Identity theft

identity thiefidentity thievesfalse identityidentity fraudidentify theftstole the identityfalse identitiesID theftidentityidentity had been stolen
Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.wikipedia
639 Related Articles

Personal data

personally identifiable informationpersonal informationpersonally identifying information
Identity theft is the deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss.
PII can also be exploited by criminals to stalk or steal the identity of a person, or to aid in the planning of criminal acts.

Identity fraud

a false identityfake IDfake name
Identity fraud is often but not necessarily the consequence of identity theft.
A person's personal information may be surreptitiously obtained, commonly described as identity theft, in a variety of ways.

Identity Theft Resource Center

In response, some new bills have been implemented to improve security, under advisement from the Identity Theft Resource Center, such as requiring electronic signatures and social security verification.
The ITRC educates consumers, corporations, government agencies, and other organizations on best practices for fraud and identity theft detection, reduction and mitigation; and, serves as a relevant national resource on consumer issues related to cybersecurity, data breaches, social media, fraud, scams, and other issues.

Background check

background checksbackground investigationcriminal background check
Victims might only learn of such incidents by chance, for example by receiving a court summons, discovering their drivers licenses are suspended when stopped for minor traffic violations, or through background checks performed for employment purposes.
However, these checks can sometimes be used for illegal purposes, such as unlawful discrimination (or employment discrimination), identity theft, and violation of privacy.

Data breach

leakeddata leakData spill
Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained, and identity theft is not always detectable by the individual victims, according to a report done for the FTC.
Although such incidents pose the risk of identity theft or other serious consequences, in most cases there is no lasting damage; either the breach in security is remedied before the information is accessed by unscrupulous people, or the thief is only interested in the hardware stolen, not the data it contains.

AllClear ID

Debix
The largest study on child identity theft, as reported by Richard Power of the Carnegie Mellon Cylab with data supplied by AllClear ID, found that of 40,000 children, 10.2% were victims of identity theft.
Using the data supplied by AllClear ID, Power completed the largest report ever done on child identity theft.

Browser security

Secure Web Browsingsecuringuntrusted
Breaches of web browser security are usually for the purpose of bypassing protections to display pop-up advertising collecting personally identifiable information (PII) for either Internet marketing or identity theft, website tracking or web analytics about a user against their will using tools such as web bugs, Clickjacking, Likejacking (where Facebook's like button is targeted), HTTP cookies, zombie cookies or Flash cookies (Local Shared Objects or LSOs); installing adware, viruses, spyware such as Trojan horses (to gain access to users' personal computers via cracking) or other malware including online banking theft using man-in-the-browser attacks.

Privacy

privatepersonal privacyprivacy rights
The acquisition of personal identifiers is made possible through serious breaches of privacy.
Personal information which is voluntarily shared but subsequently stolen or misused can lead to identity theft.

Dumpster diving

Garbage pickingdumpster diversdumpster-diving
Discarded billing records may be used for identity theft.

Biometrics

biometricbiometric authenticationbiometric data
Using various types of biometric information, such as fingerprints, for identification and authentication has been cited as a way to thwart identity thieves, however there are technological limitations and privacy concerns associated with these methods as well.
In selecting a particular biometric, factors to consider include, performance, social acceptability, ease of circumvention and/or spoofing, robustness, population coverage, size of equipment needed and identity theft deterrence.

Spyware

anti-spywareantispywareSpyware removal software
In one case, spyware has been closely associated with identity theft.

Social Security number

Social Security cardsocial security numbersSSN
The most common technique involves combining a real social security number with a name and birthdate other than the ones associated with the number.
The SSN is frequently used by those involved in identity theft, since it is interconnected with many other forms of identification, and because people asking for it treat it as an authenticator.

Burglary

breaking and enteringburglariescat burglar
Burglary may be an element in crimes involving rape, arson, kidnapping, identity theft, or violation of civil rights; indeed, the "plumbers" of the Watergate scandal were technically burglars.

Credit score

credit scoringcredit checkcredit scores
It also contains general information on how to build or improve credit history, and how to check for signs that identity theft has occurred.

Phishing

spear-phishingspear phishingspearphishing
Identity theft may be used to facilitate or fund other crimes including illegal immigration, terrorism, phishing and espionage.

Anonymity

anonymousanonymouslyincognito
Examples are illegal immigrants hiding their illegal status, people hiding from creditors or other individuals, and those who simply want to become "anonymous" for personal reasons.

Credit card fraud

skimmingfraudcredit card skimming
The method of observing someone using the credit card PIN code, stealing the card or skimming it, and then using the card, has become more common.
Credit card fraud is also an adjunct to identity theft.

Credit report monitoring

credit monitoringcredit monitoring services
The services typically work either by setting fraud alerts on the individual's credit files with the three major credit bureaus or by setting up credit report monitoring with the credit bureaux.
It is often advisable to see data with all three bureaus (Equifax, Experian and TransUnion) to detect identity theft.

Identity score

identity "scoreidentity scoring
An identity score is a system for detecting identity theft.

Internet fraud prevention

fraud prevention
Due to the many different ways of committing fraud over the Internet, such as stolen credit cards, identity theft, phishing, and chargebacks, users of the Internet, including online merchants, financial institutions and consumers who make online purchases, must make sure to avoid or minimize the risk of falling prey to such scams.

Federal Trade Commission

FTCU.S. Federal Trade CommissionUnited States Federal Trade Commission
Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained, and identity theft is not always detectable by the individual victims, according to a report done for the FTC.
One of the Federal Trade Commission's other major focuses is identity theft.