Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 11:51 am
Time: 11:51 am
Results for identity fraud
3 results foundAuthor: Gordon, Gary R. Title: Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement Summary: "The purpose of this study was to provide empirical evidence on which law enforcement can base enhanced proactive identity theft control and prevention efforts. It focuses on identity theft offenders, which sets it apart from previous surveys and other research which have centered on identity theft victims. As a result of the study of closed United States Secret Service cases with an identity theft component (2000-2006), empirical data concerning the key factors relevant to the criminal behavior of identity thieves and the conditions under which that behavior occurs are available to law enforcement agencies and corporate security and fraud investigators for the first time." Details: Utica, NY: Center for Identity Management and Information Protection, Utica College, 2007. 74p. Source: Internet Resource; Accessed August 17, 2010 at: http://www.utica.edu/academic/institutes/ecii/publications/media/cimip_id_theft_study_oct_22_noon.pdf Year: 2007 Country: United States URL: http://www.utica.edu/academic/institutes/ecii/publications/media/cimip_id_theft_study_oct_22_noon.pdf Shelf Number: 109503 Keywords: Identity FraudIdentity Theft (U.S.)Identity Theft Offenders |
Author: CIFAS Title: Fraudscape: Depicting the UK's Fraud Landscape Summary: This Report examines and assesses the fraud cases identified by CIFAS Member organisations during 2008 and 2009 to ascertain any key differences between the typology of the frauds seen in 2009 compared with 2008. Fraudscape analyses fraud data, by type of fraud committed and product targeted by the fraudster, and presents some key findings: Total frauds increased by nearly 10% in 2009 compared with 2008. A 32% increase in identity fraud (where a fraudster applies in the name of an innocent victim or uses an entirely fictitious identity) has been driven by identity fraudsters targeting bank accounts, communications, and mail order products. Application fraud (the use of material falsehoods - lies - on applications or false documentation) has decreased by over 25% from levels seen in 2008. The 'typical' victim of identity fraud is still the man in his forties, though the increase in women being impersonated, or having their accounts taken over, indicates that now, as never before, anyone can be a potential target. Bank accounts, communications and mail order are the product types with the greatest proportionate increase in fraud in 2009 compared with 2008. Details: London: CIFAS - The UK's Fraud Prevention Services, 2010. 46p. Source: Internet Resource: Accessed September 7, 2010 at: http://www.cifas.org.uk/download/Fraudscape-February_2010.pdf Year: 2010 Country: United Kingdom URL: http://www.cifas.org.uk/download/Fraudscape-February_2010.pdf Shelf Number: 119769 Keywords: FraudIdentity FraudMail Order FraudMortgage Frauds |
Author: Hutchings, Alice Title: Review of Computer Chip Identification Systems Summary: This paper reviews the key literature relating to embedded computer chip identification systems such as those used in smartcards and ePassports. It identifies social, policy and legal issues associated with their use, particularly as they relate to the Australian context. Computer chip identification systems, while offering many benefits, may contain valuable personal data and/or provide access to restricted areas. Therefore, the use of this technology has potential implications for the commission of offences such as identity theft, identify fraud and even terrorism. Embedded computer chip identification systems are considered to be a countermeasure against identity theft as they include additional security measures compared to their predecessors (e.g. magnetic strip cards). However, due to the nature of the records that may be stored on the chip, including identification information and biometric data, they are valuable to offenders and breaches of their security may actually facilitate this type of offence. Choo, Smith and McCusker (2007, p. xiii) predict that “the future will also see new hardware devices and software programs that seek to compromise the quality of data-protection mechanisms used in smartcards”. This paper provides an overview of computer chip identification systems, discusses potential vulnerabilities relating to the misuse of this technology, and the regimes for data protection and privacy, including the technical standards that apply in Australia and internationally. Details: Nathan, QLD: ARC Centre of Excellence in Policing and Security, 2010. 8p. Source: Internet Resource: Briefing Paper, Issue 1: Accessed July 20, 2011 at: http://www.ceps.edu.au/files/file/No_%201%20Alice%20Hutchings.pdf Year: 2010 Country: Australia URL: http://www.ceps.edu.au/files/file/No_%201%20Alice%20Hutchings.pdf Shelf Number: 122117 Keywords: Computer Crimes (Australia)Computer SecurityIdentity FraudIdentity TheftTerrorism |