Last Updated on by SCARS Editorial Team
RSN™ Special Report: Cybercriminals Targeting Your Children’s Identities
Your Child’s Identity Is Valuable To Cybercriminals
There are a lot of reasons why a child’s identity and ID information is target #1 for some cybercriminals
Unfortunately, a child’s personal information is particularly susceptible to criminals looking to steal an identity.
Most often, child identity theftIdentity Theft Identity theft is when someone uses another person's personal identifying information, without their permission, to commit fraud or other crimes. In both the U.K. and the United States it is the theft of personally identifiable information. Identity theft deliberately uses someone else's identity as a method to gain financial advantages or obtain credit and other benefits, and perhaps to cause other person's loss. The person whose identity has been stolen may suffer adverse consequences, especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, PINs, electronic signatures, fingerprints, passwords, or any other information that can be used to access a person's financial resources. starts with a stolen Social Security number, however, it can also start with their parent being romance scammed.
This highly-valuable piece of information can then be used or sold on the black market. It’s particularly attractive because a child’s SSN has little to no history, allowing an identity thief to exploit the information, often going unnoticed for many years.
As reported in a study by Carnegie Mellon University, children were 51 times more likely than adults to be victims of identity theft and, most often, the culprit is someone close to the child, such as a parent, guardian, or other relatives who would have access to sensitive information. Additionally, a child’s Social Security number can also be compromised when it’s shared with third parties, such as schools or medical facilities, where copies of sensitive information could be lost, stolen, or hacked.
When used correctly, the technology we rely on does a great job keeping our private data and information protected. Although nothing can entirely prevent identity theft, a secure device and a little awareness can go a long way.
What Makes Your Child’S Digital Identity Vulnerable?
Outdated security software and device operating systems: Although updates can be annoying, they are essential to ensure your device is functioning correctly. They keep your information and device defended against the newest forms of cyber-attacks, and patchPatch A software program update that corrects known bugs or problems, or adds new features to a software program already installed on your computer. critical vulnerabilities in a device’s operating system or software.
- Unsecured Wi-Fi networks and website scamsScams A Scam is a confidence trick - a crime - is an attempt to defraud a person or group after first gaining their trust through deception. Scams or confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, or greed and exploiting that. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men' - criminals) at the expense of their victims (the 'marks')". A scam is a crime even if no money was lost.: Free public Wi-Fi networks may be monitored by cybercriminals while you’re using them. Another common strategy for individuals looking to steal your information is launching fake websites or breaching secure websites to access passwords. Using network and device vulnerabilities such as those previously mentioned, cybercriminals target user information in order to steal highly-sensitive personal data, some of which include device passwords, online accounts, financial information, saved documents, and personal records.
- Poor password security: We rely on our passwords often and, therefore, tend to make them easy to remember. However, as mentioned above, it’s possible to have your passwords breached, stolen, or compromised at any moment. Remember, if a password has been breached, it’s accessible on the dark webDark Web This is a sub-level of the internet that normal search engines and everyday browsers cannot access. It’s an encrypted network that contains websites – both legal and illegal – that remain hidden from plain sight..
- Viruses, malwareMalware Short for "malicious software," this term means computer viruses and other types of programs that cybercriminals use to disrupt or access your computer, typically with the aim of gathering sensitive files and accounts., and tracking software: Although these are most often introduced after accidentally downloading unknown file or attachment, malicious software can be physically installed directly onto an unattended device. In many cases, this tactic is used to lock users out of their device until they purchase their “recommended” anti-virusVirus A computer program that can replicate itself and spread from computer to computer or file to file. It comes to life only when you take a specific action, such as running a particular program. software. Tracking software often goes undetected, allowing criminals to monitor your Internet connection and view your search history.
- Educational data breachData Breach Whenever private information is seen by someone who should not have access, this is known as data exposure. It may also sometimes be referred to as a data leak or data breach. It might happen by accident or be caused by hackers who do it to cause harm to the individual or organization involved. It can be especially damaging to companies that store the credit card details and personal information of their customers.: In recent years, digital classrooms have introduced a new problem: student data breaches. An increasing concern over the security and privacy of student data requires a policy that protects children from both marketers and criminals. Therefore, educational institutions have the responsibility to ensure that data privacy device security a priority.
- Online social media, chat, and gaming: Keeping us more connected than ever before, the Internet makes staying in touch, speaking to, and playing games with individuals across the world nearly instant. However, social media, texting, and other online platforms and applicationsApplications Applications or Apps An application (software), commonly referred to as an ‘app’ is a program on a computer, tablet, mobile phone or device. Apps are designed for specific tasks, including checking the weather, accessing the internet, looking at photos, playing media, mobile banking, etc. Many apps can access the internet if needed and can be downloaded (used) either for a price or for free. Apps are a major point of vulnerability on all devices. Some are designed to be malicious, such as logging keystrokes or activity, and others can even transport malware. Always be careful about any app you are thinking about installing. make it easy for bullies and criminals to successfully hide behind an online presence.
More information click here: https://www.consumer.ftc.gov/articles/0040-child-identity-theft »
What Is A Digital Identity?
Your digital identity is nearly everything you own, share, and do on the Internet, and is recorded as data and activity. This means the information you share online, and the way in which you do it, can be analyzed and potentially exploited by an individual who intends to destroy your reputation or even steal your identity. The following types of information are attributed to your digital identity
- Personal Data: Login credentials, search activity, date of birth, Social Security number, medical history, financial records, and cloud data
- Online Activity: Online accounts, comments including personal information, photos, Tweets, and online banking activity
To reduce the risk of having identity-related information stolen, young children and teens should avoid sharing personal information online, using social media, and posting videos and photos that can make them especially vulnerable to a cyber-attack.
Defend Your Child’S Identifiable Information:
- Make sure that all networks and connected devices are secured and up-to-date. Specifically, this means creating unique passwords, adding parental controls, adjusting content settings, backing up saved data, and enabling automatic security updates.
- When it comes to external organizations like schools and medical facilities, inquire about their policies and history regarding data security protocol. You could also ask for information on their emergency response plan.
- Limit the time children spend online to decrease the chances of them accidentally exposing their own personal data. Make sure to communicate with kids about how to stay safe online.
- Since identifiable information and personal data are so vulnerable, adults need to take the necessary precautions to protect the personal information and Social Security numbers of their families.
This piece was written by our partners at the U.S. Department of Homeland SecurityDepartment of Homeland Security The United States Department of Homeland Security (DHS) is the U.S. federal executive department (under the President) responsible for public security, roughly comparable to the interior or home ministries of other countries. Its stated missions involve anti-terrorism, border security, immigration and customs, cybersecurity, and disaster prevention and management.’s STOP. THINK. CONNECT.™ program, their team of advocacy leaders in the cybersecurity industry specializes in identity theft awareness for all age groups. SCARSSCARS SCARS - Society of Citizens Against Relationship Scams Inc. A government registered crime victims' assistance & crime prevention nonprofit organization based in Miami, Florida, U.S.A. SCARS supports the victims of scams worldwide and through its partners in more than 60 countries around the world. Incorporated in 2015, its team has 30 years of continuous experience educating and supporting scam victims. Visit www.AgainstScams.org to learn more about SCARS. is proud to be a partner of their program.
a division of SCARS™
Miami Florida U.S.A.
WESTERN UNION REPAYMENT PROGRAM NEWS
FOR THE LATEST INFORMATION ABOUT THE WESTERN UNION REPAYMENT / REMISSION PROGRAM CLICK HERE – IT IS STILL OPEN FOR A PETITIONS FOR REPAYMENT
– – –
Tell us about your experiences with Romance Scammers in our Scams Discussion Forum on Facebook »
FAQ: How Do You Properly Report Scammers?
It is essential that law enforcement knows about scams & scammers, even though there is nothing (in most cases) that they can do.
Always report scams involving money lost or where you received money to:
- Local Police – ask them to take an “informational” police report – say you need it for your insurance
- Your National Police or FBIFBI FBI - Federal Bureau of Investigation The Federal Bureau of Investigation (FBI) is the domestic intelligence and security service of the United States and its principal federal law enforcement agency. Operating under the jurisdiction of the United States Department of Justice, the FBI is also a member of the U.S. Intelligence Community and reports to both the Attorney General and the Director of National Intelligence. A leading U.S. counter-terrorism, counterintelligence, and criminal investigative organization, the FBI has jurisdiction over violations of more than 200 categories of federal crimes, including financial fraud. (www.IC3.gov)
- The Scars Worldwide Reporting Network HERE or on www.Anyscam.com
This helps your government understand the problem, and allows law enforcement to add scammers on watch lists worldwide.
Visit our NEW Main SCARS™ News & Information Facebook page for much more information about scams and online crime: www.facebook.com/SCARS.News.And.Information
To learn more about SCARS visit www.AgainstScams.org
Please be sure to report all scammers HERE or on www.Anyscam.com
All original content is Copyright © 1991 – 2018 SCARS All Rights Reserved Worldwide & Webwide – RSN/Romance Scams Now & SCARS/Society of Citizens Against Romance Scams are all trademarks of Society of Citizens Against Romance Scams Inc.