Identity Theft: Identity Fraud and the Data Breaches Essay

How would you protect cooperate executives from fraudulent acts against them, measures to ensure that the identity-theft mitigation measures are upheld.

Identity theft is an act of stealing someone else’s identity with the intention of accessing resources or any other benefits that may come from using the victim’s name. People or even organizations can be faced with adverse consequences should they fall victims of these identity fraudsters.

Identifying the connection between the identity fraud and the data breeches is always a very hard task since it is never easy determining how the theft was executed. An unpublished study by Carnegie Mellon University affirms that in many cases, the reasons for identity theft are never identified but chances of falling victim to identity theft stands at around 2% (Michelle, 2000).

With the advent of technology, identity theft has been made even much easier to the fraudsters. Hackers now have access to very malicious software and applications. There even exists such application as ‘interested in credit card theft?’ This reveals the ease with which the identity thieves can access all sorts of information online.

An example of an identity theft is the case of Abraham Abdalla of Brooklyn, also known as the bus boy. He went online to access people’s private financial details. The victims included among the wealthiest people in America. He even had Oprah Winfrey’s and Steven Spielberg’s credit cards and financial information.

However, his days were numbered and he was caught while he was attempting to make one of the largest transactions. It was referred to as a software giant. This and a multitude of various other cases occur every other day.

Cooperative executives are at a great risk of falling victims to identity theft. This is so majorly because of the largesse that they always hold in the form of personal and organizational resources. This may consequently lead to large and even irrecoverable personal and organizational losses.

Before coming up with ways and measures of curbing identity theft that may be targeted on the executives, it is necessary to identify the modes and means by which the theft may be executed. It is also very important to note that fraudsters begin by obtaining personal and confidential information of their victims. Thus, it is vital to note some of the ways in which personal identifiers may fall in the hands of the fraudsters.

In order to obtain the confidential information, the identity thieves may apply various acts. One of the acts include rummaging through rubbish at dumpsites to access dumped documents which could containing their target victim’s information or rather – in this case – the executive’s information. These are the so-called dumpster divers.

Redundant IT equipment may also serve as a rich source of information to the fraudsters. These equipments may include, amongst many others, storage media such as flash disks and other memory sticks, hard drives and mobile phones. All these equipments, when carelessly disposed of, may be the genesis of grave problems.

Identity thieves can also observe as someone types their login details in an attempt to log into their private sites in publicly situated IT devices such as computers or even ATMs. The identity thieves, in order to obtain confidential data, may also use sophisticated means such as the hand held card readers that are able to skim through and avail details from a credit card (Austin & Carr, 2002).

To retrieve confidential data online, the identity thieves can use spyware or even hack into computers and databases to obtain volumes of information. Certain software can be access by hackers and can even be used by amateur hackers to break into and retrieve information from their accomplices’ computers.

Additionally, the fraudsters can attack weak passwords and gain access into an executive’s details that are found online. The fraudsters do this through well-calculated guess works to crack weak passwords.

Therefore, the big question becomes, how can cooperate executives protect themselves and their organizations against the identity thieves? It is important to note that the fraudsters acquire personal information or rather personal identifiers through serious breaches (Neal, 2002).

It is also important to affirm that in most cases, it is as a result of an individual’s naivety or ignorance that the identity thieves find it easy to carry out their heinous acts. Ignorance and naivety may lead to mishandling of vital personal and even organizational details.

To avert this crime, the executives should avoid unnecessary introductions or identification of themselves at bogus avenues. This is basically known as risk avoidance (Johnson, 2006). There is need to be very cautious about IT systems that require or demand excess amounts of personal information such as national identification numbers or even social security numbers.

Electronic identity theft can be mitigated by maintaining computer security. An example includes fully patching the operating systems and thus protecting them from intrusion by security threats.

Computer systems’ security can also be fortified by running antivirus software to expel any malware or spyware that may be used by identity thieves to obtain information. Recently, there were insurance service providers who not only purport to protect against identity fraud but also to identify when an identity theft had occurred.

Some other basic measures to avert executives’ identity theft are to ensuring that all waste documents containing confidential information are shredded before they are dumped. All organizational networks should be completely secured. The executives’ computers, laptops or any other portable IT devices should be strongly encrypted to protect information in case the devices are stolen.

From the above scenario, we can effectively learn that apart from the executive ensuring security of personal details, various other persons within an organizational setup also carry the role of upholding the organization and even the executives’ details security (Dick, 2006).

These persons may include office secretaries, the company IT persons, mobile phone service providers, and many other stakeholders. It is consequently important that an awareness program be carried out in order to educate these groups of individuals on how to work against identity fraud.

The education and awareness program would be carried out in the form of a workshop whereby all these groups of persons would be invited. The workshop would touch on issues such as appropriate paper and equipment dumping procedures, IT systems security, importance of risk avoidance and many other propositions.

In order to ensure that the proposed measures of averting identity fraud are upheld, it would be necessary to put everyone on toes. The departmental heads can effectively do this.

The departmental heads may in turn appoint monitors who would ensure that the agreed on steps are upheld and reports made on a daily or weekly basis. For example, it would be important to assign someone the job of ensuring that all waste paper and equipment are free of confidential information.

Austin, J., & Carr, J. (2000). Data Breaches and Identity Fraud . New York, NY: Context Press.

Dick, G. (2010). Fighting Personal Identity fraud. New York, NY: McGraw Hill.

Johnson, J. (2006) . A Chronology of Data Breaches. Stanford: Stanford University Press.

Michelle, M. (2000). Identity Theft: How to Protect and Restore Your Good Name. Field manual , 6(22), 1-216.

Neal, J. (2002). Guarding Cooperate Identity . Aldershot: Ashgate Publishing.

  • Chicago (A-D)
  • Chicago (N-B)

IvyPanda. (2023, December 10). Identity Theft: Identity Fraud and the Data Breaches. https://ivypanda.com/essays/identity-theft/

"Identity Theft: Identity Fraud and the Data Breaches." IvyPanda , 10 Dec. 2023, ivypanda.com/essays/identity-theft/.

IvyPanda . (2023) 'Identity Theft: Identity Fraud and the Data Breaches'. 10 December.

IvyPanda . 2023. "Identity Theft: Identity Fraud and the Data Breaches." December 10, 2023. https://ivypanda.com/essays/identity-theft/.

1. IvyPanda . "Identity Theft: Identity Fraud and the Data Breaches." December 10, 2023. https://ivypanda.com/essays/identity-theft/.

Bibliography

IvyPanda . "Identity Theft: Identity Fraud and the Data Breaches." December 10, 2023. https://ivypanda.com/essays/identity-theft/.

  • Identifying Psychopathic Fraudsters
  • Identity Theft on Credit Card Fraud Using Qualitative Method
  • Incoming Millennial Fraud Tidal Wave
  • The New Kinds of Identity Theft
  • Protecting Organizations From Hackers and Thieves
  • Credit Bureau Reporting Agencies and Their Purpose
  • Online Identity Theft and Risk Mitigation
  • Phishing as Type of Cybercrime
  • Cheating in the Internet
  • Computer Fraud and Contracting
  • Megan’s law and Adam Walsh Act
  • The case of Charles Laverne Singleton
  • Scientific Approaches to Pornography
  • The Suitability of the Death Penalty
  • New Technological Advances Within the Police Department

Pitchgrade

Presentations made painless

  • Get Premium

126 Identity Theft Essay Topic Ideas & Examples

Inside This Article

Identity theft is a serious crime that can have devastating consequences for victims. From financial loss to damage to reputation, the effects of identity theft can be long-lasting and difficult to overcome. As such, it is important for individuals to be aware of the risks and take steps to protect themselves from becoming victims.

One way to raise awareness about identity theft is through writing essays on the topic. To help get you started, here are 126 identity theft essay topic ideas and examples that you can use as inspiration for your own writing:

  • The growing problem of identity theft in the digital age
  • The different types of identity theft and how they can impact victims
  • The role of social media in identity theft
  • Common red flags of identity theft
  • How to protect yourself from identity theft online
  • The importance of monitoring your credit report for signs of identity theft
  • The impact of identity theft on victims' mental health
  • Identity theft and its connection to cybercrime
  • The legal consequences of committing identity theft
  • The role of law enforcement in combating identity theft
  • Identity theft and the elderly population
  • The impact of identity theft on children and teens
  • The relationship between identity theft and data breaches
  • The role of technology in preventing identity theft
  • The financial implications of identity theft
  • The psychological effects of identity theft on victims
  • Identity theft and its impact on small businesses
  • The role of identity theft in organized crime
  • The importance of reporting identity theft to the authorities
  • Best practices for protecting your identity online
  • The connection between identity theft and identity fraud
  • Identity theft and its impact on credit scores
  • The role of identity theft in identity cloning
  • The impact of identity theft on victims' relationships
  • The role of phishing scams in identity theft
  • Identity theft and its connection to identity authentication
  • The impact of identity theft on victims' employment prospects
  • The importance of educating the public about identity theft
  • Identity theft and its impact on victims' financial futures
  • The relationship between identity theft and identity theft insurance
  • Identity theft and its connection to identity protection services
  • The impact of identity theft on victims' sense of security
  • Identity theft and its connection to identity restoration services
  • The role of credit freezes in preventing identity theft
  • Identity theft and its impact on victims' ability to obtain credit
  • The connection between identity theft and identity monitoring services
  • The role of identity theft in identity theft prevention
  • The impact of identity theft on victims' ability to obtain loans
  • Identity theft and its connection to identity theft protection
  • The importance of identity theft awareness campaigns
  • Identity theft and its impact on victims' ability to obtain mortgages
  • The role of identity theft in identity theft detection
  • The impact of identity theft on victims' ability to obtain insurance
  • Identity theft and its connection to identity theft recovery
  • The role of identity theft in identity theft investigation
  • Identity theft and its impact on victims' ability to obtain jobs
  • The connection between identity theft and identity theft prevention strategies
  • The impact of identity theft on victims' ability to obtain housing
  • Identity theft and its connection to identity theft protection measures
  • The role of identity theft in identity theft prevention measures
  • Identity theft and its impact on victims' ability to obtain healthcare
  • The importance of identity theft detection services
  • Identity theft and its connection to identity theft prevention programs
  • The impact of identity theft on victims' ability to obtain government benefits
  • Identity theft and its connection to identity theft protection programs
  • The role of identity theft in identity theft prevention efforts
  • Identity theft and its impact on victims' ability to obtain financial aid
  • The connection between identity theft and identity theft protection plans
  • The impact of identity theft on victims' ability to obtain credit cards
  • Identity theft and its connection to identity theft protection services
  • The role of identity theft in identity theft prevention strategies
  • Identity theft and its impact on victims' ability to obtain car loans
  • The importance of identity theft protection services
  • Identity theft and its connection to identity theft prevention measures
  • The impact of identity theft on victims' ability to obtain business loans
  • Identity theft and its impact on victims' ability to obtain auto loans
  • The impact of identity theft on victims' ability to obtain apartment rentals
  • Identity theft and its impact on victims' ability to obtain student loans
  • The importance of identity theft prevention measures
  • The impact of identity theft on victims' ability to obtain personal loans
  • Identity theft and its connection to identity theft protection plans
  • Identity theft and its impact on victims' ability to obtain payday loans
  • The connection between identity theft and identity theft protection services
  • The impact of identity theft on victims' ability to obtain mortgage loans
  • Identity theft and its impact on victims' ability to obtain credit union loans
  • The impact of identity theft on victims' ability to obtain car title loans
  • Identity theft and its impact on victims' ability to obtain business credit cards
  • The impact of identity theft on victims' ability to obtain auto title loans
  • Identity theft and its impact on victims' ability to obtain personal credit cards
  • The impact of identity theft on victims' ability to obtain prepaid debit cards
  • Identity theft and its impact on victims' ability to obtain online loans
  • The impact of identity theft on victims' ability to obtain money orders
  • Identity theft and its impact on victims' ability to obtain installment loans
  • The impact of identity theft on victims' ability to obtain installment loans

By writing essays on these topics, you can help raise awareness about the dangers of identity theft and educate others on how to protect themselves from becoming victims. Remember, knowledge is power when it comes to preventing identity theft, so take the time to learn more about this important issue and share your knowledge with others.

Want to create a presentation now?

Instantly Create A Deck

Let PitchGrade do this for me

Hassle Free

We will create your text and designs for you. Sit back and relax while we do the work.

Explore More Content

  • Privacy Policy
  • Terms of Service

Š 2023 Pitchgrade

U.S. flag

An official website of the United States government, Department of Justice.

Here's how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Identity Theft - A Research Review

Based upon "Identity Theft Literature Review" (Graeme R. Newman and Megan M. McNally, July 2005), this online publication assesses what is known about identity theft and recommends areas that need further research.

The research found that identity theft generally involves three stages: acquisition of the identity information, the thief's use of the information for personal gain to the detriment of the victim of identity theft, and discovery of the identity theft. Evidence indicates that the longer it takes to discover the theft, the greater the loss incurred and the less likely it is that prosecution will be successful. Older persons and those with less education are less likely to discover the identity theft quickly and to report it after discovery. The research also found that access to personal information about potential victims and the anonymity the Internet offers would-be thieves are major facilitators of identity theft. Major topics on identity theft reviewed in this report are the definition of identity theft, the extent and patterns of identity theft, types of identity theft, recording and reporting identity theft, law enforcement issues and response, the cost of identity theft, and issues that need more research. Regarding the latter topic, the researchers recommend more research on the best ways to prevent identity theft crimes. Specifically, research should address practices and operating environments of document-issuing agencies that allow offenders to exploit opportunities to obtain identity documents. Research should also focus on practices and operating environments of document-authenticating agencies that allow offenders access to identity data. Also, the structure and operations of the information systems involved with the operational procedures of the aforementioned agents should be researched. The report reviewed more than 160 literature sources that ranged from traditional journal articles to Web sites and presentations.

Additional Details

Related topics, similar publications.

  • Law Enforcement Officers Safety and Wellness: A Multi-Level Study
  • General Provider Resources: Medical Records For Medicolegal Death Investigations Toolkit
  • Racial Inequality in the Transition to Adulthood After Prison
  • Search Menu
  • Browse content in Arts and Humanities
  • Browse content in Archaeology
  • Anglo-Saxon and Medieval Archaeology
  • Archaeological Methodology and Techniques
  • Archaeology by Region
  • Archaeology of Religion
  • Archaeology of Trade and Exchange
  • Biblical Archaeology
  • Contemporary and Public Archaeology
  • Environmental Archaeology
  • Historical Archaeology
  • History and Theory of Archaeology
  • Industrial Archaeology
  • Landscape Archaeology
  • Mortuary Archaeology
  • Prehistoric Archaeology
  • Underwater Archaeology
  • Urban Archaeology
  • Zooarchaeology
  • Browse content in Architecture
  • Architectural Structure and Design
  • History of Architecture
  • Residential and Domestic Buildings
  • Theory of Architecture
  • Browse content in Art
  • Art Subjects and Themes
  • History of Art
  • Industrial and Commercial Art
  • Theory of Art
  • Biographical Studies
  • Byzantine Studies
  • Browse content in Classical Studies
  • Classical History
  • Classical Philosophy
  • Classical Mythology
  • Classical Literature
  • Classical Reception
  • Classical Art and Architecture
  • Classical Oratory and Rhetoric
  • Greek and Roman Papyrology
  • Greek and Roman Epigraphy
  • Greek and Roman Law
  • Greek and Roman Archaeology
  • Late Antiquity
  • Religion in the Ancient World
  • Digital Humanities
  • Browse content in History
  • Colonialism and Imperialism
  • Diplomatic History
  • Environmental History
  • Genealogy, Heraldry, Names, and Honours
  • Genocide and Ethnic Cleansing
  • Historical Geography
  • History by Period
  • History of Emotions
  • History of Agriculture
  • History of Education
  • History of Gender and Sexuality
  • Industrial History
  • Intellectual History
  • International History
  • Labour History
  • Legal and Constitutional History
  • Local and Family History
  • Maritime History
  • Military History
  • National Liberation and Post-Colonialism
  • Oral History
  • Political History
  • Public History
  • Regional and National History
  • Revolutions and Rebellions
  • Slavery and Abolition of Slavery
  • Social and Cultural History
  • Theory, Methods, and Historiography
  • Urban History
  • World History
  • Browse content in Language Teaching and Learning
  • Language Learning (Specific Skills)
  • Language Teaching Theory and Methods
  • Browse content in Linguistics
  • Applied Linguistics
  • Cognitive Linguistics
  • Computational Linguistics
  • Forensic Linguistics
  • Grammar, Syntax and Morphology
  • Historical and Diachronic Linguistics
  • History of English
  • Language Evolution
  • Language Reference
  • Language Acquisition
  • Language Variation
  • Language Families
  • Lexicography
  • Linguistic Anthropology
  • Linguistic Theories
  • Linguistic Typology
  • Phonetics and Phonology
  • Psycholinguistics
  • Sociolinguistics
  • Translation and Interpretation
  • Writing Systems
  • Browse content in Literature
  • Bibliography
  • Children's Literature Studies
  • Literary Studies (Romanticism)
  • Literary Studies (American)
  • Literary Studies (Asian)
  • Literary Studies (European)
  • Literary Studies (Eco-criticism)
  • Literary Studies (Modernism)
  • Literary Studies - World
  • Literary Studies (1500 to 1800)
  • Literary Studies (19th Century)
  • Literary Studies (20th Century onwards)
  • Literary Studies (African American Literature)
  • Literary Studies (British and Irish)
  • Literary Studies (Early and Medieval)
  • Literary Studies (Fiction, Novelists, and Prose Writers)
  • Literary Studies (Gender Studies)
  • Literary Studies (Graphic Novels)
  • Literary Studies (History of the Book)
  • Literary Studies (Plays and Playwrights)
  • Literary Studies (Poetry and Poets)
  • Literary Studies (Postcolonial Literature)
  • Literary Studies (Queer Studies)
  • Literary Studies (Science Fiction)
  • Literary Studies (Travel Literature)
  • Literary Studies (War Literature)
  • Literary Studies (Women's Writing)
  • Literary Theory and Cultural Studies
  • Mythology and Folklore
  • Shakespeare Studies and Criticism
  • Browse content in Media Studies
  • Browse content in Music
  • Applied Music
  • Dance and Music
  • Ethics in Music
  • Ethnomusicology
  • Gender and Sexuality in Music
  • Medicine and Music
  • Music Cultures
  • Music and Media
  • Music and Religion
  • Music and Culture
  • Music Education and Pedagogy
  • Music Theory and Analysis
  • Musical Scores, Lyrics, and Libretti
  • Musical Structures, Styles, and Techniques
  • Musicology and Music History
  • Performance Practice and Studies
  • Race and Ethnicity in Music
  • Sound Studies
  • Browse content in Performing Arts
  • Browse content in Philosophy
  • Aesthetics and Philosophy of Art
  • Epistemology
  • Feminist Philosophy
  • History of Western Philosophy
  • Metaphysics
  • Moral Philosophy
  • Non-Western Philosophy
  • Philosophy of Language
  • Philosophy of Mind
  • Philosophy of Perception
  • Philosophy of Science
  • Philosophy of Action
  • Philosophy of Law
  • Philosophy of Religion
  • Philosophy of Mathematics and Logic
  • Practical Ethics
  • Social and Political Philosophy
  • Browse content in Religion
  • Biblical Studies
  • Christianity
  • East Asian Religions
  • History of Religion
  • Judaism and Jewish Studies
  • Qumran Studies
  • Religion and Education
  • Religion and Health
  • Religion and Politics
  • Religion and Science
  • Religion and Law
  • Religion and Art, Literature, and Music
  • Religious Studies
  • Browse content in Society and Culture
  • Cookery, Food, and Drink
  • Cultural Studies
  • Customs and Traditions
  • Ethical Issues and Debates
  • Hobbies, Games, Arts and Crafts
  • Lifestyle, Home, and Garden
  • Natural world, Country Life, and Pets
  • Popular Beliefs and Controversial Knowledge
  • Sports and Outdoor Recreation
  • Technology and Society
  • Travel and Holiday
  • Visual Culture
  • Browse content in Law
  • Arbitration
  • Browse content in Company and Commercial Law
  • Commercial Law
  • Company Law
  • Browse content in Comparative Law
  • Systems of Law
  • Competition Law
  • Browse content in Constitutional and Administrative Law
  • Government Powers
  • Judicial Review
  • Local Government Law
  • Military and Defence Law
  • Parliamentary and Legislative Practice
  • Construction Law
  • Contract Law
  • Browse content in Criminal Law
  • Criminal Procedure
  • Criminal Evidence Law
  • Sentencing and Punishment
  • Employment and Labour Law
  • Environment and Energy Law
  • Browse content in Financial Law
  • Banking Law
  • Insolvency Law
  • History of Law
  • Human Rights and Immigration
  • Intellectual Property Law
  • Browse content in International Law
  • Private International Law and Conflict of Laws
  • Public International Law
  • IT and Communications Law
  • Jurisprudence and Philosophy of Law
  • Law and Politics
  • Law and Society
  • Browse content in Legal System and Practice
  • Courts and Procedure
  • Legal Skills and Practice
  • Primary Sources of Law
  • Regulation of Legal Profession
  • Medical and Healthcare Law
  • Browse content in Policing
  • Criminal Investigation and Detection
  • Police and Security Services
  • Police Procedure and Law
  • Police Regional Planning
  • Browse content in Property Law
  • Personal Property Law
  • Study and Revision
  • Terrorism and National Security Law
  • Browse content in Trusts Law
  • Wills and Probate or Succession
  • Browse content in Medicine and Health
  • Browse content in Allied Health Professions
  • Arts Therapies
  • Clinical Science
  • Dietetics and Nutrition
  • Occupational Therapy
  • Operating Department Practice
  • Physiotherapy
  • Radiography
  • Speech and Language Therapy
  • Browse content in Anaesthetics
  • General Anaesthesia
  • Neuroanaesthesia
  • Clinical Neuroscience
  • Browse content in Clinical Medicine
  • Acute Medicine
  • Cardiovascular Medicine
  • Clinical Genetics
  • Clinical Pharmacology and Therapeutics
  • Dermatology
  • Endocrinology and Diabetes
  • Gastroenterology
  • Genito-urinary Medicine
  • Geriatric Medicine
  • Infectious Diseases
  • Medical Toxicology
  • Medical Oncology
  • Pain Medicine
  • Palliative Medicine
  • Rehabilitation Medicine
  • Respiratory Medicine and Pulmonology
  • Rheumatology
  • Sleep Medicine
  • Sports and Exercise Medicine
  • Community Medical Services
  • Critical Care
  • Emergency Medicine
  • Forensic Medicine
  • Haematology
  • History of Medicine
  • Browse content in Medical Skills
  • Clinical Skills
  • Communication Skills
  • Nursing Skills
  • Surgical Skills
  • Browse content in Medical Dentistry
  • Oral and Maxillofacial Surgery
  • Paediatric Dentistry
  • Restorative Dentistry and Orthodontics
  • Surgical Dentistry
  • Medical Ethics
  • Medical Statistics and Methodology
  • Browse content in Neurology
  • Clinical Neurophysiology
  • Neuropathology
  • Nursing Studies
  • Browse content in Obstetrics and Gynaecology
  • Gynaecology
  • Occupational Medicine
  • Ophthalmology
  • Otolaryngology (ENT)
  • Browse content in Paediatrics
  • Neonatology
  • Browse content in Pathology
  • Chemical Pathology
  • Clinical Cytogenetics and Molecular Genetics
  • Histopathology
  • Medical Microbiology and Virology
  • Patient Education and Information
  • Browse content in Pharmacology
  • Psychopharmacology
  • Browse content in Popular Health
  • Caring for Others
  • Complementary and Alternative Medicine
  • Self-help and Personal Development
  • Browse content in Preclinical Medicine
  • Cell Biology
  • Molecular Biology and Genetics
  • Reproduction, Growth and Development
  • Primary Care
  • Professional Development in Medicine
  • Browse content in Psychiatry
  • Addiction Medicine
  • Child and Adolescent Psychiatry
  • Forensic Psychiatry
  • Learning Disabilities
  • Old Age Psychiatry
  • Psychotherapy
  • Browse content in Public Health and Epidemiology
  • Epidemiology
  • Public Health
  • Browse content in Radiology
  • Clinical Radiology
  • Interventional Radiology
  • Nuclear Medicine
  • Radiation Oncology
  • Reproductive Medicine
  • Browse content in Surgery
  • Cardiothoracic Surgery
  • Gastro-intestinal and Colorectal Surgery
  • General Surgery
  • Neurosurgery
  • Paediatric Surgery
  • Peri-operative Care
  • Plastic and Reconstructive Surgery
  • Surgical Oncology
  • Transplant Surgery
  • Trauma and Orthopaedic Surgery
  • Vascular Surgery
  • Browse content in Science and Mathematics
  • Browse content in Biological Sciences
  • Aquatic Biology
  • Biochemistry
  • Bioinformatics and Computational Biology
  • Developmental Biology
  • Ecology and Conservation
  • Evolutionary Biology
  • Genetics and Genomics
  • Microbiology
  • Molecular and Cell Biology
  • Natural History
  • Plant Sciences and Forestry
  • Research Methods in Life Sciences
  • Structural Biology
  • Systems Biology
  • Zoology and Animal Sciences
  • Browse content in Chemistry
  • Analytical Chemistry
  • Computational Chemistry
  • Crystallography
  • Environmental Chemistry
  • Industrial Chemistry
  • Inorganic Chemistry
  • Materials Chemistry
  • Medicinal Chemistry
  • Mineralogy and Gems
  • Organic Chemistry
  • Physical Chemistry
  • Polymer Chemistry
  • Study and Communication Skills in Chemistry
  • Theoretical Chemistry
  • Browse content in Computer Science
  • Artificial Intelligence
  • Computer Architecture and Logic Design
  • Game Studies
  • Human-Computer Interaction
  • Mathematical Theory of Computation
  • Programming Languages
  • Software Engineering
  • Systems Analysis and Design
  • Virtual Reality
  • Browse content in Computing
  • Business Applications
  • Computer Security
  • Computer Games
  • Computer Networking and Communications
  • Digital Lifestyle
  • Graphical and Digital Media Applications
  • Operating Systems
  • Browse content in Earth Sciences and Geography
  • Atmospheric Sciences
  • Environmental Geography
  • Geology and the Lithosphere
  • Maps and Map-making
  • Meteorology and Climatology
  • Oceanography and Hydrology
  • Palaeontology
  • Physical Geography and Topography
  • Regional Geography
  • Soil Science
  • Urban Geography
  • Browse content in Engineering and Technology
  • Agriculture and Farming
  • Biological Engineering
  • Civil Engineering, Surveying, and Building
  • Electronics and Communications Engineering
  • Energy Technology
  • Engineering (General)
  • Environmental Science, Engineering, and Technology
  • History of Engineering and Technology
  • Mechanical Engineering and Materials
  • Technology of Industrial Chemistry
  • Transport Technology and Trades
  • Browse content in Environmental Science
  • Applied Ecology (Environmental Science)
  • Conservation of the Environment (Environmental Science)
  • Environmental Sustainability
  • Environmentalist Thought and Ideology (Environmental Science)
  • Management of Land and Natural Resources (Environmental Science)
  • Natural Disasters (Environmental Science)
  • Nuclear Issues (Environmental Science)
  • Pollution and Threats to the Environment (Environmental Science)
  • Social Impact of Environmental Issues (Environmental Science)
  • History of Science and Technology
  • Browse content in Materials Science
  • Ceramics and Glasses
  • Composite Materials
  • Metals, Alloying, and Corrosion
  • Nanotechnology
  • Browse content in Mathematics
  • Applied Mathematics
  • Biomathematics and Statistics
  • History of Mathematics
  • Mathematical Education
  • Mathematical Finance
  • Mathematical Analysis
  • Numerical and Computational Mathematics
  • Probability and Statistics
  • Pure Mathematics
  • Browse content in Neuroscience
  • Cognition and Behavioural Neuroscience
  • Development of the Nervous System
  • Disorders of the Nervous System
  • History of Neuroscience
  • Invertebrate Neurobiology
  • Molecular and Cellular Systems
  • Neuroendocrinology and Autonomic Nervous System
  • Neuroscientific Techniques
  • Sensory and Motor Systems
  • Browse content in Physics
  • Astronomy and Astrophysics
  • Atomic, Molecular, and Optical Physics
  • Biological and Medical Physics
  • Classical Mechanics
  • Computational Physics
  • Condensed Matter Physics
  • Electromagnetism, Optics, and Acoustics
  • History of Physics
  • Mathematical and Statistical Physics
  • Measurement Science
  • Nuclear Physics
  • Particles and Fields
  • Plasma Physics
  • Quantum Physics
  • Relativity and Gravitation
  • Semiconductor and Mesoscopic Physics
  • Browse content in Psychology
  • Affective Sciences
  • Clinical Psychology
  • Cognitive Psychology
  • Cognitive Neuroscience
  • Criminal and Forensic Psychology
  • Developmental Psychology
  • Educational Psychology
  • Evolutionary Psychology
  • Health Psychology
  • History and Systems in Psychology
  • Music Psychology
  • Neuropsychology
  • Organizational Psychology
  • Psychological Assessment and Testing
  • Psychology of Human-Technology Interaction
  • Psychology Professional Development and Training
  • Research Methods in Psychology
  • Social Psychology
  • Browse content in Social Sciences
  • Browse content in Anthropology
  • Anthropology of Religion
  • Human Evolution
  • Medical Anthropology
  • Physical Anthropology
  • Regional Anthropology
  • Social and Cultural Anthropology
  • Theory and Practice of Anthropology
  • Browse content in Business and Management
  • Business Ethics
  • Business Strategy
  • Business History
  • Business and Technology
  • Business and Government
  • Business and the Environment
  • Comparative Management
  • Corporate Governance
  • Corporate Social Responsibility
  • Entrepreneurship
  • Health Management
  • Human Resource Management
  • Industrial and Employment Relations
  • Industry Studies
  • Information and Communication Technologies
  • International Business
  • Knowledge Management
  • Management and Management Techniques
  • Operations Management
  • Organizational Theory and Behaviour
  • Pensions and Pension Management
  • Public and Nonprofit Management
  • Strategic Management
  • Supply Chain Management
  • Browse content in Criminology and Criminal Justice
  • Criminal Justice
  • Criminology
  • Forms of Crime
  • International and Comparative Criminology
  • Youth Violence and Juvenile Justice
  • Development Studies
  • Browse content in Economics
  • Agricultural, Environmental, and Natural Resource Economics
  • Asian Economics
  • Behavioural Finance
  • Behavioural Economics and Neuroeconomics
  • Econometrics and Mathematical Economics
  • Economic History
  • Economic Systems
  • Economic Methodology
  • Economic Development and Growth
  • Financial Markets
  • Financial Institutions and Services
  • General Economics and Teaching
  • Health, Education, and Welfare
  • History of Economic Thought
  • International Economics
  • Labour and Demographic Economics
  • Law and Economics
  • Macroeconomics and Monetary Economics
  • Microeconomics
  • Public Economics
  • Urban, Rural, and Regional Economics
  • Welfare Economics
  • Browse content in Education
  • Adult Education and Continuous Learning
  • Care and Counselling of Students
  • Early Childhood and Elementary Education
  • Educational Equipment and Technology
  • Educational Strategies and Policy
  • Higher and Further Education
  • Organization and Management of Education
  • Philosophy and Theory of Education
  • Schools Studies
  • Secondary Education
  • Teaching of a Specific Subject
  • Teaching of Specific Groups and Special Educational Needs
  • Teaching Skills and Techniques
  • Browse content in Environment
  • Applied Ecology (Social Science)
  • Climate Change
  • Conservation of the Environment (Social Science)
  • Environmentalist Thought and Ideology (Social Science)
  • Natural Disasters (Environment)
  • Social Impact of Environmental Issues (Social Science)
  • Browse content in Human Geography
  • Cultural Geography
  • Economic Geography
  • Political Geography
  • Browse content in Interdisciplinary Studies
  • Communication Studies
  • Museums, Libraries, and Information Sciences
  • Browse content in Politics
  • African Politics
  • Asian Politics
  • Chinese Politics
  • Comparative Politics
  • Conflict Politics
  • Elections and Electoral Studies
  • Environmental Politics
  • European Union
  • Foreign Policy
  • Gender and Politics
  • Human Rights and Politics
  • Indian Politics
  • International Relations
  • International Organization (Politics)
  • International Political Economy
  • Irish Politics
  • Latin American Politics
  • Middle Eastern Politics
  • Political Behaviour
  • Political Economy
  • Political Institutions
  • Political Methodology
  • Political Communication
  • Political Philosophy
  • Political Sociology
  • Political Theory
  • Politics and Law
  • Public Policy
  • Public Administration
  • Quantitative Political Methodology
  • Regional Political Studies
  • Russian Politics
  • Security Studies
  • State and Local Government
  • UK Politics
  • US Politics
  • Browse content in Regional and Area Studies
  • African Studies
  • Asian Studies
  • East Asian Studies
  • Japanese Studies
  • Latin American Studies
  • Middle Eastern Studies
  • Native American Studies
  • Scottish Studies
  • Browse content in Research and Information
  • Research Methods
  • Browse content in Social Work
  • Addictions and Substance Misuse
  • Adoption and Fostering
  • Care of the Elderly
  • Child and Adolescent Social Work
  • Couple and Family Social Work
  • Developmental and Physical Disabilities Social Work
  • Direct Practice and Clinical Social Work
  • Emergency Services
  • Human Behaviour and the Social Environment
  • International and Global Issues in Social Work
  • Mental and Behavioural Health
  • Social Justice and Human Rights
  • Social Policy and Advocacy
  • Social Work and Crime and Justice
  • Social Work Macro Practice
  • Social Work Practice Settings
  • Social Work Research and Evidence-based Practice
  • Welfare and Benefit Systems
  • Browse content in Sociology
  • Childhood Studies
  • Community Development
  • Comparative and Historical Sociology
  • Economic Sociology
  • Gender and Sexuality
  • Gerontology and Ageing
  • Health, Illness, and Medicine
  • Marriage and the Family
  • Migration Studies
  • Occupations, Professions, and Work
  • Organizations
  • Population and Demography
  • Race and Ethnicity
  • Social Theory
  • Social Movements and Social Change
  • Social Research and Statistics
  • Social Stratification, Inequality, and Mobility
  • Sociology of Religion
  • Sociology of Education
  • Sport and Leisure
  • Urban and Rural Studies
  • Browse content in Warfare and Defence
  • Defence Strategy, Planning, and Research
  • Land Forces and Warfare
  • Military Administration
  • Military Life and Institutions
  • Naval Forces and Warfare
  • Other Warfare and Defence Issues
  • Peace Studies and Conflict Resolution
  • Weapons and Equipment

Oxford Handbook Topics in Criminology and Criminal Justice

  • < Previous chapter
  • Next chapter >

Identity Theft

Lynne M. Vieraitis is Professor of Criminology at the University of Texas at Dallas.

The University of Texas at Dallas

  • Published: 06 January 2015
  • Cite Icon Cite
  • Permissions Icon Permissions

Often cited as one of the fastest-growing crimes in the United States and abroad, identity theft continues to be of great concern to the public. It is a crime that is difficult to control and has become increasingly complex as offenders adapt to target hardening by consumers and businesses and identify new sources of data containing personally identifying information. The purpose of this essay is to provide readers with an overview of identity theft, including what is currently known about the trends and patterns of identity theft, information on offenders and victims, as well as the methods used by identity thieves to steal and convert personally identifying information for financial gain.

Often cited as one of the fastest-growing crimes in the United States and abroad, identity theft continues to be of great concern to the public. According to the 2013 Unisys Security Index , 57 percent of Americans surveyed reported that they are seriously concerned about identity theft ( Unisys 2014 ). 1 It is a crime that is difficult to control and has become increasingly complex as offenders adapt to target hardening by consumers and businesses and identify new sources of data containing personally identifying information. Because identity theft includes multiple forms of fraud, it is difficult to illustrate with singular examples; however, the following cases help to illuminate the complexity of identity theft, as well as the range of people who engage in this crime. In May 2014, 25 people were charged in a conspiracy that involved identity theft, as well as street-level drug selling, a prescription pill operation, and counterfeit check schemes in New York and New Jersey. One member of the group stole personal identifying information, including names and birth dates from his place of employment, and then passed the information on to another member who used it to fill out stolen or forged prescriptions for oxycodone. Other members then had the prescriptions filled at pharmacies and passed the product to yet another individual, who then sold the pills on the streets. The group also included an employee at a check-cashing store who provided members with personal and account information of small businesses, churches, and charitable organizations. The stolen information was then used to manufacture counterfeit checks and create false identification cards. Ring members recruited individuals to go inside banks with the false IDs, deposit counterfeit checks, and withdraw money from the bank accounts of individuals whose identities they had stolen ( Jacobs 2014 ). In a case that illustrates the global reach of identity theft, three men were charged with buying cars in San Diego using stolen identities and credit cards and then shipping them to Ghana to be resold for financial gain. The men allegedly purchased stolen credit cards and drivers’ licenses in bulk from a “carder” website in Singapore. 2 Using the victims’ information, the ringleader assumed their identities to negotiate the purchase of vehicles, email drivers’ license numbers and card information to the dealerships, and pay for the cars’ transport to New Jersey where they would be shipped to Africa and resold by a criminal organization ( Vigil 2014 ). Although the aforementioned cases resulted in victims’ losses of an estimated $80,000 and $500,000, respectively, the financial gain from identity theft can be much more extensive, reaching into the millions of dollars. For example, over a three-year period from 2010 to 2013, a group of 10 women filed over 7,000 false tax returns, resulting in nearly $20 million in refunds. The women set up sham tax businesses and filed false tax returns using identities stolen from their places of employment, which included a hospital, various state agencies, and call centers ( Gibson 2014 ). Last, while some identity thieves work in small groups, others work alone. In a recent incident, a community college student stole the personal identifying information and credit card numbers of clients from her former place of employment (a medical billing company). She used the information to pay tuition at the school and purchase items such as clothing, jewelry, and airline tickets. During her employment, she had access to thousands of clients’ personal and financial information, and at the time of her arrest was in possession of more than 400 identity profiles and 200 credit card numbers ( CBS Los Angeles 2014 ).

As illustrated by the aforementioned cases, identity theft schemes range from the simple to the complex, are committed by offenders working alone and in groups, and are committed by an array of offenders, including employees of legitimate businesses to common street offenders. Current data suggest that identity theft affects millions of people each year at a loss of billions of dollars to individuals and businesses. It was the number-one most reported fraud to the Federal Trade Commission’s (FTC) Consumer Sentinel Network in 2013 and has held this position fairly consistently over the past decade ( FTC 2014 ).

The purpose of this essay is to provide an overview of identity theft, including what is currently known about the trends and patterns of identity theft, information on offenders and victims, as well as the methods of carrying out identity theft from the available data on offenders. In the next section, we present data from various agencies and organizations tasked with collecting information on identity thefts that occur in the United States and other countries. This section is followed by an overview of offenders that engage in identity theft as well as those who are victimized. We conclude with a discussion of the techniques employed by identity thieves to steal personally identifying information and convert it to cash or goods for financial gain.

I. Measuring Identity Theft

The Identity Theft Assumption and Deterrence Act (ITADA), passed in 1998, states that identity theft occurs when a person “knowingly transfers, possesses or uses, without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, or in connection with, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law.” The term “means of identification” is defined as “any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual.” Yet, despite the federal statute, “there is no one universally accepted definition of [it] as the term describes a variety of illegal acts involving theft or misuse of personal information” ( Bureau of Justice Statistics [BJS] 2006 ).

The definitional problem makes it difficult to consistently measure identity theft, and often, the organizations and agencies collecting data employ different measures of this crime. The main issue centers on whether to include credit card fraud under the term “identity theft.” For example, if an offender steals a credit card, makes a purchase, and then discards the card, has the victim’s identity been stolen? Does the use of a financial account identifier constitute identity theft? Or does identity theft occur only when an offender uses personally identifying data? An offender can use a credit card number (financial account identifier) to make unauthorized purchases or use a social security number (personally identifying data) to open a new credit card account and make purchases ( Copes and Vieraitis 2012 ). Some researchers (e.g., Allison, Schuck, and Michelle Lersch 2005 , Copes and Vieraitis, 2007 , 2009a , c , 2012 ) exclude credit card fraud while others include it (e.g., BJS, 2013 ; FTC, 2014 ).

Others raise a second issue regarding the definition and measurement of identity theft, arguing that the crime involves two separate elements, theft and fraud, and that they should be defined and measured accordingly. In this case, “identity theft” occurs when an offender steals a victim’s personal identifying information, such as a social security number, birth certificate, or driver’s license, whereas “identity fraud” occurs when an offender uses the stolen information to open credit card accounts, obtain bank loans, or deposit counterfeit checks and make withdrawals from the victim’s bank account ( Koops and Leenes 2006 ). Although identity fraud cannot occur without identity theft, identity theft is not always followed by identity fraud, and the two components may be committed by separate offenders. Thus, it is important to be cognizant of the definition of identity theft employed by agencies and organizations when measuring the extent and patterning of this crime.

As with most crimes, understanding the true nature and extent of crime is problematic as much criminal victimization goes underreported. Identity theft is no exception. It is estimated that 40 percent of all crime victims do not report their victimization to law enforcement, but the rate of reporting varies by type of victimization with more serious crimes showing a greater level, in general, of reporting than less serious crimes. For a variety of reasons, some “unknown” number of identity theft victims do not report their crimes to law enforcement authorities. According to the 2012 Identity Theft Supplement (ITS) to the National Crime Victimization Survey (NCVS), fewer than 1 in 10—or 9 percent—of identity theft victims reported the incident to police ( BJS 2013 ). Studies from Canada provide similar rates of underreporting, with only 13 percent of Canadian victims reporting their victimization to a law enforcement agency (Office of the Privacy Commissioner of Canada 2013). However, the ITS also showed that whether someone reported the incident to law enforcement varied substantially by the type of identity theft victimization suffered by the victim. Victims of personal information fraud were the most likely to report the incident (40 percent) while the lowest rates were for victims of existing credit card fraud (4 percent; BJS 2013 ). Of victims who did not report the theft (91 percent), most “handled it another way,” including reporting the incident to another organization such as a credit card company. Identity theft victims may see no reason to report their victimization if they do not suffer much financial harm, as when a credit card company quickly dismisses the unauthorized charges made on the victim’s credit card. Nearly 30 percent of victims in the ITS indicated that they did not report their victimization because they had suffered no monetary loss ( BJS 2013 ). Other victims may be reluctant to report their victimization if they know the offender for fear of retaliation or of getting the offender in trouble with law enforcement, especially if the offender is a family member. Some victims may not know the appropriate agency with which to file a report, and the issue of jurisdiction is particularly murky when offenders and victims reside in different cities, states, or even countries. Moreover, when the “victim” is a financial institution or business the incident may not be reported as some businesses are unwilling to admit their security systems are not working ( Pontell 2002 ), some fear the potential loss of customers, and others may calculate that the tax write-off makes better business sense ( Hoofnagle 2007 ).

Understanding the true nature of identity theft, particularly regarding offenders, is also complicated by low clearance rates. An analysis of data from a Florida police department found that identity theft cases averaged a clearance rate of 11 percent ( Allison et al. 2005 ). Research studies conducted by Owens (2004) and Gayer (2003) report similar rates of 10 percent and 11 percent, respectively. Despite these limitations, a number of government and nongovernmental organizations that collect data on identity theft can provide some insight into this crime.

The first systematic survey of the prevalence and costs of identity theft victimization was conducted by the FTC in 2003. The results of a telephone survey of a random sample of US adults age 18 and older suggested that 27.3 million Americans had been victims of identity theft in the previous five years (1998–2002), including 9.9 million people in 2002 alone. The financial costs to businesses, financial institutions, and consumers were estimated at over $50 billion ( Synovate 2003 ). A follow-up survey was conducted three years later in 2006. Although not directly comparable due to changes in the methodology, the 2006 survey suggested that approximately 8.3 million US adults were victims of identity theft in 2005 ( Synovate 2007 ). In addition to the FTC surveys, other organizations have conducted surveys on identity theft, including the Javelin Strategy and Research group (Javelin), the American Association of Retired Persons, and the BJS.

Data on identity theft victimization are also collected by the FTC’s Identity Theft Data Clearinghouse, the National White Collar Crime Center, and the FBI’s Internet Crime Complaint Center. The data from these agencies, as well as state law enforcement organizations, other federal agencies, and nongovernmental organizations such as the Council of Better Business Bureaus are compiled in an online database maintained by the Consumer Sentinel Network and published each year in the Consumer Sentinel Network Data Book . Although a common source of information on identity theft victimization, as well as other consumer frauds, these data are based on victim-generated reports rather than nationally representative surveys of consumers. With these limitations in mind, the most reliable data on the extent and patterning of identity theft in the United States come from the NCVS and Javelin.

II. Trends and Patterns in Identity Theft

The most comprehensive and reliable data come from the BJS and Javelin. Both groups survey nationally representative samples of the US population and have been doing so since 2004 and 2005, respectively. It is interesting to note that the BJS employs the term “identity theft” while Javelin uses “identity fraud” in its survey of consumers, although the measures (defined later) are similar.

To address the need for data on identity theft victimization, BJS developed questions to measure identity theft trends and added them to the NCVS survey in 2004. Since this initial survey, the BJS has expanded its data collection efforts to include the ITS, first conducted in 2008, to collect more detailed information from individual victims age 16 and older. In 2012 major changes were made to the survey instrument, thus comparisons across years are not suggested ( BJS 2013 ). In its most recent report, the BJS measures identity theft victimization for persons age 16 or older who experienced one or more of the following incidents ( BJS 2013 : 1–2):

Unauthorized use or attempted use of an existing account such as credit or debit card, checking, savings, telephone, online, or insurance account (fraud or misuse of an existing account)

unauthorized use or attempted use of personal information to open a new account, such as a credit or debit card, telephone, checking, savings, loan, or mortgage account (fraud or misuse of a new account)

misuse of personal information for a fraudulent purpose, such as getting medical care, a job, or government benefits; renting an apartment or house; or providing false information to law enforcement when charged with a crime or traffic violation (fraud or misuse of personal information).

Results suggest that nearly 17 million persons, or 7 percent of all US residents age 16 or older, were victims of identity theft in 2012, with 22 percent of victims experiencing more than one incident. The fraudulent use of existing account information, such as credit card or bank account information, was the most commonly reported type of theft—85 percent of reported cases. The direct and indirect losses from this crime total nearly $25 billion, although about half of the victims suffered out-of-pocket losses of $100 or less ( BJS 2013 ).

Although not directly comparable to the BJS findings, Javelin also provides information about identity theft victimization in the United States. Since the survey methodology has remained relatively consistent since the initial survey in 2005, it allows for comparisons across time periods. Using the three categories originally defined by the FTC in 2003 and for persons age 18 and older, the survey measures identity theft (fraud) as: (a) existing card accounts—involving account numbers and/or the actual cards for existing credit and card-linked debit accounts; (b) existing non-card accounts—including existing checking and savings accounts and existing loans and insurance, telephone, and utilities accounts; and (c) new accounts and other frauds—new accounts or loans for committing theft, fraud, or other crimes using the victim’s personal information ( Javelin 2014 : 4).

According to the report, in 2013 13.1 million consumers suffered identity theft—the second highest number since Javelin began collecting data in 2005—at an estimated $18 billion in losses to consumers and businesses. The trends indicated by the data show that in 2006 there were 10.6 million victims of identity theft; this number dipped slightly in 2007 but rose to 13.9 million victims in 2009, the second highest year on record. Victimization decreased again in 2010 before rising to 13.1 million in 2013. Thus, from 2006 to 2013, identity theft victimization reported by US consumers rose nearly 24 percent ( Javelin 2014 ). 3 Existing card fraud was the most common type of victimization. The incidence of existing card fraud increased by 36 percent, affecting 5 percent of the population, to its highest level since the first survey was administered in 2006. Results also showed that the incidence of existing non-card fraud increased by a factor of 3. Although the number of fraud victims has risen since 2010, the total financial losses have declined. Total losses were $29 billion in the first year of the survey, peaking in 2009 at $32 billion before declining to $18 billion in 2013. Thus while the number of incidents of existing account fraud has risen, creating more victims, this form of identity fraud is less costly in monetary terms than nonexisting account fraud ( Javelin 2014 ).

Data from outside the United States suggests that citizens of other countries also suffer high rates of identity theft victimization. Duffin, Keats, and Gill (2006) reported that one in four British residents is or knows a victim of identity fraud. CIFAS, the UK’s fraud prevention service, reports that over 100,000 victims of identity crime have been recorded by their organization each year since 2009 ( CIFAS 2014 ). As of 2014, these data contained 460,000 records of confirmed frauds perpetrated or attempted against participating organizations, the majority (65 percent) of which are identity-related crimes. The data also show that existing account fraud against loans and credit cards increased significantly from 2012 to 2013 while fraud against bank accounts decreased ( CIFAS 2013 ). A nationwide public opinion survey of Canadians found that 6.5 percent of participants reported that they had been victims of identity fraud, the majority of whom had experienced credit card fraud ( Sproule and Archer 2010 ). The estimated out-of-pocket costs to Canadian consumers totaled over $150 million. The Canadian Anti-Fraud Centre, which collects data from victim reports, stated there were over 19,000 victims of identity fraud in 2013, up from 17,000 in 2011. Despite the increase in the number of victims, the monetary losses declined from $16 million in 2012 to 11 million in 2013 ( Canadian Anti-Fraud Centre 2013 ).

III. Correlates of Offending

As discussed previously, the clearance rates for identity theft are low, meaning that offenders are rarely identified, arrested, or prosecuted. Several obstacles make the investigation of identity theft cases and the likelihood of arrests difficult. Specifically, identity theft cases can be highly complex, and the offender may have committed the theft in a different jurisdiction than where the victim resides, making it difficult not only to identify an offender but to secure an arrest warrant. In addition, limited departmental resources may be directed toward the investigation of violent and drug-related offenses rather than identity thefts ( Vieraitis, Copes, and Birch 2014 ). Creating the profile of the typical identity thief is also complicated by the lack of information from victims. According to the ITS, in most cases the victim simply does not know anything about the identity of the offender ( BJS 2013 ). Victims whose personal information was used to open a new account or for other fraudulent purposes were more likely than victims of existing account misuse to know something about the offender, but the overall percentage of victims who knew anything about the person responsible was less than 9 percent ( BJS 2013 ). Another potential source of information on offenders is from offenders themselves. However, to date, few have sought to gather such data (for exceptions see Copes and Vieraitis 2012 ; Duffin, Keats, and Gill 2006 ; Gill, 2007 ). The lack of information from victims (individuals and businesses), low reporting rates, and low clearance rates combined with the paucity of data from offenders contribute to the difficulty in understanding identity theft, particularly those who engage in it.

Information on the demographic characteristics of identity theft offenders is presented in the results of the analyses conducted by Allison et al., (2005) , Gordon, Rebovich, Choo, and Gordon (2007) , and Copes and Vieraitis (2012) . Allison et al. and Gordon et al are based on law enforcement data while Copes and Vieraitis’ study is based on interviews with offenders. Gordon et al. examined closed US Secret Service cases with an identity theft component from 2000 to 2006. They found that most offenders (42.5 percent) were between the ages of 25 and 34 when the case was opened and another one-third were between 35 and 49 years of age. Similarly, Allison et al. found that offenders ranged in age from 28 to 49 with a mean age of 32. Both law enforcement based studies found similar patterns about race. Gordon et al. found that the majority of the offenders were black (54 percent), with whites and Hispanics accounting for 38 percent and 5 percent of offenders, respectively. Allison et al. found that the distribution of offenders was 69 percent black, 27 percent white, and less than 1 percent Hispanic or Asian. The two studies differed in terms of the gender of offenders. Gordon et al. found that nearly two-thirds of the offenders were male, whereas Allison et al. found that 63 percent of offenders were female.

Copes and Vieraitis’s (2012) sample of 59 identity thieves included 23 men and 36 women, which is consistent with the findings of Allison et al. (2005) ; however, this may be attributed to Copes and Vieraitis’ sampling strategy and the higher response rate from female participants. The racial makeup of their sample was 44 percent white, 53 percent black, and 3 percent other. 4 Offenders in the sample ranged in age from 23 to 60 years with a mean age of 38 years. The majority of offenders were ages 25 to 34 (34 percent) or 35 to 44 (32 percent). Only 7 percent were ages 18 to 24 years, and 5 percent were older than 55 years. The age distribution matches closely with the larger sampling pool and that found by Gordon et al. (2007) and Allison, et al.

Both Copes and Vieraitis (2012) and Allison et al. (2005) included information on the offenders’ employment status. Most of the offenders in Copes and Vieraitis’s study had been employed at some point during their lifetimes. The diversity of jobs included day laborers, store clerks, nurses, and attorneys. At the time of their crimes, 52.5 percent were employed, and a total of 35.5 percent of the sample reported that their employment facilitated the identity thefts. The majority of those who used their jobs to carry out their crimes committed mortgage fraud. The results from Allison et al. indicated that 47 percent were employed.

Little is known about the degree to which identity thieves specialize in their offenses. Prior arrest patterns indicated that a large portion of the offenders interviewed by Copes and Vieraitis (2012) had engaged in various types of offenses, including drug, property, and violent crimes. Yet the majority of them claimed that they committed only identity thefts or comparable frauds (e.g., check fraud). In total, 63 percent of the offenders reported prior arrests, and most were arrested for financial fraud or identity theft (44 percent), but drug use/sales (19 percent) and property crimes (22 percent) were also relatively common. This finding is consistent with that of Gordon et al. (2007) , who found that while the majority of defendants had no prior arrests, those who did have criminal histories tended to commit fraud and theft related offenses.

Copes and Vieraitis’ (2012) interviews with identity thieves yielded information that helps provide a richer and more detailed profile of the persons who commit this crime. Through interviews with offenders, they show that identity thieves are a heterogeneous group. Their family backgrounds, educational attainments, work histories, and criminal histories run the gamut from poverty to wealth, less than a high school education to graduate degrees, and no prior arrests to incarcerations for everything from fraud to drugs. Some are embedded in “street life” and resemble the profile of a typical street offender, while others live lives similar to those of the conventional middle-class citizen and share characteristics in common with middle-class fraudsters or white-collar offenders. Copes and Vieraitis suggest that it is difficult to create a profile of identity thieves because the crime may be more “democratic” than most other types of crimes ( Copes and Vieraitis 2012 ). This claim is also supported by recent research from the National Gang Intelligence Center (2013) , which found that gangs are increasingly engaging in more sophisticated criminal operations that include identity theft and related frauds such as credit card fraud, mortgage fraud, counterfeiting, and bank fraud.

IV. Correlates of Victimization

The data on identity theft victims is more substantial than the data available for offenders, yet difficulties still emerge when trying to establish the correlates of victimization. First, patterns emerging from victimization data are affected by the operational definition of identity theft employed by researchers. For example, including existing credit card fraud as a type of identity theft increases not only the victimization rate but some research suggests that it alters the demographic profile of victims (e.g., Copes, Kerley, Kane, and Huff 2010 ). However, recent findings from the NCVS show that across all types of identity theft, prevalence rates did not vary significantly by sex ( BJS 2013 ). Second, victimization patterns are also difficult to establish if certain cases are less likely than others to be reported. Victimization surveys suggest that certain types of frauds (e.g., nonexisting account frauds) are more likely to be reported to law enforcement than others (e.g., existing account frauds), thus caution in drawing conclusions is warranted (e.g., BJS 2013 ).

Several studies examine the correlates of victimization including demographic and behavioral characteristics ( Allison et al. 2005 ; Anderson 2006 ; BJS 2010 , 2013 ; Kresse et al. 2007 ; Copes et al. 2010 ; Pontell, Brown, and Tosouni 2008 ; Holt and Bossler 2009 ). Overall, the results of several of studies indicate that a similar percentage of men and women are victims of identity theft each year; the lowest rate of victimization is among persons age 65 or older, while the majority of victims are in their mid-20s to mid-50s; and those with incomes greater than $75,000 are at higher risk than households in lower income brackets ( Allison et al. 2005 ; Anderson 2006 ; BJS 2010 , 2013 ; Kresse, Watland, and Lucki 2007 ). The most comprehensive and reliable picture of identity theft victims is provided by recent data from the ITS that show that persons age 16 to 17 have the lowest rates of victimization followed by persons ages 18 to 24 and 65 or older. The highest rates of victimization were found among persons age 35 to 49 ( BJS 2013 ). Data on race/ethnicity and identity theft victimization show that households headed by white non-Hispanics and those reporting “two or more races” experienced higher rates of victimization than black non-Hispanics and Hispanics ( BJS 2013 ).

In addition to demographic profiles, studies have suggested that people who engage in risky behaviors such as remote purchasing or Internet usage are more likely to be victims of identity theft ( Holt and Bossler 2009 ; Copes et al. 2010 ). Although respondents in Copes et al.’s study reported that they rarely gave out personal information in response to a solicitation, victims of existing account fraud and new credit card fraud were more likely to do so than victims of existing credit card fraud. Despite cautions from law enforcement and consumer groups, victims of existing account fraud and new credit card fraud were less likely to check the backgrounds of people they do business with than were victims of existing credit card fraud ( Copes et al. 2010 ).

Data limitations prohibit us from knowing the true extent of identity theft victimization, and this may be particularly acute for certain types of victims. For example, child identity theft, which occurs when an offender uses the identifying information of a person under the age of 18 for personal gain, may be severely underreported. Available data suggests that this form of identity theft is relatively rare. Data from the FTC indicate that 6 percent of all cases reported to the agency involved victims who were 19 years old or younger ( FTC 2014 ), however, it is impossible to know the extent since it may take years (e.g., until the child turns 16 and applies for a driver’s license) to discover the theft. Some research suggests that the perpetrator of child identity theft is typically a family member who has easy access to personal information. According to Pontell, Brown, and Tosouni (2008) , over three-quarters of those who stole the identities of victims under the age of 18 were their parents. Similarly, Identity Theft Resource Center survey data indicated that in child identity theft cases, 69 percent of the offenders were one or both parents or a stepparent and 54 percent of these cases began when the victim was younger than the age of five ( Identity Theft Resource Center 2007 ).

Other research has examined the geographic distribution of identity theft victimization ( Lane and Sui 2010 ). In an analysis of FTC data from 2002 to 2006, Lane and Sui found regional trends for identity theft demonstrating that higher reporting rates were found in the southwestern states, with lower rates in New England and the northern plains states. The researchers note that these regional patterns mirror the trends for traditional larceny and theft crimes. They also found that following hurricane Katrina there was an eastern shift of identity theft in the form of government document and benefits fraud ( Lane and Sui 2010 ). In addition, specific types of identity theft were more prevalent in some regions that others. For example, employment fraud, government document fraud, and loan fraud were concentrated in states with higher Hispanic populations.

V. Methods of Identity Theft

Identity thieves have developed a number of techniques and strategies using low-tech (offline) and high-tech (online) methods to steal victims’ personally identifying information and convert the information to cash or goods ( Copes and Vieraitis 2012 ). Offenders obtain this information from wallets, purses, homes, cars, offices, and businesses or institutions that maintain customer, employee, patient, or student records. Social security numbers provide instant access to a person’s personal information and are widely used for identification and account numbers by insurance companies, universities, cable television companies, military identification, and banks. The thief may steal a wallet or purse; work at a job that affords him or her access to credit records; purchase the information from someone (e.g., employees who have access to credit reporting databases commonly available in auto dealerships, realtor’s offices, banks, and other businesses that approve loans); or find victims by stealing mail, sorting through the trash, or searching the Internet. Some offenders create elaborate schemes to dupe victims into revealing their personal information both on- and offline. Offenders may hack into businesses that maintain information legitimately or through the use of phishing, which involves spam email campaigns that solicit information from would-be victims. Underground websites and forums operate that sell stolen information (e.g., credit card and bank account numbers) for relatively cheap prices ( Holt and Lampke 2010 ). Other technology-based approaches include pharming (hackers install malicious code to redirect victims to fraudulent websites) and smishing (thieves use text messages to lure consumers to websites or phone numbers).

The focus here is on the low-tech methods used by thieves, as our review relies on the research findings of offender-based studies, and the information on criminals who use online methods is extremely limited. Information on methods used by offenders also comes from victimization surveys, (FTC, NCVS, and others), but the caveats discussed previously apply. Nonetheless, we give a brief overview of the findings based on these data before turning to the findings of qualitative research based on interviews with offenders. 5

A. Findings from Research Utilizing Official Data

The FTC (2009) data provide some information on the strategies used by offenders to steal victims’ information. Based on data from the 43 percent who knew how their information was stolen, the report suggests that offenders obtain information from people they know personally (16 percent), during a financial transaction (7 percent), from a stolen wallet or purse (5 percent), from a company that maintained their information (5 percent), or through stolen mail (2 percent). Of respondents to the 2012 ITS, only 32 percent of victims knew how their information was obtained. Victims who experienced more than one type of identity theft during a single incident were most likely to know how this was accomplished (46.5 percent), whereas victims of existing credit card fraud were least likely to know this information (24 percent). Of the victims who knew how the theft occurred, most (43 percent) indicated that their information was stolen during a purchase or other transaction ( BJS 2013 ). Early reports from the NCVS provide a more detailed breakdown of the methods identified by victims ( BJS 2010 ). In 2009, 39 percent of respondents knew how their personal information was obtained. Of these respondents, nearly 30 percent reported that their identity was stolen during a purchase or other transaction, 20 percent said the information was lost or stolen from a wallet or checkbook, and 14 percent indicated the information was stolen from personnel or other files at an office. High-tech methods were less likely to be reported, with 4 percent of respondents indicating their computers were hacked, that they responded to spam email or phone call, or that their data were exposed on the Internet.

Offenders can use information to acquire or produce additional identity-related documents, such as driver’s licenses or state identification cards, in an attempt to gain cash or other goods. Offenders apply for credit cards in the victims’ names (including major credit cards and department store credit cards), open new bank accounts and deposit counterfeit checks, withdraw money from existing bank accounts, apply for loans, open utility or phone accounts, and apply for public assistance programs.

According to the FTC, the most common type of identity theft in 2006 was credit card fraud (25 percent), followed by “other” identity theft (24 percent), phone or utilities fraud (16 percent), bank fraud (16 percent), employment-related fraud (14 percent), government documents or benefits fraud (10 percent), and loan fraud (5 percent; Synovate 2007 ). 6 Data from the 2012 ITS indicate the most common type was the unauthorized misuse or attempted misuse of an existing account. Eighty-five percent of victims experienced this type of theft; more specifically, 40 percent involved existing credit card accounts, 37 percent bank accounts, and 7 percent other accounts such as existing, telephone, online, or insurance accounts ( BJS 2013 ). While much of the official data (i.e., FTC and BJS) suggest that existing credit card fraud is the most common method of identity theft perpetrated by offenders, little detail is given on the specific methods employed. We now turn to offender-based data to provide a more detailed picture of the methods used to convert information.

B. Findings from Offender-Based Research

Research on identity thieves provides more details on the specific techniques that offenders use to steal and convert personal information ( Copes and Vieraitis 2012 ). 7 Participants in Copes and Vieraitis’ study revealed techniques used by organized rings in which a person is planted as an employee in a mortgage lender’s office, doctor’s office, or human resources department to access information more easily. Similarly, these groups will simply bribe insiders such as employees of banks, car dealerships, government agencies, and hospitals to gain access to identifying information. Offenders report buying information from other offenders such as prostitutes, burglars, drug addicts, and other street hustlers. Some offenders engage in sophisticated ploys to induce victims to reveal personal information such as setting up fake employment sites or convincing a friend or relative to help the offender out of a difficult financial situation.

Most offenders use the information to order new credit cards, but they also use it to induce the credit card agency to issue a duplicate card on an existing account. They use credit cards to buy merchandise for their own personal use, to resell the merchandise to friends and/or acquaintances, or to return the merchandise for cash. Offenders also use the checks that are routinely sent to credit card holders to deposit in the victim’s account and then withdraw cash or open new accounts. Offenders have been known to apply for credit cards at department and home improvement stores. Other common strategies for converting information into cash and/or goods includes producing counterfeit checks, which offenders use to obtain cash at grocery stores, purchase merchandise and pay bills, open new bank accounts in order to deposit checks or withdraw money from an existing account, and apply for and receive loans ( Copes and Vieraitis 2012 ).

Identity thieves rely on a number of methods to carry out their crimes. In addition, as the profiles at the beginning of this essay indicate, some thieves do so by working alone, while others are involved in teams both small and large. The participants in Copes and Vieraitis’ (2012) study reported that they relied on a number of organizational schemes to carry out their acquisition of personal information and the conversion of that information into cash and/or goods. Three primary organization schemes emerged from their interviews with offenders, including loners, street level identity theft (SLIT) rings, and occupational teams.

Loners reported typically using the personal information of others to open credit card accounts or secure bank loans. Many of these offenders claimed that they tried to make payments on the accounts to prevent victims from discovering the fraud, but eventually repayment became impossible. In some cases they used information available to them for their place of work, and in some cases they used the information of family members, including their own children, or friends. In one case, a woman employed at a mortgage company used client information to obtain personal bank loans. In another, the offender used the personal information of deceased family members to open bank accounts, get credit cards, and apply for a HUD loan. One thief used the personal information of her children and mother to take out bank loans. Other thieves used more sophisticated and elaborate schemes to dupe strangers into revealing their information. For example, one set up fake employment sites with applicants willingly supplying all their personal information, and another used obituaries to access information and file fraudulent Medicare claims.

The majority of the identity thieves interviewed by Copes and Vieraitis (2012) operated in teams characterized by an elaborate division of labor in which members performed different roles depending on their knowledge and skills. There was considerable diversity among this group that necessitated the division of teams into two types: SLIT rings and occupational teams. SLIT rings and occupational teams share many similarities, but they differ noticeably in the methods they use to steal and convert information.

SLIT rings used numerous methods to acquire and convert information. Some rings relied on an individual employed by a company that possessed legitimate access to names and personally identifying information of clients to obtain information. Others targeted residential and commercial mailboxes to steal checkbooks, bank statements, or medical bills. For most SLIT rings in Copes and Vieraitis’ (2012) sample, the person supplying the information was a street-level criminal—typically engaged in drug sales, robbery, burglary, or other street crimes—who sold the information to the ringleader. This information included drivers’ licenses and social security cards. Some rings obtained information from willing acquaintances, friends, and family members in exchange for a fee. The “victim” would then wait a while before reporting the “theft.” In one case involving a well-known gang, the ringleader paid someone to purchase birth certificates from drug-addicted mothers. The birth certificates of US children were used to gain passports so the children of gang members and their associates could enter the country “legally.”

After obtaining victims’ information, offenders applied for credit cards in the victims’ names, opened new bank accounts and deposited counterfeit checks, withdrew money from existing bank accounts, applied for loans, or opened utility or telephone accounts. Because such transactions all require some form of official identification, teams recruited employees of state or federal agencies with access to social security cards or birth certificates, which could then be used to order identification cards. While thieves could use fraudulent information to obtain identification cards through conventional channels, it also was possible to manufacture false cards using rogue employees of state departments of motor vehicles or through street hustlers, who had managed to obtain the necessary equipment. For SLIT rings, the most common strategy for converting information into cash was by applying for credit cards, both from major card issuers and individual retailers. Offenders could use a stolen identity to order new credit cards or to issue a duplicate card on an existing account. With these cards in hand, they could buy merchandise for their own personal use, for resale to friends and acquaintances, or to return for cash. Another common strategy for converting information into cash or goods involved producing counterfeit checks. Offenders typically used such checks to open new bank accounts or deposited them in the victim’s existing account before withdrawing cash. Counterfeit checks also could be cashed at grocery stores or be used to purchase merchandise and pay bills.

Members of occupational teams used their legitimate place of employment to steal information and convert it to goods or cash, acting almost exclusively with fellow employees to commit their crimes. In mortgage fraud schemes, the majority of players were employed at the same company or at companies that worked together to process home loans. In cases involving workers at a state department of motor vehicles, an outside source provided information to employees, who then issued state identification cards or driver’s licenses that were subsequently used to carry out identity thefts. The thefts committed by occupational teams typically involved theft on a larger scale, characterized by numerous victims and higher dollar losses than those committed by SLIT rings or loners.

VI. Conclusions and Future Research

It is clear that identity theft affects a sizable portion of the population, is costly in both time and money, and is difficult to detect and prosecute. To understand the crime of identity theft and thus increase the likelihood that policymakers and law enforcement officials are effective in reducing it, there is a need for continued research. The first step is to address the problem of data collection. Currently, information on identity theft is collected and housed in multiple databases, including both private and government agencies. One incident may be reported to local, state, and federal law enforcement agencies, credit reporting agencies, credit card companies, financial institutions, telecommunication companies, and others. This makes the collection and sharing of information among agencies difficult. It also creates significant barriers to developing reliable estimates of the extent of identity theft, patterns in victimization and offending, and the true costs associated with this crime. There is also little data on the processing of identity thieves including clearance rates, conviction rates, and sentencing. We need more systematic data collection from agencies responsible for personal information; agencies that use personal information in legitimate business practices; law enforcement agencies at local, state, and federal levels; victims; and those who know most about how and why identity theft occurs—the identity thieves themselves. Although the focus here has been on offender-based research, we do not deny the critical roles that individuals, businesses, and government agencies play in the development of prevention strategies. Increasing the effort and risk associated with stealing identifying information and converting it into cash or goods requires diligence on the part of individuals as well as businesses. Moreover, understanding how individuals and businesses protect and regulate the use of personally identifying information can improve efforts to control identity theft and fraud. Gaining information on who these offenders are and how they perpetrate their crimes can also help inform policies designed to decrease identity theft. As Collins (2006 : 181) notes, “[C]omputers do not steal identities… people do.”

Allison, Stuart F. H. , Amie M. Schuck , and Kim Michelle Lersch . 2005 . “ Exploring the Crime of Identity Theft: Prevalence, Clearance Rates, and Victim/Offender Characteristics. ” Journal of Criminal Justice , 33: 19–29.

Google Scholar

Anderson, Keith B.   2006 . “ Who are the Victims of Identity Theft? The Effect of Demographics. ” Journal of Public Policy & Marketing , 25: 160–171.

Bureau of Justice Statistics. 2006 . Identity Theft, 2004 . Washington, DC: US Government Printing Office.

Google Preview

Bureau of Justice Statistics. 2010 . Victims of Identity Theft, 2008 . Washington, DC: US Government Printing Office.

Bureau of Justice Statistics. 2013 . Victims of Identity Theft, 2012. Publication NCJ 243779. Washington, DC: US Government Printing Office.

Canadian Anti-Fraud Centre Criminal Intelligence Analytical Unit. 2013. Annual Statistical Report 2013. https://www.antifraudcentre-centreantifraude.ca/english/documents/Annual2013CAFC.pdf

CBS Los Angeles. 2014. “LA Community College Student Pleads Not Guilty to Identity Theft Charges.” March 10. http://losangeles.cbslocal.com

CIFAS. 2013 . “ CIFAS Report Examines Fraud in 2012. ” Fraudscape , March 5. London. http://www.cifas.org.uk/fraudscape_twentythirteen

Collins, Judith M.   2006 . Investigating Identity Theft: A Guide for Businesses, Law Enforcement, and Victims . Hoboken, NJ: Wiley.

Copes, Heith , and Lynne Vieraitis . 2009 a. “ Bounded Rationality of Identity Thieves: Using Offender-Based Research to Inform Policy. ” Criminology and Public Policy , 8: 237–262.

Copes, Heith , and Lynne Vieraitis . 2009 b. “Identity Theft.” In M. Tonry (Ed.), Oxford Handbook on Crime and Public Policy . Oxford: Oxford University Press.

Copes, Heith , and Lynne Vieraitis . 2009 c. Understanding Identity Theft: Offenders’ Accounts of their Lives and Crimes.   Criminal Justice Review , 34: 329–349.

Copes, Heith , Kent R. Kerley , John Kane , and Rodney Huff . 2010 . “ Differentiating Identity Theft: An Exploratory Study of Victims Using a National Victimization Survey. ” Journal of Criminal Justice , 38: 1045–1052.

Copes, Heith , and Lynne Vieraitis . 2012 . Identity Thieves: Motives and Methods . Boston: Northeastern University Press.

Copes, Heith , Lynne Vieraitis , and Jennifer Jochum . 2007 . “ Bridging the Gap Between Research and Practice: How Neutralization Theory Can Inform Reid Interrogations of Identity Thieves. ” Journal of Criminal Justice Education , 18: 444–459.

Credit Industry Fraud Avoidance System. 2014. “Identity Fraud.” http://www.cifas.org.uk/identity_fraud

Duffin, Michelle , Gemma Keats, and Martin Gill . 2006 . Identity Theft in the UK: The Offender and Victim Perspective . Leicester, UK: Perpetuity Research and Consultancy International.

Federal Trade Commission. 2009. Consumer Sentinel Network Data Book, January–December 2008 . http://www.ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2008.pdf

Federal Trade Commission. 2014. Consumer Sentinel Network Data Book, January–December 2013.   http://www.ftc.gov/system/files/documents/reports/consumer-sentinel-network-data-book-january-december-2013/sentinel-cy2013.pdf

Gayer, Jenette . 2003 . Policing Privacy: Law Enforcement’s Response to Identity Theft . Los Angeles: California Public Interest Research Group.

Gibson, David . 2014 . “ 10 Accused of $20 Million in Identity Theft Fraud. ” Atlanta Journal Constitution, May 22. http://www.ajc.com/news/news/local/10-accused-of-20-million-in-identity-theft-fraud/nf5f7/

Gill, Martin . 2007 . Learning from Fraudsters: Reinforcing the Message . Leicester, UK: Perpetuity Research & Consulting.

Gordon, Gary R. , Donald Rebovich , Kyung-Seok Choo , and Judith B. Gordon . 2007 . Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement. Utica, NY: Center for Identity Management and Information Protection.

Holt, Thomas J. , and Adam M. Bossler . 2009 . “ Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization. ” Deviant Behavior , 30: 1–25.

Holt, Thomas J. , and E. Lampke . 2010 . “ Exploring Stolen Data Markets On-line: Products and Market Forces. ” Criminal Justice Studies , 23: 33–50.

Hoofnagle, Chris J.   2007 . “ Identity Theft: Making the Known Unknowns Known. ” Harvard Journal of Law and Technology, 21(1): 98–122.

Identity Theft Resource Center. 2007. “Identity Theft: The Aftermath, 2006.” http://www.idtheftcenter.org/images/surveys_studies/Aftermath2006.pdf

Identity Theft Resource Center. 2014. “2013 Data Breach Stats.” http://www.idtheftcenter.org/images/breach/2013/UpdatedITRCBreachStatsReport.pdf

Jacobs, Shayna . 2014 . “ Exclusive: Wannabe Rapper Busted as Part of 25-Member Identity Theft Ring. ” New York Daily News, May 29. http://www.nydailynews.com/news/crime/exclusive-rapper-busted-identity-theft-ring-article-1.1809371

Javelin Strategy and Research. 2011 . 2011 Identity Fraud Survey Report: Consumer Version . Pleasanton, CA: Javelin Strategy and Research Group.

Javelin Strategy and Research. 2014 . 2014 Identity Fraud Survey Report: Consumer Version. Pleasanton, CA: Javelin Strategy and Research Group.

Koops, Bert-Jaap, and Ronald Leenes . 2006 . “ Identity Theft, Identity Fraud and/or Identity-Related Crime. ” Datenschutz und Datensicherheit , 30: 553–556.

Kresse, William , Kathleen Watland , and John Lucki . 2007. “Identity Theft: Findings and Public Policy Recommendations.” Final Report to the Institute for Fraud Prevention. Chicago: Saint Xavier University. http://www.theifp.org/research-grants/ID%20Theft%20in%20Chgo%20-%20%20Final%20Report_press.pdf

Lane, Gina W. , and Daniel Z. Sui . 2010 . “ Geographics of Identity Theft in the U.S.: Understanding Spatial and Demographic Patterns, 2002–2006. ” GeoJournal 75: 43–55.

National Gang Intelligence Center. 2013 . “ 2013 National Gang Report. ” Washington: DC.

Owens, Megan . 2004 . Policing Privacy: Michigan Law Enforcement Officers on the Challenges of Tracking Identity Theft . Ann Arbor: Michigan Public Interest Research Group.

Pontell, Henry . 2002 . “‘ Pleased to Meet You … Won’t You Guess my Name?’ Identity Theft, Cyber Crime, and White Collar Delinquency. ” Adelaide Law Review , 23(2): 305–328.

Pontell, Henry N. , Gregory C. Brown , and Anastasia Tosouni . 2008 . “Stolen Identities: A Victim Survey.” In Megan M. McNally and Graeme Newman (Eds.), Perspectives on Identity Theft (pp. 57–86). New York: Criminal Justice Press.

Sproule, Susan , and Norm Archer . 2010 . “ Measuring Identity Theft and Identity Fraud. ” International Journal of Business Governance and Ethics , 5(112): 51–63.

Synovate. 2003. “Federal Trade Commission: 2003 Identity Theft Survey Report.” http://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-identity-theft-program/synovatereport.pdf

Synovate. 2007. “Federal Trade Commission: 2006 Identity Theft Survey Report.” www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf

Unisys. 2014. “Unisys Security Index 2014.” http://www.unisys.com

Vieraitis, Lynne , Heith Copes , and Ivan Birch . 2014 . “Identity Theft.” In Gerben Bruinsma and David Weisburd (Eds.), Encyclopedia of Criminology and Criminal Justice . New York: Springer.

Vigil, Jennifer . 2014 . “ 3 Men Charged in Theft Ring that Stretches from San Diego to Ghana. ” Times of San Diego , May 23. http://timesofsandiego.com/crime/2014/05/23/3-men-charged-in-theft-ring-that-stretches-from-san-diego-to-ghana/

Although identity theft is ranked second on the list of top security concerns, the highest ranked issue is related to identity theft. Fifty-nine percent of US respondents surveyed are seriously concerned (“extremely” or “very concerned”) about other people obtaining and using their credit or debit card details.

Carders are people who buy, sell, and trade credit card data taken from phishing websites or large store data breaches.

Javelin reports the total number of victims rather than the rates of victimization per population. When computed as a rate per 100,000 population ages 18 years and older, identity theft victimization increases 15 percent from 2006 to 2013.

The makeup for the full list of located inmates from which the Copes and Vieraitis (2012) sample was drawn was 50 percent white, 46 percent black, and 4 percent other. This is a higher percentage of white offenders than found by either Gordon et al. (2007) or Allison et al. (2005) .

Duffin et al. (2006) and Gill (2007) are based on extremely small samples of identity thieves (five and two, respectively). We should also note that despite research that suggests online identity theft is rare in comparison to offline methods, the number of victims in one incident can be substantial. The Identity Theft Resource Center (2014) reports that in 2013 there were 614 breaches of information in which an individual’s name plus social security number, driver’s license number, medical record, or financial record/credit card/debit card was put at risk in electronic or paper format. The number of records exposed totaled nearly 92 million. The extent of frauds perpetrated after such attacks, however, is yet unknown although recent figures suggest that one in four data breach notification recipients become victims of fraud ( Javelin 2011 ).

According to the most recent Consumer Sentinel report (2014), victims’ information was misused for government documents or benefits fraud in 34 percent of reported cases, followed by “other” (24 percent) and credit card fraud in 17 percent of cases; however, the data are based on victim-initiated reports.

The limitations regarding data also apply to the offender-based studies reviewed here. For example, Copes and Vieraitis’ data are drawn from interviews with federally convicted identity thieves and are not necessarily representative of the typical identity thief. Briefly, they may be responsible for unusually high monetary losses or have clear evidence against them making prosecution easier. Moreover, some have suggested that convicted offenders may be considered unsuccessful or unskilled offenders, which is why they were caught. For a more detailed discussion of this issue see Copes and Vieraitis (2009a , b , 2012 ).

  • About Oxford Academic
  • Publish journals with us
  • University press partners
  • What we publish
  • New features  
  • Open access
  • Institutional account management
  • Rights and permissions
  • Get help with access
  • Accessibility
  • Advertising
  • Media enquiries
  • Oxford University Press
  • Oxford Languages
  • University of Oxford

Oxford University Press is a department of the University of Oxford. It furthers the University's objective of excellence in research, scholarship, and education by publishing worldwide

  • Copyright Š 2024 Oxford University Press
  • Cookie settings
  • Cookie policy
  • Privacy policy
  • Legal notice

This Feature Is Available To Subscribers Only

Sign In or Create an Account

This PDF is available to Subscribers Only

For full access to this pdf, sign in to an existing account, or purchase an annual subscription.

  • Credit cards
  • View all credit cards
  • Banking guide
  • Loans guide
  • Insurance guide
  • Personal finance
  • View all personal finance
  • Small business
  • Small business guide
  • View all taxes

You’re our first priority. Every time.

We believe everyone should be able to make financial decisions with confidence. And while our site doesn’t feature every company or financial product available on the market, we’re proud that the guidance we offer, the information we provide and the tools we create are objective, independent, straightforward — and free.

So how do we make money? Our partners compensate us. This may influence which products we review and write about (and where those products appear on the site), but it in no way affects our recommendations or advice, which are grounded in thousands of hours of research. Our partners cannot pay us to guarantee favorable reviews of their products or services. Here is a list of our partners .

Identity Theft: What It Is, How to Prevent It, Warning Signs and Tips

Bev O'Shea

Many or all of the products featured here are from our partners who compensate us. This influences which products we write about and where and how the product appears on a page. However, this does not influence our evaluations. Our opinions are our own. Here is a list of our partners and here's how we make money .

Identity theft is when someone uses your personal data — your name, Social Security number, birthdate, etc. — to impersonate you, typically using that information to steal from you. The Federal Trade Commission received more than 1 million reports of identity theft through its IdentityTheft.gov website in 2023. [0] Federal Trade Commission . As Nationwide Fraud Losses Top $10 Billion in 2023, FTC Steps Up Efforts to Protect the Public . Accessed Feb 28, 2024. View all sources

Here’s what you need to know to reduce chances you’ll be a target, spot warning signs and take quick action to minimize damage.

• What is identity theft?

• 7 types of identity theft and warning signs

• 11 ways to prevent identity theft

• 10 ways identity theft happens

• How to report identity theft

• What happens when you report identity theft?

• What is the best identity theft protection service?

Video preview image

What is identity theft?

Identity theft happens when someone uses your sensitive data to pose as you or steal from you. Identity thieves may drain your bank and investment accounts, open new credit lines, get utility service, steal your tax refund, use your insurance information to get medical treatments, or give police your name and address when they are arrested.

Frequent data breaches mean your information may already be exposed. In this new reality, it’s smart to take steps to prevent malicious actors from using your personal information and ruining your financial life.

7 types of identity theft and the warning signs

Once a criminal has your info, here are common ways it may be exploited:

1. Credit identity theft

Credit identity theft happens when a criminal uses your personal information, such as birthdate and Social Security number, to apply for a new credit line.

Warning signs: You might see an unexpected change in your credit scores or an account you don’t recognize on your credit reports. You may get debt collection notices or a court judgment against you. The best way to prevent it is to freeze your credit.

2. Child identity theft

Criminals steal a child’s identity and apply for credit in that child’s name. Often it is not discovered until the victim applies for college loans or other credit.

Warning signs: If your child is getting offers of credit cards or phone calls about late payments or debt collections, investigate. You can freeze your child's credit to prevent it.

3. Synthetic identity theft

Synthetic identity theft is when criminals use a patchwork of identity details to construct a fictitious consumer, using a Social Security number — often one of a minor child or one that is simply made up — that is not yet in the credit bureaus’ database and combining it with a name and address. They then apply for loans and credit cards, often making payments for years as the credit limits grow. Then comes a "bust out," when cards are maxed out and the criminals disappear.

Warning signs: If you try to freeze your child’s credit and discover their Social Security number is already in use. Often it is not discovered until the child is applying for student loans. It is not always preventable, because sometimes criminals make up and use a Social Security number even before it's assigned.

4. Taxpayer identity theft

Sometimes fraudsters use a Social Security number to file a tax return and steal your tax refund or tax credit.

Warning signs: You may be unable to e-file because someone else has already filed under that Social Security number, you get an IRS notice or letter referencing some activity you knew nothing about or IRS records suggest you worked for an employer that you did not. Filing early can help you beat criminals to filing in your name, and some states offer six-digit identity protection PINs (after a rigorous verification) with additional security.

5. Medical identity theft

Using someone else’s identity to get health care services is medical identity theft. It’s particularly dangerous because it can result in medical histories being mixed, giving doctors and hospitals wrong information as they are making health care decisions.

Warning signs: Claims or payments on your insurance explanation of benefits that you do not recognize can suggest that someone is using your health care benefits. If you’ve fallen victim, you’ll need to both report it to your insurance company and inform your health care team to be sure information in your health care records is actually yours.

6. Account takeover

Criminals use personal data to access your financial accounts, then change passwords or addresses so that you no longer have access.

Warning signs: An email, letter or text from your financial institution that refers to an action (like a password or email change) or transaction you don't recognize.

7. Criminal identity theft

Criminal identity theft occurs when someone gives law authorities someone else’s name and address during an arrest or investigation. This is often done with false identification, such as a fake driver’s license.

Warning signs: You may be detained by a police officer for reasons that are unclear to you, or be denied employment or a promotion because of something found in a background check.

Âť LEARN: What is identity theft in Canada?

essay on identity theft

11 ways to prevent identity theft

You’re unlikely to find a fail-safe way to prevent identity theft, and monitoring services only let you know after something has gone wrong. But there are 11 things you can do to make it much harder for identity thieves.

1. Freeze your credit

Freezing your credit with all three major credit bureaus — Equifax, Experian and TransUnion — restricts access to your records so new credit files cannot be opened. It’s free to freeze your credit and unfreeze when you want to open an account, and it provides the best protection against an identity thief using your data to open a new account.

2. Safeguard your Social Security number

Your Social Security number is the master key to your personal data. Guard it as best you can. When you are asked for your number, ask why it is needed and how it will be protected. Don’t carry your card with you. Securely store or shred paperwork containing your Social Security number.

3. Be alert to phishing and spoofing

Scammers can make phone calls appear to come from government entities or businesses, and emails that appear to be legitimate may be attempts to steal your information. Initiate a callback or return email yourself, working from a known entity such as the official website, rather than responding to a call or email. And be wary of attachments — many contain malware.

4. Use strong passwords and add an authentication step

Use a password manager to create and store complex, unique passwords for your accounts. Don’t reuse passwords. Adding an authenticator app can reduce your risk. Don’t rely on security questions to keep your accounts safe; your mother’s maiden name and your pet’s name aren’t hard to find. Think carefully about what you post on social media so you don't give away key data or clues about how you answer security questions.

5. Use alerts

Many financial institutions will text or email when transactions are made on your accounts. Sign up so that you know when and where your credit cards are used, when there are withdrawals or deposits to financial accounts and more.

6. Watch your mailbox

Stolen mail is one of the easiest paths to a stolen identity. Have your mail held if you’re out of town. Consider a U.S. Postal Service-approved lockable mailbox. You can also sign up for Informed Delivery through the USPS, which gives you a preview of your mail so you can tell if anything is missing.

7. Shred, shred, shred

Any credit card, bank or investment statements that someone could fish out of your garbage shouldn’t be there in the first place. Shred junk mail, too, especially preapproved offers of credit.

8. Use a digital wallet

If you’re paying online or in a store, use a digital wallet, an app containing secure, digital versions of credit and debit cards. You can use it to shop online or at a compatible checkout terminal. Transactions are tokenized and encrypted, which makes them safer. In addition, contactless transactions have fewer health risks.

9. Protect your mobile devices

Use passwords on your electronic devices. Use a banking app rather than a mobile browser for banking.

10. Check your credit reports regularly

The three major credit reporting bureaus give consumers access to free credit reports weekly, accessible by using AnnualCreditReport.com . Check to be sure that accounts are being reported properly and watch for signs of fraud, like accounts you don't recognize. You can also sign up for a free credit report and score from NerdWallet to receive alerts when there are changes.

11. Monitor financial and medical statements

Read financial statements. Make sure you recognize every transaction. Know due dates and call to investigate if you do not receive an expected bill. Review “explanation of benefits” statements to make sure you recognize the services provided to guard against health care fraud.

10 ways identity theft happens

Here are some of the ways your personal information can be compromised:

1. Lost wallet

When your wallet is lost or stolen, someone else may gain access to all the information in it.

Don’t carry your Social Security card or more credit cards than you use regularly, and don’t keep a list of passwords and access codes in your wallet.

Make photocopies of your credit cards, front and back, and keep them in a secure location so that you can easily call the issuer if a card or your wallet is lost. Some issuers allow you to temporarily “turn off” a lost card; with others, you have to cancel and get a new card issued.

2. Mailbox theft

Someone simply takes your mail or forwards your mail to a different address, so that you suddenly stop getting most mail.

Sign up for USPS Informed Delivery. You’ll get an email with images of the items that should be delivered to you so you’ll know if things are missing.

Choose a secure mailbox and retrieve mail promptly.

3. Using public Wi-Fi

Hackers may be able to see what you are doing when you use free public Wi-Fi.

Don’t use public Wi-Fi for shopping, banking or other sensitive transactions.

If you choose to use public Wi-Fi, use a virtual private network service to create a secure connection.

4. Data breaches

Hackers invade databases holding sensitive information. Almost everyone has been affected by a data breach .

Assume that your data is already out there and take precautions accordingly.

Check your credit scores often — unexpected changes can be a clue — and read financial and insurance statements carefully. Monitor your credit reports, especially for new accounts or inquiries resulting from credit applications.

5. SIM card swap

This is when someone takes over your phone number . You may stop getting calls and texts, or you may get a notice that your phone has been activated.

Set up a PIN or password on your cellular account.

Consider using an authentication app for accounts with sensitive financial information.

6. Phishing or spoofing

Some fraudsters try to get you to disclose personal data, such as credit card numbers, Social Security numbers and banking information, by sending an official-looking email. Spoofing involves doing much the same thing with caller ID, so that the number appears to be that of a trusted company or government agency.

Do not give out personal data in response to an email or call.

Find contact information from a trusted source, such as your bank website, and use it to verify whether the call or email is legitimate.

7. Skimming

Skimming is getting credit card information, often from a small device, when a credit card is used at a brick-and-mortar location such as a gas pump or ATM.

Use cards with chips, which have added protections.

Pay inside at the gas station if you can, because skimming devices are more likely to be placed at unmonitored payment sites.

Detect fraudulent activity early by setting email or text alerts that let you know when your credit cards are used. If a card is used without your authorization, call the issuer immediately.

8. Phone scams

You may be told you have won something or even that you are in danger of being arrested. The caller claims to need personal, banking or credit information to verify your identity or to know where to send you money.

Don’t give personal information out over the phone.

Be aware of common phone scams . The IRS, for example, does not initiate contact with taxpayers by phone (or email or social media) to request personal or financial information, nor does it call with threats of arrest or lawsuits.

9. Looking over your shoulder

Fraudsters can learn a password just by watching your fingers as you key it in. The information on your credit card can be photographed with a smartphone while you shop online in a public place. A business might leave sensitive information where people can see it.

Be aware of your surroundings.

Don’t leave cards where they can be seen.

Cover your hand when you key in passwords or codes.

10. Malware

Opening an email attachment or visiting an infected website can install malicious software on your computer, such as a keylogger. That does what it sounds like — logs every keystroke, giving criminals access to passwords, account numbers and more.

Be cautious about clicking on attachments or links in emails and about the websites you visit.

Use a password manager, which lets you avoid keying in login credentials.

How to report identity theft

The FTC's IdentityTheft.gov is a one-stop shop for information and reporting identity theft. Start with that site and follow its recommended steps to make a recovery plan. You may also need to contact your police department, the Postal Service and the credit bureaus. The IRS has a phone line for identity theft, at 800-908-4490, and a taxpayer guide to identity theft on its website.

The FTC takes scam and identity theft reports over the phone or online in multiple languages including Spanish, Mandarin, Tagalog, Vietnamese, French, Arabic, Korean, Russian, Portuguese and Polish. It also offers consumer education in a variety of languages.

You can also go directly to your credit card issuer if your credit card was lost, stolen or used without your knowledge. If it appears someone else used your health benefit, contact your health insurer and consider contacting any involved providers to make sure someone else’s health history is not mixed with yours.

What happens when you report identity theft?

Reporting identity theft starts an investigation and the process of restoring your good name. The exact steps will depend on the type of identity theft.

Credit card issuers generally replace the cards with new ones with a different number, and you are back in business. Taxpayer identity theft or theft of benefits typically are resolved more slowly.

No matter which type of identity theft you experience, keep extensive notes about phone conversations and retain related emails.

What is the best identity theft protection service?

Identity theft protection services let you know that your identifying information has been used, or that it is at risk because it was exposed in a data breach. If you are a victim of identity theft, they may also guide you — and reimburse you for costs — through the process of cleaning up the mess and restoring your identity.

If you’re already doing all you can do to protect your identity or feel you don't have time to do it, you may want to consider an identity theft protection service. Protections vary, and most offer additional ways to protect your privacy and other services. The best choice among the paid services is one that fits your budget and offers you the coverage you care about.

Before you pay for one, though, check to be sure you don’t have an identity theft benefit or discount you’re not using.

If you decide to buy, NerdWallet has reviews of:

IdentityForce

  • Undergraduate
  • High School
  • Architecture
  • American History
  • Asian History
  • Antique Literature
  • American Literature
  • Asian Literature
  • Classic English Literature
  • World Literature
  • Creative Writing
  • Linguistics
  • Criminal Justice
  • Legal Issues
  • Anthropology
  • Archaeology
  • Political Science
  • World Affairs
  • African-American Studies
  • East European Studies
  • Latin-American Studies
  • Native-American Studies
  • West European Studies
  • Family and Consumer Science
  • Social Issues
  • Women and Gender Studies
  • Social Work
  • Natural Sciences
  • Pharmacology
  • Earth science
  • Agriculture
  • Agricultural Studies
  • Computer Science
  • IT Management
  • Mathematics
  • Investments
  • Engineering and Technology
  • Engineering
  • Aeronautics
  • Medicine and Health
  • Alternative Medicine
  • Communications and Media
  • Advertising
  • Communication Strategies
  • Public Relations
  • Educational Theories
  • Teacher's Career
  • Chicago/Turabian
  • Company Analysis
  • Education Theories
  • Shakespeare
  • Canadian Studies
  • Food Safety
  • Relation of Global Warming and Extreme Weather Condition
  • Movie Review
  • Admission Essay
  • Annotated Bibliography
  • Application Essay
  • Article Critique
  • Article Review
  • Article Writing
  • Book Review
  • Business Plan
  • Business Proposal
  • Capstone Project
  • Cover Letter
  • Creative Essay
  • Dissertation
  • Dissertation - Abstract
  • Dissertation - Conclusion
  • Dissertation - Discussion
  • Dissertation - Hypothesis
  • Dissertation - Introduction
  • Dissertation - Literature
  • Dissertation - Methodology
  • Dissertation - Results
  • GCSE Coursework
  • Grant Proposal
  • Marketing Plan
  • Multiple Choice Quiz
  • Personal Statement
  • Power Point Presentation
  • Power Point Presentation With Speaker Notes
  • Questionnaire
  • Reaction Paper
  • Research Paper
  • Research Proposal
  • SWOT analysis
  • Thesis Paper
  • Online Quiz
  • Literature Review
  • Movie Analysis
  • Statistics problem
  • Math Problem
  • All papers examples
  • How It Works
  • Money Back Policy
  • Terms of Use
  • Privacy Policy
  • We Are Hiring

Identity Theft, Essay Example

Pages: 1

Words: 390

Hire a Writer for Custom Essay

Use 10% Off Discount: "custom10" in 1 Click 👇

You are free to use it as an inspiration or a source for your own work.

With telecommunications advancing virtually exponentially, the increased reliance people place on online interactions of a financial nature has opened the door for the new breed of crime known as identity theft. The motives for the crime  are, moreover, more varied than might be imagined. Economic gain is foremost among them, not unexpectedly; access to an individual’s banking data provides an avenue for stealing funds. This also permits an additional crime, or motive, in that the identity thief, through rampant misuse of another’s finances, may destroy that victim’s credit. A more personal motive, it nonetheless has been identified with the crime (Van der Hof, Groothuis, 2011,  p. 409.) The other, most prevalent reason for identity theft is that of criminal concealment. The new and stolen identity serves to protect the criminal from charges and/or capture, particularly in a world so reliant upon technologically-driven forms of identification.

The single, most effective weapon against identity theft is personal awareness. That is to say, the understanding within an individual that the crime may be attempted on them sets in motion a general and necessary psychology of caution. The aware person  then pause before providing any personal information to any source requesting it, first determining if the relaying of the information is essential, and how it may be kept secure (Hoffman, McGinley,  2009,  p. 74). Ongoing and rapid advances in technologies have very much rendered identity theft an “arms race” between criminals and victims;  merely knowing that the danger is real, then, goes a long way toward avoiding vulnerability to it. Beyond this, practical measure are strongly urged, and usually by financial institutions. Passwords securing any sensitive information should be both maintained with the utmost secrecy and changed regularly, to forestall technologies which allow access to the retrieval of them. Actual access to computers and hand-held Internet devices must also be strictly within the control of the owner, as such devices often store personal data in a manner unknown to the owner but easily accessible to the skilled identity thief.   Then, and on a more tangible level, sensitive materials should be shredded, rather than merely discarded.

Hoffman, S. K., & McGinley, T. G.  (2010.)  Identity Theft: A Reference Handbook . Santa Barbara, CA: ABC-CLIO, LLC.

Van der Hof, S., & Groothuis, M. M.  (2011.)  Innovating Government: Normative, Policy, and Technological Dimensions of Modern Government.   New York, NY: Springer Publishing.

Stuck with your Essay?

Get in touch with one of our experts for instant help!

Robbery and Extortion, Essay Example

Arson: The Most Difficult Crimes to Prove, Essay Example

Time is precious

don’t waste it!

Plagiarism-free guarantee

Privacy guarantee

Secure checkout

Money back guarantee

E-book

Related Essay Samples & Examples

Voting as a civic responsibility, essay example.

Words: 287

Utilitarianism and Its Applications, Essay Example

Words: 356

The Age-Related Changes of the Older Person, Essay Example

Pages: 2

Words: 448

The Problems ESOL Teachers Face, Essay Example

Pages: 8

Words: 2293

Should English Be the Primary Language? Essay Example

Pages: 4

Words: 999

The Term “Social Construction of Reality”, Essay Example

Words: 371

When you use links on our website, we may earn a fee.

  • 10 Ways to Prevent Identity Theft

You use your personal data to perform a myriad of tasks every day, including accessing bank and credit card accounts, email, social media sites, and other password-protected accounts. Although this data is usually encrypted, that doesn't mean it’s completely secure. In fact, your personal information, and thus your identity, can be stolen and used by identity thieves for their financial gain. Read our guide for practical tips on how to protect your identity.

Popular Identity Theft Protection Services

Prices Reflect Discount

essay on identity theft

Aura »

Save Up to 62% on Individual Plans

Prices reflect Individual plans.

essay on identity theft

LifeLock »

U.S. News Exclusive Discount: Up to 42% Off Ultimate Plus Plan

essay on identity theft

Identity Guard »

Exclusive U.S News Offer: Save Up to 56% Off + Free 30-Day Trial

Why Trust U.S. News

Our ratings are unbiased. We follow strict editorial guidelines, maintain a separate business team, and have transparent methodology.

Services Evaluated

Reviews Analyzed

Best Companies

Table of Contents

  • What Is Identity Theft?

How to Prevent Identity Theft

Where could an identity thief access your personal information.

The Federal Trade Commission's Consumer Sentinel Network , which tracks identity theft and other consumer fraud complaints, received 1.4 million reports of identity theft in 2021. The most common types of identity theft were credit card fraud, government documents or benefits fraud, and loan or lease fraud. “Our information is pretty much all over the place, and that information is being used to commit crimes and fraud,” says Henry Bagdasarian, founder and executive director of the Identity Management Institute .

The good news is that you can help prevent identity theft with some basic due diligence, including good cybersecurity practices to thwart hackers . You can also use free tools to receive credit card and bank account notifications, as well as to help monitor your credit. Subscribing to an identity theft protection service is also highly recommended, because it will help you spot signs that your identity might have been stolen and help you recover if you become a victim.

Infographic on how many people have their IDs stolen in the U.S. each year

The U.S. Department of Justice explains that identity theft (which is also called identity fraud) refers to when a criminal uses someone else's personally identifiable information (PII) to commit fraud or deception. This is usually done for financial gain. There are many ways to commit identity theft, including hacking, financial and social media account takeovers, credit card fraud, phishing , ransomware attacks, tech support fraud, medical ID fraud, and others. PII includes important information that can be used to identify you, such as your date of birth, passwords, passport number, Social Security number or Social Security Card, credit and bank account numbers, telephone number, birth and death certificates, medical ID number, and biometric data, like fingerprints and scans.

Identity thieves who steal your PII can use it to open new financial accounts in your name, make purchases using your credit cards, receive medical care with your health insurance, or withdraw cash from your bank accounts. The Federal Trade Commission advises consumers to pay close attention to unexplained bank account withdrawals, calls from collections agencies about debts that aren't yours, or notices that your account information was compromised by a data breach. A fraudster can file a tax return in your name and get a refund. You might get a notice from your health insurance provider that a claim was filed for treatment you never received. These are clues that someone might have compromised your PII.

We use our personal information, like passwords and account numbers, almost every day to access online accounts and perform other routine tasks. Unfortunately, there is always a chance that someone could steal this data whenever we provide it. However, you can take simple steps to reduce the chance of identity theft.

The best way to help prevent identity theft is to sign up for an identity theft protection service . Although an identity theft protection service can't prevent identity theft, it can alert you promptly when it happens to limit the damage and help you recover. Identity theft protection can help safeguard your personal information for a monthly or annual fee. Subscriptions can include monitoring of credit reports, financial accounts, medical information, social media activity, the dark web, and more. Identity theft protection companies also provide recovery services if your information is compromised. Some offer identity theft coverage of up to $1 million and access to attorneys or private investigators to help you restore your credit and reputation. Most also give you a dashboard to view notifications and contact customer service if fraudulent activity occurs.

Besides subscribing to an identity theft protection service, there are other ways to help prevent identity theft. These include:

Collect mail daily

Some of the ways that criminals can steal your identity are decidedly low-tech. For example, they can simply take bank or credit card statements, utility bills, health care or tax forms, or pre-approved credit card offers out of your mailbox. Thieves also can reroute your mail by submitting change-of-address requests in your name, so keep track of expected mail that doesn't arrive. In addition, put your mail on hold while you're away.

Review credit card and bank statements regularly

It's important to regularly review your credit card and bank statements, because someone with your credit card number or bank account information could make small charges to see if they can get away with it. These transactions can easily slip through the cracks without you or your financial institution noticing them. Know your statement cycles and follow up with credit card companies and financial institutions if you don't receive statements on time. Credit card fraud is the most common type of identity theft, based on FTC Consumer Sentinel Network statistics.

Freeze your credit

When you freeze your credit file, no one can look at or request your credit report. Therefore, no one (including you) can open an account, apply for a loan, or get a new credit card while your credit is frozen. To freeze your credit, you must contact each of the three credit reporting agencies: Experian , Equifax , and TransUnion . The credit bureaus provide online, telephone, or mail-in options for freezing your account. Upon doing so, they will provide you with a PIN or passcode you can later use if you temporarily lift or stop the credit freeze. Credit freezes are free and won't impact your credit score.

Parents should seriously consider freezing their children’s credit files. A 2021 study by Javelin Strategy & Research found that child identity fraud costs U.S. families nearly $1 billion annually. About 1 in 50 U.S. children were victims of ID fraud, and 1 in 45 had personal information that was exposed in a data breach. This can cost the average family more than $1,000.

“It’s a good idea to put a freeze on children’s credit files and to monitor those files as they approach their teen years,” says Robert Douglas , an information and security consultant and certified identity theft risk management specialist. “There are plenty of horror stories out there of people finding out that their child’s credit worthiness has been harmed at a critical point when they need a good, clean record like when applying for a student loan.”

Create different passwords for your accounts 

A secure password is long, complex, and unique, according to the FTC . Create different passwords for various accounts, which is easiest to do with a good password manager. Avoid using information related to your identity, such as the last four digits of your Social Security number, your birthday, your initials, or parts of your name.

The FBI and National Institute of Standards and Technology recommends creating passwords with at least 15 characters because these are more difficult for a computer program or hacker to crack. As for security questions, the FTC advises selecting questions that only you can answer, instead of information that could be available online like your ZIP code, birth place or mother’s maiden name. Also, avoid giving generic responses, such as “chocolate,” as your favorite dessert.

Shred documents containing personal information before disposing of them

Dumpster diving might sound like an old-fashioned way of stealing personal information, given the influx of phishing scams and online data breaches, but criminals still do it. While some people might be looking for valuables or furniture, others are looking to steal your data.

Keep a few months of credit card and bank statements, utility bills, IRS correspondence, and other documents containing PII in a secure location like a safe. Shred the rest. Bagdasarian says he keeps his last three bank statements somewhere safe, replacing them with new ones every month.

Review credit reports annually 

Requesting your credit reports from Equifax, TransUnion, and Experian is free, and you should do so annually. Accessing your credit reports won't lower your credit score, and you can easily request them online. Also, the bureaus provide tools to help you monitor your credit, such as alerts to notify you of key changes. Ideally, pull your report from the bureaus at different times throughout the year so you are continually monitoring activity. You can also request free annual credit reports at AnnualCreditReport.com .

Install antivirus/software 

Antivirus software can prevent hackers from accessing information on your computer and mobile devices. The FTC says you might be a victim of malware, which includes viruses, spyware, and other unwanted software, if your computer:

  • Slows down, crashes, or displays error messages
  • Fails to shut down or restart
  • Delivers pop-ups or other unwanted ads
  • Sends you to web pages you didn't search for
  • Shows new, unexpected toolbars
  • Changes your default web browser 
  • Drains its battery quickly 

Because criminals can more easily hack outdated software, keep your antivirus software current or set it to update itself automatically. For more information, see How Does Antivirus Software Work?

Enable two-factor authentication on devices and accounts 

According to a 2017 Data Breach Investigations Report from Verizon, 81% of hacking-related breaches start with a stolen or compromised password. Two-factor authentication (2FA) is an extra layer of password security. It’s based on your knowledge of something like a PIN or password, a possession like a smartphone or other device, and a biometric characteristic like your fingerprint or voiceprint. 2FA requires more than one of these identifiers to unlock an account. Thus, if your password is stolen, a criminal still can't get into your account without your smartphone, voiceprint, or fingerprint. An example of 2FA at work is when you sign into an account with a password and then receive a text with a code you must supply to get into the account. You should set up 2FA for email, social media accounts, bank accounts, and credit cards.

Opt out of prescreened credit card offers 

Credit card companies often send pre-screened offers to open new accounts, and criminals can intercept these mailed or emailed offers and open accounts in your name. Shred these offers rather than throwing them in the trash. Your credit report doesn't show pre-screening that companies perform to give you these offers, so you might not realize that an offer has been stolen from your mail or email.

The safest way to avoid identity theft exposure from pre-screened credit card offers is to opt out of receiving them for five years or permanently through optoutprescreen.com , which is the official consumer credit reporting industry website.

Wipe electronics before donating 

When you delete files from computers and other electronic devices like tablets, those files aren't really gone; pieces of them remain and can be reassembled with a data recovery program until they're overwritten with new data. This can be accomplished with overwriting software that wipes hardware or transfers data from your old computer to a new one.

Infographic on the most common types of ID theft

Consumer.gov warns that criminals can access your personal information a number of ways. These include:

  • Stealing mail to get account numbers or your Social Security number
  • Posing as an impostor and requesting information via email
  • Stealing account numbers from businesses, credit card companies, and medical offices
  • Simply taking your wallet or purse to access credit cards, your driver’s license, and other personal data 

How to Report Identity Theft 

You can report identity theft to the FTC, which will help prove to businesses that someone stole your identity. You also have the right to place a one- or seven-year fraud alert on your credit report, request that fraudulent information is removed from your report, and stop debt collectors from contacting you.

You might want to file a police report for identity theft if you know the person who committed the crime, or if you find out the thief used your name or information during a police interaction, such as pretending to be you upon arrest. Credit card companies or financial institutions might request that you file a police report if you claim identity theft and ask them to investigate the case, remove the fraudulent activity from your account or cover the cost of lost funds.

For more information, see How to Report Identity Theft .

Need More Advice? 

Our privacy and technology team has done countless hours of research on all sorts of consumer technology products and services. If you have a question that hasn’t been answered in one of our guides, send an email to [email protected] and we’ll do our best to help.

Our Technology Expert

Jeff Kinney

Jeff Kinney began working as an editor for U.S. News & World Report in 2019, where he was instrumental in launching the company's 360 Reviews vertical. He currently focuses on consumer electronics and personal security services for 360 Reviews. Prior to joining U.S. News, Kinney worked as a reporter and editor for Bloomberg, LexisNexis, and other news organizations covering legal and regulatory issues, with a focus on technology-related matters.

Advice and Guides

  • Best Identity Theft Protection Services
  • What Is Credit Monitoring?
  • What Is Cybersecurity?
  • What Is Doxxing?
  • Identity Guard vs. LifeLock

Identity Theft Protection Services

  • Experian IdentityWorks
  • IdentityForce
  • Identity Guard
  • ID Watchdog
  • PrivacyGuard
  • ReliaShield

Other Guides from 360 Reviews

essay on identity theft

10 Best VPN Services

essay on identity theft

Best Antivirus Software

Jeff Kinney and Onjeinika Brooks

essay on identity theft

Best Internet Service Providers

Sarah Shelton and Jeff Kinney and Onjeinika Brooks and Kathryn Core

essay on identity theft

Best Password Managers

essay on identity theft

Best Laptops

Jeff Kinney and Hedy Phillips

essay on identity theft

Best Streaming Services

Why you can trust us: 21 identity theft protection services researched.

U.S. News 360 Reviews takes an unbiased approach to our recommendations. When you use our links to buy products, we may earn a commission but that in no way affects our editorial independence.

U.S. flag

An official website of the United States government

Here's how you know

Official websites use .gov A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS A lock ( Lock A locked padlock ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

  • The Attorney General
  • Organizational Chart
  • Budget & Performance
  • Privacy Program
  • Press Releases
  • Photo Galleries
  • Guidance Documents
  • Publications
  • Information for Victims in Large Cases
  • Justice Manual
  • Business and Contracts
  • Why Justice ?
  • DOJ Vacancies
  • Legal Careers at DOJ
  • Our Offices

Identity Theft

What Are Identity Theft and Identity Fraud?

Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person's personal data in some way that involves fraud or deception, typically for economic gain. What Are The Most Common Ways That Identity Theft or Fraud Can Happen to You?

  • In public places, for example, criminals may engage in "shoulder surfing"– watching you from a nearby location as you punch in your telephone calling card number or credit card number â€“ or listen in on your conversation if you give your credit-card number over the telephone.
  • If you receive applications for "pre-approved" credit cards in the mail, but discard them without tearing up the enclosed materials, criminals may retrieve them and try to activate the cards for their use without your knowledge. Also, if your mail is delivered to a place where others have ready access to it, criminals may simply intercept and redirect your mail to another location.
  • Many people respond to "spam"– unsolicited E-mail – that promises them some benefit but requests identifying data, without realizing that in many cases, the requester has no intention of keeping his promise. In some cases, criminals reportedly have used computer technology to steal large amounts of personal data.  

With enough identifying information about an individual, a criminal can take over that individual's identity to conduct a wide range of crimes. For example:

  • False applications for loans and credit cards,
  • Fraudulent withdrawals from bank accounts,
  • Fraudulent use of telephone calling cards or online accounts, or
  • Obtaining other goods or privileges which the criminal might be denied if he were to use his real name  

What Can You Do If You've Become a Victim of Identity Theft?

  • Call the fraud department. Explain that someone stole your identity. Ask them to close or freeze the accounts. Then, no one can add new charges unless you agree.
  • Change logins, passwords, and PINs for your accounts.  
  • Experian.com/fraudalert 1-888-397-3742
  • TransUnion.com/fraud 1-800-680-7289
  • Equifax.com/CreditReportAssistance 1-888-766-0008

A fraud alert is free. It will make it harder for someone to open new accounts in your name.

  • Get your free credit reports from Equifax, Experian, and TransUnion. Go to annualcreditreport.com or call 1-877-322-8228.

Review your reports. Make note of any account or transaction you don’t recognize. This will help you report the theft to the FTC and the police.  

  • Go to IdentityTheft.gov or call 1-877-438-4338. Include as many details as possible.

Based on the information you enter, IdentityTheft.gov will create your Identity Theft Report and personal recovery plan.  

  • A copy of your FTC Identity Theft Report
  • A government-issued ID with a photo
  • Proof of your address (mortgage statement, rental agreement, or utilities bill)
  • Any other proof you have of the theft—bills, Internal Revenue Service (IRS) notices, etc.
  • Tell the police someone stole your identity and you need to file a report.
  • Ask for a copy of the police report. You may need this to complete other steps.

What's The Department of Justice Doing About Identity Theft and Fraud?

The Department of Justice prosecutes cases of identity theft and fraud under a variety of federal statutes. In the fall of 1998, for example, Congress passed the Identity Theft and Assumption Deterrence Act . This legislation created a new offense of identity theft, which prohibits "knowingly transfer[ring] or us[ing], without lawful authority, a means of identification of another person with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law." 18 U.S.C. § 1028(a)(7). This offense, in most circumstances, carries a maximum term of 15 years' imprisonment, a fine, and criminal forfeiture of any personal property used or intended to be used to commit the offense.

Schemes to commit identity theft or fraud may also involve violations of other statutes such as identification fraud (18 U.S.C. § 1028), credit card fraud (18 U.S.C. § 1029), computer fraud (18 U.S.C. § 1030), mail fraud (18 U.S.C. § 1341), wire fraud (18 U.S.C. § 1343), or financial institution fraud (18 U.S.C. § 1344). Each of these federal offenses are felonies that carry substantial penalties –¬ in some cases, as high as 30 years' imprisonment, fines, and criminal forfeiture.

Federal prosecutors work with federal investigative agencies such as the Federal Bureau of Investigation , the United States Secret Service , and the United States Postal Inspection Service to prosecute identity theft and fraud cases.

Logo

Essay on Identity Theft

Students are often asked to write an essay on Identity Theft in their schools and colleges. And if you’re also looking for the same, we have created 100-word, 250-word, and 500-word essays on the topic.

Let’s take a look…

100 Words Essay on Identity Theft

What is identity theft.

Identity theft is when someone steals your personal details to pretend they are you. They might use your name, credit card, or social security number. This can cause big problems, like losing money or getting a bad credit score.

How Thieves Steal Identities

Thieves might dig through your trash or hack into computers to get your information. They can also trick you into giving it by pretending to be a bank or a trusted website.

Protecting Yourself

To stay safe, keep personal details secret. Shred important papers, use strong passwords online, and watch your bank accounts for strange activity.

What to Do If It Happens

If someone steals your identity, tell the police and your bank right away. You can also report it to groups that help people with identity theft. They can guide you on how to fix things.

250 Words Essay on Identity Theft

Identity theft is when someone steals your personal details to pretend to be you. This can include your name, address, credit card numbers, or social security number. Thieves use this information to do things like spend money, get new credit cards, or even take out loans—all in your name.

How Do Thieves Steal Your Information?

Thieves can get your personal details in many ways. They might find papers you threw away, like bills or bank statements. They could steal your wallet or purse. Sometimes, they trick you into giving them information online, through fake emails or websites that look real.

The Effects of Identity Theft

When someone else uses your identity, it can cause big problems. You might lose money or find bills for things you didn’t buy. Fixing these issues takes a lot of time and can be stressful. It’s important to protect your information to stop thieves from stealing it.

To keep safe, shred papers with personal details before throwing them away. Keep your wallet or purse secure. Be careful online—don’t share personal information on websites that don’t seem trustworthy. Always check your bank statements and credit reports to catch any strange activity early.

What to Do If It Happens to You

If you think someone has stolen your identity, tell your bank and credit card companies right away. You should also report it to the police. They can help you fix the problems and stop the thief from doing more damage.

500 Words Essay on Identity Theft

Identity theft is when someone takes your personal information without your permission and pretends to be you. This information could be your name, your credit card numbers, or your social security number. The thief uses this information to do things like spend money, get new credit cards, or even get a job. It’s like someone stealing a key to your house and then going inside to take what they want.

How Do Thieves Steal Identities?

Thieves can steal your identity in many ways. They might go through your trash to find bills or bank statements. They could trick you into giving them information over the phone or through email. They might also steal your wallet or purse to get your credit cards and ID. Sometimes, they even break into computers to steal a lot of people’s information at once.

Why is it a Big Problem?

Identity theft is a big problem because it can ruin your life. If someone uses your information to borrow money, you might have to pay it back. It can take a long time to fix your credit score if it gets damaged. This means it could be hard for you to get a loan, a new credit card, or even a job. Sometimes, people don’t know their identity has been stolen until they get a bill for something they didn’t buy.

Protecting Yourself from Identity Theft

You can do things to protect yourself from identity theft. Always keep your personal information safe. Don’t tell people your passwords or PINs. Shred papers with your personal information before you throw them away. Be careful when you’re on the internet, especially when you’re giving out your information. Check your bank and credit card statements often to make sure there are no charges you didn’t make.

What to Do If Your Identity is Stolen

If your identity is stolen, act quickly. Tell your bank and credit card companies right away. They can close your accounts or freeze your cards so no more money can be taken. You should also tell the police and make a report. There are special government agencies that can help you, like the Federal Trade Commission in the United States. They can guide you on how to get your identity back and make things right.

Identity theft is a serious problem that can affect anyone. It’s important to be careful with your personal information. If you ever become a victim, remember that you can get help and fix the problem. By being aware and taking steps to protect yourself, you can keep your identity safe.

That’s it! I hope the essay helped you.

If you’re looking for more, here are essays on other interesting topics:

  • Essay on Identity And Culture
  • Essay on Ideal Woman
  • Essay on Ideal Vacation

Apart from these, you can look at all the essays by clicking here .

Happy studying!

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

essay on identity theft

Jump to content

Avoiding Identity Theft

  • What To Know

What is identity theft?

Identity theft is a serious crime. Identity theft happens when someone uses information about you without your permission. They could use your:

  • name and address
  • credit card or bank account numbers
  • Social Security number
  • medical insurance account numbers

Why should I care if someone steals my identity?

You will be responsible for what the thief does while using your personal information. You might have to pay for what the thief buys. This is true even if you do not know about the bills. 

How can that happen?

  • A thief might get a credit card using your name.
  • He changes the address.
  • The bills go to him, but he never pays them.
  • That means the credit card company thinks you are not paying the bills.
  • That will hurt your credit.

This is the kind of trouble identity theft can cause for you.

For Example

What can a thief do with my personal information?

An identity thief can use your name and information to:

  • buy things with your credit cards
  • get new credit cards
  • open a phone, electricity, or gas account
  • steal your tax refund
  • get medical care
  • pretend to be you if they are arrested

How can a thief steal my identity?

A thief can get your personal information in person or online. Here are some ways thieves might steal someone’s identity. A thief might:

  • steal your mail or garbage to get your account numbers or your Social Security number
  • trick you into sending personal information in an email
  • steal your account numbers from a business or medical office
  • steal your wallet or purse to get your personal information

How do I know if someone steals my identity?

Sometimes, you can tell if someone steals your identity.

  • Read your bills.  Do you see charges for things you did not buy?
  • Watch your bank account statement.  Are there withdrawals you did not make? Are there changes you do not expect?
  • Check your mail.  Did you stop getting a bill?  Or did you start getting a new bill you do not know about?
  • Get your credit report.  Are there accounts or other information you do not recognize?

If you answer yes to any of these questions, someone might have stolen your identity. 

Do you think someone stole your identity? If you do, learn more about recovering from identity theft .

What is a credit report?

Your credit report is a summary of your credit history. It lists:

  • your name, address, and Social Security number
  • your credit cards
  • how much money you owe
  • if you pay your bills on time or late

All the information in the credit report should be about you. Get a copy of your credit report. Make sure you recognize the information in it. If you do not, you need to try to fix it.

Learn more about your credit history, including how to get your free credit report.

Why should I try to fix my credit report?

Your credit report might show that an identity thief is using your personal information. You know the information is not true. But no one else looking at the report knows, unless you tell them.

Businesses look at your credit report. A business uses your credit report to decide whether it wants to deal with you. The identity thief’s information on your credit report might mean you cannot:

  • get a cell phone
  • rent an apartment
  • get utilities
  • get a credit card
  • borrow money
  • get some kinds of jobs 

Can I protect myself from identity theft?

You can lower your risk. Every time you shop in a store, you:

  • watch your wallet
  • are careful with your credit card or debit card
  • do not tell people your PIN number

When you shop online, you can:

  • use passwords that people cannot guess
  • shop on secure websites. They have an address that starts with “https”
  • not put personal information on computers in public spaces, like the library
  • have security software on your own computer

Identity theft can make it hard for you to get credit, a job, a place to live, or utilities. But you can reduce your risk of being hurt by identity theft.

How can I protect my identity?

Protect your personal information. That helps you protect your identity.  Here are some things you can do:

  • keep your financial records, Social Security and Medicare cards in a safe place
  • shred papers that have your personal or medical information
  • take mail out of your mailbox as soon as you can
  • only give your Social Security number if you must. Ask if you can use another kind of identification
  • do not give your personal information to someone who calls you or emails you
  • use passwords that are not easy to guess. Use numbers and symbols when you can
  • do not respond to emails or other messages that ask for personal information
  • do not put personal information on a computer in a public place, like the library 

How will I know if someone steals my identity?

Read your bills and account statements. Watch for:

  • things you did not buy
  • withdrawals you did not make
  • a change of your address that you did not expect
  • bills that stop coming

Look at medical statements. You might see charges you do not recognize. That might mean someone stole your identity.

Get your credit report. You get one free credit report every year from each credit reporting company. 

  • Call Annual Credit Report at 1-877-322-8228. 
  • Answer questions from a recorded system. You have to give your address, Social Security number, and birth date.
  • Choose to only show the last four numbers of your Social Security number. It is safer than showing the full number on your report.
  • Choose which credit reporting company you want a report from. (You get one report free from each company every year.)

The company mails your report to you. It should arrive two to three weeks after you call.

Read your credit report carefully. Look for mistakes or accounts you do not recognize. This could mean someone stole your identity.

Home — Essay Samples — Law, Crime & Punishment — Identity Theft — Cybercrime and Society: Identity Theft

test_template

Cybercrime and Society: Identity Theft

  • Categories: Cyber Crimes Identity Theft Society

About this sample

close

Words: 760 |

Published: Oct 2, 2020

Words: 760 | Pages: 2 | 4 min read

Image of Dr. Oliver Johnson

Cite this Essay

Let us write you an essay from scratch

  • 450+ experts on 30 subjects ready to help
  • Custom essay delivered in as few as 3 hours

Get high-quality help

author

Dr. Heisenberg

Verified writer

  • Expert in: Law, Crime & Punishment Sociology

writer

+ 120 experts online

By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy . We’ll occasionally send you promo and account related email

No need to pay just yet!

Related Essays

6 pages / 2847 words

4 pages / 1788 words

4 pages / 1863 words

3 pages / 1254 words

Remember! This is just a sample.

You can get your custom paper by one of our expert writers.

121 writers online

Still can’t find what you need?

Browse our vast selection of original essay samples, each expertly formatted and styled

Related Essays on Identity Theft

Everyone is unique. We all have our own set of traits, DNA, and fingerprints. Each individual possesses their own unique characteristics, interests, and talents to make up a unique identity. Our identity combines all of these [...]

Recent corporate financial accounting scandals like WorldCom, Global Crossing, Tyco, Enron and many others have increased concerns about fraud globally, cost shareholders billions of dollars in value, and led to the corrosion of [...]

In today’s world, not a day goes by that someone is not affected by cybercrimes or cyberterrorism which go hand in hand. It is important for the government and businesses to constantly stay up to date with the latest technology [...]

The Lost Boy by Dave Pelzer is a remarkable and captivating sequel from Pelzer's bestselling novel called “A Child Called It.” In the book A Child Called It, The author tells the story of a young boy around four whose family [...]

In the short story, Brokeback Mountain, by Annie Proulx, page 11 describes Alma’s one encounter with Jack. After witnessing her husband kiss another man, she faces them both quietly and uncomfortably, but does not otherwise [...]

Mankiewicz’s All About Eve uses the theatre as a medium in which the female protagonists, Eve and Margo, are victimized at the hands of varying internal and external factors. The film clearly portrays Margo as a casualty of [...]

Related Topics

By clicking “Send”, you agree to our Terms of service and Privacy statement . We will occasionally send you account related emails.

Where do you want us to send this sample?

By clicking “Continue”, you agree to our terms of service and privacy policy.

Be careful. This essay is not unique

This essay was donated by a student and is likely to have been used and submitted before

Download this Sample

Free samples may contain mistakes and not unique parts

Sorry, we could not paraphrase this essay. Our professional writers can rewrite it and get you a unique paper.

Please check your inbox.

We can write you a custom essay that will follow your exact instructions and meet the deadlines. Let's fix your grades together!

Get Your Personalized Essay in 3 Hours or Less!

We use cookies to personalyze your web-site experience. By continuing we’ll assume you board with our cookie policy .

  • Instructions Followed To The Letter
  • Deadlines Met At Every Stage
  • Unique And Plagiarism Free

essay on identity theft

IMAGES

  1. What Is Identity Theft? Free Essay Example

    essay on identity theft

  2. Identity theft

    essay on identity theft

  3. Legal Studies 'Identity Theft Essay'

    essay on identity theft

  4. Identity Thief And Identity Theft Essay Example

    essay on identity theft

  5. Identity Theft Essays: Examples, Topics, Titles, & Outlines

    essay on identity theft

  6. Identity Theft.pptx

    essay on identity theft

VIDEO

  1. Identity theft is taken very seriously #shorts #funny #gaming

  2. Police Officer is not attacking me🤔 #Gta #Gaming

  3. A 'Short' Tribute To GTA 5

  4. Leaf Links Golf Course #vicecity #gta #ps4

  5. 🔒💼 Identity Theft Prevention: Why Waiting is Too Late & How to Protect Yourself Now!, pt. 6 🚨🛡️

  6. Cybersecurity

COMMENTS

  1. Identity theft

    An example of an identity theft is the case of Abraham Abdalla of Brooklyn, also known as the bus boy. He went online to access people's private financial details. The victims included among the wealthiest people in America. He even had Oprah Winfrey's and Steven Spielberg's credit cards and financial information.

  2. Identity Theft: Process, Ways And Effects

    Papers provided by EduBirdie writers usually outdo students' samples. "Identity theft" is when thieves steal your private data or information. In order to take over or open new accounts, file, rent or buy properties, or for other criminal things by taking your good name. "Identity theft" is the fastest-growing crime all over the world.

  3. Risk and protective factors of identity theft victimization in the

    1. Introduction. Identity theft - defined as the intentional, unauthorized use of a person's identifying information for unlawful purposes (Federal Trade Commission, 1998, Koops and Leenes, 2006) - is a growing public health problem.While identity theft is not a new crime, the magnitude of the problem has increased with society's growing reliance on the electronic transfer and storage ...

  4. 126 Identity Theft Essay Topic Ideas & Examples

    One way to raise awareness about identity theft is through writing essays on the topic. To help get you started, here are 126 identity theft essay topic ideas and examples that you can use as inspiration for your own writing: The growing problem of identity theft in the digital age; The different types of identity theft and how they can impact ...

  5. (PDF) Cybercrime -Identity Theft

    Cybercrime - Identity Theft. Identify theft is a major challenge for societies of the digital age. In this essay, reflection. is given to the nature of identity theft and its scope, from the ...

  6. Identity Theft

    The research found that identity theft generally involves three stages: acquisition of the identity information, the thief's use of the information for personal gain to the detriment of the victim of identity theft, and discovery of the identity theft. Evidence indicates that the longer it takes to discover the theft, the greater the loss ...

  7. Identity Theft

    The purpose of this essay is to provide an overview of identity theft, including what is currently known about the trends and patterns of identity theft, information on offenders and victims, as well as the methods of carrying out identity theft from the available data on offenders. In the next section, we present data from various agencies and ...

  8. Identity Theft: What It Is, How to Prevent It, Warning Signs and Tips

    1. Credit identity theft. Credit identity theft happens when a criminal uses your personal information, such as birthdate and Social Security number, to apply for a new credit line. Warning signs ...

  9. Identity Theft, Essay Example

    Identity Theft, Essay Example. Pages: 1. Words: 390. Essay. Hire a Writer for Custom Essay. Use 10% Off Discount: "custom10" in 1 Click 👇. HIRE A WRITER! You are free to use it as an inspiration or a source for your own work. With telecommunications advancing virtually exponentially, the increased reliance people place on online interactions ...

  10. 10 Ways to Prevent Identity Theft

    This is usually done for financial gain. There are many ways to commit identity theft, including hacking, financial and social media account takeovers, credit card fraud, phishing, ransomware ...

  11. Identity Theft Essays: Examples, Topics, & Outlines

    PAGES 2 WORDS 696. Identity theft is a kind of theft that involves someone stealing the identity of someone else by assuming that person's identity (Lai, Li, & Hsieh, 2012). This is usually a method of gaining access to the person's resources like credit cards and other things in the person's name.

  12. Essays on Identity Theft

    When writing an essay on identity theft, it is important to include information on the different types of identity theft, such as financial identity theft, criminal identity theft, and medical identity theft. It is also important to discuss the methods used by identity thieves to steal personal information, such as phishing, skimming, and ...

  13. Criminal Division

    Report identity theft to the FTC. Go to IdentityTheft.gov or call 1-877-438-4338. Include as many details as possible. Based on the information you enter, IdentityTheft.gov will create your Identity Theft Report and personal recovery plan. You may choose to file a report with your local police department.

  14. Overview Of The Identity Theft: [Essay Example], 1097 words

    Overview of The Identity Theft. There are myriad ways for the bad guys to get your information and use it for all sorts of nefarious purposes — mainly, stealing your money, althoughoccasionally for other kinds of fraud or to cover their tracks when committing additional crimes. That's one of the big reasons identity the ftcan be so devastating.

  15. Essay on Identity Theft

    250 Words Essay on Identity Theft What is Identity Theft? Identity theft is when someone steals your personal details to pretend to be you. This can include your name, address, credit card numbers, or social security number. Thieves use this information to do things like spend money, get new credit cards, or even take out loans—all in your ...

  16. Avoiding Identity Theft

    Here are some ways thieves might steal someone's identity. A thief might: steal your mail or garbage to get your account numbers or your Social Security number. trick you into sending personal information in an email. steal your account numbers from a business or medical office. steal your wallet or purse to get your personal information.

  17. Expository Essay on Identity Theft

    1288. Pages: 3. This essay sample was donated by a student to help the academic community. Papers provided by EduBirdie writers usually outdo students' samples. Cite this essay. Download. Identity theft comes in many forms: from credit card theft to social security numbers, people nowadays have the power to steal or take what they own or even ...

  18. Cybercrime and Society: Identity Theft

    Identity theft is usually targeted towards a specific individual. Criminals will usually target someone and try to gain any type of public information from online and social media accounts such as a person's phone number or address, and if possibly an confidential information, such as a person's Social Security number, credit card numbers which can help the perpetrator take your identity ...

  19. Identity Theft Informative Essay

    Cite this essay. Download. Identity theft is a prevalent issue in today's digital world. When a malicious actor gains someone's personal information, it can wreak havoc on the target's life. "Identity theft occurs when a hacker gains entry to a database and copies a person's social security number, address, and credit data" (Wempen).

  20. Identity Theft Essay

    Child Identity Theft. believes that their user's data is secure, hackers find their way to obtain user's private data and use it for the benefit of the criminal. Identity theft was the number one complaint category in the CSN for calendar year 2014 with 13% of the overall complaints. The purpose of this study is to explore the increasing ...

  21. Anoka County Offers Free Document Shredding to Thwart Identity Theft

    Anoka County Offers Free Document Shredding to Thwart Identity Theft on May 4 at Coon Rapids Recycling Center. By Zach White. Published on April 29, 2024. Source: Coon Rapids. Residents and small ...

  22. Charlotte, NC shooting: 4 law enforcement officers killed as US ...

    Three officers were killed in a shooting while attempting to serve a warrant at a home in Charlotte, North Carolina, including one deputy US Marshal and two local task force officers, authorities say.