Online Identity Theft. A definition.
Identity theft can also go beyond this type of a monetary impact. Thieves can use your information to obtain a driver's license or other documentation that would display their photo but your name and information. With these documents thieves could to obtain a job and file fraudulent income tax returns, apply for travel documents, file insurance claims, or even provide your name and mailing address to police and other authorities if involved in other criminal activities (Beal, 2006). Let's analyze online identity theft considering its categories, techniques, consequences and the way we can protect from it.
According to the non-profit Identity Theft Resource Center and other sources, identity theft can be sub-divided into five categories (Wikipedia):
- business/commercial identity theft (using another's business name to obtain credit);
- criminal identity theft (posing as another when apprehended for a crime);
- financial identity theft (using another's identity to obtain goods and services);
- identity cloning (using another's information to assume his or her identity in daily life);
- medical identity theft (using another's information to obtain medical care or drugs).
Identity theft may be used to facilitate crimes including illegal immigration, terrorism, and espionage. Identity theft may also be a means of blackmail. There are also cases of identity cloning to attack payment systems, including online credit card processing and medical insurance.
Some individuals may impersonate others for non-financial reasons - for instance, to receive praise or attention for the victim's achievements. This is sometimes referred to as identity theft in the media. (Wikipedia)
- stealing mail or rummaging through rubbish containing personal information (dumpster diving);
- retrieving information from redundant equipment, like computer servers that have been disposed of carelessly, e.g. at public dump sites, given away without proper sanitizing etc.;
- researching about the victim in government registers, internet search engines, or public records search services;
- stealing payment or identification cards, either by pickpocketing or surreptitiously by skimming through a compromised card reader;
- remotely reading information from an RFID chip on a smart card, RFID-enabled credit card, or passport;
- eavesdropping on public transactions to obtain personal data (shoulder surfing);
- stealing personal information from computers and computer databases (Trojan horses, hacking and Zero day attacks);
- data breach that results in the public (i.e. posted on the internet) or easily-obtainable (i.e. printed on a mailing label) display of sensitive information such as a Social Security number or credit card number;
- advertising bogus job offers (either full-time or work from home based) to which the victims will reply with their full name, address, curriculum vitae, telephone numbers, and banking details;
- infiltration of organizations that store large amounts of personal information;
- impersonating a trusted company/institution/organization in an electronic communication to promote revealing of personal information (phishing);
- obtaining castings of fingers for falsifying fingerprint identification;
- browsing social network (MySpace, Facebook, Bebo etc) sites, online for personal details that have been posted by users;
- changing your address thereby diverting billing statements to another location to either get current legitimate account info or to delay discovery of fraudulent accounts;
- using false pretenses to trick a business (usually through a customer service representative) into disclosing customer information (pretexting). (Wikipedia)
• a bad credit rating and/or loans refused;
• final demands for products and services not purchased;
• wrongful accusation of criminal activities;
• difficulty getting a mortgage;
• unwarranted receipt of summons, court actions and county court
judgements;
• difficulty opening a utility account. (Nik, 2006a)
To protect our identity online we should follow this ten-point guide.
2. question why a Web site is asking for information about you;
3. never give any online security details to anyone unless it is completely necessary;
4. Look after your password (change your passwords regularly, avoid standard passwords and do not use the same password for every secure site you are registered with);
5. never click on links in emails;
6. keep up-to-date (keep your security software, such as anti-virus, up-to-date at all times);
8. keep your connection secure;
9. if it seems too good to be true, it probably is (don’t open emails or go to sites that claim you have won a prize. If an email looks suspicious and is unsolicited delete it and don’t open it);
10. know where to go for help should you be a victim of online identity theft (there are wide range of organisations and groups that people can turn to for advice). (Nik, 2006b)
Acoca, B. (2008). Online identity theft. OECD Observer, 268. Retrieved May 6, 2009 from
http://www.oecdobserver.org/news/fullstory.php/aid/2662 /Online_identity_theft.html
http://www.webopedia.com/DidYouKnow/Internet/2006/identity_theft.asp
Nik. (2006a, February 14). What is ONLINE identity theft? Message posted to http://www.easypeasy.com/guides/article.php?article=168 retrieved May 6, 2009
Nik. (2006b, February 14). What can users do to protect their online identity? Message posted to http://www.easypeasy.com/guides/article.php?article=170 retrieved May 6, 2009
Wikipedia. (n.d.). Retrieved May 6, 2009, from the Wikipedia Wiki: http://en.wikipedia.org/wiki/Identity_theft
No comments:
Post a Comment