Share
Explore BrainMass

Use of technology to steal identities

I need information on criminals using todays technology (computers) to steal identities.

Criminals Using Today's Technology to Steal Identities
I. Introduction

II. Understanding the Concept of Identity Theft
A. Types of Information Used in Identity Theft
B. Typical Victims of Identity Theft
C. The Magnitude of the Damage to Victims

III. How computers and the Internet are Used to Stealing Identities
A. Methods of stealing Identities
1. Online Auction Fraud
B. The evolvement of technology and how it plays a role in identity theft
1. Internet Scams, Spoofing, and Phishing

IV. Conclusion
A. Avoiding being a victim of identity theft
B. Identify Theft and Assumption Deterrence Act of 1998
C. Protection Against Identify Theft

Solution Preview

Dear Student,

Thank you for selecting the OTAs at BrainMass to assist you. Below is a working draft of your assignment and you should now have the tools to aid you in customizing your work using your own words, where applicable. I hope that you are happy with my dedication to your important assignment. A wealth of links have been provided; please be sure to cite any references used herein.

*** NOTE [As stated on Brainmass.com]: "We cannot do assignments for students. If it appears that this is what is requested, Postings may be Suspended."

---------------------------------------------------------------
Thanks and Good luck!

Criminals Using Today's Technology to Steal Identities: All of these have been grouped together in sections
I. Introduction
III. How computers and the Internet are Used to Stealing Identities
A. Methods of stealing Identities
B. The evolvement of technology and how it plays a role in identity theft

I. III. A. B.:

In the analog days of paper trails, identity theft was not as astounding as in today's digital world. No more rotary telephones or facsimiles; now there is blue tooth digital mobiles and electronic mail for transmitting (sensitive) information. Data of all types are now electronic: greater credit card use, online shopping, banking, online social networks, hacking, and so much more. Therefore, it is much easier for criminals to use the internet or any other technology (i.e. bionic ears or infrared systems) to steal identities of victims across the globe.

HowStuffWorks (n.d.) references that, "I┬Čnnocent people are being arrested because someone is committing crimes using their names. Can you prevent this from happening? Can you protect yourself from these white collar criminals? What is law enforcement doing about it?

II. Understanding the Concept of Identity Theft
A. Types of Information Used in Identity Theft
B. Typical Victims of Identity Theft

II. A. B.:

HowStuffWorks further mentions that, "Identity theft can enter into many areas of our lives. It involves any instance where a person uses someone else's identification documents or other identifiers in order to impersonate that person for whatever reason. According to a September 2003 survey conducted by the Federal Trade Commission, an estimated 10 million people in the United States found out they were victims of identity theft in the previous year. More appropriately titled identity fraud, your identity might be stolen in order for someone to commit:

? Financial fraud - This type of identity theft includes bank fraud, credit card fraud, computer and telecommunications fraud, social program fraud, tax refund fraud, mail fraud, and several more. In fact, a total of 25 types of financial identity fraud are investigated by the United States Secret Service. While financial identity theft is the most prevalent (of the approximate 10,000 financial crime arrests that Secret Service agents made in 1997, 94 percent involved identity theft), it certainly isn't the only type. Other types of identity theft, however, usually involve a financial element as well -- typically to fund some sort of criminal enterprise.

? Criminal activities - This type of identity fraud involves taking on someone else's identity in order to commit a crime, enter a country, get special permits, hide one's own identity, or commit acts of terrorism. These criminal activities can include:
-Computer and cyber crimes
-Organized crime
-Drug trafficking
-Alien smuggling
-Money laundering"

Reference: http://money.howstuffworks.com/identity-theft.htm

1. Online Auction Fraud
1. Internet Scams, Spoofing, and Phishing

"Internet auction sites give buyers a "virtual" flea market with new and used merchandise from around the world; they give sellers a global storefront from which to market their goods. But the online auction business can be risky business. The Federal Trade Commission (FTC) wants to help buyers and sellers stay safe on Internet auction websites. Among the thousands of consumer fraud complaints the FTC receives every year, those dealing with online auction fraud consistently rank near the top of the list. The complaints generally deal with late shipments, no shipments, or shipments of products that aren't the same quality as advertised; bogus online payment or escrow services; and fraudulent dealers who lure bidders from legitimate auction sites with seemingly better deals. Most complaints involve sellers, but in some cases, the buyers are the subject..."

Reference: http://www.ftc.gov/bcp/conline/pubs/online/auctions.shtm
Other: http://www.fraud.org/tips/internet/onlineauctions.htm

C. The Magnitude of ...

Solution Summary

Very detailed research on given topic in the format provided. Extensive detail and references in solution.

$2.19