Free Essay

Identity Theft

In: English and Literature

Submitted By tbaggett
Words 3754
Pages 16
Identity Theft: Fastest Growing Crime
Tracy A. Baggett
DeVry University
Keller Graduate School of Management

Identity Theft; Fastest Growing Crime
Imagine waking up to news that you had accumulated hundreds of thousands in debt after someone used your identity for unauthorized purchases. This is exactly what happened to John Harrison, a Connecticut salesman. Jerry Phillips, the twenty year old who stole John Harrison’s identity went on a shopping spree that included purchases to Home Depot, JC Penny, Sears, Lowes and even bought two cars from Ford, a Kawasaki and a Harley. In just four months Jerry Phillips was able to accumulate $ 265,000 in purchases.
Jerry Phillips was later arrested and imprisoned for three years. He even went as far as to apologize to John Harrison saying, “Sorry. You know, I wish I could make it up to you.” John Harrison felt that the nightmare was over with the criminal behind bars and even verbally acknowledging his regret over the crime. But despite all of this and a letter from the Justice Department confirming that John Harrison was a victim, he still found himself owing $140,000 to different creditors.
How about waking up in the middle of the night realizing that federal agents just entered your home with guns pointed certainly qualifies as one of the most horrifying ordeals in anyone’s life. This is exactly what happened to Carlos Gomez, a UPS driver accused of being involved in a million dollar money laundering operation headed by a Wachovia bank employee.
Carlos spent close to two weeks in prison and another seven months under house arrest before federal prosecutors realized it was a mistake. After spending nearly two weeks in detention, Carlos was released on a $100,000 bond. He resumed work for UPS but was only allowed to work during the day and remained under house arrest during the night Consumer Advocates Group (2015).
Problem Analysis
Identity Theft is the fastest growing crime in America. It also has the fastest-growing number of complaints filed by consumers with the Federal Trade Commission. According to the Department of Justice, over 17 million people were victims of identity theft in the United States in 2014. The most common forms of identity theft are shown below in Table 1 which clearly shows primary targets are Government documents/benefits and credit cards. | Table 1: The Most Common Forms of Identity Theft | | | | | | Government/documentation/benefits fraud | 14% | | | Credit Card fraud | 17% | | | Phone or utilities fraud | 14% | | | Bank fraud | 8% | | | Employment-related fraud | 6% | | | Loan fraud | 4% | | | | | | | This year, the FTC reported the identity theft cases made up 14% of its more than two million 2013 consumer complaints. | | | | Source: FTC's Consumer Sentinel network, "In The Spotlight: Identity Theft--Facts and Figures, "National Criminal Justice Reference Service, January-December 2013., www.ncjrs.gov/spotlight/identity_theft/facts.html | | |

One reason for the increase in identity theft may be that consumers often become victims of identity theft without having any direct contact with the identity thieves is simply by doing things that are part of everyday routine – using their credit card or debit card and charging dinner at a restaurant, using purchase gasoline, groceries, or purchasing items online, or submitting personal information to employers and various levels of government – consumers may be leaving or exposing their personal data where identity thieves can access and use it without the consumers’ knowledge or permission. Identity thieves can get confidential information the old fashion way, by searching through dumpsters, garbage cans, breaking into businesses, obtaining credit reports fraudulently, etc. However, the sophisticated cyber criminals are using technology to commit their crimes.
Solution
Regardless how identity theft happens, it is a serious crime and could take years to reverse the impact. Identity theft can destroy your finances, your credit, as well as your personal identity forever. To protect yourself against identity theft consumers need to understand how identity thieves work, how to protect their personal information and learn how to prevent it. Taking proactive steps in protecting your identity is critical.
Some may argue that they will never become a victim of identity theft because they don’t have much money or don’t have many credit cards, but there’s a growing number of people that fall victim to identity theft every year. Without an identity theft prevention plan, you are merely falling victim to the “oh, that would never happen to me” mistake.
Others may argue there’s nothing you can do to stop identity theft so just don’t worry about it. The risk is too high not to take preventative steps and use common sense, so this may not be the best argument if you consider the risk.
My research will show the dangers of identity theft as well as provide consumers with a more up to date, prevention guide on how to better protect their identity and minimize the risk of becoming a victim. Properly protecting your personal and confidential information is critical in minimizing the risk or preventing becoming a victim.
Individuals can reduce their risk of being a victim of identity theft by using common sense and being more proactive. Identity thieves and cyber criminals are getting more sophisticated every day which requires everyone to be educated about the risk and what can be done to reduce the risk. Below are steps you can take to minimize your risk and possibly prevent identity theft. The information is categorized in a way to help guide consumers through the various ways to protect and secure their information.

SECURING INFORMATION OFFLINE
When possible shred any documentation, receipts, statements, including your personal information. Bank statement, utility bills, and other documents containing your name, account numbers, address, birthdate, social security number, and other personal information should never be thrown in the trash Federal Trade Commission (2015). * People should not throw away bills and other documents that contain sensitive information. Bank statements, utility bills, and other documents that contain your personal information should never be thrown in the garbage. Burn or shred these document. Certain documents need to be retained for tax and other purposes. Also, shred any kind of financial solicitations you get in the mail, especially those credit card offers containing blank checks. * Monitor your accounts for unusual activity. If you see a change in your account which you make, it’s time to change your password and report the activity immediately. * Monitor credit and bank accounts closely for unusual activity. Checking your credit card and debit card statements online on a daily basis is a good way to limit the damage that fraudsters can do to your accounts. While you might typically wait for your monthly credit card statement to comb through charges. If your card has been compromised, your issuer can shut down your card and send you a new one. * Setup alerting on your credit cards and bank accounts. Some banks and credit card companies have a way to get notifications of suspected fraud activities. * Use your credit card, not your debit card. Debit cards are not good to use for purchases because it pulls the money directly out of your bank account. Credit cards come with more protection. * Monitor or freeze your credit if your data is hacked. If your data is breached as part of a larger attack on a retailer or company that has your personal details, you'll want to monitor your credit even more closely going forward. You can contact the credit bureaus (Equifax, Experian and TransUnion) directly Federal Trade Commission (2015).

SECURING INFORMATION ONLINE: * Limit posting personal information online. Your name should be enough to reveal your identity to people who actually know you. Posting your home address, telephone number, email address, and other personal information all in one place can make it very easy for thieves to duplicate your identity. As much as possible avoid sharing personal details publicly, especially your bank information and social security number. * Passwords need to vary to avoid getting hacked. It is not a good idea to use the same email and password for all account. A lot of people make this mistake, which only enables thieves to access more of their accounts. Using the same email and password for all of your social media profiles may seem acceptable but with the prevalent security breaches online, it’s not a risk worth taking. Mix and match your email and passwords for all of your online accounts. Make sure your passwords are not easy to figure out. * Guard your login credentials. If anyone online asks for your login ID or password for any reason, don’t share it. If you know the person and the reason for asking your ID number is valid, you can meet somewhere and share information there. However, ID numbers are only needed for particular transactions, so you should be wary if anyone asks you for it. * Limit your personal information on social media. What you share can be used against you, especially if it’s accessible to the public. Identity thieves can create a brand new account and use your name, photos, and other updates to make their accounts look legitimately yours. Likewise, if you always post where you’re going or what you’re doing, the thief can take the plot to the next level and find an opportunity to steal from your home. * Beware of emails that contain links or unsolicited phone calls. A common tactic cyber criminal’s use is to send victims an email that appears to be from a legitimate source, like a popular retailer, which contains an altered website address. Anyone who clicks on the link is then sent to a fake site designed to collect personal information. * Beware of phishing emails. If you get a promo email from what appears to be a large retailer or even your bank asking you to enter your credit card or account information, be care it is not a phishing scam. This is how they get your credit card or account number. Ignore this email and login to your account directly to validate. Or, just call the financial institution to validate the request. Phishing, or the practice of sending out fraudulent emails soliciting financial information or getting users to click on virus-laden links or attachments, is a growing identity theft threat. * Avoid phone call scams. If you receive a phone call from a marketer asking for information or someone claiming to be from your bank who wants to check a fraudulent charge, hang up and call the number on the bank of your card. That way, you can make sure you are speaking to your financial provider and not an impersonator. * Shopping Online. Whether you're shopping on your phone, tablet or computer, double-check that you're on the correct website or app. Before checking out and entering your credit card information, you should check that there is a "lock" symbol on the left side of the website address, which confirms it's a secure site. * Be careful with unsecured Wi-Fi. It may be convenient to do online banking at a cafe or to keep your home Wi-Fi network unsecured to avoid typing a password, but criminals have become increasingly adept at intercepting unsecured Wi-Fi communications. Don't do banking or look up financial accounts on unsecure Wi-Fi. Others who are there on the same network can potentially gain access to your information. To protect yourself, turn on Wi-Fi security and put a password on your home Wi-Fi network.

SECURING SOCIAL SECURITY INFORMATION:
Once someone has your Social Security number you have to keep looking over your shoulder for the rest of your life because that number will not be changed by the S.S. agency. Therefore, it’s wise to limit access to your SSN whenever possible. While the potential sources of SSNs are vast and accessible, you can take steps to keep your SSN out of the hands of potential thieves Federal Trade Commission (2015).
The Privacy Act states that you cannot be denied a government benefit or service if you refuse to disclose your SSN unless the disclosure is required by federal law, or the disclosure is to an agency that has been using SSNs before January 1975, when the Privacy Act went into effect. There are other exceptions as well.
If you are asked to give your SSN to a government agency and no disclosure statement is included on the form, you should complain to the agency and cite the Privacy Act of 1974.

* Use substitute numbers for identification whenever possible. States are no longer allowed to use Social Security numbers for driver's license identification numbers. Also, many colleges and universities have also begun generating random identification numbers for students, faculty and staff. Many private companies will also use alternative identification numbers if you are insistent. * Never give your Social Security number in email or on unencrypted websites. Only give your Social Security number over the phone if you are absolutely certain the information is required and the recipient is legitimate. If you receive a phone call or an email message asking for your Social Security number, contact the company or agency directly before giving out any information. * Don't display your full birthdate and hometown together on social networking sites. Identity thieves can use this information to guess the first five numbers of your Social Security number. If you were born after 1988, when parents were first required to obtain Social Security numbers for newborns, it may be possible to guess your entire Social Security number from your birthdate and hometown alone. * Don't use your full or partial birthdate or Social Security number as a password online or at an ATM. Identity thieves can use malware, spyware or Trojans to steal the information. If any of your passwords contains this information, change your password(s) immediately. * Make a photocopy of any card that displays your Social Security number. Black out part of the number. Carry the photocopy instead of the actual card. You may have to show your original card once to the agency that provided it so they can make their own copy
Read more: http://www.ehow.com/how_5557002_protect-social-security-number.html * Should I disclose my Social Security number over the Internet? When you use the Internet, you may find Web sites that require your SSN when, for example, you apply for a credit card online or seek an insurance quote. We advise that you take extra precautions to determine that your personal data is transmitted securely and that it’s stored safely by the online business. Make sure you have a firewall and the latest anti-virus and spyware software installed on your computer. * There are several steps you can take to protect your Social Security number.
Any personal information that can't be easily changed, such as a Social Security number or a mother's maiden name, should never be used for authentication, said Adam Dolby, vice president of business development at Oslo, Norway-based Encap Security, which specializes in security for the banking and retail sectors.
People should not carry Social Security card in your purse or wallet. In fact, don't carry your card in anything that can easily be stolen. Instead, memorize the number and put the card in a safe.
People should not email a Social Security number. Most email messages can be read in transmission. Instead, phone the person you're contacting, and get him or her on the line — don't leave a voicemail containing the SSN.
People should not store electronic documents containing Social Security numbers on your computer, your smartphone or a cloud-storage drive. If you absolutely have to, then encrypt those files and folders so that information-hungry malware can't read them Federal Trade Commission (2015).

SECURE YOUR MOBILE DEVICES:

* Get the latest anti-virus and anti-malware software. Increasingly, identity thieves are using viruses and harmful programs known as malware to steal Americans' financial information, says Michael McKeown, supervisory special agent, FBI Cyber Division. * Mobile verification. Gmail, Facebook, Twitter and other select networks have mobile verification that notifies you via SMS if your account was accessed in a suspicious place, like abroad or in a different state. The person who logged in will also be asked for a verification number which he or she won’t be able to access since they don’t have your mobile phone. * Secure passwords in a secret place. Using multiple passwords can make it hard for you to remember all of them, but you can save a copy in a secure location. Instead of saving them on your computer, write your passwords down in a small notebook which you keep safely in your home. You can also write them in unusual places like at the back of your favorite book.

Malware and anti-virus programs can enter your personal computer in several different ways, the most common being email with links or attachments that when clicked on, install malware on your machine. From there, they can record keystrokes to mine passwords, hijack online banking sessions and probe your PC for financial information.
Beside keeping anti-virus and anti-malware software up to date, another way to prevent yourself from being hurt by malware is to keep the financial information on your PC limited. Consumers should decline when asked to save their password when logging on to a financial site Federal Trade Commission (2015).

WHAT TO IN THE EVENT OF IDENTITY THEFT: * Contact your bank: Call your bank and ask them to remove any fraudulent charges that have accrued on your accounts. * Call a credit bureau: Contact one of the three U.S. credit bureaus and have them place a 90 day fraud alert on your account. This way, businesses will be required to call before opening a new line of credit in your name. The credit bureau you call is required by law to notify the two other credit bureaus. Also, that the fraudulent information be removed. * File a police report: File a report with the police in the location the crime occurred. * Consider a credit freeze: You can activate a credit freeze on your account, which will prevent anyone from checking your credit score or opening new credit in your name. However, this can take a few days to lift, so if you’re in the midst of applying for loans or buying a house then you might not want to do this. * Review your credit reports: If you think you’ve become a victim of identity theft, contact each credit reporting agency – Experian, Equifax and TransUnion – and request copies of your credit report. Review each one carefully and report anything that looks suspicious. If you subscribe to an identity theft protection service, see if they offer victim assistance Federal Trade Commission (2015).

The three national credit agencies may be contacted directly at: Equifax | TransUnion | Experian | P.O. Box 740241
Atlanta, GA 30374
1-800-685-1111 | P.O. Box 1000
Chester, PA 19022
1-800-888-4213 | P.O. Box 2002
Allen, TX 75013
1-888-397-3742 |

Below are some of the identity theft protection services. Identity Theft Protection Service | Website | Identity Guard | http://www.identityguard.com | Identity Force | https://secure.identityforce.com | TrustedID | https://www.trustedid.com | AARP | https://www.aarpidprotection.com | LifeLock | https://store.lifelock.com | Privacy Guard | https://offer.privacyguard.com | myFICO | https://www.freecreditreport.com | Metlife Defender | https://metlifedefender.com/ | IDFreeze | https://www.trustedid.com |

Conclusion
Identity Theft is a serious, criminal issue impacting millions of people every year. The FBI and Interpol are forging closer ties in combating organized crime, including Cybercrime. Due to ongoing security breaches, companies are placing a greater focus on addressing identity theft and cyber security issues as it relates to customer and employee confidential information. This increased effort is not enough and individuals need to educate themselves and follow the some recommended guidance to protect their personal information and minimize the risk of being a victim of identity theft Interpol (2015).

References
Barton, L. (2015, November). Year of Preventing Identity Crime: Identity Theft Tips for College Students. Retrieved from http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_arch&article_id=1626&issue_id=102008
Consumersadvocate.org (2015).
Retrieved from http://www.consumersadvocate.org/id-theft-protection/stolen-identity
Department Of Justice, Identity Theft. (2015). Retrieved from http://www.justice.gov/criminal-fraud/identity-theft/identity-theft-and-identity-fraud
EMV Credit Cards (2015).
Retrieved from http://www.creditcards.com/credit-card-news/emv-faq-chip-cards-answers-1264.php
FDIC (2015). Identity Theft, Frauds, and Scams Basics.
Retrieved from https://www.fdic.gov/consumers/assistance/protection/IdTheft.html
Federal Bureau of Investigation, Internet Crime Complaint Center (IC3).
Filing a Complaint with the IC3.
Retrieved from http://www.ic3.gov/default.aspx
Federal Trade Commission, FTC Complaint Center.
Retrieved from https://www.ftccomplaintassistant.gov/#crnt&panel1-1
Federal Trade Commission, Identity Theft.
Retrieved from https://www.identitytheft.gov/#what-to-do-right-away
Federal Trade Commission, Identity Theft, Recovering from Identity Theft.
Retrieved from http://www.consumer.ftc.gov/features/feature-0014-identity-theft
Federal Trade Commission, SCAM Alerts. (2015).
Retrieved from http://www.consumer.ftc.gov/scam-alerts
Grant, K. (2015, July). Identity theft victims: You might know the culprit.
Retrieved from http://www.cnbc.com/2015/07/21/identity-theft-victims-may-know-the-culprit.html
Harrell, E. (2015, September). Victims of Identity Theft, 2014 U.S. Department of Justice. Retrieved from http://www.bjs.gov/content/pub/pdf/vit14.pdf
How to Deal with a Security Breach https://www.privacyrights.org/how-to-deal-security-breach How to keep you information secure.
Retrieved from http://www.consumer.ftc.gov/articles/0272-how-keep-your-personal-information-secure
Huffman, M. (2015). Consumer Affairs. Identity Theft News.
Retrieved from http://www.consumeraffairs.com/identity-theft-news
Lake, L. (2015, November 13). Clicking for support could cost you. Consumer Education Specialist, Federal Trade Commission. Retrieved from http://www.consumer.ftc.gov/blog/clicking-support-could-cost-you
Morad, R. (2015 September 11). Fake IDs Leading to Identity Theft. Retrieved From https://www.lifelock.com/education/alerts/fake-ids-leading-to-identity-theft
Privacy Rights Clearinghouse (2015, October). My Social Security Number - How Secure Is It?
Retrieved from https://privacyrights.org/fs/fs10-ssn.htm

Rashid F. (2014, May 7). How to Protect Your Social Security Number, Tom’s Guide Retrieved from http://www.tomsguide.com/us/how-to-protect-social-security-number,news-18741.html
Statistic Brain. (2015). Identity Theft / Fraud Statistics.
Retrieved from http://www.statisticbrain.com/identity-theft-fraud-statistics/
USAGOV. (2015). Identity Theft.
Retrieved from https://www.usa.gov/identity-theft

Similar Documents

Premium Essay

Identity Theft

...IDENTITY THEFT NAME: INSTITUTION: IDENTITY THEFT Identity theft refers to a situation where a person uses information used to identify another person, such as their name, credit card number or social security number without their permission, in order to commit fraud or other crimes. In other words, it is stealing the identity of a certain person and pretending to be that person by assuming their identity, usually so as to access their resources or to obtain recognition and other profits in their name (Cheney, 2005). There are many forms of crime related to identity theft. Some identity thieves rent apartments or get credit cards or phone accounts in the names of their victims. These victims may not learn out about it for some period of time, until they notice some charges they did not make, or are contacted by a person or people claiming that they owe them. It may sometimes cost them hundreds or thousands of dollars and a lot of time while trying to undo the damage (Keith, 2005). Identity theft could ruin an otherwise spotless reputation. It could also lead to much suffering if the victims are held responsible for the thief’s actions. TYPES OF IDENTITY THEFT Identity theft can be divided into the following categories: • Criminal identity theft, that is, pretending to be another person when arrested for an offense • Child identity theft. • Financial identity theft, that is, using the identity of......

Words: 1923 - Pages: 8

Free Essay

Identity Theft

...Rasmussen College | Identity Theft | The long term issue | | Caden Ross | 2/17/2013 | Author's Note: This research is for Professor Rob Paixao B234/BUL2241 Section 01 Business Law Course written by Caden Ross on 02/17/2013. | Jeffrey Gerald Jackson, otherwise known as Troy Lee Evans, was arrested on September 4,2012 for identity theft. Mr. Jackson used the identity of Troy Lee Evans to gain employment at Credit Concepts Inc. Mr. Jackson had worked at Credit Concepts Inc. under this false ID for six years. Through his job there he had access to important personal information that allowed him to obtain several loans using other people's identities. Police uncovered at least six separate incidents in which Mr. Jackson used other peoples information to obtain loans for himself. His bail was set at $45,000.00 and police are asking for anyone to come forward with any additional information about other crimes he may have committed. [ (Bella, 2012) ] Identity Theft is a heinous crime with long term repercussions for it victims. Mr. Jackson's case shows how much a person can do with identity theft. He not only used other people's information to obtain loans but he lived as someone else for six years and worked as this person. This means that for six years income was reported to the IRS and Social Security as Mr. Evans when it was not his income. Any bills that Mr. Jackson has taken out in Mr. Evans name like utilities or rent can show up on Mr. Evans credit if......

Words: 976 - Pages: 4

Free Essay

Identity Theft

...Abstract Culprits of identity theft are the modern day con artists that are able to convince and persuade people out of their money by promising their victims a portion of wealth which will never come to be. This paper will describe what is classified as identity theft, how people become victims of this crime and how people can avoid being becoming a victim to this popular means of deception in the electronic world. On the average one hundred thousand people are affected by identity theft in the United States per year and over two billion dollars in revenue is stolen as shown in the surveys that were conducted in 2003 -2006 (Anderson, Durbin & Salinger). Because of this threat the consumer becomes skeptical of online transactions which cause loss of business to many retailers as they are based solely on internet sales. For the retailer to make sure that the consumer is protected from fraudulent transactions and the possibility of their personal information to be at risk of being intercepted by others, the retailers need to incorporate special systems onto their site and have special programs that could make the purchasing of items from their business complicated for the consumer and will also raise the price of the goods to offset their loss on the security measures. The way people are committing the crimes of identity theft are only limited by the imagination of the person that commits these types of crimes. The source can be from......

Words: 1459 - Pages: 6

Free Essay

Identity Theft

...Alec Dohm Economics Period 1 Identity Theft is a vast problem that grows with the years and the tough economic times. Identity theft affects nearly 5% of the world’s adult population. In 26 % of all cases, the fraud victim knew the person who stole their identity, and most often it is a family member who rips you off. The best way to protect yourself is to buy and use a paper shredder and a safe. Also the only organization you are legally required to give your Social Security Number is your employer and financial institutions, like a bank. The economic effect of identity theft is more than what people may think. Check fraud alone rose to 5.5 billion dollars in 2003. Because that money was taken from others instead of made legally, the economy shows a loss. The annual cost of identity theft to businesses is 53 billion dollars because if somebody gets the I.D of a business owner then they can funnel money out of that person’s business as well as their personal bank accounts. The American Bankers Association reported 677 million dollars of losses in 2003, which is a slight decline from 2001. Being that the article is a few years old, I would say that those numbers have gone way up since then. If somebody steals your identity, it could affect you in countless ways. All of a sudden your credit card will start being declined for insufficient funds. When you go home and check your bank account online, your money will have magically disappeared. A person could......

Words: 349 - Pages: 2

Free Essay

Identity Theft

...Lab 10: Identity Theft Identity theft is on the rise every day and we do not even know when it happens. Identity theft occurs when someone wrongfully obtains another’s personal information without their knowledge to commit theft or fraud (Federal Bureau of Investigation, n.d.). Identity theft crimes include credit card fraud, internet fraud, mail fraud, and many others. Anybody is at risk of identity theft; nobody is safe. As beginning IT students, it is important to learn the basic way to protect ourselves right now. Working on the Internet exposes your identity to many people. When a person uses your information without your consent and causes any type of harm is considered identity theft. Along with names, Social Security numbers and dates of birth, fraudsters also use Medicare numbers, addresses, birth certificates, passport numbers, financial account numbers (bank account or credit card), passwords (like mother’s maiden name, father’s middle name), telephone numbers, and biometric data (like fingerprints, iris scans) to commit identity theft (Federal Bureau of Investigation, n.d.). As you can see there are many types of information that can be used to steal your identity. Once your identity is stolen the restoration process is long and tedious. Beginning IT students should be aware of what precautions to take when handling important information. Knowing the facts will prevent or minimize the percentage of becoming an identity theft victim. Clear your logins and......

Words: 479 - Pages: 2

Free Essay

Identity Theft

...Technology help Criminals Commit Identity Theft? Identity theft is becoming one of the fastest growing criminal offenses in the United States. Identity theft is a form of stealing someone's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name (Kiesbye). It is important for one to know that identity theft is not just a financial crime. It is a serious crime that can cause havoc on finances, credit history, and reputation. Identity theft can go unnoticed and can take time, money, and patience to resolve. Technology is constantly evolving making identity theft an easier crime to commit (Kiesbye). There are several ways in which technology plays a major role in assisting criminals commit identity theft (Knight Ridder/Tribune Business News). Some ways include computer hacking, telephone bugging, and old-fashioned stealing. Identity theft has become a very serious business for criminals (Knight Ridder/Tribune Business News). . Identity theft has been around for a number of years. The term identity theft was coined in 1964 however it does not mean to steal an identity but rather to impersonate another individual to commit fraud or deception (Vacca). Identity theft is not easily detectable by the individuals. Someone can steal or misappropriate personal information without the individual knowing then commit identity theft using the stolen......

Words: 1341 - Pages: 6

Premium Essay

Identity Theft

...Identity is yours and only yours “But he that filches from me my good name/Robs me of what not enriches him and makes me poor indeed” --- Shakespeare Crimes are not always on the rise; with tough and stringent laws and hard work of excellent law enforcement agencies the rate of crime can always be controlled. For example the crime rate in the New York City went down considerably in the beginning of this decade, with the introduction of new policies by the new government. There is one type of crime, which has consistently grown every year in the last decade, and also has been the fastest growing crime. It is a neither gun crimes nor the use and abuse of certain drug; it is identity theft. When searched for fastest growing crime on google.com the unanimous answer turned out to be identity theft. This crime basically proves that there is no doubt in the fact that there is something going wrong when dealing with identity theft. It seems like there is a piece of the puzzle which is missing. The main focus of this paper is to put some light on the issues concerning with identity theft, how it takes place in various manners and what are the current laws in place to act against identity theft. The role of credit card companies to deal with identity theft is also mentioned. Identity theft and identity fraud are words used to refer to all degrees of crime in which someone wrong fully acquires and exploit individual private information in numerous ways that engage scam or......

Words: 1086 - Pages: 5

Premium Essay

Identity Theft

...head: IDENTITY THEFT: IN MORE WAYS THAN ONE Identity Theft: In More Ways than One Justin S. Evangelist CMRJ 306 D002 Criminal Investigation American Military University Identity Theft: In More Ways than One We have all watched the news; we have all heard the stories. It’s on commercials and television shows. Identity theft is sweeping across the nation and it something we should all take very seriously. Identity theft is a form of fraud or taking away someone else’s identity in order to gain something, usually financial means (Swanson, Chamelin, Territo & Taylor, 2009). The Federal Trade Commission estimates that as many as nine million Americans have their identity stole each year, resulting in over 50 billion dollars of financial loss (Mercuri, 2006). There are several different forms of identity fraud, several which not everyone has heard of. The three main types of identity theft consist of criminal identity theft, medical identity theft and child identity theft. Criminal identity theft occurs when a victim’s name, address, and other personal details are given to law enforcement officials during the commission of a crime. The victim is then mistakenly arrested (Mercuri, 2006). Often times, the imposter has obtained some sort of tangible, personal information from the victim, usually a driver’s license. Once the name of an innocent identity theft victim is assigned to the criminal act of the true perpetrator, it can be very difficult for the identity......

Words: 998 - Pages: 4

Premium Essay

Identity Theft

...Aug 26, 2013 Research Paper: Identity Theft Identity theft, also known as ID theft is a crime in which a criminal obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to pretend to be someone else. The information can be used to obtain credit, merchandise, and services using the victims’ name. Identity theft can also provide a thief with false credentials for immigration or other applications. One of the biggest problems with identity theft is that very often the crimes committed by the identity theft expert are often credited to the victim. A thief could take out a mortgage in your name or commit a crime and pretend to be you when caught. Thieves can even use your personal information to apply for a job or use your medical insurance. Identity theft has become one of the world’s leading crimes in the world. Identity theft drastically increased in the year 2000 by nearly 52%, occurring every half second all across the world. There are two primary types of identity theft: ~Account takeover ~True name theft Account takeover identity theft refers to the type of situation where an imposter uses the stolen personal information to gain access to the person’s existing accounts. Often the identity thief will use the stolen identity to run up current credit lines, by changing your address so that you never see the credit card bills that the thief constantly runs up. True name identity theft means that the thief uses......

Words: 485 - Pages: 2

Premium Essay

Identity Theft

...Identity Theft James Middleton AIU Online   Abstract In this paper we will discuss identity theft. What is identity theft, what are some of the more common ways that people have become victims to identity theft? We will discuss how the law has changed and what the law has accomplished. Also how the law now protects the victim.   Identity Theft What is identity theft; which is often referred to as identity fraud, which refers to all types id crime involving someone wrongfully obtain and uses another person’s personal data in some way that involves deception (findlaw.com, n.d.). By definition of the Identity Theft & Assumption Deterrence Act (ITAD) of 1998, specified that it is a federal crime to knowing transfer or use without lawful authority, a means of identification of another person with the intent to commit, or to aid or abed any unlawful activity that constitutes a violation of Federal law, or constitutes a felony under any applicable state or local law (OVC, 2010). If a person steals another person’s identity but does not cause any monetary damage has a crime been committed? I would have to say yes, based on the definition of the ITAD Act. You transfer or use another person’s identity with the intent to commit a crime and you are caught; yes it is a crime. The most common ways to commit identity theft, is either to listen to someone’s conversation while they are giving out a credit card number over the phone, by “dumpster diving” when they can......

Words: 825 - Pages: 4

Premium Essay

Identity Theft

... The Two Mrs. Jane Does Diana Sours DeVry University The Two Mrs. Jane Does Identity theft, it can and will catch you off guard if you are not careful with your information, and it can have a devastating effect. “Another pre-screened credit offer?” thought Mrs. Jane Doe, as she walked back up to her house from checking her mail. She quickly realized that was not the case at all, as she opened the “offer” from Visa. Instead, what she was staring at was a bill addressed to her, that she had no recollection of making. She was now faced with the probability of being a victim of identity theft. Identity theft, in short, is using someone else’s personal information for one’s own financial gain. Identity theft laws need to be improved because this crime costs businesses money, costs credit card companies money, and financially hurts ordinary consumers. In 2006, “U.S. companies average identity theft-related costs of $182 per compromised record. While that figure averaged $660,000 per company in notification expenses and indirect costs, the total estimate, including lost business, tops $2.5 million. This staggering amount also includes costs and fees associated with legal expenses, fines, investigation, auditing, class action litigation, public relations damage control, and setting up monitoring, remediation practices, and a dedicated customer support phone number.” (Identitytheft.lifetips.com, 2014) Some of this cost is passed along to the credit card companies in the form of......

Words: 855 - Pages: 4

Free Essay

Identity Theft

...Speech On Identity Theft A. Today is the big day. You have been saving for several months for a down payment to purchase your new car. You go to the dealership, pick out the car and fill out all the required paperwork. You start daydreaming about driving off the lot when the finance manager comes in and says the one word you were not expecting, DENIED. You have no idea what is going on because you know you have perfect credit. After some time consuming effort, you realize you are a victim of identity theft. B. The purpose of my speech is to inform the audience about identity theft. C. Identity theft can happen to anyone in this room. Your roommate, friend or a total stranger can gain access to your personal information. If you ever plan on taking out a student loan, purchasing a car or home, you should listen carefully to this speech. D. I was almost a victim of identity theft. Several years ago someone stole my checkbook. The person who found it started writing checks from my account to purchase a few very expensive items at my expense. I had no idea this was happening until I went to the ATM to withdraw some money. I called my bank and found out that my account was $2000.00 overdrawn. Fortunately, I reported it the police in a timely manner and they were able to apprehend the person before more damage could be done. The police told me about identity theft and how lucky I was. After the incident I started doing research on identity theft......

Words: 1389 - Pages: 6

Free Essay

Identity Theft

...Abstract The Federal Trade Commission considers identity theft to be the fastest growing crime in the country. The Internet has become a hot zone for attracting identity theft thieves to steal personal information. Identity theft is divided into four basic areas – financial identity theft, criminal identity theft, identity cloning and business and commercial identity theft. Criminals obtain our personal information through methods such as using an insider, dumpster diving, computer hacking, war driving, phishing and pre-texting. The Department of Justice prosecutes identity theft under federal statutes. Congress passed the Identity Theft and Assumption Deterrence Act, Title 18 United States Code 1028 in 1998. One of the most noted identity theft cases was USA v. Cummings. The largest hacking and identity theft case ever prosecuted by the Department of Justice involved eleven people who stole more than forty million credit and debit card numbers. To severely curtail on identity theft, President Bush mandated Executive Order 13402 called the Identity Theft Task Force. Identity theft causes immeasurable damage to peoples’ names and reputations. Greater awareness and education will help us to combat identity theft. Identity Theft It’s a nightmare that can leave an unsuspecting person feeling violated and vulnerable. It doesn’t care who you are or where you live. Gender, race and age are totally irrelevant. In this modern technological age, it is a crime that can......

Words: 2466 - Pages: 10

Free Essay

Identity Theft

...online world, and identity-related crime is a growing problem related to this. This new category of crime is not restricted to high-profile instances of identity ‘theft’ or identity fraud; it is wide-ranging and complex, ranging from identity deletion to unlawful identity creation and identity ‘theft’. Commonly accepted definitions are lacking, thus blurring available statistics, and policies to combat this new crime are piecemeal at best. In order to assess the real nature and magnitude of identity-related crime, and to be able to discuss how it can be combated, identity-related crime should be understood in all its aspects. As a first key step, this article introduces a typology of identity-related crime, consisting of conceptual, technical, and legal categories. The conceptual categories are unlawful forms of identity deletion, identity restoration, and identity change; the latter category is subdivided in unlawful forms of identity takeover (‘identity theft’), identity delegation, identity exchange, and identity creation. The technical categories consist of 17 points of attack on identification. The legal categories distinguishes between identity-specific legal provisions, such as the US crime of identity theft, and identity-neutral legal provisions mainly used in Europe, subdivided in criminal, civil, and administrative provisions. This typology can be used as a comprehensive framework for future research, countermeasures, and policies related to identity-related......

Words: 1042 - Pages: 5

Free Essay

Identity Theft

...Identity Theft + Fraud= Identity Crime 20 December 2007 There is a thief that lurks around us everyday; this thief can attack in brad day light or in the darkest hour, and just about anywhere you may find yourself. This thief has the power to act in your name, make unlimited purchases, open up credit accounts and ruin your good name and credit all in the matter of seconds; if you are vulnerable enough, you might become his next victim. In many cases all he needs is your name and a social security number, and he has enough information to make you his next victim; if you don’t believe me then ask the millions of Americans that became victim’s, or just ask me. The thief that I am talking about is identity theft. Identity theft is a crime that is affecting many Americans, the costs are well in the millions every year, but with a little bit of knowledge and adaptive common practices, you can help fight back and minimize your chances of becoming the next victim of Identity theft. Identity theft is as predictable as a giant storm; you really don’t know what the damage will be until it passes and many victims don’t even see it coming until its already too late. So what is identity theft? According to the webpage article “about identity theft,” the Federal Trade Commission (FTC) (2007) writes that “identity theft occurs when someone uses your personal identifying information, like your name, SSN… without your permission to commit fraud or other crimes.” (para 1) All it takes...

Words: 3405 - Pages: 14