Identity Theft Using the Knowledge essay

Download this essay in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from essay:

Spyware runs automatically without the user's knowledge and transmits vital information. Spyware can also record your keystrokes and one might end up revealing all usernames, passwords and other details to identity thieves. (Atlantic Publishing, 2008); (Schwabach, 2005)

Identity thieves have also found novel ways to steal and use identities. For instance, cyber criminals recently hacked Facebook, a popular social networking site, and changed a user's page asking people to help him. Even though the matter was resolved with the help of Facebook; the fact remains that identity theft can have far-reaching and diverse consequences. (Caroll, 2009) the damage caused by identity theft can take years to be rectified. The consequences of the fraudulent practices initiated by the identity thief can continue to reach the victim and credit companies long after the thief has been apprehended and the abuse of the victim's identity stopped. Therefore, consumers must take utmost precautions to protect their identities at all costs. (Schwabach, 2005)

An identity theft can dog a person for the rest of his life and reclaiming one's life can be an uphill task. As they say, "prevention is better than cure." Prevention of identity theft just requires a few extra precautions while dealing with one's personal data and belongings. In most cases, it is the irresponsibility of victims that results in their identities being stolen. (Atlantic Publishing, 2008)

With identity theft becoming one of the fastest growing crimes in the U.S., here are a list of preventive steps that consumers can take to protect themselves:

(i) Check credit reports: one must make it a habit to request for a copy of credit report annually. The credit report gives information whether somebody else has misused your credit account or changed your billing address. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)

(ii) Secure your password and PINs: Password and PINs are extremely important and utmost precaution should be taken that no one has access to them. Writing them down or putting those in a hidden file are very dangerous habits. Passwords should be chosen in a way that is difficult for people to guess them. Having spouse's or child's name as a password, or using your birth date can be extremely foolish as these are the first things that an identity thief may try. It is better to have a random combination of alphabets and numbers which can be remembered but hard to guess. While using passwords or PINs, it is better to make sure nobody is looking over your shoulder. Identity thieves often observe their victims over a long time noting keystrokes, etc. It is a good habit to change your passwords periodically and not to use the same password everywhere. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)

(iii) Protect credit cards: one should make it a habit to sign new cards immediately upon receipt and treat them as one would treat cash because that is what they actually are. One should not write down the PIN on the card itself. Carry only those cards that are likely to be used. After making a purchase, one should always check that the card is actually yours. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)

(iv) Protect mail: In case one is going out of town, it would be a good idea to notify the post office to hold the mail till one comes back. It is better not to choose pre-approved credit offers. One should not be so daft as to write down one's social security number or credit card number on the outer part of an envelope or on a postcard. In case the home mailbox remains unattended, it would be a good idea to use collection boxes for outgoing mail. Moreover, it is better to collect mail immediately upon arrival rather than wait for unscrupulous people to go through them. Always use a shredder to shred important documents before throwing them in trash. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)

(v) Cautious use of internet: Internet has pervaded many aspects of our lives and we often tend to give out many aspects of our private lives unwittingly or thinking that they are on safe sites. Therefore, the first and foremost preventive step is to desist from giving out personal information, social security number or credit card details through e-mail or on popular networking sites. When accessing web pages, make sure that the page is the actual one and not an impersonated one which receives your details. While making online purchases with a credit card, one should always make sure one is on a secure web page. This can be done by checking that there is a padlock visible on the status bar of the browser. In case a social security number has to be provided, for instance, on an online credit application, it must be ensured that the web page is a secure one. Finally, any computer accessing the Internet must have an effective antivirus and personal firewall which must be updated periodically. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)

(vi) Protect your computer: It is better to shut down the computer when going for a break or a snack. People may use your computer in your absence to find out personal details and use it against you. (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)

It is strange that so many of these preventive steps which seem to be a part of common sense, are not followed by such a large fraction of people. If these simple and common preventive steps as well as lifestyle changes had been followed, so many people would not have fallen prey to the smart and often not-so-smart identity thieves. Many of these thieves are not so smart or sophisticated as one may believe them to be. They depend a lot on the carelessness and foolishness of their victims. Therefore, the main "mantra" for avoiding identity theft is that "Prevention starts with you." (Atlantic Publishing, 2008); (the Silver Lake, Loberg, Silver Lake Publishing, 2004); ("Identity Theft Prevention," n. d.)


Atlantic Publishing. (2008) "The Online Identity Theft Prevention Kit: Stop Scammers,

Hackers, and Identity Thieves from Ruining Your Life" Atlantic Publishing Company.

Caroll, Jason. (2009) "Identity Theft: Cyber criminals hack Facebook"

Retrieved 28 March, 2009 from

McEwen, J. Thomas; Fester, Dennis; Nugent, Hugh. Institute for Law and Justice, Inc.,

National Institute of Justice. (1989) "Dedicated Computer Crime Units" DIANE Publishing.

N.A. (2009) "How do Identity Thieves steal your Information?" Retrieved 28 March, 2009 from

N.A. (n. d.) "Computer Crimes in the Digital Age" Retrieved 28 March, 2009 from

N.A. (n. d.) "Identity Theft Prevention" Retrieved 28 March, 2009 from

N.A. (2009) "Types of Computer Crimes" Retrieved 28 March, 2009 from

N.A. (2009) "What is Identity Theft?" Retrieved 28 March, 2009 from

Schwabach, Aaron. (2005) "Internet and the law"


The Silver Lake, Loberg, Kristin; Silver Lake Publishing. (2004) "Identity Theft"…[continue]

Cite This Essay:

"Identity Theft Using The Knowledge" (2009, March 31) Retrieved December 8, 2016, from

"Identity Theft Using The Knowledge" 31 March 2009. Web.8 December. 2016. <>

"Identity Theft Using The Knowledge", 31 March 2009, Accessed.8 December. 2016,

Other Documents Pertaining To This Topic

  • Identity Theft Has Always Been Possible but

    Identity theft has always been possible, but the internet and technology have made it something that can often be accomplished far too easily. According to Hoar (2001), identity theft is the "crime of the new millennium." Stealing someone's identity can cause them countless problems, thousands of dollars, and literally years to correct. Problems are not limited to credit reports, either. Some people even file tax returns using the social security

  • Identity Theft but He That

    In one case in 2000, two-20-year-olds hacked into the Lowe's credit card mainframe from a white Pontiac Grand Prix parked outside a store, synching a single laptop to the wireless system that was meant for employees to use to locate products. The hackers, obviously to blame for the crime, played on the flaws of a computer system that should not have allowed for a security breach. While the same hackers

  • Identity Theft

    Identity Theft: Managing the Risk Management What's New for the Future of Identity Theft Prevention In this paper I examine the basics of identity theft in today's age of widespread and accessible information. The fundamental problem is that while information technologies continue to make aspects of our lives as simple as "point and click," they tend to make certain forms of crime equally simple. The internet, in particular, makes information not only

  • Identity Theft in America and

    Pharmers now not only small local servers operated by Internet service providers (ISP) but they also target the 13 servers on which all other DNS servers depend. Implications Businesses & Large Organizations: Among large scale businesses that get affected includes the financial sector other than individuals. Electronic banking services have been greatly affected by these criminals who are euphemistically called hackers or crackers who conduct phishing or pharming. They not only

  • Identity Theft When it Comes

    Criminals don't always need to have shotguns and masks to threat and rob money; it only takes a social security number, or a pre-approved credit card application from trash to make things according to their wicked way (ID Theft, 2004). Some consumers have had credit card numbers and Social Security numbers stolen and used fraudulently or identity theft. By taking reasonable steps to protect your personal information, this can mitigate the

  • Identity Theft Is Something That

    Of course, most people will call their banks, credit card companies, and other institution at the first sign that identity theft has occurred, but what happens to those victims who do not realize it immediately? People need to be aware of what identity theft is, how it is committed, what can happen when such information is stolen, and what should be done when identity theft has occurred. It is not

  • Sentencing Identity Theft for Monetary

    Question B: How would you incorporate the sentencing goals of retribution, incapacitation, deterrence, rehabilitation and restitution in your sentence of this individual for this particular crime? Identity theft may often be a 'white collar' crime, but it is not a victimless crime. Jail time for a wide-spread scheme may be appropriate for this reason. Even if the victims whose identities were stolen did not suffer financial losses, the businesses such as

Read Full Essay
Copyright 2016 . All Rights Reserved