Generally enabled by [[identity theft]], an [[attacker]] may carry out identity fraud in any of the following ways:
- to access financial services
- to access utility or telecom services
- to make purchases that are not in their name
- to obtain further means of identification, strengthening their [[web of trust]]
- claim rights or privileges to which you are entitled