CINXE.COM
Identity theft - Wikipedia
<!DOCTYPE html> <html class="client-nojs skin-theme-clientpref-day mf-expand-sections-clientpref-0 mf-font-size-clientpref-small mw-mf-amc-clientpref-0" lang="en" dir="ltr"> <head> <meta charset="UTF-8"> <title>Identity theft - Wikipedia</title> <script>(function(){var className="client-js skin-theme-clientpref-day mf-expand-sections-clientpref-0 mf-font-size-clientpref-small mw-mf-amc-clientpref-0";var cookie=document.cookie.match(/(?:^|; )enwikimwclientpreferences=([^;]+)/);if(cookie){cookie[1].split('%2C').forEach(function(pref){className=className.replace(new RegExp('(^| )'+pref.replace(/-clientpref-\w+$|[^\w-]+/g,'')+'-clientpref-\\w+( |$)'),'$1'+pref+'$2');});}document.documentElement.className=className;}());RLCONF={"wgBreakFrames":false,"wgSeparatorTransformTable":["",""],"wgDigitTransformTable":["",""],"wgDefaultDateFormat":"dmy","wgMonthNames":["","January","February","March","April","May","June","July","August","September","October","November","December"],"wgRequestId":"70515b2b-165b-4e18-a9b1-a6df0b68321e","wgCanonicalNamespace":"","wgCanonicalSpecialPageName":false,"wgNamespaceNumber":0,"wgPageName":"Identity_theft","wgTitle":"Identity theft","wgCurRevisionId":1254174347,"wgRevisionId":1254174347,"wgArticleId":180609, "wgIsArticle":true,"wgIsRedirect":false,"wgAction":"view","wgUserName":null,"wgUserGroups":["*"],"wgPageViewLanguage":"en","wgPageContentLanguage":"en","wgPageContentModel":"wikitext","wgRelevantPageName":"Identity_theft","wgRelevantArticleId":180609,"wgIsProbablyEditable":true,"wgRelevantPageIsProbablyEditable":true,"wgRestrictionEdit":[],"wgRestrictionMove":[],"wgNoticeProject":"wikipedia","wgCiteReferencePreviewsActive":false,"wgFlaggedRevsParams":{"tags":{"status":{"levels":1}}},"wgMediaViewerOnClick":true,"wgMediaViewerEnabledByDefault":true,"wgPopupsFlags":0,"wgVisualEditor":{"pageLanguageCode":"en","pageLanguageDir":"ltr","pageVariantFallbacks":"en"},"wgMFMode":"stable","wgMFAmc":false,"wgMFAmcOutreachActive":false,"wgMFAmcOutreachUserEligible":false,"wgMFLazyLoadImages":true,"wgMFEditNoticesFeatureConflict":false,"wgMFDisplayWikibaseDescriptions":{"search":true,"watchlist":true,"tagline":false,"nearby":true},"wgMFIsSupportedEditRequest":true,"wgMFScriptPath":"", "wgWMESchemaEditAttemptStepOversample":false,"wgWMEPageLength":70000,"wgRelatedArticlesCompat":[],"wgCentralAuthMobileDomain":true,"wgEditSubmitButtonLabelPublish":true,"wgSectionTranslationMissingLanguages":[{"lang":"ace","autonym":"Acèh","dir":"ltr"},{"lang":"ady","autonym":"адыгабзэ","dir":"ltr"},{"lang":"alt","autonym":"алтай тил","dir":"ltr"},{"lang":"am","autonym":"አማርኛ","dir":"ltr"},{"lang":"ami","autonym":"Pangcah","dir":"ltr"},{"lang":"an","autonym":"aragonés","dir":"ltr"},{"lang":"ang","autonym":"Ænglisc","dir":"ltr"},{"lang":"ann","autonym":"Obolo","dir":"ltr"},{"lang":"anp","autonym":"अंगिका","dir":"ltr"},{"lang":"ary","autonym":"الدارجة","dir":"rtl"},{"lang":"arz","autonym":"مصرى","dir":"rtl"},{"lang":"as","autonym":"অসমীয়া","dir":"ltr"},{"lang":"ast","autonym":"asturianu","dir":"ltr"},{"lang":"av","autonym":"авар","dir":"ltr"},{"lang":"avk","autonym":"Kotava","dir":"ltr"},{"lang":"awa","autonym": "अवधी","dir":"ltr"},{"lang":"ay","autonym":"Aymar aru","dir":"ltr"},{"lang":"az","autonym":"azərbaycanca","dir":"ltr"},{"lang":"azb","autonym":"تۆرکجه","dir":"rtl"},{"lang":"ba","autonym":"башҡортса","dir":"ltr"},{"lang":"ban","autonym":"Basa Bali","dir":"ltr"},{"lang":"bar","autonym":"Boarisch","dir":"ltr"},{"lang":"bbc","autonym":"Batak Toba","dir":"ltr"},{"lang":"bcl","autonym":"Bikol Central","dir":"ltr"},{"lang":"bdr","autonym":"Bajau Sama","dir":"ltr"},{"lang":"be","autonym":"беларуская","dir":"ltr"},{"lang":"bew","autonym":"Betawi","dir":"ltr"},{"lang":"bg","autonym":"български","dir":"ltr"},{"lang":"bho","autonym":"भोजपुरी","dir":"ltr"},{"lang":"bi","autonym":"Bislama","dir":"ltr"},{"lang":"bjn","autonym":"Banjar","dir":"ltr"},{"lang":"blk","autonym":"ပအိုဝ်ႏဘာႏသာႏ","dir":"ltr"},{"lang":"bm","autonym":"bamanankan","dir":"ltr"},{"lang":"bn","autonym":"বাংলা","dir":"ltr"},{"lang":"bo", "autonym":"བོད་ཡིག","dir":"ltr"},{"lang":"bpy","autonym":"বিষ্ণুপ্রিয়া মণিপুরী","dir":"ltr"},{"lang":"br","autonym":"brezhoneg","dir":"ltr"},{"lang":"bs","autonym":"bosanski","dir":"ltr"},{"lang":"btm","autonym":"Batak Mandailing","dir":"ltr"},{"lang":"bug","autonym":"Basa Ugi","dir":"ltr"},{"lang":"cdo","autonym":"閩東語 / Mìng-dĕ̤ng-ngṳ̄","dir":"ltr"},{"lang":"ce","autonym":"нохчийн","dir":"ltr"},{"lang":"ceb","autonym":"Cebuano","dir":"ltr"},{"lang":"ch","autonym":"Chamoru","dir":"ltr"},{"lang":"chr","autonym":"ᏣᎳᎩ","dir":"ltr"},{"lang":"ckb","autonym":"کوردی","dir":"rtl"},{"lang":"co","autonym":"corsu","dir":"ltr"},{"lang":"cr","autonym":"Nēhiyawēwin / ᓀᐦᐃᔭᐍᐏᐣ","dir":"ltr"},{"lang":"crh","autonym":"qırımtatarca","dir":"ltr"},{"lang":"cu","autonym":"словѣньскъ / ⰔⰎⰑⰂⰡⰐⰠⰔⰍⰟ","dir":"ltr"},{"lang":"cy","autonym":"Cymraeg","dir":"ltr"},{"lang":"dag","autonym" :"dagbanli","dir":"ltr"},{"lang":"dga","autonym":"Dagaare","dir":"ltr"},{"lang":"din","autonym":"Thuɔŋjäŋ","dir":"ltr"},{"lang":"diq","autonym":"Zazaki","dir":"ltr"},{"lang":"dsb","autonym":"dolnoserbski","dir":"ltr"},{"lang":"dtp","autonym":"Kadazandusun","dir":"ltr"},{"lang":"dv","autonym":"ދިވެހިބަސް","dir":"rtl"},{"lang":"dz","autonym":"ཇོང་ཁ","dir":"ltr"},{"lang":"ee","autonym":"eʋegbe","dir":"ltr"},{"lang":"el","autonym":"Ελληνικά","dir":"ltr"},{"lang":"eml","autonym":"emiliàn e rumagnòl","dir":"ltr"},{"lang":"eu","autonym":"euskara","dir":"ltr"},{"lang":"fat","autonym":"mfantse","dir":"ltr"},{"lang":"ff","autonym":"Fulfulde","dir":"ltr"},{"lang":"fj","autonym":"Na Vosa Vakaviti","dir":"ltr"},{"lang":"fo","autonym":"føroyskt","dir":"ltr"},{"lang":"fon","autonym":"fɔ̀ngbè","dir":"ltr"},{"lang":"frp","autonym":"arpetan","dir":"ltr"},{"lang":"frr","autonym":"Nordfriisk","dir":"ltr"},{"lang":"fur","autonym":"furlan","dir":"ltr"},{"lang":"fy", "autonym":"Frysk","dir":"ltr"},{"lang":"gag","autonym":"Gagauz","dir":"ltr"},{"lang":"gan","autonym":"贛語","dir":"ltr"},{"lang":"gcr","autonym":"kriyòl gwiyannen","dir":"ltr"},{"lang":"glk","autonym":"گیلکی","dir":"rtl"},{"lang":"gn","autonym":"Avañe'ẽ","dir":"ltr"},{"lang":"gom","autonym":"गोंयची कोंकणी / Gõychi Konknni","dir":"ltr"},{"lang":"gor","autonym":"Bahasa Hulontalo","dir":"ltr"},{"lang":"gpe","autonym":"Ghanaian Pidgin","dir":"ltr"},{"lang":"gu","autonym":"ગુજરાતી","dir":"ltr"},{"lang":"guc","autonym":"wayuunaiki","dir":"ltr"},{"lang":"gur","autonym":"farefare","dir":"ltr"},{"lang":"guw","autonym":"gungbe","dir":"ltr"},{"lang":"gv","autonym":"Gaelg","dir":"ltr"},{"lang":"ha","autonym":"Hausa","dir":"ltr"},{"lang":"hak","autonym":"客家語 / Hak-kâ-ngî","dir":"ltr"},{"lang":"haw","autonym":"Hawaiʻi","dir":"ltr"},{"lang":"hif","autonym":"Fiji Hindi","dir":"ltr"},{"lang":"hsb","autonym":"hornjoserbsce","dir":"ltr"},{"lang": "ht","autonym":"Kreyòl ayisyen","dir":"ltr"},{"lang":"hy","autonym":"հայերեն","dir":"ltr"},{"lang":"hyw","autonym":"Արեւմտահայերէն","dir":"ltr"},{"lang":"ia","autonym":"interlingua","dir":"ltr"},{"lang":"iba","autonym":"Jaku Iban","dir":"ltr"},{"lang":"ie","autonym":"Interlingue","dir":"ltr"},{"lang":"ig","autonym":"Igbo","dir":"ltr"},{"lang":"igl","autonym":"Igala","dir":"ltr"},{"lang":"ilo","autonym":"Ilokano","dir":"ltr"},{"lang":"io","autonym":"Ido","dir":"ltr"},{"lang":"is","autonym":"íslenska","dir":"ltr"},{"lang":"iu","autonym":"ᐃᓄᒃᑎᑐᑦ / inuktitut","dir":"ltr"},{"lang":"jam","autonym":"Patois","dir":"ltr"},{"lang":"jv","autonym":"Jawa","dir":"ltr"},{"lang":"ka","autonym":"ქართული","dir":"ltr"},{"lang":"kaa","autonym":"Qaraqalpaqsha","dir":"ltr"},{"lang":"kab","autonym":"Taqbaylit","dir":"ltr"},{"lang":"kbd","autonym":"адыгэбзэ","dir":"ltr"},{"lang":"kbp","autonym":"Kabɩyɛ","dir":"ltr"},{"lang":"kcg","autonym":"Tyap", "dir":"ltr"},{"lang":"kg","autonym":"Kongo","dir":"ltr"},{"lang":"kge","autonym":"Kumoring","dir":"ltr"},{"lang":"ki","autonym":"Gĩkũyũ","dir":"ltr"},{"lang":"kk","autonym":"қазақша","dir":"ltr"},{"lang":"kl","autonym":"kalaallisut","dir":"ltr"},{"lang":"km","autonym":"ភាសាខ្មែរ","dir":"ltr"},{"lang":"kn","autonym":"ಕನ್ನಡ","dir":"ltr"},{"lang":"koi","autonym":"перем коми","dir":"ltr"},{"lang":"krc","autonym":"къарачай-малкъар","dir":"ltr"},{"lang":"ks","autonym":"कॉशुर / کٲشُر","dir":"rtl"},{"lang":"ku","autonym":"kurdî","dir":"ltr"},{"lang":"kus","autonym":"Kʋsaal","dir":"ltr"},{"lang":"kv","autonym":"коми","dir":"ltr"},{"lang":"kw","autonym":"kernowek","dir":"ltr"},{"lang":"ky","autonym":"кыргызча","dir":"ltr"},{"lang":"lad","autonym":"Ladino","dir":"ltr"},{"lang":"lb","autonym":"Lëtzebuergesch","dir":"ltr"},{"lang":"lez","autonym":"лезги","dir":"ltr"},{"lang":"lg","autonym":"Luganda", "dir":"ltr"},{"lang":"li","autonym":"Limburgs","dir":"ltr"},{"lang":"lij","autonym":"Ligure","dir":"ltr"},{"lang":"lld","autonym":"Ladin","dir":"ltr"},{"lang":"lmo","autonym":"lombard","dir":"ltr"},{"lang":"ln","autonym":"lingála","dir":"ltr"},{"lang":"lo","autonym":"ລາວ","dir":"ltr"},{"lang":"lt","autonym":"lietuvių","dir":"ltr"},{"lang":"ltg","autonym":"latgaļu","dir":"ltr"},{"lang":"lv","autonym":"latviešu","dir":"ltr"},{"lang":"mad","autonym":"Madhurâ","dir":"ltr"},{"lang":"mai","autonym":"मैथिली","dir":"ltr"},{"lang":"map-bms","autonym":"Basa Banyumasan","dir":"ltr"},{"lang":"mdf","autonym":"мокшень","dir":"ltr"},{"lang":"mg","autonym":"Malagasy","dir":"ltr"},{"lang":"mhr","autonym":"олык марий","dir":"ltr"},{"lang":"mi","autonym":"Māori","dir":"ltr"},{"lang":"min","autonym":"Minangkabau","dir":"ltr"},{"lang":"ml","autonym":"മലയാളം","dir":"ltr"},{"lang":"mn","autonym":"монгол","dir":"ltr"},{"lang":"mni","autonym": "ꯃꯤꯇꯩ ꯂꯣꯟ","dir":"ltr"},{"lang":"mnw","autonym":"ဘာသာမန်","dir":"ltr"},{"lang":"mos","autonym":"moore","dir":"ltr"},{"lang":"mr","autonym":"मराठी","dir":"ltr"},{"lang":"mrj","autonym":"кырык мары","dir":"ltr"},{"lang":"mt","autonym":"Malti","dir":"ltr"},{"lang":"mwl","autonym":"Mirandés","dir":"ltr"},{"lang":"my","autonym":"မြန်မာဘာသာ","dir":"ltr"},{"lang":"myv","autonym":"эрзянь","dir":"ltr"},{"lang":"mzn","autonym":"مازِرونی","dir":"rtl"},{"lang":"nah","autonym":"Nāhuatl","dir":"ltr"},{"lang":"nan","autonym":"閩南語 / Bân-lâm-gú","dir":"ltr"},{"lang":"nap","autonym":"Napulitano","dir":"ltr"},{"lang":"nb","autonym":"norsk bokmål","dir":"ltr"},{"lang":"nds","autonym":"Plattdüütsch","dir":"ltr"},{"lang":"nds-nl","autonym":"Nedersaksies","dir":"ltr"},{"lang":"ne","autonym":"नेपाली","dir":"ltr"},{"lang":"new","autonym":"नेपाल भाषा","dir":"ltr"},{"lang":"nia","autonym": "Li Niha","dir":"ltr"},{"lang":"nn","autonym":"norsk nynorsk","dir":"ltr"},{"lang":"nqo","autonym":"ߒߞߏ","dir":"rtl"},{"lang":"nr","autonym":"isiNdebele seSewula","dir":"ltr"},{"lang":"nso","autonym":"Sesotho sa Leboa","dir":"ltr"},{"lang":"ny","autonym":"Chi-Chewa","dir":"ltr"},{"lang":"oc","autonym":"occitan","dir":"ltr"},{"lang":"om","autonym":"Oromoo","dir":"ltr"},{"lang":"or","autonym":"ଓଡ଼ିଆ","dir":"ltr"},{"lang":"os","autonym":"ирон","dir":"ltr"},{"lang":"pa","autonym":"ਪੰਜਾਬੀ","dir":"ltr"},{"lang":"pag","autonym":"Pangasinan","dir":"ltr"},{"lang":"pam","autonym":"Kapampangan","dir":"ltr"},{"lang":"pap","autonym":"Papiamentu","dir":"ltr"},{"lang":"pcd","autonym":"Picard","dir":"ltr"},{"lang":"pcm","autonym":"Naijá","dir":"ltr"},{"lang":"pdc","autonym":"Deitsch","dir":"ltr"},{"lang":"pms","autonym":"Piemontèis","dir":"ltr"},{"lang":"pnb","autonym":"پنجابی","dir":"rtl"},{"lang":"ps","autonym":"پښتو","dir":"rtl"},{"lang":"pt","autonym": "português","dir":"ltr"},{"lang":"pwn","autonym":"pinayuanan","dir":"ltr"},{"lang":"qu","autonym":"Runa Simi","dir":"ltr"},{"lang":"rm","autonym":"rumantsch","dir":"ltr"},{"lang":"rn","autonym":"ikirundi","dir":"ltr"},{"lang":"rsk","autonym":"руски","dir":"ltr"},{"lang":"rue","autonym":"русиньскый","dir":"ltr"},{"lang":"rup","autonym":"armãneashti","dir":"ltr"},{"lang":"rw","autonym":"Ikinyarwanda","dir":"ltr"},{"lang":"sa","autonym":"संस्कृतम्","dir":"ltr"},{"lang":"sah","autonym":"саха тыла","dir":"ltr"},{"lang":"sat","autonym":"ᱥᱟᱱᱛᱟᱲᱤ","dir":"ltr"},{"lang":"sc","autonym":"sardu","dir":"ltr"},{"lang":"scn","autonym":"sicilianu","dir":"ltr"},{"lang":"sco","autonym":"Scots","dir":"ltr"},{"lang":"sd","autonym":"سنڌي","dir":"rtl"},{"lang":"se","autonym":"davvisámegiella","dir":"ltr"},{"lang":"sg","autonym":"Sängö","dir":"ltr"},{"lang":"sgs","autonym":"žemaitėška","dir":"ltr"},{"lang":"sh","autonym": "srpskohrvatski / српскохрватски","dir":"ltr"},{"lang":"shi","autonym":"Taclḥit","dir":"ltr"},{"lang":"shn","autonym":"ၽႃႇသႃႇတႆး ","dir":"ltr"},{"lang":"si","autonym":"සිංහල","dir":"ltr"},{"lang":"sk","autonym":"slovenčina","dir":"ltr"},{"lang":"skr","autonym":"سرائیکی","dir":"rtl"},{"lang":"sm","autonym":"Gagana Samoa","dir":"ltr"},{"lang":"smn","autonym":"anarâškielâ","dir":"ltr"},{"lang":"sn","autonym":"chiShona","dir":"ltr"},{"lang":"so","autonym":"Soomaaliga","dir":"ltr"},{"lang":"sq","autonym":"shqip","dir":"ltr"},{"lang":"srn","autonym":"Sranantongo","dir":"ltr"},{"lang":"ss","autonym":"SiSwati","dir":"ltr"},{"lang":"st","autonym":"Sesotho","dir":"ltr"},{"lang":"stq","autonym":"Seeltersk","dir":"ltr"},{"lang":"su","autonym":"Sunda","dir":"ltr"},{"lang":"sw","autonym":"Kiswahili","dir":"ltr"},{"lang":"szl","autonym":"ślůnski","dir":"ltr"},{"lang":"tay","autonym":"Tayal","dir":"ltr"},{"lang":"tcy","autonym":"ತುಳು", "dir":"ltr"},{"lang":"tdd","autonym":"ᥖᥭᥰ ᥖᥬᥲ ᥑᥨᥒᥰ","dir":"ltr"},{"lang":"te","autonym":"తెలుగు","dir":"ltr"},{"lang":"tet","autonym":"tetun","dir":"ltr"},{"lang":"tg","autonym":"тоҷикӣ","dir":"ltr"},{"lang":"th","autonym":"ไทย","dir":"ltr"},{"lang":"ti","autonym":"ትግርኛ","dir":"ltr"},{"lang":"tk","autonym":"Türkmençe","dir":"ltr"},{"lang":"tl","autonym":"Tagalog","dir":"ltr"},{"lang":"tly","autonym":"tolışi","dir":"ltr"},{"lang":"tn","autonym":"Setswana","dir":"ltr"},{"lang":"to","autonym":"lea faka-Tonga","dir":"ltr"},{"lang":"tpi","autonym":"Tok Pisin","dir":"ltr"},{"lang":"trv","autonym":"Seediq","dir":"ltr"},{"lang":"ts","autonym":"Xitsonga","dir":"ltr"},{"lang":"tt","autonym":"татарча / tatarça","dir":"ltr"},{"lang":"tum","autonym":"chiTumbuka","dir":"ltr"},{"lang":"tw","autonym":"Twi","dir":"ltr"},{"lang":"ty","autonym":"reo tahiti","dir":"ltr"},{"lang":"tyv","autonym":"тыва дыл","dir":"ltr"},{"lang":"udm", "autonym":"удмурт","dir":"ltr"},{"lang":"uz","autonym":"oʻzbekcha / ўзбекча","dir":"ltr"},{"lang":"ve","autonym":"Tshivenda","dir":"ltr"},{"lang":"vec","autonym":"vèneto","dir":"ltr"},{"lang":"vep","autonym":"vepsän kel’","dir":"ltr"},{"lang":"vi","autonym":"Tiếng Việt","dir":"ltr"},{"lang":"vls","autonym":"West-Vlams","dir":"ltr"},{"lang":"vo","autonym":"Volapük","dir":"ltr"},{"lang":"vro","autonym":"võro","dir":"ltr"},{"lang":"wa","autonym":"walon","dir":"ltr"},{"lang":"war","autonym":"Winaray","dir":"ltr"},{"lang":"wo","autonym":"Wolof","dir":"ltr"},{"lang":"wuu","autonym":"吴语","dir":"ltr"},{"lang":"xal","autonym":"хальмг","dir":"ltr"},{"lang":"xh","autonym":"isiXhosa","dir":"ltr"},{"lang":"xmf","autonym":"მარგალური","dir":"ltr"},{"lang":"yo","autonym":"Yorùbá","dir":"ltr"},{"lang":"yue","autonym":"粵語","dir":"ltr"},{"lang":"za","autonym":"Vahcuengh","dir":"ltr"},{"lang":"zgh","autonym": "ⵜⴰⵎⴰⵣⵉⵖⵜ ⵜⴰⵏⴰⵡⴰⵢⵜ","dir":"ltr"},{"lang":"zu","autonym":"isiZulu","dir":"ltr"}],"wgSectionTranslationTargetLanguages":["ace","ady","alt","am","ami","an","ang","ann","anp","ar","ary","arz","as","ast","av","avk","awa","ay","az","azb","ba","ban","bar","bbc","bcl","bdr","be","bew","bg","bho","bi","bjn","blk","bm","bn","bo","bpy","br","bs","btm","bug","ca","cdo","ce","ceb","ch","chr","ckb","co","cr","crh","cs","cu","cy","da","dag","de","dga","din","diq","dsb","dtp","dv","dz","ee","el","eml","eo","es","et","eu","fa","fat","ff","fi","fj","fo","fon","fr","frp","frr","fur","fy","gag","gan","gcr","gl","glk","gn","gom","gor","gpe","gu","guc","gur","guw","gv","ha","hak","haw","he","hi","hif","hr","hsb","ht","hu","hy","hyw","ia","iba","ie","ig","igl","ilo","io","is","it","iu","ja","jam","jv","ka","kaa","kab","kbd","kbp","kcg","kg","kge","ki","kk","kl","km","kn","ko","koi","krc","ks","ku","kus","kv","kw","ky","lad","lb","lez","lg","li","lij","lld","lmo","ln","lo","lt" ,"ltg","lv","mad","mai","map-bms","mdf","mg","mhr","mi","min","mk","ml","mn","mni","mnw","mos","mr","mrj","ms","mt","mwl","my","myv","mzn","nah","nan","nap","nb","nds","nds-nl","ne","new","nia","nl","nn","nqo","nr","nso","ny","oc","om","or","os","pa","pag","pam","pap","pcd","pcm","pdc","pl","pms","pnb","ps","pt","pwn","qu","rm","rn","ro","rsk","rue","rup","rw","sa","sah","sat","sc","scn","sco","sd","se","sg","sgs","sh","shi","shn","si","sk","skr","sl","sm","smn","sn","so","sq","sr","srn","ss","st","stq","su","sv","sw","szl","ta","tay","tcy","tdd","te","tet","tg","th","ti","tk","tl","tly","tn","to","tpi","tr","trv","ts","tt","tum","tw","ty","tyv","udm","ur","uz","ve","vec","vep","vi","vls","vo","vro","wa","war","wo","wuu","xal","xh","xmf","yi","yo","yue","za","zgh","zh","zu"],"isLanguageSearcherCXEntrypointEnabled":true,"mintEntrypointLanguages":["ace","ast","azb","bcl","bjn","bh","crh","ff","fon","ig","is","ki","ks","lmo","min","sat","ss","tn","vec"],"wgWikibaseItemId":"Q471880", "wgCheckUserClientHintsHeadersJsApi":["brands","architecture","bitness","fullVersionList","mobile","model","platform","platformVersion"],"GEHomepageSuggestedEditsEnableTopics":true,"wgGETopicsMatchModeEnabled":false,"wgGEStructuredTaskRejectionReasonTextInputEnabled":false,"wgGELevelingUpEnabledForUser":false,"wgMinervaPermissions":{"watchable":true,"watch":false},"wgMinervaFeatures":{"beta":false,"donate":true,"mobileOptionsLink":true,"categories":false,"pageIssues":true,"talkAtTop":true,"historyInPageActions":false,"overflowSubmenu":false,"tabsOnSpecials":true,"personalMenu":false,"mainMenuExpanded":false,"echo":true,"nightMode":true},"wgMinervaDownloadNamespaces":[0]};RLSTATE={"ext.globalCssJs.user.styles":"ready","site.styles":"ready","user.styles":"ready","ext.globalCssJs.user":"ready","user":"ready","user.options":"loading","ext.cite.styles":"ready","skins.minerva.styles":"ready","skins.minerva.content.styles.images":"ready","mediawiki.hlist":"ready","skins.minerva.codex.styles": "ready","skins.minerva.icons":"ready","skins.minerva.amc.styles":"ready","ext.wikimediamessages.styles":"ready","mobile.init.styles":"ready","ext.relatedArticles.styles":"ready","wikibase.client.init":"ready","ext.wikimediaBadges":"ready"};RLPAGEMODULES=["ext.cite.ux-enhancements","mediawiki.page.media","site","mediawiki.page.ready","skins.minerva.scripts","ext.centralNotice.geoIP","ext.centralNotice.startUp","ext.gadget.switcher","ext.urlShortener.toolbar","ext.centralauth.centralautologin","ext.popups","mobile.init","ext.echo.centralauth","ext.relatedArticles.readMore.bootstrap","ext.eventLogging","ext.wikimediaEvents","ext.navigationTiming","ext.cx.eventlogging.campaigns","ext.cx.entrypoints.mffrequentlanguages","ext.cx.entrypoints.languagesearcher.init","mw.externalguidance.init","ext.checkUser.clientHints","ext.quicksurveys.init","ext.growthExperiments.SuggestedEditSession","wikibase.sidebar.tracking"];</script> <script>(RLQ=window.RLQ||[]).push(function(){mw.loader.impl(function(){return["user.options@12s5i",function($,jQuery,require,module){mw.user.tokens.set({"patrolToken":"+\\","watchToken":"+\\","csrfToken":"+\\"}); }];});});</script> <link rel="stylesheet" href="/w/load.php?lang=en&modules=ext.cite.styles%7Cext.relatedArticles.styles%7Cext.wikimediaBadges%7Cext.wikimediamessages.styles%7Cmediawiki.hlist%7Cmobile.init.styles%7Cskins.minerva.amc.styles%7Cskins.minerva.codex.styles%7Cskins.minerva.content.styles.images%7Cskins.minerva.icons%2Cstyles%7Cwikibase.client.init&only=styles&skin=minerva"> <script async="" src="/w/load.php?lang=en&modules=startup&only=scripts&raw=1&skin=minerva"></script> <meta name="ResourceLoaderDynamicStyles" content=""> <link rel="stylesheet" href="/w/load.php?lang=en&modules=site.styles&only=styles&skin=minerva"> <meta name="generator" content="MediaWiki 1.44.0-wmf.4"> <meta name="referrer" content="origin"> <meta name="referrer" content="origin-when-cross-origin"> <meta name="robots" content="max-image-preview:standard"> <meta name="format-detection" content="telephone=no"> <meta name="theme-color" content="#eaecf0"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/c/ce/Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg/1200px-Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg"> <meta property="og:image:width" content="1200"> <meta property="og:image:height" content="857"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/c/ce/Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg/800px-Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg"> <meta property="og:image:width" content="800"> <meta property="og:image:height" content="572"> <meta property="og:image" content="https://upload.wikimedia.org/wikipedia/commons/thumb/c/ce/Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg/640px-Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg"> <meta property="og:image:width" content="640"> <meta property="og:image:height" content="457"> <meta name="viewport" content="width=device-width, initial-scale=1.0, user-scalable=yes, minimum-scale=0.25, maximum-scale=5.0"> <meta property="og:title" content="Identity theft - Wikipedia"> <meta property="og:type" content="website"> <link rel="preconnect" href="//upload.wikimedia.org"> <link rel="manifest" href="/w/api.php?action=webapp-manifest"> <link rel="alternate" type="application/x-wiki" title="Edit this page" href="/w/index.php?title=Identity_theft&action=edit"> <link rel="apple-touch-icon" href="/static/apple-touch/wikipedia.png"> <link rel="icon" href="/static/favicon/wikipedia.ico"> <link rel="search" type="application/opensearchdescription+xml" href="/w/rest.php/v1/search" title="Wikipedia (en)"> <link rel="EditURI" type="application/rsd+xml" href="//en.wikipedia.org/w/api.php?action=rsd"> <link rel="canonical" href="https://en.wikipedia.org/wiki/Identity_theft"> <link rel="license" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en"> <link rel="dns-prefetch" href="//meta.wikimedia.org" /> <link rel="dns-prefetch" href="//login.wikimedia.org"> </head> <body class="mediawiki ltr sitedir-ltr mw-hide-empty-elt ns-0 ns-subject mw-editable page-Identity_theft rootpage-Identity_theft stable issues-group-B skin-minerva action-view skin--responsive mw-mf-amc-disabled mw-mf"><div id="mw-mf-viewport"> <div id="mw-mf-page-center"> <a class="mw-mf-page-center__mask" href="#"></a> <header class="header-container header-chrome"> <div class="minerva-header"> <nav class="navigation-drawer toggle-list view-border-box"> <input type="checkbox" id="main-menu-input" class="toggle-list__checkbox" role="button" aria-haspopup="true" aria-expanded="false" aria-labelledby="mw-mf-main-menu-button"> <label role="button" for="main-menu-input" id="mw-mf-main-menu-button" aria-hidden="true" data-event-name="ui.mainmenu" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet toggle-list__toggle"> <span class="minerva-icon minerva-icon--menu"></span> <span></span> </label> <div id="mw-mf-page-left" class="menu view-border-box"> <ul id="p-navigation" class="toggle-list__list"> <li class="toggle-list-item "> <a class="toggle-list-item__anchor menu__item--home" href="/wiki/Main_Page" data-mw="interface"> <span class="minerva-icon minerva-icon--home"></span> <span class="toggle-list-item__label">Home</span> </a> </li> <li class="toggle-list-item "> <a class="toggle-list-item__anchor menu__item--random" href="/wiki/Special:Random" data-mw="interface"> <span class="minerva-icon minerva-icon--die"></span> <span class="toggle-list-item__label">Random</span> </a> </li> <li class="toggle-list-item skin-minerva-list-item-jsonly"> <a class="toggle-list-item__anchor menu__item--nearby" href="/wiki/Special:Nearby" data-event-name="menu.nearby" data-mw="interface"> <span class="minerva-icon minerva-icon--mapPin"></span> <span class="toggle-list-item__label">Nearby</span> </a> </li> </ul> <ul id="p-personal" class="toggle-list__list"> <li class="toggle-list-item "> <a class="toggle-list-item__anchor menu__item--login" href="/w/index.php?title=Special:UserLogin&returnto=Identity+theft" data-event-name="menu.login" data-mw="interface"> <span class="minerva-icon minerva-icon--logIn"></span> <span class="toggle-list-item__label">Log in</span> </a> </li> </ul> <ul id="pt-preferences" class="toggle-list__list"> <li class="toggle-list-item skin-minerva-list-item-jsonly"> <a class="toggle-list-item__anchor menu__item--settings" href="/w/index.php?title=Special:MobileOptions&returnto=Identity+theft" data-event-name="menu.settings" data-mw="interface"> <span class="minerva-icon minerva-icon--settings"></span> <span class="toggle-list-item__label">Settings</span> </a> </li> </ul> <ul id="p-donation" class="toggle-list__list"> <li class="toggle-list-item "> <a class="toggle-list-item__anchor menu__item--donate" href="https://donate.wikimedia.org/wiki/Special:FundraiserRedirector?utm_source=donate&utm_medium=sidebar&utm_campaign=C13_en.wikipedia.org&uselang=en&utm_key=minerva" data-event-name="menu.donate" data-mw="interface"> <span class="minerva-icon minerva-icon--heart"></span> <span class="toggle-list-item__label">Donate</span> </a> </li> </ul> <ul class="hlist"> <li class="toggle-list-item "> <a class="toggle-list-item__anchor menu__item--about" href="/wiki/Wikipedia:About" data-mw="interface"> <span class="toggle-list-item__label">About Wikipedia</span> </a> </li> <li class="toggle-list-item "> <a class="toggle-list-item__anchor menu__item--disclaimers" href="/wiki/Wikipedia:General_disclaimer" data-mw="interface"> <span class="toggle-list-item__label">Disclaimers</span> </a> </li> </ul> </div> <label class="main-menu-mask" for="main-menu-input"></label> </nav> <div class="branding-box"> <a href="/wiki/Main_Page"> <span><img src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" alt="Wikipedia" width="120" height="18" style="width: 7.5em; height: 1.125em;"/> </span> </a> </div> <form action="/w/index.php" method="get" class="minerva-search-form"> <div class="search-box"> <input type="hidden" name="title" value="Special:Search"/> <input class="search skin-minerva-search-trigger" id="searchInput" type="search" name="search" placeholder="Search Wikipedia" aria-label="Search Wikipedia" autocapitalize="sentences" title="Search Wikipedia [f]" accesskey="f"> <span class="search-box-icon-overlay"><span class="minerva-icon minerva-icon--search"></span> </span> </div> <button id="searchIcon" class="cdx-button cdx-button--size-large cdx-button--icon-only cdx-button--weight-quiet skin-minerva-search-trigger"> <span class="minerva-icon minerva-icon--search"></span> <span>Search</span> </button> </form> <nav class="minerva-user-navigation" aria-label="User navigation"> </nav> </div> </header> <main id="content" class="mw-body"> <div class="banner-container"> <div id="siteNotice"></div> </div> <div class="pre-content heading-holder"> <div class="page-heading"> <h1 id="firstHeading" class="firstHeading mw-first-heading"><span class="mw-page-title-main">Identity theft</span></h1> <div class="tagline"></div> </div> <ul id="p-associated-pages" class="minerva__tab-container"> <li class="minerva__tab selected"> <a class="minerva__tab-text" href="/wiki/Identity_theft" rel="" data-event-name="tabs.subject">Article</a> </li> <li class="minerva__tab "> <a class="minerva__tab-text" href="/wiki/Talk:Identity_theft" rel="discussion" data-event-name="tabs.talk">Talk</a> </li> </ul> <nav class="page-actions-menu"> <ul id="p-views" class="page-actions-menu__list"> <li id="language-selector" class="page-actions-menu__list-item"> <a role="button" href="#p-lang" data-mw="interface" data-event-name="menu.languages" title="Language" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet language-selector"> <span class="minerva-icon minerva-icon--language"></span> <span>Language</span> </a> </li> <li id="page-actions-watch" class="page-actions-menu__list-item"> <a role="button" id="ca-watch" href="/w/index.php?title=Special:UserLogin&returnto=Identity+theft" data-event-name="menu.watch" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet menu__item--page-actions-watch"> <span class="minerva-icon minerva-icon--star"></span> <span>Watch</span> </a> </li> <li id="page-actions-edit" class="page-actions-menu__list-item"> <a role="button" id="ca-edit" href="/w/index.php?title=Identity_theft&action=edit" data-event-name="menu.edit" data-mw="interface" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet edit-page menu__item--page-actions-edit"> <span class="minerva-icon minerva-icon--edit"></span> <span>Edit</span> </a> </li> </ul> </nav> <!-- version 1.0.2 (change every time you update a partial) --> <div id="mw-content-subtitle"></div> </div> <div id="bodyContent" class="content"> <div id="mw-content-text" class="mw-body-content"><script>function mfTempOpenSection(id){var block=document.getElementById("mf-section-"+id);block.className+=" open-block";block.previousSibling.className+=" open-block";}</script><div class="mw-content-ltr mw-parser-output" lang="en" dir="ltr"><section class="mf-section-0" id="mf-section-0"> <style data-mw-deduplicate="TemplateStyles:r1236090951">.mw-parser-output .hatnote{font-style:italic}.mw-parser-output div.hatnote{padding-left:1.6em;margin-bottom:0.5em}.mw-parser-output .hatnote i{font-style:normal}.mw-parser-output .hatnote+link+.hatnote{margin-top:-0.5em}@media print{body.ns-0 .mw-parser-output .hatnote{display:none!important}}</style><div role="note" class="hatnote navigation-not-searchable">This article is about the concept of identity theft. For the 2004 film, see <a href="/wiki/Identity_Theft_(film)" title="Identity Theft (film)">Identity Theft (film)</a>. For the 2013 film, see <a href="/wiki/Identity_Thief" title="Identity Thief">Identity Thief</a>. For the 1953 film, see <a href="/wiki/Stolen_Identity" title="Stolen Identity">Stolen Identity</a>.</div> <style data-mw-deduplicate="TemplateStyles:r1251242444">.mw-parser-output .ambox{border:1px solid #a2a9b1;border-left:10px solid #36c;background-color:#fbfbfb;box-sizing:border-box}.mw-parser-output .ambox+link+.ambox,.mw-parser-output .ambox+link+style+.ambox,.mw-parser-output .ambox+link+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+style+.ambox,.mw-parser-output .ambox+.mw-empty-elt+link+link+.ambox{margin-top:-1px}html body.mediawiki .mw-parser-output .ambox.mbox-small-left{margin:4px 1em 4px 0;overflow:hidden;width:238px;border-collapse:collapse;font-size:88%;line-height:1.25em}.mw-parser-output .ambox-speedy{border-left:10px solid #b32424;background-color:#fee7e6}.mw-parser-output .ambox-delete{border-left:10px solid #b32424}.mw-parser-output .ambox-content{border-left:10px solid #f28500}.mw-parser-output .ambox-style{border-left:10px solid #fc3}.mw-parser-output .ambox-move{border-left:10px solid #9932cc}.mw-parser-output .ambox-protection{border-left:10px solid #a2a9b1}.mw-parser-output .ambox .mbox-text{border:none;padding:0.25em 0.5em;width:100%}.mw-parser-output .ambox .mbox-image{border:none;padding:2px 0 2px 0.5em;text-align:center}.mw-parser-output .ambox .mbox-imageright{border:none;padding:2px 0.5em 2px 0;text-align:center}.mw-parser-output .ambox .mbox-empty-cell{border:none;padding:0;width:1px}.mw-parser-output .ambox .mbox-image-div{width:52px}@media(min-width:720px){.mw-parser-output .ambox{margin:0 10%}}@media print{body.ns-0 .mw-parser-output .ambox{display:none!important}}</style><style data-mw-deduplicate="TemplateStyles:r1248332772">.mw-parser-output .multiple-issues-text{width:95%;margin:0.2em 0}.mw-parser-output .multiple-issues-text>.mw-collapsible-content{margin-top:0.3em}.mw-parser-output .compact-ambox .ambox{border:none;border-collapse:collapse;background-color:transparent;margin:0 0 0 1.6em!important;padding:0!important;width:auto;display:block}body.mediawiki .mw-parser-output .compact-ambox .ambox.mbox-small-left{font-size:100%;width:auto;margin:0}.mw-parser-output .compact-ambox .ambox .mbox-text{padding:0!important;margin:0!important}.mw-parser-output .compact-ambox .ambox .mbox-text-span{display:list-item;line-height:1.5em;list-style-type:disc}body.skin-minerva .mw-parser-output .multiple-issues-text>.mw-collapsible-toggle,.mw-parser-output .compact-ambox .ambox .mbox-image,.mw-parser-output .compact-ambox .ambox .mbox-imageright,.mw-parser-output .compact-ambox .ambox .mbox-empty-cell,.mw-parser-output .compact-ambox .hide-when-compact{display:none}</style><table class="box-Multiple_issues plainlinks metadata ambox ambox-content ambox-multiple_issues compact-ambox" role="presentation"><tbody><tr><td class="mbox-text"><div class="mbox-text-span"><div class="multiple-issues-text mw-collapsible"><b>This article has multiple issues.</b> Please help <b><a href="/wiki/Special:EditPage/Identity_theft" title="Special:EditPage/Identity theft">improve it</a></b> or discuss these issues on the <b><a href="/wiki/Talk:Identity_theft" title="Talk:Identity theft">talk page</a></b>. <small><i>(<a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove these messages</a>)</i></small> <div class="mw-collapsible-content"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1251242444"><table class="box-Cleanup plainlinks metadata ambox ambox-style ambox-Cleanup" role="presentation"><tbody><tr><td class="mbox-text"><div class="mbox-text-span">This article may <b>require <a href="/wiki/Wikipedia:Cleanup" title="Wikipedia:Cleanup">cleanup</a></b> to meet Wikipedia's <a href="/wiki/Wikipedia:Manual_of_Style" title="Wikipedia:Manual of Style">quality standards</a>. The specific problem is: <b>Odd wording/grammar in places.</b><span class="hide-when-compact"> Please help <a href="/wiki/Special:EditPage/Identity_theft" title="Special:EditPage/Identity theft">improve this article</a> if you can.</span> <span class="date-container"><i>(<span class="date">September 2018</span>)</i></span><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1251242444"><table class="box-Globalize plainlinks metadata ambox ambox-content ambox-globalize" role="presentation"><tbody><tr><td class="mbox-text"><div class="mbox-text-span">The examples and perspective in this article <b>deal primarily with the United States and do not represent a <a href="/wiki/Wikipedia:WikiProject_Countering_systemic_bias" title="Wikipedia:WikiProject Countering systemic bias">worldwide view</a> of the subject</b>.<span class="hide-when-compact"> You may <a class="external text" href="https://en.wikipedia.org/w/index.php?title=Identity_theft&action=edit">improve this article</a>, discuss the issue on the <a href="/wiki/Talk:Identity_theft" title="Talk:Identity theft">talk page</a>, or <a href="/wiki/Wikipedia:Article_wizard" title="Wikipedia:Article wizard">create a new article</a>, as appropriate.</span> <span class="date-container"><i>(<span class="date">August 2020</span>)</i></span><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> </div> </div><span class="hide-when-compact"><i> (<small><a href="/wiki/Help:Maintenance_template_removal" title="Help:Maintenance template removal">Learn how and when to remove this message</a></small>)</i></span></div></td></tr></tbody></table> <p><b>Identity theft</b>, <b>identity piracy</b> or <b>identity infringement</b> occurs when someone uses another's personal identifying information, like their name, identifying number, or <a href="/wiki/Credit_card_number" class="mw-redirect" title="Credit card number">credit card number</a>, without their permission, to commit fraud or other crimes. The term <i>identity theft</i> was coined in 1964.<sup id="cite_ref-1" class="reference"><a href="#cite_note-1"><span class="cite-bracket">[</span>1<span class="cite-bracket">]</span></a></sup> Since that time, the definition of identity theft has been legally defined throughout both the U.K. and the <a href="/wiki/United_States" title="United States">U.S.</a> as the theft of personally identifiable information. Identity theft deliberately uses someone else's <a href="/wiki/Personally_identifiable_information" class="mw-redirect" title="Personally identifiable information">identity</a> as a method to gain financial advantages or obtain credit and other benefits.<sup id="cite_ref-2" class="reference"><a href="#cite_note-2"><span class="cite-bracket">[</span>2<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-3" class="reference"><a href="#cite_note-3"><span class="cite-bracket">[</span>3<span class="cite-bracket">]</span></a></sup> The person whose identity has been stolen may suffer adverse consequences,<sup id="cite_ref-BloombergIdentityTheftEssay_4-0" class="reference"><a href="#cite_note-BloombergIdentityTheftEssay-4"><span class="cite-bracket">[</span>4<span class="cite-bracket">]</span></a></sup> especially if they are falsely held responsible for the perpetrator's actions. Personally identifiable information generally includes a person's name, date of birth, social security number, driver's license number, bank account or credit card numbers, <a href="/wiki/Personal_identification_number" title="Personal identification number">PINs</a>, <a href="/wiki/Electronic_signature" title="Electronic signature">electronic signatures</a>, fingerprints, <a href="/wiki/Password" title="Password">passwords</a>, or any other information that can be used to access a person's financial resources.<sup id="cite_ref-5" class="reference"><a href="#cite_note-5"><span class="cite-bracket">[</span>5<span class="cite-bracket">]</span></a></sup> </p><figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_(28356288536).jpg" class="mw-file-description"><img src="//upload.wikimedia.org/wikipedia/commons/thumb/c/ce/Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg/290px-Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg" decoding="async" width="290" height="207" class="mw-file-element" srcset="//upload.wikimedia.org/wikipedia/commons/thumb/c/ce/Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg/435px-Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/c/ce/Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg/580px-Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg 2x" data-file-width="2273" data-file-height="1624"></a><figcaption>Example of an identity theft crime: 1. The fraudster files tax return paperwork in the victim's name, claiming a refund. 2. The IRS issues a refund to the fraudster. 3. The victim submits their legitimate tax return. 4. The IRS rejects the return as a duplicate.</figcaption></figure> <p>Determining the link between <a href="/wiki/Data_breach" title="Data breach">data breaches</a> and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained. According to a report done for the FTC, identity theft is not always detectable by the individual victims.<sup id="cite_ref-6" class="reference"><a href="#cite_note-6"><span class="cite-bracket">[</span>6<span class="cite-bracket">]</span></a></sup> <a href="/wiki/Identity_fraud" title="Identity fraud">Identity fraud</a> is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A <a href="/wiki/Government_Accountability_Office" title="Government Accountability Office">U.S. Government Accountability Office</a> study determined that "most breaches have not resulted in detected incidents of identity theft".<sup id="cite_ref-7" class="reference"><a href="#cite_note-7"><span class="cite-bracket">[</span>7<span class="cite-bracket">]</span></a></sup> The report also warned that "the full extent is unknown". A later unpublished study by <a href="/wiki/Carnegie_Mellon_University" title="Carnegie Mellon University">Carnegie Mellon University</a> noted that "Most often, the causes of identity theft is not known", but reported that someone else concluded that "the probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%".<sup id="cite_ref-8" class="reference"><a href="#cite_note-8"><span class="cite-bracket">[</span>8<span class="cite-bracket">]</span></a></sup> For example, in one of the largest data breaches which affected over four million records, it resulted in only about 1,800 instances of identity theft, according to the company whose systems were breached.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (May 2021)">citation needed</span></a></i>]</sup> </p><p>An October 2010 article entitled "Cyber Crime Made Easy" explained the level to which hackers are using <a href="/wiki/Malicious_software" class="mw-redirect" title="Malicious software">malicious software</a>.<sup id="cite_ref-Giles2010_9-0" class="reference"><a href="#cite_note-Giles2010-9"><span class="cite-bracket">[</span>9<span class="cite-bracket">]</span></a></sup> As Gunter Ollmann, Chief Technology Officer of security at <a href="/wiki/Microsoft" title="Microsoft">Microsoft</a>, said, "Interested in credit card theft? There's an app for that."<sup id="cite_ref-10" class="reference"><a href="#cite_note-10"><span class="cite-bracket">[</span>10<span class="cite-bracket">]</span></a></sup> This statement summed up the ease with which these hackers are accessing all kinds of information online. The new program for infecting users' computers was called <a href="/wiki/Zeus_(malware)" title="Zeus (malware)">Zeus</a>, and the program is so hacker-friendly that even an inexperienced hacker can operate it. Although the hacking program is easy to use, that fact does not diminish the devastating effects that Zeus (or other software like Zeus) can do on a computer and the user. For example, programs like Zeus can steal credit card information, important documents, and even documents necessary for <a href="/wiki/Homeland_security" title="Homeland security">homeland security</a>. If a hacker were to gain this information, it would mean nationwide identity theft or even a possible terrorist attack. The <a href="/wiki/Integrated_Threat_Assessment_Centre" class="mw-redirect" title="Integrated Threat Assessment Centre">ITAC</a> said that about 15 million Americans had their identity stolen in 2012.<sup id="cite_ref-11" class="reference"><a href="#cite_note-11"><span class="cite-bracket">[</span>11<span class="cite-bracket">]</span></a></sup> </p> <div id="toc" class="toc" role="navigation" aria-labelledby="mw-toc-heading"><input type="checkbox" role="button" id="toctogglecheckbox" class="toctogglecheckbox" style="display:none"><div class="toctitle" lang="en" dir="ltr"><h2 id="mw-toc-heading">Contents</h2><span class="toctogglespan"><label class="toctogglelabel" for="toctogglecheckbox"></label></span></div> <ul> <li class="toclevel-1 tocsection-1"><a href="#Types"><span class="tocnumber">1</span> <span class="toctext">Types</span></a> <ul> <li class="toclevel-2 tocsection-2"><a href="#Identity_cloning_and_concealment"><span class="tocnumber">1.1</span> <span class="toctext">Identity cloning and concealment</span></a></li> <li class="toclevel-2 tocsection-3"><a href="#Criminal_identity_theft"><span class="tocnumber">1.2</span> <span class="toctext">Criminal identity theft</span></a></li> <li class="toclevel-2 tocsection-4"><a href="#Synthetic_identity_theft"><span class="tocnumber">1.3</span> <span class="toctext">Synthetic identity theft</span></a></li> <li class="toclevel-2 tocsection-5"><a href="#Medical_identity_theft"><span class="tocnumber">1.4</span> <span class="toctext">Medical identity theft</span></a></li> <li class="toclevel-2 tocsection-6"><a href="#Child_identity_theft"><span class="tocnumber">1.5</span> <span class="toctext">Child identity theft</span></a></li> <li class="toclevel-2 tocsection-7"><a href="#Financial_identity_theft"><span class="tocnumber">1.6</span> <span class="toctext">Financial identity theft</span></a></li> <li class="toclevel-2 tocsection-8"><a href="#Tax_identity_theft"><span class="tocnumber">1.7</span> <span class="toctext">Tax identity theft</span></a></li> </ul> </li> <li class="toclevel-1 tocsection-9"><a href="#Techniques_for_obtaining_and_exploiting_personal_information"><span class="tocnumber">2</span> <span class="toctext">Techniques for obtaining and exploiting personal information</span></a></li> <li class="toclevel-1 tocsection-10"><a href="#Individual_identity_protection"><span class="tocnumber">3</span> <span class="toctext">Individual identity protection</span></a></li> <li class="toclevel-1 tocsection-11"><a href="#Potential_outcomes"><span class="tocnumber">4</span> <span class="toctext">Potential outcomes</span></a></li> <li class="toclevel-1 tocsection-12"><a href="#Identity_protection_by_organizations"><span class="tocnumber">5</span> <span class="toctext">Identity protection by organizations</span></a></li> <li class="toclevel-1 tocsection-13"><a href="#Market"><span class="tocnumber">6</span> <span class="toctext">Market</span></a></li> <li class="toclevel-1 tocsection-14"><a href="#Legal_responses"><span class="tocnumber">7</span> <span class="toctext">Legal responses</span></a> <ul> <li class="toclevel-2 tocsection-15"><a href="#International"><span class="tocnumber">7.1</span> <span class="toctext">International</span></a></li> <li class="toclevel-2 tocsection-16"><a href="#Australia"><span class="tocnumber">7.2</span> <span class="toctext">Australia</span></a></li> <li class="toclevel-2 tocsection-17"><a href="#Canada"><span class="tocnumber">7.3</span> <span class="toctext">Canada</span></a> <ul> <li class="toclevel-3 tocsection-18"><a href="#Proposed_legislation"><span class="tocnumber">7.3.1</span> <span class="toctext">Proposed legislation</span></a></li> </ul> </li> <li class="toclevel-2 tocsection-19"><a href="#France"><span class="tocnumber">7.4</span> <span class="toctext">France</span></a></li> <li class="toclevel-2 tocsection-20"><a href="#Hong_Kong"><span class="tocnumber">7.5</span> <span class="toctext">Hong Kong</span></a></li> <li class="toclevel-2 tocsection-21"><a href="#India"><span class="tocnumber">7.6</span> <span class="toctext">India</span></a></li> <li class="toclevel-2 tocsection-22"><a href="#Philippines"><span class="tocnumber">7.7</span> <span class="toctext">Philippines</span></a></li> <li class="toclevel-2 tocsection-23"><a href="#Sweden"><span class="tocnumber">7.8</span> <span class="toctext">Sweden</span></a></li> <li class="toclevel-2 tocsection-24"><a href="#United_Kingdom"><span class="tocnumber">7.9</span> <span class="toctext">United Kingdom</span></a></li> <li class="toclevel-2 tocsection-25"><a href="#United_States"><span class="tocnumber">7.10</span> <span class="toctext">United States</span></a> <ul> <li class="toclevel-3 tocsection-26"><a href="#Notification"><span class="tocnumber">7.10.1</span> <span class="toctext">Notification</span></a></li> </ul> </li> </ul> </li> <li class="toclevel-1 tocsection-27"><a href="#Spread_and_impact"><span class="tocnumber">8</span> <span class="toctext">Spread and impact</span></a></li> <li class="toclevel-1 tocsection-28"><a href="#See_also"><span class="tocnumber">9</span> <span class="toctext">See also</span></a> <ul> <li class="toclevel-2 tocsection-29"><a href="#Types_of_fraud_and_theft"><span class="tocnumber">9.1</span> <span class="toctext">Types of fraud and theft</span></a></li> <li class="toclevel-2 tocsection-30"><a href="#Organizations"><span class="tocnumber">9.2</span> <span class="toctext">Organizations</span></a></li> <li class="toclevel-2 tocsection-31"><a href="#Laws"><span class="tocnumber">9.3</span> <span class="toctext">Laws</span></a></li> <li class="toclevel-2 tocsection-32"><a href="#Notable_identity_thieves_and_cases"><span class="tocnumber">9.4</span> <span class="toctext">Notable identity thieves and cases</span></a></li> </ul> </li> <li class="toclevel-1 tocsection-33"><a href="#Further_reading"><span class="tocnumber">10</span> <span class="toctext">Further reading</span></a></li> <li class="toclevel-1 tocsection-34"><a href="#References"><span class="tocnumber">11</span> <span class="toctext">References</span></a></li> <li class="toclevel-1 tocsection-35"><a href="#External_links"><span class="tocnumber">12</span> <span class="toctext">External links</span></a></li> </ul> </div> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(1)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Types">Types</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=1" title="Edit section: Types" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-1 collapsible-block" id="mf-section-1"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">Further information: <a href="/wiki/Levels_of_identity_security" title="Levels of identity security">Levels of identity security</a></div> <p>Sources such as the <a href="/wiki/Non-profit" class="mw-redirect" title="Non-profit">Non-profit</a> <a href="/wiki/Identity_Theft_Resource_Center" title="Identity Theft Resource Center">Identity Theft Resource Center</a><sup id="cite_ref-12" class="reference"><a href="#cite_note-12"><span class="cite-bracket">[</span>12<span class="cite-bracket">]</span></a></sup> sub-divide identity theft into five categories: </p> <ul><li>Criminal identity theft (posing as another person when apprehended for a crime)</li> <li>Financial identity theft (using another's identity to obtain credit, goods, and services)</li> <li>Identity cloning (using another's information to assume his or her identity in daily life)</li> <li>Medical identity theft (using another's identity to obtain medical care or drugs)</li> <li>Child identity theft.</li></ul> <p>Identity theft may be used to facilitate or fund other crimes including <a href="/wiki/Illegal_immigration" title="Illegal immigration">illegal immigration</a>, <a href="/wiki/Terrorism" title="Terrorism">terrorism</a>, <a href="/wiki/Phishing" title="Phishing">phishing</a> and <a href="/wiki/Espionage" title="Espionage">espionage</a>. There are cases of identity cloning to attack <a href="/wiki/Payment_system" title="Payment system">payment systems</a>, including online credit card processing and <a href="/wiki/Medical_insurance" class="mw-redirect" title="Medical insurance">medical insurance</a>.<sup id="cite_ref-13" class="reference"><a href="#cite_note-13"><span class="cite-bracket">[</span>13<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Identity_cloning_and_concealment">Identity cloning and concealment</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=2" title="Edit section: Identity cloning and concealment" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>In this situation, the identity thief impersonates someone else to conceal their own true identity. Examples are <a href="/wiki/Illegal_immigrant" class="mw-redirect" title="Illegal immigrant">illegal immigrants</a> hiding their illegal status, people hiding from <a href="/wiki/Creditor" title="Creditor">creditors</a> or other individuals and those who simply want to become "<a href="/wiki/Anonymity" title="Anonymity">anonymous</a>" for personal reasons. Another example is <i>posers</i>, a label given to people who use someone else's photos and information on social networking sites. Posers mostly create believable stories involving friends of the real person they are imitating. Unlike identity theft used to obtain credit which usually comes to light when the debts mount, concealment may continue indefinitely without being detected, particularly if the identity thief can obtain false credentials to pass various authentication tests in everyday life. </p> <div class="mw-heading mw-heading3"><h3 id="Criminal_identity_theft">Criminal identity theft</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=3" title="Edit section: Criminal identity theft" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>When a criminal fraudulently identifies themselves to police as another individual at the point of arrest, it is sometimes referred to as "Criminal Identity Theft." In some cases, criminals have previously obtained state-issued identity documents using credentials stolen from others, or have simply presented a <a href="/wiki/Fake_ID" class="mw-redirect" title="Fake ID">fake ID</a>. Provided the subterfuge works, charges may be placed under the victim's name, letting the criminal off the hook. Victims might only learn of such incidents by chance, for example by receiving a court summons, discovering their driver's licenses are suspended when stopped for minor traffic violations, or through <a href="/wiki/Background_check" title="Background check">background checks</a> performed for employment purposes. </p><p>It can be difficult for the victim of criminal identity theft to clear their record. The steps required to clear the victim's incorrect <a href="/wiki/Criminal_record" title="Criminal record">criminal record</a> depend on which jurisdiction the crime occurred and whether the true identity of the criminal can be determined. The victim might need to locate the original arresting officers and prove their own identity by some reliable means such as fingerprinting or DNA testing and may need to go to a court hearing to be cleared of the charges. Obtaining an <a href="/wiki/Expungement" title="Expungement">expungement</a> of court records may also be required. Authorities might permanently maintain the victim's name as an alias for the criminal's true identity in their criminal records databases. One problem that victims of criminal identity theft may encounter is that various <a href="/wiki/Data_aggregators" class="mw-redirect" title="Data aggregators">data aggregators</a> might still have incorrect criminal records in their databases even after court and police records are corrected. Thus a future background check may return the incorrect criminal records.<sup id="cite_ref-14" class="reference"><a href="#cite_note-14"><span class="cite-bracket">[</span>14<span class="cite-bracket">]</span></a></sup> This is just one example of the kinds of impact that may continue to affect the victims of identity theft for some months or even years after the crime, aside from the psychological trauma that being 'cloned' typically engenders. </p> <div class="mw-heading mw-heading3"><h3 id="Synthetic_identity_theft">Synthetic identity theft</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=4" title="Edit section: Synthetic identity theft" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>A variation of identity theft that has recently become more common is <i>synthetic identity theft</i>, in which identities are completely or partially fabricated.<sup id="cite_ref-15" class="reference"><a href="#cite_note-15"><span class="cite-bracket">[</span>15<span class="cite-bracket">]</span></a></sup> The most common technique involves combining a real <a href="/wiki/Social_security_number" class="mw-redirect" title="Social security number">social security number</a> with a name and birthdate other than the ones that are simply associated with the number. Synthetic identity theft is more difficult to track as it doesn't show on either person's credit report directly but may appear as an entirely new file in the <a href="/wiki/Credit_bureau" title="Credit bureau">credit bureau</a> or as a subfile on one of the victim's credit reports. Synthetic identity theft primarily harms the creditors who unwittingly grant the fraudsters credit. Individual victims can be affected if their names become confused with the synthetic identities, or if negative information in their subfiles impacts their credit ratings.<sup id="cite_ref-16" class="reference"><a href="#cite_note-16"><span class="cite-bracket">[</span>16<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Medical_identity_theft">Medical identity theft</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=5" title="Edit section: Medical identity theft" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Medical_privacy" title="Medical privacy">Medical privacy</a></div> <figure class="mw-default-size" typeof="mw:File/Thumb"><a href="/wiki/File:Figure_2-_Risk_of_Identity_Theft_with_Medicare_Card_under_CMS%E2%80%99s_Three_Proposed_Options_(7802334168).jpg" class="mw-file-description"><noscript><img src="//upload.wikimedia.org/wikipedia/commons/thumb/b/bf/Figure_2-_Risk_of_Identity_Theft_with_Medicare_Card_under_CMS%E2%80%99s_Three_Proposed_Options_%287802334168%29.jpg/220px-Figure_2-_Risk_of_Identity_Theft_with_Medicare_Card_under_CMS%E2%80%99s_Three_Proposed_Options_%287802334168%29.jpg" decoding="async" width="220" height="137" class="mw-file-element" data-file-width="752" data-file-height="467"></noscript><span class="lazy-image-placeholder" style="width: 220px;height: 137px;" data-src="//upload.wikimedia.org/wikipedia/commons/thumb/b/bf/Figure_2-_Risk_of_Identity_Theft_with_Medicare_Card_under_CMS%E2%80%99s_Three_Proposed_Options_%287802334168%29.jpg/220px-Figure_2-_Risk_of_Identity_Theft_with_Medicare_Card_under_CMS%E2%80%99s_Three_Proposed_Options_%287802334168%29.jpg" data-width="220" data-height="137" data-srcset="//upload.wikimedia.org/wikipedia/commons/thumb/b/bf/Figure_2-_Risk_of_Identity_Theft_with_Medicare_Card_under_CMS%E2%80%99s_Three_Proposed_Options_%287802334168%29.jpg/330px-Figure_2-_Risk_of_Identity_Theft_with_Medicare_Card_under_CMS%E2%80%99s_Three_Proposed_Options_%287802334168%29.jpg 1.5x, //upload.wikimedia.org/wikipedia/commons/thumb/b/bf/Figure_2-_Risk_of_Identity_Theft_with_Medicare_Card_under_CMS%E2%80%99s_Three_Proposed_Options_%287802334168%29.jpg/440px-Figure_2-_Risk_of_Identity_Theft_with_Medicare_Card_under_CMS%E2%80%99s_Three_Proposed_Options_%287802334168%29.jpg 2x" data-class="mw-file-element"> </span></a><figcaption>US <a href="/wiki/Government_Accountability_Office" title="Government Accountability Office">Government Accountability Office</a> diagram showing the identity theft risk associated with social security numbers on <a href="/wiki/Medicare_(United_States)" title="Medicare (United States)">Medicare cards</a></figcaption></figure> <p>Privacy researcher Pam Dixon, the founder of the World Privacy Forum,<sup id="cite_ref-17" class="reference"><a href="#cite_note-17"><span class="cite-bracket">[</span>17<span class="cite-bracket">]</span></a></sup> coined the term medical identity theft and released the first major report about this issue in 2006. In the report, she defined the crime for the first time and made the plight of victims public. The report's definition of the crime is that medical identity theft occurs when someone seeks medical care under the identity of another person. Insurance theft is also very common, if a thief has your insurance information and or your insurance card, they can seek medical attention posing as yourself.<sup id="cite_ref-18" class="reference"><a href="#cite_note-18"><span class="cite-bracket">[</span>18<span class="cite-bracket">]</span></a></sup> In addition to risks of financial harm common to all forms of identity theft, the thief's medical history may be added to the victim's <a href="/wiki/Medical_record" title="Medical record">medical records</a>. Inaccurate information in the victim's records is difficult to correct and may affect future insurability or cause doctors to rely on misinformation to deliver inappropriate care. After the publication of the report, which contained a recommendation that consumers receive notifications of medical data breach incidents, California passed a law requiring this, and then finally <a href="/wiki/Health_Insurance_Portability_and_Accountability_Act" title="Health Insurance Portability and Accountability Act">HIPAA</a> was expanded to also require medical breach notification when breaches affect 500 or more people.<sup id="cite_ref-19" class="reference"><a href="#cite_note-19"><span class="cite-bracket">[</span>19<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-20" class="reference"><a href="#cite_note-20"><span class="cite-bracket">[</span>20<span class="cite-bracket">]</span></a></sup> Data collected and stored by hospitals and other organizations such as medical aid schemes is up to 10 times more valuable to cybercriminals than credit card information. </p> <div class="mw-heading mw-heading3"><h3 id="Child_identity_theft">Child identity theft</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=6" title="Edit section: Child identity theft" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Child identity theft occurs when a minor's identity is used by another person for the impostor's personal gain. The impostor can be a family member, a friend, or even a stranger who targets children. The Social Security numbers of children are valued because they do not have any information associated with them. Thieves can establish lines of credit, obtain driver's licenses, or even buy a house using a child's identity. This fraud can go undetected for years, as most children do not discover the problem until years later. Child identity theft is fairly common, and studies have shown that the problem is growing. The largest study on child identity theft, as reported by Richard Power of the Carnegie Mellon Cylab with data supplied by <a href="/wiki/AllClear_ID" title="AllClear ID">AllClear ID</a>, found that of 40,000 children, 10.2% were victims of identity theft.<sup id="cite_ref-21" class="reference"><a href="#cite_note-21"><span class="cite-bracket">[</span>21<span class="cite-bracket">]</span></a></sup> </p><p>The <a href="/wiki/Federal_Trade_Commission" title="Federal Trade Commission">Federal Trade Commission</a> (FTC) estimates that about nine million people will be victims of identity theft in the United States per year. It was also estimated that in 2008; 630,000 people under the age of 19 were victims of theft. This then gave the victims a debt of about $12,799.<sup id="cite_ref-:5_22-0" class="reference"><a href="#cite_note-:5-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> </p><p>Not only are children in general big targets of identity theft but children who are in foster care are even bigger targets. This is because they are most likely moved around quite frequently and their SSN is being shared with multiple people and agencies. Foster children are even more victims of identity theft within their own families and other relatives. Young people in foster care who are victims of this crime are usually left alone to struggle and figure out how to fix their newly formed bad credit.<sup id="cite_ref-:5_22-1" class="reference"><a href="#cite_note-:5-22"><span class="cite-bracket">[</span>22<span class="cite-bracket">]</span></a></sup> </p><p>The emergence of children's identities on social media has also contributed to a rise in incidents of digital kidnapping and identity theft. <a href="/wiki/Digital_kidnapping" title="Digital kidnapping">Digital kidnapping</a> involves individuals stealing online images of children and misrepresenting them as their own.<sup id="cite_ref-23" class="reference"><a href="#cite_note-23"><span class="cite-bracket">[</span>23<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Financial_identity_theft">Financial identity theft</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=7" title="Edit section: Financial identity theft" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>The most common type of identity theft is related to finance. Financial identity theft includes obtaining credit, loans, goods, and services while claiming to be someone else.<sup id="cite_ref-24" class="reference"><a href="#cite_note-24"><span class="cite-bracket">[</span>24<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Tax_identity_theft">Tax identity theft</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=8" title="Edit section: Tax identity theft" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Tax_evasion" title="Tax evasion">Tax evasion</a></div> <p>One of the major identity theft categories is <b>tax-related identity theft</b>. The most common method is to use a person's authentic name, address, and <a href="/wiki/Social_Security_Number" class="mw-redirect" title="Social Security Number">Social Security Number</a> to file a tax return with false information, and have the resulting refund direct-deposited into a bank account controlled by the thief. The thief in this case can also try to get a job and then their employer will report the income of the real taxpayer, this then results in the taxpayer getting in trouble with the IRS.<sup id="cite_ref-:03_25-0" class="reference"><a href="#cite_note-:03-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> </p><p>The 14039 Form to the <a href="/wiki/Internal_Revenue_Service" title="Internal Revenue Service">IRS</a> is a form that will help one fight against a theft like tax theft. This form will put the IRS on alert and someone who believed they have been a victim of tax-related theft will be given an Identity Protection Personal Identification Number (IP PIN), which is a 6 digit code used in replacing an SSN for filing tax returns.<sup id="cite_ref-:03_25-1" class="reference"><a href="#cite_note-:03-25"><span class="cite-bracket">[</span>25<span class="cite-bracket">]</span></a></sup> </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(2)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Techniques_for_obtaining_and_exploiting_personal_information">Techniques for obtaining and exploiting personal information</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=9" title="Edit section: Techniques for obtaining and exploiting personal information" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-2 collapsible-block" id="mf-section-2"> <p>Identity thieves typically obtain and exploit <a href="/wiki/Personally_identifiable_information" class="mw-redirect" title="Personally identifiable information">personally identifiable information</a> about individuals, or various credentials they use to authenticate themselves, to impersonate them. Examples include: </p> <ul><li>Using <a href="/wiki/Public_records" title="Public records">public records</a> about individual citizens, published in official registers such as electoral rolls<sup id="cite_ref-26" class="reference"><a href="#cite_note-26"><span class="cite-bracket">[</span>26<span class="cite-bracket">]</span></a></sup></li> <li>Stealing <a href="/wiki/Cheque" title="Cheque">cheques (checks)</a> to acquire banking information, including account numbers and <a href="/wiki/Bank_code" title="Bank code">bank codes</a><sup id="cite_ref-27" class="reference"><a href="#cite_note-27"><span class="cite-bracket">[</span>27<span class="cite-bracket">]</span></a></sup></li> <li>Guessing Social Security numbers by using information found on Internet social networks such as <a href="/wiki/Twitter" title="Twitter">Twitter</a> and <a href="/wiki/MySpace" class="mw-redirect" title="MySpace">MySpace</a><sup id="cite_ref-28" class="reference"><a href="#cite_note-28"><span class="cite-bracket">[</span>28<span class="cite-bracket">]</span></a></sup></li></ul> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(3)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Individual_identity_protection">Individual identity protection</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=10" title="Edit section: Individual identity protection" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-3 collapsible-block" id="mf-section-3"> <p>The acquisition of personal identifiers is made possible through serious breaches of <a href="/wiki/Privacy" title="Privacy">privacy</a>. For consumers, this is usually a result of them naively providing their personal information or login credentials to the identity thieves (e.g., in a <a href="/wiki/Phishing_attack" class="mw-redirect" title="Phishing attack">phishing attack</a>) but identity-related documents such as credit cards, bank statements, utility bills, checkbooks, etc. may also be physically stolen from vehicles, homes, offices, and not the least <a href="/wiki/Letterboxes" class="mw-redirect" title="Letterboxes">letterboxes</a>, or directly from victims by pickpockets and bag snatchers. Guardianship of personal identifiers by consumers is the most common intervention strategy recommended by the <a href="/wiki/US_Federal_Trade_Commission" class="mw-redirect" title="US Federal Trade Commission">US Federal Trade Commission</a>, <a href="/wiki/PhoneBusters" class="mw-redirect" title="PhoneBusters">Canadian Phone Busters</a> and most sites that address identity theft. Such organizations offer recommendations on how individuals can prevent their information from falling into the wrong hands. </p><p>Identity theft can be partially mitigated by <i>not</i> identifying oneself unnecessarily (a form of information security control known as risk avoidance). This implies that organizations, IT systems, and procedures should not demand excessive amounts of personal information or credentials for identification and authentication. Requiring, storing, and processing personal identifiers (such as <a href="/wiki/Social_Security_number" title="Social Security number">Social Security number</a>, <a href="/wiki/National_identification_number" title="National identification number">national identification number</a>, driver's license number, credit card number, etc.) increases the risks of identity theft unless this valuable personal information is adequately secured at all times. Committing personal identifiers to memory is a sound practice that can reduce the risks of a would-be identity thief from obtaining these records. To help in remembering numbers such as social security numbers and credit card numbers, it is helpful to consider using mnemonic techniques or memory aids such as the <a href="/wiki/Mnemonic_major_system" title="Mnemonic major system">mnemonic Major System</a>. </p><p>Identity thieves sometimes impersonate dead people, using personal information obtained from death notices, gravestones, and other sources to exploit delays between the death and the closure of the person's accounts, the inattentiveness of grieving families, and weaknesses in the processes for credit-checking. Such crimes may continue for some time until the deceased's families or the authorities notice and react to anomalies.<sup id="cite_ref-29" class="reference"><a href="#cite_note-29"><span class="cite-bracket">[</span>29<span class="cite-bracket">]</span></a></sup> </p><p>In recent years<sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Manual_of_Style/Dates_and_numbers#Chronological_items" title="Wikipedia:Manual of Style/Dates and numbers"><span title="The time period mentioned near this tag is ambiguous. (September 2018)">when?</span></a></i>]</sup>, commercial identity theft protection/insurance services have become available in many countries. These services purport to help protect the individual from identity theft or help detect that identity theft has occurred in exchange for a monthly or annual membership fee or premium.<sup id="cite_ref-30" class="reference"><a href="#cite_note-30"><span class="cite-bracket">[</span>30<span class="cite-bracket">]</span></a></sup> The services typically work either by setting fraud alerts on the individual's credit files with the three major credit bureaus or by setting up <a href="/wiki/Credit_report_monitoring" title="Credit report monitoring">credit report monitoring</a> with the credit bureau. While identity theft protection/insurance services have been heavily marketed, their value has been called into question.<sup id="cite_ref-31" class="reference"><a href="#cite_note-31"><span class="cite-bracket">[</span>31<span class="cite-bracket">]</span></a></sup> </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(4)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Potential_outcomes">Potential outcomes</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=11" title="Edit section: Potential outcomes" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-4 collapsible-block" id="mf-section-4"> <p>Identity theft is a serious problem in the United States. In a 2018 study, it was reported that 60 million Americans' identities had been wrongfully acquired.<sup id="cite_ref-:02_32-0" class="reference"><a href="#cite_note-:02-32"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup> In response, under advisement from the <a href="/wiki/Identity_Theft_Resource_Center" title="Identity Theft Resource Center">Identity Theft Resource Center</a>, some new bills have been implemented to improve security such as requiring electronic signatures and social security verification.<sup id="cite_ref-:02_32-1" class="reference"><a href="#cite_note-:02-32"><span class="cite-bracket">[</span>32<span class="cite-bracket">]</span></a></sup> </p><p>Several types of identity theft are used to gather information, one of the most common types occurs when consumers make online purchases.<sup id="cite_ref-:12_33-0" class="reference"><a href="#cite_note-:12-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> A study was conducted with 190 people to determine the relationship between the constructs of fear of financial losses and reputational damages.<sup id="cite_ref-:12_33-1" class="reference"><a href="#cite_note-:12-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> The conclusions of this study revealed that identity theft was a positive correlation with reputable damages.<sup id="cite_ref-:12_33-2" class="reference"><a href="#cite_note-:12-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> The relationship between perceived risk and online purchase intention were negative.<sup id="cite_ref-:12_33-3" class="reference"><a href="#cite_note-:12-33"><span class="cite-bracket">[</span>33<span class="cite-bracket">]</span></a></sup> The significance of this study reveals that online companies are more aware of the potential harm that can be done to their consumers, therefore they are searching for ways to reduce the perceived risk of consumers and not lose out on business. </p><p>Victims of identity theft may face years of effort proving to the legal system that they are the true person,<sup id="cite_ref-:22_34-0" class="reference"><a href="#cite_note-:22-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> leading to emotional strain and financial losses. Most identity theft is perpetrated by a family member of the victim, and some may not be able to obtain new credit cards or open new bank accounts or loans.<sup id="cite_ref-:22_34-1" class="reference"><a href="#cite_note-:22-34"><span class="cite-bracket">[</span>34<span class="cite-bracket">]</span></a></sup> </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(5)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Identity_protection_by_organizations">Identity protection by organizations</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=12" title="Edit section: Identity protection by organizations" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-5 collapsible-block" id="mf-section-5"> <p>In their May 1998 testimony before the United States Senate, the <a href="/wiki/Federal_Trade_Commission" title="Federal Trade Commission">Federal Trade Commission</a> (FTC) discussed the sale of Social Security numbers and other personal identifiers by credit-raters and data miners. The FTC agreed to the industry's self-regulating principles restricting access to information on credit reports.<sup id="cite_ref-35" class="reference"><a href="#cite_note-35"><span class="cite-bracket">[</span>35<span class="cite-bracket">]</span></a></sup> According to the industry, the restrictions vary according to the category of customer. Credit reporting agencies gather and disclose personal and credit information to a wide business client base. </p><p>Poor stewardship of personal data by organizations, resulting in unauthorized access to sensitive data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse has documented over 900 individual data breaches by US companies and government agencies since January 2005, which together have involved over 200 million total records containing sensitive personal information, many containing social security numbers.<sup id="cite_ref-36" class="reference"><a href="#cite_note-36"><span class="cite-bracket">[</span>36<span class="cite-bracket">]</span></a></sup> Poor corporate diligence standards which can result in data breaches include: </p> <ul><li>failure to shred confidential information before throwing it into dumpsters</li> <li>failure to ensure adequate <a href="/wiki/Network_security" title="Network security">network security</a></li> <li>credit card numbers stolen by <a href="/wiki/Call_center" class="mw-redirect" title="Call center">call center</a> agents and people with access to call recordings</li> <li>the theft of laptop computers or portable media being carried off-site containing vast amounts of personal information. The use of strong <a href="/wiki/Encryption" title="Encryption">encryption</a> on these devices can reduce the chance of data being misused should a criminal obtain them.</li> <li>the brokerage of personal information to other businesses without ensuring that the purchaser maintains adequate security controls</li> <li>Failure of governments, when registering sole proprietorships, partnerships, and corporations, to determine if the officers listed in the Articles of Incorporation are who they say they are. This potentially allows criminals access to personal information through <a href="/wiki/Credit_rating" title="Credit rating">credit rating</a> and <a href="/wiki/Data_mining" title="Data mining">data mining</a> services.</li></ul> <p>The failure of corporate or government organizations to protect <a href="/wiki/Consumer_privacy" title="Consumer privacy">consumer privacy</a>, <a href="/wiki/Client_confidentiality" title="Client confidentiality">client confidentiality</a> and <a href="/wiki/Political_privacy" class="mw-redirect" title="Political privacy">political privacy</a> has been criticized for facilitating the acquisition of personal identifiers by criminals.<sup id="cite_ref-37" class="reference"><a href="#cite_note-37"><span class="cite-bracket">[</span>37<span class="cite-bracket">]</span></a></sup> </p><p>Using various types of <a href="/wiki/Biometric" class="mw-redirect" title="Biometric">biometric</a> information, such as <a href="/wiki/Fingerprint" title="Fingerprint">fingerprints</a>, for identification and authentication has been cited as a way to thwart identity thieves, however, there are technological limitations and privacy concerns associated with these methods as well. </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(6)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Market">Market</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=13" title="Edit section: Market" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-6 collapsible-block" id="mf-section-6"> <p>There is an active market for buying and selling stolen personal information, which occurs mostly in <a href="/wiki/Darknet_market" title="Darknet market">darknet markets</a> but also in other <a href="/wiki/Black_market" title="Black market">black markets</a>.<sup id="cite_ref-38" class="reference"><a href="#cite_note-38"><span class="cite-bracket">[</span>38<span class="cite-bracket">]</span></a></sup> People increase the value of the stolen data by aggregating it with publicly available data, and sell it again for a profit, increasing the damage that can be done to the people whose data was stolen.<sup id="cite_ref-39" class="reference"><a href="#cite_note-39"><span class="cite-bracket">[</span>39<span class="cite-bracket">]</span></a></sup> </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(7)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Legal_responses">Legal responses</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=14" title="Edit section: Legal responses" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-7 collapsible-block" id="mf-section-7"> <div class="mw-heading mw-heading3"><h3 id="International">International</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=15" title="Edit section: International" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>In March 2014, after it was learned two passengers with stolen passports were on board <a href="/wiki/Malaysia_Airlines_Flight_370" title="Malaysia Airlines Flight 370">Malaysia Airlines Flight 370</a>, which went missing on 8 March 2014. It came to light that <a href="/wiki/Interpol" title="Interpol">Interpol</a> maintains a database of 40 million lost and stolen travel documents from 157 countries, which Interpol makes available to governments and the public, including airlines and hotels. The Stolen and Lost Travel Documents (SLTD) database, however, is rarely used. <i>Big News Network</i> (which is based in the <a href="/wiki/UAE" class="mw-redirect" title="UAE">UAE</a>) reported that Interpol Secretary-General <a href="/wiki/Ronald_Noble" title="Ronald Noble">Ronald K. Noble</a> told a forum in <a href="/wiki/Abu_Dhabi" title="Abu Dhabi">Abu Dhabi</a> in the previous month, "The bad news is that, despite being incredibly cost-effective and deployable to virtually anywhere in the world, only a handful of countries are systematically using SLTD to screen travelers. The result is a major gap in our global security apparatus that is left vulnerable to exploitation by criminals and terrorists."<sup id="cite_ref-InterpolSLTD_40-0" class="reference"><a href="#cite_note-InterpolSLTD-40"><span class="cite-bracket">[</span>40<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Australia">Australia</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=16" title="Edit section: Australia" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>In <a href="/wiki/Australia" title="Australia">Australia</a>, each state has enacted laws that deal with different aspects of identity or fraud issues. Some states have now amended relevant criminal laws to reflect crimes of identity theft, such as the Criminal Law Consolidation Act 1935 (SA), Crimes Amendment (Fraud, Identity and Forgery Offences) Act 2009, and also in Queensland under the Criminal Code 1899 (QLD). Other states and territories are in states of development in respect of regulatory frameworks relating to identity theft such as Western Australia in respect of the Criminal Code Amendment (Identity Crime) Bill 2009. </p><p>At the Commonwealth level, under the <i>Criminal Code Amendment (Theft, Fraud, Bribery & Related Offences) Act 2000</i> which amended certain provisions within the <i>Criminal Code Act 1995</i>, </p> <style data-mw-deduplicate="TemplateStyles:r1244412712">.mw-parser-output .templatequote{overflow:hidden;margin:1em 0;padding:0 32px}.mw-parser-output .templatequotecite{line-height:1.5em;text-align:left;margin-top:0}@media(min-width:500px){.mw-parser-output .templatequotecite{padding-left:1.6em}}</style><blockquote class="templatequote"><p><b>135.1 General dishonesty</b> </p><p>(3) A person is guilty of an offense if a) the person does anything with the intention of dishonestly <i>causing a loss to another person</i>; and b) the other person is a Commonwealth entity. </p><p> Penalty: <i>Imprisonment for 5 years</i>.</p></blockquote> <p>Between 2014 and 2015 in Australia, there were 133,921 fraud and deception offences, an increase of 6% from previous year. The total cost reported by the Attorney General Department was:<sup id="cite_ref-:4_41-0" class="reference"><a href="#cite_note-:4-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup> </p> <table class="wikitable"> <caption>Total costs<sup id="cite_ref-:4_41-1" class="reference"><a href="#cite_note-:4-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup> </caption> <tbody><tr> <th>Fraud category </th> <th>Cost per incident </th> <th>Total direct cost </th></tr> <tr> <td>Commonwealth fraud </td> <td>$2,111 </td> <td>$353,866,740 </td></tr> <tr> <td>Personal fraud </td> <td>$400 </td> <td>$656,550,506 </td></tr> <tr> <td>Police recorded fraud </td> <td>$4,412 per unrecorded incident <p>$27,981 per recorded incident </p> </td> <td>$3,260,141,049 </td></tr></tbody></table> <p>There are also high indirect costs associated as a direct result of an incident. For example, the total indirect costs for police recorded fraud is $5,774,081.<sup id="cite_ref-:4_41-2" class="reference"><a href="#cite_note-:4-41"><span class="cite-bracket">[</span>41<span class="cite-bracket">]</span></a></sup> </p><p>Likewise, each state has enacted its own privacy laws to prevent the misuse of personal information and data. The Commonwealth <i>Privacy Act</i> applies only to Commonwealth and territory agencies and to certain private-sector bodies (where, for example, they deal with sensitive records, such as medical records, or they have more than $3 million in turnover PA). </p> <div class="mw-heading mw-heading3"><h3 id="Canada">Canada</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=17" title="Edit section: Canada" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Under section 402.2 of the <i><a href="/wiki/Criminal_Code_(Canada)" title="Criminal Code (Canada)">Criminal Code</a>,</i> </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>Everyone commits an offense who knowingly obtains or possesses another person's identity information in circumstances giving rise to a reasonable inference that the information is intended to be used to commit an indictable offense that includes fraud, deceit, or falsehood as an element of the offense. is guilty of an indictable offense and liable to imprisonment for a term of not more than five years; or is guilty of an offense punishable on summary conviction.</p></blockquote> <p>Under section 403 of the <i><a href="/wiki/Criminal_Code_(Canada)" title="Criminal Code (Canada)">Criminal Code</a>,</i> </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>(1) Everyone commits an offense who fraudulently personates another person, living or dead, </p><p>(a) with intent to gain advantage for themselves or another person; (b) with intent to obtain any property or an interest in any property; (c) with intent to cause disadvantage to the person being personated or another person; or (d) with intent to avoid arrest or prosecution or to obstruct, pervert or defeat the course of justice. </p><p> is guilty of an indictable offense and liable to imprisonment for a term of not more than 10 years; or guilty of an offense punishable on summary conviction.</p></blockquote> <p>In Canada, <i>Privacy Act</i> (federal legislation) covers only federal government, agencies and <a href="/wiki/Crown_corporations" class="mw-redirect" title="Crown corporations">crown corporations</a>. Each province and territory has its own privacy law and privacy commissioners to limit the storage and use of personal data. For the private sector, the purpose of the Personal Information Protection and Electronic Documents Act (2000, c. 5) (known as PIPEDA) is to establish rules to govern the collection, use, and disclosure of personal information; except for the provinces of Quebec, Ontario, Alberta and British Columbia where provincial laws have been deemed substantially similar. </p> <div class="mw-heading mw-heading4"><h4 id="Proposed_legislation">Proposed legislation</h4><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=18" title="Edit section: Proposed legislation" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <ul><li><a href="/wiki/Bill_C-27_(39th_Canadian_Parliament,_2nd_Session)" title="Bill C-27 (39th Canadian Parliament, 2nd Session)">Bill C-27 (39th Canadian Parliament, 2nd Session)</a></li></ul> <div class="mw-heading mw-heading3"><h3 id="France">France</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=19" title="Edit section: France" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>In France, a person convicted of identity theft can be sentenced up to five years in prison and fined up to <a href="/wiki/Euro" title="Euro">€</a>75,000.<sup id="cite_ref-42" class="reference"><a href="#cite_note-42"><span class="cite-bracket">[</span>42<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="Hong_Kong">Hong Kong</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=20" title="Edit section: Hong Kong" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Under HK Laws. Chap 210 <i>Theft Ordinance</i>, sec. 16A Fraud: </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>(1) If any person by any deceit (whether or not the deceit is the sole or main inducement) and with <b>intent to defraud</b> induces another person to commit an act or make an omission, which results either- </p><p>(a) in <b>benefit to any person</b> other than the second-mentioned person; or (b) in prejudice or a substantial risk of prejudice to any person other than the first-mentioned person, </p><p> the first-mentioned person commits the offense of fraud and is liable on conviction upon indictment to <b>imprisonment for 14 years</b>.</p></blockquote> <p>The <i>Personal Data (Privacy) Ordinance</i> (PDPO) regulates the collection, use and retention of personal information in Hong Kong. It also provides citizens the right to request information held by businesses and the government to the extent provided by this law. The PDPO establishes the <a href="/wiki/Office_of_the_Privacy_Commissioner_for_Personal_Data" title="Office of the Privacy Commissioner for Personal Data">Office of the Privacy Commissioner for Personal Data</a> which enforces the law and advises on the use of personal data. </p> <div class="mw-heading mw-heading3"><h3 id="India">India</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=21" title="Edit section: India" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Under the Information Technology Act 2000 Chapter IX Sec 66C: </p> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1244412712"><blockquote class="templatequote"><p>SECTION 66C </p><p>PUNISHMENT FOR IDENTITY THEFT </p><p> Whoever, fraudulently or dishonestly makes use of the electronic signature, password, or any other unique identification feature of any other person, shall be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees one <a href="/wiki/Lakh" title="Lakh">lakh</a>.<sup id="cite_ref-43" class="reference"><a href="#cite_note-43"><span class="cite-bracket">[</span>43<span class="cite-bracket">]</span></a></sup></p></blockquote> <div class="mw-heading mw-heading3"><h3 id="Philippines">Philippines</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=22" title="Edit section: Philippines" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Social networking sites are one of the most famous spreaders of <i>posers</i> in the online community, giving the users the freedom to post any information they want without any verification that the account is being used by the real person.<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Please_clarify" title="Wikipedia:Please clarify"><span title="The text near this tag may need clarification or removal of jargon. (April 2021)">clarification needed</span></a></i>]</sup> </p><p>The Philippines, which ranks eighth in the numbers of users of <a href="/wiki/Facebook" title="Facebook">Facebook</a> and other social networking sites (such as <a href="/wiki/Twitter" title="Twitter">Twitter</a>, <a href="/wiki/Multiply_(website)" title="Multiply (website)">Multiply</a> and <a href="/wiki/Tumblr" title="Tumblr">Tumblr</a>), has been known as a source of various identity theft problems.<sup id="cite_ref-44" class="reference"><a href="#cite_note-44"><span class="cite-bracket">[</span>44<span class="cite-bracket">]</span></a></sup> Identities of people who carelessly put personal information on their profiles can easily be stolen just by simple browsing. Some people meet online, get to know each other through Facebook chat, and exchange messages that share private information. Others get romantically involved with online friends and end up sharing too much information (such as their social security number, bank account, home address, and company address). </p><p>This phenomenon leads to the creation of the <a href="/wiki/Cybercrime_Prevention_Act_of_2012" title="Cybercrime Prevention Act of 2012">Cybercrime Prevention Act of 2012</a> (Republic Act No. 10175). Section 2 of this act states that it recognizes the importance of <a href="/wiki/Communication" title="Communication">communication</a> and <a href="/wiki/Multimedia" title="Multimedia">multimedia</a> for the development, exploitation, and dissemination of information<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Please_clarify" title="Wikipedia:Please clarify"><span title="The text near this tag may need clarification or removal of jargon. (April 2021)">clarification needed</span></a></i>]</sup>, but violators will be punished by the law through imprisonment or a fine upwards of ₱200,000, but not exceeding ₱1,000,000, or (depending on the damage caused) both. </p> <div class="mw-heading mw-heading3"><h3 id="Sweden">Sweden</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=23" title="Edit section: Sweden" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Sweden has had relatively few problems with identity theft because only Swedish <a href="/wiki/Identity_document" title="Identity document">identity documents</a> were accepted for identity verification. Stolen documents are traceable by banks and certain other institutions<sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Avoid_weasel_words" class="mw-redirect" title="Wikipedia:Avoid weasel words"><span title="The material near this tag possibly uses too vague attribution or weasel words. (April 2021)">which?</span></a></i>]</sup>. Banks are required to check the identity of anyone withdrawing money or getting loans. If a bank gives money to someone using an identity document that has been reported as stolen, the bank must take this loss. Since 2008, any EU passport is valid in Sweden for identity verification, and Swedish passports are valid all over the EU. This makes it harder to detect stolen documents, but banks in Sweden still must ensure that stolen documents are not accepted. </p><p>Other types of identity theft have become more common in Sweden. One common example is ordering a credit card to someone who has an unlocked letterbox and is not home during the daytime. The thief steals the letter with the credit card and the letter with the code, which typically arrives a few days later. Usage of a stolen credit card is difficult in Sweden since an identity document or a PIN code is normally demanded. If a shop does not demand either, it must take the loss from accepting a stolen credit card. The practice of observing someone using their credit card's PIN code, stealing the credit card, or <a href="/wiki/Skimming_(credit_card_fraud)" class="mw-redirect" title="Skimming (credit card fraud)">skimming</a> it, and then using the credit card has become more common. </p><p>Legally, Sweden is an open society. <a href="/wiki/Freedom_of_information_legislation" class="mw-redirect" title="Freedom of information legislation">The Principle of Public Access</a> states that all information (e.g. addresses, incomes, taxes) kept by public authorities must be available for anyone, except in certain cases (for example, the addresses of people who need to hide are restricted). This makes fraud easier. </p><p>Until 2016, there were no laws that specifically prohibited using someone's identity. Instead, there were only laws regarding any indirect damages caused. Impersonating anyone else for financial gain is a <a href="/wiki/Type_of_fraud" class="mw-redirect" title="Type of fraud">type of fraud</a> in the <a href="/wiki/Criminal_Code" class="mw-redirect" title="Criminal Code">Criminal Code</a> (<a href="/wiki/Swedish_language" title="Swedish language">Swedish</a>: <i lang="sv">brottsbalken</i>). Impersonating anyone else to discredit them by hacking into their social media accounts and provoke<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Please_clarify" title="Wikipedia:Please clarify"><span title="The text near this tag may need clarification or removal of jargon. (April 2021)">clarification needed</span></a></i>]</sup> is considered <a href="/wiki/Libel" class="mw-redirect" title="Libel">libel</a>. However, it is difficult to convict someone of committing this crime. In late 2016, a new law was introduced which partially banned undetermined<sup class="noprint Inline-Template" style="margin-left:0.1em; white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Please_clarify" title="Wikipedia:Please clarify"><span title="The text near this tag may need clarification or removal of jargon. (April 2021)">clarification needed</span></a></i>]</sup> identity usage.<sup id="cite_ref-45" class="reference"><a href="#cite_note-45"><span class="cite-bracket">[</span>45<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="United_Kingdom">United Kingdom</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=24" title="Edit section: United Kingdom" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>In the United Kingdom, personal data is protected by the <a href="/wiki/Data_Protection_Act_1998" title="Data Protection Act 1998">Data Protection Act 1998</a>. The Act covers all personal data which an organization may hold, including names, birthday and anniversary dates, addresses, and telephone numbers. </p><p>Under <a href="/wiki/English_law" title="English law">English law</a> (which extends to <a href="/wiki/Wales" title="Wales">Wales</a> but not to <a href="/wiki/Northern_Ireland" title="Northern Ireland">Northern Ireland</a> or <a href="/wiki/Scotland" title="Scotland">Scotland</a>), the <a href="/wiki/Deception_(criminal_law)" title="Deception (criminal law)">deception</a> offences under the <a href="/wiki/Theft_Act_1968" title="Theft Act 1968">Theft Act 1968</a> increasingly contend with identity theft situations. In <i>R v Seward</i> (2005) EWCA Crim 1941,<sup id="cite_ref-46" class="reference"><a href="#cite_note-46"><span class="cite-bracket">[</span>46<span class="cite-bracket">]</span></a></sup> the defendant was acting as the "frontman" in the use of stolen credit cards and other documents to obtain goods. He obtained goods to the value of £10,000 for others who are unlikely ever to be identified. The Court of Appeal considered a sentencing policy for deception offenses involving "identity theft" and concluded that a prison sentence was required. Henriques J. said at para 14: "Identity fraud is a particularly pernicious and prevalent form of dishonesty calling for, in our judgment, deterrent sentences." </p><p>Statistics released by <a href="/wiki/CIFAS" class="mw-redirect" title="CIFAS">CIFAS</a> (UK's Fraud Prevention Service) show that there were 89,000 victims of identity theft in the UK in 2010 and 85,000 victims in 2009.<sup id="cite_ref-47" class="reference"><a href="#cite_note-47"><span class="cite-bracket">[</span>47<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-48" class="reference"><a href="#cite_note-48"><span class="cite-bracket">[</span>48<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Reliable_sources" title="Wikipedia:Reliable sources"><span title="The material near this tag may rely on an unreliable source. (December 2015)">unreliable source?</span></a></i>]</sup> Men in their 30s and 40s are the most common victims.<sup id="cite_ref-49" class="reference"><a href="#cite_note-49"><span class="cite-bracket">[</span>49<span class="cite-bracket">]</span></a></sup><sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Reliable_sources" title="Wikipedia:Reliable sources"><span title="The material near this tag may rely on an unreliable source. (December 2015)">unreliable source?</span></a></i>]</sup> Identity fraud now accounts for nearly half of all frauds recorded.<sup id="cite_ref-50" class="reference"><a href="#cite_note-50"><span class="cite-bracket">[</span>50<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading3"><h3 id="United_States">United States</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=25" title="Edit section: United States" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236090951"><div role="note" class="hatnote navigation-not-searchable">See also: <a href="/wiki/Identity_theft_in_the_United_States" title="Identity theft in the United States">Identity theft in the United States</a></div> <p>The increase in crimes of identity theft led to the drafting of the Identity Theft and Assumption Deterrence Act.<sup id="cite_ref-51" class="reference"><a href="#cite_note-51"><span class="cite-bracket">[</span>51<span class="cite-bracket">]</span></a></sup> In 1998, The Federal Trade Commission appeared before the United States Senate.<sup id="cite_ref-52" class="reference"><a href="#cite_note-52"><span class="cite-bracket">[</span>52<span class="cite-bracket">]</span></a></sup> The FTC discussed crimes which exploit consumer credit to commit loan fraud, <a href="/wiki/Mortgage_fraud" title="Mortgage fraud">mortgage fraud</a>, lines-of-credit fraud, <a href="/wiki/Credit_card_fraud" title="Credit card fraud">credit card fraud</a>, commodities and services frauds. The Identity Theft Deterrence Act (2003)[ITADA] amended <a rel="nofollow" class="external text" href="https://www.law.cornell.edu/uscode/text/18/1028A-">U.S. Code Title 18, § 1028</a> ("Fraud related to activity in connection with identification documents, authentication features, and information"). The statute now makes the possession of any "means of identification" to "knowingly transfer, possess, or use without lawful authority" a federal crime, alongside unlawful possession of identification documents. However, for federal jurisdiction to prosecute, the crime must include an "identification document" that either: (a) is purportedly issued by the United States, (b) is used or intended to defraud the United States, (c) is sent through the mail, or (d) is used in a manner that affects interstate or foreign commerce. <i>See</i> <a href="/wiki/Title_18_of_the_United_States_Code" title="Title 18 of the United States Code">18 U.S.C.</a> <a rel="nofollow" class="external text" href="https://www.law.cornell.edu/uscode/text/18/1028">§ 1028</a>(c). Punishment can be up to 5, 15, 20, or 30 years in federal <a href="/wiki/Prison" title="Prison">prison</a>, plus fines, depending on the underlying crime per <a href="/wiki/Title_18_of_the_United_States_Code" title="Title 18 of the United States Code">18 U.S.C.</a> <a rel="nofollow" class="external text" href="https://www.law.cornell.edu/uscode/text/18/1028">§ 1028</a>(b). In addition, punishments for the unlawful use of a "means of identification" were strengthened in § 1028A ("Aggravated Identity Theft"), allowing for a consecutive sentence under specific enumerated felony violations as defined in § 1028A(c)(1) through (11).<sup id="cite_ref-53" class="reference"><a href="#cite_note-53"><span class="cite-bracket">[</span>53<span class="cite-bracket">]</span></a></sup> </p><p>The Act also provides the <a href="/wiki/Federal_Trade_Commission" title="Federal Trade Commission">Federal Trade Commission</a> with authority to track the number of incidents and the dollar value of losses. Their figures relate mainly to consumer financial crimes and not the broader range of all identification-based crimes.<sup id="cite_ref-54" class="reference"><a href="#cite_note-54"><span class="cite-bracket">[</span>54<span class="cite-bracket">]</span></a></sup> </p><p>If charges are brought by state or local law enforcement agencies, different penalties apply to depend on the state. </p><p>Six Federal agencies conducted a joint task force to increase the ability to detect identity theft. Their joint recommendation on "red flag" guidelines is a set of requirements on financial institutions and other entities which furnish credit data to credit reporting services to develop written plans for detecting identity theft. The FTC has determined that most medical practices are considered creditors and are subject to requirements to develop a plan to prevent and respond to patient identity theft.<sup id="cite_ref-55" class="reference"><a href="#cite_note-55"><span class="cite-bracket">[</span>55<span class="cite-bracket">]</span></a></sup> These plans must be adopted by each organization's board of directors and monitored by senior executives.<sup id="cite_ref-56" class="reference"><a href="#cite_note-56"><span class="cite-bracket">[</span>56<span class="cite-bracket">]</span></a></sup> </p><p>Identity theft complaints as a percentage of all fraud complaints decreased from 2004 to 2006.<sup id="cite_ref-autogenerated1_57-0" class="reference"><a href="#cite_note-autogenerated1-57"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup> The Federal Trade Commission reported that fraud complaints in general were growing faster than ID theft complaints.<sup id="cite_ref-autogenerated1_57-1" class="reference"><a href="#cite_note-autogenerated1-57"><span class="cite-bracket">[</span>57<span class="cite-bracket">]</span></a></sup> The findings were similar in two other FTC studies done in 2003 and 2005. In 2003, 4.6 percent of the US population said they were a victim of ID theft. In 2005, that number had dropped to 3.7 percent of the population.<sup id="cite_ref-SR_1_58-0" class="reference"><a href="#cite_note-SR_1-58"><span class="cite-bracket">[</span>58<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-59" class="reference"><a href="#cite_note-59"><span class="cite-bracket">[</span>59<span class="cite-bracket">]</span></a></sup> The commission's 2003 estimate was that identity theft accounted for some $52.6 billion of losses in the preceding year alone and affected more than 9.91 million Americans;<sup id="cite_ref-60" class="reference"><a href="#cite_note-60"><span class="cite-bracket">[</span>60<span class="cite-bracket">]</span></a></sup> the figure comprises $47.6 billion lost by businesses and $5 billion lost by consumers. </p><p>According to the <a href="/wiki/Bureau_of_Justice_Statistics" title="Bureau of Justice Statistics">U.S. Bureau of Justice Statistics</a>, in 2010, 7% of US households experienced identity theft - up from 5.5% in 2005 when the figures were first assembled, but broadly flat since 2007.<sup id="cite_ref-Bureau_of_Justice_Statistics_61-0" class="reference"><a href="#cite_note-Bureau_of_Justice_Statistics-61"><span class="cite-bracket">[</span>61<span class="cite-bracket">]</span></a></sup> In 2012, approximately 16.6 million persons, or 7% of all U.S. residents age 16 or older, reported being victims of one or more incidents of identity theft.<sup id="cite_ref-62" class="reference"><a href="#cite_note-62"><span class="cite-bracket">[</span>62<span class="cite-bracket">]</span></a></sup> </p><p>At least two states, <a href="/wiki/California" title="California">California</a><sup id="cite_ref-63" class="reference"><a href="#cite_note-63"><span class="cite-bracket">[</span>63<span class="cite-bracket">]</span></a></sup> and <a href="/wiki/Wisconsin" title="Wisconsin">Wisconsin</a><sup id="cite_ref-64" class="reference"><a href="#cite_note-64"><span class="cite-bracket">[</span>64<span class="cite-bracket">]</span></a></sup> have created an Office of Privacy Protection to assist their citizens in avoiding and recovering from identity theft. </p><p>In 2009, Indiana created an Identity Theft Unit within their Office of Attorney General to educate and assist consumers in avoiding and recovering from identity theft as well as assist law enforcement in investigating and prosecuting identity theft crimes.<sup id="cite_ref-65" class="reference"><a href="#cite_note-65"><span class="cite-bracket">[</span>65<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-66" class="reference"><a href="#cite_note-66"><span class="cite-bracket">[</span>66<span class="cite-bracket">]</span></a></sup> </p><p>In Massachusetts in 2009–2010, Governor <a href="/wiki/Deval_Patrick" title="Deval Patrick">Deval Patrick</a> committed to balancing consumer protection with the needs of small business owners. His Office of Consumer Affairs and Business Regulation announced certain adjustments to Massachusetts' identity theft regulations that maintain protections and also allow flexibility in compliance. These updated regulations went into effect on 1 March 2010. The regulations are clear that their approach to data security is a risk-based approach important to small businesses and might not handle a lot of personal information about customers.<sup id="cite_ref-67" class="reference"><a href="#cite_note-67"><span class="cite-bracket">[</span>67<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-68" class="reference"><a href="#cite_note-68"><span class="cite-bracket">[</span>68<span class="cite-bracket">]</span></a></sup> </p><p>The <a href="/wiki/Internal_Revenue_Service" title="Internal Revenue Service">IRS</a> has created<sup class="noprint Inline-Template" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Manual_of_Style/Dates_and_numbers#Chronological_items" title="Wikipedia:Manual of Style/Dates and numbers"><span title="The time period mentioned near this tag is ambiguous. (August 2017)">when?</span></a></i>]</sup> the IRS Identity Protection Specialized Unit to help taxpayers' who are victims of federal tax-related identity theft.<sup id="cite_ref-69" class="reference"><a href="#cite_note-69"><span class="cite-bracket">[</span>69<span class="cite-bracket">]</span></a></sup> Generally, the identity thief will use a stolen SSN to file a forged tax return and attempt to get a fraudulent refund early in the filing season. A taxpayer will need to fill out Form 14039, <a rel="nofollow" class="external text" href="https://www.irs.gov/pub/irs-pdf/f14039.pdf"><i>Identity Theft Affidavit</i></a>.<sup id="cite_ref-70" class="reference"><a href="#cite_note-70"><span class="cite-bracket">[</span>70<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-ALERT:_Beware_of_Phishing_Scam_Mentioning_TAS_71-0" class="reference"><a href="#cite_note-ALERT:_Beware_of_Phishing_Scam_Mentioning_TAS-71"><span class="cite-bracket">[</span>71<span class="cite-bracket">]</span></a></sup> </p><p>As for the future of medical care and Medicaid, people are mostly concerned about <a href="/wiki/Cloud_computing" title="Cloud computing">cloud computing</a>. The addition of using cloud information within the United States medicare system would institute easily accessible health information for individuals, but that also makes it easier for identity theft. Currently, new technology is being produced to help encrypt and protect files, which will create a smooth transition to cloud technology in the healthcare system.<sup id="cite_ref-72" class="reference"><a href="#cite_note-72"><span class="cite-bracket">[</span>72<span class="cite-bracket">]</span></a></sup> </p> <div class="mw-heading mw-heading4"><h4 id="Notification">Notification</h4><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=26" title="Edit section: Notification" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <p>Many states followed California's lead and enacted mandatory <a href="/wiki/Data_breach_notification_laws" title="Data breach notification laws">data breach notification laws</a>. As a result, companies that report a data breach typically report it to all their customers.<sup id="cite_ref-73" class="reference"><a href="#cite_note-73"><span class="cite-bracket">[</span>73<span class="cite-bracket">]</span></a></sup> </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(8)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Spread_and_impact">Spread and impact</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=27" title="Edit section: Spread and impact" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-8 collapsible-block" id="mf-section-8"> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1251242444"><table class="box-Update plainlinks metadata ambox ambox-content ambox-Update" role="presentation"><tbody><tr><td class="mbox-text"><div class="mbox-text-span">This section needs to be <b>updated</b>.<span class="hide-when-compact"> Please help update this article to reflect recent events or newly available information.</span> <span class="date-container"><i>(<span class="date">September 2023</span>)</i></span></div></td></tr></tbody></table> <p>Surveys in the US from 2003 to 2006 showed a decrease in the total number of identity fraud victims and a decrease in the total value of identity fraud from US$47.6 billion in 2003 to $15.6 billion in 2006.<sup class="noprint Inline-Template Template-Fact" style="white-space:nowrap;">[<i><a href="/wiki/Wikipedia:Citation_needed" title="Wikipedia:Citation needed"><span title="This claim needs references to reliable sources. (May 2021)">citation needed</span></a></i>]</sup> The average fraud per person decreased from $4,789 in 2003 to $1,882 in 2006. A Microsoft report shows that this drop is due to statistical problems with the methodology, that such survey-based estimates are "hopelessly flawed" and exaggerate the true losses by orders of magnitude.<sup id="cite_ref-74" class="reference"><a href="#cite_note-74"><span class="cite-bracket">[</span>74<span class="cite-bracket">]</span></a></sup> </p><p>The 2003 survey from the Identity Theft Resource Center<sup id="cite_ref-75" class="reference"><a href="#cite_note-75"><span class="cite-bracket">[</span>75<span class="cite-bracket">]</span></a></sup> found that: </p> <ul><li>Only 15% of victims find out about the theft through proactive action taken by a business</li> <li>The average time spent by victims resolving the problem is about 330 hours</li> <li>73% of respondents indicated the crime involved the thief acquiring a credit card</li></ul> <p>In a widely publicized account,<sup id="cite_ref-76" class="reference"><a href="#cite_note-76"><span class="cite-bracket">[</span>76<span class="cite-bracket">]</span></a></sup> Michelle Brown, a victim of identity fraud, testified before a U.S. Senate Committee Hearing on Identity Theft. Ms. Brown testified that: "over a year and a half from January 1998 through July 1999, one individual impersonated me to procure over $50,000 in goods and services. Not only did she damage my credit, but she escalated her crimes to a level that I never truly expected: she engaged in drug trafficking. The crime resulted in my erroneous arrest record, a warrant out for my arrest, and eventually, a prison record when she was booked under my name as an inmate in the Chicago Federal Prison." </p><p>In <a href="/wiki/Australia" title="Australia">Australia</a>, identity theft was estimated to be worth between A$1billion and A$4 billion per annum in 2001.<sup id="cite_ref-77" class="reference"><a href="#cite_note-77"><span class="cite-bracket">[</span>77<span class="cite-bracket">]</span></a></sup> </p><p>In the United Kingdom, the Home Office reported that identity fraud costs the UK economy £1.2 billion annually<sup id="cite_ref-78" class="reference"><a href="#cite_note-78"><span class="cite-bracket">[</span>78<span class="cite-bracket">]</span></a></sup> (experts believe that the real figure could be much higher)<sup id="cite_ref-79" class="reference"><a href="#cite_note-79"><span class="cite-bracket">[</span>79<span class="cite-bracket">]</span></a></sup> although privacy groups object to the validity of these numbers, arguing that they are being used by the government to push for introduction of <a href="/wiki/British_national_identity_card" class="mw-redirect" title="British national identity card">national ID cards</a>. Confusion over exactly what constitutes identity theft has led to claims that statistics may be exaggerated.<sup id="cite_ref-80" class="reference"><a href="#cite_note-80"><span class="cite-bracket">[</span>80<span class="cite-bracket">]</span></a></sup> An extensively reported<sup id="cite_ref-81" class="reference"><a href="#cite_note-81"><span class="cite-bracket">[</span>81<span class="cite-bracket">]</span></a></sup><sup id="cite_ref-82" class="reference"><a href="#cite_note-82"><span class="cite-bracket">[</span>82<span class="cite-bracket">]</span></a></sup> study from Microsoft Research<sup id="cite_ref-83" class="reference"><a href="#cite_note-83"><span class="cite-bracket">[</span>83<span class="cite-bracket">]</span></a></sup> in 2011 finds that estimates of identity theft losses contain enormous exaggerations, writing that surveys "are so compromised and biased that no faith whatever can be placed in their findings." </p> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(9)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="See_also">See also</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=28" title="Edit section: See also" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-9 collapsible-block" id="mf-section-9"> <style data-mw-deduplicate="TemplateStyles:r1184024115">.mw-parser-output .div-col{margin-top:0.3em;column-width:30em}.mw-parser-output .div-col-small{font-size:90%}.mw-parser-output .div-col-rules{column-rule:1px solid #aaa}.mw-parser-output .div-col dl,.mw-parser-output .div-col ol,.mw-parser-output .div-col ul{margin-top:0}.mw-parser-output .div-col li,.mw-parser-output .div-col dd{page-break-inside:avoid;break-inside:avoid-column}</style><div class="div-col"> <ul><li><a href="/wiki/Account_verification" title="Account verification">Account verification</a> – Process of verifying ownership of a website account</li> <li><a href="/wiki/Capgras_delusion" title="Capgras delusion">Capgras delusion</a> – Psychiatric disorder</li> <li><a href="/wiki/Cybercrime" title="Cybercrime">Cybercrime</a>, also known as Hacking – Type of crime based in computer networks</li> <li><a href="/wiki/Criminal_impersonation" class="mw-redirect" title="Criminal impersonation">Criminal impersonation</a> – Art form or criminal act<span style="display:none" class="category-annotation-with-redirected-description">Pages displaying short descriptions of redirect targets</span></li> <li><a href="/wiki/Identity-based_security" title="Identity-based security">Identity-based security</a> – Access control by authenticated ID</li> <li><a href="/wiki/Identity_score" title="Identity score">Identity score</a></li> <li><a href="/wiki/Impostor" class="mw-redirect" title="Impostor">Impostor</a> – List of people acting under false identity<span style="display:none" class="category-annotation-with-redirected-description">Pages displaying short descriptions of redirect targets</span></li> <li><a href="/wiki/Internet_fraud_prevention" title="Internet fraud prevention">Internet fraud prevention</a> – act of preventing various types of internet frauds by consumers, business owners, and financial institutions<span style="display:none" class="category-wikidata-fallback-annotation">Pages displaying wikidata descriptions as a fallback</span></li> <li><a href="/wiki/Internet_security" title="Internet security">Internet security</a> – Branch of computer security</li> <li><a href="/wiki/Lapsed_lurker" class="mw-redirect" title="Lapsed lurker">Lapsed lurker</a> – Type of intellectual property infringement<span style="display:none" class="category-annotation-with-redirected-description">Pages displaying short descriptions of redirect targets</span></li> <li><a href="/wiki/Pharming" title="Pharming">Pharming</a> – Kind of cyberattack</li> <li><a href="/wiki/Robert_Siciliano" title="Robert Siciliano">Robert Siciliano</a> – American security analyst<span style="display:none" class="category-wikidata-fallback-annotation">Pages displaying wikidata descriptions as a fallback</span></li> <li><a href="/wiki/Spamming" title="Spamming">Spamming</a> – Unsolicited electronic messages, especially advertisements</li></ul></div> <div class="mw-heading mw-heading3"><h3 id="Types_of_fraud_and_theft">Types of fraud and theft</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=29" title="Edit section: Types of fraud and theft" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1184024115"><div class="div-col"> <ul><li><a href="/wiki/Bank_fraud" title="Bank fraud">Bank fraud</a> – Form of financial crime</li> <li><a href="/wiki/Carding_(fraud)" title="Carding (fraud)">Carding (fraud)</a> – Crime involving the trafficking of credit card data</li> <li><a href="/wiki/Cheque_fraud" title="Cheque fraud">Cheque fraud</a> – Criminal acts involving unlawful use of cheques</li> <li><a href="/wiki/Check_washing" title="Check washing">Check washing</a> – Fraud technique</li> <li><a href="/wiki/Ghosting_(identity_theft)" title="Ghosting (identity theft)">Ghosting (identity theft)</a> – form of identity theft, whereby a person takes on the identity of a deceased person<span style="display:none" class="category-wikidata-fallback-annotation">Pages displaying wikidata descriptions as a fallback</span></li> <li><a href="/wiki/Identity_document_forgery" title="Identity document forgery">Identity document forgery</a> – Fake IDs and their production</li></ul> </div> <div class="mw-heading mw-heading3"><h3 id="Organizations">Organizations</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=30" title="Edit section: Organizations" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1184024115"><div class="div-col"> <ul><li><a href="/wiki/Civil_Identity_Program_of_the_Americas" title="Civil Identity Program of the Americas">Civil Identity Program of the Americas</a> – Organization of American States that are devoted to civil identity</li> <li>U.S. <a href="/wiki/Federal_Bureau_of_Investigation" title="Federal Bureau of Investigation">Federal Bureau of Investigation</a> – U.S. federal law enforcement agency</li> <li><a href="/wiki/U.S._Immigration_and_Customs_Enforcement" title="U.S. Immigration and Customs Enforcement">U.S. Immigration and Customs Enforcement</a> – US federal law enforcement agency</li> <li><a href="/wiki/United_States_Postal_Inspection_Service" title="United States Postal Inspection Service">United States Postal Inspection Service</a> – Federal law enforcement agency</li> <li><a href="/wiki/United_States_Secret_Service" title="United States Secret Service">United States Secret Service</a> – U.S. federal law enforcement agency</li></ul> </div> <div class="mw-heading mw-heading3"><h3 id="Laws">Laws</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=31" title="Edit section: Laws" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1184024115"><div class="div-col"> <ul><li><a href="/wiki/201_CMR_17.00" title="201 CMR 17.00">201 CMR 17.00</a> – Massachusetts General Law (Massachusetts personal information protection law)</li> <li><a href="/wiki/Fair_and_Accurate_Credit_Transactions_Act" title="Fair and Accurate Credit Transactions Act">Fair and Accurate Credit Transactions Act</a> – U.S. federal law</li> <li><a href="/wiki/Fair_Credit_Billing_Act" title="Fair Credit Billing Act">Fair Credit Billing Act</a></li> <li><a href="/wiki/Fair_Credit_Reporting_Act" title="Fair Credit Reporting Act">Fair Credit Reporting Act</a> – U.S. federal legislation</li></ul> </div> <div class="mw-heading mw-heading3"><h3 id="Notable_identity_thieves_and_cases">Notable identity thieves and cases</h3><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=32" title="Edit section: Notable identity thieves and cases" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div> <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1184024115"><div class="div-col"> <ul><li><a href="/wiki/Equifax#May%E2%80%93July_2017_security_breach" title="Equifax">2017 Equifax security breach</a> – American consumer credit reporting agency</li> <li><a href="/wiki/Loss_of_United_Kingdom_child_benefit_data_(2007)" title="Loss of United Kingdom child benefit data (2007)">2007 UK child benefit data misplacement</a></li> <li><a href="/wiki/Frank_Abagnale" title="Frank Abagnale">Frank Abagnale</a> – American security consultant and former fraudster (born 1948)</li> <li><a href="/wiki/Albert_Gonzalez" title="Albert Gonzalez">Albert Gonzalez</a> – American computer hacker and criminal</li> <li><a href="/wiki/Yuri_Kondratyuk" title="Yuri Kondratyuk">Yuri Kondratyuk</a> – Soviet engineer and mathematician (1897–1942)</li> <li><a href="/wiki/Charles_Stopford" title="Charles Stopford">Charles Stopford</a></li></ul> </div> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(10)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="Further_reading">Further reading</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=33" title="Edit section: Further reading" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-10 collapsible-block" id="mf-section-10"> <ul><li>Brensinger, Jordan (2023). "<a rel="nofollow" class="external text" href="https://journals.sagepub.com/doi/full/10.1177/00031224231189895">Identity Theft, Trust Breaches, and the Production of Economic Insecurity</a>". <i>American Sociological Review</i>.</li></ul> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(11)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="References">References</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=34" title="Edit section: References" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-11 collapsible-block" id="mf-section-11"> <style data-mw-deduplicate="TemplateStyles:r1239543626">.mw-parser-output .reflist{margin-bottom:0.5em;list-style-type:decimal}@media screen{.mw-parser-output .reflist{font-size:90%}}.mw-parser-output .reflist .references{font-size:100%;margin-bottom:0;list-style-type:inherit}.mw-parser-output .reflist-columns-2{column-width:30em}.mw-parser-output .reflist-columns-3{column-width:25em}.mw-parser-output .reflist-columns{margin-top:0.3em}.mw-parser-output .reflist-columns ol{margin-top:0}.mw-parser-output .reflist-columns li{page-break-inside:avoid;break-inside:avoid-column}.mw-parser-output .reflist-upper-alpha{list-style-type:upper-alpha}.mw-parser-output .reflist-upper-roman{list-style-type:upper-roman}.mw-parser-output .reflist-lower-alpha{list-style-type:lower-alpha}.mw-parser-output .reflist-lower-greek{list-style-type:lower-greek}.mw-parser-output .reflist-lower-roman{list-style-type:lower-roman}</style><div class="reflist reflist-columns references-column-width" style="column-width: 30em;"> <ol class="references"> <li id="cite_note-1"><span class="mw-cite-backlink"><b><a href="#cite_ref-1">^</a></b></span> <span class="reference-text"><style data-mw-deduplicate="TemplateStyles:r1238218222">.mw-parser-output cite.citation{font-style:inherit;word-wrap:break-word}.mw-parser-output .citation q{quotes:"\"""\"""'""'"}.mw-parser-output .citation:target{background-color:rgba(0,127,255,0.133)}.mw-parser-output .id-lock-free.id-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/6/65/Lock-green.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-limited.id-lock-limited a,.mw-parser-output .id-lock-registration.id-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/d/d6/Lock-gray-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .id-lock-subscription.id-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/a/aa/Lock-red-alt-2.svg")right 0.1em center/9px no-repeat}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/4/4c/Wikisource-logo.svg")right 0.1em center/12px no-repeat}body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-free a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-limited a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-registration a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .id-lock-subscription a,body:not(.skin-timeless):not(.skin-minerva) .mw-parser-output .cs1-ws-icon a{background-size:contain;padding:0 1em 0 0}.mw-parser-output .cs1-code{color:inherit;background:inherit;border:none;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;color:var(--color-error,#d33)}.mw-parser-output .cs1-visible-error{color:var(--color-error,#d33)}.mw-parser-output .cs1-maint{display:none;color:#085;margin-left:0.3em}.mw-parser-output .cs1-kern-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right{padding-right:0.2em}.mw-parser-output .citation .mw-selflink{font-weight:inherit}@media screen{.mw-parser-output .cs1-format{font-size:95%}html.skin-theme-clientpref-night .mw-parser-output .cs1-maint{color:#18911f}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .cs1-maint{color:#18911f}}</style><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://dictionary.oed.com/cgi/entry/50111220/50111220se23">"Oxford English Dictionary online"</a>. Oxford University Press. September 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">27 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Oxford+English+Dictionary+online&rft.pub=Oxford+University+Press&rft.date=2007-09&rft_id=http%3A%2F%2Fdictionary.oed.com%2Fcgi%2Fentry%2F50111220%2F50111220se23&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-2"><span class="mw-cite-backlink"><b><a href="#cite_ref-2">^</a></b></span> <span class="reference-text">Synthetic ID Theft <a rel="nofollow" class="external text" href="http://www.unc.edu/~dubal/idtheft/synthetic.htm">Cyber Space Times</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20151009122632/http://www.unc.edu/~dubal/idtheft/synthetic.htm">Archived</a> 9 October 2015 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-3"><span class="mw-cite-backlink"><b><a href="#cite_ref-3">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHoofnagle2007" class="citation ssrn cs1">Hoofnagle, Chris Jay (13 March 2007). "Identity Theft: Making the Known Unknowns Known". <a href="/wiki/SSRN_(identifier)" class="mw-redirect" title="SSRN (identifier)">SSRN</a> <a rel="nofollow" class="external text" href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=969441">969441</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=preprint&rft.jtitle=Social+Science+Research+Network&rft.atitle=Identity+Theft%3A+Making+the+Known+Unknowns+Known&rft.date=2007-03-13&rft_id=https%3A%2F%2Fpapers.ssrn.com%2Fsol3%2Fpapers.cfm%3Fabstract_id%3D969441%23id-name%3DSSRN&rft.aulast=Hoofnagle&rft.aufirst=Chris+Jay&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-BloombergIdentityTheftEssay-4"><span class="mw-cite-backlink"><b><a href="#cite_ref-BloombergIdentityTheftEssay_4-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFDrew_Armstrong2017" class="citation news cs1">Drew Armstrong (13 September 2017). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20170919142519/https://www.bloomberg.com/news/articles/2017-09-13/my-three-years-in-identity-theft-hell">"My Three Years in Identity Theft Hell"</a>. <i>Bloomberg.com</i>. Bloomberg. Archived from <a rel="nofollow" class="external text" href="https://www.bloomberg.com/news/articles/2017-09-13/my-three-years-in-identity-theft-hell">the original</a> on 19 September 2017<span class="reference-accessdate">. Retrieved <span class="nowrap">20 September</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Bloomberg.com&rft.atitle=My+Three+Years+in+Identity+Theft+Hell&rft.date=2017-09-13&rft.au=Drew+Armstrong&rft_id=https%3A%2F%2Fwww.bloomberg.com%2Fnews%2Farticles%2F2017-09-13%2Fmy-three-years-in-identity-theft-hell&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-5"><span class="mw-cite-backlink"><b><a href="#cite_ref-5">^</a></b></span> <span class="reference-text">See, e.g., <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://docs.legis.wisconsin.gov/statutes/statutes/943/III/201">"Wisconsin Statutes, Sec. 943.201. Unauthorized use of an individual's personal identifying information or documents"</a>. <i>Wisconsin State Legislature</i><span class="reference-accessdate">. Retrieved <span class="nowrap">19 July</span> 2017</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Wisconsin+State+Legislature&rft.atitle=Wisconsin+Statutes%2C+Sec.+943.201.+Unauthorized+use+of+an+individual%27s+personal+identifying+information+or+documents.&rft_id=https%3A%2F%2Fdocs.legis.wisconsin.gov%2Fstatutes%2Fstatutes%2F943%2FIII%2F201&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-6"><span class="mw-cite-backlink"><b><a href="#cite_ref-6">^</a></b></span> <span class="reference-text">Federal Trade Commission – 2006 Identity Theft Survey Report, p. 4</span> </li> <li id="cite_note-7"><span class="mw-cite-backlink"><b><a href="#cite_ref-7">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.gao.gov/new.items/d07737.pdf">"Data Breaches Are Frequent, but Evidence of Resulting Identity Theft Is Limited; However, the Full Extent Is Unknown"</a> <span class="cs1-format">(PDF)</span>. <i>Highlights of GAO-07-737, a report to congressional requesters</i>. gao.gov<span class="reference-accessdate">. Retrieved <span class="nowrap">22 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Highlights+of+GAO-07-737%2C+a+report+to+congressional+requesters&rft.atitle=Data+Breaches+Are+Frequent%2C+but+Evidence+of+Resulting+Identity+Theft+Is+Limited%3B+However%2C+the+Full+Extent+Is+Unknown&rft_id=http%3A%2F%2Fwww.gao.gov%2Fnew.items%2Fd07737.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-8"><span class="mw-cite-backlink"><b><a href="#cite_ref-8">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFSasha_Romanosky" class="citation web cs1">Sasha Romanosky. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20120120001255/http://www.heinz.cmu.edu/research/241full.pdf">"Do Data Breach Disclosure Laws Reduce Identity Theft?"</a> <span class="cs1-format">(PDF)</span>. <i>Heinz First Research Paper</i>. heinz.cmu.edu. Archived from <a rel="nofollow" class="external text" href="http://www.heinz.cmu.edu/research/241full.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 2012-01-20<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-05-27</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Heinz+First+Research+Paper&rft.atitle=Do+Data+Breach+Disclosure+Laws+Reduce+Identity+Theft%3F&rft.au=Sasha+Romanosky&rft_id=http%3A%2F%2Fwww.heinz.cmu.edu%2Fresearch%2F241full.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-Giles2010-9"><span class="mw-cite-backlink"><b><a href="#cite_ref-Giles2010_9-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGiles2010" class="citation journal cs1">Giles, Jim (2010). "Cyber crime made easy". <i>New Scientist</i>. <b>205</b> (2752). Elsevier BV: 20–21. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<a rel="nofollow" class="external text" href="https://doi.org/10.1016%2Fs0262-4079%2810%2960647-1">10.1016/s0262-4079(10)60647-1</a>. <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/0262-4079">0262-4079</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=New+Scientist&rft.atitle=Cyber+crime+made+easy&rft.volume=205&rft.issue=2752&rft.pages=20-21&rft.date=2010&rft_id=info%3Adoi%2F10.1016%2Fs0262-4079%2810%2960647-1&rft.issn=0262-4079&rft.aulast=Giles&rft.aufirst=Jim&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-10"><span class="mw-cite-backlink"><b><a href="#cite_ref-10">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGiles" class="citation web cs1">Giles, Jim. <a rel="nofollow" class="external text" href="https://www.newscientist.com/article/mg20527524-300-credit-card-theft-theres-an-app-for-that/">"<span class="cs1-kern-left"></span>'Credit card theft? There's an app for that'<span class="cs1-kern-right"></span>"</a>. <i>New Scientist</i><span class="reference-accessdate">. Retrieved <span class="nowrap">2021-03-19</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=New+Scientist&rft.atitle=%27Credit+card+theft%3F+There%27s+an+app+for+that%27&rft.aulast=Giles&rft.aufirst=Jim&rft_id=https%3A%2F%2Fwww.newscientist.com%2Farticle%2Fmg20527524-300-credit-card-theft-theres-an-app-for-that%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-11"><span class="mw-cite-backlink"><b><a href="#cite_ref-11">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.bjs.gov/content/pub/pdf/vit12.pdf">Victims of Identity Theft, 2012</a> BJS</span> </li> <li id="cite_note-12"><span class="mw-cite-backlink"><b><a href="#cite_ref-12">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.idtheftcenter.org/">"Identity Theft Resource Center website"</a>. idtheftcenter.org.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Identity+Theft+Resource+Center+website&rft.pub=idtheftcenter.org&rft_id=http%3A%2F%2Fwww.idtheftcenter.org%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-13"><span class="mw-cite-backlink"><b><a href="#cite_ref-13">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.worldprivacyforum.org/medidtheft_consumertips.html">"Medical Identity Theft: What to Do if You are a Victim (or are concerned about it)"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Medical+Identity+Theft%3A+What+to+Do+if+You+are+a+Victim+%28or+are+concerned+about+it%29&rft_id=http%3A%2F%2Fwww.worldprivacyforum.org%2Fmedidtheft_consumertips.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, World Privacy Forum</span> </li> <li id="cite_note-14"><span class="mw-cite-backlink"><b><a href="#cite_ref-14">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120921/http://www.privacyrights.org/fs/fs17g-CrimIdTheft.htm">"Privacy Rights Clearinghouse"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.privacyrights.org/fs/fs17g-CrimIdTheft.htm">the original</a> on 21 September 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Privacy+Rights+Clearinghouse&rft_id=http%3A%2F%2Fwww.privacyrights.org%2Ffs%2Ffs17g-CrimIdTheft.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span> - "Fact Sheet 17g: Criminal Identity Theft: What to Do If It Happens to You "</span> </li> <li id="cite_note-15"><span class="mw-cite-backlink"><b><a href="#cite_ref-15">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20150719051854/http://www.leagle.com/decision/2009567417bbr150_1566">"In Re Colokathis | 417 B.R. 150 (2009)"</a>. <i>Leagle</i>. Archived from <a rel="nofollow" class="external text" href="https://www.leagle.com/decision/2009567417bbr1501566">the original</a> on 19 July 2015.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Leagle&rft.atitle=In+Re+Colokathis+%26%23124%3B+417+B.R.+150+%282009%29&rft_id=https%3A%2F%2Fwww.leagle.com%2Fdecision%2F2009567417bbr1501566&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-16"><span class="mw-cite-backlink"><b><a href="#cite_ref-16">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFMcFadden2007" class="citation web cs1">McFadden, Leslie (16 May 2007). <a rel="nofollow" class="external text" href="http://www.bankrate.com/brm/news/pf/identity_theft_20070516_a1.asp">"Detecting synthetic identity fraud"</a>. <i>Bankrate.com</i>. pp. 1–2<span class="reference-accessdate">. Retrieved <span class="nowrap">21 September</span> 2008</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Bankrate.com&rft.atitle=Detecting+synthetic+identity+fraud&rft.pages=1-2&rft.date=2007-05-16&rft.aulast=McFadden&rft.aufirst=Leslie&rft_id=http%3A%2F%2Fwww.bankrate.com%2Fbrm%2Fnews%2Fpf%2Fidentity_theft_20070516_a1.asp&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-17"><span class="mw-cite-backlink"><b><a href="#cite_ref-17">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.worldprivacyforum.org/">"World Privacy Forum"</a>. <i>www.worldprivacyforum.org</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.worldprivacyforum.org&rft.atitle=World+Privacy+Forum&rft_id=https%3A%2F%2Fwww.worldprivacyforum.org%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-18"><span class="mw-cite-backlink"><b><a href="#cite_ref-18">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.igrad.com/articles/8-types-of-identity-theft">"Get to Know These Common Types of ID Theft"</a>. <i>iGrad</i><span class="reference-accessdate">. Retrieved <span class="nowrap">29 September</span> 2016</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=iGrad&rft.atitle=Get+to+Know+These+Common+Types+of+ID+Theft&rft_id=http%3A%2F%2Fwww.igrad.com%2Farticles%2F8-types-of-identity-theft&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-19"><span class="mw-cite-backlink"><b><a href="#cite_ref-19">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20130416062351/http://www.worldprivacyforum.org/medicalidentitytheft.html">"The Medical Identity Theft Information Page"</a>. World Privacy Forum. Archived from <a rel="nofollow" class="external text" href="http://www.worldprivacyforum.org/medicalidentitytheft.html">the original</a> on 16 April 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">26 November</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+Medical+Identity+Theft+Information+Page&rft.pub=World+Privacy+Forum&rft_id=http%3A%2F%2Fwww.worldprivacyforum.org%2Fmedicalidentitytheft.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-20"><span class="mw-cite-backlink"><b><a href="#cite_ref-20">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130123025205/http://www.idtheftcenter.org/artman2/publish/v_fact_sheets/Fact_Sheet_130_A_Correcting_Misinformation_on_Medical_Records.shtml">"Correcting Misinformation on Medical Records"</a>. Identity Theft Resource Center. Archived from <a rel="nofollow" class="external text" href="http://www.idtheftcenter.org/artman2/publish/v_fact_sheets/Fact_Sheet_130_A_Correcting_Misinformation_on_Medical_Records.shtml">the original</a> on 23 January 2013.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Correcting+Misinformation+on+Medical+Records&rft.pub=Identity+Theft+Resource+Center&rft_id=http%3A%2F%2Fwww.idtheftcenter.org%2Fartman2%2Fpublish%2Fv_fact_sheets%2FFact_Sheet_130_A_Correcting_Misinformation_on_Medical_Records.shtml&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-21"><span class="mw-cite-backlink"><b><a href="#cite_ref-21">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.foxbusiness.com/features/government-turns-spotlight-on-child-id-theft-problem">"Government Turns Spotlight on Child ID Theft Problem"</a>. <i>CreditCards.com</i>. 12 January 2016<span class="reference-accessdate">. Retrieved <span class="nowrap">22 April</span> 2019</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=CreditCards.com&rft.atitle=Government+Turns+Spotlight+on+Child+ID+Theft+Problem&rft.date=2016-01-12&rft_id=https%3A%2F%2Fwww.foxbusiness.com%2Ffeatures%2Fgovernment-turns-spotlight-on-child-id-theft-problem&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-:5-22"><span class="mw-cite-backlink">^ <a href="#cite_ref-:5_22-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:5_22-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFClemente2010" class="citation web cs1">Clemente, Jean (Feb 2010). <a rel="nofollow" class="external text" href="http://link.galegroup.com/apps/doc/A317310399/AONE?u=sunybuff_main&sid=AONE&xid=8502170b.">"Protecting and defending a young person in foster care from financial identity theft"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Protecting+and+defending+a+young+person+in+foster+care+from+financial+identity+theft&rft.date=2010-02&rft.aulast=Clemente&rft.aufirst=Jean&rft_id=http%3A%2F%2Flink.galegroup.com%2Fapps%2Fdoc%2FA317310399%2FAONE%3Fu%3Dsunybuff_main%26sid%3DAONE%26xid%3D8502170b.&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-23"><span class="mw-cite-backlink"><b><a href="#cite_ref-23">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBergArabiatMoreliusKervin2024" class="citation journal cs1">Berg, Valeska; Arabiat, Diana; Morelius, Evalotte; Kervin, Lisa; Zgambo, Maggie; Robinson, Suzanne; Jenkins, Mark; Whitehead, Lisa (2024-02-21). <a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10918551">"Young Children and the Creation of a Digital Identity on Social Networking Sites: Scoping Review"</a>. <i>JMIR Pediatrics and Parenting</i>. <b>7</b> (1): e54414. <a href="/wiki/Doi_(identifier)" class="mw-redirect" title="Doi (identifier)">doi</a>:<span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://doi.org/10.2196%2F54414">10.2196/54414</a></span>. <a href="/wiki/PMC_(identifier)" class="mw-redirect" title="PMC (identifier)">PMC</a> <span class="id-lock-free" title="Freely accessible"><a rel="nofollow" class="external text" href="https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10918551">10918551</a></span>. <a href="/wiki/PMID_(identifier)" class="mw-redirect" title="PMID (identifier)">PMID</a> <a rel="nofollow" class="external text" href="https://pubmed.ncbi.nlm.nih.gov/38381499">38381499</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=JMIR+Pediatrics+and+Parenting&rft.atitle=Young+Children+and+the+Creation+of+a+Digital+Identity+on+Social+Networking+Sites%3A+Scoping+Review&rft.volume=7&rft.issue=1&rft.pages=e54414&rft.date=2024-02-21&rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC10918551%23id-name%3DPMC&rft_id=info%3Apmid%2F38381499&rft_id=info%3Adoi%2F10.2196%2F54414&rft.aulast=Berg&rft.aufirst=Valeska&rft.au=Arabiat%2C+Diana&rft.au=Morelius%2C+Evalotte&rft.au=Kervin%2C+Lisa&rft.au=Zgambo%2C+Maggie&rft.au=Robinson%2C+Suzanne&rft.au=Jenkins%2C+Mark&rft.au=Whitehead%2C+Lisa&rft_id=https%3A%2F%2Fwww.ncbi.nlm.nih.gov%2Fpmc%2Farticles%2FPMC10918551&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-24"><span class="mw-cite-backlink"><b><a href="#cite_ref-24">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.idtheftcenter.org/Identity-Theft/what-is-financial-identity-theft.html">"What is Financial Identity Theft"</a>. ID Theft Center<span class="reference-accessdate">. Retrieved <span class="nowrap">3 December</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=What+is+Financial+Identity+Theft&rft.pub=ID+Theft+Center&rft_id=http%3A%2F%2Fwww.idtheftcenter.org%2FIdentity-Theft%2Fwhat-is-financial-identity-theft.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-:03-25"><span class="mw-cite-backlink">^ <a href="#cite_ref-:03_25-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:03_25-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.citrincooperman.com/In-Focus-Resource-Center">"In Focus Resource Center from Citrin Cooperman | Ideas That Count"</a>. <i>www.citrincooperman.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.citrincooperman.com&rft.atitle=In+Focus+Resource+Center+from+Citrin+Cooperman+%26%23124%3B+Ideas+That+Count&rft_id=https%3A%2F%2Fwww.citrincooperman.com%2FIn-Focus-Resource-Center&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-26"><span class="mw-cite-backlink"><b><a href="#cite_ref-26">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFLoviglio2012" class="citation news cs1">Loviglio, Joann (March 2012). <a rel="nofollow" class="external text" href="http://www.nbcnews.com/id/46874551">"If Microsoft co-founder's ID isn't safe, is yours?"</a>. <i>NBC News</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=NBC+News&rft.atitle=If+Microsoft+co-founder%27s+ID+isn%27t+safe%2C+is+yours%3F&rft.date=2012-03&rft.aulast=Loviglio&rft.aufirst=Joann&rft_id=http%3A%2F%2Fwww.nbcnews.com%2Fid%2F46874551&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span><sup class="noprint Inline-Template"><span style="white-space: nowrap;">[<i><a href="/wiki/Wikipedia:Link_rot" title="Wikipedia:Link rot"><span title=" Dead link tagged August 2024">dead link</span></a></i><span style="visibility:hidden; color:transparent; padding-left:2px"></span>]</span></sup></span> </li> <li id="cite_note-27"><span class="mw-cite-backlink"><b><a href="#cite_ref-27">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120728/http://www.douglascountysheriff.org/idtheft/idtheftmain.htm">"Identity Theft"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.douglascountysheriff.org/idtheft/idtheftmain.htm">the original</a> on 2012-07-28<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-08-02</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Identity+Theft&rft_id=http%3A%2F%2Fwww.douglascountysheriff.org%2Fidtheft%2Fidtheftmain.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, Douglas County Sheriff's Office, Washington</span> </li> <li id="cite_note-28"><span class="mw-cite-backlink"><b><a href="#cite_ref-28">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFOlmos2009" class="citation news cs1">Olmos, David (6 July 2009). <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130617002156/http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aKbjO.Ew4S2E">"Social Security Numbers Can Be Guessed From Data, Study Finds"</a>. Bloomberg. Archived from <a rel="nofollow" class="external text" href="https://www.bloomberg.com/apps/news?pid=newsarchive&sid=aKbjO.Ew4S2E">the original</a> on 17 June 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">4 January</span> 2011</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Social+Security+Numbers+Can+Be+Guessed+From+Data%2C+Study+Finds&rft.date=2009-07-06&rft.aulast=Olmos&rft.aufirst=David&rft_id=https%3A%2F%2Fwww.bloomberg.com%2Fapps%2Fnews%3Fpid%3Dnewsarchive%26sid%3DaKbjO.Ew4S2E&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-29"><span class="mw-cite-backlink"><b><a href="#cite_ref-29">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.idtheftcenter.org/Fact-Sheets/fs-117.html">IDtheftcenter.org</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160417074200/http://www.idtheftcenter.org/Fact-Sheets/fs-117.html">Archived</a> 17 April 2016 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Identity Theft Resource Center Fact Sheet 117 Identity Theft and the Deceased - Prevention and Victim Tips.</span> </li> <li id="cite_note-30"><span class="mw-cite-backlink"><b><a href="#cite_ref-30">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120907/http://www.nextadvisor.com/identity_theft_protection_services/compare.php">"Identity Theft Protection Services"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.nextadvisor.com/identity_theft_protection_services/compare.php">the original</a> on 2012-09-07<span class="reference-accessdate">. Retrieved <span class="nowrap">2008-12-16</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Identity+Theft+Protection+Services&rft_id=http%3A%2F%2Fwww.nextadvisor.com%2Fidentity_theft_protection_services%2Fcompare.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span> retrieved on 16 December 2008</span> </li> <li id="cite_note-31"><span class="mw-cite-backlink"><b><a href="#cite_ref-31">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.pcworld.com/article/145077/identitytheft_protection_what_services_can_you_trust.html">"Identity-Theft Protection: What Services Can You Trust?"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Identity-Theft+Protection%3A+What+Services+Can+You+Trust%3F&rft_id=http%3A%2F%2Fwww.pcworld.com%2Farticle%2F145077%2Fidentitytheft_protection_what_services_can_you_trust.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span> PC World.com, retrieved on 16 December 2008</span> </li> <li id="cite_note-:02-32"><span class="mw-cite-backlink">^ <a href="#cite_ref-:02_32-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:02_32-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFUnited_StatesCongressHouseCommittee_on_Ways_and_Means2018" class="citation book cs1">United States; Congress; House; Committee on Ways and Means (2018). <a rel="nofollow" class="external text" href="https://purl.fdlp.gov/GPO/gpo90910"><i>Protecting Children from Identity Theft Act: report (to accompany H.R. 5192) (including cost estimate of the Congressional Budget Office)</i></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Protecting+Children+from+Identity+Theft+Act%3A+report+%28to+accompany+H.R.+5192%29+%28including+cost+estimate+of+the+Congressional+Budget+Office%29.&rft.date=2018&rft.au=United+States&rft.au=Congress&rft.au=House&rft.au=Committee+on+Ways+and+Means&rft_id=https%3A%2F%2Fpurl.fdlp.gov%2FGPO%2Fgpo90910&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-:12-33"><span class="mw-cite-backlink">^ <a href="#cite_ref-:12_33-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:12_33-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:12_33-2"><sup><i><b>c</b></i></sup></a> <a href="#cite_ref-:12_33-3"><sup><i><b>d</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFGašperRobertMiha2018" class="citation journal cs1">Gašper, Jordan; Robert, Leskovar; Miha, Marič (1 May 2018). <a rel="nofollow" class="external text" href="https://doaj.org/article/f1b7b6fe687348f994d559d57e6d46c1">"Impact of Fear of Identity Theft and Perceived Risk on Online Purchase Intention"</a>. <i>Organizacija</i>. <b>51</b> (2). <a href="/wiki/ISSN_(identifier)" class="mw-redirect" title="ISSN (identifier)">ISSN</a> <a rel="nofollow" class="external text" href="https://search.worldcat.org/issn/1581-1832">1581-1832</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Organizacija&rft.atitle=Impact+of+Fear+of+Identity+Theft+and+Perceived+Risk+on+Online+Purchase+Intention&rft.volume=51&rft.issue=2&rft.date=2018-05-01&rft.issn=1581-1832&rft.aulast=Ga%C5%A1per&rft.aufirst=Jordan&rft.au=Robert%2C+Leskovar&rft.au=Miha%2C+Mari%C4%8D&rft_id=https%3A%2F%2Fdoaj.org%2Farticle%2Ff1b7b6fe687348f994d559d57e6d46c1&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-:22-34"><span class="mw-cite-backlink">^ <a href="#cite_ref-:22_34-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:22_34-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.cutimes.com/2017/10/02/id-theft-aftermath-shows-a-wake-of-financial-and-e/?slreturn=20180918084135">"ID Theft Aftermath Shows a Wake of Financial and Emotional Victims | Credit Union Times"</a>. <i>Credit Union Times</i><span class="reference-accessdate">. Retrieved <span class="nowrap">18 October</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Credit+Union+Times&rft.atitle=ID+Theft+Aftermath+Shows+a+Wake+of+Financial+and+Emotional+Victims+%7C+Credit+Union+Times&rft_id=https%3A%2F%2Fwww.cutimes.com%2F2017%2F10%2F02%2Fid-theft-aftermath-shows-a-wake-of-financial-and-e%2F%3Fslreturn%3D20180918084135&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-35"><span class="mw-cite-backlink"><b><a href="#cite_ref-35">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120801/http://www.ftc.gov/os/1998/05/identhef.htm">"Testimony before the Subcommittee on Technology, Terrorism and Government Information"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.ftc.gov/os/1998/05/identhef.htm">the original</a> on 1 August 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Testimony+before+the+Subcommittee+on+Technology%2C+Terrorism+and+Government+Information&rft_id=http%3A%2F%2Fwww.ftc.gov%2Fos%2F1998%2F05%2Fidenthef.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, Committee of the Judiciary, United States Senate 20 May 1998 pp 5,6</span> </li> <li id="cite_note-36"><span class="mw-cite-backlink"><b><a href="#cite_ref-36">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20100613183200/http://www.privacyrights.org/ar/ChronDataBreaches.htm">"A Chronology of Data Breaches"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.privacyrights.org/ar/ChronDataBreaches.htm">the original</a> on 13 June 2010.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=A+Chronology+of+Data+Breaches&rft_id=http%3A%2F%2Fwww.privacyrights.org%2Far%2FChronDataBreaches.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-37"><span class="mw-cite-backlink"><b><a href="#cite_ref-37">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.siia.net/software/pubs/iit-00.pdf">Internet Identity Theft - A Tragedy for Victims</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110422192157/http://www.siia.net/software/pubs/iit-00.pdf">Archived</a> 22 April 2011 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, <a href="/wiki/Software_and_Information_Industry_Association" title="Software and Information Industry Association">Software and Information Industry Association</a>. Retrieved 30 June 2006.</span> </li> <li id="cite_note-38"><span class="mw-cite-backlink"><b><a href="#cite_ref-38">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHoltSmirnovaChua2016" class="citation book cs1">Holt, Thomas J.; Smirnova, Olga; Chua, Yi-Ting (2016). <i>Data thieves in action: examining the international market for stolen personal information</i>. Palgrave Macmillan. <a href="/wiki/ISBN_(identifier)" class="mw-redirect" title="ISBN (identifier)">ISBN</a> <a href="/wiki/Special:BookSources/978-1-137-58904-0" title="Special:BookSources/978-1-137-58904-0"><bdi>978-1-137-58904-0</bdi></a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Data+thieves+in+action%3A+examining+the+international+market+for+stolen+personal+information&rft.pub=Palgrave+Macmillan&rft.date=2016&rft.isbn=978-1-137-58904-0&rft.aulast=Holt&rft.aufirst=Thomas+J.&rft.au=Smirnova%2C+Olga&rft.au=Chua%2C+Yi-Ting&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-39"><span class="mw-cite-backlink"><b><a href="#cite_ref-39">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRossi2015" class="citation news cs1">Rossi, Ben (8 July 2015). <a rel="nofollow" class="external text" href="https://www.information-age.com/ripple-effect-identity-theft-what-happens-my-data-once-its-stolen-123459795/">"The ripple effect of identity theft: What happens to my data once it's stolen?"</a>. <i>Information Age</i>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=Information+Age&rft.atitle=The+ripple+effect+of+identity+theft%3A+What+happens+to+my+data+once+it%27s+stolen%3F&rft.date=2015-07-08&rft.aulast=Rossi&rft.aufirst=Ben&rft_id=https%3A%2F%2Fwww.information-age.com%2Fripple-effect-identity-theft-what-happens-my-data-once-its-stolen-123459795%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-InterpolSLTD-40"><span class="mw-cite-backlink"><b><a href="#cite_ref-InterpolSLTD_40-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><span class="id-lock-subscription" title="Paid subscription required"><a rel="nofollow" class="external text" href="https://www.telegraph.co.uk/news/worldnews/asia/malaysia/10686319/Interpol-warned-of-danger-posed-by-stolen-passports.html">"Airlines and governments not checking stolen passports register"</a></span>. <i>The Daily Telegraph</i>. <a rel="nofollow" class="external text" href="https://ghostarchive.org/archive/20220112/https://www.telegraph.co.uk/news/worldnews/asia/malaysia/10686319/Interpol-warned-of-danger-posed-by-stolen-passports.html">Archived</a> from the original on 2022-01-12<span class="reference-accessdate">. Retrieved <span class="nowrap">11 September</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Daily+Telegraph&rft.atitle=Airlines+and+governments+not+checking+stolen+passports+register&rft_id=https%3A%2F%2Fwww.telegraph.co.uk%2Fnews%2Fworldnews%2Fasia%2Fmalaysia%2F10686319%2FInterpol-warned-of-danger-posed-by-stolen-passports.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-:4-41"><span class="mw-cite-backlink">^ <a href="#cite_ref-:4_41-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-:4_41-1"><sup><i><b>b</b></i></sup></a> <a href="#cite_ref-:4_41-2"><sup><i><b>c</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/Identity-crime-and-misuse-in-Australia-2016.pdf">"Identity crime and misuse in Australia"</a> <span class="cs1-format">(PDF)</span><span class="reference-accessdate">. Retrieved <span class="nowrap">8 February</span> 2018</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Identity+crime+and+misuse+in+Australia&rft_id=https%3A%2F%2Fwww.ag.gov.au%2FRightsAndProtections%2FIdentitySecurity%2FDocuments%2FIdentity-crime-and-misuse-in-Australia-2016.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-42"><span class="mw-cite-backlink"><b><a href="#cite_ref-42">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.journaldunet.com/juridique/juridique040309.shtml">"Usurpation d'identité : la loi ou la technique pour se protéger ?"</a>. <i>www.journaldunet.com</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=www.journaldunet.com&rft.atitle=Usurpation+d%27identit%C3%A9+%3A+la+loi+ou+la+technique+pour+se+prot%C3%A9ger+%3F&rft_id=http%3A%2F%2Fwww.journaldunet.com%2Fjuridique%2Fjuridique040309.shtml&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-43"><span class="mw-cite-backlink"><b><a href="#cite_ref-43">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20130724123617/http://nicca.nic.in/pdf/itact2000.pdf">"The Information Technology Act 2000"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="http://nicca.nic.in/pdf/itact2000.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 2013-07-24<span class="reference-accessdate">. Retrieved <span class="nowrap">2013-08-20</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+Information+Technology+Act+2000&rft_id=http%3A%2F%2Fnicca.nic.in%2Fpdf%2Fitact2000.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-44"><span class="mw-cite-backlink"><b><a href="#cite_ref-44">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20160310213502/https://www.techunblocked.org/2015/06/facebook-users-by-country-wise.html">"List of Facebook Users by Country Wise Top ranking 2016 - Tech Unblocked"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.techunblocked.org/2015/06/facebook-users-by-country-wise.html">the original</a> on 10 March 2016.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=List+of+Facebook+Users+by+Country+Wise+Top+ranking+2016+-+Tech+Unblocked&rft_id=https%3A%2F%2Fwww.techunblocked.org%2F2015%2F06%2Ffacebook-users-by-country-wise.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-45"><span class="mw-cite-backlink"><b><a href="#cite_ref-45">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://rkrattsdb.gov.se/SFSdoc/16/160485.PDF">"SFS 2016:485 Lag om ändring i brottsbalken"</a> <span class="cs1-format">(PDF)</span><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=SFS+2016%3A485+Lag+om+%C3%A4ndring+i+brottsbalken&rft_id=http%3A%2F%2Frkrattsdb.gov.se%2FSFSdoc%2F16%2F160485.PDF&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-46"><span class="mw-cite-backlink"><b><a href="#cite_ref-46">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.bailii.org/ew/cases/EWCA/Crim/2005/1941.html">"Seward, R. v [2005] EWCA Crim 1941 (11 July 2005)"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Seward%2C+R.+v+%5B2005%5D+EWCA+Crim+1941+%2811+July+2005%29&rft_id=http%3A%2F%2Fwww.bailii.org%2Few%2Fcases%2FEWCA%2FCrim%2F2005%2F1941.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-47"><span class="mw-cite-backlink"><b><a href="#cite_ref-47">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.cifas.org.uk/identity_fraud">"CIFAS: your identity"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=CIFAS%3A+your+identity&rft_id=http%3A%2F%2Fwww.cifas.org.uk%2Fidentity_fraud&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, CIFAS</span> </li> <li id="cite_note-48"><span class="mw-cite-backlink"><b><a href="#cite_ref-48">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120701/http://id-theft-uk.blogspot.com/2010/02/uk-fraud-prevention-agency-say-id-theft.html">"UK Fraud Prevention Agency Say ID Theft Increase of 32% in 2009"</a>. Archived from <a rel="nofollow" class="external text" href="http://id-theft-uk.blogspot.com/2010/02/uk-fraud-prevention-agency-say-id-theft.html">the original</a> on 2012-07-01<span class="reference-accessdate">. Retrieved <span class="nowrap">2010-02-03</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=UK+Fraud+Prevention+Agency+Say+ID+Theft+Increase+of+32%25+in+2009&rft_id=http%3A%2F%2Fid-theft-uk.blogspot.com%2F2010%2F02%2Fuk-fraud-prevention-agency-say-id-theft.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, Identity Theft UK Blog, 3 February 2010</span> </li> <li id="cite_note-49"><span class="mw-cite-backlink"><b><a href="#cite_ref-49">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120708/http://blog.protectmyid.co.uk/index.php/the-most-likely-victims-of-identity-fraud-men-in-their-late-30s-and-early-40s/">"The most likely victims of identity fraud: men in their late 30s and early 40s"</a>. Archived from <a rel="nofollow" class="external text" href="http://blog.protectmyid.co.uk/index.php/the-most-likely-victims-of-identity-fraud-men-in-their-late-30s-and-early-40s/">the original</a> on 8 July 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=The+most+likely+victims+of+identity+fraud%3A+men+in+their+late+30s+and+early+40s&rft_id=http%3A%2F%2Fblog.protectmyid.co.uk%2Findex.php%2Fthe-most-likely-victims-of-identity-fraud-men-in-their-late-30s-and-early-40s%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, Protect MY ID Blog, 21 January 2011</span> </li> <li id="cite_note-50"><span class="mw-cite-backlink"><b><a href="#cite_ref-50">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.cifas.org.uk/press_release_twentyeleven_c">"Fraudscape: report reveals the UK's fraud landscape in 2010"</a>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Fraudscape%3A+report+reveals+the+UK%27s+fraud+landscape+in+2010&rft_id=http%3A%2F%2Fwww.cifas.org.uk%2Fpress_release_twentyeleven_c&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, CIFAS</span> </li> <li id="cite_note-51"><span class="mw-cite-backlink"><b><a href="#cite_ref-51">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120801/http://www.ftc.gov/os/statutes/itada/itadact.htm">"FTC.gov"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.ftc.gov/os/statutes/itada/itadact.htm">the original</a> on 1 August 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=FTC.gov&rft_id=http%3A%2F%2Fwww.ftc.gov%2Fos%2Fstatutes%2Fitada%2Fitadact.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, Public Law 105-318, 112 Stat. 3007 (30 October 1998)</span> </li> <li id="cite_note-52"><span class="mw-cite-backlink"><b><a href="#cite_ref-52">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120801/http://www.ftc.gov/os/1998/05/identhef.htm">"Prepared Statement of the Federal Trade Commission on "Identity Theft"<span class="cs1-kern-right"></span>"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.ftc.gov/os/1998/05/identhef.htm">the original</a> on 1 August 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Prepared+Statement+of+the+Federal+Trade+Commission+on+%22Identity+Theft%22&rft_id=http%3A%2F%2Fwww.ftc.gov%2Fos%2F1998%2F05%2Fidenthef.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, 20 May 1998</span> </li> <li id="cite_note-53"><span class="mw-cite-backlink"><b><a href="#cite_ref-53">^</a></b></span> <span class="reference-text">Doyle, Charles. (2013). <a rel="nofollow" class="external text" href="https://fas.org/sgp/crs/misc/R42100.pdf">Mandatory Minimum Sentencing: Federal Aggravated Identity Theft.</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20161011031227/https://fas.org/sgp/crs/misc/R42100.pdf">Archived</a> 11 October 2016 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> Washington, D.C.: <a href="/wiki/Congressional_Research_Service" title="Congressional Research Service">Congressional Research Service</a>.</span> </li> <li id="cite_note-54"><span class="mw-cite-backlink"><b><a href="#cite_ref-54">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.consumer.gov/idtheft/">Federal Trade Commission</a>. Retrieved 30 June 2006. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20060131210801/http://www.consumer.gov/idtheft/">Archived</a> 31 January 2006 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-55"><span class="mw-cite-backlink"><b><a href="#cite_ref-55">^</a></b></span> <span class="reference-text">Michael, Sara <link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120911/http://www.physicianspractice.com/index/fuseaction/newsletterArticles.view/articleID/87.htm">"Getting Red Flag Ready"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.physicianspractice.com/index/fuseaction/newsletterArticles.view/articleID/87.htm">the original</a> on 2012-09-11<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-07-02</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Getting+Red+Flag+Ready&rft_id=http%3A%2F%2Fwww.physicianspractice.com%2Findex%2Ffuseaction%2FnewsletterArticles.view%2FarticleID%2F87.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span> PhysiciansPractice.com, 21 May 2009. Retrieved 2 July 2009.</span> </li> <li id="cite_note-56"><span class="mw-cite-backlink"><b><a href="#cite_ref-56">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="https://www.ftc.gov/os/fedreg/2007/december/071213factafurnisheraccuracy.pdf">72 Fed. Reg. 70944 </a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20130217151554/http://www.ftc.gov/os/fedreg/2007/december/071213factafurnisheraccuracy.pdf">Archived</a> 17 February 2013 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> (PDF). Retrieved 29 January 2008.</span> </li> <li id="cite_note-autogenerated1-57"><span class="mw-cite-backlink">^ <a href="#cite_ref-autogenerated1_57-0"><sup><i><b>a</b></i></sup></a> <a href="#cite_ref-autogenerated1_57-1"><sup><i><b>b</b></i></sup></a></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20080911044319/http://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/clearinghouse_2006.pdf">"Law Enforcement Contact1 January 1 December 31, 2001"</a> <span class="cs1-format">(PDF)</span>. Archived from <a rel="nofollow" class="external text" href="https://www.ftc.gov/bcp/edu/microsites/idtheft/downloads/clearinghouse_2006.pdf">the original</a> <span class="cs1-format">(PDF)</span> on 11 September 2008.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Law+Enforcement+Contact1+January+1+December+31%2C+2001&rft_id=http%3A%2F%2Fwww.ftc.gov%2Fbcp%2Fedu%2Fmicrosites%2Fidtheft%2Fdownloads%2Fclearinghouse_2006.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-SR_1-58"><span class="mw-cite-backlink"><b><a href="#cite_ref-SR_1_58-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.ftc.gov/sites/default/files/documents/reports/federal-trade-commission-identity-theft-program/synovatereport.pdf">"Federal Trade Commission – Identity Theft Survey Report"</a> <span class="cs1-format">(PDF)</span>. <a href="/wiki/Federal_Trade_Commission" title="Federal Trade Commission">Federal Trade Commission</a>. September 2002<span class="reference-accessdate">. Retrieved <span class="nowrap">5 January</span> 2024</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Federal+Trade+Commission+%E2%80%93+Identity+Theft+Survey+Report&rft.pub=Federal+Trade+Commission&rft.date=2002-09&rft_id=https%3A%2F%2Fwww.ftc.gov%2Fsites%2Fdefault%2Ffiles%2Fdocuments%2Freports%2Ffederal-trade-commission-identity-theft-program%2Fsynovatereport.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-59"><span class="mw-cite-backlink"><b><a href="#cite_ref-59">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20080911044311/http://www.ftc.gov/os/2007/11/SynovateFinalReportIDTheft2006.pdf">"Federal Trade Commission: 2006 Identity Theft Survey Report: Prepared for the Commission by Synovate"</a> <span class="cs1-format">(PDF)</span>. <i>Federal Trade Commission</i>. 1 November 2007. Archived from <a rel="nofollow" class="external text" href="https://www.ftc.gov/reports/federal-trade-commission-2006-identity-theft-survey-report-prepared-commission-synovate">the original</a> on 11 September 2008.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=Federal+Trade+Commission&rft.atitle=Federal+Trade+Commission%3A+2006+Identity+Theft+Survey+Report%3A+Prepared+for+the+Commission+by+Synovate&rft.date=2007-11-01&rft_id=https%3A%2F%2Fwww.ftc.gov%2Freports%2Ffederal-trade-commission-2006-identity-theft-survey-report-prepared-commission-synovate&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-60"><span class="mw-cite-backlink"><b><a href="#cite_ref-60">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120731/http://www.ftc.gov/opa/2003/09/idtheft.shtm">"FTC.gov"</a>. Archived from <a rel="nofollow" class="external text" href="https://www.ftc.gov/opa/2003/09/idtheft.shtm">the original</a> on 31 July 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=FTC.gov&rft_id=http%3A%2F%2Fwww.ftc.gov%2Fopa%2F2003%2F09%2Fidtheft.shtm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, releases Survey of Identity Theft in U.S. 27.3 Million Victims in past 5 Years, Billions in Losses for Businesses and Consumers</span> </li> <li id="cite_note-Bureau_of_Justice_Statistics-61"><span class="mw-cite-backlink"><b><a href="#cite_ref-Bureau_of_Justice_Statistics_61-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://bjs.gov/content/pub/pdf/itrh0510.pdf">"Identity Theft Reported by Households, 2005-2010"</a> <span class="cs1-format">(PDF)</span>. Bureau of Justice Statistics. 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">24 June</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Identity+Theft+Reported+by+Households%2C+2005-2010&rft.pub=Bureau+of+Justice+Statistics&rft.date=2011&rft_id=http%3A%2F%2Fbjs.gov%2Fcontent%2Fpub%2Fpdf%2Fitrh0510.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-62"><span class="mw-cite-backlink"><b><a href="#cite_ref-62">^</a></b></span> <span class="reference-text">Harrell, Erika and Lynn Langton. (2013). <a rel="nofollow" class="external text" href="https://www.bjs.gov/content/pub/pdf/vit12.pdf">Victims of Identity Theft, 2012.</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20160907043423/http://www.bjs.gov/content/pub/pdf/vit12.pdf">Archived</a> 7 September 2016 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a> Washington, D.C. <a href="/wiki/United_States_Department_of_Justice" title="United States Department of Justice">U.S. Department of Justice</a>, <a href="/wiki/Bureau_of_Justice_Statistics" title="Bureau of Justice Statistics">Bureau of Justice Statistics</a>.</span> </li> <li id="cite_note-63"><span class="mw-cite-backlink"><b><a href="#cite_ref-63">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120805/http://www.privacyprotection.ca.gov/">"California Office of Identity Protection"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.privacyprotection.ca.gov/">the original</a> on 2012-08-05<span class="reference-accessdate">. Retrieved <span class="nowrap">2009-01-08</span></span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=California+Office+of+Identity+Protection&rft_id=http%3A%2F%2Fwww.privacyprotection.ca.gov%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-64"><span class="mw-cite-backlink"><b><a href="#cite_ref-64">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://datcp.wi.gov/Pages/Programs_Services/IdentityTheft.aspx">"DATCP Home Identity Theft Protection"</a>. <i>datcp.wi.gov</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=datcp.wi.gov&rft.atitle=DATCP+Home+Identity+Theft+Protection&rft_id=https%3A%2F%2Fdatcp.wi.gov%2FPages%2FPrograms_Services%2FIdentityTheft.aspx&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-65"><span class="mw-cite-backlink"><b><a href="#cite_ref-65">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://www.in.gov/legislative/ic/code/title4/ar6/ch13.pdf">"Indiana General Assembly"</a> <span class="cs1-format">(PDF)</span>. <a rel="nofollow" class="external text" href="https://web.archive.org/web/20131004215445/http://www.in.gov/legislative/ic/code/title4/ar6/ch13.pdf">Archived</a> <span class="cs1-format">(PDF)</span> from the original on 4 October 2013<span class="reference-accessdate">. Retrieved <span class="nowrap">3 October</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Indiana+General+Assembly&rft_id=http%3A%2F%2Fwww.in.gov%2Flegislative%2Fic%2Fcode%2Ftitle4%2Far6%2Fch13.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-66"><span class="mw-cite-backlink"><b><a href="#cite_ref-66">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20140111062848/http://www.in.gov/attorneygeneral/2853.htm">"Attorney General: ID Theft Prevention"</a>. In.gov. 6 December 2013. Archived from <a rel="nofollow" class="external text" href="http://www.in.gov/attorneygeneral/2853.htm">the original</a> on 11 January 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">24 January</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Attorney+General%3A+ID+Theft+Prevention&rft.pub=In.gov&rft.date=2013-12-06&rft_id=http%3A%2F%2Fwww.in.gov%2Fattorneygeneral%2F2853.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-67"><span class="mw-cite-backlink"><b><a href="#cite_ref-67">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.mass.gov/?pageID=ocatopic&L=3&L0=Home&L1=Consumer&L2=Identity+Theft&sid=Eoca">"Consumer Identity Theft"</a>. Commonwealth of Massachusetts, 2010 <a rel="nofollow" class="external text" href="https://web.archive.org/web/20111105045936/http://www.mass.gov/?pageID=ocatopic&L=3&L0=Home&L1=Consumer&L2=Identity+Theft&sid=Eoca">Archived</a> 5 November 2011 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a></span> </li> <li id="cite_note-68"><span class="mw-cite-backlink"><b><a href="#cite_ref-68">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.mass.gov/Eoca/docs/idtheft/201CMR17faqs.pdf">"Frequently Asked Question Regarding 201 CMR 17.00"</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20110811054640/http://www.mass.gov/Eoca/docs/idtheft/201CMR17faqs.pdf">Archived</a> 11 August 2011 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Commonwealth of Massachusetts, Office of Consumer Affairs and Business Regulation, 3 November 2009</span> </li> <li id="cite_note-69"><span class="mw-cite-backlink"><b><a href="#cite_ref-69">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.irs.gov/newsroom/article/0,,id=251501,00.html">"Taxpayer Guide to Identity Theft"</a>. <i>IRS.gov</i>. US Internal Revenue Service<span class="reference-accessdate">. Retrieved <span class="nowrap">29 June</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=IRS.gov&rft.atitle=Taxpayer+Guide+to+Identity+Theft&rft_id=https%3A%2F%2Fwww.irs.gov%2Fnewsroom%2Farticle%2F0%2C%2Cid%3D251501%2C00.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-70"><span class="mw-cite-backlink"><b><a href="#cite_ref-70">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.irs.gov/pub/irs-pdf/f14039.pdf">"Form 14039"</a> <span class="cs1-format">(PDF)</span>. <i>IRS website</i>. US Internal Revenue Service<span class="reference-accessdate">. Retrieved <span class="nowrap">29 June</span> 2012</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=IRS+website&rft.atitle=Form+14039&rft_id=https%3A%2F%2Fwww.irs.gov%2Fpub%2Firs-pdf%2Ff14039.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-ALERT:_Beware_of_Phishing_Scam_Mentioning_TAS-71"><span class="mw-cite-backlink"><b><a href="#cite_ref-ALERT:_Beware_of_Phishing_Scam_Mentioning_TAS_71-0">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://web.archive.org/web/20141218162516/http://www.taxpayeradvocate.irs.gov/Individuals/Identity-Theft">"ALERT: Beware of Phishing Scam Mentioning TAS"</a>. Taxpayer Advocate. Archived from <a rel="nofollow" class="external text" href="http://www.taxpayeradvocate.irs.gov/Individuals/Identity-Theft">the original</a> on 18 December 2014<span class="reference-accessdate">. Retrieved <span class="nowrap">18 December</span> 2014</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=ALERT%3A+Beware+of+Phishing+Scam+Mentioning+TAS&rft.pub=Taxpayer+Advocate&rft_id=http%3A%2F%2Fwww.taxpayeradvocate.irs.gov%2FIndividuals%2FIdentity-Theft&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-72"><span class="mw-cite-backlink"><b><a href="#cite_ref-72">^</a></b></span> <span class="reference-text">Hyde, J. (2017). Preventing Identity Theft and Strengthening the American Health Care System. Policy & Practice (19426828), 75(5), 26–34.</span> </li> <li id="cite_note-73"><span class="mw-cite-backlink"><b><a href="#cite_ref-73">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120913/http://www.naag.org/states-offer-data-breach-protection.php">"States Offer Data Breach Protection"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.naag.org/states-offer-data-breach-protection.php">the original</a> on 13 September 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=States+Offer+Data+Breach+Protection&rft_id=http%3A%2F%2Fwww.naag.org%2Fstates-offer-data-breach-protection.php&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-74"><span class="mw-cite-backlink"><b><a href="#cite_ref-74">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="http://research.microsoft.com/pubs/149886/SexLiesandCybercrimeSurveys.pdf">"Sex, Lies and Cybercrime Surveys"</a> <span class="cs1-format">(PDF)</span>. Microsoft. 15 June 2011<span class="reference-accessdate">. Retrieved <span class="nowrap">11 March</span> 2015</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Sex%2C+Lies+and+Cybercrime+Surveys&rft.pub=Microsoft&rft.date=2011-06-15&rft_id=http%3A%2F%2Fresearch.microsoft.com%2Fpubs%2F149886%2FSexLiesandCybercrimeSurveys.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-75"><span class="mw-cite-backlink"><b><a href="#cite_ref-75">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://www.idtheftcenter.org/">"Home Page"</a>. <i>ITRC</i><span class="reference-accessdate">. Retrieved <span class="nowrap">25 December</span> 2023</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=ITRC&rft.atitle=Home+Page&rft_id=https%3A%2F%2Fwww.idtheftcenter.org%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-76"><span class="mw-cite-backlink"><b><a href="#cite_ref-76">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://archive.today/20120921/http://www.privacyrights.org/cases/victim9.htm">"Verbal Testimony by Michelle Brown"</a>. Archived from <a rel="nofollow" class="external text" href="http://www.privacyrights.org/cases/victim9.htm">the original</a> on 21 September 2012.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Verbal+Testimony+by+Michelle+Brown&rft_id=http%3A%2F%2Fwww.privacyrights.org%2Fcases%2Fvictim9.htm&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span>, July 2000, U.S. Senate Committee Hearing on the Judiciary Subcommittee on Technology, Terrorism and Government Information – "Identity Theft: How to Protect and Restore Your Good Name"</span> </li> <li id="cite_note-77"><span class="mw-cite-backlink"><b><a href="#cite_ref-77">^</a></b></span> <span class="reference-text"><a rel="nofollow" class="external text" href="http://www.acpr.gov.au/research_idcrime.asp">Identity Crime Research and Coordination</a> <a rel="nofollow" class="external text" href="https://web.archive.org/web/20051230021614/http://www.acpr.gov.au/research_idcrime.asp">Archived</a> 30 December 2005 at the <a href="/wiki/Wayback_Machine" title="Wayback Machine">Wayback Machine</a>, Australasian Center for Policing Research. Retrieved 30 June 2006.</span> </li> <li id="cite_note-78"><span class="mw-cite-backlink"><b><a href="#cite_ref-78">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFHome_Office2004" class="citation web cs1"><a href="/wiki/Home_Office" title="Home Office">Home Office</a> (26 May 2004). <a rel="nofollow" class="external text" href="http://www.identitytheft.org.uk/">"What is Identity theft?"</a>. identitytheft.co.uk<span class="reference-accessdate">. Retrieved <span class="nowrap">27 September</span> 2010</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=What+is+Identity+theft%3F&rft.pub=identitytheft.co.uk&rft.date=2004-05-26&rft.au=Home+Office&rft_id=http%3A%2F%2Fwww.identitytheft.org.uk%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-79"><span class="mw-cite-backlink"><b><a href="#cite_ref-79">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation web cs1"><a rel="nofollow" class="external text" href="https://bestidprotection.com/guides/10-ways-to-prevent-identity-theft/">"Free help, tips and advice on avoiding and dealing with Identity Theft"</a>. <i>bestidprotection.com</i>. 9 February 2022.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=unknown&rft.jtitle=bestidprotection.com&rft.atitle=Free+help%2C+tips+and+advice+on+avoiding+and+dealing+with+Identity+Theft&rft.date=2022-02-09&rft_id=https%3A%2F%2Fbestidprotection.com%2Fguides%2F10-ways-to-prevent-identity-theft%2F&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-80"><span class="mw-cite-backlink"><b><a href="#cite_ref-80">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFBruce_Schneier" class="citation web cs1"><a href="/wiki/Bruce_Schneier" title="Bruce Schneier">Bruce Schneier</a>. <a rel="nofollow" class="external text" href="http://www.schneier.com/blog/archives/2005/11/identity_theft.html">"Identity Theft Over-Reported"</a><span class="reference-accessdate">. Retrieved <span class="nowrap">30 June</span> 2006</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Identity+Theft+Over-Reported&rft.au=Bruce+Schneier&rft_id=http%3A%2F%2Fwww.schneier.com%2Fblog%2Farchives%2F2005%2F11%2Fidentity_theft.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-81"><span class="mw-cite-backlink"><b><a href="#cite_ref-81">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://www.bbc.co.uk/news/technology-13726085">"Hi-tech crime and sexual partner surveys 'biased'<span class="cs1-kern-right"></span>"</a>. BBC. 10 June 2011.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Hi-tech+crime+and+sexual+partner+surveys+%27biased%27&rft.date=2011-06-10&rft_id=https%3A%2F%2Fwww.bbc.co.uk%2Fnews%2Ftechnology-13726085&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-82"><span class="mw-cite-backlink"><b><a href="#cite_ref-82">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="http://www.economist.com/node/21532263">"Measuring the black web"</a>. <i>The Economist</i>. 15 October 2011.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=The+Economist&rft.atitle=Measuring+the+black+web&rft.date=2011-10-15&rft_id=http%3A%2F%2Fwww.economist.com%2Fnode%2F21532263&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> <li id="cite_note-83"><span class="mw-cite-backlink"><b><a href="#cite_ref-83">^</a></b></span> <span class="reference-text"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFFlorencioHerley2011" class="citation web cs1">Florencio, D.; Herley, C. (June 2011). <a rel="nofollow" class="external text" href="http://research.microsoft.com/pubs/149886/SexLiesandCybercrimeSurveys.pdf">"Sex, Lies and Cybercrime Surveys"</a> <span class="cs1-format">(PDF)</span>. Proc. WEIS.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=unknown&rft.btitle=Sex%2C+Lies+and+Cybercrime+Surveys&rft.pub=Proc.+WEIS&rft.date=2011-06&rft.aulast=Florencio&rft.aufirst=D.&rft.au=Herley%2C+C.&rft_id=http%3A%2F%2Fresearch.microsoft.com%2Fpubs%2F149886%2FSexLiesandCybercrimeSurveys.pdf&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></span> </li> </ol></div> </section><div class="mw-heading mw-heading2 section-heading" onclick="mfTempOpenSection(12)"><span class="indicator mf-icon mf-icon-expand mf-icon--small"></span><h2 id="External_links">External links</h2><span class="mw-editsection"> <a role="button" href="/w/index.php?title=Identity_theft&action=edit&section=35" title="Edit section: External links" class="cdx-button cdx-button--size-large cdx-button--fake-button cdx-button--fake-button--enabled cdx-button--icon-only cdx-button--weight-quiet "> <span class="minerva-icon minerva-icon--edit"></span> <span>edit</span> </a> </span> </div><section class="mf-section-12 collapsible-block" id="mf-section-12"> <style data-mw-deduplicate="TemplateStyles:r1235681985">.mw-parser-output .side-box{margin:4px 0;box-sizing:border-box;border:1px solid #aaa;font-size:88%;line-height:1.25em;background-color:var(--background-color-interactive-subtle,#f8f9fa);display:flow-root}.mw-parser-output .side-box-abovebelow,.mw-parser-output .side-box-text{padding:0.25em 0.9em}.mw-parser-output .side-box-image{padding:2px 0 2px 0.9em;text-align:center}.mw-parser-output .side-box-imageright{padding:2px 0.9em 2px 0;text-align:center}@media(min-width:500px){.mw-parser-output .side-box-flex{display:flex;align-items:center}.mw-parser-output .side-box-text{flex:1;min-width:0}}@media(min-width:720px){.mw-parser-output .side-box{width:238px}.mw-parser-output .side-box-right{clear:right;float:right;margin-left:1em}.mw-parser-output .side-box-left{margin-right:1em}}</style><style data-mw-deduplicate="TemplateStyles:r1237033735">@media print{body.ns-0 .mw-parser-output .sistersitebox{display:none!important}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .sistersitebox img[src*="Wiktionary-logo-en-v2.svg"]{background-color:white}}</style><div class="side-box side-box-right plainlinks sistersitebox"><style data-mw-deduplicate="TemplateStyles:r1126788409">.mw-parser-output .plainlist ol,.mw-parser-output .plainlist ul{line-height:inherit;list-style:none;margin:0;padding:0}.mw-parser-output .plainlist ol li,.mw-parser-output .plainlist ul li{margin-bottom:0}</style> <div class="side-box-flex"> <div class="side-box-image"><span class="noviewer" typeof="mw:File"><span><noscript><img alt="" src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" decoding="async" width="30" height="40" class="mw-file-element" data-file-width="1024" data-file-height="1376"></noscript><span class="lazy-image-placeholder" style="width: 30px;height: 40px;" data-src="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/30px-Commons-logo.svg.png" data-alt="" data-width="30" data-height="40" data-srcset="//upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/45px-Commons-logo.svg.png 1.5x, //upload.wikimedia.org/wikipedia/en/thumb/4/4a/Commons-logo.svg/59px-Commons-logo.svg.png 2x" data-class="mw-file-element"> </span></span></span></div> <div class="side-box-text plainlist">Wikimedia Commons has media related to <span style="font-weight: bold; font-style: italic;"><a href="https://commons.wikimedia.org/wiki/Category:Identity_theft" class="extiw" title="commons:Category:Identity theft">Identity theft</a></span>.</div></div> </div> <ul><li><a rel="nofollow" class="external text" href="https://www.ftc.gov/bcp/edu/microsites/idtheft/">Identity theft</a> – United States <a href="/wiki/Federal_Trade_Commission" title="Federal Trade Commission">Federal Trade Commission</a></li> <li><a rel="nofollow" class="external text" href="https://www.identitytheft.gov/">Identity Theft Recovery Plan</a> FTC steps for identity theft victims.</li> <li><a rel="nofollow" class="external text" href="https://www.idtheft.gov">The President's Task Force on Identity Theft</a> – a government task force established by US President George W. Bush to fight identity theft.</li> <li><a rel="nofollow" class="external text" href="http://www.mysecurecyberspace.org/encyclopedia/index/identity-theft.html#msc.encyclopedia.identitytheft">Identity Theft</a> – <a href="/wiki/Carnegie_Mellon_University" title="Carnegie Mellon University">Carnegie Mellon University</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20101105002332/http://www.ojp.usdoj.gov/nij/topics/crime/id-theft/welcome.htm">Identity Theft: A Research Review, National Institute of Justice 2007</a></li> <li><a rel="nofollow" class="external text" href="https://www.usdoj.gov/criminal/fraud/websites/idtheft.html">Identity Theft and Fraud</a> – <a href="/wiki/United_States_Department_of_Justice" title="United States Department of Justice">United States Department of Justice</a></li> <li><a rel="nofollow" class="external text" href="https://web.archive.org/web/20070401000301/http://www.msnbc.msn.com/id/17805134/">Dateline NBC investigation</a> 'To Catch an ID Thief'</li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite class="citation news cs1"><a rel="nofollow" class="external text" href="https://archive.today/20070911112747/http://www.usdoj.gov/ag/speeches/2007/ag_speech_0704231.html">"Transcript of Attorney General Alberto R. Gonzales and FTC Chairman Deborah Platt Majoras Announcing the Release of the President's Identity Theft Task Force"</a>. <i>US Department of Justice</i>. 23 April 2007. Archived from <a rel="nofollow" class="external text" href="https://www.usdoj.gov/ag/speeches/2007/ag_speech_0704231.html">the original</a> on 11 September 2007<span class="reference-accessdate">. Retrieved <span class="nowrap">24 April</span> 2007</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=US+Department+of+Justice&rft.atitle=Transcript+of+Attorney+General+Alberto+R.+Gonzales+and+FTC+Chairman+Deborah+Platt+Majoras+Announcing+the+Release+of+the+President%27s+Identity+Theft+Task+Force&rft.date=2007-04-23&rft_id=http%3A%2F%2Fwww.usdoj.gov%2Fag%2Fspeeches%2F2007%2Fag_speech_0704231.html&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></li> <li><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1238218222"><cite id="CITEREFRoxana2013" class="citation news cs1">Roxana, Hegeman (25 March 2013). <a rel="nofollow" class="external text" href="https://abcnews.go.com/US/wireStory/woman-prison-time-total-identity-theft-18809034">"Woman Gets Prison Time in 'Total Identity Theft' - ABC News"</a>. <i>ABC News</i><span class="reference-accessdate">. Retrieved <span class="nowrap">27 March</span> 2013</span>.</cite><span title="ctx_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.jtitle=ABC+News&rft.atitle=Woman+Gets+Prison+Time+in+%27Total+Identity+Theft%27+-+ABC+News&rft.date=2013-03-25&rft.aulast=Roxana&rft.aufirst=Hegeman&rft_id=https%3A%2F%2Fabcnews.go.com%2FUS%2FwireStory%2Fwoman-prison-time-total-identity-theft-18809034&rfr_id=info%3Asid%2Fen.wikipedia.org%3AIdentity+theft" class="Z3988"></span></li> <li><a rel="nofollow" class="external text" href="https://www.fbi.gov/news/stories/2014/january/fugitive-identity-thief-led-global-criminal-enterprise/">Scam on the Run - Fugitive Identity Thief Led Global Criminal Enterprise</a> <a href="/wiki/FBI" class="mw-redirect" title="FBI">FBI</a></li></ul> <div class="navbox-styles"><style data-mw-deduplicate="TemplateStyles:r1129693374">.mw-parser-output .hlist dl,.mw-parser-output .hlist ol,.mw-parser-output .hlist ul{margin:0;padding:0}.mw-parser-output .hlist dd,.mw-parser-output .hlist dt,.mw-parser-output .hlist li{margin:0;display:inline}.mw-parser-output .hlist.inline,.mw-parser-output .hlist.inline dl,.mw-parser-output .hlist.inline ol,.mw-parser-output .hlist.inline ul,.mw-parser-output .hlist dl dl,.mw-parser-output .hlist dl ol,.mw-parser-output .hlist dl ul,.mw-parser-output .hlist ol dl,.mw-parser-output .hlist ol ol,.mw-parser-output .hlist ol ul,.mw-parser-output .hlist ul dl,.mw-parser-output .hlist ul ol,.mw-parser-output .hlist ul ul{display:inline}.mw-parser-output .hlist .mw-empty-li{display:none}.mw-parser-output .hlist dt::after{content:": "}.mw-parser-output .hlist dd::after,.mw-parser-output .hlist li::after{content:" · ";font-weight:bold}.mw-parser-output .hlist dd:last-child::after,.mw-parser-output .hlist dt:last-child::after,.mw-parser-output .hlist li:last-child::after{content:none}.mw-parser-output .hlist dd dd:first-child::before,.mw-parser-output .hlist dd dt:first-child::before,.mw-parser-output .hlist dd li:first-child::before,.mw-parser-output .hlist dt dd:first-child::before,.mw-parser-output .hlist dt dt:first-child::before,.mw-parser-output .hlist dt li:first-child::before,.mw-parser-output .hlist li dd:first-child::before,.mw-parser-output .hlist li dt:first-child::before,.mw-parser-output .hlist li li:first-child::before{content:" (";font-weight:normal}.mw-parser-output .hlist dd dd:last-child::after,.mw-parser-output .hlist dd dt:last-child::after,.mw-parser-output .hlist dd li:last-child::after,.mw-parser-output .hlist dt dd:last-child::after,.mw-parser-output .hlist dt dt:last-child::after,.mw-parser-output .hlist dt li:last-child::after,.mw-parser-output .hlist li dd:last-child::after,.mw-parser-output .hlist li dt:last-child::after,.mw-parser-output .hlist li li:last-child::after{content:")";font-weight:normal}.mw-parser-output .hlist ol{counter-reset:listitem}.mw-parser-output .hlist ol>li{counter-increment:listitem}.mw-parser-output .hlist ol>li::before{content:" "counter(listitem)"\a0 "}.mw-parser-output .hlist dd ol>li:first-child::before,.mw-parser-output .hlist dt ol>li:first-child::before,.mw-parser-output .hlist li ol>li:first-child::before{content:" ("counter(listitem)"\a0 "}</style><style data-mw-deduplicate="TemplateStyles:r1236075235">.mw-parser-output .navbox{box-sizing:border-box;border:1px solid #a2a9b1;width:100%;clear:both;font-size:88%;text-align:center;padding:1px;margin:1em auto 0}.mw-parser-output .navbox .navbox{margin-top:0}.mw-parser-output .navbox+.navbox,.mw-parser-output .navbox+.navbox-styles+.navbox{margin-top:-1px}.mw-parser-output .navbox-inner,.mw-parser-output .navbox-subgroup{width:100%}.mw-parser-output .navbox-group,.mw-parser-output .navbox-title,.mw-parser-output .navbox-abovebelow{padding:0.25em 1em;line-height:1.5em;text-align:center}.mw-parser-output .navbox-group{white-space:nowrap;text-align:right}.mw-parser-output .navbox,.mw-parser-output .navbox-subgroup{background-color:#fdfdfd}.mw-parser-output .navbox-list{line-height:1.5em;border-color:#fdfdfd}.mw-parser-output .navbox-list-with-group{text-align:left;border-left-width:2px;border-left-style:solid}.mw-parser-output tr+tr>.navbox-abovebelow,.mw-parser-output tr+tr>.navbox-group,.mw-parser-output tr+tr>.navbox-image,.mw-parser-output tr+tr>.navbox-list{border-top:2px solid #fdfdfd}.mw-parser-output .navbox-title{background-color:#ccf}.mw-parser-output .navbox-abovebelow,.mw-parser-output .navbox-group,.mw-parser-output .navbox-subgroup .navbox-title{background-color:#ddf}.mw-parser-output .navbox-subgroup .navbox-group,.mw-parser-output .navbox-subgroup .navbox-abovebelow{background-color:#e6e6ff}.mw-parser-output .navbox-even{background-color:#f7f7f7}.mw-parser-output .navbox-odd{background-color:transparent}.mw-parser-output .navbox .hlist td dl,.mw-parser-output .navbox .hlist td ol,.mw-parser-output .navbox .hlist td ul,.mw-parser-output .navbox td.hlist dl,.mw-parser-output .navbox td.hlist ol,.mw-parser-output .navbox td.hlist ul{padding:0.125em 0}.mw-parser-output .navbox .navbar{display:block;font-size:100%}.mw-parser-output .navbox-title .navbar{float:left;text-align:left;margin-right:0.5em}body.skin--responsive .mw-parser-output .navbox-image img{max-width:none!important}@media print{body.ns-0 .mw-parser-output .navbox{display:none!important}}</style><style data-mw-deduplicate="TemplateStyles:r1066933788">.mw-parser-output .excerpt-hat .mw-editsection-like{font-style:normal}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><style data-mw-deduplicate="TemplateStyles:r1259569809">.mw-parser-output .portalbox{padding:0;margin:0.5em 0;display:table;box-sizing:border-box;max-width:175px;list-style:none}.mw-parser-output .portalborder{border:1px solid var(--border-color-base,#a2a9b1);padding:0.1em;background:var(--background-color-neutral-subtle,#f8f9fa)}.mw-parser-output .portalbox-entry{display:table-row;font-size:85%;line-height:110%;height:1.9em;font-style:italic;font-weight:bold}.mw-parser-output .portalbox-image{display:table-cell;padding:0.2em;vertical-align:middle;text-align:center}.mw-parser-output .portalbox-link{display:table-cell;padding:0.2em 0.2em 0.2em 0.3em;vertical-align:middle}@media(min-width:720px){.mw-parser-output .portalleft{clear:left;float:left;margin:0.5em 1em 0.5em 0}.mw-parser-output .portalright{clear:right;float:right;margin:0.5em 0 0.5em 1em}}</style><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1066933788"></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div> <div class="navbox-styles"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1129693374"><link rel="mw-deduplicated-inline-style" href="mw-data:TemplateStyles:r1236075235"></div> <!-- NewPP limit report Parsed by mw‐web.codfw.main‐57488d5c7d‐dqsxq Cached time: 20241128020738 Cache expiry: 2592000 Reduced expiry: false Complications: [vary‐revision‐sha1, show‐toc] CPU time usage: 1.540 seconds Real time usage: 1.850 seconds Preprocessor visited node count: 12261/1000000 Post‐expand include size: 252702/2097152 bytes Template argument size: 20125/2097152 bytes Highest expansion depth: 23/100 Expensive parser function count: 24/500 Unstrip recursion depth: 1/20 Unstrip post‐expand size: 297572/5000000 bytes Lua time usage: 1.029/10.000 seconds Lua memory usage: 22714785/52428800 bytes Lua Profile: MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::callParserFunction 160 ms 13.6% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::sub 140 ms 11.9% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::find 100 ms 8.5% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::gsub 100 ms 8.5% ? 80 ms 6.8% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::getEntityStatements 60 ms 5.1% <mw.title.lua:50> 60 ms 5.1% getShortDescriptionTemplates <Module:GetShortDescription:58> 40 ms 3.4% date 40 ms 3.4% MediaWiki\Extension\Scribunto\Engines\LuaSandbox\LuaSandboxCallback::anchorEncode 40 ms 3.4% [others] 360 ms 30.5% Number of Wikibase entities loaded: 1/400 --> <!-- Transclusion expansion time report (%,ms,calls,template) 100.00% 1648.690 1 -total 24.71% 407.397 1 Template:Reflist 21.16% 348.920 3 Template:Navbox 19.99% 329.585 1 Template:Types_of_crime 17.62% 290.475 34 Template:Annotated_link 15.69% 258.762 56 Template:Cite_web 14.66% 241.716 8 Template:Excerpt 6.09% 100.454 1 Template:Langx 5.54% 91.309 1 Template:Multiple_issues 4.19% 69.011 1 Template:Short_description --> <!-- Saved in parser cache with key enwiki:pcache:idhash:180609-0!canonical and timestamp 20241128020738 and revision id 1254174347. Rendering was triggered because: page-view --> </section></div> <!-- MobileFormatter took 0.030 seconds --><!--esi <esi:include src="/esitest-fa8a495983347898/content" /> --><noscript><img src="https://login.wikimedia.org/wiki/Special:CentralAutoLogin/start?type=1x1&mobile=1" alt="" width="1" height="1" style="border: none; position: absolute;"></noscript> <div class="printfooter" data-nosnippet="">Retrieved from "<a dir="ltr" href="https://en.wikipedia.org/w/index.php?title=Identity_theft&oldid=1254174347">https://en.wikipedia.org/w/index.php?title=Identity_theft&oldid=1254174347</a>"</div></div> </div> <div class="post-content" id="page-secondary-actions"> </div> </main> <footer class="mw-footer minerva-footer" role="contentinfo"> <a class="last-modified-bar" href="/w/index.php?title=Identity_theft&action=history"> <div class="post-content last-modified-bar__content"> <span class="minerva-icon minerva-icon-size-medium minerva-icon--modified-history"></span> <span class="last-modified-bar__text modified-enhancement" data-user-name="Monkbot" data-user-gender="unknown" data-timestamp="1730229206"> <span>Last edited on 29 October 2024, at 19:13</span> </span> <span class="minerva-icon minerva-icon-size-small minerva-icon--expand"></span> </div> </a> <div class="post-content footer-content"> <div id='mw-data-after-content'> <div class="read-more-container"></div> </div> <div id="p-lang"> <h4>Languages</h4> <section> <ul id="p-variants" class="minerva-languages"></ul> <ul class="minerva-languages"><li class="interlanguage-link interwiki-ar mw-list-item"><a href="https://ar.wikipedia.org/wiki/%D8%B3%D8%B1%D9%82%D8%A9_%D8%A7%D9%84%D9%87%D9%88%D9%8A%D8%A9" title="سرقة الهوية – Arabic" lang="ar" hreflang="ar" data-title="سرقة الهوية" data-language-autonym="العربية" data-language-local-name="Arabic" class="interlanguage-link-target"><span>العربية</span></a></li><li class="interlanguage-link interwiki-ca mw-list-item"><a href="https://ca.wikipedia.org/wiki/Robatori_d%27identitat" title="Robatori d'identitat – Catalan" lang="ca" hreflang="ca" data-title="Robatori d'identitat" data-language-autonym="Català" data-language-local-name="Catalan" class="interlanguage-link-target"><span>Català</span></a></li><li class="interlanguage-link interwiki-cs mw-list-item"><a href="https://cs.wikipedia.org/wiki/Kr%C3%A1de%C5%BE_identity" title="Krádež identity – Czech" lang="cs" hreflang="cs" data-title="Krádež identity" data-language-autonym="Čeština" data-language-local-name="Czech" class="interlanguage-link-target"><span>Čeština</span></a></li><li class="interlanguage-link interwiki-da mw-list-item"><a href="https://da.wikipedia.org/wiki/Identitetstyveri" title="Identitetstyveri – Danish" lang="da" hreflang="da" data-title="Identitetstyveri" data-language-autonym="Dansk" data-language-local-name="Danish" class="interlanguage-link-target"><span>Dansk</span></a></li><li class="interlanguage-link interwiki-de mw-list-item"><a href="https://de.wikipedia.org/wiki/Identit%C3%A4tsdiebstahl" title="Identitätsdiebstahl – German" lang="de" hreflang="de" data-title="Identitätsdiebstahl" data-language-autonym="Deutsch" data-language-local-name="German" class="interlanguage-link-target"><span>Deutsch</span></a></li><li class="interlanguage-link interwiki-et mw-list-item"><a href="https://et.wikipedia.org/wiki/Identiteedivargus" title="Identiteedivargus – Estonian" lang="et" hreflang="et" data-title="Identiteedivargus" data-language-autonym="Eesti" data-language-local-name="Estonian" class="interlanguage-link-target"><span>Eesti</span></a></li><li class="interlanguage-link interwiki-es mw-list-item"><a href="https://es.wikipedia.org/wiki/Robo_de_identidad" title="Robo de identidad – Spanish" lang="es" hreflang="es" data-title="Robo de identidad" data-language-autonym="Español" data-language-local-name="Spanish" class="interlanguage-link-target"><span>Español</span></a></li><li class="interlanguage-link interwiki-eo mw-list-item"><a href="https://eo.wikipedia.org/wiki/Identec%C5%9Dtelo" title="Identecŝtelo – Esperanto" lang="eo" hreflang="eo" data-title="Identecŝtelo" data-language-autonym="Esperanto" data-language-local-name="Esperanto" class="interlanguage-link-target"><span>Esperanto</span></a></li><li class="interlanguage-link interwiki-fa mw-list-item"><a href="https://fa.wikipedia.org/wiki/%D8%B3%D8%B1%D9%82%D8%AA_%D9%87%D9%88%DB%8C%D8%AA" title="سرقت هویت – Persian" lang="fa" hreflang="fa" data-title="سرقت هویت" data-language-autonym="فارسی" data-language-local-name="Persian" class="interlanguage-link-target"><span>فارسی</span></a></li><li class="interlanguage-link interwiki-fr mw-list-item"><a href="https://fr.wikipedia.org/wiki/Usurpation_d%27identit%C3%A9" title="Usurpation d'identité – French" lang="fr" hreflang="fr" data-title="Usurpation d'identité" data-language-autonym="Français" data-language-local-name="French" class="interlanguage-link-target"><span>Français</span></a></li><li class="interlanguage-link interwiki-gl mw-list-item"><a href="https://gl.wikipedia.org/wiki/Roubo_de_identidade" title="Roubo de identidade – Galician" lang="gl" hreflang="gl" data-title="Roubo de identidade" data-language-autonym="Galego" data-language-local-name="Galician" class="interlanguage-link-target"><span>Galego</span></a></li><li class="interlanguage-link interwiki-ko mw-list-item"><a href="https://ko.wikipedia.org/wiki/%EC%8B%A0%EC%9B%90_%EB%8F%84%EC%9A%A9" title="신원 도용 – Korean" lang="ko" hreflang="ko" data-title="신원 도용" data-language-autonym="한국어" data-language-local-name="Korean" class="interlanguage-link-target"><span>한국어</span></a></li><li class="interlanguage-link interwiki-hi mw-list-item"><a href="https://hi.wikipedia.org/wiki/%E0%A4%AA%E0%A4%B9%E0%A4%9A%E0%A4%BE%E0%A4%A8_%E0%A4%95%E0%A5%80_%E0%A4%9A%E0%A5%8B%E0%A4%B0%E0%A5%80" title="पहचान की चोरी – Hindi" lang="hi" hreflang="hi" data-title="पहचान की चोरी" data-language-autonym="हिन्दी" data-language-local-name="Hindi" class="interlanguage-link-target"><span>हिन्दी</span></a></li><li class="interlanguage-link interwiki-hr mw-list-item"><a href="https://hr.wikipedia.org/wiki/Kra%C4%91a_identiteta" title="Krađa identiteta – Croatian" lang="hr" hreflang="hr" data-title="Krađa identiteta" data-language-autonym="Hrvatski" data-language-local-name="Croatian" class="interlanguage-link-target"><span>Hrvatski</span></a></li><li class="interlanguage-link interwiki-id mw-list-item"><a href="https://id.wikipedia.org/wiki/Pencurian_identitas" title="Pencurian identitas – Indonesian" lang="id" hreflang="id" data-title="Pencurian identitas" data-language-autonym="Bahasa Indonesia" data-language-local-name="Indonesian" class="interlanguage-link-target"><span>Bahasa Indonesia</span></a></li><li class="interlanguage-link interwiki-it mw-list-item"><a href="https://it.wikipedia.org/wiki/Furto_d%27identit%C3%A0" title="Furto d'identità – Italian" lang="it" hreflang="it" data-title="Furto d'identità" data-language-autonym="Italiano" data-language-local-name="Italian" class="interlanguage-link-target"><span>Italiano</span></a></li><li class="interlanguage-link interwiki-he mw-list-item"><a href="https://he.wikipedia.org/wiki/%D7%92%D7%A0%D7%91%D7%AA_%D7%96%D7%94%D7%95%D7%AA" title="גנבת זהות – Hebrew" lang="he" hreflang="he" data-title="גנבת זהות" data-language-autonym="עברית" data-language-local-name="Hebrew" class="interlanguage-link-target"><span>עברית</span></a></li><li class="interlanguage-link interwiki-hu mw-list-item"><a href="https://hu.wikipedia.org/wiki/Szem%C3%A9lyazonoss%C3%A1g-lop%C3%A1s" title="Személyazonosság-lopás – Hungarian" lang="hu" hreflang="hu" data-title="Személyazonosság-lopás" data-language-autonym="Magyar" data-language-local-name="Hungarian" class="interlanguage-link-target"><span>Magyar</span></a></li><li class="interlanguage-link interwiki-mk mw-list-item"><a href="https://mk.wikipedia.org/wiki/%D0%9A%D1%80%D0%B0%D0%B6%D0%B1%D0%B0_%D0%BD%D0%B0_%D0%B8%D0%B4%D0%B5%D0%BD%D1%82%D0%B8%D1%82%D0%B5%D1%82" title="Кражба на идентитет – Macedonian" lang="mk" hreflang="mk" data-title="Кражба на идентитет" data-language-autonym="Македонски" data-language-local-name="Macedonian" class="interlanguage-link-target"><span>Македонски</span></a></li><li class="interlanguage-link interwiki-ms mw-list-item"><a href="https://ms.wikipedia.org/wiki/Pencurian_identiti" title="Pencurian identiti – Malay" lang="ms" hreflang="ms" data-title="Pencurian identiti" data-language-autonym="Bahasa Melayu" data-language-local-name="Malay" class="interlanguage-link-target"><span>Bahasa Melayu</span></a></li><li class="interlanguage-link interwiki-nl mw-list-item"><a href="https://nl.wikipedia.org/wiki/Identiteitsfraude" title="Identiteitsfraude – Dutch" lang="nl" hreflang="nl" data-title="Identiteitsfraude" data-language-autonym="Nederlands" data-language-local-name="Dutch" class="interlanguage-link-target"><span>Nederlands</span></a></li><li class="interlanguage-link interwiki-ja mw-list-item"><a href="https://ja.wikipedia.org/wiki/%E3%81%AA%E3%82%8A%E3%81%99%E3%81%BE%E3%81%97" title="なりすまし – Japanese" lang="ja" hreflang="ja" data-title="なりすまし" data-language-autonym="日本語" data-language-local-name="Japanese" class="interlanguage-link-target"><span>日本語</span></a></li><li class="interlanguage-link interwiki-no mw-list-item"><a href="https://no.wikipedia.org/wiki/Identitetstyveri" title="Identitetstyveri – Norwegian Bokmål" lang="nb" hreflang="nb" data-title="Identitetstyveri" data-language-autonym="Norsk bokmål" data-language-local-name="Norwegian Bokmål" class="interlanguage-link-target"><span>Norsk bokmål</span></a></li><li class="interlanguage-link interwiki-pl mw-list-item"><a href="https://pl.wikipedia.org/wiki/Kradzie%C5%BC_to%C5%BCsamo%C5%9Bci" title="Kradzież tożsamości – Polish" lang="pl" hreflang="pl" data-title="Kradzież tożsamości" data-language-autonym="Polski" data-language-local-name="Polish" class="interlanguage-link-target"><span>Polski</span></a></li><li class="interlanguage-link interwiki-ro mw-list-item"><a href="https://ro.wikipedia.org/wiki/Furt_de_identitate" title="Furt de identitate – Romanian" lang="ro" hreflang="ro" data-title="Furt de identitate" data-language-autonym="Română" data-language-local-name="Romanian" class="interlanguage-link-target"><span>Română</span></a></li><li class="interlanguage-link interwiki-ru mw-list-item"><a href="https://ru.wikipedia.org/wiki/%D0%9A%D1%80%D0%B0%D0%B6%D0%B0_%D0%BB%D0%B8%D1%87%D0%BD%D0%BE%D1%81%D1%82%D0%B8" title="Кража личности – Russian" lang="ru" hreflang="ru" data-title="Кража личности" data-language-autonym="Русский" data-language-local-name="Russian" class="interlanguage-link-target"><span>Русский</span></a></li><li class="interlanguage-link interwiki-simple mw-list-item"><a href="https://simple.wikipedia.org/wiki/Identity_theft" title="Identity theft – Simple English" lang="en-simple" hreflang="en-simple" data-title="Identity theft" data-language-autonym="Simple English" data-language-local-name="Simple English" class="interlanguage-link-target"><span>Simple English</span></a></li><li class="interlanguage-link interwiki-sl mw-list-item"><a href="https://sl.wikipedia.org/wiki/Kraja_identitete" title="Kraja identitete – Slovenian" lang="sl" hreflang="sl" data-title="Kraja identitete" data-language-autonym="Slovenščina" data-language-local-name="Slovenian" class="interlanguage-link-target"><span>Slovenščina</span></a></li><li class="interlanguage-link interwiki-sr mw-list-item"><a href="https://sr.wikipedia.org/wiki/%D0%9A%D1%80%D0%B0%D1%92%D0%B0_%D0%B8%D0%B4%D0%B5%D0%BD%D1%82%D0%B8%D1%82%D0%B5%D1%82%D0%B0_%D0%BD%D0%B0_%D0%B8%D0%BD%D1%82%D0%B5%D1%80%D0%BD%D0%B5%D1%82%D1%83" title="Крађа идентитета на интернету – Serbian" lang="sr" hreflang="sr" data-title="Крађа идентитета на интернету" data-language-autonym="Српски / srpski" data-language-local-name="Serbian" class="interlanguage-link-target"><span>Српски / srpski</span></a></li><li class="interlanguage-link interwiki-fi mw-list-item"><a href="https://fi.wikipedia.org/wiki/Identiteettivarkaus" title="Identiteettivarkaus – Finnish" lang="fi" hreflang="fi" data-title="Identiteettivarkaus" data-language-autonym="Suomi" data-language-local-name="Finnish" class="interlanguage-link-target"><span>Suomi</span></a></li><li class="interlanguage-link interwiki-sv mw-list-item"><a href="https://sv.wikipedia.org/wiki/Identitetsst%C3%B6ld" title="Identitetsstöld – Swedish" lang="sv" hreflang="sv" data-title="Identitetsstöld" data-language-autonym="Svenska" data-language-local-name="Swedish" class="interlanguage-link-target"><span>Svenska</span></a></li><li class="interlanguage-link interwiki-ta mw-list-item"><a href="https://ta.wikipedia.org/wiki/%E0%AE%85%E0%AE%9F%E0%AF%88%E0%AE%AF%E0%AE%BE%E0%AE%B3%E0%AE%A4%E0%AF%8D_%E0%AE%A4%E0%AE%BF%E0%AE%B0%E0%AF%81%E0%AE%9F%E0%AF%8D%E0%AE%9F%E0%AF%81" title="அடையாளத் திருட்டு – Tamil" lang="ta" hreflang="ta" data-title="அடையாளத் திருட்டு" data-language-autonym="தமிழ்" data-language-local-name="Tamil" class="interlanguage-link-target"><span>தமிழ்</span></a></li><li class="interlanguage-link interwiki-tr mw-list-item"><a href="https://tr.wikipedia.org/wiki/Kimlik_h%C4%B1rs%C4%B1zl%C4%B1%C4%9F%C4%B1" title="Kimlik hırsızlığı – Turkish" lang="tr" hreflang="tr" data-title="Kimlik hırsızlığı" data-language-autonym="Türkçe" data-language-local-name="Turkish" class="interlanguage-link-target"><span>Türkçe</span></a></li><li class="interlanguage-link interwiki-uk mw-list-item"><a href="https://uk.wikipedia.org/wiki/%D0%9A%D1%80%D0%B0%D0%B4%D1%96%D0%B6%D0%BA%D0%B0_%D0%BE%D1%81%D0%BE%D0%B1%D0%B8%D1%81%D1%82%D0%B8%D1%85_%D0%B4%D0%B0%D0%BD%D0%B8%D1%85" title="Крадіжка особистих даних – Ukrainian" lang="uk" hreflang="uk" data-title="Крадіжка особистих даних" data-language-autonym="Українська" data-language-local-name="Ukrainian" class="interlanguage-link-target"><span>Українська</span></a></li><li class="interlanguage-link interwiki-ur mw-list-item"><a href="https://ur.wikipedia.org/wiki/%D8%B4%D9%86%D8%A7%D8%AE%D8%AA_%DA%A9%DB%8C_%DA%86%D9%88%D8%B1%DB%8C" title="شناخت کی چوری – Urdu" lang="ur" hreflang="ur" data-title="شناخت کی چوری" data-language-autonym="اردو" data-language-local-name="Urdu" class="interlanguage-link-target"><span>اردو</span></a></li><li class="interlanguage-link interwiki-yi mw-list-item"><a href="https://yi.wikipedia.org/wiki/%D7%90%D7%99%D7%93%D7%A2%D7%A0%D7%98%D7%99%D7%98%D7%A2%D7%98_%D7%92%D7%A0%D7%99%D7%91%D7%95%D7%AA" title="אידענטיטעט גניבות – Yiddish" lang="yi" hreflang="yi" data-title="אידענטיטעט גניבות" data-language-autonym="ייִדיש" data-language-local-name="Yiddish" class="interlanguage-link-target"><span>ייִדיש</span></a></li><li class="interlanguage-link interwiki-zh mw-list-item"><a href="https://zh.wikipedia.org/wiki/%E8%BA%AB%E4%BB%BD%E7%9B%97%E7%AA%83" title="身份盗窃 – Chinese" lang="zh" hreflang="zh" data-title="身份盗窃" data-language-autonym="中文" data-language-local-name="Chinese" class="interlanguage-link-target"><span>中文</span></a></li></ul> </section> </div> <div class="minerva-footer-logo"><img src="/static/images/mobile/copyright/wikipedia-wordmark-en.svg" alt="Wikipedia" width="120" height="18" style="width: 7.5em; height: 1.125em;"/> </div> <ul id="footer-info" class="footer-info hlist hlist-separated"> <li id="footer-info-lastmod"> This page was last edited on 29 October 2024, at 19:13<span class="anonymous-show"> (UTC)</span>.</li> <li id="footer-info-copyright">Content is available under <a class="external" rel="nofollow" href="https://creativecommons.org/licenses/by-sa/4.0/deed.en">CC BY-SA 4.0</a> unless otherwise noted.</li> </ul> <ul id="footer-places" class="footer-places hlist hlist-separated"> <li id="footer-places-privacy"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Privacy_policy">Privacy policy</a></li> <li id="footer-places-about"><a href="/wiki/Wikipedia:About">About Wikipedia</a></li> <li id="footer-places-disclaimers"><a href="/wiki/Wikipedia:General_disclaimer">Disclaimers</a></li> <li id="footer-places-contact"><a href="//en.wikipedia.org/wiki/Wikipedia:Contact_us">Contact Wikipedia</a></li> <li id="footer-places-wm-codeofconduct"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Universal_Code_of_Conduct">Code of Conduct</a></li> <li id="footer-places-developers"><a href="https://developer.wikimedia.org">Developers</a></li> <li id="footer-places-statslink"><a href="https://stats.wikimedia.org/#/en.wikipedia.org">Statistics</a></li> <li id="footer-places-cookiestatement"><a href="https://foundation.wikimedia.org/wiki/Special:MyLanguage/Policy:Cookie_statement">Cookie statement</a></li> <li id="footer-places-terms-use"><a href="https://foundation.m.wikimedia.org/wiki/Special:MyLanguage/Policy:Terms_of_Use">Terms of Use</a></li> <li id="footer-places-desktop-toggle"><a id="mw-mf-display-toggle" href="//en.wikipedia.org/w/index.php?title=Identity_theft&mobileaction=toggle_view_desktop" data-event-name="switch_to_desktop">Desktop</a></li> </ul> </div> </footer> </div> </div> <div class="mw-notification-area" data-mw="interface"></div> <!-- v:8.3.1 --> <script>(RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgHostname":"mw-web.codfw.main-6b8d669998-8hxkr","wgBackendResponseTime":217,"wgPageParseReport":{"limitreport":{"cputime":"1.540","walltime":"1.850","ppvisitednodes":{"value":12261,"limit":1000000},"postexpandincludesize":{"value":252702,"limit":2097152},"templateargumentsize":{"value":20125,"limit":2097152},"expansiondepth":{"value":23,"limit":100},"expensivefunctioncount":{"value":24,"limit":500},"unstrip-depth":{"value":1,"limit":20},"unstrip-size":{"value":297572,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 1648.690 1 -total"," 24.71% 407.397 1 Template:Reflist"," 21.16% 348.920 3 Template:Navbox"," 19.99% 329.585 1 Template:Types_of_crime"," 17.62% 290.475 34 Template:Annotated_link"," 15.69% 258.762 56 Template:Cite_web"," 14.66% 241.716 8 Template:Excerpt"," 6.09% 100.454 1 Template:Langx"," 5.54% 91.309 1 Template:Multiple_issues"," 4.19% 69.011 1 Template:Short_description"]},"scribunto":{"limitreport-timeusage":{"value":"1.029","limit":"10.000"},"limitreport-memusage":{"value":22714785,"limit":52428800},"limitreport-profile":[["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::callParserFunction","160","13.6"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::sub","140","11.9"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::find","100","8.5"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::gsub","100","8.5"],["?","80","6.8"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::getEntityStatements","60","5.1"],["\u003Cmw.title.lua:50\u003E","60","5.1"],["getShortDescriptionTemplates \u003CModule:GetShortDescription:58\u003E","40","3.4"],["date","40","3.4"],["MediaWiki\\Extension\\Scribunto\\Engines\\LuaSandbox\\LuaSandboxCallback::anchorEncode","40","3.4"],["[others]","360","30.5"]]},"cachereport":{"origin":"mw-web.codfw.main-57488d5c7d-dqsxq","timestamp":"20241128020738","ttl":2592000,"transientcontent":false}}});});</script> <script type="application/ld+json">{"@context":"https:\/\/schema.org","@type":"Article","name":"Identity theft","url":"https:\/\/en.wikipedia.org\/wiki\/Identity_theft","sameAs":"http:\/\/www.wikidata.org\/entity\/Q471880","mainEntity":"http:\/\/www.wikidata.org\/entity\/Q471880","author":{"@type":"Organization","name":"Contributors to Wikimedia projects"},"publisher":{"@type":"Organization","name":"Wikimedia Foundation, Inc.","logo":{"@type":"ImageObject","url":"https:\/\/www.wikimedia.org\/static\/images\/wmf-hor-googpub.png"}},"datePublished":"2003-02-08T07:07:11Z","dateModified":"2024-10-29T19:13:26Z","image":"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/c\/ce\/Figure_2_Example_of_a_Successful_Identity_Theft_Refund_Fraud_Attempt_%2828356288536%29.jpg","headline":"deliberate use of someone else's identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person's name, and perhaps to the other person's disadvantage or loss"}</script><script>(window.NORLQ=window.NORLQ||[]).push(function(){var ns,i,p,img;ns=document.getElementsByTagName('noscript');for(i=0;i<ns.length;i++){p=ns[i].nextSibling;if(p&&p.className&&p.className.indexOf('lazy-image-placeholder')>-1){img=document.createElement('img');img.setAttribute('src',p.getAttribute('data-src'));img.setAttribute('width',p.getAttribute('data-width'));img.setAttribute('height',p.getAttribute('data-height'));img.setAttribute('alt',p.getAttribute('data-alt'));p.parentNode.replaceChild(img,p);}}});</script> </body> </html>