O'Reilly logo

How Personal & Internet Security Work by Preston Gralla

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 18. How Identity Theft Works

How Identity Theft Works

One of the most well-publicized threats to personal security in recent years has been identity theft, in which someone’s private financial information is stolen and then used illegally.

This information can be used in a variety of ways. In the simplest way, someone uses the stolen credit card or bank account. However, the information can also be used to open bank accounts, get new credit cards, and take out bank loans in the victim’s name—and the criminal gets off scot-free, while the victim may have to spend years clearing his name.

Identity theft can also be used by terrorists or illegal aliens who want to establish ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required