Thursday, October 17, 2019

Identity Theft Essay Example | Topics and Well Written Essays - 500 words

Identity Theft - Essay Example Sometimes small gangs of people come together to create lies about someone or form false documents, which they will use to commit fraud. Due to the increased level of insecurity, the gangs have started using different techniques to get the information by using computer or internet related activities to acquire the information. Identity thieves use personal information, such as Social Security numbers, birth dates, and home addresses, to open new accounts in the victim's name, make charges and then disappear. While this type of identity theft is less likely to occur, it imposes much greater costs and hardships on victims. Identity theft starts when the identity thief gets another person’s personal information such as names, credit card numbers or any other financial document then uses this information to steal money from the victim’s account. Identity thieves use various methods to get this information and can do anything to get hold of this information. An identity thief will look through the victim’s trash to find their personal information, and use the information to get benefits such as medical and taking over accounts of the victim. Identity thieves also steal the credit and debit card information of the victim by using a device that records this information when processing their bills. Other identity thieves present themselves as financial institutions, which will ask the victim their personal information over the internet, and if the victim is not aware, they may end up giving up crucial information, which the thieves will use to steal. Other identity thieves pilfer wallets containing personal information and use it to steal from their victims. Identity thieves may also get records from the personnel offices or bribe workers to get personal information of a potential victim, which they will then use to pay for their own expenses.  Ã‚  

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.