show post-production powerpoint for siteFilm show post-production powerpoint for site
Film show post-production powerpoint for site
 
Film show investigation powerpoint for the site
Film show investigation powerpoint for the siteFilm show investigation powerpoint for the site
Film show investigation powerpoint for the site
 
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIRBVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
BVG BEACH CLEANING PROJECTS- ORISSA , ANDAMAN, PORT BLAIR
 
Capstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolutionCapstone slide deck on the TikTok revolution
Capstone slide deck on the TikTok revolution
 
Capstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdfCapstone slidedeck for my capstone final edition.pdf
Capstone slidedeck for my capstone final edition.pdf
 
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
Jual Obat Aborsi Palu ( Taiwan No.1 ) 085657271886 Obat Penggugur Kandungan C...
 
"Mastering the Digital Landscape: Navigating the World of Digital Marketing"
"Mastering the Digital Landscape: Navigating the World of Digital Marketing""Mastering the Digital Landscape: Navigating the World of Digital Marketing"
"Mastering the Digital Landscape: Navigating the World of Digital Marketing"
 

Social networking and identity theft

  • 1. Global Perspectives, Problems with Social Networking Assignment: Social Networking & Identity Theft
  • 2. Introduction – What is Identity Theft..?  Identity theft is a crime in which a criminal obtains key pieces of personal information, such as identification numbers or banking details, in order to pose as someone else.  The information can be used to... – Gain access to the victim’s financial (bank or credit card) accounts. – Obtain credit and purchase merchandise, or make cash advances. – Secure social benefits, such as social security and drivers license numbers, or obtain health and/or state welfare services.  Identity theft can also provide a thief with false credentials for immigration or other applications. 2 7/16/2015 One of the biggest problems with identity theft is that the victims of identity theft are often accused and charged with crimes committed in the victim’s name.
  • 3. The most common types of Identity Theft The two main types of identity theft are:  Account takeover identity theft – A situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to acquire even more credit products by changing the victim’s address so that you credit card bills are not sent to the victim.  True name identity theft – When an imposter uses the information to open new accounts. Such as a new credit card account, or cellular services, or even to open a new checking account in order to obtain blank checks. 3 7/16/2015
  • 4. Alarming statistics about Identity Theft |1  A recent study from Javelin Strategy and Research shows that over 12 million Americans using social media services were victims of Identity Theft in 2012.  According to a report issued from the FBI in 2013, Identity Theft is the fastest growing crime in America. 7/16/20154 34% 24% 20% Target of an identity threat 54% Had an account accessed without their permission 15% Socially engineered to disclose password or other information 13% Asked to visit a scam website via a private message 70%Psychological Manipulation Phishing Scams
  • 5. Alarming statistics about Identity Theft |2  A PC World poll conducted in 2012 reports that one-third of members using social networking sites have at least three pieces of personal information posted on their profile that can make stealing their identity easy. – 80% of those polled said they were concerned about their privacy, while 60% said they had no idea what their privacy settings were and who could see their personal information on those sites.  A study conducted at Indiana University indicates that 16% of students became victims of a controlled phishing scam, of which 72% believed it was their friend who sent them the fraudulent link.  The highest percentage of victims were age 20-29. It is thought that this age group more susceptible because they are less likely to regularly track bank account and credit card activity, pay for identity theft monitoring services, or use discretion when sharing information on social media 5 7/16/2015 Research shows that millions of people are affected each year, costing victims anywhere from 30~130 hours of personal time and thousands of dollars to recover and repair their identities.
  • 6. What some people think about Identity Theft..  Really no big deal.  Only individuals who lack basic common sense become victims of Identity Theft.  Primarily a crime targeting the elderly.  Statistics are inconsistent and often fabricated by companies selling Identity “Theft Prevention” services.  It will never happen to me.  A low-risk, high reward crime.  If you steal someone’s identity you can spend all the money you want without having to pay. 6 7/16/2015 Regardless of the many opinions on the subject, prudence is often equally as rewarding as risk..
  • 7. Consequences and penalties of Identity Theft  Before the Restitution Act of 2008, in the United States prosecutors had to prove $5,000 in damages before accusing someone of Identity Theft.  Under the new law prosecutors merely need to prove that personal data was intentionally accessed.  Depending on the nature and degree of theft penalties may vary: – Repayment of the victim’s losses. – Repayment of the victim’s losses, plus a $5,000 penalty and 2 years imprisonment. – $100,000 in penalties and 5 years imprisonment. 7 7/16/2015
  • 8. How to prevent identity theft on Social Media sites  Install theft protection software on all of the computers you use to access social media accounts.  Make sure never to click the box to save your password when you are on a public, work or laptop computer.  Avoid giving out personal information on social media sites, such as address, phone number or your birth date.  Change your privacy settings on all your social media accounts, so that you have control of all the information that is posted.  Type in the name of the social media site, or use a bookmark, instead of clicking on email links.  Create complicated passwords when you sign up for social media accounts. 8 7/16/2015 Tip: Some hackers use the "Forgot your Password" link in order to break into your account. Make sure your security question is not something that could be easily found, such as your mother's maiden name, your birth date or the city where you were born. Make up your own questions, or make up the answers so scams cannot use your personal information against you.

Notes de l'éditeur

  1. References What is Identity Theft Jerri Ledford, About.com Author unknown, Identitytheftcreditfraud.com
  2. References: Author unknown, Identitytheftassistance.org
  3. References: 2013, FBI statistics via fraudfighters.com 2012, PC World via fraudavengers.org May 2012, Matt Cullina, idt911blog.com 2012, Javelin Strategy & Research
  4. References: 2013, FBI statistics via fraudfighters.com 2012, PC World via fraudavengers.org May 2012, Matt Cullina, idt911blog.com 2012, Javelin Strategy & Research
  5. Source: Comments from various blog sites