Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 29, 2024 Mon

Time: 9:45 pm

Results for identity fraud

3 results found

Author: Gordon, Gary R.

Title: Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement

Summary: "The purpose of this study was to provide empirical evidence on which law enforcement can base enhanced proactive identity theft control and prevention efforts. It focuses on identity theft offenders, which sets it apart from previous surveys and other research which have centered on identity theft victims. As a result of the study of closed United States Secret Service cases with an identity theft component (2000-2006), empirical data concerning the key factors relevant to the criminal behavior of identity thieves and the conditions under which that behavior occurs are available to law enforcement agencies and corporate security and fraud investigators for the first time."

Details: Utica, NY: Center for Identity Management and Information Protection, Utica College, 2007. 74p.

Source: Internet Resource; Accessed August 17, 2010 at: http://www.utica.edu/academic/institutes/ecii/publications/media/cimip_id_theft_study_oct_22_noon.pdf

Year: 2007

Country: United States

URL: http://www.utica.edu/academic/institutes/ecii/publications/media/cimip_id_theft_study_oct_22_noon.pdf

Shelf Number: 109503

Keywords:
Identity Fraud
Identity Theft (U.S.)
Identity Theft Offenders

Author: CIFAS

Title: Fraudscape: Depicting the UK's Fraud Landscape

Summary: This Report examines and assesses the fraud cases identified by CIFAS Member organisations during 2008 and 2009 to ascertain any key differences between the typology of the frauds seen in 2009 compared with 2008. Fraudscape analyses fraud data, by type of fraud committed and product targeted by the fraudster, and presents some key findings: Total frauds increased by nearly 10% in 2009 compared with 2008. A 32% increase in identity fraud (where a fraudster applies in the name of an innocent victim or uses an entirely fictitious identity) has been driven by identity fraudsters targeting bank accounts, communications, and mail order products. Application fraud (the use of material falsehoods - lies - on applications or false documentation) has decreased by over 25% from levels seen in 2008. The 'typical' victim of identity fraud is still the man in his forties, though the increase in women being impersonated, or having their accounts taken over, indicates that now, as never before, anyone can be a potential target. Bank accounts, communications and mail order are the product types with the greatest proportionate increase in fraud in 2009 compared with 2008.

Details: London: CIFAS - The UK's Fraud Prevention Services, 2010. 46p.

Source: Internet Resource: Accessed September 7, 2010 at: http://www.cifas.org.uk/download/Fraudscape-February_2010.pdf

Year: 2010

Country: United Kingdom

URL: http://www.cifas.org.uk/download/Fraudscape-February_2010.pdf

Shelf Number: 119769

Keywords:
Fraud
Identity Fraud
Mail Order Fraud
Mortgage Frauds

Author: Hutchings, Alice

Title: Review of Computer Chip Identification Systems

Summary: This paper reviews the key literature relating to embedded computer chip identification systems such as those used in smartcards and ePassports. It identifies social, policy and legal issues associated with their use, particularly as they relate to the Australian context. Computer chip identification systems, while offering many benefits, may contain valuable personal data and/or provide access to restricted areas. Therefore, the use of this technology has potential implications for the commission of offences such as identity theft, identify fraud and even terrorism. Embedded computer chip identification systems are considered to be a countermeasure against identity theft as they include additional security measures compared to their predecessors (e.g. magnetic strip cards). However, due to the nature of the records that may be stored on the chip, including identification information and biometric data, they are valuable to offenders and breaches of their security may actually facilitate this type of offence. Choo, Smith and McCusker (2007, p. xiii) predict that “the future will also see new hardware devices and software programs that seek to compromise the quality of data-protection mechanisms used in smartcards”. This paper provides an overview of computer chip identification systems, discusses potential vulnerabilities relating to the misuse of this technology, and the regimes for data protection and privacy, including the technical standards that apply in Australia and internationally.

Details: Nathan, QLD: ARC Centre of Excellence in Policing and Security, 2010. 8p.

Source: Internet Resource: Briefing Paper, Issue 1: Accessed July 20, 2011 at: http://www.ceps.edu.au/files/file/No_%201%20Alice%20Hutchings.pdf

Year: 2010

Country: Australia

URL: http://www.ceps.edu.au/files/file/No_%201%20Alice%20Hutchings.pdf

Shelf Number: 122117

Keywords:
Computer Crimes (Australia)
Computer Security
Identity Fraud
Identity Theft
Terrorism