Identity Crimes (Theft, Compromise & Misuse) with Mona Terry
Easy Prey8 Jan 2025

Identity Crimes (Theft, Compromise & Misuse) with Mona Terry

When you search for customer service numbers online, you might come across a scammer's number instead. It's important to be cautious when sharing personal information, and to verify identities before responding to requests for sensitive data.

Today's guest is Mona Terry. As Chief Victims Officer at Identity Theft Resource Center, she navigates the complexities of identity protection and identity crime recovery and management of multi-million dollar federal grants. She analyzes victim experiences to create ITRC's Identity Report and to provide information about new and ongoing trends in identity crimes.

Show Notes:
  • [0:55] - Mona describes her role as Chief Victims Officer at Identity Theft Resource Center and how she found herself in this job.
  • [3:18] - Identity crimes include theft, compromise, and misuse. What's the difference?
  • [4:26] - The number one recorded compromise is through scams, where people give their information to someone else.
  • [5:30] - It is also becoming more common for someone to search for a customer service number and come across a scammer's number instead.
  • [7:01] - Some of the strategies in detecting fake websites are not helpful any longer with scammers using AI tools to make things look more legitimate.
  • [10:10] - Misuse is when someone else takes over your account and is making charges or establishing new accounts in your name.
  • [11:41] - Account takeovers don't only include credit cards. Social media account takeovers can be just as dangerous and more common.
  • [13:28] - Identity theft is what it sounds like—stealing information with the intent to misuse it.
  • [15:24] - If you suspect something is compromised, Mona recommends freezing your credit account.
  • [16:45] - Freezing your account and checking credit reports is easier than it used to be.
  • [19:32] - Mona describes how the Identity Theft Resource Center walks victims through the steps in resolving problems.
  • [21:23] - Some situations are harder to resolve than others.
  • [23:51] - Team members at Identity Theft Resource Center are not therapists, but they are trauma informed and listen to victims as they are guided through a process.
  • [26:27] - When working with the Identity Theft Resource Center, clients get a recovery plan.
  • [29:08] - If victims have tried something or don't feel comfortable with something, ITRC can step in and help.
  • [31:50] - Don't be afraid to check for problems. Sometimes problems don't show themselves immediately.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Episoder(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mar 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mar 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mar 45min

Populært innen Politikk og nyheter

giver-og-gjengen-vg
aftenpodden
aftenpodden-usa
forklart
popradet
stopp-verden
fotballpodden-2
rss-gukild-johaug
lydartikler-fra-aftenposten
nokon-ma-ga
det-store-bildet
hanna-de-heldige
dine-penger-pengeradet
rss-ness
rss-espen-lee-usensurert
aftenbla-bla
e24-podden
rss-dannet-uten-piano
rss-penger-polser-og-politikk
frokostshowet-pa-p5