Identity Theft Research Paper

Improved Essays
Identity theft is when a criminal obtains the personal information that belongs to someone else in order for personal of financial gain. The criminal can steal a Social Security number or a driver’s license number to pose as the person that the information was stolen from. For example, the information can be used to help the criminal get credit cards, material things, and sometimes false credentials for immigrants. In order to obtain personal information, identity thieves can hack into computer systems. They can obtain what they need from trash cans. They can also look over a victim’s shoulder while they are going to the ATM for instance. Two main types of identity theft are account takeover and true name theft. Account takeover is when the criminal gets access to the accounts that the victim has already opened. They use this method to acquire material things. The bills come to a different address so that they are never seen by the victim until debt collectors are calling for debts they didn’t accumulate. The true name identity thief uses the victim’s information to set up new accounts such as credit cards, cell phones, or even checking accounts. The government is doing what they can do the combat the issue of identity theft. This is a crime that could be hard to …show more content…
Thieves only require a few key pieces of information to commit identity theft. They need a victim’s name, address, Social Security number, bank account information, credit card account number, and passwords. There are a number of ways that thieves can get their hands on this information. A criminal can steal a person’s wallet or purse. Spam or phishing e-mails can be sent to an unsuspecting victim’s computer and allow the criminal to gain access this way. Hacking into a person’s computer with malicious software can also be helpful to an identity

Related Documents

  • Improved Essays

    In most cases victims are unaware that they are even victims until it is too late to do anything about the theft and there is already a multitude of debt built up in our name. There are so many different ways that identity theft is done these days that the best line of defense is to stay visitant and keep a journal of all expenditures, and check your credit reports regularly. In this chapter we learn that Staying alert to our credit monitoring is like setting a home alarm system (Kapoor, Dlabay, L, & Hughes, 2014). If when checking through financial records and credit reports if there is anything that seems peculiar or out of place immediately dispute and investigate to make sure if it is as simple as a billing error or in fact your identity has been compromised. If you do find that your identity has been stolen immediately report to the appropriate agencies (Kapoor, Dlabay, L, & Hughes, 2014).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    What is Identity robbery? Fraud is a type of taking somebody's character in which somebody puts on a show to be you with a specific end goal to have entry to assets, for example, getting your bank data, Visa numbers, and passwords to get to your own data. 9. How is fraud done? Fraud is finished by utilizing a PC, experiencing somebody's waste, skimming gadgets, spyware and programmers utilize a savvy project to have admittance to your money related data.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The first year to have statistical data on identity theft was 2005 which showed that 6.4 million residents were victims of identity theft to some extent (Bureau of Justice Statistics (BJS) Data Collection,…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    First of all, hackers are people who use the internet to gain access to other people’s private information with a malicious intent. They will attack innocent people and take their information for many reasons. Davis says that their behavior is anonymous and unethical. Identity theft is a form of hacking where people steal important information such as social security numbers, identification numbers, and credit cards. They can…

    • 644 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Identity theft can occur when unauthorized people gain access to confidential and sensitive records. Data loss is a major…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Data breach has been rising in the United States and in other countries as well, leaving customers vulnerable to identity theft. Customers also can get their credit history damaged. Thousands of people are affected by this situation more frequently when they make their purchases online as well as in the stores when using credit cards. Since the use of credit cards is the most convenient way to pay for a purchase for customers, scammers take advantage of it to commit their frauds.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Identity Theft Schemes and Methods There are many different types of schemes and methods that identity…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Critical Review #2: Identity crime and misuse in Australia: Results of the 2013 online survey Behind the article: Koubaridis (2014, n.p.), a crime news reporter for News Limited, states that ‘1 in 5 Australians have been victims of identity crime [due to] computer hacking, [and] online banking and shopping [are] to blame’. Koubaridis (2014) based the article’s research on a study conducted by the Australian Institute of Criminology. Russell G. Smith and Alice Hutchings from the Australian Institute of Criminology conducted this study in September 2013 (Smith and Hutchings 2014). Research data embedded within the article: Within the media article, there were five components that directly related back to the published research.…

    • 1370 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    As a cyber-based attacking mechanism, identity spoofing can be used to accomplish a variety of tasks or goals. Notably, by assuming the identity of someone or something, a skilled attacker can gain access to some unauthorized area, by using forged credentials, or can even obtain useful details or information from other persons, based on information published within the CAPEC community (“CAPEC-151: Identity Spoofing,” 2017). As an example, an attacker who intercepts a communication between two parties, and assumes the identity of a one of the associated parties, may be able to deceive the opposing party into providing critical details, such as credentials. Likewise, identity spoofing can be used to accomplish goals relative to gaining access…

    • 234 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    tremendously serious ways, they may lose the ability to access their financial identity, the ability to cask checks, obtain credit or buy a home, or they may even be arrested for a crime committed by identity thieves (Swecker2). In 2003 survey has shown that 4.6 percent of the United States population ages eighteen and older were victims of identity theft, 9.91 million of people lost over 52.6 billion dollar from only new account frauds (Swecker2). In another case “survey by the Bureau of Justice Statistic, victims reported losing over 24.7 billion dollar in direct and indirect costs because of identity theft in 2012” (Morton2). According to Swecker, identity theft has emerged as one of the most dominant white collar crime problem in the…

    • 348 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Identity theft has been a growing situation. It is something that continues to grow and having many people being affected by having their identity stolen. Technology makes it easier for individuals to steal someone's identity and use it to their own advantage. It is important for people to take the right precautions and keep information secure to prevent any identity theft from occurring. Keeping Information Private…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    What is a social engineering attack? What is a phishing attack? How do you avoid being a victim? Social engineering attack is when a person uses their social skills to obtain information about the organization or computer system. A phishing attack use email/websites to get personal information to gain access to the organization.…

    • 287 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    The Criminal Defense Lawyers say that “Like all criminal laws, identity theft laws differ from state to state, and there are also federal identity theft laws that have their own penalties. Being convicted of an identity theft crime can lead to incarcerations, fines, restitutions and probation.” In my opinion, I think that they should get a lot more than this. People that try and do steal people’s identity should have major consequences such a large amounts of jail time, really big fines and no chance of probation. These people that want to hide behind a computer deserve to get a large punishment.…

    • 1122 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Cause Of Identity Theft

    • 252 Words
    • 2 Pages

    I believe that in order to avoid identity theft we must educate ourselves on the value of our personal data because only then we can learn the habits necessary for maintaining good credit. Not knowing the consequences of handling our personal data irresponsibly is the leading cause of identity theft. I have witnessed my father engaging in such irresponsible actions that led to his bad credit and significantly affected his life. My father has always been losing his wallet once every few years, he carried all of his cards in it, and he could notice that it was missing only in one or two days. He was always irresponsible in tracking his stuff and indifferent to comments on such behavior.…

    • 252 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Causes Of Robbery Essay

    • 832 Words
    • 4 Pages

    National Bureau of Investigation defines robbery as the taking or attempting to take anything of value from the care, custody or control of a person by force, threat or violence. There are two factors of robbery and first was taken by means of force or fear; and second is that the theft was from the victim or from its personal property. The most important evidence in a robbery is putting the victims in fear of taking his/her belongings by force. Some crimes of robbery are by hurting a person physically while taking his wallet or by taking his/her bag forcefully.…

    • 832 Words
    • 4 Pages
    Improved Essays