Error opening template: advertisement/zones/468x60_generic.tplError opening template: advertisement/zones/728x90_leaderboard.tplError opening template: advertisement/zones/728x90_bottom_ad.tplError opening template: advertisement/zones/300x250_right_ros_up.tplError opening template: advertisement/zones/300x250_right_ros_down.tplError opening template: advertisement/zones/160x600_left_nav.tplError opening template: advertisement/zones/160x600_right_nav.tpl Cloning in Identity Theft

What is Identity Cloning?

Identity cloning just may be the scariest variation of all identity theft.  Instead of stealing your personal information for financial gain or committing crimes in your name, identity clones comprise your life by actually living and working as you.  They may even pay bills as you - get engaged and married as you - start a family as you.  To sum things up, identity cloning is the act of an imposter literally assuming your life in a different location. 

The Information an Identity Clone Seeks

An identity clone will go after as much information about you as possible.  They will look to find out what city and state you were born in and what street your grew up on.  They will want to know where you attended school and what relationships you may have been involved in.  They will want to know information concerning your parents and other family members.  Of course, they would like to have your name address and Social Security number as well.  In a nutshell, identity clones want as much personal information about you as they can attain.  This enables them to answer questions in an informative manner when they are on the move or asked about your life. 

What Motivates Identity Cloning                           

Identity clones consist of individuals hiding under the radar.  Many of them are convicted criminals, those running from the law, or people who suffer from psychological problems.  Identity clones often seek out names of the deceased or young people.  Sometimes, getting a hold of a Social Security number is all it takes to completely assume the life of that person.  They also look for individuals who work in the areas of law enforcement or the fire department.  These fields require their employees to become licensed, allowing an imposter to get a foot in the door and clone more identities.  

Signs of Identity Cloning

Victims of identity cloning typically learn of the crime after reviewing a recent credit report.  The report may list more than one address or mysterious charges under their name.  They may also become aware of the crime when noticing dual addresses on the statements of their Social Security benefits.   

The Consequences of Identity Cloning

Unfortunately, victims of identity cloning have a very difficult time resuming a normal life.  They are often subject to paying for attorneys and private investigators to prove their case.  Identity cloning causes a much greater loss opposed to most types of identity theft when considering the time and financial expenses required to get things back in order.

Action should be taken immediately if there is ven a remote possibility of someone using your life for identity cloning.  Of course, making a report to your local police department is a wise move, though attorneys and private investigators have more of the ammunition it takes to restore your compromised identity.  To completely avoid the malicious crime of identity cloning, you should remain cautious when on the web, remain aware of your transactions and activities, and always protect your personal information.     

(0 Comments)
Log in or sign up to comment.

Post a comment

Log in or sign up to comment.

With the advent of wireless Internet, more and more computer users are entering the world of cyber space.

Yet, while these users are well aware of the importance of the protection of their computer when hooked up to regular internet providers, they are often oblivious to the fact that the same cyber dangers, and in fact even more, exist in the world of WiFi.

What you may not know is that same Internet connection that makes it possible to check your email from the comfort of your bed also makes it easier for hackers to access your personal information.

It is for this reason, the sharing of the wireless Internet connection, that protecting your computer when wireless is even more important than ever before.