Deck 5: Identity Theft and Identity Fraud

Full screen (f)
exit full mode
Question
If someone found a lost driver's license and then used it to open multiple bank accounts and commit tax-related fraud, which type of identity theft/fraud was committed?

A) reverse criminal record identity theft
B) criminal record identity theft/fraud
C) virtual identity theft/fraud
D) credit identity theft/fraud
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is the most general problem faced by American law enforcement and government officials who want to eradicate identity fraud/theft?

A) the rise of terrorists and organized crime groups
B) the increasing use of compound surnames
C) the trend toward removing social security numbers from drivers licenses
D) the boundless nature of the Internet
Question
Which of the following is NOT a category of phishing attacks?

A) redirectors
B) pharming
C) botnets
D) spoofing
Question
Which of the following is true regarding bag operations as a physical method of identity theft?

A) They include sifting through commercial or residential trash or waste for information deemed valuable.
B) They are typically conducted by the host government's security or intelligence services.
C) They are executed by depositing personal documents in unlocked containers on the side of the road until they are retrieved.
D) They involve the creation of shell companies that engage in the collection of personal financial information.
Question
Which of the following is true regarding the theft of computers as a physical method of identity theft?

A) Physical theft of computers is the least common technique employed by identity thieves.
B) Individuals without technical expertise cannot successfully execute this physical method of identity theft.
C) Areas particularly vulnerable to theft of computers include private residences and recreation centers.
D) Theft of computers does not alleviate the need to analyze and organize voluminous paper documents.
Question
Which of the following types of identity theft/fraud is defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts?

A) virtual identity theft/fraud
B) criminal record identity theft/fraud
C) theft for employment and/or border entry
D) credit identity theft/fraud
Question
Which of the following is a disadvantage of using SpyBuddy to steal passwords?

A) It may be detected by software.
B) It is hard to install and remove.
C) It initiates after start-up.
D) It is attached to a local machine.
Question
Which of the following types of identity theft/fraud is a person engaged in if he created a fictitious profile on a social networking site so as to facilitate an extramarital affair?

A) criminal record identity theft/fraud
B) assumption of identity
C) credit or financial theft
D) virtual identity theft/fraud
Question
Which of the following examples may be classified as identity fraud?

A) You are wrongfully accused of a crime committed by an impostor.
B) Your phone bill reflects long distance charges you did not make.
C) You have documents that helped you illegally immigrate into the country.
D) You use a fake name to make a restaurant reservation.
Question
Which of the following is true regarding Trojans?

A) They provide a mechanism for cybercriminals to change Web site IP addresses.
B) They are malicious programs that redirect users' network traffic to undesired sites.
C) They record every keystroke, including BIOS passwords, and are undetectable by software.
D) They are potentially unwanted and are often housed with commercial utilities.
Question
Which of the following is NOT a reason why lenders have often confounded law enforcement by their reluctance to join in the efforts to combat identity threat/fraud?

A) Consumers are unconcerned and won't take steps to protect their accounts.
B) Lenders are singularly motivated by capitalism.
C) Benefits flow to them from easily available credit.
D) Lenders willingly absorb costs associated with identity theft/fraud.
Question
Which of the following physical methods of identity theft involves the surreptitious entry into hotel rooms to steal, photograph, or photocopy documents?

A) bag operations
B) insiders
C) card skimming
D) dumpster diving
Question
Which of the following is true regarding keyloggers?

A) They are designed to capture passwords and other private information.
B) They are designed to recover lost work in the case of computer problems.
C) They are designed to use company trademarks to represent a legitimate institution.
D) They are designed for worthwhile goals like parental control.
Question
Paper shredders and disk-wiping software are means to avoid which of the following physical methods of identity theft?

A) mail theft
B) bag operations
C) ATM manipulation
D) dumpster diving
Question
Which of the following types of identity theft/fraud is by far the most common and also the most feared by the American public?

A) credit identity theft/fraud
B) assumption of identity
C) theft for employment and/or border entry
D) virtual identity theft/fraud
Question
"Popcorning" is a technique used in which of the following physical methods of identity theft?

A) child identity theft
B) mail theft
C) fraudulent or fictitious companies
D) theft of computers
Question
Which of the following is an example of a bag operation?

A) A person surreptitiously enters a suspect's hotel room to download information from the suspect's laptop computer.
B), A person retrieves a bag full of documents containing personal and financial information from his neighbor's mailbox.
C) A logistics manager is accused of losing tapes containing personal information of government employees during shipment.
D) A person is found sifting through bags of commercial trash, looking for passwords, computer systems, and software.
Question
An upstanding citizen with no police record, Jonathan discovers that a past acquaintance who's now a career criminal is claiming Jonathan's identity.What form of identity theft/threat is Jonathan a victim of?

A) assumption of identity
B) theft for employment
C) reverse criminal record identity theft
D) credit identity theft/fraud
Question
Which of the following best distinguishes identity theft?

A) Identity theft is the illegal use or transfer of a third party's personal identification information with unlawful intent.
B) Identity theft encompasses identity fraud within its purview.
C) Identity theft involves any attempts by minors to use fake IDs to purchase alcohol or gain access to nightclubs or gambling establishments.
D) Identity theft is a vast array of illegal activities based on fraudulent use of identifying information of a real or fictitious person.
Question
Which of the following statements correctly distinguishes between identity theft and identity fraud?

A) Identity fraud is always a victimless crime.
B) Identity fraud may involve the fabrication of identity information based on a fictitious person.
C) Identity theft may be done for criminal purposes.
D) Identity theft does not utilize historical or biometric information.
Question
According to victim reports, 42 percent of identity theft involved cases involving the procurement of government documents or benefits.
Question
An individual who creates a false virtual identity has automatically crossed the line into illegal activity.
Question
Which of the following would NOT be classified under insurance and loan fraud?

A) enrolling in distance education and online courses using fake identities
B) creating multiple accounts with a bank to commit-tax related fraud
C) dropping out of community colleges upon receiving government loans for education
D) obtaining free medical care by procuring a victim's personal information
Question
The Visa Waiver Pilot Program (VWPP) caused the most recent surge in which of the following fraudulent activities?

A) credit card fraud
B) immigration benefit fraud
C) alien smuggling
D) trafficking
Question
Which of the following are most often used fraudulently to obtain immigration benefits?

A) student ID
B) drivers' licenses
C) documentation of residency
D) credit cards
Question
According to the Federal Trade Commission, there is a marked increase in the number of children victimized by identity theft since 2003.
Question
Reverse criminal record identity theft/fraud is relatively uncommon and the immediate financial repercussions are usually not significant.
Question
A full accounting of the prevalence of identity theft has been confounded by the lack of mandatory reporting and inconsistent application by federal agencies.
Question
Identity fraud is committed when a credible identity is created by accessing others' credit cards, financial or employment records, or computer system.
Question
Assumption of identity is the most common form of identity theft/fraud.
Question
Which of the following types of fraud is most likely to involve faked work permits and green cards?

A) insurance fraud
B) identity fraud
C) computer fraud
D) immigration fraud
Question
An individual who has been a victim of reverse criminal record identity theft does not face legal obstacles to his or her identity rehabilitation.
Question
Costs associated with identity theft/fraud are incurred by the individual victim but not the financial institution or lender extending money or credit based on fraudulent identity.
Question
To safeguard belongings and identity from dedicated criminals, it is important to develop alternate means of identity authentication.
Question
Bag operations involve sifting through commercial or residential trash or waste for information deemed valuable.
Question
Today an identity thief is often remote from the victim.How does this pose a special problem to law enforcement?

A) Victims often don't care if a person is using their identity in a distant state.
B) Jurisdictional questions often confound local authorities.
C) The federal government can't prosecute identity thieves who work exclusively online.
D) Only a few states have passed laws forbidding Internet-facilitated identity theft and fraud.
Question
Consumers are encouraged to use different ATM machines for every transaction in order to reduce fraud caused by ATM manipulation.
Question
Theft for border entry involves the willful misrepresentation of material fact on a petition or application to secure an immigration benefit.
Question
Hardware keyloggers provide screen-capture features, which users can utilize to view screenshot images of victim activity.
Question
Procurement of one foundational document of identification is often enough for its holder to secure a variety of others.
Question
________ involves the reading and recording of personal information encoded on the magnetic strip of an ATM or credit card.
Question
How can identity theft be distinguished from identity fraud? Is it true that identity theft leads to identity fraud? Explain with an example of your own.
Question
________ identity theft/fraud may be defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts.
Question
Passports, birth certificates, and social security cards are all examples of ________ documents.
Question
In the technique known as ________, thieves often score credit card numbers and banking information by targeting those whose red flag signals outgoing mail.
Question
Exact government figures and statistics on identity theft/fraud are not available due primarily to a lack of ________ and the criminal multiplicity of the phenomenon.
Question
________ and other forms of malware are often referred to as PUPS (potentially unwanted programs).
Question
________ is defined as the use of a vast array of illegal activities based on fraudulent use of identifying information of a real or fictitious person.
Question
________ provide a mechanism for cybercriminals to change Web site IP addresses repeatedly without affecting the domain name.
Question
________ identity theft/fraud occurs when a criminal uses a victim's identity not to engage in criminal activity but to seek gainful employment.
Question
________ is defined as the illegal use or transfer of a third party's personal identification information with unlawful intent.
Question
________ may be conducted by either individuals or criminal organizations to secure border crossings, obtain immigration benefits, or further terrorist activity.
Question
Many authorities suggest that corporate and government ________ pose the greatest risk to identity fraud with varying motivations and unintentional facilitation.
Question
________ is a broad class of software that is surreptitiously installed on a user's machine to intercept the interaction between users and their computers.
Question
How do college students become victims of insurance and loan fraud? Offer suggestions on how students can minimize or overcome this victimization.
Question
________ involves the fraudulent use of stolen or fictitious personal information to obtain employment or to gain entry into the United States.
Question
In ________, some individuals willingly divulge personal and financial information to strangers if they believe that a large financial windfall will soon follow.
Question
List and explain the four phases of criminal activity facilitated by identity theft/fraud.
Question
Discuss the various crimes that are easily facilitated by identity theft/fraud.What, in your opinion, should be the measures taken by the government to eradicate such crimes?
Question
Assess the virtual or Internet-facilitated methods by which computer criminals steal an identity.Elaborate with examples of your own.
Question
Match between columns
419 fraud
using company trademarks and logos in emails for online scams
419 fraud
developing Javascript replicas that are variations of legitimate URLs
419 fraud
changing a Web site IP repeatedly without affecting the domain name
419 fraud
redirecting users' network traffic to undesired sites
419 fraud
giving money to strangers who promise a larger sum in retuin
Botnets
using company trademarks and logos in emails for online scams
Botnets
developing Javascript replicas that are variations of legitimate URLs
Botnets
changing a Web site IP repeatedly without affecting the domain name
Botnets
redirecting users' network traffic to undesired sites
Botnets
giving money to strangers who promise a larger sum in retuin
Redirectors
using company trademarks and logos in emails for online scams
Redirectors
developing Javascript replicas that are variations of legitimate URLs
Redirectors
changing a Web site IP repeatedly without affecting the domain name
Redirectors
redirecting users' network traffic to undesired sites
Redirectors
giving money to strangers who promise a larger sum in retuin
Floating windows
using company trademarks and logos in emails for online scams
Floating windows
developing Javascript replicas that are variations of legitimate URLs
Floating windows
changing a Web site IP repeatedly without affecting the domain name
Floating windows
redirecting users' network traffic to undesired sites
Floating windows
giving money to strangers who promise a larger sum in retuin
Spoofing
using company trademarks and logos in emails for online scams
Spoofing
developing Javascript replicas that are variations of legitimate URLs
Spoofing
changing a Web site IP repeatedly without affecting the domain name
Spoofing
redirecting users' network traffic to undesired sites
Spoofing
giving money to strangers who promise a larger sum in retuin
Question
Match between columns
Virtual identity fraud
Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason.
Virtual identity fraud
Ashley stole personal information from her neighbor to create documents that helped her gain entiy into the United States.
Virtual identity fraud
To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.
Virtual identity fraud
Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation.
Virtual identity fraud
Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards.
Reverse criminal record identity theft
Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason.
Reverse criminal record identity theft
Ashley stole personal information from her neighbor to create documents that helped her gain entiy into the United States.
Reverse criminal record identity theft
To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.
Reverse criminal record identity theft
Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation.
Reverse criminal record identity theft
Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards.
Assumption of identity
Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason.
Assumption of identity
Ashley stole personal information from her neighbor to create documents that helped her gain entiy into the United States.
Assumption of identity
To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.
Assumption of identity
Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation.
Assumption of identity
Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards.
Credit or financial theft
Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason.
Credit or financial theft
Ashley stole personal information from her neighbor to create documents that helped her gain entiy into the United States.
Credit or financial theft
To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.
Credit or financial theft
Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation.
Credit or financial theft
Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards.
Theft for employment
Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason.
Theft for employment
Ashley stole personal information from her neighbor to create documents that helped her gain entiy into the United States.
Theft for employment
To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.
Theft for employment
Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation.
Theft for employment
Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Identity Theft and Identity Fraud
1
If someone found a lost driver's license and then used it to open multiple bank accounts and commit tax-related fraud, which type of identity theft/fraud was committed?

A) reverse criminal record identity theft
B) criminal record identity theft/fraud
C) virtual identity theft/fraud
D) credit identity theft/fraud
D
2
Which of the following is the most general problem faced by American law enforcement and government officials who want to eradicate identity fraud/theft?

A) the rise of terrorists and organized crime groups
B) the increasing use of compound surnames
C) the trend toward removing social security numbers from drivers licenses
D) the boundless nature of the Internet
D
3
Which of the following is NOT a category of phishing attacks?

A) redirectors
B) pharming
C) botnets
D) spoofing
C
4
Which of the following is true regarding bag operations as a physical method of identity theft?

A) They include sifting through commercial or residential trash or waste for information deemed valuable.
B) They are typically conducted by the host government's security or intelligence services.
C) They are executed by depositing personal documents in unlocked containers on the side of the road until they are retrieved.
D) They involve the creation of shell companies that engage in the collection of personal financial information.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is true regarding the theft of computers as a physical method of identity theft?

A) Physical theft of computers is the least common technique employed by identity thieves.
B) Individuals without technical expertise cannot successfully execute this physical method of identity theft.
C) Areas particularly vulnerable to theft of computers include private residences and recreation centers.
D) Theft of computers does not alleviate the need to analyze and organize voluminous paper documents.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following types of identity theft/fraud is defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts?

A) virtual identity theft/fraud
B) criminal record identity theft/fraud
C) theft for employment and/or border entry
D) credit identity theft/fraud
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following is a disadvantage of using SpyBuddy to steal passwords?

A) It may be detected by software.
B) It is hard to install and remove.
C) It initiates after start-up.
D) It is attached to a local machine.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following types of identity theft/fraud is a person engaged in if he created a fictitious profile on a social networking site so as to facilitate an extramarital affair?

A) criminal record identity theft/fraud
B) assumption of identity
C) credit or financial theft
D) virtual identity theft/fraud
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following examples may be classified as identity fraud?

A) You are wrongfully accused of a crime committed by an impostor.
B) Your phone bill reflects long distance charges you did not make.
C) You have documents that helped you illegally immigrate into the country.
D) You use a fake name to make a restaurant reservation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is true regarding Trojans?

A) They provide a mechanism for cybercriminals to change Web site IP addresses.
B) They are malicious programs that redirect users' network traffic to undesired sites.
C) They record every keystroke, including BIOS passwords, and are undetectable by software.
D) They are potentially unwanted and are often housed with commercial utilities.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is NOT a reason why lenders have often confounded law enforcement by their reluctance to join in the efforts to combat identity threat/fraud?

A) Consumers are unconcerned and won't take steps to protect their accounts.
B) Lenders are singularly motivated by capitalism.
C) Benefits flow to them from easily available credit.
D) Lenders willingly absorb costs associated with identity theft/fraud.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following physical methods of identity theft involves the surreptitious entry into hotel rooms to steal, photograph, or photocopy documents?

A) bag operations
B) insiders
C) card skimming
D) dumpster diving
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is true regarding keyloggers?

A) They are designed to capture passwords and other private information.
B) They are designed to recover lost work in the case of computer problems.
C) They are designed to use company trademarks to represent a legitimate institution.
D) They are designed for worthwhile goals like parental control.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
Paper shredders and disk-wiping software are means to avoid which of the following physical methods of identity theft?

A) mail theft
B) bag operations
C) ATM manipulation
D) dumpster diving
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following types of identity theft/fraud is by far the most common and also the most feared by the American public?

A) credit identity theft/fraud
B) assumption of identity
C) theft for employment and/or border entry
D) virtual identity theft/fraud
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
"Popcorning" is a technique used in which of the following physical methods of identity theft?

A) child identity theft
B) mail theft
C) fraudulent or fictitious companies
D) theft of computers
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is an example of a bag operation?

A) A person surreptitiously enters a suspect's hotel room to download information from the suspect's laptop computer.
B), A person retrieves a bag full of documents containing personal and financial information from his neighbor's mailbox.
C) A logistics manager is accused of losing tapes containing personal information of government employees during shipment.
D) A person is found sifting through bags of commercial trash, looking for passwords, computer systems, and software.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
An upstanding citizen with no police record, Jonathan discovers that a past acquaintance who's now a career criminal is claiming Jonathan's identity.What form of identity theft/threat is Jonathan a victim of?

A) assumption of identity
B) theft for employment
C) reverse criminal record identity theft
D) credit identity theft/fraud
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following best distinguishes identity theft?

A) Identity theft is the illegal use or transfer of a third party's personal identification information with unlawful intent.
B) Identity theft encompasses identity fraud within its purview.
C) Identity theft involves any attempts by minors to use fake IDs to purchase alcohol or gain access to nightclubs or gambling establishments.
D) Identity theft is a vast array of illegal activities based on fraudulent use of identifying information of a real or fictitious person.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following statements correctly distinguishes between identity theft and identity fraud?

A) Identity fraud is always a victimless crime.
B) Identity fraud may involve the fabrication of identity information based on a fictitious person.
C) Identity theft may be done for criminal purposes.
D) Identity theft does not utilize historical or biometric information.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
According to victim reports, 42 percent of identity theft involved cases involving the procurement of government documents or benefits.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
An individual who creates a false virtual identity has automatically crossed the line into illegal activity.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following would NOT be classified under insurance and loan fraud?

A) enrolling in distance education and online courses using fake identities
B) creating multiple accounts with a bank to commit-tax related fraud
C) dropping out of community colleges upon receiving government loans for education
D) obtaining free medical care by procuring a victim's personal information
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
The Visa Waiver Pilot Program (VWPP) caused the most recent surge in which of the following fraudulent activities?

A) credit card fraud
B) immigration benefit fraud
C) alien smuggling
D) trafficking
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
Which of the following are most often used fraudulently to obtain immigration benefits?

A) student ID
B) drivers' licenses
C) documentation of residency
D) credit cards
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
According to the Federal Trade Commission, there is a marked increase in the number of children victimized by identity theft since 2003.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
Reverse criminal record identity theft/fraud is relatively uncommon and the immediate financial repercussions are usually not significant.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
A full accounting of the prevalence of identity theft has been confounded by the lack of mandatory reporting and inconsistent application by federal agencies.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
Identity fraud is committed when a credible identity is created by accessing others' credit cards, financial or employment records, or computer system.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
Assumption of identity is the most common form of identity theft/fraud.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following types of fraud is most likely to involve faked work permits and green cards?

A) insurance fraud
B) identity fraud
C) computer fraud
D) immigration fraud
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
An individual who has been a victim of reverse criminal record identity theft does not face legal obstacles to his or her identity rehabilitation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
Costs associated with identity theft/fraud are incurred by the individual victim but not the financial institution or lender extending money or credit based on fraudulent identity.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
To safeguard belongings and identity from dedicated criminals, it is important to develop alternate means of identity authentication.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
Bag operations involve sifting through commercial or residential trash or waste for information deemed valuable.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
Today an identity thief is often remote from the victim.How does this pose a special problem to law enforcement?

A) Victims often don't care if a person is using their identity in a distant state.
B) Jurisdictional questions often confound local authorities.
C) The federal government can't prosecute identity thieves who work exclusively online.
D) Only a few states have passed laws forbidding Internet-facilitated identity theft and fraud.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
Consumers are encouraged to use different ATM machines for every transaction in order to reduce fraud caused by ATM manipulation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
Theft for border entry involves the willful misrepresentation of material fact on a petition or application to secure an immigration benefit.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
Hardware keyloggers provide screen-capture features, which users can utilize to view screenshot images of victim activity.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
Procurement of one foundational document of identification is often enough for its holder to secure a variety of others.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
________ involves the reading and recording of personal information encoded on the magnetic strip of an ATM or credit card.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
How can identity theft be distinguished from identity fraud? Is it true that identity theft leads to identity fraud? Explain with an example of your own.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
________ identity theft/fraud may be defined as the use of stolen personal and financial information to facilitate the creation of fraudulent accounts.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
Passports, birth certificates, and social security cards are all examples of ________ documents.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
In the technique known as ________, thieves often score credit card numbers and banking information by targeting those whose red flag signals outgoing mail.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
Exact government figures and statistics on identity theft/fraud are not available due primarily to a lack of ________ and the criminal multiplicity of the phenomenon.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
________ and other forms of malware are often referred to as PUPS (potentially unwanted programs).
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
________ is defined as the use of a vast array of illegal activities based on fraudulent use of identifying information of a real or fictitious person.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
________ provide a mechanism for cybercriminals to change Web site IP addresses repeatedly without affecting the domain name.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
________ identity theft/fraud occurs when a criminal uses a victim's identity not to engage in criminal activity but to seek gainful employment.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
________ is defined as the illegal use or transfer of a third party's personal identification information with unlawful intent.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
________ may be conducted by either individuals or criminal organizations to secure border crossings, obtain immigration benefits, or further terrorist activity.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
Many authorities suggest that corporate and government ________ pose the greatest risk to identity fraud with varying motivations and unintentional facilitation.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
________ is a broad class of software that is surreptitiously installed on a user's machine to intercept the interaction between users and their computers.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
How do college students become victims of insurance and loan fraud? Offer suggestions on how students can minimize or overcome this victimization.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
________ involves the fraudulent use of stolen or fictitious personal information to obtain employment or to gain entry into the United States.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
In ________, some individuals willingly divulge personal and financial information to strangers if they believe that a large financial windfall will soon follow.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
List and explain the four phases of criminal activity facilitated by identity theft/fraud.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
Discuss the various crimes that are easily facilitated by identity theft/fraud.What, in your opinion, should be the measures taken by the government to eradicate such crimes?
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
Assess the virtual or Internet-facilitated methods by which computer criminals steal an identity.Elaborate with examples of your own.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
419 fraud
using company trademarks and logos in emails for online scams
419 fraud
developing Javascript replicas that are variations of legitimate URLs
419 fraud
changing a Web site IP repeatedly without affecting the domain name
419 fraud
redirecting users' network traffic to undesired sites
419 fraud
giving money to strangers who promise a larger sum in retuin
Botnets
using company trademarks and logos in emails for online scams
Botnets
developing Javascript replicas that are variations of legitimate URLs
Botnets
changing a Web site IP repeatedly without affecting the domain name
Botnets
redirecting users' network traffic to undesired sites
Botnets
giving money to strangers who promise a larger sum in retuin
Redirectors
using company trademarks and logos in emails for online scams
Redirectors
developing Javascript replicas that are variations of legitimate URLs
Redirectors
changing a Web site IP repeatedly without affecting the domain name
Redirectors
redirecting users' network traffic to undesired sites
Redirectors
giving money to strangers who promise a larger sum in retuin
Floating windows
using company trademarks and logos in emails for online scams
Floating windows
developing Javascript replicas that are variations of legitimate URLs
Floating windows
changing a Web site IP repeatedly without affecting the domain name
Floating windows
redirecting users' network traffic to undesired sites
Floating windows
giving money to strangers who promise a larger sum in retuin
Spoofing
using company trademarks and logos in emails for online scams
Spoofing
developing Javascript replicas that are variations of legitimate URLs
Spoofing
changing a Web site IP repeatedly without affecting the domain name
Spoofing
redirecting users' network traffic to undesired sites
Spoofing
giving money to strangers who promise a larger sum in retuin
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
Virtual identity fraud
Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason.
Virtual identity fraud
Ashley stole personal information from her neighbor to create documents that helped her gain entiy into the United States.
Virtual identity fraud
To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.
Virtual identity fraud
Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation.
Virtual identity fraud
Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards.
Reverse criminal record identity theft
Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason.
Reverse criminal record identity theft
Ashley stole personal information from her neighbor to create documents that helped her gain entiy into the United States.
Reverse criminal record identity theft
To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.
Reverse criminal record identity theft
Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation.
Reverse criminal record identity theft
Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards.
Assumption of identity
Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason.
Assumption of identity
Ashley stole personal information from her neighbor to create documents that helped her gain entiy into the United States.
Assumption of identity
To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.
Assumption of identity
Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation.
Assumption of identity
Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards.
Credit or financial theft
Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason.
Credit or financial theft
Ashley stole personal information from her neighbor to create documents that helped her gain entiy into the United States.
Credit or financial theft
To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.
Credit or financial theft
Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation.
Credit or financial theft
Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards.
Theft for employment
Joshua changes physical characteristics, analyzes personal histories, and masters communication nuances of his friend Jason.
Theft for employment
Ashley stole personal information from her neighbor to create documents that helped her gain entiy into the United States.
Theft for employment
To protect herself from her criminal record, Amanda used her mother's ID to apply for government benefits.
Theft for employment
Michelle provided false information about herself and created a fictitious identity so as to engage in online flirtation.
Theft for employment
Matthew used a stolen driver's license to open a fake bank account and acquire false credit cards.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 62 flashcards in this deck.