U.S. flag

An official website of the United States government, Department of Justice.

NCJRS Virtual Library

The Virtual Library houses over 235,000 criminal justice resources, including all known OJP works.
Click here to search the NCJRS Virtual Library

Identity Theft and Opportunity (From Perspectives on Identity Theft, P 9-31, 2008, Megan M. McNally and Graeme R. Newman, eds. -- See NCJ-223725)

NCJ Number
223726
Author(s)
Graeme R. Newman
Date Published
2008
Length
23 pages
Annotation
This chapter examines opportunities for the commission of identity theft and ways to reduce these opportunities (prevention), with a focus on the role of technology in creating these opportunities and in reducing them.
Abstract
The opportunities for and techniques of identity theft are divided into two categories: opportunities/techniques for stealing identities and techniques for converting stolen identities to the thief’s benefit. The ways offenders steal identities are primarily low tech. Some opportunities/techniques are to steal wallets or purses, which typically contain key identity information; to steal mail; to rummage through residential trash container or business dumpsters; to collude with or bribe employees to obtain personnel or client information; and to hack into corporate computers for customer and employee information records. Some ways that identity theft can be used to benefit the thief are in opening a new credit card account with the victim’s name; opening a landline or cell-phone account in the victim’s name; opening a bank account in the victim’s name in order to make purchases with bad checks; and take out auto loans or mortgages under the victim’s name and residence. Some techniques for reducing identity theft fall into five categories. First, increase the effort the offender must exert in order to complete the crime. Second, increase the risks of getting caught. Third, reduce the rewards that can be gained from the crime. Fourth, reduce provocations that may encourage or otherwise tempt potential offenders. Fifth, remove excuses that offenders may use to justify their crime. In discussing technology features relevant to preventing identity theft, the chapter focuses on specific technologies and their design purpose, the system within which the technology is applied or works (authentication procedures), and the assembly of databases that contain the personal information embedded in the technologies and systems. 9 notes and 29 references