Identity Theft Fraud Some Common Methods Used

Identity theft fraud is very common nowadays. Once, when I was bank manager armed robberies of banks were fairly common, but today’s identity theft fraud has presented the unscrupulous with other ways to rob the banks of your money.

One easy way for a thief to get a hold of your information is by going through the trash that you put out for collection.

This method is often called dumpster diving.

This is why many people shred all of their important documents and anything with their private information on it.

When dumpster diving, thieves typically look for financial statements, receipts, or credit card bills. Thieves often try to steal pre-approved credit cards, either from your trash can or your mailbox.

identity theft terminology

Cyber Identity Theft

  • Phishing emails are probably the most common way that identity theft occurs online. Emails that appear to be from your bank, your credit card company, or online retailers like eBay and Amazon.com ask for you to click a link and enter your information for a purpose that they have made up. Usually they claim that your account has been accessed and fraud is expected.

Often, thieves only need one or two pieces of information that will lead them to the rest of your private information and allow them to steal your identity.

  • Other cybercrimes often occur through keystroke logging, spyware and computer hacking.
  • Skimming is another form of identity theft fraud that can be done by restaurant servers and other business individuals that have to ask for your card for payments. Servers take your card to pay for your meal, but they also scan your card with a device that allows them to copy the magnetic scanning strip on the credit card and make a duplicate of your credit card which they can then use.
  • A method called shoulder surfing is also a very common way to steal a person’s private information. Thieves try to take a video of you punching your information in at a cash register or ATM. The most common way to do this is by using a cell phone, because a thief can pretend to be texting or checking email online while they point the video camera eye at you as you type in your information.

These are just a few of the methods can be used to gather personal information which can then be used for other types of identity theft fraud.



Other Types

  • Credit card theft is certainly the most common. Somehow a thief gets either your physical credit card or your credit card information and then purchases as much as they can on your account. Usually thieves purchase expensive electronic equipment, which can easily be resold at a discount.
  • Social Security Number theft is when a thief files for their taxes under your name, so he or she does not have to pay.
  • A thief could also use your name when employed, so the employer would then file the thief’s taxes under your name.
  • Character theft is slightly broader than credit card theft and includes a number of things from committing crimes to taking out loans in your name.

Personal Experience from a Banking Perspective

The last position I held in the banking industry was a compliance/audit role which was responsible for coming up with action plans to address issues where a risk management process needed improving.

Today, banks are even more vigilant by constantly proactively trying to anticipate what the unscrupulous might do.

However, it is important that you take preventative steps to protect your identity and your assets.

Related Articles

Have A Great Story or Advice About Identity Theft Fraud?

Do you have a great story about this? Share it!

What Other Visitors Have Said

Click below to see contributions from other visitors to this page...

Senior citizen Not rated yet
On or about Sep 24, 2012, I received a letter in the mail from Brooklyn, NY. The New York City police department was seeking payment on a parking ticket …

Click here to write your own.


Go to Top of Identity Theft Fraud page

Go to Identity Theft Protection home


IT Governance Limited Disclosure: Identity-Theft-Scout.com is participating in the IT Governance Limited Affiliate  Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to their affiliate platform.

What Can You Write About?

We are looking for content related to cybercrimes and identity theft. There are tens of possible topics you can pick on these subjects. Moreover, we appreciate innovative issues, critical opinions, and solution-based articles on an area related to our main topics.

In addition to the topics below, if you have anything else related to our line of interest, please let us know, and we will be glad to share with our readers.


Possible Broad Areas

  • Malware
  • Laptop hacking
  • Cyberbullying
  • Internet security
  • Identity
  • Phishing
  • Data security
  • Bring Your Own Device
  • Data protection regulations
  • Data recovery
  • Data loss or DDOS mitigation
  • Identity theft recovery … and many more.


Guidelines for Content Contribution

Feel free to send us your submissions or topic ideas through our email address. We strive to respond to every request as fast as we can.

Before working on a topic, please take a look at our guidelines we would like all writers to follow. Please feel free to drop us a line if you do not understand any of the guidelines below or have a suggestion.

  • All articles should be at least a 1000 words long. We believe that long articles expound on the topics at hand better than short ones
  • Articles should be written in English. And must be written following the steps mentioned here.
  • All articles should be original and not copied from the internet even if it is your website. They must pass the Copyscape check before we can publish them.
  • The Articles should have useful and quality content, well written and easy to understand
  • Headlines written following the guidelines mentioned here.
  • The articles should be in an editable format such as .odt, docx or .txt format. Please double space your lines for the ease of reading through
  • No offensive or adult language should be employed
  • Please, check the article using a spell checker tool (like as Grammarly) before sending the copy to us.
  • Please provide a high resolution image for each 250 words (Though, we reserve the right of using the images provided by you). At least 3 images is required for a 1000 words article. The images must be from the free sources (like as Pixabay, Unsplash.com, or Pexels.com). The exact image source link must be provided under each images. 



What Will You Get In Return?

  • We give full credits for your published work
  • If we publish your article, we will give credits to you. Besides, we will write a short bio of you below the article and link to your blog social media pages or website.

We Pay Writers For Exceptional Contributions!

Where a contribution meets our guidelines and is an exceptional idea to help our readers and community we will pay up to AUD50 for the contribution.

Our editorial committee will be the sole judge of what is an exceptional idea. If you have an idea that you wish to pitch to us please use the contact email mentioned in this article. 

For the new freelance writers, it is a great chance to earn money online by writing for our website.

This is to encourage you in freelance writing, blogging, and making money online.


How Do You Submit Your Articles?

Take a look at our published work to help generate unique ideas.

Please check and double check that you’ve fulfilled all the criteria.

Then, send the article to us at john[at]identity-theft-scout.com 

We get several submissions every day. Therefore it may take time for us to go through each submission. Please bear with us. We promise to respond to each request within a few days

We look forward to publishing your next article.


Happy writing!!


Amazon Disclosure: We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites. 


New! Comments

Have your say about what you just read! Leave me a comment in the box below.