Identity Theft Research Paper

Superior Essays
In criminalistics of computer forensics class I have learned all types of crimes from auction fraud, credit card fraud, cellular fraud and my absolute favorite topic which is identity theft. Everyone probably doesn’t think that identity theft is a real crime. Believe it or not identity theft is one of the topic crimes in America today. Identity theft is often in the news. It is sad because someone will profit off of another loses. Identity theft is where the illegal use of someone else 's personal information especially in order to obtain money or credit (Johnson, 2014). When it comes to identity theft there are all types of ways to commit identity theft. This paper will be an overview over all aspects of identity theft. After reviewing …show more content…
The types of identity thefts that happen are financial identity theft. Also, used in the first case due to her finances being tampered with. Financial identity theft is where there has been in breach in credit reports and bank accounts (Stroup, 2014). As I did my thesis paper on white collar crimes. I have come across insurance fraud. Insurance fraud means doctors’ offices and others that do not report certain claims. Insurance fraud can also be committed by not reporting monies that come into the business. Social Security identity theft when it comes to taken someone information. Social security fraud takes place when a party intentionally gives false information, conceals facts, or uses a Social Security number illegally to receive benefits from the Social Security system (Stroup, 2014). With someone’s information a suspect can purchase anything if they have access to the number. Social security numbers are something that people may only have to identify them. There are many other types of identity theft but these are the main ones that are normally brought to court and people are prosecuted for these …show more content…
There is always going to be someone who wants or tries to bet the system. With a lot of identity theft going on people have to keep the information safe, and secured. No matter how much they keep their information sometimes things to slip through the cracks unfortunately it is bad for those that do slip through the cracks. As a whole there many steps on how we can deter from identity theft. There is new technology that surfaces around the world every day. There is nonfinancial personal information you reveal online on day to day bases and that is enough for anyone who is fishing for information to obtain it. There should be a limit of information that is put on the websites today. Also, most information can be stolen while on vacation. Identity thieves love travelers and tourists. The reason they love is because they leave their important information out. They also ask questions sometimes using personal information. When this happens if you are on vacation or traveling anywhere and you notice that your information has been taken or used contact banks, credit burros and even the local police as soon as possible. Never use the same password for all of your accounts. Always change password from account to account. When you are in a store whether it is grocery, fast food or retail store pay attention at the checkout line. If a cashier or salesperson takes your card and either turns

Related Documents

  • Improved Essays

    Additionally, criminals who already possess bench warrants often use the stolen identity when interacting with law enforcement officials to avoid being detected and apprehended for having an outstanding warrant. However, criminal identity theft also confronts the victims with detrimental repercussions. The name of the victim can be associated with dramatic…

    • 1439 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Hackers In Pop Culture

    • 1655 Words
    • 7 Pages

    A Pew study found that 86% of Internet and smartphone users have removed or masked their digital footprints for privacy and that Americans are more concerned with hackers violating their privacy than the government (Dredge). This study is astounding, especially considering that the government has been accused of spying on Americans. Hackers have the skillset and capabilities to invade a person’s privacy, but why would they and what would their motivation be? Black hat hackers are only motivated by financial incentives and they usually target big organizations that have valuable data. Society has every right to fear hackers, but for every…

    • 1655 Words
    • 7 Pages
    Superior Essays
  • Superior Essays

    There are many types of computer crimes in which people came be a victim by the use of malware, phishing, social engineering, denial of service, and other used to commit identify theft, cyber stalking, fraud, and more. A popular computer crime these days is identify theft, in which an thief will use a person personal information to get money by opening credit cards and other types of accounts, may use health information to get medicines or medical equipment, or use the information for other malicious needs. The identify theft is a computer crime that victimizes a person and it can take years to recover. Today, society is more vulnerable to identity theft with the use of technology than before computers were as popular. There are ways to try…

    • 1567 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    The United States Department of Justice says, “Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person 's personal data in some way that involves fraud or deception, typically for economic gain.” Lots of people tend to fall the common mistake of opening popups.…

    • 1122 Words
    • 5 Pages
    Superior Essays
  • Great Essays

    Credit Card Fraud Case Study

    • 2744 Words
    • 11 Pages

    3.1 Introduction Fraud is one of the most crucial ethical concerns in the credit card industry (Delamaire, Abdon, & Pointon, 2009). Fraud can occur with any type of credit products, such as personal loans, home loans, and in retails. Delamaire, Abdon, & Pointon (2009) defines fraud as means of obtaining services, goods and/or money in a dishonorable manner, and is a growing problem globally. Fraud deals with issues concerning criminal cases that are difficult to classify (Delamaire, Abdon, & Pointon, 2009). According to Bertke (2013) fraudsters have long posed a threat to perform fraudulent activities in retail outlets and the rise of mobile devices and other technologies are now serving as a gateway for fraudsters looking to take advantage…

    • 2744 Words
    • 11 Pages
    Great Essays
  • Improved Essays

    The primary criminal use of stealing a victim’s information is credit card fraud. Apart from using the credit card for purchasing stuffs, criminal will change the victim’s address so that they will not be able to receive the bills and see the charges they did not make, this will allow the criminal more time to abuse the victim’s identity and credit. The criminal too could use open new accounts in the victim’s name. This will result in more incurring charge on the victim line of credit. The Identity Theft Resource Centre has predicted that organised crime groups will be more involved in identity theft related crimes and it will not only be restricted in the U.S or American but will go beyond…

    • 1253 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    To curb this risk, banks have adopted microchips to augment identity theft against cyber criminals. This is because the microchips are complex for criminals to replicate especially the magnetic strips that enable them to steal data. Operational risk is another technological limitation of such a technology (Hayashi et al. 2012, 89). Operational risk normally is as a result of hardware or software problems, or human error that can produce an operational malfunction that leads to financial exposure.…

    • 1085 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    (Hall, 2013) The last portion of the fraud triangle involves rationalization, or the ethic views of the perpetrator. (Hall, 2013)/(Wells, 2014) Clearly Stefan had a terrible conscience, he made unethical decisions and it cost both Mogel and Winkler. Ten suggestion that could help the Mogel Inc. Include the following: 1) Mogel collection system creates a big issue, which gave Stefan the chance to commit his crime. Because Stefan has access to both area where revenue, he was able to steal from the company.…

    • 1002 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Causes Of Robbery Essay

    • 832 Words
    • 4 Pages

    If the victim is threaten to take his or her important belongings, that’s the time it will become a crime or must call a robbery. If the person taken an important belongings from his body parts or from the cloth he or she wears without consent then it is a robbery. If the theft, says that the victim should deposit or give the things they want such as money in a warehouse through cell phone or any communicating gadgets then it is not a robbery. But according to Great Britain if the victim was threatened through the phone, then it is also a robbery. Many robbery crimes must be solved, but some crimes cannot identify if it is a robbery…

    • 832 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Perpetrators assume identities of business undertakings, corning unsuspecting consumer large amounts of cash. The perpetrator, for example, produces a deal to the consumer to deliver goods, with the name of a certain company, even provides documents that are forged. The unsuspecting consumer then, as agreed, deposits cash via credit card or electronic money transfer to the perpetrator who withdraws the money and goes missing. Investigating such crimes proves to be difficult as the perpetrators use different accounts that might have been hacked. The accounts may also be deactivated after the dealing meaning no trail left to follow up.…

    • 1498 Words
    • 6 Pages
    Improved Essays

Related Topics