{"id":1143,"date":"2007-08-27T06:56:01","date_gmt":"2007-08-27T06:56:01","guid":{"rendered":"http:\/\/www.surfnetkids.com\/go\/safety\/2007\/08\/27\/what-you-need-to-know-about-identity-thieves\/"},"modified":"2007-08-27T06:56:01","modified_gmt":"2007-08-27T06:56:01","slug":"what-you-need-to-know-about-identity-thieves","status":"publish","type":"post","link":"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/","title":{"rendered":"What You Need To Know About Identity Thieves"},"content":{"rendered":"<p>Identity theft is a stranger to no one.  When a thief is given the opportunity to take advantage of you, it is very difficult to catch the thief in the act, and therefore these individuals grow in numbers and are continually developing new tricks.  As online identity theft is a relatively new type of crime, you need to make sure that you educate and arm yourself with the latest and best ways that you can protect yourself.  <\/p>\n<p>Below you will find just a few things that you need to know about online identity thieves.  Knowing the tricks that thieves use and the weaknesses of ordinary people like you and I that thieves take advantage of, better prepares us to take action to protect ourselves.  <\/p>\n<p><strong>Identity thieves are patient<\/strong><\/p>\n<p>Identity theft has many different faces.  The easiest way for an identity thief to get a hold of your private information is through the Internet.  Identity thieves frequent chat room conversations looking for someone who is reckless with the distribution of personal information that can be used to obtain more of their valuable information.  For example, identity thieves will chat or instant message with their victims for months in order to gain their trust before asking for the information that they need to take advantage of you.  Remember that you have no way of knowing the intentions of someone that you only know through online correspondence.  Use extreme caution with the kind of information that you are willing to distribute and understand the increase in vulnerability that will result from such distribution.<\/p>\n<p><strong>Identity thieves have many tricks to manipulate<\/strong><\/p>\n<p>Identity thieves can pretend to be anyone.  Identity thieves are cunning and will lie to manipulate you.  Many times an identity thief will express interest in the same hobbies that you have and will use any other trick that they can to get close to you.  As soon as you let your guard down they are ready to pounce on you for your information.<\/p>\n<p><strong>Identity thieves can hack into your computer <\/strong><\/p>\n<p>Identity thieves can hack into your computer through viruses hidden in e-mails or downloads.  Danger from such viruses can easily be avoided.  If you ever receive an e-mail from someone that you do not know, delete it without opening it.  Sometimes identity thieves are able to mimic the addresses of contacts in your e-mail list so even familiar e-mails with attachments that you were not expecting can be dangerous.  If you are not expecting a download from someone that you know or if you notice that something is out of the ordinary with your inbox, it is always better to err on the side of caution and delete or call your sender to confirm that the e-mail that they have sent is in fact safe to open.  <\/p>\n<p><strong>It only takes a little information for a thief to do damage<\/strong><\/p>\n<p>Many victims of identity theft are surprised at how little information was needed by a thief in order to do so much damage.  Online safety is particularly an issue as it is very difficult to have online conversations that are guaranteed to be private.  Information such as your full name, birthday or city of residence can be plugged into different searches to find out even more information about you.  Identity thieves are excellent investigators.<\/p>\n<p><strong>An identity thief could be anywhere<\/strong><\/p>\n<p>When you do not ensure that your computer is free of viruses and that you have working firewalls in place, an identity thief has the opportunity to be a sort of fly on the wall of your online and even offline activities.  Make sure that your computer&#8217;s security features are in working order at all times.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Identity theft is a stranger to no one. When a thief is given the opportunity to take advantage of you, it is very difficult to catch the thief in the act, and therefore these individuals grow in numbers and are &#8230;<a href=\"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/\">[Continue]<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[45],"tags":[636,867,717,568,597,563,598,698,868,869],"class_list":{"0":"post-1143","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-security","7":"tag-computer","8":"tag-e-mail","9":"tag-firewall","10":"tag-identity","11":"tag-information","12":"tag-online","13":"tag-personal","14":"tag-thieves","15":"tag-tricks","16":"tag-victims","17":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What You Need To Know About Identity Thieves &#187; Tech Tips \u00bb Surfnetkids<\/title>\n<meta name=\"description\" content=\"Identity theft is a stranger to no one. When a thief is given the opportunity to take advantage of you, it is very difficult to catch the thief in the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What You Need To Know About Identity Thieves &#187; Tech Tips \u00bb Surfnetkids\" \/>\n<meta property=\"og:description\" content=\"Identity theft is a stranger to no one. When a thief is given the opportunity to take advantage of you, it is very difficult to catch the thief in the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/\" \/>\n<meta property=\"og:site_name\" content=\"Tech Tips \u00bb Surfnetkids\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/surfnetkids\/\" \/>\n<meta property=\"article:published_time\" content=\"2007-08-27T06:56:01+00:00\" \/>\n<meta name=\"author\" content=\"Barbara J. Feldman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@barbarafeldman\" \/>\n<meta name=\"twitter:site\" content=\"@barbarafeldman\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Barbara J. Feldman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1143\\\/what-you-need-to-know-about-identity-thieves\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1143\\\/what-you-need-to-know-about-identity-thieves\\\/\"},\"author\":{\"name\":\"Barbara J. Feldman\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/#\\\/schema\\\/person\\\/cdb196c6a51c0f75efece9d1acfc200a\"},\"headline\":\"What You Need To Know About Identity Thieves\",\"datePublished\":\"2007-08-27T06:56:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1143\\\/what-you-need-to-know-about-identity-thieves\\\/\"},\"wordCount\":621,\"commentCount\":0,\"keywords\":[\"computer\",\"e-mail\",\"firewall\",\"identity\",\"information\",\"online\",\"personal\",\"thieves\",\"tricks\",\"victims\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1143\\\/what-you-need-to-know-about-identity-thieves\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1143\\\/what-you-need-to-know-about-identity-thieves\\\/\",\"url\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1143\\\/what-you-need-to-know-about-identity-thieves\\\/\",\"name\":\"What You Need To Know About Identity Thieves &#187; Tech Tips \u00bb Surfnetkids\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/#website\"},\"datePublished\":\"2007-08-27T06:56:01+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/#\\\/schema\\\/person\\\/cdb196c6a51c0f75efece9d1acfc200a\"},\"description\":\"Identity theft is a stranger to no one. When a thief is given the opportunity to take advantage of you, it is very difficult to catch the thief in the\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1143\\\/what-you-need-to-know-about-identity-thieves\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1143\\\/what-you-need-to-know-about-identity-thieves\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/1143\\\/what-you-need-to-know-about-identity-thieves\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Tech Tips\",\"item\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What You Need To Know About Identity Thieves\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/#website\",\"url\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/\",\"name\":\"Tech Tips \u00bb Surfnetkids\",\"description\":\"for families and classrooms from Surfnetkids.com\",\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.surfnetkids.com\\\/tech\\\/#\\\/schema\\\/person\\\/cdb196c6a51c0f75efece9d1acfc200a\",\"name\":\"Barbara J. Feldman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g\",\"caption\":\"Barbara J. Feldman\"},\"description\":\"Barbara J. Feldman is a syndicated columnist and online publisher at Feldman Publishing. She has a computer science degree from University of California, Irvine, and has been a nerd for more than forty years. Follow Barbara Feldman\",\"sameAs\":[\"http:\\\/\\\/www.barbarafeldman.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What You Need To Know About Identity Thieves &#187; Tech Tips \u00bb Surfnetkids","description":"Identity theft is a stranger to no one. When a thief is given the opportunity to take advantage of you, it is very difficult to catch the thief in the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/","og_locale":"en_US","og_type":"article","og_title":"What You Need To Know About Identity Thieves &#187; Tech Tips \u00bb Surfnetkids","og_description":"Identity theft is a stranger to no one. When a thief is given the opportunity to take advantage of you, it is very difficult to catch the thief in the","og_url":"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/","og_site_name":"Tech Tips \u00bb Surfnetkids","article_publisher":"https:\/\/www.facebook.com\/surfnetkids\/","article_published_time":"2007-08-27T06:56:01+00:00","author":"Barbara J. Feldman","twitter_card":"summary_large_image","twitter_creator":"@barbarafeldman","twitter_site":"@barbarafeldman","twitter_misc":{"Written by":"Barbara J. Feldman","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/#article","isPartOf":{"@id":"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/"},"author":{"name":"Barbara J. Feldman","@id":"https:\/\/www.surfnetkids.com\/tech\/#\/schema\/person\/cdb196c6a51c0f75efece9d1acfc200a"},"headline":"What You Need To Know About Identity Thieves","datePublished":"2007-08-27T06:56:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/"},"wordCount":621,"commentCount":0,"keywords":["computer","e-mail","firewall","identity","information","online","personal","thieves","tricks","victims"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/","url":"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/","name":"What You Need To Know About Identity Thieves &#187; Tech Tips \u00bb Surfnetkids","isPartOf":{"@id":"https:\/\/www.surfnetkids.com\/tech\/#website"},"datePublished":"2007-08-27T06:56:01+00:00","author":{"@id":"https:\/\/www.surfnetkids.com\/tech\/#\/schema\/person\/cdb196c6a51c0f75efece9d1acfc200a"},"description":"Identity theft is a stranger to no one. When a thief is given the opportunity to take advantage of you, it is very difficult to catch the thief in the","breadcrumb":{"@id":"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.surfnetkids.com\/tech\/1143\/what-you-need-to-know-about-identity-thieves\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Tech Tips","item":"https:\/\/www.surfnetkids.com\/tech\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.surfnetkids.com\/tech\/category\/security\/"},{"@type":"ListItem","position":3,"name":"What You Need To Know About Identity Thieves"}]},{"@type":"WebSite","@id":"https:\/\/www.surfnetkids.com\/tech\/#website","url":"https:\/\/www.surfnetkids.com\/tech\/","name":"Tech Tips \u00bb Surfnetkids","description":"for families and classrooms from Surfnetkids.com","inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.surfnetkids.com\/tech\/#\/schema\/person\/cdb196c6a51c0f75efece9d1acfc200a","name":"Barbara J. Feldman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f6e46f3b8086ff1944261ad7589f4953e61a09467d9352840df2b96d32ad45bb?s=96&d=wavatar&r=g","caption":"Barbara J. Feldman"},"description":"Barbara J. Feldman is a syndicated columnist and online publisher at Feldman Publishing. She has a computer science degree from University of California, Irvine, and has been a nerd for more than forty years. Follow Barbara Feldman","sameAs":["http:\/\/www.barbarafeldman.com"]}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/posts\/1143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/comments?post=1143"}],"version-history":[{"count":0,"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/posts\/1143\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/media?parent=1143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/categories?post=1143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.surfnetkids.com\/tech\/wp-json\/wp\/v2\/tags?post=1143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}