What is Identity Theft?

Identity theft: Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else. The information can be used to obtain credit, merchandise, and services in the name of the victim, or to provide the thief with false credentials. In addition to running up debt, an imposter might provide false identification to police, creating a criminal record or leaving outstanding arrest warrants for the person whose identity has been stolen.

The State of Louisiana takes the security of its citizens' data very seriously.  Therefore, all citizens are strongly encouraged to review the list of FREE steps that can be taken to mitigate the risk of identity theft.  Please carefully read the steps here:

NextSteps (la.gov)

Common Types of Computer Identity Theft Schemes

Phishing: When internet fraudsters impersonate a business to trick you into giving out your personal information, it is called phishing. Don't reply to email, text, or pop-up messages that ask for your personal or financial information. Don't click on links within them either – even if the message seems to be from an organization you trust. It isn't. Legitimate businesses don't ask you to send sensitive information through unsecure channels.
Pharming: This can happen when a hacker tampers with a website host file or domain name system so that URL address requests are rerouted to a fake or spoofed website created by the hacker to capture personal identifying information from victims. The victim then thinks that they are on a trusted website, and are more willing to enter their personal information, such as credit card numbers, social security numbers, and addresses. The hacker then uses that information to commit identity theft.
Vishing: A technique, much like phishing, that allows criminals to maliciously gain access to your personal information for the purposes of identity theft. Vishing scams use a combination social engineering and phishing to find victims that can be tricked into providing credit card or personally identifying information. Typically, the criminal sends the victim some kind of notice or leaves a message, requesting that the victim returns a call to verify an account or some similar ploy. When the victim returns the call, they are asked to provide account and identifying information under the guises of "updating" the account.
Once the criminal has access to that information, it is used for credit card or banking fraud, or as the first step in a stolen identity. Vishing also allows criminals to spoof caller-id, making a vishing scam hard to detect because everything appears to be legitimate.
ATM Tampering: Thieves steal credit/debit card numbers by using a special storage device attached to ATM machines. The device reads the magnetic strip on your card which thieves use to commit fraud.

Other Common Ways Thieves Steal Your Information

Dumpster Diving: Thieves will go through your trash looking for bills, credit cards and other information.
Information retrieval: Thieves desire your hard drive with personal information on it. Have your hard drive professionally erased before disposing of it.
Victim research: Thieves access government registers, internet search engines, and public records to gain pieces of your personal information.
Shoulder surfing: The thief simply eavesdrops on transactions you make in public and pick up whatever useful information you disclose.
Employment scams: These scams advertise a bogus job and request personal information. Never give out personal identification information without knowing whom you are dealing with.
Social networking: Thieves regularly troll social networking sites to steal personal information so they can use to commit fraud.
Changing Your Address: Thieves divert your billing statements to another location by completing a change of address form.

Are you a victim?