Stealing Your Life Summary

Stealing Your Life

The Ultimate Identity Theft Prevention Plan
by Frank W. Abagnale 2007 256 pages
3.69
289 ratings

Key Takeaways

1. Identity theft is a pervasive and rapidly growing crime

Every four seconds an identity is stolen.

Staggering statistics. Identity theft has become the fastest-growing criminal activity in the United States and globally. In 2004 alone, around 10 million consumers suffered from some variation of identity theft, with losses exceeding $54 billion. The crime's versatility and ease of execution make it appealing to criminals, as it can be committed remotely without physical confrontation.

Technological facilitation. The digital age has made identity theft easier than ever. Criminals can acquire personal information through various means, including:

  • Phishing emails and fraudulent websites
  • Data breaches of large companies
  • Hacking personal computers and devices
  • Stealing physical documents

Inadequate deterrents. Law enforcement often prioritizes other crimes, and punishments for identity theft are relatively lenient. The low risk and high reward make it an attractive option for criminals of all backgrounds.

2. Personal information is vulnerable in countless ways

Information about you is everywhere. I know it, and you ought to know it.

Digital footprint. In today's interconnected world, personal information is scattered across numerous platforms:

  • Social media profiles
  • Online shopping accounts
  • Banking and financial institutions
  • Government databases
  • Employer records

Physical vulnerabilities. Offline, personal information can be compromised through:

  • Stolen mail or discarded documents
  • Lost or stolen wallets and purses
  • Unsecured personal documents at home or work
  • Overheard conversations in public spaces

Unsuspecting sources. Many people unknowingly provide personal information to potentially unsecure sources:

  • Warranty cards and sweepstakes entries
  • Public Wi-Fi networks
  • Unsolicited phone calls or emails requesting information
  • Sharing information on social media

3. Anyone can become an identity thief

More than any other crime, identity theft is an equal opportunity employer.

Diverse perpetrators. Identity thieves come from all walks of life:

  • Professional criminals and organized crime rings
  • Opportunistic individuals with financial troubles
  • Disgruntled employees or ex-partners
  • Tech-savvy teenagers
  • Even family members or close acquaintances

Low barrier to entry. The tools and knowledge required for identity theft are readily available:

  • Online tutorials and hacking forums
  • Easily obtainable skimming devices
  • Phishing kits and malware
  • Dark web marketplaces for stolen information

Motivations vary. While financial gain is the primary motive, some perpetrators are driven by:

  • Revenge or personal grudges
  • Thrill-seeking or curiosity
  • Desperation due to financial hardship
  • Misguided attempts to help others (e.g., illegal immigrants)

4. Identity theft has far-reaching consequences

Identity theft is like a chronic disease. It often occurs in more than one episode, and it keeps on hurting.

Financial impact. Victims may face:

  • Drained bank accounts and maxed-out credit cards
  • Damaged credit scores affecting loan approvals and interest rates
  • Difficulty obtaining employment or housing due to poor credit
  • Legal fees and time off work to resolve issues

Emotional toll. The psychological effects can be severe and long-lasting:

  • Feelings of violation and vulnerability
  • Stress and anxiety about future security
  • Damaged relationships due to misplaced suspicion
  • Loss of trust in institutions and individuals

Long-term repercussions. The effects of identity theft can persist for years:

  • Lingering inaccuracies on credit reports
  • Recurring fraudulent accounts or charges
  • False criminal records or warrants
  • Ongoing fear of repeat victimization

5. Prevention is key: Safeguard your personal information

The less information you give out, the better.

Limit information sharing. Be cautious about providing personal details:

  • Only give out your Social Security number when absolutely necessary
  • Use alternative forms of identification when possible
  • Be wary of unsolicited requests for information via phone, email, or in person

Secure physical documents. Protect tangible sources of personal information:

  • Use a cross-cut shredder for sensitive documents
  • Keep important papers in a locked safe or security deposit box
  • Collect mail promptly and consider a locking mailbox

Digital security measures. Safeguard your online presence:

  • Use strong, unique passwords for all accounts
  • Enable two-factor authentication when available
  • Keep software and antivirus programs up-to-date
  • Be cautious when using public Wi-Fi networks

6. Monitor your credit reports regularly

Keeping abreast of your credit history is the consumer's best self-protecting technique by far.

Regular credit checks. Obtain and review your credit reports from all three major bureaus (Equifax, Experian, and TransUnion) at least annually. Look for:

  • Unfamiliar accounts or inquiries
  • Incorrect personal information
  • Unexplained changes in credit scores

Credit monitoring services. Consider using a reputable credit monitoring service that provides:

  • Real-time alerts for new accounts or inquiries
  • Regular updates on credit score changes
  • Assistance with fraud resolution

Proactive measures. Take additional steps to protect your credit:

  • Place a security freeze on your credit reports to prevent new accounts from being opened
  • Set up fraud alerts that require additional verification for new credit applications
  • Opt out of pre-screened credit offers to reduce the risk of stolen mail

7. Take immediate action if you become a victim

Don't panic. It's important, though, to calm down and collect yourself, then follow an orderly protocol.

Immediate steps:

  1. Contact the fraud departments of all three credit bureaus
  2. Place a fraud alert on your credit reports
  3. Close all compromised accounts and open new ones with different numbers and passwords
  4. File a police report and obtain a copy for your records
  5. File a complaint with the Federal Trade Commission (FTC)

Document everything. Keep detailed records of:

  • All communications with creditors, law enforcement, and credit bureaus
  • Copies of fraudulent charges and accounts
  • Time spent and expenses incurred in resolving the theft

Long-term vigilance. Continue to monitor your credit and financial accounts closely for several years after the initial incident. Be prepared to address recurring issues promptly.

8. Businesses and institutions must improve data protection

Every company in America, every government agency, every municipality, and every health care provider has to ask itself one simple question: What are we doing to protect the identity of our customers and our employees?

Data security measures. Organizations should implement:

  • Encryption for sensitive data storage and transmission
  • Strong access controls and authentication processes
  • Regular security audits and vulnerability assessments
  • Employee training on data protection and privacy policies

Incident response plans. Develop and regularly test protocols for:

  • Detecting and containing data breaches
  • Notifying affected individuals promptly
  • Cooperating with law enforcement investigations
  • Providing support and resources for victims

Ethical data practices. Adopt responsible data handling policies:

  • Collect and retain only necessary personal information
  • Provide clear privacy policies and opt-out options
  • Properly dispose of outdated or unnecessary data
  • Vet third-party vendors and partners for security compliance

9. Laws and regulations need to evolve to combat identity theft

Congress and state legislatures need to provide consumers with more protection.

Stronger penalties. Advocate for:

  • Increased criminal penalties for identity theft and related crimes
  • Enhanced enforcement resources for law enforcement agencies
  • Improved cooperation between jurisdictions to prosecute cross-border cases

Consumer protections. Push for legislation that:

  • Expands consumers' rights to access and control their personal data
  • Mandates prompt notification of data breaches
  • Provides easier paths for victims to clear fraudulent records

Corporate accountability. Support regulations that:

  • Require businesses to implement specific data protection measures
  • Impose significant fines for negligent handling of personal information
  • Mandate regular audits and reporting on data security practices

Last updated:

Report Issue