- Term Papers and Free Essays

Identity Theift

Essay by   •  November 17, 2010  •  1,674 Words (7 Pages)  •  1,383 Views

Essay Preview: Identity Theift

Report this essay
Page 1 of 7

Identity theft is a term used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, your personal data ¬ especially your Social Security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data ¬ can be used, if they fall into the wrong hands, to personally profit at your expense (Weisman).

Over the last few years, the number of reported cases of identity theft has skyrocketed, from 86,000 reported cases in 2001 to over 10,000,000 in 2005 (Weisman). It is by far the fastest growing crime in the United States. Perhaps what is even scarier than the crime itself is the ease with which the crime can be pulled off. Many people do not realize how easily criminals can obtain our personal data without having to break into our homes. In public places, for example, criminals may engage in "shoulder surfing" ¬ watching you from a nearby location as you punch in your telephone calling card number or credit card number ¬ or listen in on your conversation if you give your credit-card number over the telephone to a hotel or rental car company (Delaney). Even the area near your home or office may not be secure. Some criminals engage in "dumpster diving" ¬ going through your garbage cans or a communal dumpster or trash bin to obtain copies of your checks, credit card or bank statements, or other records that typically bear your name, address, and even your telephone number (Borrus). These types of records make it easier for criminals to get control over accounts in your name and assume your identity.

If you receive applications for "pre-approved" credit cards in the mail, but discard them without tearing up the enclosed materials, criminals may retrieve them and try to activate the cards for their use without your knowledge. (Some credit card companies, when sending credit cards, have adopted security measures that allow a card recipient to activate the card only from his or her home telephone number but this is not yet a universal practice (Weisman).) Also, if your mail is delivered to a place where others have ready access to it, criminals may simply intercept and redirect your mail to another location.

In recent years, the Internet has become an appealing place for criminals to obtain identifying data, such as passwords or even banking information (Borrus). In their haste to explore the exciting features of the Internet, many people respond to "spam" ¬ unsolicited E-mail ¬ that promises them some benefit but requests identifying data, without realizing that in many cases, the requester has no intention of keeping his promise. In some cases, criminals reportedly have used computer technology to obtain large amounts of personal data. With enough identifying information about an individual, a criminal can take over that individual's identity to conduct a wide range of crimes: for example, false applications for loans and credit cards, fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining other goods or privileges which the criminal might be denied if he were to use his real name. If the criminal takes steps to ensure that bills for the falsely obtained credit cards, or bank statements showing the unauthorized withdrawals, are sent to an address other than the victim's, the victim may not become aware of what is happing until the criminal has already inflicted substantial damage on the victim's assets, credit, and reputation (Gattiker).

Experts have suggested many different ways to reduce the risk of being a victim of identity theft. Many of these suggestions are extremely easy and worth the trouble. At home start by adopting a "need to know" approach to your personal data (Weisman). Your credit card company may need to know your mother's maiden name, so that it can verify your identity when you call to inquire about your account. A person who calls you and says he's from your bank, however, doesn't need to know that information if it's already on file with your bank; the only purpose of such a call is to acquire that information for that person's personal benefit. Also, the more information that you have printed on your personal bank checks such as your Social Security number or home telephone number the more personal data you are routinely handing out to people who may not need that information (Levy&Stone). If someone you don't know calls you on the telephone and offers you the chance to receive a "major" credit card, a prize, or other valuable item, but asks you for personal data such as your Social Security number, credit card number or expiration date, or mother's maiden name ask them to send you a written application form. If they won't do it, tell them you're not interested and hang up. If they will, review the application carefully when you receive it and make sure it's going to a company or financial institution that's well-known and reputable (Delaney). The Better Business Bureau can give you information about businesses that have been the subject of complaints. Another way to prevent possible identity theft is to always be on the look out for people that may be eavesdropping on conversations or watching what is being written down. This prevents the "shoulder surfing" technique. The next tip is to never respond to suspicious E-mails or phone solicitors (Delaney). This is especially true of E-mails and solicitations that request identifying information.

Although identity theft crimes and be around your home town and area did you ever think about when you go on vocation? Experts also suggest many different ways to reduce the risk of being a victim when away from home. If you're traveling, have your mail held at your local post office, or ask someone you know well and trust ¬ another family member, a friend, or a neighbor ¬ to collect and hold your mail while you're away (Fisher). If you have to telephone someone while you're traveling, and need to pass on personal financial information to the person you're calling, don't do it at an open telephone booth where passersby can listen in on what you're saying; use a telephone booth where you can close the door, or wait until you're at a less public location



Download as:   txt (10 Kb)   pdf (121.1 Kb)   docx (12.5 Kb)  
Continue for 6 more pages »
Only available on
Citation Generator

(2010, 11). Identity Theift. Retrieved 11, 2010, from

"Identity Theift" 11 2010. 2010. 11 2010 <>.

"Identity Theift.", 11 2010. Web. 11 2010. <>.

"Identity Theift." 11, 2010. Accessed 11, 2010.