Internet Commerce Security Laboratory (ICSL)

Identity theft

We are interested in the "business processes" that are used to establish, verify and manage identities, and how criminals use weaknesses in these processes to obtain financial advantage. In order to model the business processes, we are:

  1. Acquiring data from all Australian jurisdictions on how identities are verified and managed
  2. Identifying the business process elements and functions that are used
  3. Understanding how identity theft victims go about "recovering" their identity in different states, with a view to developing a national approach

We have also undertaken a body of work on scams, identifying the homogeneity and hierarchy of relations in the way that various business process schemes can be modified and altered for various scam types (such as romance scams), with a view to developing a consistent, international framework for describing scams.