Home Add to Favorite Contact Submit  
             10 June, 2023

Category:  Articles » Legal » Identity-Theft


History Of Identity Theft

         Views: 1990
2007-08-18 17:54:03     
Article by Adrian Kinley

In its earliest days the history of identity theft began with the impostor pretending to be someone he wasn't. In the days before photographic identification this was both a common and easy crime to commit. Your word and a signature (whether your own or not) were accepted as gospel.

Of course, as the world developed over the last century or so and photographic I.D. came into use the crime became .. even worse? The reason identity theft is on the increase today is because people assume in this day and age that they are perfectly safe from such a crime. How can someone pretend to be me when they look nothing like me seems to be the common trail of thought.

Unfortunately we have not learnt from the history of identity theft. The reason an impostor could get away with it back in "the good old days" was because no one had any reason to doubt that he wasn't who he said he was. As for a signature, who looks at them and if they did would they know what they were looking at?

Having had my identity stolen and spending months researching the crime as I painstakingly restored my credit line I am often preaching to friends to be more careful. This preaching is sometimes accompanied by a demonstration of how we are assumed to be who we say we are. It also gets me out of paying for dinner.

You may or may not want to try this but I have done it 4 times now and have yet to be queried. When paying the check in a restaurant I have, with her permission of course, handed over a credit or debit card belonging to my wife. I have signed the slip in my own name with no attempt to make it resemble my wife's signature. To the shock of our fellow dinner guests I have had no problems, not so much as a second glance!

Granted I needed to know my wife's pin number to use the card but still, the waiter or waitress did not even look close enough at the card to notice it said MRS and not MR or compare the signatures as a secondary precaution. I have even asked for ( just to show off to our guests you understand) and received cash back!

So what does this little demonstration prove? Well to me it proves that now, just like throughout the history of identity theft, our biggest problem is that humans by nature are a trusting breed. So when the nice girl on the phone at the loan company asks the caller for his social security number, it doesn't occur to her, or her superiors for that matter, that the number he just read out to her was in fact yours.... or worse than that, MINE!

Learn more about the history of identity theft and how you can protect yourself from the worlds fastest growing crime. http://www.history-of-identity-theft.com

Specialized in: History - Identity Theft
URL: http://www.history-of-identity-theft.com
Print article      Bookmark this page
Related Articles 
Phishing - Who's Trying To Rob You Blind! (Popularity: ): Beware! Someone is Phishing for your Personal Financial Information 4 Things You Must Do Now to Protect Yourself Against Internet ThievesWhat is phishing?Phishing is pronounced just like the sport used to catch a fish on a hook - fishing. And that's exactly what thieves are trying to do to you - hook onto your personal financial information.What personal financial information are they looking for? Anything and everything - store account numbers, ...
How To Protect Your Social Security Number (Popularity: ): Your social security number is very important, it's like your password in life, all of your information is tied into that number. Many people don't know this, but only a few organizations actually have the right to know your social security number. Today almost everybody is requesting a social security number for access to something, schools, video stores, phone companies, health clubs, etc. The main reason for companies asking for ...
Who Has Access to My Credit Report? (Popularity: ): From the day you are eligible to own your first credit card, credit referencing agencies such as Experian and Trans Union start to collect information on your financial history. This information goes into making your personal credit report and is used to determine your credit score. Banks use this information to help them decide which banking products, such as loans and credit cards, will be suitable for you.The Difference Between ...
Medicare Fraud and Abuse: The Most Profitable Healthcare Crime in the U.S. (Popularity: ): Medicare fraud and abuse cost taxpayers approximately $60 billion a year. It’s one of the fastest and most profitable crimes in the U.S. The government health insurance program that covers 46 million elderly and disabled Americans is being hijacked by opportunists preying on patients, doctors, suppliers, and lack of oversight of the system itself.According to President Obama, Medicare fraud and abuse is fueling enormous federal budget deficits. He recently explained ...
Your Credit Cards May Be at Risk - Few Tips to Prevent Credit Card Theft and Fraud (Popularity: ): More and more people are using credit and debit cards when they go shopping. It is convenient to just swipe your card at the checkout. Most of the stores are encouraging the use of debit and credit cards by using electronic payment systems. This means that if you write a check at the checkout, the store will scan your check and give it back to you just like you were ...

Related Business 
ID Cuffs: Identity Theft Protection (Popularity: ): ID Cuffs was founded with one mission: become the leader of true comprehensive identity theft prevention, and we have accomplished this mission. Unfortunately, there are mountains of misinformation regarding proper proactive identity theft prevention, and most consumers simply desire good identity theft protection with honest terms at a fair price.
Identity Theft Facts and Resources (Popularity: ): Your identity is your most important asset. Valuable information about identity theft and helpful tips on how to protect yourself. Critical steps to take if you are a victim, to restore your name and your credit.
Target Class Action (Popularity: ): Almost every day, we read or hear something in the news about the latest loss or theft of customer or employee information. In the past few years, identity theft has grown exponentially, due in part to the relative ease to commit such a crime and its low conviction rate. Accordingly, organized crime now leads the way in identity theft crimes.
Rules Identity Theft (Popularity: ): On our resource you can get the information of identity stealing and advantage rules for you not to become a victim of such a case. Unfortunately, any of your private information can be stolen, but knowing basic rules of identity theft protection you can reduce the risk.
Best Identity Theft Protection (Popularity: ): Get tips and resources for identity theft protection and prevention, internet security and much more.
Millersmiles.co.uk (Popularity: ): Offers information about online identity theft, spoof email and phishing scams.
Theft Talk (Popularity: ): Counsels theft offenders of all ages, provides theft victim services, and professional training services.
Shredder Depot: Quality Paper Shredders (Popularity: ): Imagine your business facing data theft and there’s no recoverable measure to raise an armory of possible solution since all important information is beyond your grasp. Terrible, isn’t it? Now there‘s no reason to go loco over identity or data theft, we have the perfect paper shredder for you to protect your business and your clients. At Shredder Depot, all your shredding needs will be met at the safest method ...
PC Cleaner Pro (Popularity: ): PC Cleaner Pro™ 2013 is a premium registry cleaner that helps to improve the speed & performance of your computer. PC Cleaner Pro is designed to protect your privacy by cleaning up all your unwanted history data on your computer which could also put you at risk of identity theft.
Identity Theft Resource Center (Popularity: ): Features detailed guides for victims, current laws, media resources, and reference library.