0% found this document useful (0 votes)
285 views7 pages

An Analysis of Identity Theft Motives, Related Frauds, Techniques and Prevention

This document provides an analysis of identity theft, including the common frauds resulting from identity theft, techniques used by thieves, and methods of prevention. Identity theft costs billions annually and involves theft of personal information like Social Security numbers, credit card numbers, and addresses. Common frauds include credit card fraud, tax fraud, and medical fraud. Thieves obtain information through physical theft, social engineering on websites like Facebook, or hacking systems. Effective prevention focuses on increasing awareness through training and securing personal information.

Uploaded by

Ali Raza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
285 views7 pages

An Analysis of Identity Theft Motives, Related Frauds, Techniques and Prevention

This document provides an analysis of identity theft, including the common frauds resulting from identity theft, techniques used by thieves, and methods of prevention. Identity theft costs billions annually and involves theft of personal information like Social Security numbers, credit card numbers, and addresses. Common frauds include credit card fraud, tax fraud, and medical fraud. Thieves obtain information through physical theft, social engineering on websites like Facebook, or hacking systems. Effective prevention focuses on increasing awareness through training and securing personal information.

Uploaded by

Ali Raza
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Information Security Audit and Control Research Paper 2020 Publication F17- Batch

An analysis of identity theft: Motives, related frauds,


techniques and prevention
Ahsan Javaid , Ali Raza

Institute of Business and Information Technology


University of the Punjab, Lahore, Pakistan
[email protected] , [email protected]

Abstract- This paper is a reasonable overview of the insider burglary. It is essential for associations'
major frauds focusing on ID fraud and losses of supervisors to realize that regardless of new
millions of dollars for business and people in the innovation based methods, over 70% of ID theft
world every year. The paper give an overview of happens by insiders. Likewise, it will be indicated
effective techniques for sustainable development of how cheats apply both innovation-based methods, for
prevention methods that have been offered to people example, phishing and social building to take
and business. In addition, the paper reviews literature individual data. At long last, a few successful
and summarizes the most effective ways for public avoidance procedures will be accommodated people
user and business to prevent from ID theft because and association to ensure key information and data
victims may get a long process of finishing up the against wholesale fraud. Normally, cheats endeavor to
damage, such as their credit rating, reputation and sidestep security frameworks through human
their jobs. Identity (ID) theft is unapproved acquiring components. In this way, the proposal essentially
others' private data so as to abuse it. ID theft is one of stresses building up people's mindfulness through
the serious issues that force billions of dollars every open and hierarchical preparation.
year on individuals and organizations over the globe.
In 2008 in particular, 9.9 a large number of Americans Related Terms- Identity, theft, fraud, prevention,
were exploited which shows 22% expansion personal information
contrasted with 2007. Breaking down four central
point - political, financial, social, and innovative
I. INTRODUCTION
uncovers that social and mechanical elements are the
huge beginnings of ID theft. The social building is a
strategy for criminals by which social architects
exploit individuals' practices in interpersonal
A ssociations and individuals ought to be careful in
securing their Identity to be protected as
misrepresentation because of ID thefts. ID fraud has
organizations, for example, Facebook to take people's become maybe the characterizing wrongdoing of the
key data. This report looks at changed kinds of fakes data age, with an assessed 9 million or more
that are the major results of ID theft. The fakes as the occurrences each year.[1] Publicity with respect to
aftereffects of ID theft contain ID blackmailing, serious instances of fraud in the print and electronic
money related misrepresentation, charge media and depiction of the danger of wholesale fraud
misrepresentation, in various viable TV, advertisements have raised open
clinical extortion, continue misrepresentation, contract mindfulness about fraud. Seemingly, be that as it may,
misrepresentation, and composed wrongdoings, for scarcely any people know about the complexities of
example, illegal tax avoidance, psychological the numerous issues associated with this wrongdoing,
oppression, and illicit migration. Additionally, the which is actually a huge set of fake exercises
different strategies that cheats use to assault people extending in size from minor cheats to significant
and associations are examined. The various strategies wrongdoings utilizing taken characters. These fake
are partitioned to two significant ones, physical and activities are executed by a wide range of wrongdoers,
mechanical. Physical strategies incorporate a few from relatives to shadowy, global lawbreaker packs.
conventional ways, for example, mail burglary and Over the previous decade, the Federal Government

Research Paper ISAC


Information Security Audit and Control Research Paper 2020 Publication F17- Batch

and most States have passed enactment to force sorts. Proof demonstrates that the degree of
criminal endorses on distinguish robbery (see Mastercard misrepresentation on the Internet (and by
phone) has expanded in view of the open doors given
Wholesale fraud Legislation). Endeavors to battle by the Web condition. A few specialists lean toward
fraud have been hampered, nonetheless, by the not to incorporate charge card misrepresentation in
slipperiness of a definition, it's cover with the evident wholesale fraud, since it might happen just a
components of numerous different violations, its long single time and might be found rapidly by the credit
haul and multijurisdictional nature (counting the time card giving organization, regularly even before the
that may slip by previously disclosure), and inquiries person cardholder realizes that the extortion has
regarding whether law implementation organizations happened. Different kinds of data fraud, such as
or budgetary establishments are better prepared to record takeover, are increasingly included and take
battle it.This NIJ-supported examination drew from more time to recognize and research. Seven broad
accessible logical investigations and different sources types of data fraud Facilitating other crimes, Avoiding
(through January 2005) to survey what is thought arrest, Repeat victimization ("classic" identity
about fraud and what further look into is required. The theft). ,Organized identity theft, Exploiting weakness
investigation's specialists call for additional in specific technologies and information systems,
examination in regions identifying with counteraction, Financial scams, As a motive for other crimes (e.g.,
including a decrease of damage to singular casualties, bribing employees to provide passwords).
money related foundations, and society. ID theft can
be happen in the following data. Stages of Identity Theft
i. ATM numbers The analysts ordered three phases of character
ii. Telephone calling cards robbery. A specific wholesale fraud wrongdoing may
iii. Mortgage details incorporate one or on the other hand these stages.
iv. Date of birth 1. Acquisition
v. Passwords and PINs 2. Use
vi. Home addresses 3. Discovery
vii. Phone numbers
viii. Credit card numbers Stage 1. Acquisition of the identity
ix. CW2 numbers (the back of credit cards) Through theft, hacking systems, misrepresentation,
x. Credit reports fraud duplicity, power, diverting or catching mail, or
xi. Social Security (SIN) numbers even by legitimate methods (e.g., buying
xii. Driver‟s license numbers distinguishing data on the Internet).

. Stage 2. Use of the identity


For monetary profit (the most well-known inspiration)
Identity Crimes or to maintain a strategic distance from capture or in
any case conceal one's personality from law
Identity crimes include these Check fraud, Plastic card requirement or other specialists, (for example, charge
fraud (credit cards, check cards, debit cards, phone authorities).
cards, etc.).Immigration, fraud, Counterfeiting Wrongdoings in this stage may include:
,Forgery, Terrorism using false or stolen identities. 1)Insurance fraud. 2)Stealing rental cars. 3)Account
Theft of various kinds (pick pocketing, robbery, takeover. 4)Opening new accounts. 5)Extensive use of
burglary, or mugging to obtain the victim's personal the victim's debit or credit card. 6)Sale of the identity
information), Postal fraud. information on the street or black market.
7)Acquisition ("breeding") of additional identity-
Types of Identity Theft related documents such as driver's licenses, passports,
visas, and health insurance cards. 8) Filing fraudulent
Depending upon the meaning of data fraud, the most tax returns for large refunds.
widely recognized sort is Visa extortion of different

Research Paper ISAC


Information Security Audit and Control Research Paper 2020 Publication F17- Batch

fraud-related. A genuine absence of information on


Stage 3. Discovery of the theft these issues hinders examination into conceivable
Although numerous abuses of charge cards are found mediation techniques that could diminish the
rapidly, wholesale fraud may take from a half year to mischief. Since organizations routinely don't report
quite a long while to find. Proof recommends that the misfortunes coming about because of character theft-
more it takes to find the burglary, the more prominent related violations to law requirement offices, the
the misfortune acquired by the person in question, allurement is to consider them not as genuine
who could conceivably include law implementation. wrongdoings, yet essentially as an expense of working
Significantly more research is required around there. together.

Recording and Reporting Identity Theft The Criminal Justice System


As indicated by the Federal Trade Commission The specialists discovered three primary expenses or
inquire about, more seasoned people and those less zones of cost for the organization the examination,
instructed are probably going to take more time to Federal arraignment, and redresses. No decent
report distinguish burglary and are more averse to wellspring of information exists for deciding the
report it by any means. This exploration likewise dollar figures of real expenses caused by these
recommends that the more it takes to find the territories. The main accessible indictment
wrongdoing and report it to the pertinent power, the information proposes an estimated cost of $11,400 per
more noteworthy the misfortune and enduring of the case, yet this appears to have frail validation. The
person in question, and, from a criminal equity point Bureau of Prisons announced that the cost of working
of view, the less fortunate the possibility of the fruitful a base security office, where most cushy guilty parties
manner of the case. As opposed to FTC's broad live, found the middle value of $17,400 per prisoner
database of customer grumblings and exploitation, the in 2000. One may add to this the normal cost of
criminal equity framework does not have any such $2,900 per wrongdoer for network oversight after
data identified with wholesale fraud. No lawbreaker discharge from jail, yet, this figure does exclude costs
equity organization keeps up a national database of for unique conditions, for example, electronic
the number of wholesale fraud cases answered to it or monitoring.
those discarded by capture and ensuing indictment.
Individuals
Cost of Identity Theft Much has been expounded on the human expense of
wholesale fraud exploitation. A few people acquire
Business budgetary expenses; these can run from $30 to a large
The expense of identity theft to business is for the number of dollars. The report refers to certain
most part obscure. Although some credit card discoveries in such manner yet recognizes that the
organizations distribute data concerning their human expenses for the casualty in time lost, credit
expenses from lost or taken cards and "card, not issues caused by the wrongdoing,
present" misfortunes, they don't report their monetary what's more, the absence of help is the most
misfortunes concerning different parts of wholesale significant and least quantifiable.
fraud, for example, the expense of exploring cases, or
the expense adequacy of presenting new security Societal
systems as opposed to taking the misfortunes. The two The degree of mischief done by data fraud to society
biggest charge card organizations assessed that or to an economy that depends on open markets
"accumulated data fraud-related misfortunes from presently can't seem to be resolved. Data fraud is
residential activities rose from $79 million out of 1996 destructive to open markets since they rely upon the
to $114 million of every 2000, an expansion of around very trust that data fraud damages. Other potential
43 percent."[1] Most Visa organizations try not to cost regions incorporate national security dangers or
consider classifications, for example, lost or taken dangers, troubles made by the nearness of illicit
cards, never-got cards, fake cards, mail request, or outsiders, and higher premiums gave to purchasers.
phone requests misrepresentation to be wholesale

Research Paper ISAC


Information Security Audit and Control Research Paper 2020 Publication F17- Batch

Identity Theft Offending Taking over existing records: Fraudsters with enough
In spite of the fact that the part practices of wholesale individual data can contact associations and take
fraud and its related wrongdoings have been known control of the current financial balance and pull back
for a long time, fraud is seen principally as a result of all cash in a briefest timeframe with no doubt.
the data age, similarly as vehicle robbery is a result of
the modern period of mass creation. Along these lines, Opening new accounts:
research ought to underscore revealing the chance With having private data furthermore, ID, for
structure of data fraud. This requires two significant example, name, address, and social protection
advances: numbers, fraudsters can open new ledgers, credit
1.Breaking identity theft down into carefully defined accounts (Visas, credit extensions, or advances),
specific acts or sequences of behaviors. 2. Identifying coming up accounts, PDA records, and understudy
the opportunities provided offenders by the new advances accounts under the victims‟ genuine data;
environment of the information age. they at that point will change their charging address so
as to hide their exercises from casualties. In such
Although comprehensive research dependent on cases fraudsters have additional time and more
contextual analyses has recognized the criminogenic chances to submit extortion and in the vast majority of
components of the Internet as the prime head of the cases, casualties possibly will acknowledge when
data age, guilty parties have given little data with gatherer offices reach them or their credit applications
respect to how precisely they do their wrongdoings are cannot.
and distinguish open doors for their bonus. Research
is expected to talk with guilty parties and agents to Immigration fraud (obtaining a passport) and
become familiar with the arrangements of practices terrorism
and choices that guilty parties take throughout their International criminals, for example, fear mongers and
wrongdoings. This methodology won't just guide law unlawful foreigners, use taken characters to acquire an
authorization in creating viable mediation methods, it identification to spread their lawful offenses and
likewise will prompt bits of knowledge as to future criminal operations. These kinds of extortion
manners by which guilty parties may abuse and frequently consider a critical danger for national
recognize shortcomings in the data condition. protections over the globe. For instance, in July 2002,
Character hoodlums and those attempting to ruin them an individual from al-Qa'ida, who was utilizing
are pursuing a "weapons contest." Despite the fact that Australian identification, was captured in Canada. He
framework mediations and upgrades in innovation was charged by the legislature of the Netherlands
(e.g., passwords for Visas) can do something amazing since he wanted to explode the American international
for anticipation, wrongdoers rapidly create strategies safe haven in Paris (OCBA, 2010). In expansion, as
to conquer these resistances indicated by the FBI, Al-Qaeda‟s individuals bought
their phones and paid by taken character furthermore,
ID THEFT AND OTHER FRAUDS Visas in Spain. They additionally took ID and
ID theft is frequently the first and planning stage to manufactured travel papers to open ledgers in which
the subsequent stage. As needs are, the significant fear-based oppressor supporters were moving cash
thought processes of culprits for taking characters are: from Afghanistan.
1)The requirement of further extortion (in the vast
majority of cases) 2) Hiding the identity3) Sell the THEFT TECHNIQUES
taken data ID thieves may take individual and private data in
different manners, running from basic (physical)
ID fraud (forging identity documents) ways, for example, theft of wallets to very modern
Personal information is used to create fake driver‟s strategies (innovation-based burglaries, for example,
licenses, vehicle registration certificates, credit and computer hacking.
debit cards, and other identity documents that will be
used to commit fraud Physical theft techniques
Theft of individual data sources (wallets, cell
Financial frauds telephones, and PCs) Today, cheats can acquire

Research Paper ISAC


Information Security Audit and Control Research Paper 2020 Publication F17- Batch

individual data by taking rich wellsprings of data complete names of expired from papers and
especially PCs from significant legislative data headstones.
communities, for example, Canada Revenue Agency,
CRA. The accompanying models are probably the Skimming (magnetic strip duplication): Using this
most significant ones (CIPPIC, 2007: 5): method, cheats utilize a little electronic gadget called
"- On Friday, September 26, 2003, two sharp-looking a "skimmers" that can duplicate credit or plastic data
men strolled into the Calgary workplaces of the in the wake of swiping the card. Since any cards with
Canada Customs what's more, Revenue Agency an attractive strip, for example, library cards are
(CCRA) and took 15 DELL PC PCs esteemed in the programmable, criminals at that point can make extra
abundance of $60,000.00. (I) Four PCs containing cards by utilizing taken data for theft.
private individual data of in excess of 120,000
Canadians were too taken from CCRA‟s Laval Purchasing stolen personal information: Perhaps the
workplaces on September 4, 2003. (ii) In May 2005, most straightforward approach to get an individual‟s
the U.S. Division of Justice detailed that a PC private data is to buy data from insider criminals or
containing data on 80,000 departmental workers was information dealers. For instance, zoom accounts data
taken. (iii) A comparable circumstance happened at sold in recent days.
the University of California, Berkeley. This time,
individual data, counting standardized savings Technology-based ID theft techniques
numbers (SSN), was put away, decoded, on the PC.
Phishing: Phishing is a type of social designing where
Trash-theft an assailant endeavors to falsely secure delicate data
The ID criminals can get individual data through from a casualty by imitating a reliable outsider.
making a plunge family unit garbage just as that of
explicit organizations, for example, inns, rental Hacking: Unapproved access to frameworks or
vehicle organizations, and café. Along these lines, ID databases to acquire individual or hierarchical
thieves may acquire individual data on disposed of grouped data is called hacking. Programmers can sell
money related receipts. all taken data or increase benefits from private data
straightforwardly.
Change of address
Since mail is a decent ceaseless wellspring of Wardriving: In wardriving cheats endeavor to look,
individual data and it requires some investment until identify and associate with people or organizations‟
casualties identify any theft, ID thieves can divert unbound Wi-Fi or then again remote systems and take
mail to acquire casualties account data. For instance, individual data. Hoodlums or "war drivers" utilize
in March 2006, two fraudsters who utilized a gadgets with remote systems locators, for example,
difference in address structure to divert individuals note pads or PDAs to associate with unbound systems
mail were captured in Ottawa. As per police, when they drive-in neighborhoods.
casualties gave all close to home data and answered.
At last, police were alarmed about the extortion by Social engineering techniques: As was referenced
Canada. before, ID thieves assault the human components
particularly in associations to sidestep specialized
Mail theft: Mail theft is a simple path by which controls and take individual data. "Social the building
hoodlums can take key data from organizations or includes misusing the characteristic inclination of an
home post boxes, reuse receptacles, or trash. individual to confide in others, particularly individuals
Criminals may acquire individual data through bank with whom they have a type of relationship.
and financial records, service bills, or driver‟s
licenses. Pre-Texting: In this type of ID theft, social designers
depend on "smooth-talking" to target casualties or
Tombstone theft: By this method, ID cheats gather all outsiders to take individual what's more, private data.
close to home data, for example, birth date and They utilize a few techniques to take individual data
as following:

Research Paper ISAC


Information Security Audit and Control Research Paper 2020 Publication F17- Batch

5) Personal distinguishing proof number when


1) Contact outsiders and posture as an interior worker utilizing a PIN cushion or on the other hand an ATM
or on the other hand another organization for the ought to be secured.
benefit of casualties and request their accounts data. 6) It is smarter to retain all close to home ID numbers
2) Pretend to do a telemarketing study in which the such as check cards, and phone calling cards and
victim‟s data is a piece of overview necessities. never keep in touch with them on the cards.
3) Pretend to from calling an enemy of extortion 7) It is better that people be acquainted with their
association and victims‟ data is required to enlist in credit and check cards charging cycle and screen them
assurance programs. cautiously.
4) Trick youth and kids and target them to acquire 8) Document destroying before disposing of in refuse
canisters is firmly suggested on the grounds that trash
Obtaining credit reports: Since credit checks for and waste containers are a goldmine for hoodlums.
certain circumstances are regular, thieves utilize along 9) The main station and other pertinent money related
these lines to take individual data. In this type of ID organizations ought to be educated about any location
theft, fraudsters claim to be a landowner, vehicle change. Among these, all mail ought to be expelled
vendor, or potential business and get people private rapidly from letter drop and an excursion hold when
data. individuals travel is suggested (Paget, 2007).

Fake employment schemes: In this structure, It additionally is prescribed to survey monetary record
counterfeit bosses post occupations on their sites adjusts and looks into any unexplained pull back or
furthermore, ask work searchers to present a resume charges (Paget, 2007). What's more, as per Paget, the
or an application structure to acquire individual data accompanying methods are prescribed to people to
secure individual data in PC or online systems:
THEFT PREVENTION
a) Individuals should look out for phishing messages
Fraudsters use various techniques and methodologies what's more, not uncover individual data.
to get individual data. Truth be told, in light of the b) Reputed and certify business never demand account
circumstance, thieves pick their strategies to assault to data, for example, client name, passwords, social
their objectives. protection numbers, and credit or check cards
For instance, the ID strategies for taking data from numbers; in this way, these email or contacts ought to
associations contrast from people. In this way, be dismissed.
suitable avoidance strategies that are suggested by c) It is suggested that individuals neither one of the
Royal Canadian Mounted Police (RCMP) (2010) for uses interfaces in obscure messages nor reorder them
people and associations are as per the following: in their web programs since phishers can get to their
PCs after open those connections.
Prevention techniques for individuals: d) Using exhaustive security programming, for
1) Since cheats can take individual data by means of example, antivirus, hostile to spyware, and firewalls
the Internet, fax, standard mail, or phone, people and keeping them up to date is suggested.
ought not to unveil individual data when they are not a e) People ought to guarantee that their security
hundred percent sure. programming is empowered and check all connections
2) It is prescribed to convey whole characters record in their email when they choose to download
just when is required; in any case, ought to be kept in connected documents paying little mind to who is the
a safe place. sender.
3) Ask for periodical credit check reports from banks, f) People ought not to impart their own email to their
loan bosses, or other monetary organizations and family or companions and post their location and
report any anomalies to the credit agencies. individual data in their site or informal organizations.
4) It is suggested that people don't permit others for g) It isn't suggest that people send individual data
example, clerks to swipe their credit and platinum even to loved ones in light of the fact that their PCs
cards. probably won't be ensured.

Research Paper ISAC


Information Security Audit and Control Research Paper 2020 Publication F17- Batch

h) All close to home data ought to be erased for all suitable paper for publishing after a thorough analysis of
time in old PCs or hard drives be arranged before submitted paper. Selected paper get published (online and
printed) in their periodicals and get indexed by number of
discarding a PC. sources.
I) All sites and their parts, for example, URL and
bolted symbol, and their protection strategy ought to After the successful review and payment, IJSRP will publish
be check regardless of whether they are made sure your paper for the current edition. You can find the payment
about and right or not before giving individual data. details at: http://ijsrp.org/online-publication-charge.html.
j) Using solid passwords is emphatically prescribed to
individuals in online systems. Security specialists II. CONCLUSION
accept that solid passwords are made by in excess of A conclusion section is not required. Although a conclusion
six characters also, are a mix of letters, numbers, and may review the main points of the paper, do not replicate the
uncommon characters, for example, Hd4vK%j. abstract as the conclusion. A conclusion might elaborate on the
importance of the work or suggest applications and extensions.
Prevention techniques for organizations
APPENDIX
Since organizations and associations convey people‟s
personalities and private data in their databases, it is Appendixes, if needed, appear before the acknowledgment.
important to have a key intend to secure key data.
ACKNOWLEDGMENT
From the outset stage, to have a successful and made
The preferred spelling of the word “acknowledgment” in
sure about the framework, associations, for example,
American English is without an “e” after the “g.” Use the
money related or administrative associations, must singular heading even if you have many acknowledgments.
guarantee that warnings can be distinguished by their
security instruments. REFERENCES
[1] G. O. Young, “Synthetic structure of industrial plastics (Book style with
In March 2009, the Federal Trade Commission (2010) paper title and editor),” in Plastics, 2nd ed. vol. 3, J. Peters, Ed. New
York: McGraw-Hill, 1964, pp. 15–64.
given a rule, the warnings rule. In like manner, [2] W.-K. Chen, Linear Networks and Systems (Book style). Belmont, CA:
Identity fraud anticipation projects ought to be given Wadsworth, 1993, pp. 123–135.
[3] H. Poor, An Introduction to Signal Detection and Estimation. New York:
and spread the accompanying significant components: Springer-Verlag, 1985, ch. 4.
[4] B. Smith, “An approach to graphs of linear forms (Unpublished work
1) First: Reasonable arrangements and strategies to style),” unpublished.
[5] E. H. Miller, “A note on reflector arrays (Periodical style—Accepted for
recognize the "warnings". publication),” IEEE Trans. Antennas Propagat., to be published.
2) Second: Detect the recognized warnings. [6] J. Wang, “Fundamentals of erbium-doped fiber amplifiers arrays (Periodical
3) Third: suitable activities after identification of style—Submitted for publication),” IEEE J. Quantum Electron., submitted
for publication.
warnings.
4) Fourth: Evaluate and update the anticipation
program intermittently. AUTHORS
First Author – Author name, qualifications, associated institute
(if any) and email address.
Second Author – Author name, qualifications, associated
After submission IJSRP will send you reviewer comment institute (if any) and email address.
within 10-15 days of submission and you can send us the Third Author – Author name, qualifications, associated institute
updated paper within a week for publishing. (if any) and email address.

This completes the entire process required for widespread of Correspondence Author – Author name, email address,
research work on open front. Generally all International Journals alternate email address (if any), contact number.
are governed by an Intellectual body and they select the most

Research Paper ISAC

You might also like