Академический Документы
Профессиональный Документы
Культура Документы
1.Introduction
Identiy theft is a crime of using another person’s personal information, credit history
or other identifying characteristics in order to make purchases or borrow money
without that person’s permission.
Identity theft occurs when someone uses another person‟s information for a personal
gain or goal. During the past years, online identity theft has been a major problem
since it affected millions of peoples around the world .Victims of identity theft
may suffer different types of consequences; for example, they might lose
time/money, get sent to jail, get their public image ruined, or have their
relationships with friends and family broken.
Identity theft in Social Networking sites can be done by manipulating people to get
sensitive information or by using posts of the victims on Social Networking sites.
While Social Networking sites promote sharing amongst users, some people over-
share. A large problem with Social Networking sites is that people tend to share a
lot of their personal data on their profiles. Such exaggerated(larger-than) sharing
makes it easy for identity thieves to do their job. On the other hand, Social
Networking sitesare facilitating the process for attackers to elicit user personal
information and use it in illegal behaviors . Identity thefts in Social Networking
sites via social engineering are increasing day after day.
Jane is a responsible adult and therefore checks her credit every four months
(once a year for each of the three credit bureaus). She notices the "new" credit
card and the massive balance for the motorcycle and beer-stein spree. She calls
the credit card company to dispute the charges and files a police report. In the
meantime, she is unable to qualify for a mortgage because lenders feel she is
carrying too much debt (thanks to the thief), and collection agencies are calling
her for credit card payments.
1.3 Why It Matters
(Merriam-Webster, 2019
Identity theft often involves stealing electronic data. It is very time-consuming for
victims to battle and takes a long time to recover from. Often, the perpetrators are
never caught, and the victims' credit scores suffer tremendously. Accordingly, smart
consumers check their credit often in order to detect identity theft before it gets out
of hand (or statutes of limitation occur), they avoid giving data out unnecessarily,
and they are alert to changes in normal financial routines, such as bills that no longer
arrive, mysterious bank charges, or communications from the IRS that more than
one tax return was filed in your name.
Social Networking sites provide the biggest platform for the misuse of
personal information, and thus, promote frauds and personal data extraction.
Therefore, it is not recommended to share the national identity number, driver
license number and other important details on such sites; although, some
websites require this information from the user .However, sometimes they will
not ask directly for this personal data, they will search for related sensitive data
then use it in several harmful ways. There are various ways for identity theft
to happen.
Data Breach:
Organizations and companies store and share all types of sensitive data about
their customers. "Data breach" occurs when any of this information is
lost by mistake or exposed by the neglected employees.
Friendly Fraud:
A high percent of identity theft cases involve friends and family. Most of the
victims are young adults and college students because they lack enough
knowledge and experience. Hackers can use SN‟s, sharing sites, and other shared
interests to reach those victim's to steal their personal information.
For example,
An attacker can know from relative FB page that someone is in a trip to
Africa. Depending on this information, he will impersonating his identity and
send
an email to all the relatives and friends asking them to send money to him
due to its exposure to unexpected circumstances.
Computer Hacking:
Cyber criminals are expert at breaking into computers or laptops to steal
online banking logins or other financial information.
.
Stolen Wallet:
Identity theft occurs when the wallet has lost or stolen. Criminals look for
everything inside that wallet like driver‟s license, bank account numbers,
insurance information, and other sensitive information.
Mail Theft:
Stealing mail is an easy way for criminals to steal an identity from mailbox or
mailbox panels. They know that the mail may contain approved credit
offers, loan statements and other information that can use to steal an identity.
Malware
Job posting
Spam attack
Phone phising
Be careful of phishing:
Phishing is an attempt to gain sensitive data such as username, password,and
credit card information by impersonating trustworthy pages in SN‟s. Some hacker
will pretend to help you in promoting your profile by increases your
followers or protecting your account. Where he will ask you to enter your personal
data in false sites that look similar to the real one. To protect against phishing
attacks, experts advise paying attention not opening a suspicious link and
ignoring any request to enter your personal data unless it is the official site
otherwise your account will be at risk. Furthermore, make sure access to
the
company's website via the correct URL.
Real-life case
Man cheated of Rs 455,000 by Facebook pal
(Times, 2019)
Police have arrested a woman for allegedly swindling a youth of hefty cash on the
pretext of getting the victim a beautiful bride.
According to Metropolitan Police Crime Division, Kalpana Basnet, 23, was traced
and taken into custody by plainclothes cops on Sunday. Basnet, who hails from
Shailung Rural Municipality-5 of Dolakha district, was residing in Balkot,
Bhaktapur.
Basnet befriended Hari Bahadur Karki, 24, on Facebook a few months ago.
Though Basnet and Karki never met each other until this case came to the fore,
they used to chat for hours on messenger and talk on phone, almost every day. As
Basnet knew about Karki’s financial status, she created a fake Facebook account
in the name of Sangita, with profile picture of a beautiful woman. She then posing
as Sangita, sent a friend request to him. Karki accepted the friend request. One day,
Basnet told Karki, who also hails from Dolakha, that Sangita was a beautiful
woman and she knew her very well. “Sangita became a topic of their telephonic
conversation for many days. One day Basnet asked Karki if he was interested in
marrying Sangita and Karki’s response was positive,” a police official said. Karki
was already in love with his virtual friend, Sangita. After a few weeks, Basnet
informed Karki that Sangita was critically injured in a road accident, and had to be
rushed to New Delhi for treatment. She also requested him to provide some money
for her treatment. Saddened by the news, Karki decided to provide money to
Sangita through Basnet.
She has been handed over to Metropolitan Police Range for legal action under
cyber crime and fraud. Police have not disclosed further details about Basnet and
Karki.
Accepting strangers not only gives way to the risk of identity theft, but also puts
unsuspecting persons at the risk of being cheated.
Bibliography
Merriam-Webster, 2., 2019. Merriam webster. [Online]
Available at: https://www.merriam-webster.com/dictionary/identity%20theft
[Accessed 12 12 2019].