NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
NESTA Crime Online - University of Brighton Repository
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
penalties for those who make fraudulent applications (for example for passports) are<br />
very small. 49 Identity fraud occurs when the misappropriated identity is actually used in<br />
criminal activity, to obtain goods or services by deception, generally for financial gain.<br />
This is a criminal <strong>of</strong>fence in the UK.<br />
ID theft generally combines online and <strong>of</strong>fline methods. <strong>Online</strong> methods include stealing<br />
personal information stored in computer databases (using Trojans or hacking); or<br />
through phishing, vishing and pharming (see glossary). Offline methods include<br />
intercepting bills and bank documents from the post and rubbish bins. These techniques<br />
allow cybercriminals to obtain Social Security numbers, bank or credit card account<br />
numbers, phone numbers, addresses, birth dates, usernames and passwords; all<br />
information that criminals can use to perform illicit transactions with another person's<br />
identity. 50 According to CIFAS, the top three false or stolen documents used by<br />
fraudsters attempting identity fraud in 2006 were: utility bills, passports and bank<br />
statements. 51<br />
The full scope <strong>of</strong> the impact <strong>of</strong> ID fraud is hard to measure, since this type <strong>of</strong> crime can<br />
take months to be noticed by the victim and be reported. Available financial<br />
compensation and legislative measures do not account for the cost in recovering the<br />
reputation <strong>of</strong> the victims (particularly their credit rating). The impact <strong>of</strong> identity fraud<br />
varies substantially. CIFAS reported that it can take between three and 48 hours <strong>of</strong> work<br />
for a typical victim to sort out their life and clear their name but in cases <strong>of</strong> 'total hijack'<br />
where many <strong>of</strong> their details are stolen it can take 20-30 different organisations, over<br />
200 hours and up to £8,000 to recover from the consequences <strong>of</strong> the fraud. 52 However,<br />
financial institutions and lending organisations are <strong>of</strong>ten considered to be the real<br />
49 Cabinet Office, (2002), “Identity Fraud: a study”, p.4.<br />
50 With even the most basic information, a criminal can either take over another person’s existing financial<br />
accounts or use somebody’s identity to create new ones. Common fraudster activities include withdrawing<br />
funds from your accounts, charging purchases to your credit cards, opening up new telephone accounts or<br />
taking out loans in your name, all <strong>of</strong> which can have a damaging effect on the victim’s credit rating.<br />
51 CIFAS website: www.cifas.org.uk.<br />
52 See www.cifas.org.uk/.<br />
Page 21