preview

Essay On Identity Theft

Better Essays

Identity Theft Identity theft can occur when someone uses someone else’s identity in an effort to illegally obtain material or other forms of benefits. In all cases, the identity thief victims end up suffering great financial losses along with other undesirable consequences like tainted reputation. While the prevention, detection and dealing with identity theft aftermaths maybe the common focus of every individual, it would much advantageous to have a basic understanding and nature of how identity theft happens. A number of techniques employed in this habit are pretty straightforward such as wallet theft, credit cards and mails. Some are however complex, technological and sophisticated. Thieves all around the globe are determined to develop …show more content…

In most cases, this mode of identity theft is associated with stealing property. I would do this by redirecting mails for relatively two reasons. First, mails offer an abundant source of personal information either related to property of financial transactions. Second, redirecting a mail provides me with adequate time needed to engage in a fraudulent financial transaction sooner before the victim can detect or become suspicious of inconsistent activity. The method can be accomplished through arranging for a redirecting of the victim’s mail either for the entire victim’s mailing addresses or on a single account through the institution providing the account. For instance, by diverting statements disclosing victim’s billings to a different location by simply filling a change-address form (CIPPIC, …show more content…

I will accomplish this using minute electronic devices termed as skimmers or wedges. As the victim swipes their card over the skimmer, I would easily copy vital information and then create duplicate cards. By successfully doing this, as an identity thief, I would easily commit credit card frauds that allow me to buy several products or even withdraw money on the victim’s behalf. To get such information, I would proceed to steal a physical credit card or get it electronically hack attack. It is the most conduced identity theft and although the most guarded against, it’s practically

Get Access