Content deleted Content added
Privatechef (talk | contribs) Hyperlinked U.S. Government Accountability Office. Changed US to U.S. to align with U.K. to align to the Wikipedia Style. Hyperlinked Carnegie Mellon University. Hyperlinked Microsoft. Removed Zeus hyperlink as it was already linked on the page. Unlinked Carnegie Mellon later on the page as it was already mentioned further up the page. Fixed spelling of bureau. |
|||
(87 intermediate revisions by 48 users not shown) | |||
Line 1:
{{Short description|Deliberate use of someone else's identity
{{About|the concept of identity theft|the 2004 film|Identity Theft (film)|the 2013 film|Identity Thief|the 1953 film|Stolen Identity}}
{{Multiple issues|
{{Cleanup|reason=Odd wording/grammar in places.|date=September 2018}}
Line 6 ⟶ 7:
}}
[[File:Figure 2 Example of a Successful Identity Theft Refund Fraud Attempt (28356288536).jpg|thumb|upright=1.3|Example of an identity theft crime: 1. The fraudster files tax return paperwork in the victim's name, claiming a refund. 2. The IRS issues a refund to the fraudster. 3. The victim submits their legitimate tax return. 4. The IRS rejects the return as a duplicate.]]
'''Identity theft''', '''identity piracy''' or '''identity infringement''' occurs when someone uses another
Determining the link between [[data breach]]es and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained. According to a report done for the FTC, identity theft is not always detectable by the individual victims.<ref>Federal Trade Commission – 2006 Identity Theft Survey Report, p. 4</ref> [[Identity fraud]] is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A [[Government Accountability Office|U.S. Government Accountability Office]] study determined that "most breaches have not resulted in detected incidents of identity theft".<ref>{{cite web |url=http://www.gao.gov/new.items/d07737.pdf |title=Data Breaches Are Frequent, but Evidence of Resulting Identity Theft Is Limited; However, the Full Extent Is Unknown |work=Highlights of GAO-07-737, a report to congressional requesters |publisher=gao.gov |access-date=22 September 2010}}</ref> The report also warned that "the full extent is unknown". A later unpublished study by [[Carnegie Mellon University]] noted that "Most often, the causes of identity theft is not known", but reported that someone else concluded that "the probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%".<ref>{{cite web |url=http://www.heinz.cmu.edu/research/241full.pdf |title=Do Data Breach Disclosure Laws Reduce Identity Theft? |author=Sasha Romanosky |work=Heinz First Research Paper |publisher=heinz.cmu.edu |access-date=2009-05-27 |archive-date=2012-01-20 |archive-url=https://web.archive.org/web/20120120001255/http://www.heinz.cmu.edu/research/241full.pdf |url-status=dead }}</ref> For example, in one of the largest data breaches which affected over four million records, it resulted in only about 1,800 instances of identity theft, according to the company whose systems were breached.{{citation needed|date=May 2021}}
An October 2010 article entitled "Cyber Crime Made Easy" explained the level to which hackers are using [[malicious software]].<ref name="Giles2010">{{cite journal | last=Giles | first=Jim | title=Cyber crime made easy | journal=New Scientist | publisher=Elsevier BV | volume=205 | issue=2752 | year=2010 | issn=0262-4079 | doi=10.1016/s0262-4079(10)60647-1 | pages=20–21}}</ref> As Gunter Ollmann,
Chief Technology Officer of security at [[Microsoft]], said, "Interested in credit card theft? There's an app for that."<ref>{{Cite web|last=Giles|first=Jim|title='Credit card theft? There's an app for that'|url=https://www.newscientist.com/article/mg20527524-300-credit-card-theft-theres-an-app-for-that/|access-date=2021-03-19|website=New Scientist|language=en-US}}</ref> This statement summed up the ease with which these hackers are accessing all kinds of information online. The new program for infecting users' computers was called [[Zeus (malware)|Zeus]], and the program is so hacker-friendly that even an inexperienced hacker can operate it. Although the hacking program is easy to use, that fact does not diminish the devastating effects that Zeus (or other software like Zeus) can do on a computer and the user. For example, programs like Zeus can steal credit card information, important documents, and even documents necessary for [[homeland security]]. If a hacker were to gain this information, it would mean nationwide identity theft or even a possible terrorist attack. The [[Integrated Threat Assessment Centre|ITAC]]
== Types ==
{{Further|Levels of identity security}}
Sources such as the [[Non-profit]] [[Identity Theft Resource Center]]<ref>{{cite web |url=http://www.idtheftcenter.org/ |title=Identity Theft Resource Center website |publisher=idtheftcenter.org }}</ref> sub-divide identity theft into five categories:
* Criminal identity theft (posing as another person when apprehended for a crime)
Line 21 ⟶ 23:
* Child identity theft.
Identity theft may be used to facilitate or fund other crimes including [[
=== Identity cloning and concealment ===
Line 32 ⟶ 34:
=== Synthetic identity theft ===
A variation of identity theft that has recently become more common is ''synthetic identity theft'', in which identities are completely or partially fabricated.<ref>
=== Medical identity theft ===
Line 38 ⟶ 40:
[[File:Figure 2- Risk of Identity Theft with Medicare Card under CMS’s Three Proposed Options (7802334168).jpg|thumb|US [[Government Accountability Office]] diagram showing the identity theft risk associated with social security numbers on [[Medicare (United States)|Medicare cards]]]]
Privacy researcher Pam Dixon, the founder of the World Privacy Forum,<ref>{{Cite web|url=https://www.worldprivacyforum.org/|title=World
=== Child identity theft ===
Child identity theft occurs when a minor's identity is used by another person for the impostor's personal gain. The impostor can be a family member, a friend, or even a stranger who targets children. The Social Security numbers of children are valued because they do not have any information associated with them. Thieves can establish lines of credit, obtain driver's licenses, or even buy a house using a child's identity. This fraud can go undetected for years, as most children do not discover the problem until years later. Child identity theft is fairly common, and studies have shown that the problem is growing. The largest study on child identity theft, as reported by Richard Power of the Carnegie Mellon Cylab with data supplied by [[AllClear ID]], found that of 40,000 children, 10.2% were victims of identity theft.<ref>{{Cite web|url=https://www.foxbusiness.com/features/government-turns-spotlight-on-child-id-theft-problem|title=Government Turns Spotlight on Child ID Theft Problem|date=12 January 2016|website=CreditCards.com|language=en-US|access-date=22 April 2019}}</ref>
The [[Federal Trade Commission]] (FTC) estimates that about nine million people will be victims of identity theft in the United States per year. It was also estimated that in 2008; 630,000 people under the age of 19 were victims of theft. This then gave
Not only are children in general big targets of identity theft but children who are in foster care are even bigger targets. This is because they are most likely moved around quite frequently and their SSN is being shared with multiple people and agencies. Foster children are even more victims of identity theft within their own families and other relatives. Young people in foster care who are victims of this crime are usually left alone to struggle and figure out how to fix their newly formed bad credit.<ref name=":5" />
The emergence of children's identities on social media has also contributed to a rise in incidents of digital kidnapping and identity theft. [[Digital kidnapping]] involves individuals stealing online images of children and misrepresenting them as their own.<ref>{{Cite journal |last1=Berg |first1=Valeska |last2=Arabiat |first2=Diana |last3=Morelius |first3=Evalotte |last4=Kervin |first4=Lisa |last5=Zgambo |first5=Maggie |last6=Robinson |first6=Suzanne |last7=Jenkins |first7=Mark |last8=Whitehead |first8=Lisa |date=2024-02-21 |title=Young Children and the Creation of a Digital Identity on Social Networking Sites: Scoping Review |journal=JMIR Pediatrics and Parenting |language=EN |volume=7 |issue=1 |pages=e54414 |doi=10.2196/54414|doi-access=free |pmid=38381499 |pmc=10918551 }}</ref>
=== Financial identity theft ===
Line 51 ⟶ 55:
=== Tax identity theft ===
{{see also|Tax evasion}}
One of the major identity theft categories is '''tax-related identity theft'''. The most common method is to use a person's authentic name, address, and [[Social Security Number]] to file a tax return with false information, and have the resulting refund direct-deposited into a bank account controlled by the thief. The thief in this case can also try to get a job and then their employer will report the income of the real taxpayer, this then results in the taxpayer getting in trouble with the IRS.<ref name=":03">{{Cite web|url=https://www.citrincooperman.com/
The 14039 Form to the [[Internal Revenue Service|IRS]] is a form that will help one fight against a theft like tax theft. This form will put the IRS on alert and someone who believed they have been a victim of tax-related theft will be given an Identity Protection Personal Identification Number (IP PIN), which is a 6 digit code used in replacing an SSN for filing tax returns.<ref name=":03" />
Line 57 ⟶ 62:
== Techniques for obtaining and exploiting personal information ==
Identity thieves typically obtain and exploit [[personally identifiable information]] about individuals, or various credentials they use to authenticate themselves, to impersonate them. Examples include:
* Using [[public records]] about individual citizens, published in official registers such as electoral rolls<ref>{{cite news | last=Loviglio | first=Joann| url= http://www.nbcnews.com/id/46874551| title= If Microsoft co-founder's ID isn't safe, is yours? | work= NBC News |date= March 2012 }}{{dead link|date=August 2024|bot=medic}}{{cbignore|bot=medic}}</ref>▼
* Stealing [[Cheque|cheques (checks)]] to acquire banking information, including account numbers and [[bank code]]s<ref>{{cite web |url=http://www.douglascountysheriff.org/idtheft/idtheftmain.htm |title=Identity Theft |access-date=2009-08-02 |archive-date=2012-07-28 |archive-url=https://archive.
* Guessing Social Security numbers by using information found on Internet social networks such as [[
▲* Using [[public records]] about individual citizens, published in official registers such as electoral rolls<ref>{{cite news | last=Loviglio | first=Joann| url= http://www.nbcnews.com/id/46874551| title= If Microsoft co-founder's ID isn't safe, is yours? | work= NBC News |date= March 2012 }}</ref>
▲* Stealing [[Cheque|cheques (checks)]] to acquire banking information, including account numbers and [[bank code]]s<ref>{{cite web |url=http://www.douglascountysheriff.org/idtheft/idtheftmain.htm |title=Identity Theft |access-date=2009-08-02 |archive-date=2012-07-28 |archive-url=https://archive.is/20120728/http://www.douglascountysheriff.org/idtheft/idtheftmain.htm |url-status=dead }}, Douglas County Sheriff's Office, Washington</ref>
▲* Guessing Social Security numbers by using information found on Internet social networks such as [[Facebook]] and [[MySpace]]<ref>{{cite news |last=Olmos |first=David |url=https://www.bloomberg.com/apps/news?pid=newsarchive&sid=aKbjO.Ew4S2E |title=Social Security Numbers Can Be Guessed From Data, Study Finds |publisher=Bloomberg |date=6 July 2009 |access-date=4 January 2011 |url-status=dead |archive-url=https://web.archive.org/web/20130617002156/http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aKbjO.Ew4S2E |archive-date=17 June 2013 }}</ref>
{{How-to|section|date=April 2022}}▼
== Individual identity protection ==
Line 104 ⟶ 73:
Identity thieves sometimes impersonate dead people, using personal information obtained from death notices, gravestones, and other sources to exploit delays between the death and the closure of the person's accounts, the inattentiveness of grieving families, and weaknesses in the processes for credit-checking. Such crimes may continue for some time until the deceased's families or the authorities notice and react to anomalies.<ref>[http://www.idtheftcenter.org/Fact-Sheets/fs-117.html IDtheftcenter.org<!-- Bot generated title -->] {{webarchive|url=https://web.archive.org/web/20160417074200/http://www.idtheftcenter.org/Fact-Sheets/fs-117.html|date=17 April 2016}}, Identity Theft Resource Center Fact Sheet 117 Identity Theft and the Deceased - Prevention and Victim Tips.</ref>
In recent years{{When|date=September 2018}}, commercial identity theft protection/insurance services have become available in many countries. These services purport to help protect the individual from identity theft or help detect that identity theft has occurred in exchange for a monthly or annual membership fee or premium.<ref>{{cite web |url=http://www.nextadvisor.com/identity_theft_protection_services/compare.php |title=Identity Theft Protection Services |access-date=2008-12-16 |archive-date=2012-09-07 |archive-url=https://archive.
== Potential outcomes ==
Line 115 ⟶ 84:
== Identity protection by organizations ==
In their May 1998 testimony before the United States Senate, the [[Federal Trade Commission]] (FTC) discussed the sale of Social Security numbers and other personal identifiers by credit-raters and data miners. The FTC agreed to the industry's self-regulating principles restricting access to information on credit reports.<ref>{{cite web |url=http://www.ftc.gov/os/1998/05/identhef.htm |title=Testimony before the Subcommittee on Technology, Terrorism and Government Information |url-status=dead |archive-url=https://archive.today/20120801/http://www.ftc.gov/os/1998/05/identhef.htm |archive-date=1 August 2012 }}, Committee of the Judiciary, United States Senate 20 May 1998 pp 5,6</ref> According to the industry, the restrictions vary according to the category of customer. Credit reporting agencies gather and disclose personal and credit information to a wide business client base.
Poor stewardship of personal data by organizations, resulting in unauthorized access to sensitive data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse has documented over 900 individual data breaches by US companies and government agencies since January 2005, which together have involved over 200 million total records containing sensitive personal information, many containing social security numbers.<ref>
* failure to shred confidential information before throwing it into dumpsters
* failure to ensure adequate [[network security]]
Line 139 ⟶ 108:
=== Australia ===
In [[Australia]], each state has enacted laws that deal with different aspects of identity or fraud issues. Some states have now amended relevant criminal laws to reflect crimes of identity theft, such as the Criminal Law Consolidation Act 1935 (SA), Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009, and also in Queensland under the Criminal Code 1899 (QLD). Other states and territories are in states of development in respect of regulatory frameworks relating to identity theft such as Western Australia in respect of the Criminal Code Amendment (Identity Crime) Bill 2009.
At the Commonwealth level, under the ''Criminal Code Amendment (Theft, Fraud, Bribery & Related Offences) Act 2000'' which amended certain provisions within the ''Criminal Code Act 1995'',
Line 189 ⟶ 158:
In Canada, ''Privacy Act'' (federal legislation) covers only federal government, agencies and [[crown corporations]]. Each province and territory has its own privacy law and privacy commissioners to limit the storage and use of personal data.
For the private sector, the purpose of the Personal Information Protection and Electronic Documents Act (2000, c. 5) (known as PIPEDA) is to establish rules to govern the collection, use, and disclosure of personal information; except for the provinces of Quebec, Ontario, Alberta and British Columbia where provincial laws have been deemed substantially similar.
==== Proposed legislation ====
* [[Bill C-27 (39th Canadian Parliament, 2nd Session)]]
=== France ===
In France, a person convicted of identity theft can be sentenced up to five years in prison and fined up to [[euro|€]]75,000.<ref>{{
=== Hong Kong ===
Line 200 ⟶ 172:
the first-mentioned person commits the offense of fraud and is liable on conviction upon indictment to '''imprisonment for 14 years'''.}}
=== India ===
Line 211 ⟶ 183:
Social networking sites are one of the most famous spreaders of ''posers'' in the online community, giving the users the freedom to post any information they want without any verification that the account is being used by the real person.{{clarify|date=April 2021}}
The Philippines, which ranks eighth in the numbers of users of [[Facebook]] and other social networking sites (such as [[Twitter]], [[Multiply (website)|Multiply]] and [[Tumblr]]), has been known as a source of various identity theft problems.<ref>
This phenomenon leads to the creation of the [[Cybercrime Prevention Act of 2012]] (Republic Act No. 10175). Section 2 of this act states that it recognizes the importance of [[communication]] and [[multimedia]] for the development, exploitation, and dissemination of information{{clarify|date=April 2021}}, but violators will be punished by the law through imprisonment or a fine upwards of ₱200,000, but not exceeding ₱1,000,000, or (depending on the damage caused) both.
Line 222 ⟶ 194:
Legally, Sweden is an open society. [[Freedom of information legislation|The Principle of Public Access]] states that all information (e.g. addresses, incomes, taxes) kept by public authorities must be available for anyone, except in certain cases (for example, the addresses of people who need to hide are restricted). This makes fraud easier.
Until 2016, there were no laws that specifically prohibited using someone's identity. Instead, there were only laws regarding any indirect damages caused. Impersonating anyone else for financial gain is a [[type of fraud]] in the [[Criminal Code]] ({{
=== United Kingdom ===
In the United Kingdom, personal data is protected by the [[Data Protection Act 1998]]. The Act covers all personal data which an organization may hold, including names, birthday and anniversary dates, addresses, and telephone numbers.
Under [[English law]] (which extends to [[Wales]] but not to [[Northern Ireland]] or [[Scotland]]), the [[Deception (criminal law)|deception]] offences under the [[Theft Act 1968]] increasingly contend with identity theft situations. In ''R v Seward'' (2005) EWCA Crim 1941,<ref>{{
Statistics released by [[CIFAS]] (UK's Fraud Prevention Service) show that there were 89,000 victims of identity theft in the UK in 2010 and 85,000 victims in 2009.<ref>{{cite web |url=http://www.cifas.org.uk/identity_fraud |title=CIFAS: your identity }}, CIFAS</ref><ref>{{cite web |url=http://id-theft-uk.blogspot.com/2010/02/uk-fraud-prevention-agency-say-id-theft.html |title=UK Fraud Prevention Agency Say ID Theft Increase of 32% in 2009 |access-date=2010-02-03 |archive-date=2012-07-01 |archive-url=https://archive.today/20120701/http://id-theft-uk.blogspot.com/2010/02/uk-fraud-prevention-agency-say-id-theft.html |url-status=dead }}, Identity Theft UK Blog, 3 February 2010</ref>{{Unreliable source?|date=December 2015}} Men in their 30s and 40s are the most common victims.<ref>{{cite web |url=http://blog.protectmyid.co.uk/index.php/the-most-likely-victims-of-identity-fraud-men-in-their-late-30s-and-early-40s/ |title=The most likely victims of identity fraud: men in their late 30s and early 40s |url-status=dead |archive-url=https://archive.today/20120708/http://blog.protectmyid.co.uk/index.php/the-most-likely-victims-of-identity-fraud-men-in-their-late-30s-and-early-40s/ |archive-date=8 July 2012 }}, Protect MY ID Blog, 21 January 2011</ref>{{Unreliable source?|date=December 2015}} Identity fraud now accounts for nearly half of all frauds recorded.<ref>{{cite web |url=http://www.cifas.org.uk/press_release_twentyeleven_c |title=Fraudscape: report reveals the UK's fraud landscape in 2010 }}, CIFAS</ref>
=== United States ===
Line 239 ⟶ 211:
If charges are brought by state or local law enforcement agencies, different penalties apply to depend on the state.
Six Federal agencies conducted a joint task force to increase the ability to detect identity theft. Their joint recommendation on "red flag" guidelines is a set of requirements on financial institutions and other entities which furnish credit data to credit reporting services to develop written plans for detecting identity theft. The FTC has determined that most medical practices are considered creditors and are subject to requirements to develop a plan to prevent and respond to patient identity theft.<ref>Michael, Sara {{cite web |url=http://www.physicianspractice.com/index/fuseaction/newsletterArticles.view/articleID/87.htm |title=Getting Red Flag Ready |access-date=2009-07-02 |archive-date=2012-09-11 |archive-url=https://archive.today/20120911/http://www.physicianspractice.com/index/fuseaction/newsletterArticles.view/articleID/87.htm |url-status=dead }} PhysiciansPractice.com, 21 May 2009. Retrieved 2 July 2009.</ref> These plans must be adopted by each organization's board of directors and monitored by senior executives.<ref>[http://www.ftc.gov/os/fedreg/2007/december/071213factafurnisheraccuracy.pdf 72 Fed. Reg. 70944 ] {{webarchive |url=https://web.archive.org/web/20130217151554/http://www.ftc.gov/os/fedreg/2007/december/071213factafurnisheraccuracy.pdf |date=17 February 2013 }} (PDF). Retrieved 29 January 2008.</ref>
Identity theft complaints as a percentage of all fraud complaints decreased from 2004 to 2006.<ref name="autogenerated1">
According to the [[Bureau of Justice Statistics|U.S. Bureau of Justice Statistics]], in 2010, 7% of US households experienced identity theft - up from 5.5% in 2005 when the figures were first assembled, but broadly flat since 2007.<ref name="Bureau of Justice Statistics">{{cite web | url=http://bjs.gov/content/pub/pdf/itrh0510.pdf | title=Identity Theft Reported by Households, 2005-2010 | publisher=Bureau of Justice Statistics | year=2011 | access-date=24 June 2013}}</ref> In 2012, approximately 16.6 million persons, or 7% of all U.S. residents age 16 or older, reported being victims of one or more incidents of identity theft.<ref>Harrell, Erika and Lynn Langton. (2013). [http://www.bjs.gov/content/pub/pdf/vit12.pdf Victims of Identity Theft, 2012.] {{webarchive |url=https://web.archive.org/web/20160907043423/http://www.bjs.gov/content/pub/pdf/vit12.pdf |date=7 September 2016 }} Washington, D.C. [[United States Department of Justice|U.S. Department of Justice]], [[Bureau of Justice Statistics]].</ref>
At least two states, [[California]]<ref>{{cite web |url=http://www.privacyprotection.ca.gov/ |title=California Office of Identity Protection |access-date=2009-01-08 |archive-date=2012-08-05 |archive-url=https://archive.today/20120805/http://www.privacyprotection.ca.gov/ |url-status=dead }}</ref> and [[Wisconsin]]<ref>{{
In 2009, Indiana created an Identity Theft Unit within their Office of Attorney General to educate and assist consumers in avoiding and recovering from identity theft as well as assist law enforcement in investigating and prosecuting identity theft crimes.<ref>{{cite web|url=http://www.in.gov/legislative/ic/code/title4/ar6/ch13.pdf |title=
In Massachusetts in 2009–2010, Governor [[Deval Patrick]] committed to balancing consumer protection with the needs of small business owners. His Office of Consumer Affairs and Business Regulation announced certain adjustments to Massachusetts' identity theft regulations that maintain protections and also allow flexibility in compliance. These updated regulations went into effect on 1 March 2010. The regulations are clear that their approach to data security is a risk-based approach important to small businesses and might not handle a lot of personal information about customers.<ref>[http://www.mass.gov/?pageID=ocatopic&L=3&L0=Home&L1=Consumer&L2=Identity+Theft&sid=Eoca "Consumer Identity Theft"]. Commonwealth of Massachusetts, 2010 {{webarchive |url=https://web.archive.org/web/20111105045936/http://www.mass.gov/?pageID=ocatopic&L=3&L0=Home&L1=Consumer&L2=Identity+Theft&sid=Eoca |date=5 November 2011 }}</ref><ref>[http://www.mass.gov/Eoca/docs/idtheft/201CMR17faqs.pdf "Frequently Asked Question Regarding 201 CMR 17.00"] {{webarchive |url=https://web.archive.org/web/20110811054640/http://www.mass.gov/Eoca/docs/idtheft/201CMR17faqs.pdf |date=11 August 2011 }}, Commonwealth of Massachusetts, Office of Consumer Affairs and Business Regulation, 3 November 2009</ref>
Line 256 ⟶ 228:
==== Notification ====
Many states followed California's lead and enacted mandatory [[data breach notification laws]]. As a result, companies that report a data breach typically report it to all their customers.<ref>{{cite web |url=http://www.naag.org/states-offer-data-breach-protection.php |title=States Offer Data Breach Protection |url-status=dead |archive-url=https://archive.today/20120913/http://www.naag.org/states-offer-data-breach-protection.php |archive-date=13 September 2012 }}</ref>
== Spread and impact ==
Surveys in the US from 2003 to 2006 showed a decrease in the total number of identity fraud victims and a decrease in the total value of identity fraud from US$47.6 billion in 2003 to $15.6 billion in 2006.{{citation needed|date=May 2021}} The average fraud per person decreased from $4,789 in 2003 to $1,882 in 2006. A Microsoft report shows that this drop is due to statistical problems with the methodology, that such survey-based estimates are "hopelessly flawed" and exaggerate the true losses by orders of magnitude.<ref>{{cite web|url=http://research.microsoft.com/pubs/149886/SexLiesandCybercrimeSurveys.pdf |title=Sex, Lies and Cybercrime Surveys |publisher=Microsoft |date=15 June 2011 |access-date=11 March 2015}}</ref>
The 2003 survey from the Identity Theft Resource Center<ref>{{
* Only 15% of victims find out about the theft through proactive action taken by a business
* The average time spent by victims resolving the problem is about 330 hours
Line 322 ⟶ 295:
* {{annotated link|Albert Gonzalez}}
* {{annotated link|Yuri Kondratyuk}}
* {{annotated link|Charles Stopford}}
{{div col end}}
==Further reading==
* Brensinger, Jordan (2023). "[https://journals.sagepub.com/doi/full/10.1177/00031224231189895 Identity Theft, Trust Breaches, and the Production of Economic Insecurity]". ''American Sociological Review''.
==References==
Line 332 ⟶ 310:
* [https://www.identitytheft.gov/ Identity Theft Recovery Plan] FTC steps for identity theft victims.
* [http://www.idtheft.gov The President's Task Force on Identity Theft] – a government task force established by US President George W. Bush to fight identity theft.
* [http://www.mysecurecyberspace.org/encyclopedia/index/identity-theft.html#msc.encyclopedia.identitytheft Identity Theft] – [[Carnegie Mellon University]]
* [https://web.archive.org/web/20101105002332/http://www.ojp.usdoj.gov/nij/topics/crime/id-theft/welcome.htm Identity Theft: A Research Review, National Institute of Justice 2007]
|