首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
March 27, 1997, dawned as a normal day at the Collins’ home. By the middle of the morning, Jack Collins was at his desk, writin
March 27, 1997, dawned as a normal day at the Collins’ home. By the middle of the morning, Jack Collins was at his desk, writin
admin
2009-01-14
67
问题
March 27, 1997, dawned as a normal day at the Collins’ home. By the middle of the morning, Jack Collins was at his desk, writing checks, paying bills the way he always had: on time.
Then the phone rang, and the nightmare began.
(31)
An investigator for a bank was on the line, asking in a severe voice why Collins, a university physicist, was late on payments for a $27, 000 car, bought in Virginia the previous year.
"I don’t have a car like this," Collins protested. The last time he had set foot in Virginia was as an officer at a submarine base, three decades ago. But his name was on the contract, and so was his Social Security Number.
During the months that ensued, he and his wife learned that someone had bought four more cars and 28 other items-worth $113,000 in all-in their name. Their hitherto good credit record had been destroyed. (32)
"After a lifetime of being honest," says Collins, "all of a sudden I was basically being accused of stealing and treated like a criminal. "
This is what it means to fall prey to a nonviolent but frightening and fast-growing crime: identity theft.
It happens to at least 500, 000 new victims each year, according to government figures.
(33)
And it happens very easily because every identification number you have--Social Security, credit card, driver’s license, telephone-- "is a key that unlocks some storage of money or goods," says a fraud (欺诈) program manager of the US Postal Service.
"So if you throw away your credit card receipt and I get it and use the number on it, I’m not becoming you, but to the credit card company I’ve become your account. "
(34)
One major problem, experts say, is that the Social Security Number (SSN)-- originally meant only for retirement benefit and tax purposes--has become the universal way to identify people.
It is used as identification by the military, colleges and in billions of commercial transactions.
Yet a shrewd thief can easily snatch your SSN, not only by stealing your wallet, but also by taking mail from your box, going through your trash for discarded receipts and bills or asking for it over the phone on some pretext.
Using your SSN, the thief applies for a credit card in your name, asking that it be sent to a different address than yours, and uses it for multiple purchases. A couple of months later the credit card company, or its debt collection agency, presses you for payment.
You don’t have to pay the debt, but you must clean up your damaged credit record. (35)
That means getting a police report and copy of the erroneous contract, and then using them to clear the fraud from your credit report, which is held by a credit bureau.
Each step can require a huge amount of effort.
选项
答案
而这类事很容易发生,因为你所持有的每一种证件号码,譬如社会福利登记号、信用卡、驾照以及电话号码,“都是开启你存储钱物的密码,”美国邮政总局的一位负责诈骗案的主管说。
解析
转载请注明原文地址:https://kaotiyun.com/show/0Hsa777K
本试题收录于:
MBA联考(英语)题库专业硕士分类
0
MBA联考(英语)
专业硕士
相关试题推荐
Writealettertotheeditorofanewspapercomplainingaboutthepoorserviceofabookstore.设想你买了一本英文词典,发现有这样那样的质量问题,书店的
Itlookedjustlikeanotheraircraftfromtheoutside.Thepilottoldhisyoungpassengersthatitwasbuiltin1964.Butappeara
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【1】thatbusinesseswerestill
WholesalepricesinJulyrosemoresharplythanexpectedandatafasterratethanconsumerprices,【1】thatbusinesseswerestill
Sportisheadingforanindissolublemarriagewithtelevisionandthepassivespectatorwillenjoyaprivateparadise.Allofth
Afewdecadesago,theworldbankingcommunityinventednewElectronicFundsTransfer(EFT)systemstomovemoneymoreefficient
Afewdecadesago,theworldbankingcommunityinventednewElectronicFundsTransfer(EFT)systemstomovemoneymoreefficient
Theauthor’spurposeofwritingthisarticleisto______.AllofthefollowingcanbelearnedfromthepassageEXCEPT______.
TheauthoraccusesPresidentClintonof______.Accordingtotheconservativetheory,wageinequalityisnecessarybecause____
Inthepeople’sRepublicofChinatheoddprequakebehaviorofhorsesandotheranimals【1】successfullytowarnpeoplethatearth
随机试题
患儿,3个月,腹泻2日,呈黄绿色稀便,有奶瓣和泡沫,为纠正轻度脱水,应选择
男性,38岁,发热38~39.5℃,疲倦、盗汗伴咳嗽、少量痰半个月。既往体健。肺部体检:右上实变体征伴两下肺散在湿性哕音最合适的首选检查是
女,56岁。有房颤病史5年。突发眩晕、恶心呕吐6小时来院。体检:神志清,右侧瞳孔2mm,左侧瞳孔3mm,右侧面瘫,颈软,左侧半身痛温觉减退,血压110/70mmHg。为定性诊断,最可靠的检查是
患儿男,5岁,因“高热、头疼伴烦躁不安3天,时有抽搐发生”入院,查体:体温41℃,呼吸32次/分,神志清,颈项强直。实验室检查:血白细胞15×109/L,中性粒细胞0.82,脑脊液:有核细胞数100×105/L,蛋白400mg/L,糖和氯化物正常,临床诊断
在价值工程活动中,价值系数V的计算结果不同,采取的改进策略也不同。下列改进策略中不正确的是()。
根据《建设工程工程量清单计价规范》,某工程采用价格调整公式进行价格调整。施工中由于承包人返工的原因导致工期延误,则约定竣工日期后继续施工的工程,在使用价格调整公式时,应采用的价格指数是()。
进出口货物收发货人或其代理人申请修改或者撤销进…口货物报关单的,应当向海关提交“进出口货物报关单修改/撤销确认书”。
防范个人住房贷款违约风险需特别重视把握()。[2015年5月真题]
我国刑法在溯及力问题上采取的原则是()。
指出下面哪一项是在抽象类中声明一个抽象方法。()
最新回复
(
0
)