27.03.2019 Views

Organized Crime In The New Millennium

Organized Crime In The New Millennium

Organized Crime In The New Millennium

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>The</strong> 14039 Form to the IRSis a form that will help one fight against a theft like tax theft.<br />

This form will put the IRS on alert and someone who believed they have been a victim<br />

of tax related theft will be given a Identity Protection Personal Identification Number (IP<br />

PIN), which is a 6 digit code used in replace of a SSN for filing tax returns.<br />

Techniques for Obtaining and Exploiting Personal <strong>In</strong>formation for Identity <strong>The</strong>ft<br />

Identity thieves typically obtain and exploit personally identifiable information about<br />

individuals, or various credentials they use to authenticate themselves, in order to<br />

impersonate them. Examples include:<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

Rummaging through rubbish for personal information (dumpster diving)<br />

Retrieving personal data from redundant IT equipment and storage media<br />

including PCs, servers, PDAs, mobile phones, USB memory sticks and hard<br />

drives that have been disposed of carelessly at public dump sites, given away or<br />

sold on without having been properly sanitized<br />

Using public records about individual citizens, published in official registers such<br />

as electoral rolls [23]<br />

Stealing bank or credit cards, identification cards, passports, authentication<br />

tokens ... typically by pickpocketing, housebreaking or mail theft<br />

Common-knowledge questioning schemes that offer account verification and<br />

compromise: "What's your mother's maiden name?", "what was your first car<br />

model?", or "What was your first pet's name?", etc.<br />

Skimming information from bank or credit cards using compromised or hand-held<br />

card readers, and creating clone cards<br />

Using 'contactless' credit card readers to acquire data wirelessly from RFIDenabled<br />

passports<br />

Shoulder-Surfing, involves an individual who discreetly watches or hears others<br />

providing valuable personal information. This is particularly done in crowded<br />

places because it is relatively easy to observe someone as they fill out forms,<br />

enter PIN numbers on ATMs or even type passwords on smartphones.<br />

Stealing personal information from computers using breaches in browser security<br />

or malware such as Trojan horse keystroke logging programs or other forms of<br />

spyware<br />

Hacking computer networks, systems and databases to obtain personal data,<br />

often in large quantities<br />

Page 138 of 372

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!