top of page
1st Reading - Identity Theft
00:00 / 00:00
2nd Reading - Identity Theft
00:00 / 00:00
3rd Reading - Identity Theft
00:00 / 00:00

Identity Theft—It Could Happen to You

Jill had heard about identity theft, but she never thought it could happen to her. She was wrong. During a normal workday in December, her wallet was stolen out of her purse. She had left her purse unattended for only a few minutes. That’s all the time it took for someone to steal Jill’s cash, credit cards, and other personal information; it was all in her wallet. 

What did Jill do? First, she got her “things in my purse and wallet” list from a home file. Not only did she have a listing of the contents of her wallet and purse, but she also had photocopies of the front and back of each card in her wallet: credit cards, insurance cards, driver’s license, etc. She knew exactly what had been stolen. 

Next, Jill called her credit card companies, reported that her credit cards had been stolen, and canceled every card. It was then that she found out that the thief had already been on a shopping spree at the local mall. The new “Jill” had charged over $1,000.00 worth of goods on the real Jill’s accounts! 

Fortunately, Jill was not liable for the purchases. Under U.S. law, if a thief uses your cards before you report them missing, the most you will owe for unauthorized charges is $50 per credit card. Many credit card issuers will waive that fee for good customers.

Jill was wise in calling the credit card companies as soon as she discovered that her wallet was missing. The quicker a loss or theft is reported, the better. After being contacted, a credit card company puts an immediate halt on the card so that transactions cannot be processed. 

Jill also contacted the three major credit bureaus: Experian, Equifax, and TransUnion. They put fraud alerts on all of Jill’s accounts. A fraud alert means creditors must contact you before opening new accounts in your name.

The fraud alerts worked very well. A week after her wallet was stolen; Jill received a call from a credit card company asking if she had recently applied for a new credit card. The real Jill had not, but the fake Jill, using all of Jill’s real identification, had! The new account was denied.

Two weeks after Jill’s wallet was stolen, Jill got a call from an internet provider. The phone representative said, “Hi. Is this Jill Smith?”  

Jill responded, “Yes.” 

The caller then said she had a woman on another line claiming to be Jill Smith and wanting internet service installed at a home 100 miles from where the real Jill Smith lived. The thief was again using Jill’s personal information and taking on Jill’s identity, this time for new internet service.

Based on the information the phone company employee received, she was able to determine the place from where the thief was calling. Police officers in the area quickly apprehended the thief. Officers found Jill’s wallet and its contents at the address where the new phone service was to be installed. They also found the merchandise that had been charged to Jill’s accounts.

0

11

21

32

43

56

67

80

94

105

117

126

131

141

152

165

176

186

196

208

219

230

232

244

255

266

277

281

290

301

310

317

329

341

353

365

371

384

394

395

 

398

410

421

433

443

450

458

469

478

487

498

508

512

bottom of page