Managing Information Systems Final Project Specifications

Managing Information Systems Final Project Specifications Creating a New Identity (How Far Can You Go?)

Creating a new identity explains in detail how people use the borrowed identity for fraud. There are fundamentally three types of identities (other than the one you’re born with): Created, Forged, and Stolen.

  • With created identities, you establish the paperwork needed to make the identity legal, and from that point on you are essentially that person.
  • With forged identities, you create the minimal IDs, instead of applying through the state or government.
  • With stolen identities, you take over another person’s ID (living or deceased) in order to abuse their specific credit. From the point you transfer his or her identity to you, you are that person.

This process is more complicated if you have a criminal record (and thus have fingerprints on record). This can be problematic if caught with the stolen identity, since the authorities think they have someone else.

Paper For Above instruction

The final project for Managing Information Systems focuses on understanding the intricacies of how stolen, forged, and created identities are used in fraudulent activities, emphasizing the methods and risks involved. This paper explores how individuals can assume new identities within the United States, detailing the processes, available digital resources, and data collection techniques that facilitate such actions. The scope includes a comprehensive step-by-step checklist portraying how easy it is for identity thieves to execute such schemes and a detailed list of online resources used to gather personal information and data broker agencies.

Understanding the process of assuming a new identity involves examining several layers, including procedural steps, legal and illegal means, and the digital footprint left behind. For individuals seeking to understand how identity fraud occurs, it is crucial to analyze the methods used for data collection, online search techniques, and the role of data brokers, who amass vast repositories of personal information.

Legal and Procedural Aspects of Identity Assumption in the United States

Assuming a new identity in the United States can involve multiple pathways, each with varying legal implications. Citizens or individuals without criminal records may find relatively straightforward methods, such as legally changing their name through the court system or obtaining new identification documents via authorized channels. These legitimate processes, however, require compliance with legal standards, including background checks and documentation.

In contrast, illegal methods involve clandestine operations such as creating false documentation (forged IDs), acquiring or stealing personal data, and exploiting online resources. Criminals often use these techniques to bypass stringent identity verification systems employed by financial institutions, government agencies, and other entities.

Step-by-Step Checklist for Assuming a New Identity

  1. Research and identify vulnerabilities in the identity verification process.
  2. Gather personal information through online searches, contaminated data breaches, or social engineering.
  3. Create or acquire forged identification documents using specialized services or illegal methods.
  4. Use stolen personal or credit information from data breaches or phishing campaigns.
  5. Open new bank accounts, obtain credit cards, or apply for loans under the assumed identity.
  6. Use the new identity for financial transactions, employment, and other services, remaining cautious of law enforcement detection.

Information Available Online on Any Person

When searching for information on an individual, various data points can be retrieved, including full name, date of birth, addresses, telephone numbers, email addresses, social media activity, criminal records, financial details, and publicly available legal documents. These details can be pieced together to reconstruct a comprehensive profile of an individual, which can be exploited for fraud.

Websites Used for Gathering Personal Data

  • Social media platforms such as Facebook, LinkedIn, and Instagram.
  • Public record databases like court records, property records, and voter registration sites.
  • People search engines such as BeenVerified, Spokeo, or Pipl.
  • Data breach repositories like Have I Been Pwned, which reveal compromised email and password combinations.

Data Broker Agencies/Sites Collecting Citizens’ Data

  • Acxiom
  • Experian
  • Epsilon
  • CoreLogic
  • Lookout
  • ID Analytics
  • LexisNexis
  • Whitepages Pro
  • Oracle Data Cloud
  • RealPage

Conclusion

The process of creating a new identity, whether legally or illicitly, involves complex steps that are increasingly facilitated by the digitization of personal data and the proliferation of online services. Understanding these processes is vital for developing effective security measures and raising awareness about identity theft and fraud. Stakeholders, including individuals, organizations, and policymakers, must recognize the vulnerabilities within current systems and work collaboratively to implement stronger protections against these threats.

References

  • Chen, T. M., & Vasarhelyi, M. (2022). Cybersecurity and Data Privacy in Financial Institutions. Journal of Financial Crime, 29(3), 123-135.
  • Furnell, S., & Thompson, M. (2021). Human aspects of information security: A review of the literature. Computers & Security, 107, 102319.
  • Gordon, L. A., & Loeb, M. P. (2020). The economics of information security investment. ACM Transactions on Information and System Security, 23(2), 1-37.
  • Lee, R. G., & Toubiana, V. (2019). Digital footprints and privacy. Journal of Information Privacy and Security, 15(4), 271-290.
  • Moore, T., & Clayton, R. (2021). The impact of underground online marketplaces on cybercrime. Journal of Cybersecurity, 7(1), 1-14.
  • Nestler, H. et al. (2020). Data brokers: The dark side of our digital economy. International Journal of Information Management, 53, 102080.
  • Risinger, D., & Hargittai, E. (2019). Data breaches and online privacy: Managing the risks. Cybersecurity Journal, 3(4), 45-61.
  • Smith, A. (2020). Digital identity theft: Techniques and prevention strategies. Identity Theft Journal, 8(1), 11-25.
  • Wallace, P., & Johnson, M. (2021). The role of social engineering in cybercrime. Journal of Digital Forensics, Security and Law, 16(3), 203-217.
  • Zetter, K. (2018). The cyberattack that shocked the world. Wired Magazine, 26(11), 40-52.