Content deleted Content added
m Dating maintenance tags: {{Globalize}} |
|||
(202 intermediate revisions by more than 100 users not shown) | |||
Line 1:
{{
{{About|the concept of identity theft|the 2004 film|Identity Theft (film)|the 2013 film|Identity Thief|the 1953 film|Stolen Identity
{{Multiple issues|
{{Cleanup|reason=Odd wording/grammar in places.|date=September 2018}}
{{globalize|article|US|date=August 2020}}
}}
[[File:Figure 2 Example of a Successful Identity Theft Refund Fraud Attempt (28356288536).jpg|thumb|upright=1.3|Example of an identity theft crime: 1. The fraudster files tax return paperwork in the victim's name, claiming a refund. 2. The IRS issues a refund to the fraudster. 3. The victim submits their legitimate tax return. 4. The IRS rejects the return as a duplicate.]]
'''Identity theft''',
Determining the link between [[data breach]]es and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained
An October 2010 article entitled "Cyber Crime Made Easy" explained the level to which hackers are using [[malicious software]].<ref name="Giles2010">{{cite journal | last=Giles | first=Jim | title=Cyber crime made easy | journal=New Scientist | publisher=Elsevier BV | volume=205 | issue=2752 | year=2010 | issn=0262-4079 | doi=10.1016/s0262-4079(10)60647-1 | pages=20–21}}</ref> As Gunter Ollmann,
Chief Technology Officer of security at [[Microsoft]], said, "Interested in credit card theft? There's an app for that."<ref>{{Cite web|last=Giles|first=Jim|title='Credit card theft? There's an app for that'|url=https://www.newscientist.com/article/mg20527524-300-credit-card-theft-theres-an-app-for-that/|access-date=2021-03-19|website=New Scientist|language=en-US}}</ref> This statement summed up the ease with which these hackers are accessing all kinds of information online.
== Types ==
{{Further|Levels of identity security}}
Sources such as the [[Non-profit]] [[Identity Theft Resource Center]]<ref>{{cite web |url=http://www.idtheftcenter.org/ |title=Identity Theft Resource Center website
* Criminal identity theft (posing as another person when apprehended for a crime)
* Financial identity theft (using another's identity to obtain credit, goods, and services)
* Identity cloning (using another's information to assume his or her identity in daily life)
* Medical identity theft (using another's identity to obtain medical care or drugs)
* Child identity theft.
Identity theft may be used to facilitate or fund other crimes including [[
=== Identity cloning and concealment ===
In this situation, the identity thief impersonates someone else
=== Criminal identity theft ===
When a criminal fraudulently identifies themselves to police as another individual at the point of arrest, it is sometimes referred to as "Criminal Identity Theft." In some cases, criminals have previously obtained state-issued identity documents using credentials stolen from others, or have simply presented a [[fake ID]]. Provided the subterfuge works, charges may be placed under the victim's name, letting the criminal off the hook. Victims might only learn of such incidents by chance, for example by receiving a court summons, discovering their
It can be difficult for the victim of
=== Synthetic identity theft ===
A variation of identity theft
=== Medical identity theft ===
{{
[[File:Figure 2- Risk of Identity Theft with Medicare Card under CMS’s Three Proposed Options (7802334168).jpg|thumb|US [[Government Accountability Office]] diagram showing the identity theft risk associated with social security numbers on [[Medicare (United States)|Medicare cards]]]]
Privacy researcher Pam Dixon, the founder of the World Privacy Forum,<ref>{{Cite web|url=https://www.worldprivacyforum.org/|title=World Privacy Forum|website=www.worldprivacyforum.org|accessdate=25 December 2023}}</ref> coined the term medical identity theft and released the first major report about this issue in 2006. In the report, she defined the crime for the first time and made the plight of victims public. The report's definition of the crime is that medical identity theft occurs when someone seeks medical care under the identity of another person. Insurance theft is also very common, if a thief has your insurance information and or your insurance card, they can seek medical attention posing as yourself.<ref>{{Cite web|url=http://www.igrad.com/articles/8-types-of-identity-theft|title=Get to Know These Common Types of ID Theft|website=iGrad|access-date=29 September 2016}}</ref> In addition to risks of financial harm common to all forms of identity theft, the thief's medical history may be added to the victim's [[medical record]]s. Inaccurate information in the victim's records is difficult to correct and may affect future insurability or cause doctors
=== Child identity theft ===
Child identity theft occurs when a minor's identity is used by another person for the impostor's personal gain. The impostor can be a family member, a friend, or even a stranger who targets children. The Social Security numbers of children are valued because they do not have any information associated with them. Thieves can establish lines of credit, obtain driver's licenses, or even buy a house using a child's identity. This fraud can go undetected for years, as most children do not discover the problem until years later. Child identity theft is fairly common, and studies have shown that the problem is growing. The largest study on child identity theft, as reported by Richard Power of the
The [[Federal Trade Commission]] (FTC) estimates that about nine million people will be victims of identity theft in the United States per year. It was also estimated that in 2008; 630,000 people under the age of 19 were victims of theft. This then gave
Not only are children in general big targets of identity theft but children who are in foster care are even bigger targets. This is because they are most likely moved around quite frequently and their SSN is being shared with multiple people and agencies. Foster children are even more victims of identity theft within their own
The emergence of children's identities on social media has also contributed to a rise in incidents of digital kidnapping and identity theft. [[Digital kidnapping]] involves individuals stealing online images of children and misrepresenting them as their own.<ref>{{Cite journal |last1=Berg |first1=Valeska |last2=Arabiat |first2=Diana |last3=Morelius |first3=Evalotte |last4=Kervin |first4=Lisa |last5=Zgambo |first5=Maggie |last6=Robinson |first6=Suzanne |last7=Jenkins |first7=Mark |last8=Whitehead |first8=Lisa |date=2024-02-21 |title=Young Children and the Creation of a Digital Identity on Social Networking Sites: Scoping Review |journal=JMIR Pediatrics and Parenting |language=EN |volume=7 |issue=1 |pages=e54414 |doi=10.2196/54414|doi-access=free |pmid=38381499 |pmc=10918551 }}</ref>
=== Financial identity theft ===
The most common type
=== Tax identity theft ===
{{see also|Tax evasion}}
One of the major identity theft categories is '''tax-related identity theft'''. The most common method is to use a person's authentic name, address, and [[Social Security Number]] to file a tax return with false information, and have the resulting refund direct-deposited into a bank account controlled by the thief. The thief in this case can also try to get a job and then their employer will report the income of the real taxpayer, this then results in the taxpayer getting in trouble with the IRS.<ref name=":03">{{Cite web|url=https://www.citrincooperman.com/
The 14039 Form to the [[Internal Revenue Service|IRS]] is a form that will help one fight against a theft like tax theft. This form will put the IRS on alert and someone who believed they have been a victim of tax
== Techniques for obtaining and exploiting personal information ==
Identity thieves typically obtain and exploit [[personally identifiable information]] about individuals, or various credentials they use to authenticate themselves,
* Using [[public records]] about individual citizens, published in official registers such as electoral rolls<ref>{{cite news | last=Loviglio | first=Joann| url= http://www.nbcnews.com/id/46874551| title= If Microsoft co-founder's ID isn't safe, is yours? | work= NBC News |date= March 2012 }}{{dead link|date=August 2024|bot=medic}}{{cbignore|bot=medic}}</ref>▼
* Stealing [[Cheque|cheques (checks)]] to acquire banking information, including account numbers and [[bank code]]s<ref>{{cite web |url=http://www.douglascountysheriff.org/idtheft/idtheftmain.htm |title=Identity Theft |access-date=2009-08-02 |archive-date=2012-07-28 |archive-url=https://archive.today/20120728/http://www.douglascountysheriff.org/idtheft/idtheftmain.htm |url-status=dead }}, Douglas County Sheriff's Office, Washington</ref>▼
* Guessing Social Security numbers by using information found on Internet social networks such as [[
▲* Using [[public records]] about individual citizens, published in official registers such as electoral rolls<ref>{{cite news | last=Loviglio | first=Joann| url= http://www.nbcnews.com/id/46874551| title= If Microsoft co-founder's ID isn't safe, is yours? | work= NBC News |date= March 2012 }}</ref>
▲* Stealing [[Cheque|cheques (checks)]] to acquire banking information, including account numbers and [[bank code]]s<ref>{{cite web |url=http://www.douglascountysheriff.org/idtheft/idtheftmain.htm |title=Identity Theft }}, Douglas County Sheriff's Office, Washington</ref>
▲* Guessing Social Security numbers by using information found on Internet social networks such as [[Facebook]] and [[MySpace]]<ref>{{cite news |last=Olmos |first=David |url=https://www.bloomberg.com/apps/news?pid=newsarchive&sid=aKbjO.Ew4S2E |title=Social Security Numbers Can Be Guessed From Data, Study Finds |publisher=Bloomberg |date=6 July 2009 |access-date=4 January 2011 |url-status=dead |archive-url=https://web.archive.org/web/20130617002156/http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aKbjO.Ew4S2E |archive-date=17 June 2013 |df= }}</ref>
== Individual identity protection ==
The acquisition of personal identifiers is made possible through serious breaches of [[privacy]]. For consumers, this is usually a result of them naively providing their personal information or login credentials to the identity thieves (e.g., in a [[phishing attack]]) but identity-related documents such as credit cards, bank statements, utility bills, checkbooks, etc. may also be physically stolen from vehicles, homes, offices, and not the least [[letterboxes]], or directly from victims by pickpockets and bag snatchers. Guardianship of personal identifiers by consumers is the most common intervention strategy recommended by the [[US Federal Trade Commission]], [[PhoneBusters|Canadian Phone Busters]] and most sites that address identity theft. Such organizations offer recommendations on how individuals can prevent their information from falling into the wrong hands.
Identity theft can be partially mitigated by ''not'' identifying oneself unnecessarily (a form of information security control known as risk avoidance). This implies that organizations, IT systems, and procedures should not demand excessive amounts of personal information or credentials for identification and authentication. Requiring, storing, and processing personal identifiers (such as [[Social Security number]], [[national identification number]], driver's license number, credit card number, etc.) increases the risks of identity theft unless this valuable personal information is adequately secured at all times. Committing personal identifiers to memory is a sound practice that can reduce the risks of a would-be identity thief from obtaining these records. To help in remembering numbers such as social security numbers and credit card numbers, it is helpful to consider using mnemonic techniques or memory aids such as the [[Mnemonic major system|mnemonic Major System]].
Identity thieves sometimes impersonate dead people, using personal information obtained from death notices, gravestones, and other sources to exploit delays between the death and the closure of the person's accounts, the inattentiveness of grieving families, and weaknesses in the processes for credit-checking. Such crimes may continue for some time until the deceased's families or the authorities notice and react to anomalies.<ref>[http://www.idtheftcenter.org/Fact-Sheets/fs-117.html IDtheftcenter.org<!-- Bot generated title -->] {{webarchive|url=https://web.archive.org/web/20160417074200/http://www.idtheftcenter.org/Fact-Sheets/fs-117.html|date=17 April 2016}}, Identity Theft Resource Center Fact Sheet 117 Identity Theft and the Deceased - Prevention and Victim Tips.</ref>
In recent years{{When|date=September 2018}}, commercial identity theft protection/insurance services have become available in many countries. These services purport to help protect the individual from identity theft or help detect that identity theft has occurred in exchange for a monthly or annual membership fee or premium.<ref>{{cite web |url=http://www.nextadvisor.com/identity_theft_protection_services/compare.php |title=Identity Theft Protection Services |access-date=2008-12-16 |archive-date=2012-09-07 |archive-url=https://archive.today/20120907/http://www.nextadvisor.com/identity_theft_protection_services/compare.php |url-status=dead }} retrieved on 16 December 2008</ref> The services typically work either by setting fraud alerts on the individual's credit files with the three major credit bureaus or by setting up [[credit report monitoring]] with the credit
== Potential outcomes ==
Identity theft is a serious problem in the United States. In a 2018 study, it was reported that 60 million Americans' identities had been wrongfully acquired.<ref name=":02">{{Cite book|url=https://purl.fdlp.gov/GPO/gpo90910|title=Protecting Children from Identity Theft Act: report (to accompany H.R. 5192) (including cost estimate of the Congressional Budget Office).|
Victims of identity theft may face years of effort proving to the legal system that they are the true person,<ref name=":22" /> leading to emotional strain and financial losses. Most identity theft is perpetrated by a family member of the victim, and some may not be able to obtain new credit cards or open new bank accounts or loans.<ref name=":22">{{Cite news|url=https://www.cutimes.com/2017/10/02/id-theft-aftermath-shows-a-wake-of-financial-and-e/?slreturn=20180918084135|title=ID Theft Aftermath Shows a Wake of Financial and Emotional Victims {{!}} Credit Union Times|work=Credit Union Times|access-date=18 October 2018}}</ref>
== Identity protection by organizations ==
In their May 1998 testimony before the United States Senate, the [[Federal Trade Commission]] (FTC) discussed the sale of Social Security numbers and other personal identifiers by credit-raters and data miners. The FTC agreed to the industry's self-regulating principles restricting access to information on credit reports.<ref>{{cite web |url=http://www.ftc.gov/os/1998/05/identhef.htm |title=Testimony before the Subcommittee on Technology, Terrorism and Government Information |url-status=dead |archive-url=https://archive.today/20120801/http://www.ftc.gov/os/1998/05/identhef.htm |archive-date=1 August 2012
Poor stewardship of personal data by organizations, resulting in unauthorized access to sensitive data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse
* failure to shred confidential information before throwing it into dumpsters
* failure to ensure adequate [[network security]]
Line 124 ⟶ 96:
The failure of corporate or government organizations to protect [[consumer privacy]], [[client confidentiality]] and [[political privacy]] has been criticized for facilitating the acquisition of personal identifiers by criminals.<ref>[http://www.siia.net/software/pubs/iit-00.pdf Internet Identity Theft - A Tragedy for Victims] {{webarchive |url=https://web.archive.org/web/20110422192157/http://www.siia.net/software/pubs/iit-00.pdf |date=22 April 2011 }}, [[Software and Information Industry Association]]. Retrieved 30 June 2006.</ref>
Using various types of [[biometric]] information, such as [[fingerprint]]s, for identification and authentication has been cited as a way to thwart identity thieves, however, there are technological limitations and privacy concerns associated with these methods as well.
==Market==
There is an active market for buying and selling stolen personal information, which occurs mostly in [[darknet market]]s but also in other [[black market]]s.<ref>{{cite book |last1=Holt |first1=Thomas J. |last2=Smirnova |first2=Olga |last3=Chua |first3=Yi-Ting |title=Data thieves in action
== Legal responses ==
Line 133 ⟶ 105:
=== International ===
In March 2014, after it was learned two passengers with stolen passports were on board [[Malaysia Airlines Flight 370]], which went missing on 8 March 2014
=== Australia ===
In [[Australia]], each state has enacted laws that deal with different aspects of identity or fraud issues. Some states have now amended relevant criminal laws to reflect crimes of identity theft, such as the Criminal Law Consolidation Act 1935 (SA), Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009, and also in Queensland under the Criminal Code 1899 (QLD). Other states and territories are in states of development in respect of regulatory frameworks relating to identity theft such as Western Australia in respect of the Criminal Code Amendment (Identity Crime) Bill 2009.
At the Commonwealth level, under the ''Criminal Code Amendment (Theft, Fraud, Bribery & Related Offences) Act 2000'' which amended certain provisions within the ''Criminal Code Act 1995'',
Between 2014 and 2015, in Australia there were 133,921 fraud and deception offences, an increase of 6% from previous year. The total cost reported by the Attorney General Department was:<ref name=":4">{{Cite web|url=https://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/Identity-crime-and-misuse-in-Australia-2016.pdf|title=Identity crime and misuse in Australia|last=|first=|date=|website=|access-date=8 February 2018}}</ref>▼
a) the person does anything with the intention of dishonestly ''causing a loss to another person''; and▼
b) the other person is a Commonwealth entity.▼
Penalty: ''Imprisonment for 5 years''.}}▼
▲Between 2014 and 2015
{| class="wikitable"
|+Total costs<ref name=":4" />
Line 162 ⟶ 140:
|}
There are also high indirect costs associated as a direct result of an incident. For example, the total indirect costs for police recorded fraud is $5,774,081.<ref name=":4" />
▲{{quote|'''135.1 General dishonesty'''
▲(3) A person is guilty of an offence if
▲a) the person does anything with the intention of dishonestly ''causing a loss to another person''; and
▲b) the other person is a Commonwealth entity.
▲Penalty: ''Imprisonment for 5 years''.}}
Likewise, each state has enacted
=== Canada ===
Under section 402.2 of the ''[[Criminal Code (Canada)|Criminal Code]],''
{{
is guilty of an indictable
Under section 403 of the ''[[Criminal Code (Canada)|Criminal Code]],''
{{
(a) with intent to gain advantage for themselves or another person;
(b) with intent to obtain any property or an interest in any property;
(c) with intent to cause disadvantage to the person being personated or another person; or
(d) with intent to avoid arrest or prosecution or to obstruct, pervert or defeat the course of justice.
is guilty of an indictable
In Canada, ''Privacy Act'' (federal legislation) covers only federal government, agencies and [[crown corporations]]. Each province and territory has its own privacy law and privacy commissioners to limit the storage and use of personal data.
For the private sector, the purpose of the Personal Information Protection and Electronic Documents Act (
==== Proposed legislation ====
* [[Bill C-27 (39th Canadian Parliament, 2nd Session)]]
=== France ===
In France, a person convicted of identity theft can be sentenced up to five years in prison and fined up to [[euro|€]]75,000.<ref>{{
=== Hong Kong ===
Under HK Laws. Chap 210 ''Theft Ordinance'', sec. 16A Fraud:
{{
(a) in '''benefit to any person''' other than the second-mentioned person; or
(b) in prejudice or a substantial risk of prejudice to any person other than the first-mentioned person,
the first-mentioned person commits the offense of fraud and is liable on conviction upon indictment to '''imprisonment for 14 years'''.}}
=== India ===
Under the Information Technology Act 2000 Chapter IX Sec 66C:
{{
PUNISHMENT FOR IDENTITY THEFT
Whoever, fraudulently or dishonestly makes use of the electronic signature, password, or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one [[lakh]].<ref>{{cite web |url=http://nicca.nic.in/pdf/itact2000.pdf |title=The Information Technology Act 2000 |access-date
=== Philippines ===
Social networking sites are one of the most famous spreaders of ''posers'' in the online community, giving the users the freedom to
The Philippines, which ranks eighth in the numbers of users of [[Facebook]] and other social networking sites (such as [[Twitter]], [[Multiply (website)|Multiply]] and [[Tumblr]]), has been known as a source of various identity theft problems.<ref>
This phenomenon
=== Sweden ===
Sweden has had relatively few problems with identity theft
Other types of identity theft have become more common in Sweden. One common example is ordering a credit card to someone who has an unlocked letterbox and is not home
Legally, Sweden is an open society. [[Freedom of information legislation|The Principle of Public Access]]
=== United Kingdom ===
In the United Kingdom, personal data is protected by the [[Data Protection Act 1998]]. The Act covers all personal data which an organization may hold, including names, birthday and anniversary dates, addresses, and telephone numbers
Under [[English law]] (which extends to [[Wales]] but not to [[Northern Ireland]] or [[Scotland]]), the [[Deception (criminal law)|deception]] offences under the [[Theft Act 1968]] increasingly contend with identity theft situations. In ''R v Seward'' (2005) EWCA Crim 1941,<ref>{{
Statistics released by [[CIFAS]]
=== United States ===
{{
The increase in crimes of identity theft led to the drafting of the Identity Theft and Assumption Deterrence Act.<ref>{{cite web |url=http://www.ftc.gov/os/statutes/itada/itadact.htm |title=FTC.gov |url-status=dead |archive-url=https://archive.today/20120801/http://www.ftc.gov/os/statutes/itada/itadact.htm |archive-date=1 August 2012
The Act also provides the [[Federal Trade Commission]] with authority to track the number of incidents and the dollar value of losses. Their figures relate mainly to consumer financial crimes and not the broader range of all identification-based crimes.<ref>[http://www.consumer.gov/idtheft/ Federal Trade Commission]. Retrieved 30 June 2006. {{webarchive |url=https://web.archive.org/web/20060131210801/http://www.consumer.gov/idtheft/ |date=31 January 2006 }}</ref>
If charges are brought by state or local law enforcement agencies, different penalties apply
Six Federal agencies conducted a joint task force to increase the ability to detect identity theft. Their joint recommendation on "red flag" guidelines is a set of requirements on financial institutions and other entities which furnish credit data to credit reporting services to develop written plans for detecting identity theft. The FTC has determined that most medical practices are considered creditors and are subject to requirements to develop a plan to prevent and respond to patient identity theft.<ref>Michael, Sara {{cite web |url=http://www.physicianspractice.com/index/fuseaction/newsletterArticles.view/articleID/87.htm |title=Getting Red Flag Ready |access-date=2009-07-02 |archive-date=2012-09-11 |archive-url=https://archive.today/20120911/http://www.physicianspractice.com/index/fuseaction/newsletterArticles.view/articleID/87.htm |url-status=dead }} PhysiciansPractice.com, 21 May 2009. Retrieved 2 July 2009.</ref> These plans must be adopted by each organization's
Identity theft complaints as a percentage of all fraud complaints decreased from 2004
According to the [[Bureau of Justice Statistics|U.S. Bureau of Justice Statistics]], in 2010, 7% of US households experienced identity theft - up from 5.5% in 2005 when the figures were first assembled, but broadly flat since 2007.<ref name="Bureau of Justice Statistics">{{cite web | url=http://bjs.gov/content/pub/pdf/itrh0510.pdf | title=Identity Theft Reported by Households, 2005-2010 | publisher=Bureau of Justice Statistics | year=2011 |
At least two states, [[California]]<ref>{{cite web |url=http://www.privacyprotection.ca.gov/ |title=California Office of Identity Protection |access-date=2009-01-08 |archive-date=2012-08-05 |archive-url=https://archive.today/20120805/http://www.privacyprotection.ca.gov/ |url-status=dead }}</ref> and [[Wisconsin]]<ref>{{
In 2009, Indiana created an Identity Theft Unit within their Office of Attorney General to educate and assist consumers in avoiding and recovering from identity theft as well as assist law enforcement in investigating and prosecuting identity theft crimes.<ref>{{cite web|url=http://www.in.gov/legislative/ic/code/title4/ar6/ch13.pdf |title=
In Massachusetts in
The [[Internal Revenue Service|IRS]] has created{{when|date=August 2017}} the IRS Identity Protection Specialized Unit to help taxpayers' who are victims of federal tax-related identity theft.<ref>{{cite web|title=Taxpayer Guide to Identity Theft|url=https://www.irs.gov/newsroom/article/0,,id=251501,00.html|work=IRS.gov|publisher=US Internal Revenue Service|
As for the future of medical care and Medicaid, people are mostly concerned about [[cloud computing]]. The addition of using cloud information within the United States medicare system would institute easily accessible health information for individuals, but that also makes it easier for identity theft. Currently, new technology is being produced to help encrypt and protect files, which will create a smooth transition to cloud technology in the healthcare system.<ref>Hyde, J. (2017). Preventing Identity Theft and Strengthening the American Health Care System. Policy & Practice (19426828), 75(5), 26–34.</ref>
==== Notification ====
Many states followed California's lead and enacted mandatory [[data breach notification laws]]. As a result, companies that report a data breach typically report it to all their customers.<ref>{{cite web |url=http://www.naag.org/states-offer-data-breach-protection.php |title=States Offer Data Breach Protection |url-status=dead |archive-url=https://archive.today/20120913/http://www.naag.org/states-offer-data-breach-protection.php |archive-date=13 September 2012
== Spread and impact ==
{{Update | section|date=September 2023}}
Surveys in the US from 2003 to 2006 showed a decrease in the total number of identity fraud victims and a decrease in the total value of identity fraud from US$47.6 billion in 2003 to $15.6 billion in 2006.{{citation needed|date=May 2021}} The average fraud per person decreased from $4,789 in 2003 to $1,882 in 2006. A Microsoft report shows that this drop is due to statistical problems with the methodology, that such survey-based estimates are "hopelessly flawed" and exaggerate the true losses by orders of magnitude.<ref>{{cite web|url=http://research.microsoft.com/pubs/149886/SexLiesandCybercrimeSurveys.pdf |title=Sex, Lies and Cybercrime Surveys |publisher=Microsoft |date=15 June 2011 |
The 2003 survey from the Identity Theft Resource Center<ref>{{
* Only 15% of victims find out about the theft through proactive action taken by a business
* The average time spent by victims resolving the problem is about 330 hours
* 73% of respondents indicated the crime involved the thief acquiring a credit card
In a widely publicized account,<ref>{{cite web |url=http://www.privacyrights.org/cases/victim9.htm |title=Verbal Testimony by Michelle Brown |url-status=dead |archive-url=https://archive.today/20120921/http://www.privacyrights.org/cases/victim9.htm |archive-date=21 September 2012
In [[Australia]], identity theft was estimated to be worth between A$1billion and A$4 billion per annum in 2001.<ref>[http://www.acpr.gov.au/research_idcrime.asp Identity Crime Research and Coordination] {{webarchive |url=https://web.archive.org/web/20051230021614/http://www.acpr.gov.au/research_idcrime.asp |date=30 December 2005 }}, Australasian Center for Policing Research. Retrieved 30 June 2006.</ref>
In the United Kingdom, the Home Office reported that identity fraud costs the UK economy £1.2 billion annually<ref>{{cite web |url=http://www.identitytheft.org.uk/ |title=What is Identity theft? |author=Home Office |date=26 May 2004 |publisher=identitytheft.co.uk |
An extensively reported<ref>{{cite news |url=https://www.bbc.co.uk/news/technology-13726085 |title=Hi-tech crime and sexual partner surveys 'biased'
== See also ==
Line 282 ⟶ 259:
* {{annotated link|Pharming}}
* {{annotated link|Robert Siciliano}}
* {{annotated link|Spamming}}{{div col end}}
=== Types of fraud and theft ===
Line 314 ⟶ 290:
===Notable identity thieves and cases===
{{div col}}
* {{annotated link|Equifax#
* {{annotated link|Loss of United Kingdom child benefit data (2007)|2007 UK child benefit data misplacement}}
* {{annotated link|Frank Abagnale}}
* {{annotated link|Albert Gonzalez}}
* {{annotated link|Yuri Kondratyuk}}
* {{annotated link|Charles Stopford}}
{{div col end}}
==Further reading==
* Brensinger, Jordan (2023). "[https://journals.sagepub.com/doi/full/10.1177/00031224231189895 Identity Theft, Trust Breaches, and the Production of Economic Insecurity]". ''American Sociological Review''.
==References==
Line 329 ⟶ 310:
* [https://www.identitytheft.gov/ Identity Theft Recovery Plan] FTC steps for identity theft victims.
* [http://www.idtheft.gov The President's Task Force on Identity Theft] – a government task force established by US President George W. Bush to fight identity theft.
* [http://www.mysecurecyberspace.org/encyclopedia/index/identity-theft.html#msc.encyclopedia.identitytheft Identity Theft] – [[Carnegie Mellon University]]
* [https://web.archive.org/web/20101105002332/http://www.ojp.usdoj.gov/nij/topics/crime/id-theft/welcome.htm Identity Theft: A Research Review, National Institute of Justice 2007]
* [http://www.usdoj.gov/criminal/fraud/websites/idtheft.html Identity Theft and Fraud] – [[United States Department of Justice]]
* [https://web.archive.org/web/20070401000301/http://www.msnbc.msn.com/id/17805134/ Dateline NBC investigation] 'To Catch an ID Thief'
* {{cite news|title=Transcript of Attorney General Alberto R. Gonzales and FTC Chairman Deborah Platt Majoras Announcing the Release of the President's Identity Theft Task Force |date=23 April 2007 |url=http://www.usdoj.gov/ag/speeches/2007/ag_speech_0704231.html |archive-url=https://archive.today/20070911112747/http://www.usdoj.gov/ag/speeches/2007/ag_speech_0704231.html |url-status=dead |archive-date=11 September 2007 |work=US Department of Justice
}}
* {{cite news |url= https://abcnews.go.com/US/wireStory/woman-prison-time-total-identity-theft-18809034 |title=Woman Gets Prison Time in 'Total Identity Theft' - ABC News |first=Hegeman |last=Roxana |work=ABC News |date=25 March 2013 |
*[https://www.fbi.gov/news/stories/2014/january/fugitive-identity-thief-led-global-criminal-enterprise/ Scam on the Run - Fugitive Identity Thief Led Global Criminal Enterprise] [[FBI]]
Line 342 ⟶ 322:
{{Fraud}}
{{Privacy}}
{{Authority control}}
[[Category:Identity theft| ]]
[[Category:1964 neologisms]]
[[Category:Fraud]]
[[Category:Identity documents]]
|