• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

An introduction to Identity Theft

Extracts from this document...


An Introduction to IDENTITY THEFT Created By Ruth Sutton P06003790 INDEX Introduction Page 3 What is Identity Theft? 4 Prevalence and Statistics 5 The Criminal, Your Personal Information, Methodology & Tools 7 Card Skimming 7 Bin Raiding 7 Useful Documents 8 Shoulder Surfing 8 Spoof Means 8 Advance Fee & 419 Fraud 9 Corporate Identity Theft 10 Corporate Scams 10 Telesales Scam 10 Bogus Invoice Scam 10 Network Invasion 11 Affects on the Victim 12 Preventative Measures 13 The Victims Recovery 14 Conclusion 15 Bibliography 16 INTRODUCTION The purpose of this document is to explore and explain "Identity Theft", it will document some of the available statistics. It will report the sources of information, methodology and tools used by the criminal to carry out the offence, the affects on the victim, preventative measures, and finally the steps of recovery for the victims of Identity Theft. What is "Identity Theft" Identity Theft is the use of another persons, living or deceased or a company's (and its directors) personal and private information which is then used for the purposes of; * Assuming another's identity in all aspects of the criminals daily life - this is known as Identity Cloning * Financial Services theft - The obtaining of financial services in another's name. * Business and commercial identity theft - used for obtaining financial services, charges against assets and obtaining goods. ...read more.


The victim may be encouraged to travel abroad in order to pay the required monies (AFF) which could be purported to be taxes, processing fees and or bribes necessary in order to progress the payment of monies that is stated to be due to them. * Corporate Identity Theft This typically consists of changes to registration details of the company, such as the names and addresses of the company, it directors and or its company secretary via Companies House. This can then lead to the acquisition by the criminal of financial services and goods, leaving the company in some instances with charges against their assets and payments due to creditors for goods or services it has not received. * Corporate Scams These scams can be carried out by means of email, telephone or the receipt of bogus official faxes. One example of a telesales scam is a caller purporting to be from an advertising agency for wall planners and proceeds resulting from sales of the wall planners to be donated to charity, encouraging the company to make a donation and receiving advertising in lieu with an additional benefit of such advertising to the company as a tax deductible charitable donation. This type of scam carries the badge of "Support Publishing". (http://www.businesslink.gov.uk) The "Bogus Invoice Scam" where a company is invoiced for advertising they have not ordered nor agreed to. ...read more.


That the victim also contacts the relevant banking institutions and credit companies and obtains a current credit report to ensure completeness. That he/she files a report with the police on discovery, and closes all accounts that have or may have been used by the criminal, the victim should consult with the the police before doing so. He/She should then open new accounts if possible. Keep records of all telephone conversations and copies of all documentation concerned with reporting of the crime and any applicable evidence. They should also inform the relevant insurance company should identity theft insurance be held by him/her. Most importantly, the victim should seek further advice. Conclusion The consequences of identity theft for the victim can be disastrous and difficult to resolve. The surprising ease and perpetual inventiveness of the criminal fraternity gives rise to the necessity of the individual to be aware of identity theft and the processes for stolen identity acquisition. The individual (we are all potential victims) should take basic preventative measures and great care of personal information coupled with the need to ensure timely correction of inaccurate and potential harmful records held by credit agencies and institutions, which potentially can be reported against the victim when in fact they are due to identity theft. In addition, it is clear that whilst Information Technology can be used to aid the criminal, it can also assist in the prevention of this devastating crime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

4 star(s)

**** A very good introduction to this interesting topic

Marked by teacher Ivor Borkin 01/05/2012

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    This could then result in the company getting a bad reputation or being taken to court for breaching data protection. The man in the middle could also waste company time and as a result; money. Countermeasures Implemented to reduce risk of damage to systems - p3 & p4 Countermeasures Vermason

  2. Marked by a teacher

    Case Study. LEGAL ISSUES-: Data Protection Act. Whiteman Leisure must ensure that the information ...

    WLC should have a system in which they ask specific security questions at hand to make sure and confirm that the individual that is querying about their details is the right person. LEGAL ISSUES-: Freedom of Information Act. Whiteman Leisure must provide information that the customer would wish to see about their details if they inquire about it.

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    A DFD provides no information about the timing or ordering of processes, or about whether processes will operate in sequence or in parallel. It is therefore quite different from a flowchart, which shows the flow of control through an algorithm, allowing a reader to determine what operations will be performed,

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    * Whether the media is read-only or read-write * The cost of the media How the capacity of secondary storage media is measured Data storage is measured in 'bytes'. * 1 kilobyte(1 KB) equals 1024 bytes or 210 bytes exactly * 1 megabyte(1 MB)

  1. Different ways of data capture

    Position of stylus is detected by computer They may come in a wide range of resolutions and types, These are often used by architects in conjuction with a computer aided design package. (CAD) DATA GATHERING AND SAMPLING DATA CAPTURE! Methods of data capture are picked by there advantage in: SPEED

  2. Future needs of Computer

    We still need a lot from computers. In a few years, everywhere you turn, a computer will be there to assist, to inform or simply to play with.

  1. Describe the following networking technologies:TCP/IP addresses Ports Protocols Domain name. The ...

    HUB- this needs to be checked because, the hub will connect more than one computer together. If the hub failed in whole, this will stop computer from communicating. Task 2 A computer peer-to- peer is a network that can be used for computer system.

  2. Discuss the impact that file format, compression techniques, image resolution and colour depth have ...

    larger the size of the file but it does mean that the image will consist of more detailed colours so a more realistic image.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work