Key Takeaways
1. Identity theft is a pervasive and rapidly growing crime
Every four seconds an identity is stolen.
Staggering statistics. Identity theft has become the fastest-growing criminal activity in the United States and globally. In 2004 alone, around 10 million consumers suffered from some variation of identity theft, with losses exceeding $54 billion. The crime's versatility and ease of execution make it appealing to criminals, as it can be committed remotely without physical confrontation.
Technological facilitation. The digital age has made identity theft easier than ever. Criminals can acquire personal information through various means, including:
- Phishing emails and fraudulent websites
- Data breaches of large companies
- Hacking personal computers and devices
- Stealing physical documents
Inadequate deterrents. Law enforcement often prioritizes other crimes, and punishments for identity theft are relatively lenient. The low risk and high reward make it an attractive option for criminals of all backgrounds.
2. Personal information is vulnerable in countless ways
Information about you is everywhere. I know it, and you ought to know it.
Digital footprint. In today's interconnected world, personal information is scattered across numerous platforms:
- Social media profiles
- Online shopping accounts
- Banking and financial institutions
- Government databases
- Employer records
Physical vulnerabilities. Offline, personal information can be compromised through:
- Stolen mail or discarded documents
- Lost or stolen wallets and purses
- Unsecured personal documents at home or work
- Overheard conversations in public spaces
Unsuspecting sources. Many people unknowingly provide personal information to potentially unsecure sources:
- Warranty cards and sweepstakes entries
- Public Wi-Fi networks
- Unsolicited phone calls or emails requesting information
- Sharing information on social media
3. Anyone can become an identity thief
More than any other crime, identity theft is an equal opportunity employer.
Diverse perpetrators. Identity thieves come from all walks of life:
- Professional criminals and organized crime rings
- Opportunistic individuals with financial troubles
- Disgruntled employees or ex-partners
- Tech-savvy teenagers
- Even family members or close acquaintances
Low barrier to entry. The tools and knowledge required for identity theft are readily available:
- Online tutorials and hacking forums
- Easily obtainable skimming devices
- Phishing kits and malware
- Dark web marketplaces for stolen information
Motivations vary. While financial gain is the primary motive, some perpetrators are driven by:
- Revenge or personal grudges
- Thrill-seeking or curiosity
- Desperation due to financial hardship
- Misguided attempts to help others (e.g., illegal immigrants)
4. Identity theft has far-reaching consequences
Identity theft is like a chronic disease. It often occurs in more than one episode, and it keeps on hurting.
Financial impact. Victims may face:
- Drained bank accounts and maxed-out credit cards
- Damaged credit scores affecting loan approvals and interest rates
- Difficulty obtaining employment or housing due to poor credit
- Legal fees and time off work to resolve issues
Emotional toll. The psychological effects can be severe and long-lasting:
- Feelings of violation and vulnerability
- Stress and anxiety about future security
- Damaged relationships due to misplaced suspicion
- Loss of trust in institutions and individuals
Long-term repercussions. The effects of identity theft can persist for years:
- Lingering inaccuracies on credit reports
- Recurring fraudulent accounts or charges
- False criminal records or warrants
- Ongoing fear of repeat victimization
5. Prevention is key: Safeguard your personal information
The less information you give out, the better.
Limit information sharing. Be cautious about providing personal details:
- Only give out your Social Security number when absolutely necessary
- Use alternative forms of identification when possible
- Be wary of unsolicited requests for information via phone, email, or in person
Secure physical documents. Protect tangible sources of personal information:
- Use a cross-cut shredder for sensitive documents
- Keep important papers in a locked safe or security deposit box
- Collect mail promptly and consider a locking mailbox
Digital security measures. Safeguard your online presence:
- Use strong, unique passwords for all accounts
- Enable two-factor authentication when available
- Keep software and antivirus programs up-to-date
- Be cautious when using public Wi-Fi networks
6. Monitor your credit reports regularly
Keeping abreast of your credit history is the consumer's best self-protecting technique by far.
Regular credit checks. Obtain and review your credit reports from all three major bureaus (Equifax, Experian, and TransUnion) at least annually. Look for:
- Unfamiliar accounts or inquiries
- Incorrect personal information
- Unexplained changes in credit scores
Credit monitoring services. Consider using a reputable credit monitoring service that provides:
- Real-time alerts for new accounts or inquiries
- Regular updates on credit score changes
- Assistance with fraud resolution
Proactive measures. Take additional steps to protect your credit:
- Place a security freeze on your credit reports to prevent new accounts from being opened
- Set up fraud alerts that require additional verification for new credit applications
- Opt out of pre-screened credit offers to reduce the risk of stolen mail
7. Take immediate action if you become a victim
Don't panic. It's important, though, to calm down and collect yourself, then follow an orderly protocol.
Immediate steps:
- Contact the fraud departments of all three credit bureaus
- Place a fraud alert on your credit reports
- Close all compromised accounts and open new ones with different numbers and passwords
- File a police report and obtain a copy for your records
- File a complaint with the Federal Trade Commission (FTC)
Document everything. Keep detailed records of:
- All communications with creditors, law enforcement, and credit bureaus
- Copies of fraudulent charges and accounts
- Time spent and expenses incurred in resolving the theft
Long-term vigilance. Continue to monitor your credit and financial accounts closely for several years after the initial incident. Be prepared to address recurring issues promptly.
8. Businesses and institutions must improve data protection
Every company in America, every government agency, every municipality, and every health care provider has to ask itself one simple question: What are we doing to protect the identity of our customers and our employees?
Data security measures. Organizations should implement:
- Encryption for sensitive data storage and transmission
- Strong access controls and authentication processes
- Regular security audits and vulnerability assessments
- Employee training on data protection and privacy policies
Incident response plans. Develop and regularly test protocols for:
- Detecting and containing data breaches
- Notifying affected individuals promptly
- Cooperating with law enforcement investigations
- Providing support and resources for victims
Ethical data practices. Adopt responsible data handling policies:
- Collect and retain only necessary personal information
- Provide clear privacy policies and opt-out options
- Properly dispose of outdated or unnecessary data
- Vet third-party vendors and partners for security compliance
9. Laws and regulations need to evolve to combat identity theft
Congress and state legislatures need to provide consumers with more protection.
Stronger penalties. Advocate for:
- Increased criminal penalties for identity theft and related crimes
- Enhanced enforcement resources for law enforcement agencies
- Improved cooperation between jurisdictions to prosecute cross-border cases
Consumer protections. Push for legislation that:
- Expands consumers' rights to access and control their personal data
- Mandates prompt notification of data breaches
- Provides easier paths for victims to clear fraudulent records
Corporate accountability. Support regulations that:
- Require businesses to implement specific data protection measures
- Impose significant fines for negligent handling of personal information
- Mandate regular audits and reporting on data security practices
Last updated:
Review Summary
Stealing Your Life received mixed reviews, with an average rating of 3.67 out of 5. Some readers found it informative and eye-opening, praising its insights on identity theft prevention. Others criticized it for being repetitive, dated, and overly focused on check fraud. The book's warnings about personal information vulnerability resonated with many, while some felt it was too paranoia-inducing. Critics noted the author's self-promotion and repetition of seminar content. Despite its flaws, many readers appreciated the practical advice and considered it an important resource for understanding identity theft risks.
Download PDF
Download EPUB
.epub
digital book format is ideal for reading ebooks on phones, tablets, and e-readers.