Browse content similar to Episode 6. Check below for episodes and series from the same categories and more!
Line | From | To | |
---|---|---|---|
We asked you to tell us what's left you feeling ripped off | 0:00:02 | 0:00:04 | |
and you contacted us in your thousands. | 0:00:04 | 0:00:07 | |
You've told us about the companies you think get it wrong | 0:00:07 | 0:00:09 | |
and the customer service that simply is not up to scratch. | 0:00:09 | 0:00:13 | |
They should be looking after their customers and they don't. | 0:00:13 | 0:00:16 | |
Loyalty to the customers is a very low priority. | 0:00:16 | 0:00:19 | |
You've asked us to track down the scammers who stole your money | 0:00:19 | 0:00:23 | |
and investigate the extra charges you say are unfair. | 0:00:23 | 0:00:26 | |
Big companies, big corporations are more into the money | 0:00:26 | 0:00:29 | |
and the numbers than they are about the people. | 0:00:29 | 0:00:31 | |
And when you've lost out but no-one else is to blame, | 0:00:31 | 0:00:33 | |
you've come to us to stop others falling into the same trap. | 0:00:33 | 0:00:37 | |
It genuinely feels like I'm getting ripped off. | 0:00:37 | 0:00:40 | |
So, whether it's a blatant rip-off or a genuine mistake... | 0:00:40 | 0:00:44 | |
We're here to find out why you're out of pocket | 0:00:44 | 0:00:46 | |
and what you can do about it. | 0:00:46 | 0:00:49 | |
Your stories, your money. This is Rip-Off Britain. | 0:00:49 | 0:00:53 | |
Hello and welcome to Rip-Off Britain, | 0:00:55 | 0:00:57 | |
where it's our job to make sure your money stays very firmly | 0:00:57 | 0:01:01 | |
where it belongs - in your pocket - | 0:01:01 | 0:01:03 | |
and that it doesn't become easy pickings for unscrupulous crooks. | 0:01:03 | 0:01:07 | |
But it's not always just your cash that the fraudsters are after, | 0:01:07 | 0:01:10 | |
so today, we're on the trail of the people | 0:01:10 | 0:01:12 | |
determined to steal something just as valuable - your identity. | 0:01:12 | 0:01:16 | |
And, as we'll see, | 0:01:16 | 0:01:17 | |
they don't always have to go to great lengths to actually do it. | 0:01:17 | 0:01:20 | |
But if all of that sounds a bit terrifying, | 0:01:20 | 0:01:22 | |
don't worry too much, | 0:01:22 | 0:01:23 | |
because we've been seeking out the best tips and advice | 0:01:23 | 0:01:26 | |
to make sure that your personal details, | 0:01:26 | 0:01:28 | |
not to mention your savings, can be kept safe. | 0:01:28 | 0:01:31 | |
Coming up, how safe are those contactless cards in your pocket? | 0:01:33 | 0:01:37 | |
Could fraudsters somehow use them to help themselves to your cash? | 0:01:37 | 0:01:41 | |
If these are unprotected, | 0:01:41 | 0:01:43 | |
then the card information can be scanned without people realising. | 0:01:43 | 0:01:47 | |
And how criminals piece together enough personal information | 0:01:47 | 0:01:51 | |
to take complete control of one couple's bank accounts. | 0:01:51 | 0:01:56 | |
How is it possible for somebody | 0:01:56 | 0:01:58 | |
to get that much accurate information for both of us? | 0:01:58 | 0:02:01 | |
Now, it seems that the days when cash was king | 0:02:04 | 0:02:07 | |
are well and truly over. | 0:02:07 | 0:02:08 | |
At the start of 2016, one in every ten card payments was made | 0:02:08 | 0:02:13 | |
with one of these - a contactless payment card. | 0:02:13 | 0:02:17 | |
Just six months later, that had shot up | 0:02:17 | 0:02:19 | |
to one in every six payments | 0:02:19 | 0:02:21 | |
and they're getting more popular every day. | 0:02:21 | 0:02:24 | |
But while for many people, | 0:02:24 | 0:02:25 | |
going contactless is both simple and convenient, | 0:02:25 | 0:02:28 | |
there are still those who remain rather sceptical | 0:02:28 | 0:02:30 | |
and I'm one of them, and after what I found out making this next film, | 0:02:30 | 0:02:33 | |
I can't imagine changing my mind any time soon. | 0:02:33 | 0:02:36 | |
They're quick, easy, and more people now shop with them than ever before. | 0:02:38 | 0:02:43 | |
But quite a few people still have doubts about using them. | 0:02:43 | 0:02:47 | |
Can I ask you if you ever use a contactless credit card | 0:02:47 | 0:02:50 | |
-when you're...? -No. -You don't? | 0:02:50 | 0:02:52 | |
-Why don't you use them? -I don't trust them. | 0:02:52 | 0:02:54 | |
-Why don't you trust them? -Because I'm of a certain age. | 0:02:54 | 0:02:57 | |
-They're dangerous. -Why are they dangerous? | 0:02:57 | 0:03:00 | |
Because if you lose it, which I have on occasion, | 0:03:00 | 0:03:03 | |
somebody else can pick it up and just tap, tap, tap, tap. £30 a time. | 0:03:03 | 0:03:08 | |
They can just steal it and then they can use my card | 0:03:08 | 0:03:10 | |
and I can't have that. | 0:03:10 | 0:03:12 | |
A recent survey claimed that one in five people | 0:03:13 | 0:03:16 | |
won't use a contactless card | 0:03:16 | 0:03:18 | |
because of worries that they're not completely safe. | 0:03:18 | 0:03:22 | |
Press reports have been quick to add fuel to that particular fire, | 0:03:22 | 0:03:26 | |
suggesting the simplicity of the cards can make it easy | 0:03:26 | 0:03:29 | |
for crooks to take advantage of them. | 0:03:29 | 0:03:31 | |
And Alan Smith from Kings Langley wonders | 0:03:32 | 0:03:35 | |
if that might be the explanation | 0:03:35 | 0:03:37 | |
for a mysterious fraud on his account. | 0:03:37 | 0:03:40 | |
It was my youngest daughter's birthday | 0:03:40 | 0:03:43 | |
and we decided to take her | 0:03:43 | 0:03:45 | |
and a group of her friends to Madame Tussauds. | 0:03:45 | 0:03:48 | |
When we got there, we found there were hundreds of people | 0:03:48 | 0:03:51 | |
really milling around in various kinds of queues. | 0:03:51 | 0:03:55 | |
And, funnily enough, I had my contactless card in my hip pocket. | 0:03:55 | 0:04:01 | |
I tend to do that because it's convenient | 0:04:01 | 0:04:04 | |
just to reach in my pocket and get it out when I want to use it. | 0:04:04 | 0:04:07 | |
The birthday treat was a great success, | 0:04:07 | 0:04:10 | |
but a couple of days later, when checking his bank account, | 0:04:10 | 0:04:14 | |
Alan noticed a payment which he didn't recognise, | 0:04:14 | 0:04:17 | |
a charge for about £18, which appeared to have been made | 0:04:17 | 0:04:20 | |
around the same time that the family visited Madame Tussauds. | 0:04:20 | 0:04:25 | |
I was concerned and I did ring the bank straightaway | 0:04:25 | 0:04:29 | |
and I was worried, obviously, that more transactions would follow | 0:04:29 | 0:04:34 | |
from the one that I'd already seen, | 0:04:34 | 0:04:36 | |
which is why I spoke to the bank immediately. | 0:04:36 | 0:04:38 | |
Accepting there'd been some sort of fraud, | 0:04:38 | 0:04:41 | |
the bank immediately refunded Alan's money | 0:04:41 | 0:04:44 | |
and told him to cut up his card. | 0:04:44 | 0:04:47 | |
But Alan couldn't work out what might have happened | 0:04:47 | 0:04:50 | |
and how a fraud could possibly have occurred within the half hour | 0:04:50 | 0:04:53 | |
that he and his family had spent queuing outside Madame Tussauds. | 0:04:53 | 0:04:57 | |
He says it was someone at the bank who first raised the possibility | 0:04:57 | 0:05:00 | |
that it could have something to do with his contactless card, | 0:05:00 | 0:05:04 | |
making him wonder if somehow a scammer, | 0:05:04 | 0:05:07 | |
armed with the right technology, had been able to steal his bank details | 0:05:07 | 0:05:10 | |
without his card even leaving his pocket. | 0:05:10 | 0:05:13 | |
I was shocked. | 0:05:13 | 0:05:15 | |
I was aware that contactless cards could be scammed, | 0:05:15 | 0:05:18 | |
your details could be compromised. | 0:05:18 | 0:05:20 | |
I never expected it to happen to me | 0:05:20 | 0:05:22 | |
and witness the fact that I used to put this card | 0:05:22 | 0:05:25 | |
in my hip pocket quite foolishly, in a way. | 0:05:25 | 0:05:29 | |
It is concerning, there's no doubt about it. | 0:05:29 | 0:05:31 | |
Now, when we spoke to Alan's bank, | 0:05:33 | 0:05:34 | |
it told us it didn't believe that this was a contactless fraud | 0:05:34 | 0:05:38 | |
or that Alan's card had been compromised in any way. | 0:05:38 | 0:05:42 | |
It described what happened as a "card not present" fraud, | 0:05:42 | 0:05:46 | |
although it remains unclear exactly how it might have occurred. | 0:05:46 | 0:05:50 | |
But whatever the truth of this particular case, | 0:05:50 | 0:05:53 | |
don't assume that the idea of fraudsters taking advantage | 0:05:53 | 0:05:56 | |
of your card in the way Alan feared | 0:05:56 | 0:05:58 | |
is some sort of far-fetched conspiracy theory. | 0:05:58 | 0:06:01 | |
Because I'm about to discover exactly how such a scam could work | 0:06:01 | 0:06:06 | |
and, indeed, how straightforward the process can be. | 0:06:06 | 0:06:10 | |
I've been asked to come to this cafe here in East London | 0:06:11 | 0:06:14 | |
and my director has given me his contactless payment card. | 0:06:14 | 0:06:17 | |
I'm not quite sure what I'm supposed to do with it | 0:06:17 | 0:06:20 | |
because I don't use these things | 0:06:20 | 0:06:21 | |
but, I tell you what, now I've got it, | 0:06:21 | 0:06:23 | |
this is going to buy me a very large slice of cake. | 0:06:23 | 0:06:26 | |
'Little did I know then that I was walking into a trap - | 0:06:27 | 0:06:30 | |
'one that would see the details from that contactless card | 0:06:30 | 0:06:34 | |
'in my pocket spirited away without the card so much as moving. | 0:06:34 | 0:06:38 | |
'The team told me they were just getting ready | 0:06:38 | 0:06:40 | |
'for us to start filming | 0:06:40 | 0:06:42 | |
'and introduced me to a fraud expert called Gary Fenton, | 0:06:42 | 0:06:46 | |
'who I'd be interviewing later. But while I chatted to Gary, | 0:06:46 | 0:06:49 | |
'I was the target of a not entirely successful sting, | 0:06:49 | 0:06:53 | |
'as Gary brushed his phone against the pocket | 0:06:53 | 0:06:55 | |
'where I was keeping the contactless card. | 0:06:55 | 0:06:58 | |
'Now, it takes more than a few hidden cameras | 0:06:59 | 0:07:02 | |
'and an unusually prompt camera crew to fool me, | 0:07:02 | 0:07:05 | |
'because straightaway, I guessed that something fishy was going on. | 0:07:05 | 0:07:09 | |
'But not yet entirely sure of what it all meant, | 0:07:09 | 0:07:12 | |
'I didn't let on that I'd spotted anything. | 0:07:12 | 0:07:14 | |
'Instead, I went off to buy a drink with the director's card, | 0:07:14 | 0:07:18 | |
'leaving Gary mysteriously fiddling with his laptop.' | 0:07:18 | 0:07:21 | |
OK, so I've been using this contactless payment card. | 0:07:21 | 0:07:26 | |
Tell me how they work. | 0:07:26 | 0:07:27 | |
The card will talk to a scanner and it just reads the information | 0:07:27 | 0:07:32 | |
off the card without necessarily physically touching the card. | 0:07:32 | 0:07:35 | |
This is why I see people with these just floating them | 0:07:35 | 0:07:38 | |
across the top of machines instead of actually putting them in | 0:07:38 | 0:07:41 | |
-and putting in a PIN number, right? -Yes, it's extremely convenient. | 0:07:41 | 0:07:43 | |
People don't have to remember a four-digit PIN number | 0:07:43 | 0:07:46 | |
and you can literally just tap it on the card terminal | 0:07:46 | 0:07:49 | |
-when you make a purchase. -But what are the drawbacks? | 0:07:49 | 0:07:52 | |
You see, I won't have one of these | 0:07:52 | 0:07:54 | |
because I think...I think they're open to all kinds of abuse. | 0:07:54 | 0:07:58 | |
Right, you're not wrong. | 0:07:58 | 0:08:00 | |
The information can be read and it can actually be read freely | 0:08:00 | 0:08:05 | |
by a mobile app that anyone could actually download. | 0:08:05 | 0:08:08 | |
The same technology that's built into contactless bank cards | 0:08:08 | 0:08:13 | |
and card terminals is also built into many mobile phones. | 0:08:13 | 0:08:16 | |
It's called near-field communication or NFC for short. | 0:08:16 | 0:08:20 | |
It allows card details to be read over short distances | 0:08:20 | 0:08:23 | |
which, when you're buying a coffee and a slice of cake, | 0:08:23 | 0:08:25 | |
can make things relatively easy. | 0:08:25 | 0:08:27 | |
But it also means that anyone with the right technology | 0:08:27 | 0:08:31 | |
can make their phones act like a contactless card reader. | 0:08:31 | 0:08:34 | |
'I think it's about time I told Gary | 0:08:34 | 0:08:36 | |
'that I've cottoned on to his attempted scam.' | 0:08:36 | 0:08:39 | |
When I met you, you made a point of bumping into me | 0:08:39 | 0:08:42 | |
-when you had your telephone in your hand. -I did. | 0:08:42 | 0:08:44 | |
You're very observant. | 0:08:44 | 0:08:46 | |
And I do have your card information on my mobile phone | 0:08:46 | 0:08:50 | |
and I can check with you, are the last four digits 6008? | 0:08:50 | 0:08:54 | |
Yes, they are. Let me have a look at the rest of it though. | 0:08:54 | 0:08:57 | |
I'm not going to read it out cos this is somebody else's card, | 0:08:57 | 0:08:59 | |
but you're absolutely right. | 0:08:59 | 0:09:01 | |
OK, you've got the app, I've got the card. Show me how you do it. | 0:09:01 | 0:09:06 | |
OK, if you put the card onto the table. | 0:09:06 | 0:09:08 | |
Phone just needs to hover itself above the card and that's it. | 0:09:09 | 0:09:12 | |
-As quick as that?! -Even quicker. It took less than half a second. | 0:09:12 | 0:09:16 | |
Gary's phone has picked up the card number and expiry date | 0:09:17 | 0:09:20 | |
from my director's card. It didn't take his name | 0:09:20 | 0:09:23 | |
or the three-digit security code from the back of the card. | 0:09:23 | 0:09:26 | |
And without that last figure, in particular, | 0:09:26 | 0:09:28 | |
you'd be forgiven for thinking that no-one could do very much | 0:09:28 | 0:09:32 | |
with stolen details, but you'd be wrong, | 0:09:32 | 0:09:34 | |
because after he'd swiped them from the card in my pocket | 0:09:34 | 0:09:37 | |
20 minutes earlier, Gary had gone shopping. | 0:09:37 | 0:09:41 | |
I actually went online and made a purchase using your card | 0:09:41 | 0:09:44 | |
and I bought something from Amazon. | 0:09:44 | 0:09:47 | |
-For how much? -It was just under £30. | 0:09:47 | 0:09:50 | |
-And they accepted that? -They did. | 0:09:50 | 0:09:53 | |
It went through straightaway and it said to wait for delivery now. | 0:09:53 | 0:09:57 | |
Gary had used a fake Amazon account, | 0:09:57 | 0:10:00 | |
a fake name and the stolen details on the card to buy me a gift, | 0:10:00 | 0:10:04 | |
which was due to be delivered to our offices the following day. | 0:10:04 | 0:10:07 | |
And he'd done it without being asked | 0:10:07 | 0:10:09 | |
for the three-digit security code on the back of the card. | 0:10:09 | 0:10:13 | |
What's especially worrying about that is that he could have spent | 0:10:13 | 0:10:16 | |
a whole lot more because using the card details this way | 0:10:16 | 0:10:19 | |
would not have had the price limit | 0:10:19 | 0:10:21 | |
that you get making a contactless purchase in store. | 0:10:21 | 0:10:25 | |
Why does a company like Amazon, | 0:10:25 | 0:10:27 | |
which must do millions of transactions, | 0:10:27 | 0:10:30 | |
not ask for that security number? That's why it's there. | 0:10:30 | 0:10:34 | |
That's an important question | 0:10:34 | 0:10:36 | |
and I'm afraid you'll just have to ask Amazon | 0:10:36 | 0:10:38 | |
because I have no idea why they're not doing these security checks. | 0:10:38 | 0:10:41 | |
So, we did just that and Amazon assured us | 0:10:41 | 0:10:44 | |
that it has sophisticated and rigorous measures in place | 0:10:44 | 0:10:47 | |
to prevent and detect fraud, | 0:10:47 | 0:10:49 | |
which provide layers of protection | 0:10:49 | 0:10:52 | |
beyond the use of those three-digit security codes. | 0:10:52 | 0:10:55 | |
But for what it called "obvious reasons", | 0:10:55 | 0:10:58 | |
it wouldn't comment on the specifics of what they are. | 0:10:58 | 0:11:02 | |
Now, it's impossible to know how widespread this type of scam may be | 0:11:02 | 0:11:07 | |
or, indeed, if it's having an impact on consumers at all. | 0:11:07 | 0:11:10 | |
But the very reassuring news is that if you're at all worried, | 0:11:10 | 0:11:14 | |
there is a simple and totally reliable way | 0:11:14 | 0:11:17 | |
to keep your contactless card completely safe | 0:11:17 | 0:11:20 | |
and it couldn't be easier to get hold of. | 0:11:20 | 0:11:22 | |
So, I suppose the 64,000 question is | 0:11:24 | 0:11:26 | |
how safe are these things, then, for people to be using? | 0:11:26 | 0:11:29 | |
-And they're being used all over the place. -They are. | 0:11:29 | 0:11:31 | |
They can be safe if they're used properly. If these are unprotected, | 0:11:31 | 0:11:36 | |
then the card information can be scanned without people realising. | 0:11:36 | 0:11:40 | |
So what sort of precautions can people take | 0:11:40 | 0:11:42 | |
to make sure that their card stays safe? | 0:11:42 | 0:11:44 | |
You could keep your card in a protective wallet or a shield | 0:11:44 | 0:11:48 | |
to protect it from being scanned. | 0:11:48 | 0:11:50 | |
So, for example... | 0:11:50 | 0:11:52 | |
here's a shield here | 0:11:52 | 0:11:54 | |
and you would put your card into this | 0:11:54 | 0:11:56 | |
and it would be protected. | 0:11:56 | 0:11:58 | |
It would be impossible to scan the card | 0:11:58 | 0:12:00 | |
-if it's in one of these little wallets. -Right. | 0:12:00 | 0:12:03 | |
Now, nobody can read that now with any kind of app? | 0:12:03 | 0:12:06 | |
No, it's completely protected. | 0:12:06 | 0:12:07 | |
If you wanted to make a genuine purchase, you would take it | 0:12:07 | 0:12:10 | |
out of here and use it, put it back in here and it can't be scanned. | 0:12:10 | 0:12:14 | |
Prove to me that that really protects it. There we go. | 0:12:14 | 0:12:17 | |
-Let's put it down. -OK. -Have another go. | 0:12:17 | 0:12:20 | |
We just put the phone over it and as you can see... | 0:12:20 | 0:12:25 | |
-Nothing is happening. -Nothing at all. | 0:12:25 | 0:12:27 | |
Gary's organisation, Online Watch Link, | 0:12:27 | 0:12:30 | |
sells one version of this protective cover for £1, | 0:12:30 | 0:12:33 | |
either online or from your local Neighbourhood Watch group. | 0:12:33 | 0:12:36 | |
There are plenty of similar products widely available | 0:12:36 | 0:12:39 | |
but the trouble is not everyone who could benefit from them will know | 0:12:39 | 0:12:42 | |
that they exist or even be aware of why they might need them. | 0:12:42 | 0:12:46 | |
So, Gary and I hit the streets to start spreading the word. | 0:12:46 | 0:12:50 | |
Oxford Street, to be precise. | 0:12:50 | 0:12:52 | |
And when you're in amongst all these shoppers, | 0:12:52 | 0:12:55 | |
you realise just how simple it might be | 0:12:55 | 0:12:57 | |
for someone to deliberately brush against you | 0:12:57 | 0:12:59 | |
in an attempt to get your details. | 0:12:59 | 0:13:01 | |
They'd have to be very lucky to succeed | 0:13:01 | 0:13:04 | |
but Gary thinks it's exactly the sort of environment | 0:13:04 | 0:13:07 | |
where they might try. | 0:13:07 | 0:13:09 | |
If somebody bumps into you... It's a matter of course here. | 0:13:09 | 0:13:11 | |
People always get bumped into because it's so busy | 0:13:11 | 0:13:13 | |
and they don't think anything of it. | 0:13:13 | 0:13:15 | |
'Luckily, we've got just the thing to keep their card safe.' | 0:13:15 | 0:13:19 | |
Do you, by any chance, ever use a contactless credit card | 0:13:20 | 0:13:23 | |
-to pay for things? -Yes. -Yes. | 0:13:23 | 0:13:26 | |
Are you aware of how vulnerable they are | 0:13:26 | 0:13:28 | |
for the information to be stolen off them? | 0:13:28 | 0:13:30 | |
-I guess you're not! -Yeah. | 0:13:31 | 0:13:34 | |
-Really? -That quick. | 0:13:34 | 0:13:36 | |
Literally just brushing against you like that and he's done it. | 0:13:36 | 0:13:39 | |
So, how can you be safe? | 0:13:39 | 0:13:41 | |
You can protect your cards | 0:13:41 | 0:13:42 | |
by putting them in a little sleeve like this. | 0:13:42 | 0:13:44 | |
So, will you accept this, with the compliments of Rip-Off Britain, | 0:13:44 | 0:13:47 | |
and put your contactless card in there and protect it? | 0:13:47 | 0:13:50 | |
Thank you very much! | 0:13:50 | 0:13:51 | |
Make sure you keep it in there, | 0:13:51 | 0:13:53 | |
-otherwise someone could steal that information. -Oh, thank you. | 0:13:53 | 0:13:56 | |
-Do you want one as well? -I would love one, thank you. -I bet you do. | 0:13:56 | 0:13:58 | |
We spoke to The UK Cards Association | 0:13:58 | 0:14:01 | |
about the potential risks contactless card users face. | 0:14:01 | 0:14:04 | |
It stressed that... | 0:14:04 | 0:14:06 | |
..adding that... | 0:14:08 | 0:14:10 | |
It went on to say that there has never been an actual case | 0:14:14 | 0:14:17 | |
of card details being obtained and used to make an online purchase | 0:14:17 | 0:14:21 | |
in the way that we demonstrated in our test. | 0:14:21 | 0:14:23 | |
And it was keen to reassure anyone with a contactless card | 0:14:25 | 0:14:28 | |
that, even if someone did scan it in this way, | 0:14:28 | 0:14:31 | |
only information from the front of the card could be obtained | 0:14:31 | 0:14:34 | |
and not the more sensitive details, like the security code, | 0:14:34 | 0:14:38 | |
on the back, which it pointed out is required | 0:14:38 | 0:14:41 | |
to make a purchase from the vast majority of retailers. | 0:14:41 | 0:14:44 | |
And where it's not, as, of course, happened in our test, | 0:14:44 | 0:14:47 | |
were a genuine fraud to take place, then the retailer would be liable. | 0:14:47 | 0:14:51 | |
And if none of that reassures you, | 0:14:51 | 0:14:53 | |
remember you don't have to have a contactless card. | 0:14:53 | 0:14:56 | |
You're perfectly entitled to ask your bank for an alternative | 0:14:56 | 0:15:00 | |
that doesn't have that technology built in. | 0:15:00 | 0:15:03 | |
If you remember, back in the cafe, Gary ordered something online | 0:15:03 | 0:15:06 | |
with the details that he'd swiped from that card | 0:15:06 | 0:15:09 | |
that was in my pocket. Well, here it is. | 0:15:09 | 0:15:12 | |
He said it was a gift for me, so shall we see what it is? | 0:15:12 | 0:15:15 | |
Christmas comes early here at Rip-Off. Right, let's have a look. | 0:15:15 | 0:15:20 | |
What on earth? | 0:15:21 | 0:15:23 | |
What is it? Oh! | 0:15:27 | 0:15:29 | |
SHE LAUGHS | 0:15:29 | 0:15:32 | |
Now, there's clever! | 0:15:32 | 0:15:33 | |
Ooh, blimey, it weighs a ton! Ah, there you go. | 0:15:33 | 0:15:37 | |
It's an electronic safe! | 0:15:39 | 0:15:41 | |
Now, we talk a lot on this programme about cyber crime | 0:15:47 | 0:15:51 | |
and the networks of criminals | 0:15:51 | 0:15:52 | |
trading our personal data all over the world. | 0:15:52 | 0:15:55 | |
We share so much personal information | 0:15:55 | 0:15:57 | |
on a whole host of websites and social networks | 0:15:57 | 0:16:00 | |
that fraudsters don't even need to break the law | 0:16:00 | 0:16:03 | |
to put together enough pieces of the jigsaw to steal our identity. | 0:16:03 | 0:16:08 | |
The repercussions for our personal security are huge. | 0:16:08 | 0:16:11 | |
But we're here to help. | 0:16:11 | 0:16:13 | |
Here's everything you need to know | 0:16:13 | 0:16:15 | |
to make sure it's not YOUR most personal information | 0:16:15 | 0:16:18 | |
that's ripe for the picking. | 0:16:18 | 0:16:20 | |
It's probably your most valuable asset - | 0:16:21 | 0:16:24 | |
not your home or your car but your personal information. | 0:16:24 | 0:16:29 | |
And while individual details like your name, address | 0:16:29 | 0:16:32 | |
or date of birth may, on their own, seem harmless, | 0:16:32 | 0:16:36 | |
put them all together and you've got a bigger picture | 0:16:36 | 0:16:39 | |
that, to a fraudster, could be worth a fortune. | 0:16:39 | 0:16:42 | |
One person who's only too aware of that is Salam Weld. | 0:16:45 | 0:16:49 | |
She's always been cautious about who she gives her details to | 0:16:49 | 0:16:52 | |
and, until November last year, | 0:16:52 | 0:16:54 | |
she thought she'd done all she could to avoid any risk of identity fraud. | 0:16:54 | 0:16:58 | |
I'm very careful when I get suspicious emails or calls. | 0:17:00 | 0:17:05 | |
If they are a bank, for example, | 0:17:05 | 0:17:07 | |
I get their direct number myself and speak to direct people. | 0:17:07 | 0:17:11 | |
If it's email, I tend to not click on the link. | 0:17:11 | 0:17:16 | |
So when, out of the blue, | 0:17:17 | 0:17:19 | |
Salam received an automated call, supposedly from her bank, | 0:17:19 | 0:17:23 | |
asking for an authorisation code for a transaction on her account, | 0:17:23 | 0:17:26 | |
alarm bells rang and she quickly hung up. | 0:17:26 | 0:17:29 | |
But sensing the call wasn't quite all it seemed, | 0:17:29 | 0:17:32 | |
she immediately phoned her real bank to raise her concerns. | 0:17:32 | 0:17:36 | |
When the bank said, "Don't worry", it was a relief, | 0:17:38 | 0:17:42 | |
and that's why I thought, "OK, fine." | 0:17:42 | 0:17:45 | |
The bank confirmed that no funds had been withdrawn | 0:17:45 | 0:17:49 | |
and no suspicious activity had been noted. | 0:17:49 | 0:17:52 | |
But the next day, when Salam was at a petrol pump, | 0:17:52 | 0:17:55 | |
her bank card was refused. | 0:17:55 | 0:17:57 | |
I put another card. It says declined with the same bank. | 0:17:58 | 0:18:03 | |
At the time, I didn't understand what was happening | 0:18:03 | 0:18:05 | |
and then straightaway, I contacted my husband to say, | 0:18:05 | 0:18:08 | |
"Look, I couldn't make a payment. Can you check, please, why?" | 0:18:08 | 0:18:12 | |
Her husband went into the local branch of their bank and was told | 0:18:12 | 0:18:16 | |
that all three of the joint accounts the couple shared had been emptied. | 0:18:16 | 0:18:20 | |
Over £30,000 was gone. | 0:18:20 | 0:18:22 | |
I was very upset. | 0:18:24 | 0:18:25 | |
We had to cancel our holidays | 0:18:25 | 0:18:27 | |
because we didn't have enough to pay it. | 0:18:27 | 0:18:29 | |
We had to basically borrow money from friends and family. | 0:18:29 | 0:18:33 | |
The bank said that all the money had been transferred | 0:18:33 | 0:18:35 | |
into a new account which had been opened under two names. | 0:18:35 | 0:18:39 | |
One was her husband's | 0:18:39 | 0:18:41 | |
but the other was a name neither of them had ever heard before. | 0:18:41 | 0:18:44 | |
Somehow it seems this mysterious stranger had known enough | 0:18:46 | 0:18:50 | |
of Salam's husband's details to enable him | 0:18:50 | 0:18:52 | |
not only to open up a new, apparently shared, account, | 0:18:52 | 0:18:56 | |
but to then transfer into it all the couple's savings. | 0:18:56 | 0:18:59 | |
How is it possible for somebody | 0:19:02 | 0:19:04 | |
to get that much accurate information for both of us? | 0:19:04 | 0:19:07 | |
What's more, for the final stage of the scam, | 0:19:07 | 0:19:11 | |
the fraudster was then able to move the cash | 0:19:11 | 0:19:13 | |
to a totally different account - one that only HE had access to. | 0:19:13 | 0:19:17 | |
At the time, I was just crying | 0:19:17 | 0:19:19 | |
and getting upset, you know, all the time, | 0:19:19 | 0:19:22 | |
and not having the money, not having the trust from the bank. | 0:19:22 | 0:19:28 | |
When the bank investigated, | 0:19:29 | 0:19:31 | |
it sent out new credit and debit cards | 0:19:31 | 0:19:33 | |
but the fraudster wasn't done with the couple yet | 0:19:33 | 0:19:36 | |
or with their personal details. | 0:19:36 | 0:19:38 | |
He'd also found a way to change | 0:19:39 | 0:19:41 | |
the address registered to their accounts, | 0:19:41 | 0:19:44 | |
which meant those new cards went straight to him. | 0:19:44 | 0:19:47 | |
I was so angry because the bank should protect my information. | 0:19:48 | 0:19:53 | |
I just don't understand how they changed our address | 0:19:53 | 0:19:57 | |
and managed to withdraw money again from the branch | 0:19:57 | 0:20:02 | |
and I feel scared for them to know my address. | 0:20:02 | 0:20:06 | |
Every time I go out, I feel like, "Who is this person watching me?" | 0:20:06 | 0:20:10 | |
Now, fortunately, as there was clear evidence of fraud, | 0:20:10 | 0:20:15 | |
the bank did eventually refund all the couple's money, | 0:20:15 | 0:20:18 | |
but Salam's been left baffled as to how the fraudsters were able | 0:20:18 | 0:20:21 | |
to wreak so much havoc, presumably just by piecing together | 0:20:21 | 0:20:25 | |
a few fragments of information about her and her husband. | 0:20:25 | 0:20:28 | |
As if all that wasn't enough, | 0:20:30 | 0:20:32 | |
the criminals almost got away with more money too. | 0:20:32 | 0:20:35 | |
They also attempted to take out a £25,000 loan in the couple's name | 0:20:35 | 0:20:40 | |
but, luckily, amidst all the personal details they DID know, | 0:20:40 | 0:20:45 | |
they were missing one key part of the jigsaw. | 0:20:45 | 0:20:48 | |
They got how long I've been in the address wrong | 0:20:50 | 0:20:52 | |
because they put it for certain years which was wrong, | 0:20:52 | 0:20:57 | |
so obviously they're guessing the information that wasn't right. | 0:20:57 | 0:21:01 | |
That particular fraud may have been foiled, | 0:21:01 | 0:21:04 | |
but Salam's worried these attacks could continue to happen. | 0:21:04 | 0:21:07 | |
We plan to move address but that won't help | 0:21:09 | 0:21:12 | |
because if they managed to get it the first time, | 0:21:12 | 0:21:16 | |
I doubt that will stop them to do it again. | 0:21:16 | 0:21:18 | |
Well, when we spoke to the bank | 0:21:20 | 0:21:22 | |
to see what personal details had been required | 0:21:22 | 0:21:24 | |
to allow all this to happen, it told us that, to protect customers, | 0:21:24 | 0:21:28 | |
it can't discuss the details of specific instances of fraud | 0:21:28 | 0:21:32 | |
or divulge details of its fraud protection systems. | 0:21:32 | 0:21:35 | |
But it assured us that it does have a... | 0:21:35 | 0:21:38 | |
The bank's apologised that Salam and Joe were victims of identity fraud | 0:21:41 | 0:21:45 | |
and said that it's provided a full reimbursement of the stolen money | 0:21:45 | 0:21:48 | |
and resulting costs, as well as an additional payment | 0:21:48 | 0:21:51 | |
for any distress and inconvenience caused. | 0:21:51 | 0:21:54 | |
But however safe you think you've kept your details, you never know | 0:21:58 | 0:22:01 | |
which pieces fraudsters will be able to put together | 0:22:01 | 0:22:04 | |
to get their hands on your cash. | 0:22:04 | 0:22:06 | |
And, as our tech expert, David McClelland, knows, | 0:22:08 | 0:22:10 | |
thanks to the wealth of information about any of us | 0:22:10 | 0:22:13 | |
that's so widely and often freely available, | 0:22:13 | 0:22:16 | |
they don't have to look too hard to find them. | 0:22:16 | 0:22:19 | |
There's lots of information that's available | 0:22:19 | 0:22:21 | |
about each and every one of us online, | 0:22:21 | 0:22:23 | |
so what fraudsters can do is take | 0:22:23 | 0:22:25 | |
these different snippets of information | 0:22:25 | 0:22:27 | |
and then use that to commit identity fraud, | 0:22:27 | 0:22:29 | |
taking out bank loans, taking out mobile phone contracts. | 0:22:29 | 0:22:34 | |
To prove how easy it is for some determined digging | 0:22:36 | 0:22:39 | |
to come up trumps for crooks planning identity fraud, | 0:22:39 | 0:22:42 | |
we've asked David to see how much information he can find out | 0:22:42 | 0:22:45 | |
about these three volunteers - Margaret, Valerie and Janet. | 0:22:45 | 0:22:50 | |
How do you feel about your details being publicly accessible? | 0:22:50 | 0:22:54 | |
Doesn't worry me in the slightest. | 0:22:54 | 0:22:56 | |
It depends what they are, what the details are. | 0:22:56 | 0:22:59 | |
-Not one's PIN number, surely. -Oh, no, no. | 0:22:59 | 0:23:03 | |
Now, although this is the first time David has met these ladies, | 0:23:03 | 0:23:06 | |
he's already got to know some rather personal details about them. | 0:23:06 | 0:23:10 | |
And that's because, | 0:23:11 | 0:23:13 | |
armed with their names and a rough idea of their age and location, | 0:23:13 | 0:23:17 | |
which we'd sent him a few days earlier, | 0:23:17 | 0:23:18 | |
he's been trying to find out | 0:23:18 | 0:23:20 | |
as much sensitive information about them as he can. | 0:23:20 | 0:23:23 | |
'Don't get me wrong, piecing together this information, | 0:23:23 | 0:23:26 | |
'it does require effort.' | 0:23:26 | 0:23:28 | |
But for those criminals who are willing to invest time and effort | 0:23:28 | 0:23:32 | |
to recreate an identity, | 0:23:32 | 0:23:35 | |
it then gives them the power to essentially be you. | 0:23:35 | 0:23:38 | |
Margaret... | 0:23:40 | 0:23:41 | |
Using only legal means, | 0:23:41 | 0:23:43 | |
David has managed to unearth quite a lot about Margaret. | 0:23:43 | 0:23:46 | |
My details, who I'm married to, where I live, my email. | 0:23:46 | 0:23:50 | |
I'm a committee member of U3A. Interests - yes, that's right. | 0:23:50 | 0:23:54 | |
Studied at Bromley College of Higher and Further Education - | 0:23:54 | 0:23:58 | |
many moons ago! | 0:23:58 | 0:23:59 | |
And then you've got a long shot here - | 0:23:59 | 0:24:01 | |
did I work in France as a financial advisor? | 0:24:01 | 0:24:04 | |
No, I didn't work in France, but I was a financial advisor. | 0:24:04 | 0:24:07 | |
All the info that IS right means that he'd be well on the way | 0:24:07 | 0:24:11 | |
to gathering enough information to start impersonating her. | 0:24:11 | 0:24:15 | |
Next, it's Janet, and though she didn't consider | 0:24:15 | 0:24:17 | |
the openly available information on her too bothersome... | 0:24:17 | 0:24:21 | |
Anything that you are surprised that's on there? | 0:24:21 | 0:24:24 | |
-No, no. -OK. | 0:24:24 | 0:24:27 | |
David did manage to find out her address, | 0:24:28 | 0:24:31 | |
husband's name and even a photo from their wedding day, | 0:24:31 | 0:24:34 | |
Valerie was a little harder as, of the three, | 0:24:36 | 0:24:38 | |
she spends the least time online. | 0:24:38 | 0:24:41 | |
There is my full name or my middle initial, my address... | 0:24:41 | 0:24:46 | |
-Length of occupancy at my address, which is incorrect. -Yeah. | 0:24:47 | 0:24:51 | |
And a good thing too. As we saw in Salam's case, | 0:24:51 | 0:24:55 | |
if fraudsters get wrong how long you've lived at your address, | 0:24:55 | 0:24:57 | |
that one missing piece of information can be enough | 0:24:57 | 0:25:01 | |
to stop them from taking out a loan in your name. | 0:25:01 | 0:25:03 | |
Before meeting our volunteers, David had spent just one hour | 0:25:07 | 0:25:10 | |
searching the internet for each of their personal details. | 0:25:10 | 0:25:13 | |
But that short time was enough for him to find | 0:25:13 | 0:25:16 | |
all of their home addresses, phone numbers for two of them, | 0:25:16 | 0:25:19 | |
images of their front doors, names of family members, | 0:25:19 | 0:25:23 | |
what their jobs were before retirement | 0:25:23 | 0:25:25 | |
and even the date of one of their wedding anniversaries. | 0:25:25 | 0:25:28 | |
So, even though we didn't get the full picture of any of you, really, | 0:25:30 | 0:25:33 | |
what we did get, particularly for you, Margaret, and Janet, I think, | 0:25:33 | 0:25:36 | |
was enough information that would allow a would-be fraudster | 0:25:36 | 0:25:40 | |
to start targeting you with phone calls or with emails, | 0:25:40 | 0:25:43 | |
giving you little snippets of information that would, | 0:25:43 | 0:25:46 | |
hopefully, from their point of view, | 0:25:46 | 0:25:47 | |
convince you that they are people | 0:25:47 | 0:25:50 | |
who should be getting your information, | 0:25:50 | 0:25:52 | |
that would let them conduct a fraudulent activity, | 0:25:52 | 0:25:55 | |
get more information from you, | 0:25:55 | 0:25:57 | |
-maybe even empty your bank account. -It's a worry. | 0:25:57 | 0:25:59 | |
If it's that easy to find details for people who aren't online much, | 0:25:59 | 0:26:03 | |
imagine what you could turn up for someone | 0:26:03 | 0:26:05 | |
who regularly posts information on social media. | 0:26:05 | 0:26:08 | |
And, of course, | 0:26:08 | 0:26:09 | |
it's not just the details WE share online that can put us at risk. | 0:26:09 | 0:26:13 | |
Security breaches at banks, phone companies and other institutions | 0:26:13 | 0:26:18 | |
can also, inadvertently, give away personal information. | 0:26:18 | 0:26:21 | |
Which is why David thinks banks, in particular, | 0:26:21 | 0:26:24 | |
should beef up their security measures. | 0:26:24 | 0:26:26 | |
The security questions are often made up of pieces of information | 0:26:28 | 0:26:32 | |
that are freely available - | 0:26:32 | 0:26:34 | |
things like my mother's maiden name or where I was born. | 0:26:34 | 0:26:36 | |
Very often, it's these pieces of information that are used | 0:26:36 | 0:26:39 | |
to gain access to our most important online accounts. | 0:26:39 | 0:26:42 | |
But David says there are things you can do to protect yourself | 0:26:43 | 0:26:46 | |
and your identity. | 0:26:46 | 0:26:48 | |
First, see how many pieces of your own jigsaw puzzle | 0:26:48 | 0:26:51 | |
you can find online. | 0:26:51 | 0:26:53 | |
It's really important to be aware of what information is available | 0:26:54 | 0:26:57 | |
about you online, so do an internet search for yourself. | 0:26:57 | 0:27:01 | |
Look at family history websites, look at social networking profiles | 0:27:01 | 0:27:04 | |
and see what other information is available | 0:27:04 | 0:27:07 | |
and just get an idea as to how easy it would be, | 0:27:07 | 0:27:09 | |
if a criminal were wanting to create a picture of you, | 0:27:09 | 0:27:13 | |
to impersonate you online. | 0:27:13 | 0:27:14 | |
But there's no need to start trying to delete every piece of information | 0:27:14 | 0:27:19 | |
you find out about yourself online. | 0:27:19 | 0:27:21 | |
Just make sure none of it matches the details | 0:27:21 | 0:27:24 | |
used for any vital passwords. | 0:27:24 | 0:27:26 | |
We are not in control of all the information that's about us online. | 0:27:27 | 0:27:32 | |
Unfortunately, fraud happens. | 0:27:32 | 0:27:34 | |
Sometimes it's impossible to stop it. | 0:27:34 | 0:27:36 | |
The best thing that we can do, as consumers, is to be vigilant, | 0:27:36 | 0:27:40 | |
be careful about the information that we share. | 0:27:40 | 0:27:42 | |
And don't use user names and passwords and PINs | 0:27:42 | 0:27:46 | |
and security questions across multiple sites. | 0:27:46 | 0:27:49 | |
It's like using the same key for your front door, | 0:27:49 | 0:27:51 | |
your back door, your safe, your car. | 0:27:51 | 0:27:53 | |
It's not something you would ever do in real life, so don't do it online. | 0:27:53 | 0:27:56 | |
Still to come on Rip-Off Britain, a pair of supershredders help us | 0:28:04 | 0:28:08 | |
to test out the latest ways to keep our identity safe. | 0:28:08 | 0:28:12 | |
But will they be enough? | 0:28:12 | 0:28:13 | |
How do you keep yourself secure? | 0:28:13 | 0:28:16 | |
Because it doesn't matter what happens, | 0:28:16 | 0:28:18 | |
somebody will find a way round it. | 0:28:18 | 0:28:21 | |
Every year, we take Rip-Off Britain out on the road | 0:28:26 | 0:28:28 | |
to a busy shopping centre | 0:28:28 | 0:28:30 | |
and this year, it was one of the country's biggest - | 0:28:30 | 0:28:33 | |
Manchester's Trafford Centre. | 0:28:33 | 0:28:35 | |
-Hello. -So lovely to see you in the flesh. -Thank you. | 0:28:35 | 0:28:37 | |
Amongst those calling in for help were Gemma and Daniel Pugh. | 0:28:37 | 0:28:41 | |
It's almost their second wedding anniversary | 0:28:41 | 0:28:44 | |
but, as they explained to Trading Standards officer Sylvia Rook, | 0:28:44 | 0:28:47 | |
a key memento of their big day still hasn't arrived. | 0:28:47 | 0:28:52 | |
We hired a wedding photographer in 2014 for our wedding. | 0:28:52 | 0:28:56 | |
And on the day, everything was fine, everything was perfect. | 0:28:56 | 0:28:59 | |
They took the pictures and we had to chase them up for the photographs | 0:28:59 | 0:29:05 | |
to come on an album and still, two years later, | 0:29:05 | 0:29:08 | |
-we've not got our wedding album. -That's dreadful! | 0:29:08 | 0:29:12 | |
Daniel chased up the photographer by email, telephone and text. | 0:29:12 | 0:29:15 | |
After five months, a CD of some of the photographs arrived | 0:29:15 | 0:29:20 | |
but it was by no means complete. | 0:29:20 | 0:29:22 | |
There's photographs of family members and the bridesmaids | 0:29:22 | 0:29:25 | |
that we remember him taking and we've not got any evidence of that. | 0:29:25 | 0:29:30 | |
As for why they've yet to receive that all-important wedding album, | 0:29:30 | 0:29:34 | |
despite plenty more emails, calls and texts, | 0:29:34 | 0:29:37 | |
well, they've just received a catalogue of excuses. | 0:29:37 | 0:29:40 | |
We were told that it had been ordered from France | 0:29:40 | 0:29:43 | |
and he was waiting for it to arrive and it never came | 0:29:43 | 0:29:46 | |
and then we got told they'd ordered another one later that year | 0:29:46 | 0:29:49 | |
and, again, that never came. | 0:29:49 | 0:29:51 | |
And every time we've been in touch, it's always been, | 0:29:51 | 0:29:54 | |
"The suppliers are not very good" or "I'm waiting on it." | 0:29:54 | 0:29:57 | |
The photographer's website has now disappeared | 0:29:57 | 0:30:00 | |
and he's stopped responding to the couple altogether, | 0:30:00 | 0:30:03 | |
so Sylvia thinks there's only one thing for it. | 0:30:03 | 0:30:05 | |
-So, you had a formal contract. -Yes. -So you've got his name, his address. | 0:30:05 | 0:30:09 | |
-Yes. -Do you know if he's still at the same address? Have you any idea? | 0:30:09 | 0:30:12 | |
-Yes. -He is. | 0:30:12 | 0:30:13 | |
Right, what I think you're going to have to do now, | 0:30:13 | 0:30:15 | |
you're going to have to sue him. | 0:30:15 | 0:30:16 | |
It's a simple process online | 0:30:16 | 0:30:18 | |
and although they have to pay out an initial fee of £70, | 0:30:18 | 0:30:21 | |
if the couple win, they'll get that cost back. | 0:30:21 | 0:30:24 | |
I'm sorry it's been such a miserable experience | 0:30:24 | 0:30:27 | |
-and it's dragged on for such a long time. -Yeah. | 0:30:27 | 0:30:29 | |
-I think the problem is you can never get back what you've lost. -Yes. | 0:30:29 | 0:30:32 | |
-That's the hardest thing. Good luck with this. -Thank you. | 0:30:32 | 0:30:35 | |
-All right, thank you. -Thank you. | 0:30:35 | 0:30:37 | |
I think it's given us a bit more confidence | 0:30:38 | 0:30:41 | |
to know what the next step is and how we can move onto it. | 0:30:41 | 0:30:45 | |
Gemma and Daniel have followed Sylvia's advice | 0:30:45 | 0:30:48 | |
and are suing the photographer. | 0:30:48 | 0:30:50 | |
They're reconciled to never seeing their wedding album | 0:30:50 | 0:30:53 | |
but they're very hopeful that they will get back | 0:30:53 | 0:30:55 | |
at least some of the cash they paid out. | 0:30:55 | 0:30:57 | |
Who doesn't like a really good moan now and again? | 0:31:01 | 0:31:04 | |
Well, this is what we call our Gripe Corner here at the pop-up shop, | 0:31:04 | 0:31:08 | |
and all you have to do is just turn up with your gripe or your moan, | 0:31:08 | 0:31:11 | |
we switch on the camera and off you go. Simple. | 0:31:11 | 0:31:14 | |
And not only was it a simple complaint that these shoppers had, | 0:31:14 | 0:31:17 | |
it's one that comes around time and time again. | 0:31:17 | 0:31:20 | |
-Potholes. -Potholes. -Potholes. | 0:31:20 | 0:31:23 | |
What really drives me nuts is how I'm driving to work | 0:31:23 | 0:31:25 | |
and there's potholes everywhere. | 0:31:25 | 0:31:27 | |
I was driving along the other week | 0:31:27 | 0:31:29 | |
and I hit a big pothole which damaged my wheel. | 0:31:29 | 0:31:31 | |
I'm quite a keen cyclist, so really, from that point of view, | 0:31:31 | 0:31:34 | |
they're deadly as well. | 0:31:34 | 0:31:36 | |
It's annoying cos I'm swerving | 0:31:36 | 0:31:38 | |
and it's dangerous to me and other drivers. | 0:31:38 | 0:31:39 | |
We pay our council tax | 0:31:39 | 0:31:41 | |
and the potholes in the road are absolutely terrible. | 0:31:41 | 0:31:44 | |
I've written to the council, nothing's happened. | 0:31:44 | 0:31:46 | |
It's a really big rip-off. | 0:31:46 | 0:31:48 | |
All our experts spend time chatting to passers-by, | 0:31:48 | 0:31:51 | |
including Martyn James, who was testing shoppers' knowledge | 0:31:51 | 0:31:54 | |
on the sort of issues he hears in his day-to-day job | 0:31:54 | 0:31:57 | |
at the Financial Ombudsman Service. | 0:31:57 | 0:32:00 | |
He's come up with a true or false quiz, | 0:32:00 | 0:32:02 | |
based on some very common consumer questions. | 0:32:02 | 0:32:05 | |
So, these are money urban myths. OK, guys, true or false. | 0:32:05 | 0:32:10 | |
-Is there such a thing as a debt blacklist? -Yeah. | 0:32:12 | 0:32:15 | |
-Yeah, there probably is. -False, I think. -True maybe? | 0:32:15 | 0:32:20 | |
-True? -True, yeah. -True? -Sounds like it could be true. | 0:32:20 | 0:32:23 | |
No, definitely not. Definitely not. | 0:32:23 | 0:32:26 | |
-There we go. -He's right. It's false. Good news. There isn't a blacklist. | 0:32:27 | 0:32:32 | |
If you miss payments or you get into trouble with your finances, | 0:32:32 | 0:32:35 | |
they'll sometimes log things with a credit reference agency. | 0:32:35 | 0:32:38 | |
They don't have a list with your name on it | 0:32:38 | 0:32:40 | |
that they share with other banks. | 0:32:40 | 0:32:41 | |
But perhaps it's no wonder that they weren't all right. | 0:32:41 | 0:32:45 | |
In a recent survey by Which?, | 0:32:45 | 0:32:47 | |
three-quarters of people thought that a backlist like this | 0:32:47 | 0:32:50 | |
does exist and Martyn knows better than most | 0:32:50 | 0:32:53 | |
how much confusion there can be around pensions. | 0:32:53 | 0:32:56 | |
So, let's see how the shoppers got on with his next question. | 0:32:56 | 0:32:59 | |
-True, I think. -I'd have thought, yeah. | 0:33:02 | 0:33:04 | |
I thought you did have to retire to get it cos it's your work, isn't it? | 0:33:04 | 0:33:07 | |
You're working, aren't you? | 0:33:07 | 0:33:08 | |
False. You can get drawdown pensions, I believe. | 0:33:08 | 0:33:11 | |
And the answer is... | 0:33:11 | 0:33:13 | |
False. So, for the state pension, which is 67 at the moment, | 0:33:13 | 0:33:17 | |
you have to wait for that one. | 0:33:17 | 0:33:19 | |
-But for your work pension, you can take it at 55. -Oh, right. | 0:33:19 | 0:33:22 | |
And you can get 25% of it tax-free | 0:33:22 | 0:33:24 | |
and you can still carry on working and take your pension. | 0:33:24 | 0:33:27 | |
And finally, a myth that Martyn often comes across | 0:33:27 | 0:33:31 | |
and, indeed, catches consumers out. | 0:33:31 | 0:33:33 | |
If you get burgled, can you make a claim | 0:33:34 | 0:33:36 | |
if you don't have receipts for the things that you bought? | 0:33:36 | 0:33:39 | |
False, because sometimes you can have | 0:33:39 | 0:33:41 | |
a bank statement that's like a receipt anyway. | 0:33:41 | 0:33:44 | |
-Yeah, you can make a claim. -You can make a claim, yes. | 0:33:44 | 0:33:46 | |
You can't have receipts for everything. | 0:33:46 | 0:33:48 | |
So, do you need receipts to make a claim if you get burgled? | 0:33:48 | 0:33:51 | |
-Course you do, definitely. -Definitely? -100%. -100% sure? | 0:33:51 | 0:33:54 | |
100% sure. | 0:33:54 | 0:33:55 | |
-False. -Oh. | 0:33:56 | 0:33:57 | |
Have a look for photos and stuff that might have copies | 0:33:57 | 0:34:00 | |
of you wearing jewellery or things like that. | 0:34:00 | 0:34:02 | |
Put those into the insurance company | 0:34:02 | 0:34:04 | |
-and they should work in a similar way to receipts. -Right. | 0:34:04 | 0:34:07 | |
-So always take photos of everything, basically. -Yeah. | 0:34:07 | 0:34:10 | |
-Less selfies, more photos of your living room. -Oh, yeah. | 0:34:10 | 0:34:13 | |
Now, today's episode is, of course, all about how our identities | 0:34:16 | 0:34:19 | |
and our bank details are prime targets for thieves and fraudsters. | 0:34:19 | 0:34:23 | |
It's not that they necessarily target any one person specifically, | 0:34:23 | 0:34:27 | |
just that some of us, I'm afraid, make ourselves easy targets | 0:34:27 | 0:34:31 | |
by not keeping our details as safe as we could. | 0:34:31 | 0:34:33 | |
But the couple in our next film pride themselves | 0:34:33 | 0:34:36 | |
on being quite the reverse of that, | 0:34:36 | 0:34:38 | |
doing all that they can to make sure that the crooks | 0:34:38 | 0:34:41 | |
don't have even the slightest chance of stealing their identities. | 0:34:41 | 0:34:44 | |
And if, like them, you're a supershredder, | 0:34:44 | 0:34:47 | |
you might be pleased to discover | 0:34:47 | 0:34:48 | |
that the battle to protect your identity | 0:34:48 | 0:34:51 | |
isn't one that you need to fight on your own. | 0:34:51 | 0:34:53 | |
Do you want to help me with this shredding? | 0:34:53 | 0:34:55 | |
-There's quite a bit. -Mmm-hmm. | 0:34:55 | 0:34:56 | |
John and, especially, Liz Cooper, are self-confessed shredaholics. | 0:34:56 | 0:35:02 | |
That's got your name and address on the inside of it. | 0:35:02 | 0:35:05 | |
Their shredder is permanently plugged | 0:35:05 | 0:35:07 | |
in the corner of the living room. | 0:35:07 | 0:35:09 | |
Every day, they shred anything and everything | 0:35:09 | 0:35:11 | |
that has their names and address on it, | 0:35:11 | 0:35:13 | |
from junk mail to official letters and much more besides. | 0:35:13 | 0:35:17 | |
That's the lot. | 0:35:18 | 0:35:19 | |
You have to shred everything that's got your address on | 0:35:20 | 0:35:23 | |
if you want to be safe. | 0:35:23 | 0:35:24 | |
So much junk mail that comes through the post | 0:35:24 | 0:35:27 | |
has got personal details on it, | 0:35:27 | 0:35:29 | |
so you have to shred those, particularly name and address. | 0:35:29 | 0:35:34 | |
We get a lot of mail from the hospital and the surgery | 0:35:34 | 0:35:37 | |
and that's not just got your name and address on, | 0:35:37 | 0:35:40 | |
it's got your NHS number and sometimes your hospital number. | 0:35:40 | 0:35:44 | |
We get things from the pension people | 0:35:44 | 0:35:47 | |
which has got your national insurance number on. | 0:35:47 | 0:35:50 | |
It all has to be shredded because it can all be used. | 0:35:50 | 0:35:54 | |
But we've heard from an ex-police officer | 0:35:54 | 0:35:58 | |
that crooks are actually able to piece together | 0:35:58 | 0:36:03 | |
the minute cross...cross-bits of paper | 0:36:03 | 0:36:06 | |
that come out of cross shredders now. | 0:36:06 | 0:36:08 | |
So, where do you stop? How do you keep yourself secure? | 0:36:08 | 0:36:13 | |
Because it doesn't matter what happens... | 0:36:13 | 0:36:16 | |
..somebody will find a way round it. | 0:36:18 | 0:36:20 | |
There's criminals just as clever | 0:36:20 | 0:36:22 | |
as some of these people inventing stuff. | 0:36:22 | 0:36:23 | |
And if Liz and John are careful with the contents of their postbox, | 0:36:25 | 0:36:28 | |
they're even more vigilant when they venture online. | 0:36:28 | 0:36:31 | |
I think the internet has become a springboard for identity theft, | 0:36:32 | 0:36:38 | |
fraudulent selling. | 0:36:38 | 0:36:40 | |
You hear such scare stories on the TV and in the newspapers | 0:36:40 | 0:36:46 | |
about what has happened with cards and internet banking | 0:36:46 | 0:36:50 | |
and all this, that and the other. | 0:36:50 | 0:36:52 | |
And yet people still blindly buy things over the internet. | 0:36:52 | 0:36:58 | |
But actually, Liz might have less to fear in the future. | 0:36:58 | 0:37:02 | |
Some experts reckon that the internet may yet end up safer | 0:37:02 | 0:37:06 | |
than the traditional paper-based ways of doing business, | 0:37:06 | 0:37:09 | |
whether or not you shred the evidence. | 0:37:09 | 0:37:11 | |
Mike Haley from Cifas, | 0:37:11 | 0:37:13 | |
a not-for-profit organisation that helps businesses fight fraud, | 0:37:13 | 0:37:17 | |
believes that new technology could be the key | 0:37:17 | 0:37:20 | |
to finally defeating identity theft once and for all. | 0:37:20 | 0:37:23 | |
Currently, the ways that we protect our identity | 0:37:24 | 0:37:27 | |
are through things like passwords, PIN numbers | 0:37:27 | 0:37:30 | |
and what's called knowledge-based verification. | 0:37:30 | 0:37:32 | |
That is secret questions or words or information that only you know. | 0:37:32 | 0:37:36 | |
But I think these are now being cracked by criminals and fraudsters, | 0:37:36 | 0:37:40 | |
so new technology is coming in play to protect us even more. | 0:37:40 | 0:37:45 | |
And one particularly exciting way it's doing that | 0:37:45 | 0:37:48 | |
is through biometrics, | 0:37:48 | 0:37:50 | |
which basically means we can be identified, | 0:37:50 | 0:37:52 | |
not by passwords, but by our own unique natural features. | 0:37:52 | 0:37:57 | |
The new technologies that are being adopted and implemented | 0:37:57 | 0:38:01 | |
at this very moment include things like facial recognition, | 0:38:01 | 0:38:04 | |
your thumbprint or fingerprint or iris scanning, | 0:38:04 | 0:38:07 | |
and that's protecting people from those who pretend to be you. | 0:38:07 | 0:38:11 | |
It's all very clever stuff and the next step will be technology | 0:38:11 | 0:38:15 | |
that can sense when somebody else is using your phone | 0:38:15 | 0:38:18 | |
or trying to access your account, just by the way they behave. | 0:38:18 | 0:38:22 | |
So, with behavioural analytics, | 0:38:22 | 0:38:25 | |
there is a record on, say, your mobile phone, | 0:38:25 | 0:38:28 | |
of how you normally hold it, how you actually use it. | 0:38:28 | 0:38:31 | |
If somebody else gets hold of your device, | 0:38:31 | 0:38:34 | |
even if they can access through the password, for example, | 0:38:34 | 0:38:37 | |
then that fingerprint that you've left, | 0:38:37 | 0:38:39 | |
in terms of your behaviour, can be picked up. | 0:38:39 | 0:38:42 | |
But to beat the identity thieves, | 0:38:42 | 0:38:44 | |
Mike thinks that in the future, online security will rely on | 0:38:44 | 0:38:48 | |
a whole range of different solutions and technologies. | 0:38:48 | 0:38:51 | |
There's going to be a mixture of different levels | 0:38:51 | 0:38:54 | |
of authentication - maybe some behavioural analytics, | 0:38:54 | 0:38:58 | |
some biometrics - and together, | 0:38:58 | 0:39:00 | |
that will be a better protection for the individual. | 0:39:00 | 0:39:04 | |
So, it's time now to put this brave new world to the test | 0:39:04 | 0:39:07 | |
and see if some of this latest technology can win over | 0:39:07 | 0:39:10 | |
one of Britain's most security-conscious pensioners. | 0:39:10 | 0:39:14 | |
-Hi, Liz. Welcome to ievo. -Thank you. -Hi, John. Come on in. | 0:39:14 | 0:39:17 | |
Shaun Oakes is the boss of ievo, a security solutions company, | 0:39:17 | 0:39:21 | |
and is going to give Liz a test drive | 0:39:21 | 0:39:23 | |
of their cutting-edge biometrics. | 0:39:23 | 0:39:26 | |
-OK, shall we have a look around? -That would be lovely, thank you. | 0:39:26 | 0:39:30 | |
What do you think you need to do now to be able to gain access? | 0:39:30 | 0:39:33 | |
-Put my fingerprint on it. -OK, fire away. | 0:39:33 | 0:39:35 | |
But Liz still has her concerns. | 0:39:36 | 0:39:39 | |
That's OK, but what happens to my fingerprint now? | 0:39:39 | 0:39:42 | |
It's a good question. We don't actually store your fingerprint. | 0:39:42 | 0:39:45 | |
You cannot reengineer an exact fingerprint | 0:39:45 | 0:39:47 | |
from the data we store, plus it's encrypted data as well. | 0:39:47 | 0:39:51 | |
It's the same technology built into many smartphones and computers | 0:39:51 | 0:39:55 | |
and with banks now adopting it as well, | 0:39:55 | 0:39:57 | |
fingerprint recognition could well prove the most effective weapon | 0:39:57 | 0:40:01 | |
in the battle to keep our data safe. | 0:40:01 | 0:40:04 | |
Every fingerprint in the world is completely unique. | 0:40:04 | 0:40:06 | |
Even identical twins don't have the same fingerprint. | 0:40:06 | 0:40:09 | |
We also have something that you can turn on called spoof detection. | 0:40:09 | 0:40:12 | |
What spoof detection does is checks that it's a real finger. | 0:40:12 | 0:40:15 | |
So, where you see in some Hollywood movies, | 0:40:15 | 0:40:18 | |
where somebody's trying to copy a fingerprint or dust for it, | 0:40:18 | 0:40:20 | |
this would actually detect if it's a fake finger. | 0:40:20 | 0:40:23 | |
So, it's no good anybody cutting my finger off and using it to get in? | 0:40:23 | 0:40:27 | |
-No. -Good old Liz. | 0:40:27 | 0:40:29 | |
And the more basic type of fingerprint technology | 0:40:29 | 0:40:31 | |
is already on sale for connection to home computers. | 0:40:31 | 0:40:35 | |
For yourself, for identity fraud, | 0:40:35 | 0:40:36 | |
there are already available on the market, | 0:40:36 | 0:40:38 | |
systems where you actually use your fingerprint | 0:40:38 | 0:40:40 | |
on your own PC at home to replace all of your passwords. | 0:40:40 | 0:40:44 | |
So it completely locks it down, it gives you added security. | 0:40:44 | 0:40:46 | |
You don't ever have to remember your passwords | 0:40:46 | 0:40:48 | |
-once you've added this system. -Well, that's perfect for me | 0:40:48 | 0:40:51 | |
because I'm always forgetting passwords and PIN numbers. | 0:40:51 | 0:40:54 | |
I mean, that's an answer to a prayer, really. | 0:40:54 | 0:40:57 | |
So, it's a qualified thumbs up from Liz. | 0:40:58 | 0:41:01 | |
But Mike Haley of Cifas says that, however good the security in place, | 0:41:01 | 0:41:05 | |
we'll always need to stay on our guard | 0:41:05 | 0:41:07 | |
to be sure that our details are safe. | 0:41:07 | 0:41:09 | |
I think, regardless of the new technologies, | 0:41:10 | 0:41:13 | |
and introduction of new techniques, such as biometrics, | 0:41:13 | 0:41:17 | |
we still need to keep responsibility and protect ourselves. | 0:41:17 | 0:41:20 | |
As for Liz and John, | 0:41:20 | 0:41:22 | |
they won't be getting rid of their trusty shredder just yet. | 0:41:22 | 0:41:26 | |
We've definitely learned a lot and we'll put a lot into action | 0:41:26 | 0:41:30 | |
that we've learned today, but until we can, we'll continue to shred. | 0:41:30 | 0:41:35 | |
If you've got a story you'd like us to investigate, | 0:41:43 | 0:41:45 | |
then you can get in touch with us via our Facebook page, | 0:41:45 | 0:41:49 | |
BBC Rip off Britain, | 0:41:49 | 0:41:51 | |
our website, bbc.co.uk/ripoffbritain, | 0:41:51 | 0:41:55 | |
or email... | 0:41:55 | 0:41:58 | |
And, of course, you can always send us a letter to our postal address. | 0:42:01 | 0:42:04 | |
Now, I have to say I was astonished by that story on contactless cards. | 0:42:17 | 0:42:22 | |
After all those years of being told that they're perfectly secure, | 0:42:22 | 0:42:25 | |
it was quite a shock to see how easily those details | 0:42:25 | 0:42:27 | |
could be used by somebody else. | 0:42:27 | 0:42:29 | |
Well, I don't use one at all but my husband does | 0:42:29 | 0:42:32 | |
and I was really reassured to see | 0:42:32 | 0:42:34 | |
that there is a very simple solution. | 0:42:34 | 0:42:36 | |
So while it's clear this isn't something | 0:42:36 | 0:42:38 | |
that any of us need to panic about, | 0:42:38 | 0:42:39 | |
it probably is worth paying a couple of quid | 0:42:39 | 0:42:42 | |
to keep your card in one of those protective holders. | 0:42:42 | 0:42:44 | |
And, equally, it was very heartening | 0:42:44 | 0:42:47 | |
to see how hard organisations are working | 0:42:47 | 0:42:49 | |
to make sure that all our personal details are kept nice and safe. | 0:42:49 | 0:42:52 | |
But, of course, we have to remember | 0:42:52 | 0:42:54 | |
that it is down to each one of us to take personal responsibility, | 0:42:54 | 0:42:57 | |
whether that's by shredding our bills | 0:42:57 | 0:42:59 | |
or being just that extra bit scrupulous | 0:42:59 | 0:43:01 | |
about the people and organisations | 0:43:01 | 0:43:03 | |
to whom we give our personal information. | 0:43:03 | 0:43:05 | |
But don't forget, you'll find plenty more information | 0:43:05 | 0:43:08 | |
on how to keep your identity safe on our website. | 0:43:08 | 0:43:10 | |
But for now, that's all we've got time for today. | 0:43:13 | 0:43:16 | |
It has been great having you with us | 0:43:16 | 0:43:17 | |
and I hope we'll see you again very soon. | 0:43:17 | 0:43:19 | |
-Until then, from all of us, bye-bye. -Bye-bye. -Bye-bye. | 0:43:19 | 0:43:22 |