You are working an investigation involving electronic ID theft. In this case, the offender(s) have used cell phones, computers, and other electronic devices to steal personal IDs. Discuss how they are able to do this and the types of theft

What will be an ideal response?


(1) hacking into computers, cell phones, and other electronic personal storage areas; (2) sending legitimate-appearing e-mails directing users to phony websites that ask for personal and financial information—known as phishing; (3) sending spam e-mails that promise prizes or cash rewards for providing financial/personal information; (4) sending fake IRS or other government forms via e-mail (the government does not request personal information via e-mail); (5) using a pharm technique in which an entire computer domain location is hijacked and used to gather information from users who believe they are communicating with their legitimate Internet service provider; (6) skimming information from the magnetic strip of credit cards, ATM cards, ID cards, driver's licenses, and other items—usually carried out by corrupt merchants or other seemingly legitimate employees.

Criminal Justice

You might also like to view...

What type of restrictions do most states have on the granting of probation in felony cases?

a. public opinion restrictions b. moral restrictions c. judiciary restrictions d. statutory restrictions

Criminal Justice

Examine capital punishment in the United States

What will be an ideal response?

Criminal Justice

Please provide Four main Elements of Robbery.

What will be an ideal response?

Criminal Justice

Age could be asked as discrete categories (e.g., 12-17, 18-20, 21-25, 26 and older), or it could be asked as a ______ measure (e.g., How old are you?).

A. nominal B. continuous C. categorical D. fixed

Criminal Justice