Identity Theft How to Protect Your Name by Gummo

Identity Theft How to Protect Your Name by Gummo

Author:Gummo [Gummo]
Language: eng
Format: epub
Tags: IDtitl
Published: 0101-01-01T00:00:00+00:00


CHAPTER

BANKS AND

CREDIT BUREAUS

In 1999, Congress passed the Gramm-Leach-Bliley Act (the GLB Act), legislation that allowed banks, insurance companies, credit bureaus and securities firms to affiliate under a single corporate structure. The purpose of this change? To allow financial services companies to “more readily anticipate and meet their customers’ financial needs.”

At least that’s what the head of the Financial Services Roundtable told Congress in March 2001.

The GLB Act also reformed the system of federal regulation and requires greater coordination among the various agencies. This coordination is a challenge.

In all, there are almost 200 different financial services regulators—including the various state banking, insurance and securities regulators and all of the federal banking, thrift and securities agencies.

As integrated financial services companies have increased the scope of their business activities—mix-ing banking, investments, insurance and consumer lend-ing—they have become more directly involved in establishment and use of personal financial identities. In 1 4 9

B A N K S A N D C R E D I T B U R E A U S

fact, they’ve marketed these identities. As recently as the 1990s, most Americans were only vaguely aware of their credit ratings or “FICO scores.” In the early 2000s, financial institutions have marketed these credit profiles like soap or soft drinks. One example: In 2002 and 2003, radio and television ads for new cars started referencing “credit tiers” when describing available financing packages.

As a result, financial identities—credit scores—have become commodities, with market values. And, as any economist will tell you, commodities are significant in two ways. First, their value is defined by marketplace conditions that are usually beyond any single owner’s control; second, they are vulnerable to theft, piracy and manipulation.

These are the economic trends that have enabled identity theft.

What do the fast-integrating financial services companies think about ID theft? In his March 2001 congressional testimony, Steve Bartlett—President of the Financial Services Roundtable—put the problem in context:

It is estimated that the financial services industry loses more than $100 billion a year in fraud, which includes $85 billion to $120 billion in insurance fraud, $24 billion of which comes from property/casualty fraud; $13

billion in check fraud; $3 billion in identity fraud; and $600 million in credit card fraud.

1 5 0

C H A P T E R 7

So, the financial services companies think that insurance fraud is their biggest problem. But ID theft is, by most accounts, the fastest growing form of financial fraud; and, as we’ve seen throughout this book, ID theft often operates in conjunction with other kinds of fraud—including insurance fraud.

C R E D I T B U R E A U S

When most Americans hear the term “financial services,” they think of faceless corporate giants that buy lots of ads during the Super Bowl. Beyond that, they have a vague notion of companies that combine banking, insurance, stock brokerage and various other money-related activities.

One of the key “various other” activities is the setting and tracking of individual consumer’s credit ratings.

Throughout this book (and any discussion of ID theft) you’ve heard references to the “big three” U.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(56086)
What's Done in Darkness by Kayla Perrin(26619)
The Fifty Shades Trilogy & Grey by E L James(19100)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19083)
Shot Through the Heart by Mercy Celeste(18955)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17139)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17026)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(16900)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16841)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16470)
The Subtle Art of Not Giving a F*ck by Mark Manson(14385)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14158)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(13678)
Scorched Earth by Nick Kyme(12788)
Drei Generationen auf dem Jakobsweg by Stein Pia(10985)
Suna by Ziefle Pia(10903)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(10630)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(10593)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(10561)
Scythe by Neal Shusterman(10370)