In 2013, a man by the name of Sandy Bigalow Patterson
received a phone call about one of his credit cards. He was told that there was
a possibility that his identity had been stolen and if he provided them with
his personal information, the bank would provide him with a free credit security
service. Trusting the caller, Sandy proceeded to provide the caller with his
social security number, his full name, and his birthday. Thinking his average
life and family was safe another day, Sandy hung up with the kind lady from the
bank and got on with his work day. Little did Sandy know, he had just given all
of his important and personal information to an identity thief.
As the new Sandy Patterson (I am going to call her Sandy 2 even tough her name is really Dianna) ran up credit card debit and was living large, the real Sandy Patterson was being arrested and threatened by his boss because of the debt the thief had run up and the crimes she had committed. The fake Sandy Patterson in the movie Identity Thief (starring Melissa McCarthy and who doesn't love her) is a perfect example of the identity thieves that exist today.
There are many types of identity theft that these crooks partake in. The first is financial. This using another identity to obtain money, goods, and services. In the case of Sandy and Sandy 2, Sandy 2 ran up all of Sandy's credit cards on frivolous items like jet skis and used it for services like hair appointments. The second type of theft is criminal. This is when thieves pose as another when they are arrested or convicted. In the case of Sandy 2, she was arrested for drunk and disorderly and used her new identity as Sandy Bigalow Patterson when she went through processing. The third type is identity cloning. this means the crook is assuming the other persons identity in daily life. In the movie, Sandy 2 has a fake license made up for her stolen identity and lives her days as Sandy Bigalow Patterson.
The forth type of identity theft is synthetic. This means the numbers and birth dates stolen are real, but the social information surrounding the person are fabricated. Sandy 2 used the real Sandy Patterson's information, but turned him into a female and created an elaborate and fake background story. The fifth type of theft is medical. Sandy 2 does not portray this type, but it is the use of an identity to obtain medical care or drugs. The sixth and final type of identity theft is Ghosting. Sandy 2 does not commit this type of theft in the movie, but this is when a person steals the identity and/ or social role of a dead person.
In order to commit all of these forms of identity theft, the thieves have to obtain the information necessary. Ways that thieves get private information include finding papers containing the information in the trash, taking personal information off of people's computers, regular theft like robbery or burglary, getting people to provide the information, getting it off of the internet, and even Facebook. In the case of Sandy Bigalow Patterson, he received a call from Sandy 2 who was pretending to be an employee at his bank and he readily provided all of the information Sandy 2 needed to rob him blind.
Sandy 2 used something called phishing in order to get the original Sandy's information. Phishing is when someone sends you some sort of message to get your private information. Sandy 2 did not send a message exactly, but she personally called the original Sandy to get his personal information. A message sent out for the purpose of phishing will have particular characteristics. One is seemingly legitimate sources. They will contain names of banks and companies that have credible names. Another thing they could include are familiar URLs in links to external sites. For example, if the sender wanted the message to look like it came from google, the URL would contain a subtle difference like a period or number and the rest would be google' usual URL. The purpose of these messages is to get someone to provide private information, so a lot of times they will say that the company needs them the person to "verify" information so that a service can be provided to them. Something to look for in the messages is how professional the message is and if there are any obvious spelling mistakes. Those two characteristics can hint that the message's sender just wants to steal your information.
No one wants to have their identity stolen, but it does happen. If you are careful and protect your information, it will lessen your chances of ending up like Sandy Bigalow Patterson.