Skip to end of banner
Go to start of banner

Account Takeover (Dictionary Entry)

Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 8 Next »

DRAFT

Account Takeover

Alternative Forms

  • Identity Takeover

  • Identity Usurpation

Definitions

Definition 1

  • Complete literature review and provide definition

Related Terms

  • Account

  • Credential Theft

  • Identity Theft

  • True Name Identity Theft

Quotes

Identity Theft/Account Takeover: Identify theft involves a perpetrator stealing another person’s personal identifying information, such as name or Social Security number, without permission to commit fraud. Account Takeover is when a perpetrator obtains account information to perpetrate fraud on existing accounts.

(FBI and IC3, 2019, p. 26)

Identity takeover or identity usurpation: the actor takes over an existing identity of another individual (i.e., the original identity bearer) without this individual’s consent. In most cases, the acquired identity was already established in a certain social structure; authentication therefore already took place or can easily be carried out because the required information already exists.

(Koops and Geradts, 2009, p. 318)

Typically, identity thieves will use the personal information to obtain credit, merchandise, services in the name of the victim, or false credentials for the thief. This can result in such things as ruining the victim’s credit rating, generating false criminal records, and issuing arrest warrants for the wrong individuals. Identity theft is categorized in two ways: true name and account takeover. True name identity theft means the thief uses personal information to open new accounts. The thief might open a new credit card account, establish cellular phone service, or open a new checking account in order to obtain blank checks. Account takeover identity theft means the imposter uses personal information to gain access to the person’s existing accounts. Typically, the thief will change the mailing address on an account and run up a huge bill before the person, whose identity has been stolen, realizes there is a problem. The Internet has made it easier for an identity thief to use the information they’ve stolen because transactions can be made without any personal interaction.

(Harris, 2007, p. 266)

Bibliography

See Also

  • No labels