How identity fraudsters obtain data

Tom Muleya

 Fraud Insight

As Zimbabwe gradually moves away from a physical paper world to a digital world, more identity theft crimes are expected to be experienced. 

Currently, the nation is moving towards use of digital currency. This therefore calls for more education and awareness about the various ways through which ID thieves can obtain valuable personal and confidential information.

Globally, identity theft is increasingly a 21st century problem. As more data moves from physical paper and unto internet-connected servers the chances of that data getting stolen increases as well.

 In 2017 Cifas announced that identity theft fraud in the UK was reaching “epidemic levels” with incidents occurring at a rate of 500 per day.

Norton found that 87 percent of consumers have left their personal information exposed while accessing emails, bank accounts or financial information.

According to the Identity Theft Resource Centre’s 2021 report, cyber-attacks, phishing attempts and ransomware are all increasingly becoming common.

In identity theft crimes or attacks, some sneaky individual snatches your personal information, like your name, credit card details or social security number and uses it without your permission to commit fraud, make quick money, or do other shady activities in your name.

The following are some of the tactics or ‘modus operandi’ which identity thieves use to steal or obtain information that you need to be aware of;

Data breaches

When companies or organisations have their systems hacked, it can result in a massive leak of personal information. Hackers can then use this information to commit identity theft.

Social media

People have a tendency and interest of sharing their lives on social media, but this can also make them vulnerable to identity theft. Posting personal information such as date of birth, home address, your holiday plans and places of visits, among others, can make it easier for a thief to steal one’s identity.

Phishing emails

These sneaky messages are designed to look like they are from legitimate source, such as your bank or a social media site, but they are actually from an imposter. Clicking on the links or downloading attachments in these emails can give the thief access to your personal data.

Dumpster diving

This is a very old school method. ID thieves will dig through your trash, looking for anything that may have personal information on it.

Mail theft

ID thieves can steal mail from your mailbox or even from inside your home. All what they are looking for is anything containing personal information, bank statements, credit offers, or tax documents.

Wallet theft

This will be done through pickpocketing. The thief will simply steal your wallet or purse with credit cards, and personal identification particulars and then wreak havoc on your finances and reputation.

Join in the fight against fraud and identity theft, and create a safe environment and crime free Zimbabwe. Think security and safely store or keep your personal or corporate information. Watch out for the next issue.

Tom Muleya is a Detective Assistant Inspector working under the CID Commercial Crimes Division and also a member of the National Cyber Security Awareness Taskforce, Zimbabwe. Feedback: WhatsApp line: 0772 764 043, or e-mail:[email protected].

You Might Also Like

Comments

Take our Survey

We value your opinion! Take a moment to complete our survey