IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

How Widespread Identity Theft Has Gone Mainstream

Identity theft used to be a more complicated, hands-on racket that included mail theft, dumpster diving, scam telephone calls and emailed offers, but hackers armed with improved tech have made the practice more common.

(TNS) — Identity theft used to be a more complicated, hands-on racket that included mail theft, dumpster diving, scam telephone calls and emailed offers.

But hackers, aided by improvements in computer technology and internet accessibility, have introduced an illicit efficiency to the crime, stealing the personal information of thousands of people with a few keystrokes in large-scale data breaches, according to the Jefferson Parish, La., Sheriff’s Office.

The hackers then sell the information to eager criminals at low prices on the dark web, leaving victims befuddled as they wonder just where or how they may have left themselves exposed.

“You really can’t protect your information. All you can do is monitor it,” said Lt. Stanley Brown, commander of Sheriff’s Office Economic Crimes Unit.

It’s a scary new prospect for consumers: Your personal data is out there, and there’s not a lot you can do about it.

Earlier this month, Sheriff’s Office Detective Lexie Bradberry arrested Tyrone McPlatter, 31, of New Orleans, on a raft of bank fraud, computer fraud, identity theft and credit card fraud charge.

McPlatter was the main player in a group of scammers who created fraudulent accounts using “synthetic identifications,” identities created by combining stolen, personal data such as social security numbers with fake information, the Sheriff’s Office said.

Brown said the group was buying the stolen data on the dark web. Investigators describe the dark web as a sleazy alleyway that can’t be accessed through normal web browsers such as Safari or Chrome. Visitors conduct criminal activity there, including drug deals.

“It’s a digital back alley,” Brown said.

Social security numbers are sold for as little as $5 each, according to investigators. For $75, one can buy 25 credit card numbers, though there’s no guarantee that they’ll work. Depending on what a crook is willing to pay, there’s access to all sorts of information, including account logins and passwords, birth dates and the like.

Data thieves use skimmers to collect large amounts of credit card information, placing them on fuel pumps and ATMs or paying restaurant and store employees to swipe cards on handheld devices, Brown said.

But large-scale data breaches have become more of a concern. Hackers pull names, dates of birth, addresses, social security numbers, maiden names and other identifying information from companies. Hundreds of thousands of consumers' data was compromised in recent years in cyber attacks of businesses including Yahoo, Equifax, Target, Capital One and Marriott.

The recent ransomware attack that crippled Louisiana computer systems didn’t compromise any personal information, state officials said, but shows that governments are also a target.

“It could be a person in Russia who’s doing the hack, who puts the information on the dark web,” Brown said. “Any person anywhere in the world who has access to the internet, with a little assistance, could get on the dark web and buy it.”

While it’s true that there’s little you can do to prevent your personal data from ending up on the dark web or remove it, once it’s there you can limit the damage, investigators said.

Routinely check your bank and credit accounts for activity that appears fraudulent so that you can put a stop to it as soon as it occurs, Brown said. Also request a copy of your credit report every three months to check for any phony accounts opened in your name.

While improved technology has given cyber crooks a leg up, it’s also handed a few benefits to law enforcement agencies, investigators said. It’s now easier to track crimes and share information across jurisdictions.

That’s why it’s so important for identity theft victims to report the crime to law enforcement, Brown said.

“We look for patterns in the reports,” he said, explaining that a detective who notices several reports from one area may go out and check for skimmers or other ties. “We want the look for the common points about where you’ve used your cards and put those things together.”

Here's what experts say to do if your information is stolen:

Contact the fraud department with the bank, business, or store and tell them that your information has been stolen. Ask them to close the fraudulent account and send you a letter confirming that the fraudulent account isn’t yours, you aren’t liable for it and it was removed from your credit report.

Change all logins and passwords  

Contact the three major credit bureaus and activate a free, one-year fraud alert. This makes it more difficult for anyone to open a new account in your name. The three bureaus are: Experian:, 888-397-3742; TransUnion:, 888-909-8872; and Equifax:, 800-685-1111

Report the identity theft to the Federal Trade Commission (FTC), the government agency tasked with protecting consumers. You can make an online report at  or call 1-877-438-4338.

Report the theft to your local law enforcement agency.

The Jefferson Parish Sheriff's Office invites the public to attend a seminar on avoiding financial scams that will be held at 7 p.m. on Dec. 17 at the JPSO Training Academy, 1801 West Bank Expressway, Harvey. Those interested should email Lt. Stanley Brown at

©2019 NOLA Media Group, New Orleans. Distributed by Tribune Content Agency, LLC.

Special Projects
Sponsored Articles
  • Sponsored
    Microsoft Teams quickly became the business application of choice as state and local governments raced to equip remote teams and maintain business continuity during the COVID-19 lockdown. But in the rush to deploy Teams, many organizations overlook, ignore or fail to anticipate some of the administrative hurdles to successful adoption. As more organizations have matured their use of Teams, a set of lessons learned has emerged to help agencies ensure a successful Teams rollout – or correct course on existing implementations.
  • Sponsored
    Five Key Criteria for Selecting the Right Technology Solution for Communications and Notifications
  • Sponsored
    The city of Santa Ana, Calif., has selected Clariti’s Building Permit Software to modernize its permitting, enforcement and inspections applications.
  • Sponsored
    The benefits of a customer-centric strategy are not confined to private entities. The same holds for government agencies. Government entities at all levels can benefit by prioritizing citizens' needs and wants.