Social Engineering – How to Steal an Identity

Identity theft occurs when someone steals your personally identifiable information for fraudulent purposes. It is a crime in which an imposter obtains personal identifying information such as namecredit card numbersocial security or driver license numbers, etc. to commit fraud or other crimes. Attackers can use identity theft to impersonate employees of a target organization and physically access the facility.

How to Steal an Identity

  • Step 1:
    • Search for Steven’s address on social networking sites (Facebook, Twitter, etc.) or on people search sites.
    • Get hold of Steven’s telephone bill, water bill, or electricity bill using dumpster divingstolen email, or onsite stealing.
  • Step 2:
    • Go to the Department of Motor Vehicles and tell them you lost your driver license.
    • They will ask you for proof of identity such as a water bill and electricity bill.
    • Show them the stolen bills.
    • Tell them you have moved from the original address.
    • The department employee will ask to complete replacement of the driver license form and change in address form.
    • You will need a photo for the driver license.
    • Your replacement driver license will be issued to your new home address.
    • Now you are ready to have some serious fun.
  • Step 3:
    • Go to a bank in which the original Steven Charles has an account and tell them you would like to apply for a new credit card.
    • Tell them you do not remember the account number and ask them to look it up using Steven’s name and address.
    • The bank will ask for your ID: Show them your driver license as ID, and if the ID is accepted, your credit card will be issued and ready for.
    • Now you are ready for shopping.  

Identity Theft – Serious Problem

  • Identity theft is a serious problem and number of violations are increasing rapidly.
  • Some of the ways to minimize the risk of identity theft include checking the credit card reports periodically, safeguarding personal information at home and in the workplace, verifying the legality of sources, etc.

Similar Posts

Leave a Reply

Your email address will not be published. Required fields are marked *