Some of the most popular ways that a person’s identity is stolen is from the criminal going through the victim’s trash, stealing mail, phishing, or skimming. The first two ways are obvious, but the other two terms may not be familiar to everyone. Phishing is when the criminal poses as someone else, from an individual that works at a bank to law enforcement, in order to gain information from the victim through phone calls or e-mail. Skimming occurs when the criminal places a device in ATMs that gathers account information on the individuals that use it. The device is not noticeable and often would not look any different than an ATM without the device on it (Papadimitriou, 2015). These are only a few of the ways that criminals gain personal information and I can only imagine that new schemes will be created in the
Some of the most popular ways that a person’s identity is stolen is from the criminal going through the victim’s trash, stealing mail, phishing, or skimming. The first two ways are obvious, but the other two terms may not be familiar to everyone. Phishing is when the criminal poses as someone else, from an individual that works at a bank to law enforcement, in order to gain information from the victim through phone calls or e-mail. Skimming occurs when the criminal places a device in ATMs that gathers account information on the individuals that use it. The device is not noticeable and often would not look any different than an ATM without the device on it (Papadimitriou, 2015). These are only a few of the ways that criminals gain personal information and I can only imagine that new schemes will be created in the