Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 12

Identity Theft in Our Contemporary Society

Amy Dallas
Kamille Stanton
GEN499: General Education Capstone
October 7, 2013

Running head: IDENTITY THEFT

Introduction
How do you secure your identity with the Internet developing faster than can be
protected? Attempting to stay ahead of the hackers and attackers has been a contentious effort
since the Internets earliest days as a research project. Today, after thirty years of prolific
development, security concerns have only increased. Designing computer systems and devices
which are capable of resisting attack from within, while growing and evolving at an epidemic
rate is almost an impossible endeavor. Today, identity theft is the nations fastest growing white
collar crime and preys upon the financial resources and reputations of its victims to include
children and deceased. In many cases, identity theft victims must first prove their innocence
before anyone will pay attention. Often, law enforcement officials are not able provide the
timely identity theft investigations required to capture the perpetrators due to the sheer volume
and multiple jurisdictions associated with the Internet. There is neither an individual nor
business that is safe or immune from identity thefts potential grasp. In todays prolific
advancement of Internet; users must diligently secure personal information in conjunction with
utilizing current anti-virus software or assume the risks associated with Internet security.
The Information Technology and Software Development career was the fastest growing
career field in America during 2011 (CNN Money, 2012). Every day we find new innovations
and discoveries flooding our lives. The world constantly struggles to move at a faster pace
while at the same time improving efficiency. This urge to develop the next great technology is
the catalyst for our uncontainable explosion in digital information. However, with all the
convenience and access to digital media, the world faces those who will use the technology to
steal the identity and resources of others for their own benefit. The United States Department of

Running head: IDENTITY THEFT

Justice defines Identity Theft and Fraud as, terms used to refer to all types of crime in
which someone wrongfully obtains and uses another person's personal data in some way that
involves fraud or deception, typically for economic gain (U.S. Department of Justice, 2012).
An individuals personal data such as: Social Security number, bank account information, credit
card numbers, or telephone calling card number may be used by criminals to personally profit at
your expense. In many cases, a victim's loss not only includes out-of-pocket financial losses,
but substantial additional financial costs and time repairing and correcting credit histories and
erroneous information. To assist with my research for this paper, I chose two books written
from different perspectives. First, I sought out a book to provide a comprehensive review of
identity theft history; methods used to steal identities, consequences of having your identity
stolen, and prevention techniques from an individual or business perspective. Next, after
developing a strong baseline on identity theft, I searched for a reference book which offers a
comprehensive review of the concepts of computer crimes, relevant laws, and methods
practiced by investigators to trace, capture and persecute identity theft criminals.
Martin Biegelman is the Director of Financial Integrity for Microsoft with over 30 years
experience in fraud detection and prevention. His book, Identity Theft Handbook Detection,
Prevention, and Security provides a thorough review of identity theft based on his tenure as an
investigator and research he has performed. Within his handbook, he systematically describes
the wide variety of methods attackers may use to obtain an individuals identity such as stealing
mail, "washing" checks, employing credit card "skimmers", and stealing identities from older
sites with minimal security functions such as medical facilities. Later, the text captures the
criminal justice systems response to the problem, with the remaining chapters identifying the
different aspects of identity theft, such as victims, global growth, and research efforts relating to

Running head: IDENTITY THEFT

identity theft.
Identity theft has grown from a primarily American dilemma into a worldwide epidemic
and there are not any signs of it ending soon. Understanding the enormity of this problem is
essential to an individuals ability to protect and fight back. It does not matter whether you are
chief executive officer, chief financial officer; auditor, law enforcement officer, machinist,
student, or child, there is no one who is out of reach from these crimes. This book was
researched thoroughly and written to unveil the enormous criminal enterprise affecting the
general public. As the number one complaint generator for the Federal Trade Commission for
the past five years, and costing Americans $1.52 billion last year in recovery efforts and actual
lost monies. (Federal Trade Commission, 2012) The devastating financial and emotional impact
that identity theft causes is unbelievable. Mr. Biegelmans offers insightful guidance, extremely
helpful suggestions, and first-hand examples demonstrating that the individual is the best defense
against identity theft. He states in his book, individual citizens must be as savvy as the
criminals seeking to steal their identity (Biegelman, 2012, p. 20). As Internet technology has
surged ahead, it is almost impossible to solve all identity theft weaknesses no matter how well
technology advances. With this in my mind, my second academic reference relates to the
investigation, capture and persecution of identity theft criminals.
Computer Crime, Investigation, and the Law are written by authors, Chuck Eastom and
Jeff Taylor. Chuck Eastom has been involved in the Internet Technology industry for over
twenty years and is the authored eleven computer science books. He holds over a twenty
different computer industry certifications and was a subject matter expert in developing the
CompTIA's Certified Technical Trainer exam. Jeff Taylor career began in 1982 and is a Texas
police detective in the Criminal Investigations department where his forte is in white collar

Running head: IDENTITY THEFT

crimes. Detective Taylor is a certified computer forensic evidence recovery specialist and is a
member of the instructor staff at Collin County Law Enforcement Academy where he instructs
Electronic Crime Scene Investigations.
Their book was written to the identity theft investigator level and provides a wideranging introduction to the concepts of computer crimes and applicable laws. The authors
demonstrate a great deal of experience, however due to the in-depth technical discussion; the
message was a challenge for a common person to follow. The chapters on the legalities and law,
while extensive, were written at an attorney level and were difficult to comprehend. I think the
pairing of the two professions in this book was a brilliant choice. Understandably, lawenforcement officials are involved in identity theft investigations, but in these days of Internet
crimes, so are network administrators and technical-support experts. Computer Crime,
Investigation, and the Law provide this multi-discipline perspective to the readers. Beginning
with an expansive introduction to the field of computer crime, the book follows the journey of
computer crime, and the multiple criminal techniques and methods. The discussion within
computer forensics is top notch and while it is terrific to understand the capabilities of forensic
scientists, it makes me wonder, if the worlds forensic specialists spent as much time on finding
methods to prevent crimes, would we have still be discussing identity theft. Taylor and Eastom
tell readers, Identity theft is a growing problem. 8.5 million victims mean that in a single year,
about 2.8 percent of the United States population was the victim of identity theft. This means
your odds of being a victim in any given year are about 1 in 30 (Taylor & Eastom, 2011, p.
412). What percentage of those 8.5 million victims would be reduced if we started using
biometrics to identify users of credit cards instead of a signature on the back of a card that few
cashiers actually validate? The authors further state individuals can Put a notice on your credit

Running head: IDENTITY THEFT

report. Most credit-reporting agencies will place a notice on your report that no new credit is to
be issued to this identity without first calling the home number and verifying (Taylor & Eastom,
2011, p. 421). Why is this not an automatic validation process? With the use of smart phones,
one can easily have an automated email or phone call notification of all transactions over a
certain threshold from your banks or financial institution. Most banks in our current society
offer these services now for free, why are the major credit reporting agencies not doing the
same? Another area in identity theft that needs further discussion is knowledge and awareness.
Individuals must be aware that they, as consumers have the most control over protecting
their personal information. Businesses and law enforcement will respond to illegal activities, but
the person, not the different companies and organizations have the most vested interest in
protecting the security of their identity. Therefore, educating consumers is the most important
aspect of any successful identity theft protection program. Consumers must realize that it is their
own personal responsibility to be aware of the risks of identity theft and diligently monitor and
take proactive actions to protect their personal information. While this seems simple, it is not
always the case. Tyler Moore from Harvard University and Richard Clayton from the University
of Cambridge (2011) claim, Despite the increase in online criminal activity, information on
incidents and the losses caused by such crimes have largely remained hidden from public view
(p.1). The pair claims there are several reasons for this policy. First, firms fear negative
publicity which may arise if incidents are openly discussed. Second, some argue that disclosing
information on incidents actually aids attackers more than it helps defenders (Moore & Clayton,
2011, p.1). The old saying that knowledge is power stands true when dealing with identity theft.
Thorough knowledge of these crimes and how one can mitigate their own personal risks will
drive a behavioral change amongst consumers. This education could be provided through a

Running head: IDENTITY THEFT

variety of public service commercials, news and radio casts, articles in papers/magazines, and
social media. Informing and empowering the consumer on the identity theft process will result
in an understanding of what the clear, actionable steps to take if they suspect their identities have
been compromised. In addition to publically benefiting consumers, Moore and Clayton (2011)
tell us, research suggests that policy makers should encourage the publication of more
information that can help the Internet's defenders fix problems as they arise (p. 66). It is clear
that hiding the identity theft epidemic will not succeed public knowledge of the proper steps to
protect their identity and the actions to initiate upon identifying suspected identity theft will have
a clear impact on reducing this global issue.
Today, the Internet affects nearly every aspect in our lives and it is the responsibility of
parents, educators and the communities to ensure our children are safe and secure. The Internets
very design is to be interconnected on multiple systems and networks, which lends to its own
securities issues and precautions. The ability of criminals to intercept pieces of personal
information shared on social networking sites is frightening. Children are often nave to these
risks, not fully understanding identity theft is not limited to adults and that they are often targeted
for their clean credit records. Cyber criminals utilize social networking sites such as Facebook,
MySpace and even instance messaging to gain personal information. It is the parents, educators
and communities responsibility to teach children of these perils. The Internet is an amazing
resource, but as with most things in life, must be respected and used wisely. Children and the
society in general must be taught the risks of releasing too much information online. Charlotte
Chang in her 2010 article in the Berkeley Technology Law Journal; Annual Review, Vol. 25 Issue
1, INTERNET SAFETY SURVEY: WHO WILL PROTECT THE CHILDREN?, warns society
that, Teaching children about safe Internet practices and cautioning them against sharing too

Running head: IDENTITY THEFT

much information online will have lasting effects. Just as children learn to not take candy from
strangers, they can also learn to not share personal information and about the wrongs of Internet
harassment (Chang, 2011, p.523). Ms. Chang further goes on to say, In May 2009, Senator
Robert Menendez (D-NJ) introduced the School and Family Education about the Internet (SAFE
Internet) Act.149 The SAFE Internet Act would allocate $175 million over five years to educate
children on Internet safety issues (Chang, 2011, p. 525). This multi-level echelon approach of
educating our society is paramount to reducing the risks of identity theft. We all have a civic
responsibility to educate our children. We are accountable for their failure to understand these
principles. Open and direct dialogue from all levels will not only teach the risks of the identity
theft predators but will develop into a role model for their lifelong framework of civic
responsibility. It is these very principles of being an active citizen that will educate our
childrens knowledge of the risks and protect them from these predators.
Today, multimedia is vital facet in the lives and institutions of world citizens. In a
recently published Forrester Forecast View report titled Forrester Research World Online
Population Forecast (Global), 2012 To 2017 found that, 2.4 billion people across the world use
the Internet on a regular basis i.e., at least once a month from home, school, work, or any
other location via a PC or a non-PC (mobile) Internet access device (Miglani, 2012). The report
goes on to state, Internet use is expected to grow to 3.5 billion users by 2017, representing
nearly half of the 2017 expected overall world population of 7.4 billion. The use of the Internet
and social media truly is a world-wide function and expands across all continents, nations and
countries. As these forms of communication and numbers of users continue to multiply, so are
the security risks involved with using this technology. To fully understand the risks associated
with social media and the Internet, it was my responsibility to comprehend the ramifications of

Running head: IDENTITY THEFT

not having a protected computer and home network. Kevin Haley, Symantecs Director of
Security Technology and Response presented a pod cast to highlight the vulnerabilities as
identified by the Symantec Corporation during 2011. In the pod cast, Mr. Haley emphasized,
attackers are shifting efforts to the social network arena, Malware has skyrocketed to 5.5 billion
attacks, doubling the assaults from 2010 (Haley, 2012). As the attackers are directing their
efforts to social media, it is even more critical that we have a multi-tiered educational approach
to mitigate these potential threats. Jacqueline Lipton expresses this vulnerability in her article,
Combating Cyber-Victimization (2012). When discussing the risks of cyber-space, she writes,
Another unique feature of cyberspace is that it enables perpetrators to manipulate the victims
identity online. Cyber-abusers can both impersonate their victims and can manipulate others
reactions to their victims. Wrongdoers may engage in identity theft for financial purposes
(p.14). By utilizing the latest antivirus and malware software such as Symantec, reducing the
amount of personal information released on social networking sites and being aware that
attackers are waiting in cyber-land, Internet users can take full advantage of the wonders of the
Internet while reducing the risks of an a attack.
The rapid expansion of Internet provides an endless source for information; however
users must remain diligently to limit or secure their personal information. Users must ensure they
are operating with current anti-virus software or assume the risk malicious attacks. I have
highlighted the causes that make identity theft Americas number one white collar crime. With
the prolific development of the Internet, one of the major roots of cyber-crimes and identity theft
is the fact that technology has transformed at a much faster velocity than businesses and
consumers are able to adapt. Experts in the field, whether they are voicing their opinion on
individual responsibilities or as crime investigators, tell us the individual has more of an impact

Running head: IDENTITY THEFT

10

on protecting their identity security than any other entity. Educating citizens through a multilevel echelon approach is our best defense against the attacks on identities. It is the civic duty at
all levels to open a dialog of communication to these risks and establish the framework for long
lasting changes. Today, there are many feasible options to protect the identity of both the
individual and the reputation of business; the path that the future will take really depends on the
voice of the active citizens, and their willingness to voice their opinions.

Running head: IDENTITY THEFT

11

References
Anonymous, (2012) CNN Money, Best jobs for fast growth, Retrieved from: http://money
.cnn.com/magazines/moneymag/best-jobs/2011/fast-growing-jobs/1.html
Anonymous, (2012) The United States Justice Department Web Site, Retrieved from: http://
www.justice.gov/criminal/fraud/websites/idtheft.html
Anonymous, (2012) The Federal Trade Commission, Identity Theft Site, Retrieved from:
http://www.ftc.gov/bcp/edu/microsites/idtheft/
Biegelman, M., (2009). Identity Theft Handbook: Detection, Prevention and Security,
Retrieved from: http://site.ebrary.com/lib/ashford/docdetail.action?docID=
10297848&p00 =identity%20theft
Chang, C. (2010). Internet Safety Survey: Who Will Protect the Children? Berkeley Technology
Law Journal, 25(1), 501-527. Retrieved from: http://web.ebscohost.com/ehost/pdfviewer
/pdfviewer? vid=36&hid=24&sid=c926990c-4f25-4da0-8549-c4fe54d575c6%40
sessionmgr14
Eastom, C., Taylor, J., (2010) Computer Crime, Investigation, and the Law, Retrieved from:
http://site.ebrary.com/lib/ashford/docDetail.action?docID=10384007&p00=identity%20theft

Haley, K. (2012) Symantec Internet Security Threat Report Pod cast, Retrieved from:
http://www.symantec.com/podcasts/detail.jsp?podid=ent_istr_volume_17

Lipton, J. D. (2011). COMBATING CYBER-VICTIMIZATION. Berkeley Technology Law

Running head: IDENTITY THEFT

12

Journal, 26(2), 1103-1155. Retrieved from: http://web.ebscohost.com/ehost/pdfviewer


/pdfviewer? Sid=c926990c-4f25-4da08549c4fe54d575c6%40sessionmgr14&vid=
22&hid=11
Miglani. J. (2012) Forrester Research World Online Population Forecast 2012 To 2017
(Global), Retrieved from: Http://www.forrester.com/Forrester+Research+World+
Online+Population+Forecast+2012+To+2017+Global/fulltext/-/E-RES81381? Intcmp=
blog:forrlink

Moore, T., & Clayton, R. (2011). The Impact of Public Information on Phishing Attack and
Defense. Communications and Strategies, (81), 45-68. Retrieved from: http://web.
ebscohost.com /ehost/ pdfviewer/pdfviewer?sid=c926990c-4f25-4da0-8549c4fe54d575c6%40sessionmgr14&vid=23&hid=10

You might also like