Free Essay

Identity Theft

In:

Submitted By hataproof10
Words 1341
Pages 6
How does Technology help Criminals Commit Identity Theft?

Identity theft is becoming one of the fastest growing criminal offenses in the United States. Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name (Kiesbye). It is important for one to know that identity theft is not just a financial crime. It is a serious crime that can cause havoc on finances, credit history, and reputation. Identity theft can go unnoticed and can take time, money, and patience to resolve. Technology is constantly evolving making identity theft an easier crime to commit (Kiesbye). There are several ways in which technology plays a major role in assisting criminals commit identity theft (Knight Ridder/Tribune Business News). Some ways include computer hacking, telephone bugging, and old-fashioned stealing. Identity theft has become a very serious business for criminals (Knight Ridder/Tribune Business News). . Identity theft has been around for a number of years. The term identity theft was coined in 1964 however it does not mean to steal an identity but rather to impersonate another individual to commit fraud or deception (Vacca). Identity theft is not easily detectable by the individuals. Someone can steal or misappropriate personal information without the individual knowing then commit identity theft using the stolen information. According to Siegel, most incidents of identity theft have been undetected by the victim. Identity theft may be used to assist or fund other crimes including illegal immigration, terrorism, phishing and espionage. The victim of identity theft can suffer majors loses if they are held responsible for the perpetrator’s actions (Siegel). According to Kiesbye, the identity thief can use different types of technology to transfer funds from your bank account or use your personal information for criminal activities. Technology play a major part in identity theft because the hackers can get into your personal computer or a major companies data base to steal names, passwords, and other information for their personal use (Identity Theft, Computer Fraud, and Security).
Criminals are performing virtual robberies using computer technology to steal a person’s identity (knight Ridder/Tribune Business News). These crimes are simple to commit and go unnoticed for a long period to time. Personal computers are filled with files containing personal information. Hacking computer networks, systems and databases to obtain personal data is a common way identity thieves commit their crimes. Criminals may advertise bogus job offers in order to gather resumes typically disclosing applicants' names, home and email addresses, telephone numbers and sometimes their banking details (Ledford). There are several different types of spyware used to obtain information from personal computer without the victim’s knowledge (Knight Ridder/Tribune Business News). Spyware can be installed on computers when files are downloaded or just surfing the internet. However, with today’s electronics, criminals have used technology to devise sneaky methods of theft in the form of cyber crimes. Computer hacking and email scams, phishing, are among the risks of sharing information on line. (Knight Ridder/Tribune Business News) Computer hackers are able to enter areas of the internet they are prohibited or can hack into another computers network. Over the years, social media has impacted identity theft greatly. The use of common-knowledge questioning schemes can offer account verification and compromise a person’s identity. “What's your mother's maiden name?" or "What was your first pet's name?" are typical questions that an identity thief can easily find out just by using social media. Stealing the identity of another person and using his or her credit to obtain services is not a new idea, but the internet has made it easier to get personal information. Telephones can be used as a great source of receiving and giving out personal information. Criminals will go to the any extent to either listen to conversations by eavesdropping or criminals may tap phone lines with some type of surveillance equipment. According to Vacca, there here have been reports of criminals calling the victim posing as a person from the bank requesting personal information. The bank names shows on the caller id unit because the criminal has set up their phone to show the bank’s name. Many phone users have a choice as to what they would like the person receiving the call to see when they are called. Cells phones can be used to obtain information to steal someone’s identity (Knights Ridder/ Tribune Business News). According to Ledford, criminals can use gadgets, like cell phones with picture video capabilities to capture credit card numbers, bank card numbers, or pieces of personal information to gain access to a victim’s identity. A criminal with a cell phone can take a picture of a victim or the victim’s license plate; get an address that would lead them to the victim’s residence which can lead to a mailbox full of personal information. Ledford also states that your own personal gadgets can be used against you such as a GPS system. In the GPS system located in your car will have your home address stored in it and will lead the criminal to your home. The criminal can break into your home and take whatever they want or need to steal your identity.
Credit or debit cards are key elements in identity fraud (Identity Theft, Computer Fraud, and Security). It can have far reaching effects, since the information on the card can be used to perpetrate other types of identity theft crimes. Skimming occurs when a device which reads credit card information from the magnetic strip on the back of the card records information from the card’s code numbers to another electronic storage device. This enables the criminal to make a copy of your card to make unauthorized purchases. The newest among identity thefts is copying the magnetic strips from the victim’s credit card on the back of another card with the criminal’s name. Criminals are using a machine hotels used to recode room key cards to copy the victim’s information onto a card with their name imprinted on the front. From using the signature on the back of a stolen credit card, to loaning a credit card to a friend or family member can cause someone to obtain what they need to open other credit cards or bank accounts in the victim’s name (Kahn, ). Skimming can occur through a number of different ways, whether it is a recording device set up on an ATM machine or a salesman who secretly swipes your card onto his personal digital card reader (Kiesbye). Skimming makes identity theft less challenging (Kiesbye).
Identity theft has become a major issue of concern. Identity theft is becoming one of the fastest growing criminal offenses in the United States. Anyone can be a possible victim of identity theft. It is imperative for one to know that identity theft is not just a financial crime (Vacca). It can control many aspects of one’s life (Vacca). Identity theft can go unnoticed and make an individual feel violated. Always be aware of surroundings and make sure sensitive information is handled and disposed appropriately. Be aware that there are people who would like to gain access to personal information. Do not reveal personal information over the internet or over the telephone unless it is a secured site or line (Ledford). By taking precautionary steps, it can reduce chances of having a stolen identity.

Works Cited

Identity Theft (2003). Identity Theft. Computer Fraud & Security, 2003(2), 5-7.
Identity Theft Is Fastest Growing Financial Crime in United States.. (2001, June 17). Knight Ridder/Tribune Business News , p. 5.
Kahn, C. M., & Roberds, W. (2008). Credit And Identity Theft. Journal of Monetary Economics, 55(2), 251-264.
Kiesbye, S. (2012). Identity theft. Detroit: Greenhaven Press ;.
Ledford, J. L. (2005). The rational guide to preventing identity theft. Rollinsford, NH: Rational Press.
Siegel, L. (2009). Criminology . Belmont, CA: Thomson Wadsworth.

Vacca, J. R. (2003). Identity theft. Upper Saddle River, NJ: Prentice Hall PTR.

Similar Documents

Free Essay

Identity Theft

...Identity Theft + Fraud= Identity Crime 20 December 2007 There is a thief that lurks around us everyday; this thief can attack in brad day light or in the darkest hour, and just about anywhere you may find yourself. This thief has the power to act in your name, make unlimited purchases, open up credit accounts and ruin your good name and credit all in the matter of seconds; if you are vulnerable enough, you might become his next victim. In many cases all he needs is your name and a social security number, and he has enough information to make you his next victim; if you don’t believe me then ask the millions of Americans that became victim’s, or just ask me. The thief that I am talking about is identity theft. Identity theft is a crime that is affecting many Americans, the costs are well in the millions every year, but with a little bit of knowledge and adaptive common practices, you can help fight back and minimize your chances of becoming the next victim of Identity theft. Identity theft is as predictable as a giant storm; you really don’t know what the damage will be until it passes and many victims don’t even see it coming until its already too late. So what is identity theft? According to the webpage article “about identity theft,” the Federal Trade Commission (FTC) (2007) writes that “identity theft occurs when someone uses your personal identifying information, like your name, SSN… without your permission to commit fraud or other crimes.” (para 1) All it takes...

Words: 3405 - Pages: 14

Free Essay

Identity Theft

...Rasmussen College | Identity Theft | The long term issue | | Caden Ross | 2/17/2013 | Author's Note: This research is for Professor Rob Paixao B234/BUL2241 Section 01 Business Law Course written by Caden Ross on 02/17/2013. | Jeffrey Gerald Jackson, otherwise known as Troy Lee Evans, was arrested on September 4,2012 for identity theft. Mr. Jackson used the identity of Troy Lee Evans to gain employment at Credit Concepts Inc. Mr. Jackson had worked at Credit Concepts Inc. under this false ID for six years. Through his job there he had access to important personal information that allowed him to obtain several loans using other people's identities. Police uncovered at least six separate incidents in which Mr. Jackson used other peoples information to obtain loans for himself. His bail was set at $45,000.00 and police are asking for anyone to come forward with any additional information about other crimes he may have committed. [ (Bella, 2012) ] Identity Theft is a heinous crime with long term repercussions for it victims. Mr. Jackson's case shows how much a person can do with identity theft. He not only used other people's information to obtain loans but he lived as someone else for six years and worked as this person. This means that for six years income was reported to the IRS and Social Security as Mr. Evans when it was not his income. Any bills that Mr. Jackson has taken out in Mr. Evans name like utilities or rent can show up on Mr. Evans credit if they...

Words: 976 - Pages: 4

Free Essay

Identity Theft

...Identity Theft: Fastest Growing Crime Tracy A. Baggett DeVry University Keller Graduate School of Management Identity Theft; Fastest Growing Crime Imagine waking up to news that you had accumulated hundreds of thousands in debt after someone used your identity for unauthorized purchases. This is exactly what happened to John Harrison, a Connecticut salesman. Jerry Phillips, the twenty year old who stole John Harrison’s identity went on a shopping spree that included purchases to Home Depot, JC Penny, Sears, Lowes and even bought two cars from Ford, a Kawasaki and a Harley. In just four months Jerry Phillips was able to accumulate $ 265,000 in purchases. Jerry Phillips was later arrested and imprisoned for three years. He even went as far as to apologize to John Harrison saying, “Sorry. You know, I wish I could make it up to you.” John Harrison felt that the nightmare was over with the criminal behind bars and even verbally acknowledging his regret over the crime. But despite all of this and a letter from the Justice Department confirming that John Harrison was a victim, he still found himself owing $140,000 to different creditors. How about waking up in the middle of the night realizing that federal agents just entered your home with guns pointed certainly qualifies as one of the most horrifying ordeals in anyone’s life. This is exactly what happened to Carlos Gomez, a UPS driver accused of being involved in a million dollar money laundering operation headed by a Wachovia...

Words: 3754 - Pages: 16

Free Essay

Identity Theft

...Alec Dohm Economics Period 1 Identity Theft is a vast problem that grows with the years and the tough economic times. Identity theft affects nearly 5% of the world’s adult population. In 26 % of all cases, the fraud victim knew the person who stole their identity, and most often it is a family member who rips you off. The best way to protect yourself is to buy and use a paper shredder and a safe. Also the only organization you are legally required to give your Social Security Number is your employer and financial institutions, like a bank. The economic effect of identity theft is more than what people may think. Check fraud alone rose to 5.5 billion dollars in 2003. Because that money was taken from others instead of made legally, the economy shows a loss. The annual cost of identity theft to businesses is 53 billion dollars because if somebody gets the I.D of a business owner then they can funnel money out of that person’s business as well as their personal bank accounts. The American Bankers Association reported 677 million dollars of losses in 2003, which is a slight decline from 2001. Being that the article is a few years old, I would say that those numbers have gone way up since then. If somebody steals your identity, it could affect you in countless ways. All of a sudden your credit card will start being declined for insufficient funds. When you go home and check your bank account online, your money will have magically disappeared. A person could also...

Words: 349 - Pages: 2

Free Essay

Identity Theft

...that can be used to distinguish or trace an individual’s identity, either alone or combined with other personal or identifying information that is linked or linkable to a specific individual (Personally Identifiable Information (PII), 2013). Some examples of PII would be names, social security numbers (full and truncated), driver’s license, identification cards, and medical records. According to the U.S. General Accounting Office, 87% of the U.S. population can be uniquely identified using only gender, date of birth, and zip code (Stringer, 2011). This is a pretty scary though seeing that this is all information that can be obtained from public sources. Protecting this information is essential to protecting yourself and your loved ones from having their identity compromised. Protecting your own information is the first step to ensuring that your information is safe. There are always going to be times that you have to divulge this information to certain types of companies but it’s about minimizing the people that have this information and securing it for yourself that can ultimately protect you. One of the most prominent threats that comes from the compromise of PII is identity theft. If someone who is looking to steal your identity gets a part of your PII then they would be able to use that information to not only collect more information about you, but they could potentially use that to successfully take your identity for themselves. This isn’t to say that just because your...

Words: 656 - Pages: 3

Free Essay

Identity Theft

...Abstract The Federal Trade Commission considers identity theft to be the fastest growing crime in the country. The Internet has become a hot zone for attracting identity theft thieves to steal personal information. Identity theft is divided into four basic areas – financial identity theft, criminal identity theft, identity cloning and business and commercial identity theft. Criminals obtain our personal information through methods such as using an insider, dumpster diving, computer hacking, war driving, phishing and pre-texting. The Department of Justice prosecutes identity theft under federal statutes. Congress passed the Identity Theft and Assumption Deterrence Act, Title 18 United States Code 1028 in 1998. One of the most noted identity theft cases was USA v. Cummings. The largest hacking and identity theft case ever prosecuted by the Department of Justice involved eleven people who stole more than forty million credit and debit card numbers. To severely curtail on identity theft, President Bush mandated Executive Order 13402 called the Identity Theft Task Force. Identity theft causes immeasurable damage to peoples’ names and reputations. Greater awareness and education will help us to combat identity theft. Identity Theft It’s a nightmare that can leave an unsuspecting person feeling violated and vulnerable. It doesn’t care who you are or where you live. Gender, race and age are totally irrelevant. In this modern technological age, it is a crime that can realistically...

Words: 2466 - Pages: 10

Premium Essay

Identity Theft

...IDENTITY THEFT NAME: INSTITUTION: IDENTITY THEFT Identity theft refers to a situation where a person uses information used to identify another person, such as their name, credit card number or social security number without their permission, in order to commit fraud or other crimes. In other words, it is stealing the identity of a certain person and pretending to be that person by assuming their identity, usually so as to access their resources or to obtain recognition and other profits in their name (Cheney, 2005). There are many forms of crime related to identity theft. Some identity thieves rent apartments or get credit cards or phone accounts in the names of their victims. These victims may not learn out about it for some period of time, until they notice some charges they did not make, or are contacted by a person or people claiming that they owe them. It may sometimes cost them hundreds or thousands of dollars and a lot of time while trying to undo the damage (Keith, 2005). Identity theft could ruin an otherwise spotless reputation. It could also lead to much suffering if the victims are held responsible for the thief’s actions. TYPES OF IDENTITY THEFT Identity theft can be divided into the following categories: • Criminal identity theft, that is, pretending to be another person when arrested for an offense • Child identity theft. • Financial identity theft, that is, using the identity of another...

Words: 1923 - Pages: 8

Premium Essay

Identity Theft

...Identity Theft James Middleton AIU Online   Abstract In this paper we will discuss identity theft. What is identity theft, what are some of the more common ways that people have become victims to identity theft? We will discuss how the law has changed and what the law has accomplished. Also how the law now protects the victim.   Identity Theft What is identity theft; which is often referred to as identity fraud, which refers to all types id crime involving someone wrongfully obtain and uses another person’s personal data in some way that involves deception (findlaw.com, n.d.). By definition of the Identity Theft & Assumption Deterrence Act (ITAD) of 1998, specified that it is a federal crime to knowing transfer or use without lawful authority, a means of identification of another person with the intent to commit, or to aid or abed any unlawful activity that constitutes a violation of Federal law, or constitutes a felony under any applicable state or local law (OVC, 2010). If a person steals another person’s identity but does not cause any monetary damage has a crime been committed? I would have to say yes, based on the definition of the ITAD Act. You transfer or use another person’s identity with the intent to commit a crime and you are caught; yes it is a crime. The most common ways to commit identity theft, is either to listen to someone’s conversation while they are giving out a credit card number over the phone, by “dumpster diving” when they can obtain...

Words: 825 - Pages: 4

Free Essay

Identity Theft

...Identity Theft Identity theft is one of the fastest growing crimes in the United States. Every minute about nine people have their identity stolen. (Identity Theft and Identity Fraud, 2013). Identity theft can happen to anyone at any time. A consumer can protect themselves without having to purchase a protection program. Protection programs are available to help consumers protect their identity. An identity theft program isn’t the best protection against identity theft. There are a number of protection plan companies a consumer can choose from. Each company has their own plans to choose from and each have different rates. A consumer can review the ratings of each company also. When a consumer has a protection program there are some advantages. These programs review the client’s credit reports with credit monitoring. When a consumer purchases a protection program, fraud insurance is granted to the consumer. This insurance covers a few areas. The insurance will cover all legal services endured by the consumer, it covers all out-of-pocket services that the consumer pays out, and some of the companies offer a private investigator and assigns them to help with the claim. There are a number of disadvantages to having a protection program. These programs will not prevent identity theft. In order for a consumer to get a protection plan, they must pay a monthly/yearly fee for the program. If a consumer’s identity is stolen, the consumer will not be reimbursed for any money that has...

Words: 545 - Pages: 3

Premium Essay

Identity Theft

...Identity Theft I know three people who have been affected by identity theft in the past. They were forced to deal with the hassle of clearing and repairing their good names and financial reputations. According to my research, there was a new victim of identity theft in the U.S. every two seconds within the last year and over 9 million Americans reported that their identity had been stolen (Rogers, 2014). The primary complaint on the Federal Trade Commission’s list of top consumer complaints is identity theft (Trowbridge, 2014). This crime has gone from actions like rooting through a person’s trash and stealing their mail to confidence scams to gain access to personal information. With the possibilities that are provided by the internet criminals are capable of gaining access to and stealing personal information from a larger pool of prospective victims from all across the world. What is Identity Theft? According to Merriam-Webster, identity theft is “the illegal use of someone else's personal information (as a Social Security number) especially in order to obtain money or credit” (Merriam-Webster, 2014). Some of the items that a person would utilize to steal another person’s identity are Social Security Numbers, driver's license numbers or their date of birth just to name a few of the pieces of information. The thief can take this information and use it to obtain things such as credit cards, bank accounts, auto loans, and home mortgages in the victim’s name. Some...

Words: 1134 - Pages: 5

Free Essay

Identity Theft

...Dangers of Identity Theft Sharae Ernst IFSM 201 – Summer 2012 8/3/2012 “Identity theft occurs when someone uses your personally identifying information (PII), like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.” (Fighting Back Against Identity Theft: Federal Trade Commission). According to the Federal Trade Commission, identity theft complaints have decreased since year 2008 (314,521 to 250,854). It is estimated by the FTC that as many as 9 million Americans have their identities stolen each year. As information technology progresses along with society, there is always an increased risk of having one’s identity stolen. “Identity theft was the number one complaint category in the CSN for calendar year 2010 with 19% of the overall complaints, followed by Debt Collection (11%); Internet Services (5%); Prizes, Sweepstakes and Lotteries (5%); Shop-at-Home and Catalog Sales (4%); Imposter Scams (4%); Internet Auction (4%); Foreign Money Offers and Counterfeit Check Scams (3%); Telephone and Mobile Services (3%); and Credit Cards (2%).” (Consumer Sentinel Network Data Book: For January - December 2010, 2011). Although the numbers have slightly decreased, overall, identity theft is on the rise. “According to a February 2012 Javelin Study, identity theft rose 13% from 2010 to 2011.  More than 11.6 million adults became a victim of identity theft in the United States during 2011.” (Coping with Identity Theft: Reducing...

Words: 1352 - Pages: 6

Free Essay

Identity Theft

...Identity theft Identity theft is a major issue in our society today. It’s criminal and deceitful. It comes in all shapes and sizes, and outcomes are devastating. I currently work at a bank and dealing with identity theft occurs in my day to day tasks. I constantly have to watch all the checks that I cash and deposit to make sure that they are ending up where they are meant to. Also, forgery and duplicating checks is a big issue. We have to make sure the signatures match, as well as verify some other things on people’s accounts. Identity theft could be reduced if all the available tools were used. It is important to everyone, that this issue is addressed in its entirety. We, as a bank offered some identity theft block, free to our customers up to a year. This was a program where people watched your credit report and if anything suspicious came up they alerted you right away. I think that this was a good start to protecting yourself. But the banking industry should have some broader solutions for helping with identity theft. There are some new computer systems that I’m aware of. These new technologies will be able to help prevent fraud. Pictures of people’s IDs are coming up on the screens at banks so that we don’t have to ask for IDs. This makes it a lot easier to do our jobs as tellers. Identity theft has grown a lot since the use of the internet has become so much more common. Before, all someone had to do was go dumpster diving or look over someone’s shoulder. With the...

Words: 703 - Pages: 3

Free Essay

Identity Theft Report

...the centuries, the term ‘identity theft’ has meant many things. People have pretended to be other when committing crimes to avoid sentencing. Identities have been stolen in order to obtain certain medical care or drugs that would be unavailable otherwise. In this day and age, identity theft has become synonymous with finances. Thieves all over the world are using various methods to gain access to your money; and they’re more successful at it now than ever before. According to a 2013 Javelin report, 13.1 million people in the United States suffered financially because of identity fraud. According to multiple reports, that number is expected to rise in 2014 and beyond. As we get smarter about how financial identity theft is committed, criminals become smarter about gaining our sensitive information. When we became good about shredding old credits cards and bank statements, they used e-mail and phone schemes to coax us into giving our information to them. Companies invest millions of dollars into new technologies meant to keep criminals out of databases, and criminals simply bypass these obstacles with combinations of cutting-edge and archaic techniques. It’s a vicious cycle that seems to have no end. So how can we as consumers protect ourselves from these identity thieves? Consumers must take a more active role in their financial lives, especially when it comes to online transactions. People often rely on stores and banks to protect their identities online. This is a huge mistake...

Words: 4801 - Pages: 20

Premium Essay

Identity Theft

...head: IDENTITY THEFT: IN MORE WAYS THAN ONE Identity Theft: In More Ways than One Justin S. Evangelist CMRJ 306 D002 Criminal Investigation American Military University Identity Theft: In More Ways than One We have all watched the news; we have all heard the stories. It’s on commercials and television shows. Identity theft is sweeping across the nation and it something we should all take very seriously. Identity theft is a form of fraud or taking away someone else’s identity in order to gain something, usually financial means (Swanson, Chamelin, Territo & Taylor, 2009). The Federal Trade Commission estimates that as many as nine million Americans have their identity stole each year, resulting in over 50 billion dollars of financial loss (Mercuri, 2006). There are several different forms of identity fraud, several which not everyone has heard of. The three main types of identity theft consist of criminal identity theft, medical identity theft and child identity theft. Criminal identity theft occurs when a victim’s name, address, and other personal details are given to law enforcement officials during the commission of a crime. The victim is then mistakenly arrested (Mercuri, 2006). Often times, the imposter has obtained some sort of tangible, personal information from the victim, usually a driver’s license. Once the name of an innocent identity theft victim is assigned to the criminal act of the true perpetrator, it can be very difficult for the identity theft...

Words: 998 - Pages: 4

Premium Essay

Identity Theft

...Aug 26, 2013 Research Paper: Identity Theft Identity theft, also known as ID theft is a crime in which a criminal obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to pretend to be someone else. The information can be used to obtain credit, merchandise, and services using the victims’ name. Identity theft can also provide a thief with false credentials for immigration or other applications. One of the biggest problems with identity theft is that very often the crimes committed by the identity theft expert are often credited to the victim. A thief could take out a mortgage in your name or commit a crime and pretend to be you when caught. Thieves can even use your personal information to apply for a job or use your medical insurance. Identity theft has become one of the world’s leading crimes in the world. Identity theft drastically increased in the year 2000 by nearly 52%, occurring every half second all across the world. There are two primary types of identity theft: ~Account takeover ~True name theft Account takeover identity theft refers to the type of situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to run up current credit lines, by changing your address so that you never see the credit card bills that the thief constantly runs up. True name identity theft means that the thief uses personal...

Words: 485 - Pages: 2