Free Essay

Id Theft

In:

Submitted By dadu
Words 2899
Pages 12
IDENTITY THEFT
Fraud- intentional deception made for personal gain or to damage another individual. Fraud is a crime and a civil law violation. (1) Fraud affects individuals, businesses and the economy as a whole. Every year millions of dollars are lost due to activities of scammers using countless illegal techniques to achieve their goals. As hard as people work to make money and as difficult as it is to save it, the last thing they want to do is lose any of it through fraud. Financial fraud is the number one consumer complaint, and the biggest danger all the people face nowadays is identity theft, one of the most pervasive and insidious crimes. Identity theft occurs when someone assumes some or all of your identity to engage in criminal behavior.
The first case of identity theft is described in the Bible when Jacob covered his hands and neck with goat skin in order to trick his father into giving him a blessing of a firstborn, in order to acquire all the property and livestock his father owned. In early American history, identity theft was focused on voters’ registration and ballot stuffing. Then in1930’s, brought 21’st amendment to the United States Constitution brought the new law that repealed prohibition. Alcohol was legal again, but drinking age was determined by individual state, until 1984 when US Congress passed the National Minimum Drinking Age Act. Between these times worst crime committed was underage drinking using fake ID. Usage of assumed name and identification to commit serious fraud was still rarity. (2) Rapid increase of personal and financial information along with new technologies gave new live to an old crime and ID theft is now being called the crime of the 21’st century.
Identity theft can disrupt lives or even put people in jail for the crimes they never committed; in other words, the victim of identity theft can suffer adverse consequences if held accountable for the perpetrators actions. Identity thieves take personal information such as: full name, birth date, and full address, mother’s maiden name, SIN number, driver’s license number, passport number, signature and credit or debit card numbers without the victims’ permission. Stolen or reproduced information can be used to: access bank accounts or open new ones; transfer money from bank accounts; apply for loans, credit cards or other goods or services; make purchases; hide criminal activities; obtain passport or receive government benefits; and finally facilitate organized crime and terrorist activities. (3) There are cases when identity thieves may try to even sell your property and embezzle the money. Techniques of stealing someone’s identity range from unsophisticated such as: pickpocketing, dumpster diving, obituaries or mail theft to more elaborate schemes. Today’s technology, low cost availability of computers, mainly Internet, made the work of ID thieves extremely easy and facilitates those elaborate ones:
Skimming – swiping debit or credit cards through skimming machine that records the magnetic strip of the cars; requires involvement of a person that will also record the PIN number, usually dishonest clerk or waiter at the restaurant.
Spoofing – using e-mails pretending to be legitimate individual or business to deceive victim to take specific actions.
Phishing – commonly done through the Internet by sending out many e-mails to as many individuals as possible, pretending to be legitimate business, asking to go on-line and update personal information, change passwords; or e-mail proposals to individuals to assist in moving money out of a poor country. (Refer to Exhibit1 Sample of phishing e-mail.)
Hacking computer networks, systems and databases with no or poor security to obtain personal data, often in large quantities.
Advertising bogus job offers in order to accumulate applications typically disclosing names, home or e-mail addresses, and telephone numbers.
Browsing social networks in search for personal details, published by the users – people help thieves providing information without fear and imagination what can happen later. Facebook is a very good example of how to get as many information as we want to without breaking the law. (4)
The list of techniques for obtaining and exploiting personal information for identity theft is much longer. ID theft is one of the fastest growing crimes in North America and has already hit 1 in 6 Canadians. With downturn in economy, the situation is only getting worse and not only criminal but average people too, are now more desperate than ever. There are several types of identity theft:
- Financial identity theft – using another’s identity to obtain credit, goods and services
- Insurance identity theft – “new” type of ID theft; it presents specific problems for the victim that must be addressed independently from other types; tends to be a concern when being a victim of medical identity theft;
- Medical identity theft – using someone’s name, insurance information to obtain medical services or goods;
- Criminal identity theft - posing as another person when apprehended for a crime;
- Child identity theft – minor’s SIN number is used by another person, very often family member, for the imposter’s personal gain;
- Synthetic identity theft – taking parts of information from many victims and combining it into one fake ID of a person that doesn’t exist. (5)
There is no guaranteed method to know that somebody is exposed to fraud. Indicators or “red flags” listed below are signs that something is not correct and it’s time to take some actions.
- Monthly credit card statement doesn’t come in mail;
- Unfamiliar items on bank statements;
- Telephone calls or letters stating you have been approved or denied by creditor that you never applied to;
- Credit card statement with correct address but different name on it;
- No recollection of applying for credit card and receiving statement;
- Creditor or collection agency contacting you about unknown debt. (6)
Need is the mother of all inventions, and it actually works both ways. As new ways of prevention, detection and protection against identity theft are devised, the criminals are inventing new ways of stealing. Prevention is the best way to deal with this type of crime. Considering most of the people use various identifications and most of them use banking system, have driver’s permit or have a passport at least let’s educate ourselves and use imagination what may happen and what to expect after our identity is compromised. Ruined credit rating, financial loss, inability to secure future credit, sense of violation, stress and emotional hardship should be more than enough to think twice before releasing any detail of personal information to anyone. Take precautions:
Shred preapproved credit cards, cancelled cheques, bank statements and other documents before putting them into trash.
Avoid offers “too good to be true”.
Shield your hand entering PIN number, do not carry PIN number with you and don’t share it with anyone.
Be particularly wary of unsolicited e-mails, telephone calls or mail attempting to extract personal or financial details from you.
Familiarize yourself with billing cycles for your credit cards. Follow up with creditors if your bills don’t arrive on time.
Do not carry all your identity documents in your wallet or purse.
When changing address make sure to notify the post office and relevant institutions. (7)
It doesn’t cost anything to be prepared and adopt preventive habits but it can cost quite a lot being victim. In Canada, the Phone Busters national call centre received 7,629 identity theft complaints by Canadians in 2002. The total reported losses were more than 8.5 million dollars. In the first quarter of 2003, there were 2,250 complaints, which reported losses of more than 5.3 million dollars. In 2011 there were 17,002 victims and total reported loss was $13.2 million dollars. Also, two major credit bureaus, Equifax, and Trans Union say that they receive approximately 1400 -1800 Canadian identification thefts per month, the majority are from Ontario. (8) The U.S. Secret Service estimated in 1997 that of the 9,455 cases investigated, consumers lost more than $745 million due to identity theft. The 2003 FTC survey found that the total annual cost of identity theft to its victims was about $5 billion. (9) According to - 2006 ID Theft Survey Report, median value of goods and services obtained by thieves for new account and other frauds is $1350; for all categories of ID theft it was $500. When it comes to the cost of ID theft to victims, more than 50% incurred no out of pocket (lost wages, legal fees, fraudulent debts, postage, notarization) expenses, some victims admitted substantial out of pocket expenses, 10% reported $1200,- or more. (10)
By taking steps to better safeguard personal information, chances of becoming victim of ID theft are significantly reduced. It is impossible to escape the risk and in case of being targeted there are some actions that should be taken. Depending on circumstances victim might need to:
1. Cancel credit cards and get the new ones, ask credit company if any accounts have been tampered with or opened fraudulently in your name;
2. Advice the bank. Close compromised accounts and open new ones.
3. Create PIN new numbers.
4. Keep track of the steps that have been taken and expenses incurred to clear and re-establish credit rating.
5. Contact the two national credit bureaus and place fraud alert on your credit reports. The same time order copies of your credit reports.
6. Avoid “credit-repair” companies.
7. Report the incident to the police and also contact PhoneBusters – Canadian anti-fraud call center. (11)
It is worth to mention that prevention of identity theft is a shared responsibility between individuals and entities that have in their possession private and personal details provided by customers or patients. Privacy legislation requires putting systems in place to ensure individuals, clients or patients’ information is safe, secure, accurate, gathered with consent and not used beyond the stated purpose. The federal Personal Information Protection and Electronic Documents Act (PIPEDA) and equivalent legislation in British Columbia, Alberta and Quebec, apply to businesses collecting personal information and give individuals the right to see if everything is in order and the power to ask for corrections. The 10 Privacy Principles of PIPEDA form a significant portion of Canadian privacy legislation. These 10 privacy principles outline responsibilities that organizations subject to PIPEDA must follow. These principles are: 1. Accountability, 2. Identifying Purposes, 3. Consent, 4. Limiting Collection, 5. Limiting Use, Disclosure, and Retention, 6. Accuracy, 7. Safeguards,
8. Openness, 9. Individual Access, 10. Challenging Compliance (12)
In October of 2009, Bill – S4 was granted Royal Assent and as of January 8th, 2010 mentioned Bill became the law, making it illegal to possess another person’s identity information for criminal purposes. (13) The new law provides police and justice officials with vital new tools and powers to help better fight identity theft. Bill S-4 creates three new "core" identity theft offences targeting the early stages of identity-related crime, all subject to 5-year maximum prison sentences:
•Obtaining and possessing identity information with the intent to use the information deceptively, dishonestly or fraudulently in the commission of a crime;
•Trafficking in identity information, an offence that targets those who transfer or sell information to another person with knowledge of or recklessness as to the possible criminal use of the information;
•Unlawfully possessing or trafficking in government-issued identity documents that contain information of another person.
Additional amendments include:
•Complementing existing mail offences with two new offences of fraudulently redirecting or causing redirection of a person's mail and possessing a counterfeit Canada Post mail key;
•Creating complementary forgery offences such as trafficking in forged documents, or possessing forged documents with the intent to use them; and
•Clarifying that certain acts in relation to PIN numbers and the possession of skimming devices (used to extract and copy debit card information) are prohibited. It also grants courts the power to order ID thieves compensate victims for money stolen and reasonable expenses incurred to re-establish his or her identity. (14)
Canada's first support center to provide resources for victims of identity theft has opened in Vancouver. The Canadian Identity Theft Support Centre quietly opened an office downtown at the end of March this year. A public launch was planned for May, but organizers say the center has already received about a dozen calls to its toll-free number. As mentioned before the issue of identity theft is one of the fastest growing issues in Canada and victims across the country have nowhere to go once they become a victim. The Center assists individuals from start to end on how to regain control of their identity. A charitable organization primarily funded by the federal Justice Department, the support center is modeled on a similar U.S. organization based in San Diego, California. (15)
As a conclusion I’d like to refer to J. Stoddart Privacy Commissioner of Canada, identity theft is obviously a complex problem. There is no simple or single solution to it because ID theft has many root causes. It is clear that fighting ID theft will require actions on many fronts. (16) Government already made first important step when the new law came into force, now both organizations and individuals must do their part. There is still space and need for comprehensive framework that would address issues with regards to ID theft such as: stronger data protection rules, consumer protection plans or the most important in my opinion public education.
Exibit1 Sample of phishing e-mail received on my personal inbox
I need your urgent responds. My Dearest one, Hi, my name is Princess Alimah 25 years old originated from Sudan. I decide to contact you after my prayers; I really want to have a good relationship with you. My Late father Dr. J. Yak was the former Minister for SPLA Affairs and Special Adviser to President Saliva Kiir of South Sudan for Decentralization. My father Dr. J. Yak and my mother including other top Military officers and top government officials had been on board when the plane crashed on Friday May 02, 2008 due to evil act of the group rebels. Before his sudden death, he told me as his only daughter that he deposited two trunk boxes worth of 1.5 M EURO as family treasury Gold & Jewelries currently in a courier service security company-Burkina Faso as a consignment registered pieces of art works / gold , with my name as the next of kin. After his burial I ravelled down to Burkina Faso to clear the trunk boxes so that I can start a better life and take care of myself. On my arrival, the director of the security company whom I met in person told me that my late father's instruction to the company was that the boxes will be release to me only when I am married or present a trustee who will help me to uplift the boxes for any kind of investment overseas. That is why I said that, I need your urgent responds. I will be pleased to work with you as trusted person and see that the boxes are release to you from the deposited security company. I have the deposited certificate which the security company issued to my late father as the depositor of the said trunk boxes. Once the funds have been transferred to your nominated Bank account we shall then share it in the ratio of 55% for me, 45% for you. Should you be interested Please treat this matter with utmost Confidentiality and send me the following? Full names ; Age; Private phone number; Residential address; Your international passport; phone / ID CAR; Your Nationality
Thnx. Princess Alimah Yak NDEKE. Reply to ; princessramah@yahoo.fr
References: 1. http://en.wikipedia.org/w/index.php?title=Fraud&printable=yes
2. http://idtheft.about.com/od/identitytheft101/a/A-Brief-History-Of-Identity-Theft.htn?p=1
3. http://www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol-eng.htm
4. http://en.wikipedia.org/w/index.php?title=Identity_theft&printable=yes
5. http://idtheft.about.com/od/Basics/a/The-8-Types-Of_Identity_theft.htm?p=1
6. http://www.phonebusters.com/english/recognizeit_identitythe.html
7. http://priv.gc.ca/resource/fs-fi/02_05_d_10-_e.asp http://www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol-eng.htm http://financialplan.about.com/cs/fraud/a/ScamSchemes.htm http://phonebusters.com/english.stopit-thetips.htm 8. http://www.docu-shred.ca/Identity_Theft_Facts.pdf
Canadian Anti-Fraud Centre Annual Statistical Report 2011
9. http://popcenter.org/problems.identity_theft/1
10. 2006 Identity Theft Survey Report
11. http://www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol-eng.htm http://www.phonebusters.com/english/recognizeit_identitythe.html http://priv.gc.ca/resource/fs-fi/02_05_d_10-_e.asp
9. http://www.priv.gc.ca/information/pub/guide_idt_e.asp
12. http://www.privacysense.net/10-privacy-principles-of-pipeda/ http://www.privacysense.net/pipeda/ 13. http://www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol-eng.htm
12. http://www.justice.gc.ca/eng/news-nouv/nr-co/2010/doc-32471.html http://www.rcmp-grc.gc.ca/scams-fraudes/id-theft-vol-eng.htm 14. http://www.cbc.ca/news/canada/british-columbia/story/2012/04/12/bc-id-theft-support-centre.html
15. Remarks at the Privacy and Identity Theft conference organized by Freedom and Privacy Association, Vancouver, B.C. November 24, 2008; Addressed by Jennifer Stoddart Privacy Commissioner of Canada - Maintaining Trust in Commerce and Communication: What Will it Take?

Similar Documents

Free Essay

Id Theft

...How to Prevent, Perceive, and Protect Yourself from Identity Theft How to Prevent, Perceive, and Protect Yourself from Identity Theft Abstract What is Identity Theft? And the answer is that identity theft is a crime. Identity theft and identity fraud is the terminology used to refer to all types of crime which someone illegally obtains and uses another person's personal information in some way that involves fraud or deception, usually for economic gain. I will explain why you need to take precautions to prevent yourself from being a victim of identity theft. Unlike your fingerprints, which are unique to you and cannot be given to someone else for their use, but your personal data especially your Social Security number, your bank account or credit card number, and other valuable identifying data can be utilized, if they fall into the wrong hands, to personally profit at your expense. All over the country, for example, many people have reported that unauthorized persons have taken funds out of their bank or financial accounts, or, in the worst cases, taken over their identities altogether, running up enormous debts and committing crimes while using their victims's names. In many cases, a victim's losses may consist of not only out-of-pocket financial losses, but destroying your credit history, substantial financial costs associated with trying to restore their name and reputation in the community which they live, and correcting erroneous information the criminal is...

Words: 1892 - Pages: 8

Free Essay

Medical Id Theft

...Final Paper: Medical Identity Theft at Molina Healthcare, Inc. Barlahan, Andrei ID B00459963 Brandman University Define the Problem Medical Identity theft has become an increasing problem in the United States and continues to negatively impact millions of individuals. Medical identity theft usually occurs when individuals share their information with someone else, who in turn uses that information to receive medical services and fill for prescriptions. Other times, individuals lose their medical card or have their information stolen by a friend or close relative. According to a 2013 survey conducted by the Medical Identity Fraud Alliance (MIFA), medical identity fraud has increased nearly 20 percent compared to the year before in the U.S., affecting an estimated 1.84 victims and having a total out-of-pocket medical costs incurred by medical identity theft victims of $12.3 billion (DeGaspari, 2013). This is a serious problem, because not only are millions of dollars wasted, but patient medical records are compromised, which can result to misdiagnoses, wrong procedures and treatment, and wrong prescriptions. On a smaller scale, Molina Healthcare’s Special Investigation Unit (SIU) conduct investigations on referrals they receive indicating a Molina member may have been a victim of identity theft. A lot of times when the issue is actually identity theft, the SIU is only able to “band-aid” the problem and have found the issue resurfacing months later and Molina continuing...

Words: 3118 - Pages: 13

Free Essay

Food

...It’s the 21st of November and you are at the home stadium of Real Madrid for the el clasico. Fans cheer and sing the club anthem in this sense of pride and commitment to their respective teams. You begin to feel this surge of patriotism and worth of your very existence at this moment; what could possibly go wrong? A rampage of opposing fans? Projected Molotov cocktails? A potential black-eye? As crazy as it may sound, those were the potential outcomes of what was usually expected during the 1950s at a casual game of football, not by the fans, but by the infamous football hooligans, who are by far and large known as, ‘overzealous supporters’ (Wikipedia). The reasons for such shocking trial of events were mainly due to racism, sense of Identity with the team and, as petty as this may sound; issues with ticketing. Racism, being the ugly mark of human society, is still prevalent in this modern age. It doesn’t necessarily have to involve an occasional Rosa being forced to the back of the bus; but more of verbal slurs which lead to public display of violence. On the 12th of October, 2015, The Notorious fans of Israel’s Beitar Jerusalem football club are well known for shouting anti-arab slogans and throwing stones at Palastanian fans. Although there have been laws implemented to protect Palestanian fans and Arab players, atleast 25 Palestenian had been killed by the Israeli forces. As mentioned earlier, verbal offence towards a specific ethnicity especially when clubs are involved...

Words: 2011 - Pages: 9

Premium Essay

Melissa's Use Of Rationalization

...Melissa is a nearly 30 year old, Caucasian woman who recently experienced divorce five months ago with her husband of three and a half years of marriage. She lives with her daughter, and is supporting their new lifestyle through waitressing, which she has done for approximately give years. Melissa informs Dr. Wachtel that she is encountering some obstacles in making changes to her current career path. She wants to quit her waitressing job, and pursue an experience more related to her school counseling degrees. She voices that her main concern that brought her to seek help in therapy is making the correct and informed choice about her career change because she worries about financial stability given that she is a single mother raising her daughter on her own. Though Melissa is quite explicit about her concerns about her career choices and the issues she hopes to resolve in therapy, it seems as if there are other underlying issues that are in her unconscious. As the session progressed, it seemed as if Melissa also wanted to address how her family dynamics with her immediate family is affecting her decisions. There are moments where it felt like she is looking for justification and support for the events that took place in her life and her decisions that may have led to those events. This is not just about her career change (or lack thereof), but other sudden changes like her divorce that resulted in a new lifestyle that Melissa does not necessarily want to shift for the time being...

Words: 1663 - Pages: 7

Premium Essay

Harrison Bergeron Literary Analysis

...story through a psychoanalytic lens, a person uses the work of Sigmund Freud’s theories of psychology to interpret the text they are reading. Through the psychoanalytic lens, the reader is able to compare the characters of Harrison Bergeron to parts of a person’s personality, for example, Harrison Bergeron can be compared to the Id, George can be compared to the ego, and the Handicapper general can be compared to the Superego. The Id runs on the pleasure principle whose goal is to increase pleasure and decrease pain, like the Id, Harrison’s goal is to break free of the handicaps that he is forced to wear in order to increase the quality of his life. The Id is the basic storehouse for human’s basic needs and drives. Harrison contains such an incredibly strong drive that it causes him to make irrational decisions. One can say that Harrison even suffers from cathexis because of his obsession with rebellion. Similar to the Id, Harrison does not learn from its mistakes. When Harrison...

Words: 957 - Pages: 4

Free Essay

English

...Essay on hooliganism In this essay I will discuss why hooliganism exist, what makes a person become a hooligan and what characterizes a hooligan and hooliganism as a whole? They hunt in packs like wolves, fueled by drugs, hooked on violence. Some are as young as 15. They make a plan to arrange showdowns against other rival ''firms'' at agreed locations. This is a quotation from the French documentary ''Fucking Hooligans''. But why does hooliganism exist in general, there are a lot of reason to it, but the main ones are mentioned. In the text ''Among the Thugs'' and the film ''Fucking hooligans'' it expresses the lifestyle of a group of lads who have a lot of things in common. They drink a lot, smoke a lot and foremost they love to fight, the typical formula for a hooligan. They're the most dangerous. They're the ones who start most of the fights.(p.4-l.12-13). The hooligan culture is not just a culture for some people but a bond between brothers, or in other words it is another family for them. There are plenty of reasons why ''someone'' becomes a hooligan. People normally become involved through two ways, either through friends and family or their choice of a new lifestyle. The main reason why people decide to become a hooligan is that it is just fun when it kick's off. It's an adrenaline thing, you cannot get that kind of buzz through anything else. But half the time it's not even about fighting, it is about being around your mates, having a laugh on a match day and...

Words: 913 - Pages: 4

Premium Essay

Stillness In Tim Winton's Alter Ego

...Powerful moments of stillness can lead us to a true understanding of self, but to understand who we are we must look at what makes us unique as an individual human being. In Gwen Harwood’s “Alter Ego” she is at peace with the world and lives and breathes music. Her views are often overlooked in modern day society, but she remains true to the fact that she believes that we never really have a full understanding of our identity. Opposing this in Tim Winton’s “Land’s Edge” his true self resides in the ocean, a place where he feels most at home, his Australian coastal background, his main influence of his sense of identity. Both composers examine the moments of stillness in our lives and how it is only then that we truly get a glimpse or a sense of who we are. In “Alter ego” Harwood describes the alter ego as a part of herself that has intimate and complete knowledge of her yet acknowledges that her conscious mind does not have a complete and full understanding of this ‘other self’. Harwood uses the rhyming of the first, third and fourth line in the first stanza to add a flowing effect or enjambment, this flowing effect also reflects Harwood’s love of music and piano playing as she is an accomplished pianist. Music is an integral part of Harwood’s ‘other self’ and is used as a motif in Alter ego. Throughout the poem she portrays her two selves as the spiritual and the physical parts of herself, she also uses first person language to create a voice for the physical persona of herself...

Words: 728 - Pages: 3

Premium Essay

Felony Crimes

...a less serious crime. Most states and the federal government classify a crime that's punishable by less than one year in prison as a misdemeanor. Some states consider a misdemeanor as any crime that's punishable only by fine or a small length of time in jail. If a misdemeanor is considered a very minor offense, such as jaywalking, the crime may be classified as a petty offense. There's a wide variety of crimes that are considered misdemeanors in most states. Some common misdemeanors include: * Public intoxication * Trespassing * Speeding * Prostitution * Vandalism * Use of a false ID Whether a crime is considered a felony or a misdemeanor will many times depend on any aggravating factors. These are factors that make a crime more serious. For example, the theft of a very inexpensive item from a store may be considered a misdemeanor. However, the theft of multiple items that are worth thousands of dollars may be considered a felony. Crimes against the Person A crime against the person is a crime that's committed using direct harm or force against the victim. Usually the most serious crimes, such as murder or rape, are crimes against the person. These crimes are many times felonies because of the seriousness of harming another person. However, some lower level crimes, such as...

Words: 555 - Pages: 3

Premium Essay

Est1

...EST1 Task 1 Kara Kinikini Student ID: 265037 Business Management Many believe that business entities should have an ethical duty to be socially responsible, to work towards increasing its positive effects on society while decreasing its negative effects. Many organizations look for opportunities to be socially responsible while also creating shareholder wealth. Company Q is a small local grocery store chain located in a major metropolitan area. They have recently closed a couple of stores in higher-crime-rate areas of the city, reportedly because these two stores were consistently losing money. After years of requests from customers, all of their stores have started offering a very limited amount of health-conscience and organic products—all of which were high margin items. When asked by the area’s food bank for donation of day-old products, management declined deciding instead to throw the food away, citing worries over lost revenues due to possible fraud and stealing by employees who might say they are donating the food. Company Q's current decision to close stores in "Higher-crime-rate" areas of the city, was not a good exapmle of the social responsibility. The concept of social responsiility encompasses the actions, activities and attitudes of business and the impact a business has on its community. Closing those stores did not leave a possibive impact on the community, and other actions should have been taken to miminize negative impacts the community may have...

Words: 702 - Pages: 3

Premium Essay

Intellectual Property in Automobile Industry

...Intellectual Property Theft in the Automotive Industry Scope, Trends, and Mitigating Strategies Table of Contents Introduction………………………………………………………………………………..3 Scope of Intellectual Property Theft………………………………………………………3 Intellectual Property Theft and China……………………………………………………..4 Intellectual Property Theft in the Automotive Industry…………………………………...5 The Subtle Pick-Off……………………………………………………………….5 Piracy and China’s Global Emergence…………..………………………………………..6 Consequences of IP Theft…………………………………………………………………7 Mitigating Strategies………………………………………………………………………7 The Autoweb Intellectual Property Exchange…………………………………………….8 Fusion-DX………………………...………………………………………………9 GlobalSource………………………………………………………………….…..9 Data Integration Services……………………………………………………….…9 GlobalSource...………………………………………………………………….…9 Integrated Translations…………………………………………………………….9 Autoweb Company Overview……………………………………………………10 Bibliography………………………………………………………..……………………11 www.autoweb.net 2 Introduction I ntellectual Property protection in the manufactured goods sector is not a new idea. Laws prohibiting manufactured goods counterfeiting and piracy activities existed as far back as the Middle Ages when bakers, artisans, and craftsmen used distinctive marks to distinguish their products and work from would-be counterfeiters. The general problems associated with modern day counterfeiting and intellectual property piracy have long been recognized, yet today’s high-tech economy has magnified the problem of...

Words: 3125 - Pages: 13

Premium Essay

Computer Science

...crime is the computer as a target. This type of cyber-crime requires a level of technical knowledge from its perpetrators. Cyber-crime is relatively new, however, has been in existence since the implementation of computers in mainstream society. This could be a general explanation as to why and how unprepared society and the world are towards fighting these types of crimes [ (Joseph, 2006) ]. There are numerous crimes of this nature being committed on a daily basis. Examples of cyber-crime where the computer itself is the target include things like data alteration, denial of network access, theft of information, denial of service, and vandalism. The next category that the author would like to point out is the computer as an instrument of a crime. What this means is that the computer is used to profit with some other criminal activity in mind. Some examples of this are general theft, theft of service, fraud, and threats and/or harassment [ (Taylor, Fritsch, Liederbach, & Holt, 2011) ]. The implementation of computers as a criminal tool or device to obtain information to be used in a criminal manner increases yearly. Criminals use computers to store data relating to drug deals, money laundering, embezzlement, mail fraud, extortion, and a myriad of other crimes. In addition to the simple storage of records, criminals also...

Words: 1361 - Pages: 6

Premium Essay

Lying, Cheating, Stealing: White Collar Crime

...Lying, Cheating, Stealing: White-Collar Crime “Lying, Cheating, Stealing. That’s white-collar crime in a nutshell.” That is how the Federal Bureau of Investigation describes crime committed by corporations (FBI—White-Collar Crime). These crimes include fraud, identity theft, internet swindles, money laundering, price-fixing, embezzlement, political corruption, police brutality, and much more. Conklin (2010) defines white-collar crime as “any illegal act, punishable by a criminal sanction, that is committed in the course of a legitimate occupation or pursuit by a corporation or by an otherwise respectable individual of high social standing.” Who are white-collar criminals? Who are blue-collar criminals? What are the differences between white-collar crime and blue-collar crime? Is there disparate treatment in sentencing between white-collar and blue-collar criminals? If yes, should there be? For example, if someone breaks into my home, it is a blue-collar crime and I lose some property. If a banking or real estate corporation defrauds me, it is a white-collar crime, and I lose my home, savings, and/or pension. Who is the worse criminal, and what are we doing about it? I will research these questions and examine how these two types of criminals are treated within our society. In 1939, Edwin Sutherland coined the term white-collar crime in his presidential address to the American Sociological Society. In 1949, he authored a book, White- Collar Crime, that revealed...

Words: 1060 - Pages: 5

Premium Essay

Est1 Task 1

...Student ID Business Management Degree Program EST1 310.2.1-05 Social Responsibility The small grocery chain Company Q takes a pessimistic view towards the community which is shaped by the experiences of high crime rates in the area. In order to remain economically feasible Company Q has closed locations that were losing money. This allows the company to retain profits from other locations and provide jobs to members of the community. Unfortunately, because of the high crime rates, Company Q has taken and apathetic view towards the community. This is displayed through their response to requests made by members of the community. It has taken several years of customer requests for the chain to begin carrying specialty high profit items. Members of the local food bank have asked for donations of day old food and Company Q decided not to donate citing that fraud and stealing would arise through possible deception from employees. Overall, the company displays a mediocre attitude towards social responsibility and can improve in a variety of ways. Company Q can improve their social responsibility through economic, ethical, and philanthropic means by developing customer loyalty, employee commitment, and being a good neighbor to the community. For many years customers had asked for specific health-conscious items before the company considered bringing the items for sale. This lack of response displays a poor attitude towards customers needs and must be improved. Company Q...

Words: 656 - Pages: 3

Free Essay

Uniform Crime Reports

...crime rates that occur in different regions and from one year to the next. Another benefit to the UCR is that they show major changes in crime rates through the years. The FBI has compiled these reports since 1929, which created a standard through which all crimes throughout the country are reported. The UCR is published yearly and is available to all law enforcement agencies and accessible to all citizens via the Internet. “Rates of crime under the UCR/NIBRS Program are generally expressed as “x number of offenses per 100,000 people in the U.S. population” (Schmalleger, F., 2009, p. 39). The eight major offense categories reported on in the UCR are murder, forcible rape, robbery, aggravated assault, burglary, larceny, motor vehicle theft, and arson. The crime of murder is the first statistic reported in the UCR and should not be confused with homicide. Murder is, “…an unlawful homicide” and homicide is, “…the willful killing of one human being by another” (Schmalleger, F., 2009, p. 54). Classifications of murder are first-degree (premeditated) murder, second-degree murder, and third-degree murder or negligent homicide. (Schmalleger, F., 2009, p. 54). In the UCR, “…only the number of murders committed, not attempts to murder” are measured (Schmalleger, F., 2009, p. 55). According to crime statistics compiled...

Words: 1763 - Pages: 8

Premium Essay

Criminology

...CRIMINOLOGY Linda Martinez AIU-CRJS105 November 14, 2011 ABSTRACT In the following paper I will discuss and define the differences of criminologist, criminalist and forensic psychologist. With describing the three we will be able to understand the differences amongst them and the role they play in the Criminal justice field. We will also explain the differences of White and Blue collar crimes. We will also see how it is measured in the Uniform Crime Reports of the FBI. As we go and study the world of Criminal Justice there are many fields that one decides to study. There are three that I will define and give an explanation on the role they take. Each takes an important role as the other to prevent, solve and investigate criminal acts and their behavior. The first one we will define is crimionolgy which is the scientific study that is within the confines of sociology that studies the cause and prevention of crime and the rehabilitation and punishment of offenders. The important role for criminalists is known as a specialist in the collection and examination of the physical evidence of crime. The last important definition of the three is forensic scientist which is the application of scientific knowledge to legal problems; especially: scientific analysis of physical evidence (as from a crime scene). The importance of the three is very important when you come to understand the definitions of what their roles are. As stated in GALE White-collar crime is a broad term...

Words: 930 - Pages: 4