Identity Theft Crimes

The internet has grown in popularity, and many people use it to do various online activities such as banking and online shopping, among others. However, many individuals throughout the world have expressed concern about their privacy being jeopardized because a lot of information may be or has already been obtained without their consent or knowledge (IDENTITY THEFT JOURNAL, para 1). Most information is gained through signing in to various visited websites, legitimately downloading unsafe files, Trojans that are typically retrieved from emails, cookies, and by accidentally installing viruses and malware to a computer, among other things. Many organizations, for example, banks, retail or wholesale stores, businesses, or government sectors that contain online services have high chances of obtaining their client's private information because of the trust and convenience that the individuals have regarding online services. The procedures violate privacy because the rights of the customers are detached, and the hackers are left alone, free from surveillance and take control of all information shared by customers (Yee, 116). On the other hand, privacy is infringed have no idea of what is being gathered regarding them, the period that the information will be kept private, the aim of collecting the information, and whether a third party will have access to the information.


Increased reliance on digital services has made many organizations vulnerable towards privacy issues (Yee, 116). Infringing the security and confidentiality of shareholders and customers threatens the existence of an organization, removes competitive advantages and shares go down. Moreover, organizations are highly targeted because their information sources are remarkable because the attacker illegally obtains access to their systems. This will not only make them eminence among their fellow hackers but also will make them gain more access to numerous significant information such as numbers of credit cards, their passwords, and usernames that will enable them to commit identity theft. Thus, organizations and businesses should put into practice security measures that will protect them from liabilities, safeguard the investments of their shareholders and also put into action measures that will ensure their accountability and transparency on the information gathered.


Protecting organizations and individual privacy that make use of e-services is more important than installing anti-virus software, applying updates and patches as well as setting up firewalls. Therefore, people should understand the existence of threats and risks and their consequence on individual data and sources, should also understand how different security measures function, their flaws, and implement the best policy that will minimize each risk (Yee, 117). On the other hand, people should also comprehend what needs to be safeguarded, how and from whom it should be safeguarded.


Meaning of Identity Theft


Identity theft is when a person uses another individual's identification information such as a person's name, credit card and Social Security Number (SSN), medical services or any bank account information devoid of consent from the individual. People who acquire such information without the consent of the owner are known as hackers. They use this information to commit crimes, and many people have reported offenses of this nature to the federal trade commission. Individuals are mostly not aware that they are the victim of Identity theft until they realize a financial effect such as mysterious bills, unaccepted loans or card collecting as a result of actions undertaken by the thief under an individual's stolen identity.


The crimes committed by identity thief using an individual's private and personal information include obtaining a credit card with the victim's names as well as buying goods and services using the victim's name. In some cases, the identity bandits personify an individual entirely and use that to commit crimes. According to Glushko, many schemes are used to obtain this valuable information from owners (para 8), and they include


Getting hold of thrown away statements or bills


Obtaining ownership of a stolen or lost wallet


Gaining access to another person's email address


Obtaining another person's credit card report


Through deceitful and elusive scams on the internet


According to the Federal Trade Commission, around 9 million people in America every year experience various types of identity theft. Nevertheless, the number may fluctuate because both the techniques used by hackers to filch identities and the techniques for fighting crimes change with time.


The methods preferred by hackers to fraud private information from people vary and continue to evolve. This implies that the imagination and creativeness of human beings are continual about theft. On the contrary, there are commons ways that hackers use to obtain access to the private information of the victim (IDENTITY THEFT JOURNAL, para 6), and they include


Emails: hackers may steal an individual's email and use it to approve pre-approved credit card bids, open accounts using the victim's name and proceed to a squandering binge.


Trash: hackers are capable of gathering sufficient information from statements on finance, old bills among others to obtain a person's name, bank account number, and name, address among others. They may use this information to apply for new credit cards, and even open bank accounts by assuming a victim's full identity Papadimitriou, para 2).


Phishing: when an individual receives a spurious call from a bank requesting for accurate information for their records or from a friend requesting for assistance financially, that is phishing. Explicitly, cyber crimes are committed when the hackers deceive consumers who do not suspect anything by responding to an email that is intended to get hold of their personal information for deceitful purposes (Privacy Rights Clearinghouse, para 8).


Defrauding: in this case, fraudsters or hackers call pretending to be a bank or retail customer service representative and to deceive an individual thus smoothly obtains the necessary information that will enable them to gain access to banks, medical services among others.


Skimming: this is whereby fraudsters deploy software and inserts it into a device such as ATMs, smartphones or computers that show the bank account information, credit cards or other online banking information (River Hill Bank, para 9).


Grabbing, pickpocketing or stealing people's purses and wallets that have credit cards, ID cards, passports among others in crowded areas (Stroup, para 2).


Data breaching: this is whereby fraudsters obtain customer's personal information from service providers (Stroup, para 13).


Reasons why Identity theft occur


One of the major reasons that to steal people's personal information is the desire to get quick and easy money (Hanks, para 2). Identity theft brings a criminal more money, and that is why many criminals leave drug dealings and burglary crimes so as to make faster money by stealing people's identity information. Therefore, most identity thieves use the money from stealing personal information for their everyday living.Revenge motivesSome cases of identity theft are driven by more personal issues than financial challenges (Hanks, para 3). Such examples of personal driven motives, for instance, the desire to destroy the lives of individuals who have hurt them in the past, in this case, they can be rejected lovers, backbiting partners in business, former friends or can even be a family member who is hurt. This person looking for revenge can decide to withdraw all the cash in the accounts belonging to the person who hurt them; they can choose to post their target's private and sensitive and information and even run-up credit cards.A subsection of individuals who usually look for an easier way to access money are addicts. It mostly happens when drug addicts, alcoholics, and gamblers always look for ways to get quick cash so as satisfy their addictions (Hanks, para 4). This addiction yearns for easier ways of making quick cash to buy drugs, thus settling for pick-pocketing or snatching people's wallets, handbags or purses. Most of the identity thieves often use the stolen identity information as a tool to engage in other dangerous crimes. Most of the time, the owner of the documents is implicated in the crime (Hanks, para 5). More often than not, identity thieves use this to protect or cover their actions and activities. An example of this is a case of a leader of a big technology firm whose personal information was stolen by a disreputable drug dealer who impersonated the leader and used the information to carry out drug deals. One day the criminal was caught only to show documents that showed he was the president of the technology firm. This had put the real leader in trouble and was forced to show a written document from law enforcement agency to confirm that he was not the drug dealer when he was coming back from his business trip abroad. How Consumers and Organization protect their Identity Theft


For people to successfully safeguard their identity, they need to know the manner in which thieves access their personal information. Being aware that identity thieves exist makes people be alert. Moreover, there are other common steps that one has to observe to ensure their personal information and that of their organization is safeguarded. Some of the measures might not be so obvious, but they work when it comes to safeguarding personal information.


Shredding of documents: The practice of shredding documents such as financial documents and other communications that have personal data will help in safeguarding identity theft because the thieves will not find any information in the trash. Besides that, organizations and individuals should invest in shredders which will save the company and individuals from mental torture and money (Papadimitriou, para 19).


Put a Lock on Your Mailbox: one should always restrict the access to their mail box especially when they are not online. This will reduce the probability of an outsider accessing the emails and approving the disapproved credit card offers or get into contact with information that is personal such as the account statements among other sensitive information. According to the good housekeeping magazine, almost 40% of identity thieves, access personal data from individuals mailboxes (Papadimitriou, para 20).


Reduce Pre-approved Offers: Reduce the number of prescreened offers that one gets through the mail by using the online forms to fill in details (Papadimitriou, para 21). Additionally, before providing personal information, one has to countercheck with the concerned institution why they need the information.


Guard your Social Security Number: An individual's social security number is always the most needed and valuable information needed by identity thieves. Therefore, people should take serious precaution to safeguard their SSN (Dr. Rebovich, para 4). Social security number are usually not needed all the time everywhere, so it is recommended that people keep them safe in a safe box at home and avoid walking with them in their wallets or purses (True Identity, para 2).


Enter financial information on official websites that are secure: all financial information should never be sent using websites that are not secure. All the vital data should be sent through websites or emails that begin with https. Most of the online ways of communication are prone to hackers. Individuals should choose websites that support an inscription of 128-bit (Papadimitriou, para 23).


Protect Your PIN: One is held responsible for an automated teller machine or a debit card if their real pin is accessed. Many times it is difficult for thieves to have access to another person's PIN than a physical car. It is also the responsibility of people to keep their PIN as a secret (Papadimitriou, para 24).


Do not reply to Unsolicited Demands for Information: People should never give out information if they did not ask to be contacted concerning an issue. Sometimes thieves may come to your door; someone may make calls to your house or may send an email asking for private information. Avoid replying to such calls or email because it is not easy to confirm if the person calling is an imposter or a genuine one. It is recommended that one calls the company directly to verify the information. One should never give personal information to the unknown person or give information over the phone.


Reviling personal information on a website: Several websites tend to ask individuals to fill in forms or give information that is personal. One should be careful before giving out this information, and should thoroughly go through the website private policy to be sure they are not distributing their information to fraudsters or hackers.


Be careful of the Surroundings: when making a phone call always keep in mind the people around you especially in public places (Papadimitriou, para 33). A smart identity thief will follow the conversation. They can follow the discussion keenly, and if you are giving out personal information such as your Social Security Number, the number for the credit card, date of birth or even the expiry date, they will capture that very fast and act as quickly as possible ahead of the concerned person. Hence, they go ahead and change the account and may commit crimes using the account.


Leave No Room For Doubt: Do not leave the last total of a transaction open for the explanation. Such that when one has finished paying a bill, they should always make sure they complete the tip space on a bill even if they are not going to pay the tip.


Know Your Wallet: it is important to know what one is carrying in their wallet; this will help know what information they will lose to a pickpocket. This will help them prevent any impending fraud by reporting the loss of vital documents to the authority. One doctor from the University of Texas-Dallas recommends that people should make photocopies of every valuable item in their wallets; with this it is easier to recover the documents whenever they are lost.


Conclusion


As much as Identity theft is increasing, people should be on top of the game by knowing how to safeguard their personal information. Various techniques have been discussed above, thus making protection much easier. Organizations and individuals should always shred their unwanted documents and be aware of their surroundings. In case an individual's wallet or purses that contain personal information is stolen, they should report instantly to the authority and communicate to all creditors alerting them about the theft.


Moreover, people should ensure their credit cards information is never leaked to a third party. In addition to that, people should check their account statement regularly. People should also monitor their accounts by putting security alert that will alert them in case any information is changed or whenever an account is being operated by a third part.


Work Cited


Dr. Rebovich, Donald. Identity Crimes: Prevention Methods. Weblog Post.


[email protected]. Center for Identity Management and Information Protection, Utica, NY, 2009, http://www.utica.edu/academic/institutes/cimip/idcrimes/prevention.cfm. Accessed on May 6, 2017.


Glushko, Samuelson. Identity Theft. Web. CIPPIC, Canadian Internet Policy Public


Internet Clinic, University of Ottawa, March 2005, https://cippic.ca/en/identity-theft-faq. Accessed May 7, 2017


Hanks, Gerald. Reasons Why Identity Theft Occurs. Sapling, October 15, 2010,


https://www.sapling.com/7341860/reasons-identity-theft-occurs. Accessed May 6, 2017


IDENTITY THEFT JOURNAL. The Most Common Causes of Identity Theft and How to


Protect Yourself. Reviews of Identity Theft Services, identitytheftjournal.com, 2017, ww.identitytheftjournal.com/common-causes-identity-theft/. Accessed May 7, 2017


Papadimitriou, Odysseas. "Identity Theft: What It Is, How It Happens & the Best


Protection." Weblog Post, identity theft, WalletHub, Nov 29, 2016. Web. Accessed May 6, 2017, https://wallethub.com/edu/identity-theft/17120/


Privacy Rights Clearinghouse. How to Reduce Your Risk of Identity Theft. Web. Privacy


Rights Clearinghouse, Feb 01 2017, https://www.privacyrights.org/consumer-guides/how-reduce-your-risk-identity-theft. Accessed May 6, 2017.


River Hill Bank. Identity Theft Protection: Safeguarding Your Personal and Account


Information.Riverhillbank.com, 2017, https://www.riverhillsbank.com/consumer-protection/identity-theft-protection/# Accessed May 6, 2017.


Stroup, Jake. How Identity Theft Happens. The balance, September 09, 2016,


https://www.thebalance.com/low-tech-identity-theft-1947523. Accessed May 6, 2017


True Identity. ID Theft Resources: How does identity theft happen? TransUnion LLC,


2016, https://www.trueidentity.com/identity-theft-resource/how-it-happens. Accessed May 7, 2017


Yee, George. Privacy Protection for E-Services. Hershey, PA: Idea Group Pub, 2006.


Print.

Deadline is approaching?

Wait no more. Let us write you an essay from scratch

Receive Paper In 3 Hours
Calculate the Price
275 words
First order 15%
Total Price:
$38.07 $38.07
Calculating ellipsis
Hire an expert
This discount is valid only for orders of new customer and with the total more than 25$
This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Find Out the Cost of Your Paper

Get Price