Editing Identity theft
Content that violates any copyrights will be deleted. Encyclopedic content must be verifiable through citations to reliable sources.
Latest revision | Your text | ||
Line 27: | Line 27: | ||
=== Identity cloning and concealment === |
=== Identity cloning and concealment === |
||
In this situation, the identity thief impersonates someone else to conceal their own true identity. Examples are [[illegal immigrant]]s hiding their illegal status, people hiding from [[creditor]]s or other individuals and those who simply want to become "[[Anonymity|anonymous]]" for personal reasons. Another example is ''posers'', a label given to people who use someone else's photos and information on social networking sites. Posers mostly create believable stories involving friends of the real person they are imitating. Unlike identity theft used to obtain credit which usually comes to light when the debts mount, concealment may continue indefinitely without being detected, particularly if the identity thief can obtain false credentials to pass various authentication tests in everyday life. |
In this situation, the identity thief impersonates someone else to conceal their own true identity. Examples are [[illegal immigrant]]s hiding their illegal status, people hiding from [[creditor]]s or other individuals and those who simply want to become "[[Anonymity|anonymous]]" for personal reasons. Another example is ''posers'', a label given to people who use someone else's photos and information on social networking sites. Posers mostly create believable stories involving friends of the real person they are imitating. Unlike identity theft used to obtain credit which usually comes to light when the debts mount, concealment may continue indefinitely without being detected, particularly if the identity thief can obtain false credentials to pass various authentication tests in everyday life. |
||
=== Identity cloning and concealment === |
|||
In this situation the identity thief impersonates someone else in order to conceal their own true identity. Examples are [[illegal immigrant]]s hiding their illegal status, people hiding from [[creditor]]s or other individuals, and those who simply want to become "[[Anonymity|anonymous]]" for personal reasons. Another example is ''posers'', a label given to people who use someone else's photos and information on social networking sites. Posers mostly create believable stories involving friends of the real person they are imitating. Unlike identity theft used to obtain credit which usually comes to light when the debts mount, concealment may continue indefinitely without being detected, particularly if the identity thief is able to obtain false credentials in order to pass various authentication tests in everyday life. |
|||
=== Criminal identity theft === |
=== Criminal identity theft === |