An introduction to identity theft and identity authentication methods, including fingerprints, DNA, signature verification, face, iris, retina and voice recognition, and thermograms. Trends, issues and problems in identity verification are discussed, as are system vulnerabilities.