Identity Crimes (Theft, Compromise & Misuse) with Mona Terry
Easy Prey8 Tammi 2025

Identity Crimes (Theft, Compromise & Misuse) with Mona Terry

When you search for customer service numbers online, you might come across a scammer's number instead. It's important to be cautious when sharing personal information, and to verify identities before responding to requests for sensitive data.

Today's guest is Mona Terry. As Chief Victims Officer at Identity Theft Resource Center, she navigates the complexities of identity protection and identity crime recovery and management of multi-million dollar federal grants. She analyzes victim experiences to create ITRC's Identity Report and to provide information about new and ongoing trends in identity crimes.

Show Notes:
  • [0:55] - Mona describes her role as Chief Victims Officer at Identity Theft Resource Center and how she found herself in this job.
  • [3:18] - Identity crimes include theft, compromise, and misuse. What's the difference?
  • [4:26] - The number one recorded compromise is through scams, where people give their information to someone else.
  • [5:30] - It is also becoming more common for someone to search for a customer service number and come across a scammer's number instead.
  • [7:01] - Some of the strategies in detecting fake websites are not helpful any longer with scammers using AI tools to make things look more legitimate.
  • [10:10] - Misuse is when someone else takes over your account and is making charges or establishing new accounts in your name.
  • [11:41] - Account takeovers don't only include credit cards. Social media account takeovers can be just as dangerous and more common.
  • [13:28] - Identity theft is what it sounds like—stealing information with the intent to misuse it.
  • [15:24] - If you suspect something is compromised, Mona recommends freezing your credit account.
  • [16:45] - Freezing your account and checking credit reports is easier than it used to be.
  • [19:32] - Mona describes how the Identity Theft Resource Center walks victims through the steps in resolving problems.
  • [21:23] - Some situations are harder to resolve than others.
  • [23:51] - Team members at Identity Theft Resource Center are not therapists, but they are trauma informed and listen to victims as they are guided through a process.
  • [26:27] - When working with the Identity Theft Resource Center, clients get a recovery plan.
  • [29:08] - If victims have tried something or don't feel comfortable with something, ITRC can step in and help.
  • [31:50] - Don't be afraid to check for problems. Sometimes problems don't show themselves immediately.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Jaksot(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Huhti 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Huhti 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Huhti 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Huhti 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Huhti 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Maalis 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Maalis 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Maalis 45min

Suosittua kategoriassa Politiikka ja uutiset

uutiscast
aikalisa
politiikan-puskaradio
rss-ootsa-kuullut-tasta
ootsa-kuullut-tasta-2
tervo-halme
rss-podme-livebox
aihe
rss-ulkopoditiikkaa
viisupodi
rss-pinnalla
the-ulkopolitist
et-sa-noin-voi-sanoo-esittaa
rss-vaalirankkurit-podcast
rss-asiastudio
radio-antro
rss-tasta-on-kyse-ivan-puopolo-verkkouutiset
otetaan-yhdet
rss-mina-ukkola
rss-polikulaari-pitka-kiekko-ja-muut-ts-podcastit