Thesis: I say identity theft is an act that can be carried out successfully by only a smart criminal.
Audience: People who are careless about how they handle their personal information. Those that do not really know how identity theft is being carried out
Outlines:
• Introduction:
Existence and scope of identity theft
• Paragraph 2: Ways identity theft is carried out. An example from an article called Dragnet
• Paragraph 3:
Continuation of the ways identity thefts is carried out with examples.
• Paragraph 4:
Continuation of the ways identity thefts is carried out with examples.
Conclusion:
Usage of stolen identities and the impact on victims.
Changes: In this essay, I changed my thesis, and my audience. …show more content…
Identity theft can be carried out through credit card, through the internet, through the mail, completing a change of address form, taking information individuals share on social media. There are different ways and procedure they use in carrying out this theft to success. I once read an article called “The Dragnet” by Russell Brandom. This article talked a man named Rigmaiden, but was not known by Rigmaiden but other people names. Russell said “Just a few minutes after the pickup, Stout was gone. It was as close as the cops would get for months. From there, every lead seemed to dry up. Stout’s driver’s license was fake: the address didn’t exist and the ID number belonged to a woman in Bakersfield.” Stout Russell was referring to here was Rigmaiden. Rigmaiden who just finished a fraudulent transaction at a train station in San Francisco, but was not caught because every trace led back to Stout and the I.D. that belong to a woman and not Rigmaiden. Using peoples I.D. to make fraudulent transactions was what he did for a living because this helps him get away from being caught because all the transactions made are being traced back to the I.D. owners. Russell said, “The informant led the task force to a nest of bank accounts where he has been instructed to deposit money, but they were all in false names — Sam Blat, Benjamin Cohan, Aaron …show more content…
To accomplish this act, most thieves find a way in which they can compromise a computer, they can do this by creating spyware in some sites we want to download files or software, when we try to open email attachments or click on pop-ups when we visit devious websites. This spyware is able to quietly transmit one’s personal information, which can include: Credit card numbers, Bank account numbers, Social Security numbers, usernames and passwords, address books, including email addresses while connected to the