The most common device used amongst identity thieves is a “skimmer” (Alberecht, 2011). The device is used to collect personal information from machines that an individual would use to swipe their credit card. A skimmer works identically to the machine that processes an individual’s credit card, but rather than sending the information to a bank, the information is fed directly to the perpetrator. Examples of such machines that are targeted by identity thieves are ATM machines and gas pumps because their location is often accompanied with very little, or sometimes no security. As a result, perpetrators can freely use skimmers on ATM’s and gas pumps during off hours and obtain credit card information from potentially hundreds of …show more content…
As an increasingly popular trend, the network security of companies is constantly being upgraded or patched in order to close up possible “loop holes” in the system. Hacking is a process during which a perpetrator(s) attempts to bypass the security of a company’s system in order to gain access to a mass amount of personal information. This method has become a common practice among identity thieves due to prior cases of success that hackers have had. For example, in 2011 a hacker had successfully hacked into Sony’s network and had gained access to approximately 77 million users personal information including names, addresses, usernames, and passwords (Baker & Finkle, 2011). Although hacking into a company’s network is seldom an easy task, the volume of personal information than could be compromised for doing so serves as motivation for hackers to “crack the