Jump to navigation Jump to search This article is about the concept of identity theft. For the 2013 hvad er Forex, see Identity Thief.
This article may require cleanup to meet Wikipedia’s quality standards. Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained, and identity theft is not always detectable by the individual victims, according to a report done for the FTC. An October 2010 article entitled “Cyber Crime Made Easy” explained the level to which hackers are using malicious software. As Gunter Ollmann, Chief Technology Officer of security at Microsoft, said, “Interested in credit card theft?
In this situation the identity thief impersonates someone else in order to conceal their own true identity. Examples are illegal immigrants hiding their illegal status, people hiding from creditors or other individuals, and those who simply want to become “anonymous” for personal reasons. When a criminal fraudulently identifies themselves to police as another individual at the point of arrest, it is sometimes referred to as “Criminal Identity Theft. In some cases, criminals have previously obtained state-issued identity documents using credentials stolen from others, or have simply presented a fake ID. It can be difficult for the victim of a criminal identity theft to clear their record.