One of the most common types of cybercrime is identity theft. Identity theft occurs when someone steals another individual’s personal information, with the intent to illegally use the date for their personal benefit (Dimov, 2014). Sadly, it is not hard for an individual to steal another person’s identity. All one needs is an individual’s name, date of birth, and Social Security Number (Dimov, 2014). These three pieces of personal detail are often deemed the “Holy Trinity.” Perpetrators often use this type of personal information to commit financial fraud, such as applying for credit cards in the victim’s name (Baltzan, 2013, p. 294).
According to Paige Baltzan, there are two methods criminals use to steal one’s personal identity (2013, p. 294). One of these methods is phishing. This occurs when the perpetrator steals the victim’s personal information by using fake emails, which commonly ask for personal details (Baltzan, 2013, p. 294). Unknowingly, victims often think these emails are legitimate, and reply with personal information. Once they have replied, the perpetrator has captured their personal information. The second way identity thieves capture information wanted is by pharming (Baltzan, 2013). This method reroutes victims from legitimate websites to false websites (Baltzan, 2013, p. 296). The same concept applies ...
... middle of paper ...
...er 16). Is it safe to shop online with a debit card?.
Retrieved from http://money.howstuffworks.com/personal-finance/online-
Dimov, Daniel. (2013, January 14). Identity theft: the means, methods, and recourse.
Retrieved from http://resources.infosecinstitute.com/identity-theft-means-
Ellyatt, Holly. (2013, August 13). The threat from cybercrime?. Retrieved from
Siciliano, Robert. (2011, March 16). 7 types of hacker motivations. Retrieved from
Withnall, Adam. (2013, December 2).Cyber monday 2013: police issue top 10 tips to
avoid online fraud. Retrieved from http://www.idependent.co.uk/news/us/home-
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- There are many types of identity theft, and various reasons for a criminal to commit this crime, however what is most impressive is the way they attain a victim’s information. The simplest way to put is that a criminal obtains and exploits a victim’s information from their credentials; however, the ways the criminals obtain this information is impressive. According to the Identity Theft Journal, a person’s identity can be taken many ways. Criminals can obtain a person’s information by going through their trash, or maybe from retrieving data from a person’s computer, phone, or hard drives that have not been properly disposed.... [tags: soscial security cards, SHRED, ATM]
1137 words (3.2 pages)
- Explain the existing challenges that result from the independent nature of these agencies, as well as the other factors that are common to each of them. In the United States, local, state, and federal law enforcement agencies, including FBI, Department of Homeland Security, among others, have taken on roles to fight computer crimes and terrorism. The roles and responses of these law enforcement agencies concerning digital crime have created challenges that limit enforcement efforts against digital crime.... [tags: Crime ]
841 words (2.4 pages)
- Organized crime was the first to emerge as a transnational crime. Encompassing the Mafia as an opponent the 1950’s, organized crime came to the forefront because of the high-profile of political ramifications concerning the wealth of those involved in organized crime started during the prohibition era (A History of Organized Crime, 2008) The menace to individual sanctuary on a personal level , transnational crime stops the cultural development of societies internationally. Growth of transnational crime has been multifaceted, invading activities such as drugs, illegal immigrants, money laundering and other criminal activities.... [tags: Crime]
1087 words (3.1 pages)
- -Within this writing assignment, I will discuss two of the theories that a researcher could use to explain the cause of digital crime. I will explain the manner in which these theories relate to crime in general. I will determine one additional theory that could explain the cause of digital-crime and non-digital crime and provide information that will support my response. First, we will discuss Choice Theory. -The two theories that I believe researchers could use to explain the cause of digital crime is the Choice Theory and the Psychological Theories.... [tags: Crime, Criminology, Sociology, Gang]
916 words (2.6 pages)
- Over the next 10 years the criminal Justice system could entirely change with the passing of a major law, epidemic, or failed service. Consequently, every since 9-11 our justice system has become much more open minded. Therefore, resulting in the strict enforcement of laws to protect its citizens. Nothing ever stays the same for too long. New developments related to science, technology, DNA analysis, and countless other tools and other factors are changing for the better in solving cases, prevention of crimes, and aiding in investigations.... [tags: Crime, Police, Criminal justice, Law]
1320 words (3.8 pages)
- There are both strengths and weakness of the two statistical approaches of crime. The FBI’s UCR complied data from monthly law enforcement reports or individual criminal records transferred to the FBI or to centralized agencies that then sent to the FBI. The crimes were divided into two categories, Part I offenses and Part II offenses. Part I reported data about property and violent crimes such as burglary, forcible rape, and robbery. Part II reported on crimes like simple assault, disorderly conduct, liquor offenses, and vandalism.... [tags: Crime, Criminal justice, Police, Criminology]
1055 words (3 pages)
- Crime has always existed all around the world. Crime has always been steady; until the late 1980s we see it declining. Through the NCVS and UCR we can keep track of crime because it provides sources of crime data. Crime is any behavior that can affect others and usually against the law. Crime alters the behavior of people by the way, they act towards others and by the type of crimes they hear that are being committed through the media. Media coverage affects the American people and their perspective on crime negatively: they exaggerate on crime, they create crime myths, and they create a fear of crime to the people.... [tags: Crime, Criminology]
1520 words (4.3 pages)
- White-collar crime, specifically computer crime, is becoming more popular as computers become more readily available. Crimes using computers and crimes against computers are usually committed without fear of being caught, due to the detachment of the offender from the victim. Computer crime is defined as, “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of another, manipulation or theft of stored or on-line data, or sabotage of equipment and data.”(1).... [tags: Internet Crime Essays]
2353 words (6.7 pages)
- Advances in technology has brought many benefits but also problems. The use of new technology creates moral and ethical problems and conflicting attitudes in society. The complexity of the issues and the pace with which technology changes mean that legislators have difficulty making laws that can keep in control of these changes. Technology affects all areas of society, forcing changes in a range of laws. Advances in computer technology have resulted in a new brand of cyber crimes such as computer fraud, computer hacking, email spam, pornography (especially when it relates to children) and stalking online.... [tags: Comparative Analysis Technology]
1159 words (3.3 pages)
- The introduction of computers in to the modern household has brought with it new moral issues. In the last 10 years computers have become increasingly cheaper to buy, due to huge technological advances and fierce competition, driving prices down. It the wake of the computer revolution the internet has followed quickly, becoming faster, cheaper and more accessible. With these technological advances the world has become increasingly smaller enabling piracy and file sharing to become common practice.... [tags: Technology]
1993 words (5.7 pages)