• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

An introduction to Identity Theft

Extracts from this document...


An Introduction to IDENTITY THEFT Created By Ruth Sutton P06003790 INDEX Introduction Page 3 What is Identity Theft? 4 Prevalence and Statistics 5 The Criminal, Your Personal Information, Methodology & Tools 7 Card Skimming 7 Bin Raiding 7 Useful Documents 8 Shoulder Surfing 8 Spoof Means 8 Advance Fee & 419 Fraud 9 Corporate Identity Theft 10 Corporate Scams 10 Telesales Scam 10 Bogus Invoice Scam 10 Network Invasion 11 Affects on the Victim 12 Preventative Measures 13 The Victims Recovery 14 Conclusion 15 Bibliography 16 INTRODUCTION The purpose of this document is to explore and explain "Identity Theft", it will document some of the available statistics. It will report the sources of information, methodology and tools used by the criminal to carry out the offence, the affects on the victim, preventative measures, and finally the steps of recovery for the victims of Identity Theft. What is "Identity Theft" Identity Theft is the use of another persons, living or deceased or a company's (and its directors) personal and private information which is then used for the purposes of; * Assuming another's identity in all aspects of the criminals daily life - this is known as Identity Cloning * Financial Services theft - The obtaining of financial services in another's name. * Business and commercial identity theft - used for obtaining financial services, charges against assets and obtaining goods. ...read more.


The victim may be encouraged to travel abroad in order to pay the required monies (AFF) which could be purported to be taxes, processing fees and or bribes necessary in order to progress the payment of monies that is stated to be due to them. * Corporate Identity Theft This typically consists of changes to registration details of the company, such as the names and addresses of the company, it directors and or its company secretary via Companies House. This can then lead to the acquisition by the criminal of financial services and goods, leaving the company in some instances with charges against their assets and payments due to creditors for goods or services it has not received. * Corporate Scams These scams can be carried out by means of email, telephone or the receipt of bogus official faxes. One example of a telesales scam is a caller purporting to be from an advertising agency for wall planners and proceeds resulting from sales of the wall planners to be donated to charity, encouraging the company to make a donation and receiving advertising in lieu with an additional benefit of such advertising to the company as a tax deductible charitable donation. This type of scam carries the badge of "Support Publishing". (http://www.businesslink.gov.uk) The "Bogus Invoice Scam" where a company is invoiced for advertising they have not ordered nor agreed to. ...read more.


That the victim also contacts the relevant banking institutions and credit companies and obtains a current credit report to ensure completeness. That he/she files a report with the police on discovery, and closes all accounts that have or may have been used by the criminal, the victim should consult with the the police before doing so. He/She should then open new accounts if possible. Keep records of all telephone conversations and copies of all documentation concerned with reporting of the crime and any applicable evidence. They should also inform the relevant insurance company should identity theft insurance be held by him/her. Most importantly, the victim should seek further advice. Conclusion The consequences of identity theft for the victim can be disastrous and difficult to resolve. The surprising ease and perpetual inventiveness of the criminal fraternity gives rise to the necessity of the individual to be aware of identity theft and the processes for stolen identity acquisition. The individual (we are all potential victims) should take basic preventative measures and great care of personal information coupled with the need to ensure timely correction of inaccurate and potential harmful records held by credit agencies and institutions, which potentially can be reported against the victim when in fact they are due to identity theft. In addition, it is clear that whilst Information Technology can be used to aid the criminal, it can also assist in the prevention of this devastating crime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

4 star(s)

**** A very good introduction to this interesting topic

Marked by teacher Ivor Borkin 01/05/2012

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    sure it is kept secure * do not show information to other people * do not allow access by others the information can be hacked online on the computers meaning other people will gain the customer information, this is not complying with the Data Protection Act meaning they are in

  2. Business blue print document for the implementation of SAP R/3 (4.6B) payroll at Mastek ...

    to cater to the Indian payroll needs. Payroll Area A payroll area specifies when payroll is to be run; the earliest payroll period for retroactive accounting, and the periods for which payroll is to be run.

  1. Computer systems assignment 1

    I was provided a CD with a driver that enables the DVD- Writer to function on a system. First put the CD in the CD drive tray. When done click on my computer Icon to show the icon of the CD put in.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    * Whether the media is read-only or read-write * The cost of the media How the capacity of secondary storage media is measured Data storage is measured in 'bytes'. * 1 kilobyte(1 KB) equals 1024 bytes or 210 bytes exactly * 1 megabyte(1 MB)

  1. Evaluate the design and operation of Frito-Lay's logistic network.

    As Ed Kluger, prepare a marketing plan for Frito-Lay's proposed backhaul services Kluger would need to first convince the internal team regarding the benefits of the backhaul service. He would need to describe the overall benefit to the company, particularly overall profit.

  2. James. T. Russell and the Invention of the Compact Disc.

    * A laser, and a lens system that focuses in on and reads the bumps. * A tracking mechanism, which moves the laser assembly so that the laser's beam can follow (and be centered on) the spiral track. The tracking system has to be able to move the laser at micro resolutions.

  1. The impact of the availability of electric information on individuals and society

    books; newspapers and magazines. While now I mostly use the internet and a search engine for doing that. The problem with search engines is that you have to be very accurate and know exactly what kind of information you want to find, otherwise you might never find what you need or not exactly the kind of information you need.

  2. BTEC National in IT Organisational systems security - Policies and guidelines for IT security ...

    It would be my advice to make sure your employees are aware of your surveillance policy, how it operates and why it operates as it may cause some people to become unsettled if they find out at a later date and you did not mention this to them.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work