Dumpster Diving is one of the commonest methods of stealing identity as most of online theft information was got from dumpster diving. Dumpster Diving is a method whereby personal information is stolen from trash mails which people delete. As per facts 88% of the information used for online frauds are got from dumpster diving. On an average Americans receive more than 400 million tons of junk mails and a number of that mails would have information which can be used against the people.
Mails regarding pre-approved credit cards or bank statements which are usually trashed after its use can be a good target for the fraudulent activities as most of the mails would be having some of your personal information which can be used against you in many ways. Identity theft has been America’s most growing crime category and most of this information is stole through dumpster diving from the e-mails.
The Main information collected by online criminals is address, bank account information, employment history, credit and debit card information, security number etc. This information can be used for identity theft which can be harmful for your future. Information is also used for employment related frauds as a person can use your personal information for claiming to be someone else. Another major theft mode is where the information is used for taking loans with your information and before you know it you would have a liability. Bank frauds can be also pulled off by the usage of this information obtained from the Dumpster Diving. Tax frauds are also common online frauds done by the usage of this information.
Identity theft is a major issue which is facing America as most of the transactions are conducted on the platform of internet which increased the chance of internet frauds. Another major area is the banking sector which has shifted many of its operations through the internet which again increases the chance for internet frauds. People involved in trading through the online medium should be careful while passing private and personal information as these can be accessed by tech savvy hackers and used against you.