• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

An introduction to Identity Theft

Extracts from this document...


An Introduction to IDENTITY THEFT Created By Ruth Sutton P06003790 INDEX Introduction Page 3 What is Identity Theft? 4 Prevalence and Statistics 5 The Criminal, Your Personal Information, Methodology & Tools 7 Card Skimming 7 Bin Raiding 7 Useful Documents 8 Shoulder Surfing 8 Spoof Means 8 Advance Fee & 419 Fraud 9 Corporate Identity Theft 10 Corporate Scams 10 Telesales Scam 10 Bogus Invoice Scam 10 Network Invasion 11 Affects on the Victim 12 Preventative Measures 13 The Victims Recovery 14 Conclusion 15 Bibliography 16 INTRODUCTION The purpose of this document is to explore and explain "Identity Theft", it will document some of the available statistics. It will report the sources of information, methodology and tools used by the criminal to carry out the offence, the affects on the victim, preventative measures, and finally the steps of recovery for the victims of Identity Theft. What is "Identity Theft" Identity Theft is the use of another persons, living or deceased or a company's (and its directors) personal and private information which is then used for the purposes of; * Assuming another's identity in all aspects of the criminals daily life - this is known as Identity Cloning * Financial Services theft - The obtaining of financial services in another's name. * Business and commercial identity theft - used for obtaining financial services, charges against assets and obtaining goods. ...read more.


The victim may be encouraged to travel abroad in order to pay the required monies (AFF) which could be purported to be taxes, processing fees and or bribes necessary in order to progress the payment of monies that is stated to be due to them. * Corporate Identity Theft This typically consists of changes to registration details of the company, such as the names and addresses of the company, it directors and or its company secretary via Companies House. This can then lead to the acquisition by the criminal of financial services and goods, leaving the company in some instances with charges against their assets and payments due to creditors for goods or services it has not received. * Corporate Scams These scams can be carried out by means of email, telephone or the receipt of bogus official faxes. One example of a telesales scam is a caller purporting to be from an advertising agency for wall planners and proceeds resulting from sales of the wall planners to be donated to charity, encouraging the company to make a donation and receiving advertising in lieu with an additional benefit of such advertising to the company as a tax deductible charitable donation. This type of scam carries the badge of "Support Publishing". (http://www.businesslink.gov.uk) The "Bogus Invoice Scam" where a company is invoiced for advertising they have not ordered nor agreed to. ...read more.


That the victim also contacts the relevant banking institutions and credit companies and obtains a current credit report to ensure completeness. That he/she files a report with the police on discovery, and closes all accounts that have or may have been used by the criminal, the victim should consult with the the police before doing so. He/She should then open new accounts if possible. Keep records of all telephone conversations and copies of all documentation concerned with reporting of the crime and any applicable evidence. They should also inform the relevant insurance company should identity theft insurance be held by him/her. Most importantly, the victim should seek further advice. Conclusion The consequences of identity theft for the victim can be disastrous and difficult to resolve. The surprising ease and perpetual inventiveness of the criminal fraternity gives rise to the necessity of the individual to be aware of identity theft and the processes for stolen identity acquisition. The individual (we are all potential victims) should take basic preventative measures and great care of personal information coupled with the need to ensure timely correction of inaccurate and potential harmful records held by credit agencies and institutions, which potentially can be reported against the victim when in fact they are due to identity theft. In addition, it is clear that whilst Information Technology can be used to aid the criminal, it can also assist in the prevention of this devastating crime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

4 star(s)

**** A very good introduction to this interesting topic

Marked by teacher Ivor Borkin 01/05/2012

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    * Subject to some exceptions for organisations that only do very simple processing, and for domestic use, all entities that process personal information must register with the Information Commissioner. * Entities holding personal information are required to have adequate security measures in place. Those include technical measures (such as firewalls)

  2. Future needs of Computer

    In the following, an attempt is made to project what the uses of the computer will be, based on the current uses and limitations previously discussed. There are several areas where the computer is needed to be used for academic historical research, they are: * Communications; * Publication of information;

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Advantages * Large volumes of data can be held * The medium is freely transportable. These qualities make it valuable for producing back up copies of files stored on a computer system. Disadvantage Access to the data stored is, by necessity, sequential which makes it largely unsuitable for most data handling applications.

  2. Computer systems assignment 1

    I was provided a CD with a driver that enables the DVD- Writer to function on a system. First put the CD in the CD drive tray. When done click on my computer Icon to show the icon of the CD put in.

  1. The impact of the availability of electric information on individuals and society

    But anyway, the availability of electronic information has improved my life a lot and I can't imagine my life without it any more. The increased availability of electronic information has changed my school life as well. ICT subject is available for students like me only because of increased availability of

  2. Explain sequence, selection and iteration as used in computer programming; outline the benefits of ...

    total = total + numbers counter = counter + 1 Console.WriteLine("Enter number, enter X to calculate average.") numbers = Console.ReadLine Loop Do total = total + numbers counter = counter + 1 Console.WriteLine("Enter number, enter X to calculate average.") numbers = Console.ReadLine Loop Until (numbers = "X")

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    Even so, since the logical data model anticipates implementation on a specific computing system, the content of the logical data model is adjusted to achieve certain efficiencies. The term 'Logical Data Model' is sometimes used as a synonym of 'Domain Model' or as an alternative to the domain model.

  2. Evaluate the design and operation of Frito-Lay's logistic network.

    The objectives of the logistics are tied to the goals of Frito-Lay's corporate headquarters. The private fleet also may allow Frito-Lay to provide back haul service and act as a profit center. The VSP system will probably need to be upgraded, however, in order to accomplish this.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work