10.08.2013 Views

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

NESTA Crime Online - University of Brighton Repository

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

penalties for those who make fraudulent applications (for example for passports) are<br />

very small. 49 Identity fraud occurs when the misappropriated identity is actually used in<br />

criminal activity, to obtain goods or services by deception, generally for financial gain.<br />

This is a criminal <strong>of</strong>fence in the UK.<br />

ID theft generally combines online and <strong>of</strong>fline methods. <strong>Online</strong> methods include stealing<br />

personal information stored in computer databases (using Trojans or hacking); or<br />

through phishing, vishing and pharming (see glossary). Offline methods include<br />

intercepting bills and bank documents from the post and rubbish bins. These techniques<br />

allow cybercriminals to obtain Social Security numbers, bank or credit card account<br />

numbers, phone numbers, addresses, birth dates, usernames and passwords; all<br />

information that criminals can use to perform illicit transactions with another person's<br />

identity. 50 According to CIFAS, the top three false or stolen documents used by<br />

fraudsters attempting identity fraud in 2006 were: utility bills, passports and bank<br />

statements. 51<br />

The full scope <strong>of</strong> the impact <strong>of</strong> ID fraud is hard to measure, since this type <strong>of</strong> crime can<br />

take months to be noticed by the victim and be reported. Available financial<br />

compensation and legislative measures do not account for the cost in recovering the<br />

reputation <strong>of</strong> the victims (particularly their credit rating). The impact <strong>of</strong> identity fraud<br />

varies substantially. CIFAS reported that it can take between three and 48 hours <strong>of</strong> work<br />

for a typical victim to sort out their life and clear their name but in cases <strong>of</strong> 'total hijack'<br />

where many <strong>of</strong> their details are stolen it can take 20-30 different organisations, over<br />

200 hours and up to £8,000 to recover from the consequences <strong>of</strong> the fraud. 52 However,<br />

financial institutions and lending organisations are <strong>of</strong>ten considered to be the real<br />

49 Cabinet Office, (2002), “Identity Fraud: a study”, p.4.<br />

50 With even the most basic information, a criminal can either take over another person’s existing financial<br />

accounts or use somebody’s identity to create new ones. Common fraudster activities include withdrawing<br />

funds from your accounts, charging purchases to your credit cards, opening up new telephone accounts or<br />

taking out loans in your name, all <strong>of</strong> which can have a damaging effect on the victim’s credit rating.<br />

51 CIFAS website: www.cifas.org.uk.<br />

52 See www.cifas.org.uk/.<br />

Page 21

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!