Chapter 18. How Identity Theft Works
One of the most well-publicized threats to personal security in recent years has been identity theft, in which someone’s private financial information is stolen and then used illegally.
This information can be used in a variety of ways. In the simplest way, someone uses the stolen credit card or bank account. However, the information can also be used to open bank accounts, get new credit cards, and take out bank loans in the victim’s name—and the criminal gets off scot-free, while the victim may have to spend years clearing his name.
Identity theft can also be used by terrorists or illegal aliens who want to establish ...
Get How Personal & Internet Security Work now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.