Generally enabled by [[identity theft]], an [[attacker]] may carry out identity fraud in any of the following ways: - to access financial services - to access utility or telecom services - to make purchases that are not in their name - to obtain further means of identification, strengthening their [[web of trust]] - claim rights or privileges to which you are entitled