Thursday, July 25, 2019
Identity Theft Research Paper Example | Topics and Well Written Essays - 1000 words
Identity Theft - Research Paper Example In this regard, the paper will also assess how these bodies handle such cases. Identity theft Introduction Identity theft is argued to be a form of stealing someoneââ¬â¢s identity whereby the thief pretends to be the victim, characteristically in order to have access to resources in the victimââ¬â¢s name and identity (Vacca, 2003). This form of theft can cause and lead to adverse consequences to the victim in the event of being held accountable for crimes committed by the thief. According to Hammond, (2003), identity theft takes place when someone uses other personââ¬â¢s personal identification documents or information. Some of the common identification documents or information prone to such effects includes social security number or credit card number, which are used by identity thieves to commit fraud or other related crimes (Hammond, 2003). Different methods of how someoneââ¬â¢s identity can be compromised and what identity thieves do with stolen identity Stealing is o ne and most common method used by identity thieves to obtain victims personal information. This mostly happens in the streets whereby thieves snatches or steals a purse or wallet (Social engineering framework, 2011). This can also come in the form of identity victims kidnapping victims and asking them to disclose their personal information. Using this method, identity thieves can go further to commit various crimes using the victimââ¬â¢s personal identification documents or information. Dumpster diving is a method used by identity thieves by a way of rummaging through the other personââ¬â¢s trash for them to look for some personal information that can aid them launch an attack (Social engineering framework, 2011). In some cases, people dump vital personal information documents without being aware of the danger they pose. However, some documents are dumped after being considered irrelevant or after being used. Identity thieves can use such information obtained from peopleââ¬â ¢s trash to commit a crime. Skimming is a situation where the thief uses a special device to store victimââ¬â¢s personal information. Skimming is a form of high-tech technique whereby thieves scan or swipe victimââ¬â¢s credit or bank card in order to get off the magnetic strip (Social engineering framework, 2011). This is common in areas where victims use their personal documents to purchase items or services. Phishing is another method used to by identity thieves to obtain personal information of their victims. They pretend to be a financial institution or other organizations that people presume to be genuine. They send a malicious email in the effort to encourage their victims to enter specific information (Vacca, 2003). Unknowingly, victims provide all their personal information, which is used by the impersonators. Changing of address is also used by identity thieves whereby they change victims address mostly in situations where victims have to fill out a ââ¬Å"change of addressâ⬠form. They can transfer victimââ¬â¢s bills after ordering high ticket items. Pretexting is also another method used by identity thieves by a way of using false pretense to obtain the victimââ¬â¢s personal information for them to use it to carryout various crimes (Vacca, 2003). Thombstone theft is another method used to steel personal information. It involves stealing dead personââ¬â¢
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.