hackers
homewho are hackers?the riskswho's responsibleprotecting yourselfinterviews

interview: mari frank


photo of mari frank

In 1996 she was a victim of "identity theft" when a woman assumed her identity and rang up over $50,000 in credit card debt. Frank wrote a book, From Victim to Victor, on what she learned about how to protect against identity theft. She also publishes a web site with further resources for protecting privacy.
What your particular experience with identity theft? How did it happen?

I was a victim of identity theft in 1996. I got a phone call from a bank that I'd never heard of and they said, "Is this Mari Frank?" And I said, "Yes." And the woman said, "This is the Bank of New York in Delaware, and we want to know why you haven't paid your $11,000 bill to us." And I said, "I'm sorry, I'm running out now. You have the wrong name, the wrong number. I don't know who you are. I've got to go." And the woman said, "Wait a minute, is this your Social Security number and your birth date?" And of course, by then, I started to get worried, and I said, "What are you looking at?" She said, "I'm looking at the billing statements that we have for you and your credit report. And I said, "Where did you send those billing statements, where did you send that credit card?" She gave me an address four hours from my home that I'd never heard of. And I said, "I've never lived there."

And so then I knew right away that it was fraud, and I asked her what else was on the credit report. Obviously, she wouldn't tell me. I ordered my credit reports. I found that over $50,000 worth of credit was stolen in my name. Some woman had purchased a red convertible Mustang in my name as well. She had driven down to my law office, stolen my business cards, was parading around as an attorney in my name. She had rented a car. She had gotten a fake driver's license with her picture and my name. She had gotten credit cards so she could rent a car, and totaled it, and I was being sued by Thrifty Rental Car.

So it took me over 500 hours to clean up the mess. I started clocking it after about two weeks--that's the attorney in me. It took me about 11 months to clean up the mess. Now, I did this myself, and I knew what I was doing because I'm an attorney. I'm not very shy. I'm able to write letters-- I do it for a living. And it was overwhelming for me. I've spoken to victims. Sometimes they've been victimized for 14 years. It can take hundreds of hours and thousands of dollars to clear it up. It's a total nightmare for them.

Was the person who "stole" you an educated person? Was she computer literate?

No. . . . I was very fortunate, by the way. In only about 10% of the cases does the victim ever even find the imposter. I was very lucky, and that's because I worked very hard to find it. The law enforcement agency that helped me only helped me because the watch commander himself was a victim. So that's why I was very lucky, and people shouldn't think that they're going to get the kind of help that I got. I was fortunate.

You can minimize  risk by keeping your confidential information as confidential as possible.  But the reality is, if someone wants to get your information, all they have to do is go online The person who stole my identity . . . was really a secretary and she was working in a law office. And she had access to the computers and the internet. And because the law firm had a subscription with a re-seller of credit reports, she could go online and order several different credit reports. She could just pull up names, and that's what she was doing. So she was actually assuming quite a few identities besides mine. I never saw her until I saw her on television. I saw her mug shot. I never knew her. She did plead guilty to six counts of a felony credit card fraud, because we didn't have an identity theft statute at the time. She did a two-month work furlough program for her punishment, still driving the red convertible Mustang.

And nobody paid for that car.

Right. And interestingly enough, after that I was incensed by how the system didn't work. I was actually more incensed with the credit card companies and the credit reporting agencies for their negligence than for this woman. She was 36 years old, she was a single mom, she was a methamphetamine addict. I got to the point where I almost felt sorry for her because she had to do this. I never knew her and I wasn't real happy with her, but basically I felt that the companies did nothing to protect me. Nothing. They didn't verify identity. They didn't authenticate. They just issued credit like it was candy, and then after the new address was reported to the credit reporting agencies, she got pre-approved offers sent to her like candy to her door. So I really felt like the whole financial industry was facilitating the crime.

And law enforcement at the time had no teeth to help me, because there was no identity theft statute. So I worked in California to help get two laws passed to make identity theft a crime. I went to Washington. We now have a federal crime law that makes identity theft a federal felony, with up to 15 years in prison. Now there are about 40 states with identity theft statutes, and there was only one when I was a victim. So from 1996 to the year 2000, quite a bit has happened. . . .

How widespread is identity theft?

Identity theft has become an epidemic. In the United States, we know that there were over 700,000 victims last year. And that's just a very modest calculation, based on the fact that one of the three credit reporting agencies received 62,000 calls a month. Now it's starting to happen in other countries as well, because we get calls from Japan, from England, from France and from Canada. . . .

I get the impression that most of this is one-shot theft and abuse of somebody else's credit card.

No, this is not just one-shot abuse. That is one form of identity theft. . . . . . [But] you can pay to get someone's Social Security number on dozens of information broker sites. Then you're talking about complete identity takeover. When somebody gets your Social Security number-- at least in the United States--that's what they're going to use, because that's the key identifier in identity theft. They get that Social Security number, and from that, they can apply for credit cards and credit lines. They establish a whole new profile, and it goes to an address that's other than yours.

So you have no idea that this is happening, maybe for years, because all of this credit is going to another address. Meanwhile, your credit profile, maybe your American Express or your Visa, is coming to your home. There's no fraud on it--nothing. Everything looks perfect, so you have no idea until something happens, like you get a fateful call from a company that says, "Why haven't you paid your bill to us?" Or you apply for credit to buy a new car or a new house, and they say that your credit is ruined. And you look at your credit report and you see fraud on there that you never knew existed. . . .

Now in the olden days, you really have to actually go to maybe get court records or do some other things to commit identity theft. That would take much longer. So, yes, there was identity theft. And there were people who were able to do that as a profession, people who were very smart about getting your information--people like private investigators, information brokers. Now they put that online. There are hundreds and hundreds of sites that you can go to. You don't have to spend a great deal of money or a great deal of time. It's transferred to you in just a second.

Surely somebody is doing something about this. Surely people in authority recognize the perils here.

Well, people are starting to recognize this, because we're bringing this to the forefront. There are two bills pending in the United States Congress right now. One is called the Identity Theft Protection Act of 2000, and the other one is the Social Security Protection Act of 2000. The Social Security Act of 2000 says that you cannot sell a Social Security number anywhere for money-- that it would be illegal to do so.

The Identity Theft Protection Act also addresses some of the issues about the credit reporting agencies and the credit card companies, who have been so lax in verifying and authenticating identity. For example, when a creditor gets an application with my name and it's an address that's not on my profile, if this bill passes, they would have to verify it before they could issue credit. So there would actually be sanctions for a company who issued a credit card to a fraudulent address without checking.

So, yes, we are starting. . . . The problem is, if you have laws in the United Sates and you don't have the same laws in other countries, we've got all this conflict of laws, because the internet is global.

What's the worst case that you've heard of?

Online, the worst case was actually a call I got just last week from a woman. She was desperately crying that her ex-husband's girlfriend had opened up an email account in her name and had gone online to send emails to the husband pretending to be the wife, threatening to kill their child, threatening to kill herself, making all sorts of allegations about things that were going on. So when he goes to court next week, he can say that she was an unfit mother and . . .

. . . And psychotic.

. . . and psychotic. Then she cannot get custody. And so this woman found out that the email account actually had been opened from a university where this man's girlfriend is going to school. She had to pull in a computer expert to try and help her in her family law case. And I don't know what's going to happen yet. She called me, and I told her things to do. But this is such a new field, and people are looking at her like she's crazy. She lives in a little town in the Midwest where people have no idea about this stuff. And the problem is that the technology is there, but the safeguards are not. . . .

Assuming that there will never be sufficient public controls or communal control to prevent the abuse, what does the individual do?

The individual can do certain things to minimize their risk, but I have to tell you, there's nothing that you can do to guarantee it. There are certain things you can do that involve just being more aware. For example, getting your credit report and looking at it at least twice a year, and seeing if there's any fraud on it. That is the first thing to do--make sure that you get it quarterly and see what's on there.

Because we're finding out that there's so much criminal identity theft, now I'm telling people go and do a criminal background search on themselves at least once a year. Find out if someone has a murder arrest in your name. That happened to one of my clients last year. He had no idea for two years that there was a murder arrest, and he couldn't get a job.

He was officially a convicted murderer?

He wasn't a convicted murderer. He was supposedly arrested for murder. When his Social Security number was mixed with another Social Security number, the name was wrong. But when he applied for jobs, he kept getting denied employment, because it was coming up that he had been arrested for murder. I'm still dealing with that case right now.

But I'm telling people to get your background searched and see if someone is committing a crime in your name. I get probably a dozen calls a month just from criminal identity theft and maybe a hundred calls a month on financial identity theft.

So the first thing you can do is to get your credit report. The second thing is to shred all your information that you have offline. For example, if you get a bank statement and it's got your Social Security number, shred it. Don't keep any information around, because people can go and do what we call "dumpster diving." They go through your trash and they fish out what they want.

They can do it at work. Be careful at work. Does your badge have your Social Security number on it? In other words, make sure that you limit the use of your Social Security number. Don't carry it around with you. Don't give out personal information online. . . .

And another thing we tell people to do is to even shred information that's on your computer. Confidential information should be encrypted, and any information that you want to get off your computer, you have to shred, because if you delete it, it does not just delete.

Another thing you should do is make sure that you don't give confidential information by cell phone, or by a remote phone, or on the internet unless it's encrypted. Put up firewalls so someone can't come in and steal your information from your computer.

But why should the burden be on us, as citizens, just to protect our own identity? . . . We have to opt out of all of these companies that are selling our information. We have to spend a fortune to find out who's stealing our information. It really just seems that it is a tremendous burden on the citizens of our country. . . .

What was the result of your miserable experience?

I created the Identity Theft Survival Kit, because it's the kit I wish I'd had when it happened to me. In it, I've got tapes with experts from across the country, including the Secret Service. I've got a book that's got step-by-step instructions on how to stop being a victim. And I've got all the legal letters that you need to write so you don't have to hire an attorney. And the good news is this whole thing is tax-deductible, under the US tax code for fraud losses.

The Identity Theft Survival Kit and Frank's book are available for purchase on her web site, Identitytheft.org


home · who are hackers? · risks of the internet · who's responsible · how to be vigilant · interviews
discussion · video excerpts · synopsis · press · tapes · credits
FRONTLINE · wgbh · pbs online

some photos copyright ©2001 photodisc
web site copyright 1995-2014 WGBH educational foundation

SUPPORT PROVIDED BY

RECENT STORIES

FRONTLINE on

ShopPBS