Fraud by ‘phishing,’ ‘vishing’ and theft


Monday, November 29th, 1999

Pre-approved credit applications popular targets for criminals

Sun

Crooks will ‘shoulder surf’ customers using automatic bank machines that have been tampered with to record the information, thereby gaining access to personal identification numbers. Photograph by : Andrew Wallace, Reuters files

Several types of identity-theft schemes can leave unsuspecting Canadians with large bank loans in their names, empty bank accounts, and massive credit card charges. Some of the biggest scams operating in Canada include:

– Phishing: Fraud artists experienced with computers create a fraudulent website that’s nearly indistinguishable from that of a legitimate bank’s and then e-mail thousands of Canadians, directing them to enter their personal information on the seemingly legitimate site. The technique continues to evolve as Canadians catch on to the scam.

– Vishing: Instead of being directed by e-mails to a phoney website, victims of “vishing” are told to call a phone number, where they are prompted to supply personal information. Individuals may also be called at home by a person claiming to be from their bank. Some criminals even manipulate the caller identification function to make it seem as though they’re calling from a legitimate enterprise. Vishing scams change quickly, making it hard for police to catch up.

– Theft of documents: Canadians who discard documents containing personal information, such as pre-approved credit card applications or bank statements, are easy prey for identity thieves who use the material to access a person’s bank account, apply for loans and create a new identity.

– Mortgage fraud: A criminal fraudulently assumes the identity of a legitimate homeowner and the title on the home, puts it up for sale and pockets the profit without the victim’s knowledge.

– Skimming: Employees at establishments such as gas stations, restaurants and convenience stores swipe a customer’s payment card through a reader that records the banking information and allows a criminal to create a cloned card.

– Shoulder surfing: Crooks look over people’s shoulders as they enter their personal identification number at a bank machine that’s been tampered with to record the information.

© The Vancouver Sun 2007


Comments are closed.