ID thievery is on the rise

Fletcher, Charlie
June 2000
Catalog Age;Jun2000, Vol. 17 Issue 7, p57
Trade Publication
Explores the increasing incidence of identity theft on the Internet. Use of identifying information to commit fraud or engage in other unlawful activities; Use of the Internet to quickly distribute stolen identifying information; Ways of stealing identifying information.


Related Articles

  • Stick 'em up? Not anymore. Now it's crime by keyboard. Gegax, T. Trent // Newsweek;7/21/1997, Vol. 130 Issue 3, p14 

    Discusses identity theft, an increasingly common crime committed by increasingly sophisticated swindlers. How new technology and widening global trade have opened new cracks in society's defenses; Examples; The threat of electronic money laundering; Computer viruses.

  • Guerilla-style digital warfare possible. Dudley, Gavin // Finance Week;8/16/2002, p43 

    Focuses on the efforts of the South African government to address the threat of digital warfare while securing online privacy. Emergence on high-technology monitoring tools; Agreement signed by the nation with the Council of Europe; Scope and application of the country's Electronic...

  • The crime of the (next) century. Caldwell, Thomas // Computing Japan;May99, Vol. 6 Issue 5, p29 

    Relates a story about computer crime. How the crime was created; Issuance of fake announcements to the media distribution list.

  • lb 15 million boost for e-fraud projects. Prickett, Ruth // Financial Management;Nov2000, p6 

    Focuses on the collaboration of psychologists, social scientists and technology experts in Great Britain in creating a high-technology project for eliminating computer crimes. Importance of electronic commerce security; Cost of the project; Opinion of academics on the project.

  • Preventing cybercrime. Koch, Lewis Z. // Inter@ctive Week;07/10/2000, Vol. 7 Issue 27, p34 

    Discusses ways on how to prevent cybercrimes. Promise of the United States government officials on cybercrimes; Challenge being faced by the government on arresting Internet criminals; Points to consider in cyberforensics.

  • Data doubts in fight against fraud. Day, Karen // Public Finance;05/26/2000, p78 

    Focuses on the potential impact of the Human Rights Act, that would come into force in October 2000, on computer techniques used to fight fraud in the public sector. Warning by Jonathan Bamford, assistant data protection commissioner of the Audit Commission, that councils and departments could...

  • They've got their eyes on us. Korte, Mills // Fairfield County Business Journal;02/19/2001, Vol. 40 Issue 8, p4 

    Discusses the role of the Internet in compromising the privacy of consumers. Inclusion of Search.com's promotion of a service that allows customers and businesses to investigate other people's lives; Marketers' ability to track electronic mail messages created using hypertext markup language...

  • A Picture is Worth...? Considering the Legal Position in the UAE for Publishing Photographs Online.  // Law Update;11/29/2015, p1 

    The article discusses laws in the United Arab Emirates (UAE) covering publication of photographs in the world wide web. Topics discussed include an overview of Federal Law No. 15 for 1980 Concerning Publications and Publishing, the aim of Federal Law No. 5 of 2012 on Combating Cybercrimes to...

  • Labour pains: the birth of a movement. Banisar, David // UNESCO Courier;Mar2001, Vol. 54 Issue 3, p32 

    Focuses on the campaign by a coalition of civil rights and corporate groups against the proposed cybercrime treaty. Reason for the campaign; Emergence of the privacy campaign in the United States; Information on the 1994 Communications Assistance for Law Enforcement Act; International effort to...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics