• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

An introduction to Identity Theft

Extracts from this document...


An Introduction to IDENTITY THEFT Created By Ruth Sutton P06003790 INDEX Introduction Page 3 What is Identity Theft? 4 Prevalence and Statistics 5 The Criminal, Your Personal Information, Methodology & Tools 7 Card Skimming 7 Bin Raiding 7 Useful Documents 8 Shoulder Surfing 8 Spoof Means 8 Advance Fee & 419 Fraud 9 Corporate Identity Theft 10 Corporate Scams 10 Telesales Scam 10 Bogus Invoice Scam 10 Network Invasion 11 Affects on the Victim 12 Preventative Measures 13 The Victims Recovery 14 Conclusion 15 Bibliography 16 INTRODUCTION The purpose of this document is to explore and explain "Identity Theft", it will document some of the available statistics. It will report the sources of information, methodology and tools used by the criminal to carry out the offence, the affects on the victim, preventative measures, and finally the steps of recovery for the victims of Identity Theft. What is "Identity Theft" Identity Theft is the use of another persons, living or deceased or a company's (and its directors) personal and private information which is then used for the purposes of; * Assuming another's identity in all aspects of the criminals daily life - this is known as Identity Cloning * Financial Services theft - The obtaining of financial services in another's name. * Business and commercial identity theft - used for obtaining financial services, charges against assets and obtaining goods. ...read more.


The victim may be encouraged to travel abroad in order to pay the required monies (AFF) which could be purported to be taxes, processing fees and or bribes necessary in order to progress the payment of monies that is stated to be due to them. * Corporate Identity Theft This typically consists of changes to registration details of the company, such as the names and addresses of the company, it directors and or its company secretary via Companies House. This can then lead to the acquisition by the criminal of financial services and goods, leaving the company in some instances with charges against their assets and payments due to creditors for goods or services it has not received. * Corporate Scams These scams can be carried out by means of email, telephone or the receipt of bogus official faxes. One example of a telesales scam is a caller purporting to be from an advertising agency for wall planners and proceeds resulting from sales of the wall planners to be donated to charity, encouraging the company to make a donation and receiving advertising in lieu with an additional benefit of such advertising to the company as a tax deductible charitable donation. This type of scam carries the badge of "Support Publishing". (http://www.businesslink.gov.uk) The "Bogus Invoice Scam" where a company is invoiced for advertising they have not ordered nor agreed to. ...read more.


That the victim also contacts the relevant banking institutions and credit companies and obtains a current credit report to ensure completeness. That he/she files a report with the police on discovery, and closes all accounts that have or may have been used by the criminal, the victim should consult with the the police before doing so. He/She should then open new accounts if possible. Keep records of all telephone conversations and copies of all documentation concerned with reporting of the crime and any applicable evidence. They should also inform the relevant insurance company should identity theft insurance be held by him/her. Most importantly, the victim should seek further advice. Conclusion The consequences of identity theft for the victim can be disastrous and difficult to resolve. The surprising ease and perpetual inventiveness of the criminal fraternity gives rise to the necessity of the individual to be aware of identity theft and the processes for stolen identity acquisition. The individual (we are all potential victims) should take basic preventative measures and great care of personal information coupled with the need to ensure timely correction of inaccurate and potential harmful records held by credit agencies and institutions, which potentially can be reported against the victim when in fact they are due to identity theft. In addition, it is clear that whilst Information Technology can be used to aid the criminal, it can also assist in the prevention of this devastating crime. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a teacher thought of this essay

4 star(s)

**** A very good introduction to this interesting topic

Marked by teacher Ivor Borkin 01/05/2012

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    With the current system there is a difficulty in trying to record all data when there is a bigger order. Luki would like to be able to have an ordering system along with a database system to which data can be stored in a secured manner.

  2. Marked by a teacher

    Case Study. LEGAL ISSUES-: Data Protection Act. Whiteman Leisure must ensure that the information ...

    WLC should have a system in which they ask specific security questions at hand to make sure and confirm that the individual that is querying about their details is the right person. LEGAL ISSUES-: Freedom of Information Act. Whiteman Leisure must provide information that the customer would wish to see about their details if they inquire about it.

  1. Future needs of Computer

    In the following, an attempt is made to project what the uses of the computer will be, based on the current uses and limitations previously discussed. There are several areas where the computer is needed to be used for academic historical research, they are: * Communications; * Publication of information;

  2. Evaluate the design and operation of Frito-Lay's logistic network.

    The overall external marketing plan for the proposed backhaul service should take into account the following: a. Customer analysis: Frito Lay should identify/segment the specific market that it should target, followed by developing a positioning statement that clearly states the benefits/ advantages of working with Frito-Lay as a third party transport/logistics provider.

  1. Review of the article "Supply Chain Analysis at Volkswagen of America".

    that could deal with these limitations and achieve benefits for Volkswagen and dealers together. The goals included to maximize the percentage of customers receiving their first choice of vehicles within 48 hours either from dealer inventory or from Volkswagen. By reducing inventory the goal was to reduce the total system

  2. Discuss the impact that file format, compression techniques, image resolution and colour depth have ...

    Having 16 million colours allows the quality of the image to be realistic and good quality however as the colour depth is higher and there are more colours that means that the storage space will also be higher 32 Bit Colour (True Colour)

  1. BTEC National in IT Organisational systems security - Policies and guidelines for IT security ...

    Either way you must make sure that you know all of the surveillance laws that apply to ensure you are not breaking the law. Risk management: This is the assessment and strategy in place in relation to the risk assessment.

  2. Common methods of attack and types of malware

    Hackers are essentially anyone who illegally breaks into a computer or uses a computer for use not originally authorized for.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work