چکیده انگلیسی مقاله |
Identity theft has occurred in a wide range of crime geographies around the world. As cases related to this crime become more visible, this study aims to achieve an appropriate model of the criminalization process of identity theft, to be able to increase the training of FATA police, to create a unified procedure in detection and prediction from the perspective of viewers. Adequate cyberspace users are allowed. The method of this research is (qualitative) exploratory. In terms of practical purpose, nature of data, descriptive-analytical, data collection method from filing technique and statistical population of this research includes documents including cases related to FATA police identity theft, notifications, instructions, and some related articles are in 1398 and 1399. According to the findings of this study, identity theft is the cause of cybercrime, including identity forgery and identity fraud; By various methods in cyberspace through hacking, creating fake ports (phishing) or other methods such as: farming, skimming, spoofing, information brokerage, deception or pretending, introducing yourself instead of another person Tricks, cheating, and social engineering occur. Identity thieves enter the crime scene for profit, mainly for financial reasons, and then go through the perpetration steps introduced by Winn (i.e., planning, launching, attacking, collecting), identity theft, which is the unauthorized access to individuals' identity information. Commit by changing the originality. Finally, after the theft of identity, through the victim, informant, patrolling cyber detectives and notifying the judicial authorities, the stage of notification of the crime is achieved. Cybercriminals then explore cyberspace by exploring the crime scene, gathering evidence and tools, analysing evidence, and documenting the crime and reporting it to the judiciary. |