Identity Theft Glossary

In the electronic community, an act of aquiring information, such as a username, password, credit card details or other sensitive private (usually financial) information, by disguising one's self or entity as as tustworthy. This is generally acheived through at an attempt of replicating a website or communication commonly known to be trustworthy, such as a large financial institution, or popular, highly trafficed websites. Phishing os often carried out through electronic mail, and commonly re-directs a user to enter their personal, sensitive details into such a website that mimics a legitimate site, also called spoofing.

There are three common types of phishing including Spear Phishing, Clone Phishing, and Whaling.

Social Security Number
A Social Security number (SSN) is an individual's nine-digit persoanl identification number issued to all U.S. citizens at birth, permanent residents, and temporary (working) residents. The Social Security Administation issues all social security numbers.

The Social Security number was originally designed to help the IRS collect taxes, but over time, the use of this number has been expanded, making it a de facto national identification number.

Social Security Administration
The United States Social Security Administration (SSA) is an independent agency of the United States federal government that administers Social Security, a social insurance program consisting of retirement, disability, and survivors' benefits. The office was established on August 14 1935. Michael J Astrue is the current commission, overseeing a budget of over $657 billion.

The SSA is headquartered in Woodlawn, Maryland. The agency contains 10 regional offices, 8 processing centers, approximately 1300 field offices, and 37 Teleservice Centers.

When an identity theift steals credit card or debit card details using an otherwise legal transaction. Skimming is the identity theif's original credit card theft device. The inception of credit card theft was as simple as photocopying the victims credit card and re-using their number. However, as technology has advanced, so has the crime of skimming. There are now devices that read a victim's credit card details at the point of purchase, much of which is undetectable to the untrained eye, such as at a gas pump or other common third-party card readers. The identity theif attached a device to the the card reader, and steals credit card information with every swipe. The information can then be sent to a storage device and used to make purchases or replicate stolen credit cards.

Some Helpful Identity Theft Reviews

Credit Check Total Review
Debix Review
Freescore Review
ID Armor Review
ID Patrol Review
Identity Protection Direct Review
Identity Guard Review
Trilegiant Review
True Credit Review

about us | contact us | identity theft | home | review archive | glossary