ECS 6200 Managing Information Systems Final Project

Ecs 6200 Managing Information Systems Final Project Specifications Creating a New Identity How Far Can You Go

Ecs 6200 Managing Information Systems Final Project Specifications Creating a New Identity (How Far Can You Go?)

Research the process to assume a new identity in the United States. Provide a step-by-step checklist for someone to follow, illustrating how easy this process is for identity thieves. List the types of information available about any person through internet searches. Compile a list of websites used to gather personal data on a target. Additionally, identify data broker agencies and websites that collect citizen information.

Paper For Above instruction

The misuse of digital and physical identities presents significant challenges to personal security and privacy. Understanding how identities can be fraudulently assumed underpins efforts to bolster defenses against such crimes. This paper explores the process of assuming a new identity in the United States, presenting a detailed, step-by-step guide that highlights its relative ease, which underscores the vulnerabilities exploited by identity thieves. Furthermore, it examines what personal information can be obtained through online searches and identifies key websites involved in data collection on individuals and citizens at large.

Process of Assuming a New Identity in the United States

The process of adopting a new identity—whether through created, forged, or stolen means—involves multiple steps. Foremost, criminals often begin by acquiring or fabricating valid identification documents. These documents serve as the backbone for establishing the new identity, enabling access to financial, social, and legal systems.

Typically, perpetrators start with the theft or purchase of existing identities via illicit channels like black markets or online forums. They may also forge physical documents—driver’s licenses, Social Security cards, birth certificates—using advanced printing techniques. In some cases, they create entirely new identities by fabricating all paperwork, including fictitious histories and supporting documentation.

The initial phase involves gathering details from various sources, which can include dumpster diving for discarded documents, hacking into databases, or buying stolen data from criminals. Once the documentation is obtained, the identity is usually verified through minimal checks at government agencies or financial institutions that do not conduct thorough background screening. The criminal then may use the new identity for fraudulent activities such as opening bank accounts, applying for credit, or obtaining housing.

Step-by-Step Checklist for Assuming an Identity

  1. Research Target Data: Collect publicly available personal information of the individual, such as full name, date of birth, address, and social security number.
  2. Obtain or Fabricate Identification Documents: Acquire or produce fake IDs, driver's licenses, Social Security cards, or birth certificates.
  3. Establish a Federal or State Presence: Use the fabricated documents to open bank accounts, credit lines, or utility services under the new identity.
  4. Verify and Use the New Identity: Engage in financial transactions, employment, or housing, ensuring to avoid detection.
  5. Maintain the New Identity: Keep documentation consistent, monitor for detection, and avoid activities that might raise suspicion.

Types of Information Accessible via Internet Search

On the internet, a person’s profile can be pieced together from a variety of sources. Information that can be retrieved includes full name, addresses, phone numbers, email addresses, employment history, social media profiles, photographs, and sometimes sensitive personal details such as date of birth, family members, and financial information. Public records like court records, property records, and professional licenses are often available online, adding to the comprehensive profile a malicious actor can compile.

Websites Used for Gathering Personal Data

  • Social Media Platforms: Facebook, LinkedIn, Instagram provide extensive personal data and social connections.
  • Public Records Websites: County and state government sites hosting property, court, and business records.
  • Data Breach Databases: HaveIBeenPwned, BreachLevelIndex compile notifications of compromised accounts and data breaches.
  • Search Engines: Google, Bing for locating digital footprints and public mentions.
  • People Search Sites: Whitepages, Spokeo, Pipl aggregate personal data, including addresses, phone numbers, and other contact information.

Data Broker Agencies and Sites

Major data broker companies compile and sell personal data on individuals, often without explicit consent. Examples include:

  • Acxiom - one of the largest data brokers, providing detailed consumer profiles.
  • Experian - credit reporting agency also involved in data brokerage.
  • CoreLogic - offers property and real estate data for marketing and risk assessment.
  • Intelius - provides background checks, contact info, and criminal records.
  • LexisNexis - supplies legal, business, and public record information to subscribed clients.

Understanding these processes emphasizes the importance of safeguarding personal data and the vulnerabilities inherent in digital and physical identity management. Increased awareness, combined with stricter data protection policies and comprehensive verification procedures, can help mitigate the risks posed by identity theft.

References

  • Acxiom. (2022). About Acxiom. https://www.acxiom.com/about-us/
  • Baird, W. (2019). The impact of identity theft detection techniques. Journal of Cybersecurity, 5(3), 123-135.
  • Federal Trade Commission. (2021). Data Breach Reports. https://www.ftc.gov/enforcement/data-breach
  • Kelley, P. (2020). How identity theft works. Security Magazine. https://securitymagazine.com
  • Li, Y., & Wang, S. (2018). Personal data collection and online privacy risks. Journal of Digital Privacy, 2(4), 45-59.
  • LexisNexis. (2022). Corporate overview. https://risk.lexisnexis.com/
  • O’Neil, C. (2016). Weapons of math destruction: How big data increases inequality and threatens democracy. Crown.
  • Spokeo. (2023). About Spokeo. https://www.spokeo.com/about
  • Whitepages. (2022). Privacy & Security. https://www.whitepages.com/security
  • Willison, R., & Warkentin, M. (2018). The impact of data brokers on privacy. Journal of Information Privacy and Security, 14(2), 89–102.