Podcast
Questions and Answers
What does identity theft traditionally describe?
What does identity theft traditionally describe?
- Any use of stolen personal information (correct)
- Only the fraudulent use of credit cards
- Creating fictitious identities for online scams
- Only identity fraud activities
Identity fraud includes identity theft.
Identity fraud includes identity theft.
True (A)
What is the primary aim of criminal record identity theft?
What is the primary aim of criminal record identity theft?
Evading capture or criminal prosecution
Identity theft is often committed by accessing __________, credit cards, or financial records.
Identity theft is often committed by accessing __________, credit cards, or financial records.
Match the type of identity theft with its description:
Match the type of identity theft with its description:
What has been a growing factor in the theft for employment and border entry?
What has been a growing factor in the theft for employment and border entry?
Assumption of identity is common due to its perceived ease.
Assumption of identity is common due to its perceived ease.
Fraudulent documents for border entry may include alien registration cards and __________.
Fraudulent documents for border entry may include alien registration cards and __________.
What is the most common type of identity theft?
What is the most common type of identity theft?
Virtual Identity Theft requires significant effort to be accomplished.
Virtual Identity Theft requires significant effort to be accomplished.
Name one reason why measuring the prevalence of internet theft is difficult.
Name one reason why measuring the prevalence of internet theft is difficult.
The major concern regarding Credit Identity Theft is the creation of ________ accounts.
The major concern regarding Credit Identity Theft is the creation of ________ accounts.
Match the sources of information with their interests:
Match the sources of information with their interests:
What factor contributes to the lack of accurate measurement of internet theft?
What factor contributes to the lack of accurate measurement of internet theft?
Private companies have no vested interest in exploiting consumer fear about internet theft.
Private companies have no vested interest in exploiting consumer fear about internet theft.
Which agencies are considered primary sources of information on internet theft?
Which agencies are considered primary sources of information on internet theft?
What is one major factor that complicates measuring the costs associated with victimization?
What is one major factor that complicates measuring the costs associated with victimization?
Increasing globalization of communication and commerce is expected to lead to a decrease in cyber crime.
Increasing globalization of communication and commerce is expected to lead to a decrease in cyber crime.
What is 'popcorning' in the context of identity theft?
What is 'popcorning' in the context of identity theft?
Searching waste receptacles for identification information is known as __________.
Searching waste receptacles for identification information is known as __________.
Which of the following is NOT a method of physical identity theft?
Which of the following is NOT a method of physical identity theft?
Match the physical methods of identity theft with their descriptions:
Match the physical methods of identity theft with their descriptions:
Credit bureaus primarily exist to help consumers protect their information.
Credit bureaus primarily exist to help consumers protect their information.
What do lenders often avoid creating due to concerns about alienating consumers?
What do lenders often avoid creating due to concerns about alienating consumers?
Which of the following methods involves fraudulent emails seeking information?
Which of the following methods involves fraudulent emails seeking information?
Spyware is primarily used for capturing information to achieve identity theft.
Spyware is primarily used for capturing information to achieve identity theft.
What type of fraud involves strangers deceiving people into providing financial information?
What type of fraud involves strangers deceiving people into providing financial information?
Malware that redirects traffic to an undesired site is known as ______.
Malware that redirects traffic to an undesired site is known as ______.
Match the following terms with their descriptions:
Match the following terms with their descriptions:
What is pharming primarily concerned with?
What is pharming primarily concerned with?
Phishing Trojans are used solely to create botnets.
Phishing Trojans are used solely to create botnets.
What is the purpose of keyloggers in cyber crime?
What is the purpose of keyloggers in cyber crime?
What is the first phase in the process of identity theft/fraud?
What is the first phase in the process of identity theft/fraud?
Insurance fraud only involves obtaining government loans.
Insurance fraud only involves obtaining government loans.
Name one consequence of immigration fraud.
Name one consequence of immigration fraud.
Identity theft/fraud typically involves a ____-phase process.
Identity theft/fraud typically involves a ____-phase process.
Match the types of fraud to their descriptions:
Match the types of fraud to their descriptions:
Which recommendation involves enhancing security measures against identity theft?
Which recommendation involves enhancing security measures against identity theft?
Victims of identity theft can petition the court for a finding of factual innocence.
Victims of identity theft can petition the court for a finding of factual innocence.
What is one method proposed to protect personal identifying information?
What is one method proposed to protect personal identifying information?
What is the most common type of identity theft?
What is the most common type of identity theft?
Virtual identity theft requires significant effort to accomplish.
Virtual identity theft requires significant effort to accomplish.
Name one reason why measuring the prevalence of internet theft is difficult.
Name one reason why measuring the prevalence of internet theft is difficult.
The vested interest of private companies often ________ consumer fear.
The vested interest of private companies often ________ consumer fear.
Match the following sources of information with their interests:
Match the following sources of information with their interests:
Which of the following is a primary information source regarding identity theft?
Which of the following is a primary information source regarding identity theft?
Delayed notification of victimization is one reason measurement of internet theft is complicated.
Delayed notification of victimization is one reason measurement of internet theft is complicated.
What complicates consistent prosecution of cyber crime on a national level?
What complicates consistent prosecution of cyber crime on a national level?
What is the primary characteristic of identity fraud?
What is the primary characteristic of identity fraud?
Reverse criminal record identity theft is used to evade capture from law enforcement.
Reverse criminal record identity theft is used to evade capture from law enforcement.
What illegal activity has been growing due to the increase in illegal immigration?
What illegal activity has been growing due to the increase in illegal immigration?
Assumption of identity is considered ________ due to its difficulty.
Assumption of identity is considered ________ due to its difficulty.
Match the types of identity theft with their descriptions:
Match the types of identity theft with their descriptions:
Which of the following is NOT a type of identity theft?
Which of the following is NOT a type of identity theft?
The growing presence of fraudulent documents for border entry primarily includes passports and citizenship documents.
The growing presence of fraudulent documents for border entry primarily includes passports and citizenship documents.
What is the aim of criminal record identity theft?
What is the aim of criminal record identity theft?
Which of the following is a type of phishing variation that involves redirecting users to a fake site?
Which of the following is a type of phishing variation that involves redirecting users to a fake site?
Spyware can be used to achieve identity theft.
Spyware can be used to achieve identity theft.
Which method of identity theft is characterized by the use of shell companies to gather personal information?
Which method of identity theft is characterized by the use of shell companies to gather personal information?
Child identity theft is often committed by strangers rather than parents.
Child identity theft is often committed by strangers rather than parents.
What type of malware redirects traffic to an undesired site?
What type of malware redirects traffic to an undesired site?
A(n) __________ is software designed to record keystrokes, often used to capture passwords.
A(n) __________ is software designed to record keystrokes, often used to capture passwords.
What physical method of identity theft involves stealing personal information through manipulated ATMs?
What physical method of identity theft involves stealing personal information through manipulated ATMs?
The use of __________ is a common physical method of identity theft that targets personal information on credit/debit cards.
The use of __________ is a common physical method of identity theft that targets personal information on credit/debit cards.
Match the following terms with their descriptions:
Match the following terms with their descriptions:
Match the following physical methods of identity theft with their descriptions:
Match the following physical methods of identity theft with their descriptions:
Which of the following describes advance-fee/419 fraud?
Which of the following describes advance-fee/419 fraud?
Which of the following statements best describes a challenge regarding child identity theft?
Which of the following statements best describes a challenge regarding child identity theft?
All Trojans have a malicious intent.
All Trojans have a malicious intent.
Name one purpose of crimeware.
Name one purpose of crimeware.
The international nature of the web reduces the number of potential victims of identity theft.
The international nature of the web reduces the number of potential victims of identity theft.
What is the term used for theft of personal information from the magnetic strip of credit/debit cards?
What is the term used for theft of personal information from the magnetic strip of credit/debit cards?
What is a common fraudulent act enabled by identity theft/fraud?
What is a common fraudulent act enabled by identity theft/fraud?
Insurance and loan fraud can involve disappearing after pocketing government loans.
Insurance and loan fraud can involve disappearing after pocketing government loans.
What type of unique data should be included in the definition of personal identifying information according to the recommendations?
What type of unique data should be included in the definition of personal identifying information according to the recommendations?
A central repository of vital statistics should be established to improve __________ practices.
A central repository of vital statistics should be established to improve __________ practices.
Match the types of fraud with their descriptions:
Match the types of fraud with their descriptions:
Which act is NOT recommended to enhance protection against identity theft?
Which act is NOT recommended to enhance protection against identity theft?
Enhanced identity authentication practices can help reduce the chance of identity fraud.
Enhanced identity authentication practices can help reduce the chance of identity fraud.
Name one recommended action to protect victims of identity theft.
Name one recommended action to protect victims of identity theft.
What is the most common type of identity theft?
What is the most common type of identity theft?
Virtual Identity Theft requires significant effort to be accomplished.
Virtual Identity Theft requires significant effort to be accomplished.
Name one factor that complicates the measurement of internet theft.
Name one factor that complicates the measurement of internet theft.
The primary information sources regarding identity theft include credit reporting agencies, software companies, and __________.
The primary information sources regarding identity theft include credit reporting agencies, software companies, and __________.
Match the examples of identity theft with their descriptions:
Match the examples of identity theft with their descriptions:
Which of the following is a reason why the prevalence of internet theft is difficult to measure?
Which of the following is a reason why the prevalence of internet theft is difficult to measure?
Private companies have vested interests in lessening consumer fear regarding internet theft.
Private companies have vested interests in lessening consumer fear regarding internet theft.
What complicates consistent prosecution of cyber crime on a national level?
What complicates consistent prosecution of cyber crime on a national level?
What type of identity theft involves creating a credible identity to gain employment or border entry?
What type of identity theft involves creating a credible identity to gain employment or border entry?
Assumption of Identity is a common form of identity theft due to its perceived ease.
Assumption of Identity is a common form of identity theft due to its perceived ease.
What is the primary aim of criminal record identity fraud?
What is the primary aim of criminal record identity fraud?
_________ involves the fraudulent use of identifying information of a real or fictitious person.
_________ involves the fraudulent use of identifying information of a real or fictitious person.
Match the following types of identity theft with their descriptions:
Match the following types of identity theft with their descriptions:
Which document is commonly used in fraudulent activities for immigration purposes?
Which document is commonly used in fraudulent activities for immigration purposes?
Criminal record identity theft involves using someone's identity to help them secure a job.
Criminal record identity theft involves using someone's identity to help them secure a job.
Fraudulent use of _______ information is a major component of identity fraud.
Fraudulent use of _______ information is a major component of identity fraud.
Which of the following factors complicates the measurement of victimization costs?
Which of the following factors complicates the measurement of victimization costs?
The primary method of identity theft is through financial records.
The primary method of identity theft is through financial records.
What is 'popcorning' in the context of identity theft?
What is 'popcorning' in the context of identity theft?
One method of identity theft involves searching waste receptacles for identification information, known as __________.
One method of identity theft involves searching waste receptacles for identification information, known as __________.
Match the following physical methods of identity theft with their descriptions:
Match the following physical methods of identity theft with their descriptions:
What is a reason for expected increases in cyber crime?
What is a reason for expected increases in cyber crime?
Credit bureaus primarily benefit from selling protection services.
Credit bureaus primarily benefit from selling protection services.
Name one method that can be proposed to protect personal identifying information.
Name one method that can be proposed to protect personal identifying information.
What is the first step in the typical four-phase process of identity theft/fraud?
What is the first step in the typical four-phase process of identity theft/fraud?
Immigration fraud solely aims to secure employment opportunities.
Immigration fraud solely aims to secure employment opportunities.
Name one recommendation aimed at preventing identity theft.
Name one recommendation aimed at preventing identity theft.
Identity theft/fraud typically involves a ____-phase process.
Identity theft/fraud typically involves a ____-phase process.
Match the following types of fraud with their descriptions:
Match the following types of fraud with their descriptions:
Which of the following recommendations restricts the access and publication of sensitive information?
Which of the following recommendations restricts the access and publication of sensitive information?
Providing civil remedies for victims is one of the recommendations for combating identity theft.
Providing civil remedies for victims is one of the recommendations for combating identity theft.
What is a proposed method for victims to control their credit information?
What is a proposed method for victims to control their credit information?
Which of the following is a method used in child identity theft?
Which of the following is a method used in child identity theft?
Insider threats are a minor concern in identity theft.
Insider threats are a minor concern in identity theft.
What is a common problem associated with child identity theft?
What is a common problem associated with child identity theft?
Card skimming involves the theft of personal information encoded on the __________ of a credit or debit card.
Card skimming involves the theft of personal information encoded on the __________ of a credit or debit card.
Match the following identity theft methods with their descriptions:
Match the following identity theft methods with their descriptions:
Which of the following statements about physical identity theft is accurate?
Which of the following statements about physical identity theft is accurate?
Fraudulent companies often operate transparently and openly.
Fraudulent companies often operate transparently and openly.
What is one primary characteristic of internet-facilitated identity theft?
What is one primary characteristic of internet-facilitated identity theft?
What is the most common type of identity theft?
What is the most common type of identity theft?
Virtual Identity Theft requires a significant amount of effort to accomplish.
Virtual Identity Theft requires a significant amount of effort to accomplish.
Name one reason why measuring the prevalence of internet theft is difficult.
Name one reason why measuring the prevalence of internet theft is difficult.
The vested interest of private companies often ________ consumer fear about internet theft.
The vested interest of private companies often ________ consumer fear about internet theft.
Match the types of identity theft with their characteristics:
Match the types of identity theft with their characteristics:
Which of the following is a primary source of information on internet theft?
Which of the following is a primary source of information on internet theft?
A lack of national standards in measurement leads to more accurate data on internet theft.
A lack of national standards in measurement leads to more accurate data on internet theft.
What is a common consequence of Credit Identity Theft?
What is a common consequence of Credit Identity Theft?
Which of the following factors is NOT a contributor to the expected increase in identity theft?
Which of the following factors is NOT a contributor to the expected increase in identity theft?
Popcorning involves stealing information from mailboxes by looking for raised flags that signal outgoing mail.
Popcorning involves stealing information from mailboxes by looking for raised flags that signal outgoing mail.
What is one common method of physical identity theft that involves searching for personal information?
What is one common method of physical identity theft that involves searching for personal information?
The physical theft of computers, especially laptops, often occurs in places like __________.
The physical theft of computers, especially laptops, often occurs in places like __________.
Match the following methods of identity theft with their descriptions:
Match the following methods of identity theft with their descriptions:
Why is measuring the costs associated with victimization particularly challenging?
Why is measuring the costs associated with victimization particularly challenging?
Credit bureaus benefit financially by selling protection against identity theft.
Credit bureaus benefit financially by selling protection against identity theft.
Name one reason why lenders avoid creating extensive safety measures.
Name one reason why lenders avoid creating extensive safety measures.
What is a common document used in theft for employment and border entry?
What is a common document used in theft for employment and border entry?
Assumption of identity is a common method due to its ease of execution.
Assumption of identity is a common method due to its ease of execution.
What primary aim does criminal record identity theft serve?
What primary aim does criminal record identity theft serve?
Fraudulent documents used in identity theft may include __________ visas.
Fraudulent documents used in identity theft may include __________ visas.
Match the following types of identity theft with their purposes:
Match the following types of identity theft with their purposes:
Which of the following best describes identity fraud?
Which of the following best describes identity fraud?
Criminal record identity theft often involves the victim being unaware of their identity being misused.
Criminal record identity theft often involves the victim being unaware of their identity being misused.
What is the growing issue related to employment fraud and identity theft?
What is the growing issue related to employment fraud and identity theft?
What does pharming primarily involve?
What does pharming primarily involve?
Trojans can appear to serve a legitimate purpose but may also contain malicious components.
Trojans can appear to serve a legitimate purpose but may also contain malicious components.
What is the purpose of keyloggers in the context of cyber crime?
What is the purpose of keyloggers in the context of cyber crime?
The type of fraud where individuals are deceived into providing financial information due to a promise of windfall is known as __________.
The type of fraud where individuals are deceived into providing financial information due to a promise of windfall is known as __________.
Match the following methods with their descriptions:
Match the following methods with their descriptions:
Which of the following describes the process of spoofing?
Which of the following describes the process of spoofing?
Crimeware is a term used for software designed to facilitate identity theft.
Crimeware is a term used for software designed to facilitate identity theft.
What is the main function of floating windows in browser security?
What is the main function of floating windows in browser security?
What is NOT a phase in the process of identity theft/fraud?
What is NOT a phase in the process of identity theft/fraud?
Insurance fraud only pertains to personal loans.
Insurance fraud only pertains to personal loans.
What is one way to prevent the exportation of personal information to foreign countries?
What is one way to prevent the exportation of personal information to foreign countries?
Three hundred employees were arrested at _________, a major meat processing plant.
Three hundred employees were arrested at _________, a major meat processing plant.
Match the following recommendations with their benefits:
Match the following recommendations with their benefits:
Which recommendation is aimed at increasing the security of personal identification?
Which recommendation is aimed at increasing the security of personal identification?
Victims of identity theft can petition the court for a finding of factual innocence.
Victims of identity theft can petition the court for a finding of factual innocence.
Name one consequence of immigration fraud.
Name one consequence of immigration fraud.
Flashcards are hidden until you start studying
Study Notes
Identity Theft and Identity Fraud
- Identity theft can be used to describe any use of stolen personal information.
- Identity fraud is a subset of identity theft.
- The goal of identity fraud is to create a credible identity through access to credit cards, financial or employment records.
Typologies of Internet Theft/Fraud
- Assumption of Identity is rare due to the difficulty in assuming all aspects of a person’s life.
- Theft for Employment and/or Border Entry involves fraudulent use of stolen or fictitious information to get work or gain entry into the U.S.
- This type of fraud is increasing because of illegal immigration and alien smuggling.
- Examples of fraudulent documents include alien registration cards, visas, and passports.
- Criminal Record Identity Theft/Fraud is committed to evade capture and criminal prosecution.
- It often involves lying to police upon arrest.
- Virtual Identity Theft/Fraud involves using personal, professional, or other aspects of an identity to develop a fraudulent virtual personality.
- It is easy to accomplish because it requires minimal effort.
- Credit Identity Theft is the most common and most feared type of identity theft.
- It involves using stolen personal and financial information to create fraudulent accounts.
Prevalence and Victimology
- There are several factors that make it difficult to accurately measure the prevalence of identity theft. These include:
- Perceptions of apathy.
- Lack of reporting by local and state law enforcement agencies to federal agencies.
- Jurisdictional discrepancies regarding how to measure these activities.
- Selective enforcement based on community standards and departmental resources.
- Delayed notification of victimization.
- Vested interest of private companies in exploiting consumer fear.
- Lack of mandatory reporting and inconsistent prosecution by federal agencies.
- Lack of national standards in measurement.
Physical Methods of Identity Theft
- Mail theft involves stealing information from mailboxes, including credit card offers, government documents, and passports.
- Popcorning involves searching for raised flags which signal outgoing mail.
- Dumpster Diving involves searching trash receptacles for identifying information.
- Theft of Computers involves stealing computers, containing personal information, from airports, hotels, homes, and offices.
Virtual or Internet-Facilitated Methods
- Phishing involves sending fraudulent emails or creating fake websites to acquire personal information.
- Variations include:
- Spoofing: Uses false, but apparently authentic, communications to solicit funds.
- Pharming: Redirects a connection from a legitimate IP address to a mirror site.
- Redirectors: Malware redirects traffic to undesired sites.
- Advance-fee/419 fraud: Strangers deceive people into providing financial information, often with a promise of a windfall.
- Phishing Trojans/Spyware: Often installed to create botnets.
- Floating Windows: Placed over the address bar of a browser to steal personal information.
- Botnets: Change a website's IP address without changing the domain name to steal information and spread malware.
- Variations include:
- Spyware takes control of a computer’s interactions with users to capture information.
- Crimeware is spyware that is used to achieve identity theft and other financially motivated crimes.
- Keyloggers record keystrokes, like passwords, and can be hardware or software.
- Trojans can have an apparently legitimate purpose, but often are actually keyloggers, password-stealers, or installers of back doors.
Crimes Facilitated by Identity Theft/Fraud
- Insurance and Loan Fraud is committed to get government loans, enroll in a legitimate institution, drop out, pocket the money, and disappear.
- Immigration Fraud and Border Crossings involve using fraud to secure a border crossing, obtain immigration benefits, or engage in acts of terror.
- Example: 300 Swift & Company employees were arrested for falsifying immigration documents.
Conclusions and Recommendations
- Expand the definition of personal identifying information to include biometric data.
- Establish a central repository of vital statistics.
- Develop alternate methods to authenticate identity.
- Prohibit the exportation of personal information to foreign countries.
- Provide victims with the ability to petition the court for a finding of factual innocence.
- Provide for consumer-initiated credit “freezes” or “blocks.”
- Restrict access and publication of social security numbers.
- Ban the sale of social security numbers.
- Require the oversight of data-selling companies.
- Require enhanced identity authentication practices.
- Develop a standardized police report.
- Develop civil remedies and criminal penalties directly proportionate to the loss suffered.
- Provide civil remedies for victims.
Identity Theft and Identity Fraud
- Identity theft encompasses any use of stolen personal information, while identity fraud is a subset of identity theft, specifically involving the fraudulent use of identifying information.
- Identity fraud involves the creation of a credible identity using information like credit cards, financial records, or employment records.
- Typologies of Internet Theft/Fraud
- Assumption of Identity: A rare form of theft where someone assumes all aspects of another person's life.
- Theft for Employment and/or Border Entry: Often tied to illegal immigration or alien smuggling, this involves using stolen or fictitious information to secure jobs or gain entry into the United States.
- Criminal Record Identity Theft/Fraud: This type of fraud aims to evade capture or criminal prosecution, often involving false claims to law enforcement during arrests.
- Virtual Identity Theft/Fraud: Using personal, professional, or other aspects of an identity to develop a fraudulent online persona.
- Credit Identity Theft/Fraud: The most common and feared form, using stolen personal and financial information to create fraudulent credit accounts.
Prevalence and Victimology
-
Statistics on identity theft are difficult to accurately measure. Contributing factors include:
- Perception of apathy: Victims may not report theft due to a feeling of helplessness.
- Lack of consistent reporting: Local and state law enforcement don't always report identity theft to federal agencies.
- Jurisdictional inconsistencies: Varying definitions and regulations make it difficult to track the crime.
- Selective enforcement: Resource limitations and community standards influence how local law enforcement addresses the crime
- Delayed notification: Victims may not be aware of the theft until much later.
- Vested interests: Private companies capitalize on consumer fear, pushing for protection services and products.
- Lack of reporting requirements: There are no standardized reporting requirements for identity theft.
-
Primary Information Sources:
- Credit reporting agencies, software companies, media outlets, and government agencies all collect data on identity theft.
- It's important to consider the agenda of each source. For example, credit reporting agencies and software companies may overstate the frequency of identity theft to sell protective services.
Physical Methods of Identity Theft
- Bag Operations: Intelligence operatives, often working with corrupted hotel staff, steal information from hotel rooms, taking advantage of readily accessible mass storage media.
- Child Identity Theft: Parents often commit this type of theft, leading to challenges in identification and delays, especially since these crimes may not fall under child welfare agency jurisdiction.
- Insiders: Employees, whether intentionally or accidentally, pose a significant risk.
- Fraudulent/Fictitious Companies: Sophisticated schemes frequently involve the creation of sham companies solely to collect personal information.
- Card Skimming: Stolen information is encoded from the magnetic strip of credit/debit cards.
- ATM Manipulation: ATM machines are modified to steal personal information, including PINs, through fraudulent means.
Virtual or Internet Facilitated Methods
- The internet's accessibility and lack of emphasis on security make it a prime target for identity theft.
- Phishing: Fraudulent emails and websites are used to collect personal information (e.g., Nigerian 419 scams). Identifying perpetrators is challenging.
- Spoofing: Scams using false but authentic-seeming communications to request funds.
- Pharming: Redirecting internet traffic from legitimate sites to fake mirror sites.
- Redirector Software: Malware that directs internet traffic to unwanted websites.
- Advance-Fee/419 Fraud: Individuals are tricked into providing financial information by promises of large sums of money.
- Phishing Trojans or Spyware: These often install botnets to steal information and spread malicious software.
- Floating Windows: These appear over web browser address bars to steal information.
- Botnets: Botnets change website IP addresses while maintaining the same domain names, enabling information theft and malware dissemination.
- Spyware and Crimeware:
- Spyware: Software that monitors a user's computer activity and captures information.
- Crimeware: Spyware used specifically for identity theft and other financial crimes.
- Keyloggers and Password Stealers: These devices record keystrokes, including sensitive information like passwords.
- Trojans: Software that appears to be legitimate but may actually contain keyloggers, password stealers, or backdoor access tools.
Crimes Facilitated by Identity Theft/Fraud
- Identity theft often serves as a method for anonymously accessing private areas and transferring resources.
- Four-phase process:
- Obtaining stolen identifiers.
- Creating or obtaining a breeder document (e.g., birth certificate, driver's license).
- Using the breeder document to create additional fraudulent documents.
- Employing the fraudulent identity to commit a crime.
- Insurance and Loan Fraud: Stolen identities are used to obtain government loans, enroll in educational institutions, and then disappear with the funds.
- Immigration Fraud and Border Crossings: Fraudulent information is used to secure border crossings, receive immigration benefits, or engage in acts of terrorism (e.g., a case involving 300 employees arrested at Swift & Company, a meat processing plant).
Conclusions and Recommendations
- Expand the definition of personal identifying information: Include unique biometric data.
- Establish a central repository of vital statistics: This would help in tackling identity theft.
- Develop alternative authentication methods: Seek out less vulnerable ways to verify identity.
- Prohibit the export of personal information: Prevent data from leaving the country and falling into the wrong hands.
- Provide victims with the ability to claim factual innocence: Allow victims to petition courts for official recognition of the theft.
- Implement consumer-initiated credit "freezes" or "blocks": Give individuals control over their credit information.
- Restrict access to and publication of social security numbers: Minimize exposure to this sensitive information.
- Ban the sale of social security numbers: Prevent the exploitation of this critical data.
- Require oversight of data-selling companies: Regulate these companies to ensure they are not facilitating identity theft.
- Implement enhanced identity authentication practices: Improve security measures for online accounts.
- Develop a standardized police report: Ensure that all investigations and reports include consistent data.
- Develop civil remedies and criminal penalties: Establish clear legal consequences.
- Provide civil remedies for victims: Allow victims to seek compensation and justice.
Identity Theft and Identity Fraud
- Identity theft is a broad term encompassing any unauthorized use of someone else's personal information.
- Identity fraud is a specific type of identity theft that involves using stolen personal information for financial gain.
- Identity fraud can involve real or fictitious identities and can affect a variety of aspects of a person's life, including employment, finances, and even immigration status.
Typologies of Internet Theft/Fraud
- Assumption of Identity: This rare form of identity theft involves a person taking on all aspects of another person's life. It is difficult to accomplish because it requires a high level of detail and knowledge.
- Theft for Employment and/or Border Entry: This type of fraud involves using stolen or fabricated personal information to obtain employment or gain entry into the United States. This type of fraud is growing due to an increase in illegal immigration and alien smuggling.
- Criminal Record Identity Theft/Fraud: This involves using a victim's identity to evade capture, criminal prosecution, or to obtain employment.
- Virtual Identity Theft/Fraud: This type of fraud involves using personal, professional, or other aspects of a person's identity to develop a fraudulent online persona. This can occur for innocent or malicious reasons.
- Credit Identity Theft/Fraud: The most common and feared type of identity theft involves using stolen personal and financial information to create fraudulent accounts.
Prevalence and Victimology
- Measuring the prevalence of identity theft is difficult due to a lack of consistency and accuracy in reporting.
- Factors contributing to inaccurate reporting include:
- Perceptions of apathy by victims
- Lack of reporting by local and state law enforcement to federal agencies
- Jurisdictional discrepancies in measurements
- Selective enforcement based on community standards and departmental resources
- Delay in victim notification or awareness of victimization
- Other factors influencing the difficulty of accurately measuring identity theft:
- Vested interest of private companies to exploit consumer fear
- Lack of mandatory reporting and inconsistent prosecution by federal agencies
- Lack of national standards in measurement
- Primary sources of information on identity theft include:
- Credit reporting agencies
- Software companies
- Popular and trade media
- Government agencies
- Each of these sources has its own agenda, including:
- Credit reporting agencies and software companies that want to sell products and services for protection
- Popular press outlets that capitalize on consumer fears
Prevalence and Victimology (Continued)
- Measuring the costs associated with identity theft victimization is challenging due to losses extending beyond financial cost.
- Factors affecting the cost of victimization:
- Loss of consumer confidence
- Delay in victim awareness
- General lack of reporting
- Expected increases in identity theft, particularly virtual methods, due to:
- Increasing globalization of communication and commerce
- Lack of cooperation by lenders and consumer reporting agencies
- Reluctance of lenders to alienate consumers with time-consuming safety measures
- Profitability of credit bureaus from selling protection
- Increased outsourcing of information and services
Physical Methods of Identity Theft
- Mail Theft: Stealing information from mailboxes, including credit card offers, government documents, passports and Social Security Statements.
- Dumpster Diving: Searching through garbage for identifying information.
- Theft of Computers: Physical theft of computers, especially laptops, for the purpose of accessing personal information.
- Bag Operations: Intelligence theft conducted by governmental intelligence operatives often in hotel rooms, usually with the help of corrupted hotel employees.
- Child Identity Theft: Typically committed by parents. Increasing dramatically, presenting challenges due to delayed identification and not being within the purview of child welfare agencies.
- Insiders: Employees, intentionally or accidentally, pose a significant threat of identity theft.
- Fraudulent/Fictitious Companies: Sophisticated shell companies created for the purpose of gathering personal information.
- Card Skimming: Theft of personal information encoded on the magnetic strip of credit or debit cards.
- ATM Manipulation: Stealing personal information, such as PINs, through fraudulent ATM devices.
Virtual or Internet-Facilitated Methods
- These methods leverage the accessibility and lack of security inherent in the internet.
- The international nature of the internet expands the potential number of victims.
Crimes Facilitated by Identity Theft/Fraud
- Insurance and Loan Fraud: Using the stolen information to obtain government loans, enroll in educational institutions, and then drop out, pocketing the money and disappearing.
- Immigration Fraud and Border Crossings: Utilizing stolen information to secure border crossings, obtain immigration benefits, and engage in acts of terror.
Conclusions and Recommendations
- Expand the definition of personal identifying information to include unique biometric data.
- Establish a central repository of vital statistics.
- Develop alternate means to authenticate identity.
- Prohibit the exportation of personal information to foreign countries.
- Provide victims with the ability to petition the court for a finding of factual innocence.
- Provide for consumer-initiated credit “freezes” or “blocks.”
- Restrict access and publication of social security numbers.
- Ban the sale of social security numbers.
- Require oversight of data-selling companies.
- Require enhanced identity authentication practices.
- Develop a standardized police report.
- Develop civil remedies and criminal penalties directly proportionate to the loss suffered.
- Provide civil remedies for victims.
Identity Theft and Identity Fraud
- Identity theft encompasses any use of stolen personal information, including identity fraud.
- Identity fraud involves using a credible identity created through access to credit cards, financial or employment records.
- The assumption of identity is rare due to its difficulty.
- Theft for employment and/or border entry involves fraudulent use of stolen or fictitious personal information to get work or gain entry into the U.S.
- Criminal record identity theft/fraud aims to evade capture and criminal prosecution.
- Virtual identity theft/fraud involves using aspects of identity to develop a fraudulent virtual personality, with both innocent and malevolent motives.
- Credit identity theft/fraud is the most common and most feared, involving using stolen personal and financial information to create fraudulent accounts.
- Measuring the prevalence and impact of identity theft is difficult due to:
- Perceptions of apathy
- Lack of reporting to federal agencies
- Jurisdictional discrepancies
- Selective enforcement
- Delayed notification or awareness by victims
- Vested interest of private companies
- Lack of mandatory reporting and inconsistent prosecution by federal agencies
- Lack of national standards in measurement
- Primary information sources about identity theft include:
- Credit reporting agencies
- Software companies
- Popular and trade media
- Government agencies
- Measuring the cost of identity theft is challenging because it extends beyond monetary losses, also including:
- Loss of consumer confidence
- Delay in victim awareness
- General lack of reporting
- Anticipated increases in identity theft are due to:
- Increasing globalization of communication and commerce
- Lack of cooperation by lenders and consumer reporting agencies
- Lenders' reluctance to implement time-consuming safety measures
- Credit bureaus profiting from selling protection
- Increased outsourcing of information and services
- Physical methods of identity theft include:
- Mail theft: Stealing information from mailboxes, including credit card offers, government documents, and passports.
- Dumpster diving: Searching waste receptacles for identification information.
- Theft of computers: Physical theft of computers, especially laptops, from airports, hotel rooms, homes, and offices, due to their storage of personal information.
- Virtual or Internet-facilitated methods of identity theft include:
- Phishing: Using fraudulent emails and fake websites to solicit information.
- Spoofing: Soliciting funds via false, but apparently authentic communications.
- Pharming: Redirecting connections from legitimate IP addresses to mirror sites.
- Redirectors: Malware that redirects traffic to undesired sites.
- Advance-fee/419 fraud: Strangers deceiving people into providing financial information through promises of windfalls.
- Phishing Trojans or spyware: Creating botnets for identity theft.
- Floating windows: Placed over browser address bars to steal personal info.
- Botnets: Changing website IP addresses without changing domain names to steal info and spread malware.
- Spyware: Takes control of computer interactions with users to capture information.
- Crimeware: Spyware used for identity theft and other economically motivated crimes.
- Keyloggers: Record keystrokes, like passwords, through hardware or software.
- Trojans: Seemingly legitimate programs that often contain keyloggers, password-stealers, or backdoor installers.
- Identity theft/fraud facilitates anonymous entry into private areas for resource transfer through a four-phase process:
- Procure stolen identifiers.
- Create or secure a breeder document (birth certificate, driver's license, etc.).
- Use breeder documents to create additional fraudulent documents and solidify an identity.
- Employ fraudulent identity to commit criminal acts.
- Identity theft/fraud is involved in:
- Insurance and loan fraud: Obtaining government loans, enrolling in legitimate institutions, dropping out, pocketing money, and disappearing.
- Immigration fraud and border crossings: Securing border crossings, obtaining immigration benefits, and engaging in acts of terror.
- Recommendations to combat identity theft include:
- Expanding the definition of personal identifying information to include unique biometric data.
- Establishing a central repository of vital statistics.
- Developing alternate means to authenticate identity.
- Prohibiting the exportation of personal information to foreign countries.
- Providing victims with the ability to petition the court for a finding of factual innocence.
- Providing for consumer-initiated credit “freezes” or “blocks”.
- Restricting access and publication of social security numbers.
- Banning the sale of social security numbers.
- Requiring oversight of data-selling companies.
- Requiring enhanced identity authentication practices.
- Developing a standardized police report.
- Developing civil remedies and criminal penalties directly proportionate to the loss suffered.
- Providing civil remedies for victims.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.