Free Essay

Identity Theft: How Information Technology Has Made It Easier to Do

In:

Submitted By neenah875
Words 1196
Pages 5
Identity Theft: How Information Technology Has Made It Easier To Do
IFSM201

Identity theft is not a new problem; it has actually been around for many years but with technology evolving by the minute it has made identity theft easier than ever before to do and almost get away with, leaving little to no traces. In the past the way to commit identity theft was to kill a person and assume their identity, this was way before photo ids were customary, during those times id theft wasn’t that prevalent. During the 50’s and 60’s with the invention of credit cards and Social Security Cards identity theft began to increase slightly, since most people carried their social security cards or passports in their wallets making it easy for thieves to steal and assume their identity; even though a thief may have had your personal information it still wasn’t easy for them to get credit without applying for it in person with photo identification or without the manager of the bank that was extending the credit vouching for you personally (History of Identity Theft) Obtaining credit now a days is a lot easier as long as you have the required information, even if that information is not yours, you no longer need a bank manager to vouch for you; this gives thieves more opportunities to get your information and make it their own. With the invention of the Internet and having just about every transaction we do transmitted electronically, identity thieves have the ability to gain access to a great deal of personal information. The Internet makes this crime easy to commit because thieves no longer have to dumpster dive or steal mail to get pertinent personal information, all a thief needs to do is access a copy of someone’s credit report and all the information is there; SSN, account numbers, date of birth, addresses for the past 10 years everything a thief would need in order to make your identity their identity. It’s not that identity theft isn’t still done the old fashion way by stealing a wallet or purse or offering a great trip to some exotic land for a little bit of personal information but those methods have taken a back seat to more advanced methods such as email fraud, account hacking and phishing because they’re much easier to do. How many times have you received an email from a bank or a company that you do business with and there’s a link in the email sending you to that company’s website? Upon accessing that link you’re taken to a very official looking website with company logos and even terms and conditions for site use only to see required fields for your account information, address and other personal information because the company needs to update your account. A good majority of people will fill out the required information because the site looks official, never questioning if the site is real or not because it looks legit, “when we visit a website we use the professionalism of the page to judge whether or not it’s really legitimate—never mind that anyone can cut and paste graphics.” (Schneier, 2009) Because we deal with the Internet and websites on a daily basis most people wouldn’t second think the authenticity of a website, especially one from what appears to be a reputable company, unfortunately phishing is a common way that identity thieves use information technology to get the information they need. Having been a victim of account hacking I’m now very leery of the Internet and all it has to offer. I must admit before my banking account was wiped out, by some unnamed faceless person, I was very willing to do most if not all of my personal transactions online. I always felt that the Internet was a safe place, I was sure that all the websites I visited were secure, I never had any problems in the past with my information being at risk for theft and in my opinion there’s nothing more secure than a bank, right? In reality places like banks, credit card companies and companies that house personal information are at great risk of having their customers information accessed not only by hackers but also by the people they hire to keep that information safe. From 1999-2002 a help desk worker at Teledata Communications, a computer software company that provides banks with computerized access to credit information databases from the three major credit bureaus, sold access to the personal financial information of 30,000 victims for $60.00 per record, actually $30.00 per record because he split the profits with his point of contact, to about 20 Nigerian nationals; causing the victims to lose millions of dollars from fraudulent activities. All this was possible because “any help desk representative has access to confidential passwords and subscriber codes of (Teledata) client companies that would have enabled that employee to download credit reports from all three credit bureaus” (Sullivan, 2002) It’s scary to think that the people we trust to help us with intricate technical issues, help desk workers or IT personnel, are the same people that have so much access to the information that is so important to us but what can we do to ensure that our information remains safe? A good way to keep your personal information safe is to be proactive, take steps to prevent unauthorized transactions before they happen. Place a credit freeze on your credit reports with the three major credit bureaus, “creditors generally won’t open a new account if they don’t have access to the report, so a freeze offers the best protection there is against someone opening an account in your name.” (Lieber, 2011) Also don’t respond to unsolicited emails requesting personal information from company’s you do business with. Review all account statements regularly to ensure chargers are correct, also check your accounts online often if this option is available to you. (FDICchannel, 2011) Always use good judgment when accessing websites or clicking on links and be careful how you handle your personal information; technology is great but in the wrong hands it can be a very dangerous thing, so it is ultimately up to us to keep our own personal information safe and secure.

References:
FDICchannel. (2011, June 22). Don't Be an On-line Victim: How to Guard Against Internet Thieves and Electronic Scams. Retrieved October 6, 2011, from FDIC Federal Deposit Insurance Corporation: http://www.fdic.gov/consumers/consumer/guard/index.html
History of Identity Theft. (n.d.). Retrieved October 2011, from Identity Theft & Credit Fraud: http://www.identitytheftcreditfraud.com
Lieber, R. (2011, May 6). Identity Theft. Retrieved October 6, 2011, from The New York Times: http://www.nytimes.com/2011/05/07/your-money/identity-theft/07money.html?_r=2&ref=identityfraud
Schneier, B. (2009, January 13). The Wall Street Journal. Technology. Retrieved October 6, 2011, from The Wall Street Journal: http://online.wsj.com/article/SB123125633551557469.html
Sullivan, B. (2002, November 25). Huge Identity Theft Ring Busted. Retrieved October 7, 2011, from Tech and Gadgets on msnbc.com: http://www.msnbc.msn.com/id/3078518/ns/technology_and_science-tech_and_gadgets/t/huge-identity-theft-ring-busted/

Similar Documents

Free Essay

Identity Theft

...Dangers of Identity Theft Sharae Ernst IFSM 201 – Summer 2012 8/3/2012 “Identity theft occurs when someone uses your personally identifying information (PII), like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.” (Fighting Back Against Identity Theft: Federal Trade Commission). According to the Federal Trade Commission, identity theft complaints have decreased since year 2008 (314,521 to 250,854). It is estimated by the FTC that as many as 9 million Americans have their identities stolen each year. As information technology progresses along with society, there is always an increased risk of having one’s identity stolen. “Identity theft was the number one complaint category in the CSN for calendar year 2010 with 19% of the overall complaints, followed by Debt Collection (11%); Internet Services (5%); Prizes, Sweepstakes and Lotteries (5%); Shop-at-Home and Catalog Sales (4%); Imposter Scams (4%); Internet Auction (4%); Foreign Money Offers and Counterfeit Check Scams (3%); Telephone and Mobile Services (3%); and Credit Cards (2%).” (Consumer Sentinel Network Data Book: For January - December 2010, 2011). Although the numbers have slightly decreased, overall, identity theft is on the rise. “According to a February 2012 Javelin Study, identity theft rose 13% from 2010 to 2011.  More than 11.6 million adults became a victim of identity theft in the United States during 2011.” (Coping with Identity Theft: Reducing...

Words: 1352 - Pages: 6

Premium Essay

Identity Theft Crime

...government done enough to detect and deter the crime of identity theft. I will also go over how technology made identity theft easier to commit. Also for this essay, I will also go over how will emerging technologies changed the role of the cybercrime investigator. Sources used: http://www.cardhub.com/edu/identity-theft/http://securitycourse.blogspot.com/2010/11/identity-theft-and-increase-in.htmlhttp://www.pcworld.com/article/2453400/the-biggest-data-breaches-of-2014-so-far.htmland http://securitycourse.blogspot.com/2010/11/identity-theft-and-increase-in.html   The Fight Against Identity Theft Over the years people look at identity theft and say, “Oh it won’t happen to me. I don’t have a lot of money for people to want.” The thing is identity theft can happen to any with a Social Security Number, medical insurance, and any information useful to cyber criminals. Identity theft can occur when someone gains unauthorized access to someone’s personally identifying information. According to The Federal Trade Commission, there is about nine million Americans experience some form of identity theft. That number may be subjected to fluctuate because it can be consider both crime fighting tactics and methods that criminals use to steal identities over time but the FTC’s Consumer Sentinel Network received over...

Words: 606 - Pages: 3

Free Essay

Identity Theft

...How does Technology help Criminals Commit Identity Theft? Identity theft is becoming one of the fastest growing criminal offenses in the United States. Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name (Kiesbye). It is important for one to know that identity theft is not just a financial crime. It is a serious crime that can cause havoc on finances, credit history, and reputation. Identity theft can go unnoticed and can take time, money, and patience to resolve. Technology is constantly evolving making identity theft an easier crime to commit (Kiesbye). There are several ways in which technology plays a major role in assisting criminals commit identity theft (Knight Ridder/Tribune Business News). Some ways include computer hacking, telephone bugging, and old-fashioned stealing. Identity theft has become a very serious business for criminals (Knight Ridder/Tribune Business News). . Identity theft has been around for a number of years. The term identity theft was coined in 1964 however it does not mean to steal an identity but rather to impersonate another individual to commit fraud or deception (Vacca). Identity theft is not easily detectable by the individuals. Someone can steal or misappropriate personal information without the individual knowing then commit identity theft using the stolen...

Words: 1341 - Pages: 6

Free Essay

Idenitty Theft

...wonder how that can be? Well you might have been a victim of identity theft. What is identity theft you ask? It is a form of fraud or cheating of another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. According to the national association of the attorneys general, “Identity theft is one of the fastest growing crimes in the nation with an estimated 700,000 victims each year and after the victim discovers their theft, they spend an average of 808 dollars to clear up the discrepancies along with 175 hours approx. Restoring their reputation by means of notifying the credit bureaus, cancelling cards, and negotiating with creditors (2006.) Currently those numbers are now even higher at 1,495 dollars in expenses and 609 hours to clean up credit”. Identity theft happens all the time. This is partly caused because of who you trust and what you put on the internet. In the paragraphs to come we will get into the types and stages of identity theft, who it affects and how you can protect yourself. According to the NIJ (National Institute of Justice), there are seven broad types of identity theft and three stages. The Seven stages are exploiting weakness in specific technologies and information system, financial scams, a motive for other crimes, facilitating other crimes, avoiding arrest, repeat victimization (“classic” identity theft), and...

Words: 1118 - Pages: 5

Premium Essay

Identity Theft Research Paper

...PREVENTING IDENTITY THEFT Matthew Cao Edina High School Abstract Identity theft is a frequent occurrence in today’s age of technology. Identity theft is when someone impersonates another person without their permission and could be for any reason. It can happen through database breaches or simply losing important personal information, and can happen to anyone. However, there are preemptive measures and steps if identity is stolen. There is also legislation to minimize the risk and cost of identity theft. What is identity theft? In 2017, over 15 billion dollars were stolen from 13 million victims of identity theft. Identity theft is any case where someone pretends to be someone else for any reason, and can happen to anyone. The most common reason for someone to steal someone else’s identity...

Words: 1309 - Pages: 6

Premium Essay

Identity Theft

... Identity Theft Technology has become a big part of our lives, making it difficult for people to function outside of it. This is why we are so used to doing daily functions of life with technology. Even though this can make it very convenient for us by saving both time and money, there is a negative outcome in which, on average, 11.5 million people have been a victim of in the last eight years (appendix A). Identity theft, is when an individual steals certain information by hacking your computer, stealing your wallet, or even stealing your mail and uses it to his advantage by using your information to pretend he is another person to gain access to his/her financial status. Thus, in this essay, I will be explaining how this growing crime relates to the topics taught in class. Next, I’ll be going over the things I have learned while doing research on this specific topic. Lastly, I’ll use this information to show which direction this phenomenon is heading in the future. In this course, I’ve learned the basic components and functions/purpose that a personal computer needs as well as computer math and measurements or what I like to call it “computer code”. Computer codes as in 0’s and 1’s are the language of any computer. What makes computers so special is the speed in which the processor (along with other components) can solve complex codes and information in which it is being processed, whether it is a simple letter...

Words: 831 - Pages: 4

Premium Essay

How Identity Theft Affect the Culture of Our Society

...How Identity Theft Affect the Culture of our Society Sections I, II, III and IV Rodrekus Baskin DeVry University How Identity Fraud and Theft Impact the Culture of Our Society Section I Identity theft affects millions of Americans every day. Scam artists and hackers lay in wait for an unsuspecting person to get caught up their scheme through ignorance or naivety so they can take full advantage of their personal information to do as they desire with it. Problem is, it infiltrates and depreciates the integral infrastructure of our society which creates a cultural lapse through the declination of economic and cultural growth and double jeopardizes an already unstable system to the brink of its destruction. To understand how identity theft works or happens, one need to know and understand what identity theft is, the different forms of identity theft, cyber security and the impact on its victims, the methods used by identity thieves to obtain identifying information about their victims, and preventive solutions. How Identity Theft Affect the Culture of Our Society A single mother looking forward to advancing her financial situation comes across what appears to be the opportunity she has been waiting for. A real estate agent has provided her with the fortune of owning her own home and without skepticism of any impending dangers or foul play, even though he displayed what appeared to be proper credentials, she relinquished all of her personal data...

Words: 5785 - Pages: 24

Free Essay

Security Attack

...Information Systems Security By: Jessica Burnheimer, Kathleen Cline, Brian Weiss Outline for Group paper I. Introduction II. Issues concerning Information Systems Security A. Define IS security B. Why IS security is necessary? C. History and Back round of IS security D. Current issues concerning IS security 1.) Spamming 2.) Hacking 3.) Jamming 4.) Malicious software 5.) Sniffing 6.) Spoofing 7.) Identity Theft III. Solutions to contemporary IS security issues A. Solutions for “Spamming” B. Solutions for “Hacking” C. Solutions for “Jamming” D. Solutions for “Malicious Software” E. Solutions for “Sniffing” F. Solutions for “Spoofing” G. Solutions for “Identity Theft” IV. The Future of Information Systems Security A. New technologies and techniques effecting the future of Information Systems Security B. Tips and information regarding maintaining a Secure Information System C. How security issues will continue to shape Information Systems Management V. Conclusion Abstract The purpose of this paper is to discuss the pressing issues pertaining to Information Systems security. We will be covering the history of Information Systems Security, the current security issues, and why it is important to be knowledgeable in Information Systems security. Also, we will cover some solutions to the issues that...

Words: 4780 - Pages: 20

Free Essay

Technology Report on Online Banking

...there’s a strong possibility that your bank has a mobile version of their site making mobile banking easier than ever. How is internet/smart phone banking possible? The answer lies within the application and implementation of management information systems. These information systems contain components that work together to provide information. With the technology available today, banks have basically taken their information systems and expanded them to management information systems. Essentially using the data they already have but using it in a way to achieve business goals, such as the convenience of online banking. Before internet banking customers were forced to bank during the bank’s limited business hours, often time, banks opened after you were at work and would be closed by the time you got off work. Additionally, customers were forced to wait in excruciatingly long lines during peak business hours in order to handle their financial needs. Customers would have to endure all of that just to check the balances of their accounts. In order to better serve customers and their needs, internet banking was implemented. In the beginning, internet banking was extremely limited. Customers could check their balances and possibly do intra account transfers. Now, customers can do everything online from signing up for loans and mortgages to transferring money to setting up automatic bill bay. By implementing online banking , customers can do all of their financial transactions at home...

Words: 1517 - Pages: 7

Premium Essay

Media

...Streaming Media: The Tailor-Made Option In today’s world entertainment such as: Television, music, movies, etc. are all available at any time to be streamed through the internet. Streaming media means that data is instantly available where in the it would either have to be downloaded to a harddrive on come pre downloaded like in a CD or DVD. When we stream media we are allowing ourselves to pick and choose when, where, and what we want to spend our time watching or as we say streaming. Streaming media is now providing entertainment that is applicable to one’s individual routine making it tailor-made for us all to enjoy. This means that we, as consumers, have access to huge amounts of personalized data without any wait times or ever having to leave the house. As technology continues to grow and get stronger, we find ourselves purchasing equipment to make our tailor-made services of streaming even better. Between BlueRay DVD Players, Apple TV boxes, PlayStations, and many more. The majority of these providers can easily stream media straight from them. When streaming media is mentioned to most people the first thing that comes to mind is Netflix. Music is in there too but with Netflix one can watch TV shows with majority of the seasons, as well as the movies that Netflix has purchased. It can not get much better than that, even though a person will only have to pay a small monthly fee of $8.99 Netflix pays for itself after one or two movies which could cost up to twenty dollars...

Words: 1798 - Pages: 8

Free Essay

Identity Theft Report

...the centuries, the term ‘identity theft’ has meant many things. People have pretended to be other when committing crimes to avoid sentencing. Identities have been stolen in order to obtain certain medical care or drugs that would be unavailable otherwise. In this day and age, identity theft has become synonymous with finances. Thieves all over the world are using various methods to gain access to your money; and they’re more successful at it now than ever before. According to a 2013 Javelin report, 13.1 million people in the United States suffered financially because of identity fraud. According to multiple reports, that number is expected to rise in 2014 and beyond. As we get smarter about how financial identity theft is committed, criminals become smarter about gaining our sensitive information. When we became good about shredding old credits cards and bank statements, they used e-mail and phone schemes to coax us into giving our information to them. Companies invest millions of dollars into new technologies meant to keep criminals out of databases, and criminals simply bypass these obstacles with combinations of cutting-edge and archaic techniques. It’s a vicious cycle that seems to have no end. So how can we as consumers protect ourselves from these identity thieves? Consumers must take a more active role in their financial lives, especially when it comes to online transactions. People often rely on stores and banks to protect their identities online. This is a huge mistake...

Words: 4801 - Pages: 20

Premium Essay

Iwerdhrtes

...American University of Nigeria School of Information Technology and Communication INF 402 Group Work Group Members * Amina Ramallan A00011501 * Abdulrazak Gashash A00011462 * Ibraheem Babalola A00010481 * Victory O. Okurakpo A00013215 Abstract Although the application of Information and Communication Technology (ICT) in rural areas can be advantageous, there are also some limitations that may hinder the development of these areas. This study aims at identifying the problems that are caused by ICT in the application of electronic commerce and electronic business in rural Nigeria. The paper will point out these limitations and give solutions to each, thereby ensuring a smooth development process. The following limitations were found: System scalability and available customers, fraud and identity theft, delivery time and uncertainty, trust and customer satisfaction. Key words: Electronic commerce, Electronic business Methodology: The method used in this research is Internet research and personal observation. Solutions To The limitations Of E-commerce And E-business According to Wikipedia: “Electronic commerce consists of the buying and selling of products or services over electronic systems such as the Internet and other computer networks. It is more than just buying and selling products online. It also includes the entire online process of developing, marketing, selling, delivering, servicing and paying for products and service”. Wikipedia also...

Words: 2345 - Pages: 10

Premium Essay

Biometrics and the Future

...and the Future An identity is stolen every second; at least ten were stolen in the time it took to read this sentence (Chaflin, 2005). On a daily basis people all over the world are subject to navigating the ins and outs of life depending on an assortment of cards and passwords that confirms their identity. If they were to lose their bank card an ATM will refuse to give them money. Forget a simple password, and their own computer will not respond to them. By far the worse outcome is to allow their cards or passwords to fall into the wrong hands, and what was intended to be a security measure can become the tool of fraud or identity theft. The time for a more secure form of identification is upon us. A potential solution can be seen in the form of biometric identification. To understand the benefits of biometric identification one must understand the concept of biometrics. By combining the Greek words “bio”, which stands for “life”, and “metrics”, which stands for “measure”, a person can produce the term “biometrics” or “life measurements” (Woodward, 2003). Everyone has at least, once in their lives seen a movie where a villain or hero accesses a secret area by the use of a handprint or voice command. What was considered science fiction many years ago, today biometrics is being used in a variety of ways and the average person may not even be aware of it. To begin to grasp the concept and to truly understand biometrics at the most basic level, all one has to do is to picture someone...

Words: 2060 - Pages: 9

Premium Essay

Crisis

...privacy more than ever. With the advancement of technology privacy is the biggest concern of many users. The internet is used daily by billion of users nationwide. For that reason, the internet has challenged many business owners for the responsibility of making sure their sites are secured for users to make purchases or share information. Data is the information transferred between a site and a user. The information may be personal and sometimes require a login. Most sites are secured so users feel much more secured with giving information such as date of birth, address, and social security number at times. Data security is the information that is personal that people usually only feel comfortable sharing with a reliable source. This information is usually stored in a database that requires that a company is responsible for information saved or shared. Earlier times personal information was usually stored in a fireproof box possibly somewhere in the house or a safe location. However, with the advancement of technology many have shared information through different application downloads and even through the ability to make a purchase or access a site. The information is unique and many people don’t feel comfortable sharing unless it’s a reliable source. So often, it is common that people go through identity theft. In the earlier stages of Internet, most information was hacked through email spams. The hackers used to send information through either an attachment or link. Once the...

Words: 1910 - Pages: 8

Free Essay

Medical Id Theft

...Final Paper: Medical Identity Theft at Molina Healthcare, Inc. Barlahan, Andrei ID B00459963 Brandman University Define the Problem Medical Identity theft has become an increasing problem in the United States and continues to negatively impact millions of individuals. Medical identity theft usually occurs when individuals share their information with someone else, who in turn uses that information to receive medical services and fill for prescriptions. Other times, individuals lose their medical card or have their information stolen by a friend or close relative. According to a 2013 survey conducted by the Medical Identity Fraud Alliance (MIFA), medical identity fraud has increased nearly 20 percent compared to the year before in the U.S., affecting an estimated 1.84 victims and having a total out-of-pocket medical costs incurred by medical identity theft victims of $12.3 billion (DeGaspari, 2013). This is a serious problem, because not only are millions of dollars wasted, but patient medical records are compromised, which can result to misdiagnoses, wrong procedures and treatment, and wrong prescriptions. On a smaller scale, Molina Healthcare’s Special Investigation Unit (SIU) conduct investigations on referrals they receive indicating a Molina member may have been a victim of identity theft. A lot of times when the issue is actually identity theft, the SIU is only able to “band-aid” the problem and have found the issue resurfacing months later and Molina continuing...

Words: 3118 - Pages: 13