• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

An introduction to Identity Theft

Extracts from this document...


An Introduction to IDENTITY THEFT Created By Ruth Sutton P06003790 INDEX Introduction Page 3 What is Identity Theft? 4 Prevalence and Statistics 5 The Criminal, Your Personal Information, Methodology & Tools 7 Card Skimming 7 Bin Raiding 7 Useful Documents 8 Shoulder Surfing 8 Spoof Means 8 Advance Fee & 419 Fraud 9 Corporate Identity Theft 10 Corporate Scams 10 Telesales Scam 10 Bogus Invoice Scam 10 Network Invasion 11 Affects on the Victim 12 Preventative Measures 13 The Victims Recovery 14 Conclusion 15 Bibliography 16 INTRODUCTION The purpose of this document is to explore and explain "Identity Theft", it will document some of the available statistics. It will report the sources of information, methodology and tools used by the criminal to carry out the offence, the affects on the victim, preventative measures, and finally the steps of recovery for the victims of Identity Theft. What is "Identity Theft" Identity Theft is the use of another persons, living or deceased or a company's (and its directors) personal and private information which is then used for the purposes of; * Assuming another's identity in all aspects of the criminals daily life - this is known as Identity Cloning * Financial Services theft - The obtaining of financial services in another's name. * Business and commercial identity theft - used for obtaining financial services, charges against assets and obtaining goods. ...read more.


The victim may be encouraged to travel abroad in order to pay the required monies (AFF) which could be purported to be taxes, processing fees and or bribes necessary in order to progress the payment of monies that is stated to be due to them. * Corporate Identity Theft This typically consists of changes to registration details of the company, such as the names and addresses of the company, it directors and or its company secretary via Companies House. This can then lead to the acquisition by the criminal of financial services and goods, leaving the company in some instances with charges against their assets and payments due to creditors for goods or services it has not received. * Corporate Scams These scams can be carried out by means of email, telephone or the receipt of bogus official faxes. One example of a telesales scam is a caller purporting to be from an advertising agency for wall planners and proceeds resulting from sales of the wall planners to be donated to charity, encouraging the company to make a donation and receiving advertising in lieu with an additional benefit of such advertising to the company as a tax deductible charitable donation. This type of scam carries the badge of "Support Publishing". (http://www.businesslink.gov.uk) The "Bogus Invoice Scam" where a company is invoiced for advertising they have not ordered nor agreed to. ...read more.


That the victim also contacts the relevant banking institutions and credit companies and obtains a current credit report to ensure completeness. That he/she files a report with the police on discovery, and closes all accounts that have or may have been used by the criminal, the victim should consult with the the police before doing so. He/She should then open new accounts if possible. Keep records of all telephone conversations and copies of all documentation concerned with reporting of the crime and any applicable evidence. They should also inform the relevant insurance company should identity theft insurance be held by him/her. Most importantly, the victim should seek further advice. Conclusion The consequences of identity theft for the victim can be disastrous and difficult to resolve. The surprising ease and perpetual inventiveness of the criminal fraternity gives rise to the necessity of the individual to be aware of identity theft and the processes for stolen identity acquisition. The individual (we are all potential victims) should take basic preventative measures and great care of personal information coupled with the need to ensure timely correction of inaccurate and potential harmful records held by credit agencies and institutions, which potentially can be reported against the victim when in fact they are due to identity theft. In addition, it is clear that whilst Information Technology can be used to aid the criminal, it can also assist in the prevention of this devastating crime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

4 star(s)

**** A very good introduction to this interesting topic

Marked by teacher Ivor Borkin 01/05/2012

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    If for example somebody rings the company saying they are somebody and asking to see these details they are still not allowed to be shown. The company is only allowed to use these details for correct purposes and reasons, they cannot use the information to go visit customers out of work without permission or pass on details to other people.

  2. Future needs of Computer

    In the following, an attempt is made to project what the uses of the computer will be, based on the current uses and limitations previously discussed. There are several areas where the computer is needed to be used for academic historical research, they are: * Communications; * Publication of information;

  1. Computer systems assignment 1

    I was provided a CD with a driver that enables the DVD- Writer to function on a system. First put the CD in the CD drive tray. When done click on my computer Icon to show the icon of the CD put in.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Advantages * Large volumes of data can be held * The medium is freely transportable. These qualities make it valuable for producing back up copies of files stored on a computer system. Disadvantage Access to the data stored is, by necessity, sequential which makes it largely unsuitable for most data handling applications.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    must be processed fairly and lawfully and at least one of the conditions for processing sensitive personal data is met. The conditions for each of these categories would usually be that the subject has given consent. Personal data processing conditions: The subject's consent may not be required if the processing

  2. Identify the constituent parts of a total computer system.

    Other input devices * Joystick * Light pen * Mouse * QWERTY keyboard * Sensors * Tracker ball OUTPUT DEVICES Monitors or Visual Display Units (VDUs) Monitors or VDUs are the most common output device and include desktop monitors and Liquid Crystal Displays (LCDs).

  1. The impact of the availability of electric information on individuals and society

    Another example of how increased availability of electronic information has changed my life is the way I find the information I need. Not so long ago I was searching for information I need in paper-based sources e.g. books; newspapers and magazines.

  2. James. T. Russell and the Invention of the Compact Disc.

    A CD is a simple round piece of plastic about 4/100ths of an inch thick, and 12 centimeters in diameter used for electronic recording, storing, and playback. Most of a CD consists of an injection-moulded piece of clear polycarbonate plastic.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work