preview

Identity Theft Essay examples

Good Essays

Introduction

There is currently a huge growing number of criminals that now do greater and more widespread damage to their victims without ever meeting them. Identity theft surfaced in the early 1990s and turned peoples everyday transactions into a data gathering game. Bits of personal information such as bankcards, credit card accounts, income, social security numbers or just someone name, address, and phone numbers are now collected and could be used illegally by these individuals without anyone’s knowledge.
The purpose of this study is to investigate what is being done to help control this growing crime in North Carolina. This includes the evaluation of the identity theft …show more content…

The less sophisticated thieves have perfected the art of “dumpster-driving” rummaging through trash. Abusing employer’s authorized access to credit reports or some even playing ‘landlord’ has given them unauthorized access to victim’s reports. Some victims have been scammed fro information by an identity thief posing as a legitimate businessperson or government official. In the most recent news from Concord, NC (Aug. 19, 2004), the police have uncovered a more sophisticated case of ID theft. The newspapers stated, “Authorities think a portable credit card reader, or skimmer, was used to read personal information off a credit card’s magnetic strip. Then those details were applied to the strip on the back of a different cared.”
Information gathered from various nationwide newspapers have indicated that some employees of companies that handle personal consumer information such as banks and utility companies, among others, have emailed confidential loan files to unauthorized third parties. This inappropriate employee use of email can result in identity persecution of the customer who have entrusted them with their personal data.
The thieves, who now have the information they need, proceed with going on spending sprees at the expense of the victim. They open new accounts in their name and SSN, write bad checks against a checking account or run up the charges on a credit card, then leave them unpaid.

Get Access