{"id":1857,"date":"2006-04-01T00:00:00","date_gmt":"2006-04-01T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/01\/identity-theft-hit-3-6-million-in-u-s\/"},"modified":"2021-12-30T11:40:09","modified_gmt":"2021-12-30T11:40:09","slug":"identity-theft-hit-3-6-million-in-u-s","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/04\/01\/identity-theft-hit-3-6-million-in-u-s\/","title":{"rendered":"Identity theft hit 3.6 million in U.S."},"content":{"rendered":"<p>About 3 percent of households were hit by some sort of ID theft during the first six months of 2004, according a DOJ.  According to a comprehensive survey conducted by the U.S. Department of Justice (DOJ), identity theft is affecting millions of households in the U.S each year and costing an estimated $6.4 billion per year.  The data comes from the Justice Department&#8217;s National Crime Victimization Survey, which interviews members of 42,000 households across the country every six months to better understand the nature, frequency and consequences of crime.  The DOJ has been compiling this information for more than 30 years, but this marks the first time it has asked households about identity theft, said survey author Katrina Baum, a statistician with the Justice Department&#8217;s Bureau of Justice Statistics.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of the other identity theft victims, about 25 percent had banking and other types of accounts used without permission, 15 percent had their personal information misused, and about 12 percent faced a combination of several types of ID theft.<\/p>\n<p>Based on these numbers, the nationwide estimated loss during the six months of the study amounted to $3.2 billion, for an annualized total of $6.4 billion.<\/p>\n<p>&#8220;It&#8217;s usually a phenomenon that&#8217;s experienced by the young and those in urban households,&#8221; she said.<\/p>\n<p>http:\/\/www.infoworld.com\/article\/06\/03\/31\/77031_HNidtheft_1.html?source=rss&#038;url=http:\/\/www.infoworld.com\/article\/06\/03\/31\/77031_HNidtheft_1.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-1857","post","type-post","status-publish","format-standard","hentry","category-statistics"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1857"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1857\/revisions"}],"predecessor-version":[{"id":4344,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1857\/revisions\/4344"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}