Free Essay

Id Theft

In:

Submitted By Trmjonez
Words 1892
Pages 8
How to Prevent, Perceive, and Protect Yourself from Identity Theft

How to Prevent, Perceive, and Protect Yourself from Identity Theft
Abstract
What is Identity Theft? And the answer is that identity theft is a crime. Identity theft and identity fraud is the terminology used to refer to all types of crime which someone illegally obtains and uses another person's personal information in some way that involves fraud or deception, usually for economic gain. I will explain why you need to take precautions to prevent yourself from being a victim of identity theft. Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, but your personal data especially your Social Security number, your bank account or credit card number, and other valuable identifying data can be utilized, if they fall into the wrong hands, to personally profit at your expense. All over the country, for example, many people have reported that unauthorized persons have taken funds out of their bank or financial accounts, or, in the worst cases, taken over their identities altogether, running up enormous debts and committing crimes while using their victims's names. In many cases, a victim's losses may consist of not only out-of-pocket financial losses, but destroying your credit history, substantial financial costs associated with trying to restore their name and reputation in the community which they live, and correcting erroneous information the criminal is responsible for perpetrating. Although the number of incidents of identity theft/fraud has dropped and there are fewer victims, the remaining frauds are more difficult to detect and resolve, resulting in higher consumer costs. Please use my paper to equip yourself with proven methods to prevent, perceive, and protect you in the future from identity theft.

What is Identity Theft vs Identity Fraud? Most individuals are familiar with the term “identity theft,” which is widely used by media, government and consumer groups and by nonprofit organizations. However, it is important to distinguish between identity theft and identity fraud because the terms have different meanings, although Javelin uses identity fraud more commonly throughout the identity survey and corresponding reports.
True identity theft occurs after the exposure of personal information; typically someone’s personal information is taken by another individual without explicit permission. Identity fraud is the actual misuse of information for financial gain and occurs when criminals use illegally obtained personal information to make purchases or withdrawals, create false accounts or modify existing ones and/or attempt to obtain services such as employment or health care. Personally identifiable information (PII) such as a Social Security number (SSN), bank or credit card account number, password, telephone calling card number, birth date, name and address can be used by criminals to profit at a victim’s expense.
By accessing and using relatively basic information, a criminal can take over existing financial accounts (existing card fraud or existing non‐card fraud) or use a victim’s personal information to create new accounts (new account fraud). A criminal can commit identity fraud numerous ways, including making an unauthorized withdrawal of funds from an account or making fraudulent purchases with a credit card and creating new accounts (banking, telephone, utility, loans). All of which can have a damaging effect on an individual’s credit. In fact, the first notification that fraud has been committed might be the appearance of an unfamiliar account on a credit report or contact from a debt collector. How Does Identity Theft Happen?
Many people do not realize how easily criminals can obtain our personal data without having to break into our homes. Many identity thefts occur through traditional methods such as stolen wallets and “friendly frauds,” in which a person known to the victim has access to statements or other legal documents. Identity theft occurrences are often the result of simple lost or stolen information and not necessarily through hacking or elaborate Internet schemes, although online and mobile threats are viable.
In public places, for example, criminals may engage in "shoulder surfing" watching you from a nearby location as you punch in your telephone calling card number or credit card number or listen in on your conversation if you give your credit-card number over the telephone to a hotel or rental car company.
Even the area near your home or office may not be secure. Some criminals engage in "dumpster diving" going through your garbage cans or a communal dumpster or trash bin -- to obtain copies of your checks, credit card or bank statements, or other records that typically bear your name, address, and even your telephone number. These types of records make it easier for criminals to get control over accounts in your name and assume your identity.
If you receive applications for "preapproved" credit cards in the mail, but discard them without tearing up the enclosed materials, criminals may retrieve them and try to activate the cards for their use without your knowledge. (Some credit card companies, when sending credit cards, have adopted security measures that allow a card recipient to activate the card only from his or her home telephone number but this is not yet a universal practice.) Also, if your mail is delivered to a place where others have ready access to it, criminals may simply intercept and redirect your mail to another location.
In recent years, the Internet has become an appealing place for criminals to obtain identifying data, such as passwords or even banking information. In their haste to explore the exciting features of the Internet, many people respond to "spam" unsolicited E-mail that promises them some benefit but requests identifying data, without realizing that in many cases, the requester has no intention of keeping his promise. In some cases, criminals reportedly have used computer technology to obtain large amounts of personal data.
With enough identifying information about an individual, a criminal can take over that individual's identity to conduct a wide range of crimes: for example, false applications for loans and credit cards, fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining other goods or privileges which the criminal might be denied if he were to use his real name. If the criminal takes steps to ensure that bills for the falsely obtained credit cards, or bank statements showing the unauthorized withdrawals, are sent to an address other than the victim's, the victim may not become aware of what is happing until the criminal has already inflicted substantial damage on the victim's assets, credit, and reputation.

What Can You Do to Prevent, Perceive, and Protect? Protecting yourself from identity theft takes proactive effort. You can't simply assume it's not going to happen to you and go on about your life -- it can happen to anyone. It even happens to celebrities. Oprah Winfrey, Tiger Woods, Robert De Niro and Martha Stewart have all had their identities stolen. While you can't ever totally protect yourself from these thieves, you can at least make yourself less attractive as a victim by doing what you can to make it more difficult for them to access your information. Here are some things you can do to protect yourself:
DON'T give out your Social Security number unless it is absolutely necessary. Many companies collect more information than they really need. Make sure that it's something they have to have and make sure they'll protect your privacy.
DESTROY any unwanted credit card offers. This means rip, shred, burn, whatever you can do. These pre-approved offers come almost daily. If you don't want the three major credit bureaus to sell your name to these companies, you can "opt out" by either writing to the three major credit bureaus or by calling (888) 5OPTOUT (567-8688). This will remove your name, for two years, from mailing and telemarketing lists that come from TransUnion, Equifax, Experian, and INNOVIS. You can also write to the Direct Marketing Association's mail preference service to have your name removed from some mailing lists.
DON'T put any other information besides your name and address on your checks, and keep a close watch on your checkbook both when you're writing checks and when it is lying around. Someone can memorize your name, address and phone number during the short time it takes you to write a check.
SHRED (cross-cut) any sensitive documents before you throw them into the trash. This may seem like an extreme measure, but dumpster diving happens all the time and turns up a lot more personal information than you may realize.
DON'T carry your Social Security card, passport, or birth certificate in your wallet or purse. Also, only carry as many credit cards as are absolutely necessary. It has also been suggested that you photocopy everything you carry in your wallet to make canceling things easier in the event that your wallet is stolen.
REVIEW your credit report every year to make sure there haven't been any new credit cards or other accounts issued (to someone other than you) and to make sure there haven't been inquiries by people you haven't initiated business with. There are also services you can subscribe to (such as CreditExpert) that will alert you to any changes in your credit file.
NEVER give out personal information on the phone to someone you don't know and who initiated the call. Often, scam artists phone unsuspecting victims pretending to be their financial services company and request information to be provided over the phone. Usually, the story is to "update records" or sell a product. Get their name, phone number and address, and then call them back at the number you have on file or that is printed on the statements you receive.
REVIEW your monthly credit card st atement each month to make sure there aren't any charges showing up that aren't yours. Also, make sure you get a monthly statement. If the statement is late, contact the credit card company. You never know when someone may have turned in a change-of-address form so they could make a few more weeks of purchases on your credit card without you noticing.
DON'T mail bills or documents that contain personal data (like tax forms or checks) from your personal mail box. Take them directly to the post office or an official postal service mailbox. It's too easy for someone to take mail out of your mailbox on the street. From there, they can dip your checks in special chemicals to remove the ink and then rewrite them to themselves!
If you're ever denied credit, FIND OUT WHY, especially if you haven't reviewed your credit report lately. This may be the first indication you get that someone has stolen your identity and is racking up charges in your name.
REACT QUICKLY if a creditor or merchant calls you about charges you didn't make. This too may be the first notice you get that someone has stolen your identity. Get as much information from them as you can and investigate immediately.
GUARD deposit slips as closely as you do checks. Not only do they have your name, address and account number printed on them, but they can also be used to withdraw money from your account. All a thief has to do is write a bad check, deposit it into your account and use the "less cash received" line to withdraw your money.

Similar Documents

Free Essay

Id Theft

...IDENTITY THEFT Fraud- intentional deception made for personal gain or to damage another individual. Fraud is a crime and a civil law violation. (1) Fraud affects individuals, businesses and the economy as a whole. Every year millions of dollars are lost due to activities of scammers using countless illegal techniques to achieve their goals. As hard as people work to make money and as difficult as it is to save it, the last thing they want to do is lose any of it through fraud. Financial fraud is the number one consumer complaint, and the biggest danger all the people face nowadays is identity theft, one of the most pervasive and insidious crimes. Identity theft occurs when someone assumes some or all of your identity to engage in criminal behavior. The first case of identity theft is described in the Bible when Jacob covered his hands and neck with goat skin in order to trick his father into giving him a blessing of a firstborn, in order to acquire all the property and livestock his father owned. In early American history, identity theft was focused on voters’ registration and ballot stuffing. Then in1930’s, brought 21’st amendment to the United States Constitution brought the new law that repealed prohibition. Alcohol was legal again, but drinking age was determined by individual state, until 1984 when US Congress passed the National Minimum Drinking Age Act. Between these times worst crime committed was underage drinking using fake ID. Usage of assumed name and identification...

Words: 2899 - Pages: 12

Free Essay

Medical Id Theft

...Final Paper: Medical Identity Theft at Molina Healthcare, Inc. Barlahan, Andrei ID B00459963 Brandman University Define the Problem Medical Identity theft has become an increasing problem in the United States and continues to negatively impact millions of individuals. Medical identity theft usually occurs when individuals share their information with someone else, who in turn uses that information to receive medical services and fill for prescriptions. Other times, individuals lose their medical card or have their information stolen by a friend or close relative. According to a 2013 survey conducted by the Medical Identity Fraud Alliance (MIFA), medical identity fraud has increased nearly 20 percent compared to the year before in the U.S., affecting an estimated 1.84 victims and having a total out-of-pocket medical costs incurred by medical identity theft victims of $12.3 billion (DeGaspari, 2013). This is a serious problem, because not only are millions of dollars wasted, but patient medical records are compromised, which can result to misdiagnoses, wrong procedures and treatment, and wrong prescriptions. On a smaller scale, Molina Healthcare’s Special Investigation Unit (SIU) conduct investigations on referrals they receive indicating a Molina member may have been a victim of identity theft. A lot of times when the issue is actually identity theft, the SIU is only able to “band-aid” the problem and have found the issue resurfacing months later and Molina continuing...

Words: 3118 - Pages: 13

Free Essay

Food

...It’s the 21st of November and you are at the home stadium of Real Madrid for the el clasico. Fans cheer and sing the club anthem in this sense of pride and commitment to their respective teams. You begin to feel this surge of patriotism and worth of your very existence at this moment; what could possibly go wrong? A rampage of opposing fans? Projected Molotov cocktails? A potential black-eye? As crazy as it may sound, those were the potential outcomes of what was usually expected during the 1950s at a casual game of football, not by the fans, but by the infamous football hooligans, who are by far and large known as, ‘overzealous supporters’ (Wikipedia). The reasons for such shocking trial of events were mainly due to racism, sense of Identity with the team and, as petty as this may sound; issues with ticketing. Racism, being the ugly mark of human society, is still prevalent in this modern age. It doesn’t necessarily have to involve an occasional Rosa being forced to the back of the bus; but more of verbal slurs which lead to public display of violence. On the 12th of October, 2015, The Notorious fans of Israel’s Beitar Jerusalem football club are well known for shouting anti-arab slogans and throwing stones at Palastanian fans. Although there have been laws implemented to protect Palestanian fans and Arab players, atleast 25 Palestenian had been killed by the Israeli forces. As mentioned earlier, verbal offence towards a specific ethnicity especially when clubs are involved...

Words: 2011 - Pages: 9

Premium Essay

Melissa's Use Of Rationalization

...Melissa is a nearly 30 year old, Caucasian woman who recently experienced divorce five months ago with her husband of three and a half years of marriage. She lives with her daughter, and is supporting their new lifestyle through waitressing, which she has done for approximately give years. Melissa informs Dr. Wachtel that she is encountering some obstacles in making changes to her current career path. She wants to quit her waitressing job, and pursue an experience more related to her school counseling degrees. She voices that her main concern that brought her to seek help in therapy is making the correct and informed choice about her career change because she worries about financial stability given that she is a single mother raising her daughter on her own. Though Melissa is quite explicit about her concerns about her career choices and the issues she hopes to resolve in therapy, it seems as if there are other underlying issues that are in her unconscious. As the session progressed, it seemed as if Melissa also wanted to address how her family dynamics with her immediate family is affecting her decisions. There are moments where it felt like she is looking for justification and support for the events that took place in her life and her decisions that may have led to those events. This is not just about her career change (or lack thereof), but other sudden changes like her divorce that resulted in a new lifestyle that Melissa does not necessarily want to shift for the time being...

Words: 1663 - Pages: 7

Premium Essay

Harrison Bergeron Literary Analysis

...story through a psychoanalytic lens, a person uses the work of Sigmund Freud’s theories of psychology to interpret the text they are reading. Through the psychoanalytic lens, the reader is able to compare the characters of Harrison Bergeron to parts of a person’s personality, for example, Harrison Bergeron can be compared to the Id, George can be compared to the ego, and the Handicapper general can be compared to the Superego. The Id runs on the pleasure principle whose goal is to increase pleasure and decrease pain, like the Id, Harrison’s goal is to break free of the handicaps that he is forced to wear in order to increase the quality of his life. The Id is the basic storehouse for human’s basic needs and drives. Harrison contains such an incredibly strong drive that it causes him to make irrational decisions. One can say that Harrison even suffers from cathexis because of his obsession with rebellion. Similar to the Id, Harrison does not learn from its mistakes. When Harrison...

Words: 957 - Pages: 4

Free Essay

English

...Essay on hooliganism In this essay I will discuss why hooliganism exist, what makes a person become a hooligan and what characterizes a hooligan and hooliganism as a whole? They hunt in packs like wolves, fueled by drugs, hooked on violence. Some are as young as 15. They make a plan to arrange showdowns against other rival ''firms'' at agreed locations. This is a quotation from the French documentary ''Fucking Hooligans''. But why does hooliganism exist in general, there are a lot of reason to it, but the main ones are mentioned. In the text ''Among the Thugs'' and the film ''Fucking hooligans'' it expresses the lifestyle of a group of lads who have a lot of things in common. They drink a lot, smoke a lot and foremost they love to fight, the typical formula for a hooligan. They're the most dangerous. They're the ones who start most of the fights.(p.4-l.12-13). The hooligan culture is not just a culture for some people but a bond between brothers, or in other words it is another family for them. There are plenty of reasons why ''someone'' becomes a hooligan. People normally become involved through two ways, either through friends and family or their choice of a new lifestyle. The main reason why people decide to become a hooligan is that it is just fun when it kick's off. It's an adrenaline thing, you cannot get that kind of buzz through anything else. But half the time it's not even about fighting, it is about being around your mates, having a laugh on a match day and...

Words: 913 - Pages: 4

Premium Essay

Stillness In Tim Winton's Alter Ego

...Powerful moments of stillness can lead us to a true understanding of self, but to understand who we are we must look at what makes us unique as an individual human being. In Gwen Harwood’s “Alter Ego” she is at peace with the world and lives and breathes music. Her views are often overlooked in modern day society, but she remains true to the fact that she believes that we never really have a full understanding of our identity. Opposing this in Tim Winton’s “Land’s Edge” his true self resides in the ocean, a place where he feels most at home, his Australian coastal background, his main influence of his sense of identity. Both composers examine the moments of stillness in our lives and how it is only then that we truly get a glimpse or a sense of who we are. In “Alter ego” Harwood describes the alter ego as a part of herself that has intimate and complete knowledge of her yet acknowledges that her conscious mind does not have a complete and full understanding of this ‘other self’. Harwood uses the rhyming of the first, third and fourth line in the first stanza to add a flowing effect or enjambment, this flowing effect also reflects Harwood’s love of music and piano playing as she is an accomplished pianist. Music is an integral part of Harwood’s ‘other self’ and is used as a motif in Alter ego. Throughout the poem she portrays her two selves as the spiritual and the physical parts of herself, she also uses first person language to create a voice for the physical persona of herself...

Words: 728 - Pages: 3

Premium Essay

Felony Crimes

...a less serious crime. Most states and the federal government classify a crime that's punishable by less than one year in prison as a misdemeanor. Some states consider a misdemeanor as any crime that's punishable only by fine or a small length of time in jail. If a misdemeanor is considered a very minor offense, such as jaywalking, the crime may be classified as a petty offense. There's a wide variety of crimes that are considered misdemeanors in most states. Some common misdemeanors include: * Public intoxication * Trespassing * Speeding * Prostitution * Vandalism * Use of a false ID Whether a crime is considered a felony or a misdemeanor will many times depend on any aggravating factors. These are factors that make a crime more serious. For example, the theft of a very inexpensive item from a store may be considered a misdemeanor. However, the theft of multiple items that are worth thousands of dollars may be considered a felony. Crimes against the Person A crime against the person is a crime that's committed using direct harm or force against the victim. Usually the most serious crimes, such as murder or rape, are crimes against the person. These crimes are many times felonies because of the seriousness of harming another person. However, some lower level crimes, such as...

Words: 555 - Pages: 3

Premium Essay

Est1

...EST1 Task 1 Kara Kinikini Student ID: 265037 Business Management Many believe that business entities should have an ethical duty to be socially responsible, to work towards increasing its positive effects on society while decreasing its negative effects. Many organizations look for opportunities to be socially responsible while also creating shareholder wealth. Company Q is a small local grocery store chain located in a major metropolitan area. They have recently closed a couple of stores in higher-crime-rate areas of the city, reportedly because these two stores were consistently losing money. After years of requests from customers, all of their stores have started offering a very limited amount of health-conscience and organic products—all of which were high margin items. When asked by the area’s food bank for donation of day-old products, management declined deciding instead to throw the food away, citing worries over lost revenues due to possible fraud and stealing by employees who might say they are donating the food. Company Q's current decision to close stores in "Higher-crime-rate" areas of the city, was not a good exapmle of the social responsibility. The concept of social responsiility encompasses the actions, activities and attitudes of business and the impact a business has on its community. Closing those stores did not leave a possibive impact on the community, and other actions should have been taken to miminize negative impacts the community may have...

Words: 702 - Pages: 3

Premium Essay

Intellectual Property in Automobile Industry

...Intellectual Property Theft in the Automotive Industry Scope, Trends, and Mitigating Strategies Table of Contents Introduction………………………………………………………………………………..3 Scope of Intellectual Property Theft………………………………………………………3 Intellectual Property Theft and China……………………………………………………..4 Intellectual Property Theft in the Automotive Industry…………………………………...5 The Subtle Pick-Off……………………………………………………………….5 Piracy and China’s Global Emergence…………..………………………………………..6 Consequences of IP Theft…………………………………………………………………7 Mitigating Strategies………………………………………………………………………7 The Autoweb Intellectual Property Exchange…………………………………………….8 Fusion-DX………………………...………………………………………………9 GlobalSource………………………………………………………………….…..9 Data Integration Services……………………………………………………….…9 GlobalSource...………………………………………………………………….…9 Integrated Translations…………………………………………………………….9 Autoweb Company Overview……………………………………………………10 Bibliography………………………………………………………..……………………11 www.autoweb.net 2 Introduction I ntellectual Property protection in the manufactured goods sector is not a new idea. Laws prohibiting manufactured goods counterfeiting and piracy activities existed as far back as the Middle Ages when bakers, artisans, and craftsmen used distinctive marks to distinguish their products and work from would-be counterfeiters. The general problems associated with modern day counterfeiting and intellectual property piracy have long been recognized, yet today’s high-tech economy has magnified the problem of...

Words: 3125 - Pages: 13

Premium Essay

Computer Science

...crime is the computer as a target. This type of cyber-crime requires a level of technical knowledge from its perpetrators. Cyber-crime is relatively new, however, has been in existence since the implementation of computers in mainstream society. This could be a general explanation as to why and how unprepared society and the world are towards fighting these types of crimes [ (Joseph, 2006) ]. There are numerous crimes of this nature being committed on a daily basis. Examples of cyber-crime where the computer itself is the target include things like data alteration, denial of network access, theft of information, denial of service, and vandalism. The next category that the author would like to point out is the computer as an instrument of a crime. What this means is that the computer is used to profit with some other criminal activity in mind. Some examples of this are general theft, theft of service, fraud, and threats and/or harassment [ (Taylor, Fritsch, Liederbach, & Holt, 2011) ]. The implementation of computers as a criminal tool or device to obtain information to be used in a criminal manner increases yearly. Criminals use computers to store data relating to drug deals, money laundering, embezzlement, mail fraud, extortion, and a myriad of other crimes. In addition to the simple storage of records, criminals also...

Words: 1361 - Pages: 6

Premium Essay

Lying, Cheating, Stealing: White Collar Crime

...Lying, Cheating, Stealing: White-Collar Crime “Lying, Cheating, Stealing. That’s white-collar crime in a nutshell.” That is how the Federal Bureau of Investigation describes crime committed by corporations (FBI—White-Collar Crime). These crimes include fraud, identity theft, internet swindles, money laundering, price-fixing, embezzlement, political corruption, police brutality, and much more. Conklin (2010) defines white-collar crime as “any illegal act, punishable by a criminal sanction, that is committed in the course of a legitimate occupation or pursuit by a corporation or by an otherwise respectable individual of high social standing.” Who are white-collar criminals? Who are blue-collar criminals? What are the differences between white-collar crime and blue-collar crime? Is there disparate treatment in sentencing between white-collar and blue-collar criminals? If yes, should there be? For example, if someone breaks into my home, it is a blue-collar crime and I lose some property. If a banking or real estate corporation defrauds me, it is a white-collar crime, and I lose my home, savings, and/or pension. Who is the worse criminal, and what are we doing about it? I will research these questions and examine how these two types of criminals are treated within our society. In 1939, Edwin Sutherland coined the term white-collar crime in his presidential address to the American Sociological Society. In 1949, he authored a book, White- Collar Crime, that revealed...

Words: 1060 - Pages: 5

Premium Essay

Est1 Task 1

...Student ID Business Management Degree Program EST1 310.2.1-05 Social Responsibility The small grocery chain Company Q takes a pessimistic view towards the community which is shaped by the experiences of high crime rates in the area. In order to remain economically feasible Company Q has closed locations that were losing money. This allows the company to retain profits from other locations and provide jobs to members of the community. Unfortunately, because of the high crime rates, Company Q has taken and apathetic view towards the community. This is displayed through their response to requests made by members of the community. It has taken several years of customer requests for the chain to begin carrying specialty high profit items. Members of the local food bank have asked for donations of day old food and Company Q decided not to donate citing that fraud and stealing would arise through possible deception from employees. Overall, the company displays a mediocre attitude towards social responsibility and can improve in a variety of ways. Company Q can improve their social responsibility through economic, ethical, and philanthropic means by developing customer loyalty, employee commitment, and being a good neighbor to the community. For many years customers had asked for specific health-conscious items before the company considered bringing the items for sale. This lack of response displays a poor attitude towards customers needs and must be improved. Company Q...

Words: 656 - Pages: 3

Free Essay

Uniform Crime Reports

...crime rates that occur in different regions and from one year to the next. Another benefit to the UCR is that they show major changes in crime rates through the years. The FBI has compiled these reports since 1929, which created a standard through which all crimes throughout the country are reported. The UCR is published yearly and is available to all law enforcement agencies and accessible to all citizens via the Internet. “Rates of crime under the UCR/NIBRS Program are generally expressed as “x number of offenses per 100,000 people in the U.S. population” (Schmalleger, F., 2009, p. 39). The eight major offense categories reported on in the UCR are murder, forcible rape, robbery, aggravated assault, burglary, larceny, motor vehicle theft, and arson. The crime of murder is the first statistic reported in the UCR and should not be confused with homicide. Murder is, “…an unlawful homicide” and homicide is, “…the willful killing of one human being by another” (Schmalleger, F., 2009, p. 54). Classifications of murder are first-degree (premeditated) murder, second-degree murder, and third-degree murder or negligent homicide. (Schmalleger, F., 2009, p. 54). In the UCR, “…only the number of murders committed, not attempts to murder” are measured (Schmalleger, F., 2009, p. 55). According to crime statistics compiled...

Words: 1763 - Pages: 8

Premium Essay

Criminology

...CRIMINOLOGY Linda Martinez AIU-CRJS105 November 14, 2011 ABSTRACT In the following paper I will discuss and define the differences of criminologist, criminalist and forensic psychologist. With describing the three we will be able to understand the differences amongst them and the role they play in the Criminal justice field. We will also explain the differences of White and Blue collar crimes. We will also see how it is measured in the Uniform Crime Reports of the FBI. As we go and study the world of Criminal Justice there are many fields that one decides to study. There are three that I will define and give an explanation on the role they take. Each takes an important role as the other to prevent, solve and investigate criminal acts and their behavior. The first one we will define is crimionolgy which is the scientific study that is within the confines of sociology that studies the cause and prevention of crime and the rehabilitation and punishment of offenders. The important role for criminalists is known as a specialist in the collection and examination of the physical evidence of crime. The last important definition of the three is forensic scientist which is the application of scientific knowledge to legal problems; especially: scientific analysis of physical evidence (as from a crime scene). The importance of the three is very important when you come to understand the definitions of what their roles are. As stated in GALE White-collar crime is a broad term...

Words: 930 - Pages: 4