Identity Theft Research Paper

Improved Essays
The four most vital pieces of information for an identity thief is an individual’s name, home address, social security number, a bank account number. A thief may not be able to obtain all four pieces, but other personal information such as a date of birth may be stolen instead. In today’s contemporary society, there are three main forms of identity theft. The first and also most common form of theft is an individual’s financial identity. This form of identity theft is most widely known because the reason for stealing such information is to purchase items at the expense of the victim. This is typically carried out by either opening credits card in the victim’s name, or draining the money saved in his or her bank account (Norum, 2007). The …show more content…
The most common device used amongst identity thieves is a “skimmer” (Alberecht, 2011). The device is used to collect personal information from machines that an individual would use to swipe their credit card. A skimmer works identically to the machine that processes an individual’s credit card, but rather than sending the information to a bank, the information is fed directly to the perpetrator. Examples of such machines that are targeted by identity thieves are ATM machines and gas pumps because their location is often accompanied with very little, or sometimes no security. As a result, perpetrators can freely use skimmers on ATM’s and gas pumps during off hours and obtain credit card information from potentially hundreds of …show more content…
As an increasingly popular trend, the network security of companies is constantly being upgraded or patched in order to close up possible “loop holes” in the system. Hacking is a process during which a perpetrator(s) attempts to bypass the security of a company’s system in order to gain access to a mass amount of personal information. This method has become a common practice among identity thieves due to prior cases of success that hackers have had. For example, in 2011 a hacker had successfully hacked into Sony’s network and had gained access to approximately 77 million users personal information including names, addresses, usernames, and passwords (Baker & Finkle, 2011). Although hacking into a company’s network is seldom an easy task, the volume of personal information than could be compromised for doing so serves as motivation for hackers to “crack the

Related Documents

  • Improved Essays

    In most cases victims are unaware that they are even victims until it is too late to do anything about the theft and there is already a multitude of debt built up in our name. There are so many different ways that identity theft is done these days that the best line of defense is to stay visitant and keep a journal of all expenditures, and check your credit reports regularly. In this chapter we learn that Staying alert to our credit monitoring is like setting a home alarm system (Kapoor, Dlabay, L, & Hughes, 2014). If when checking through financial records and credit reports if there is anything that seems peculiar or out of place immediately dispute and investigate to make sure if it is as simple as a billing error or in fact your identity has been compromised. If you do find that your identity has been stolen immediately report to the appropriate agencies (Kapoor, Dlabay, L, & Hughes, 2014).…

    • 1549 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    IS3110 Lab Answers

    • 739 Words
    • 3 Pages

    What is Identity robbery? Fraud is a type of taking somebody's character in which somebody puts on a show to be you with a specific end goal to have entry to assets, for example, getting your bank data, Visa numbers, and passwords to get to your own data. 9. How is fraud done? Fraud is finished by utilizing a PC, experiencing somebody's waste, skimming gadgets, spyware and programmers utilize a savvy project to have admittance to your money related data.…

    • 739 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Repercussions Of Crimes

    • 1460 Words
    • 6 Pages

    It can hinder them from purchasing, a home, a car and even something as simple as receiving their tax refund. Individuals work very hard to build up their names so that they can be seen a responsible adults when they need wish to speak to lenders and for someone to completely hijack their life is the most outrageous form of no physical violence I can think of, because I wish to own a home, get a nicer vehicle and so…

    • 1460 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    Home Depot Fraud Essay

    • 1360 Words
    • 6 Pages

    November 6, 2014, Home Depot Inc., the world’s largest home improvement retailer was hacked by cybercriminals. Hackers gained access to Home Depot Inc., systems by stealing a password from a vendor. The hackers were able to breach Home Depot computer system and steal information for 56 million credit and debit card accounts and 53 million email address of customers. Although, the hackers had only access to the perimeter of Home Depot networks it was a vulnerability in Microsoft Windows which allowed them to fully breach the network. Moreover, the hackers were able to infiltrate the company’s point-of-sale system using high lever permissions, which allowed them to deploy malware on Home Depot self -check out system.…

    • 1360 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    Emr System Pros And Cons

    • 437 Words
    • 2 Pages

    Identity theft can occur when unauthorized people gain access to confidential and sensitive records. Data loss is a major…

    • 437 Words
    • 2 Pages
    Decent Essays
  • Decent Essays

    Macy's Research Paper

    • 141 Words
    • 1 Pages

    Data breach has been rising in the United States and in other countries as well, leaving customers vulnerable to identity theft. Customers also can get their credit history damaged. Thousands of people are affected by this situation more frequently when they make their purchases online as well as in the stores when using credit cards. Since the use of credit cards is the most convenient way to pay for a purchase for customers, scammers take advantage of it to commit their frauds.…

    • 141 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    The Michigan Incident Crime Reporting (MICR) Section has listed that Michigan’s auto thefts have risen 28% from 2015 to 2016. Reasons for current theft increases may include the following: 1. Anti-theft technologies have driven thieves to become more proficient in falsified paper crimes such as identity theft or false titles and documents used in the fraudulent purchases of an automobile. False identification is used in car rental companies where the thief acquires a vehicle and fails to return it. 2.…

    • 567 Words
    • 3 Pages
    Decent Essays
  • Superior Essays

    Robbery: The Victims and Offenders Julio M. Guerrero Tarleton State University DISPATCH: “Attention all units, Attention all units. A robbery just occurred at the Chase bank. Suspect is armed and dangerous. Suspect left the scene in a small car heading south.” UNIT: “Clear dispatch.…

    • 1573 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    After they’ve itemized every bill and have made payments to all they owe, they toss their bills and do not want to see them anymore. Bills may contain critical personal information such as their name, address, credit card and bank account numbers. After those bills are tossed, the information can get into the hands of dumpster diving perpetrators. Dumpster diving is exactly what is sounds like. “Dumpster diving occurs when someone goes through someone else’s garbage to obtain personal identifiable information off items found in the trash, such as credit card bills, utility bills, medical insurance, and bank statements” (Most Common Schemes, 2009).…

    • 834 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    As a cyber-based attacking mechanism, identity spoofing can be used to accomplish a variety of tasks or goals. Notably, by assuming the identity of someone or something, a skilled attacker can gain access to some unauthorized area, by using forged credentials, or can even obtain useful details or information from other persons, based on information published within the CAPEC community (“CAPEC-151: Identity Spoofing,” 2017). As an example, an attacker who intercepts a communication between two parties, and assumes the identity of a one of the associated parties, may be able to deceive the opposing party into providing critical details, such as credentials. Likewise, identity spoofing can be used to accomplish goals relative to gaining access…

    • 234 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    In the article, “All It Takes To Buy A Stolen Password On The Internet Is 55 Cents”, it indicates how simple it is to hijack someone’s entire digital identity. There was a report done by Intel Security Group's McAfee Labs which found an online streaming video that provides login credentials that could be bought for only fifty-five cents. The report investigated the world of buying and selling stolen digital information online. Everything from financial data and online services to a person's entire digital identity can be bought and attained by anyone. These researchers monitored various websites and chat rooms and found out that stolen credit card information is sold for five to eight dollars for a basic U.S. card number and twenty-five to…

    • 688 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    Every year identity theft has risen and the impact is causing the consumers millions of dollars. These crimes have been ranked by the Federal Trade Commission as the number one complained over the last fifteen years. According to Federal Trade Commission (2015), thirteen percent of the complaints by consumers are regarding identify theft. The identity theft assumption and deterrence act of 1998 required that the FTC to log and acknowledge complaints of victims and provide them with relevant information, and refer their complaints to the appropriate channels. Identity fraud has impacted over 13 million Americans and the act of collecting credit information from unsuspecting consumers involves a variety tactics; these tactics includes, mail theft,…

    • 140 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Essay On Identity Theft

    • 1122 Words
    • 4 Pages

    Identity Theft Now a day’s identity theft is made more possible because of the nature of modern payment systems. Identity theft involves getting enough data about another person to forge a link, allowing the thief to obtain goods and services all while using the charge from another person’s account. Unspecified data-based connections have characterized the credit payment system for years now. In recent years wholesale trade has become even more anonymous and more reliant on consumer data, as internet trade has grown and wider variety of sellers have begun to offer immediate credit to clients based on their credit card reports (Anderson, Durbin, Salinger). Medical Identity Theft…

    • 1122 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Technologic Thieves Essay

    • 751 Words
    • 4 Pages

    (Verini). Gonzalez was so successful stealing information from retail store’s customers that smaller franchises could not spot the harm and in some cases, leaving those franchises in bankruptcy. Although credit card theft may be a leading factor of Identity thefts in the United States, numerous amount of people have been caught stealing social security numbers and reporting false information on tax forms. For instance, according to the IRS, on…

    • 751 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Causes Of Robbery Essay

    • 832 Words
    • 4 Pages

    National Bureau of Investigation defines robbery as the taking or attempting to take anything of value from the care, custody or control of a person by force, threat or violence. There are two factors of robbery and first was taken by means of force or fear; and second is that the theft was from the victim or from its personal property. The most important evidence in a robbery is putting the victims in fear of taking his/her belongings by force. Some crimes of robbery are by hurting a person physically while taking his wallet or by taking his/her bag forcefully.…

    • 832 Words
    • 4 Pages
    Improved Essays