Identity theft: Difference between revisions
(New page: ==Identity theft== ==Cumulative Supplement== '''Cases:''' Identity theft statute, as applied to defendant, was not unconstitutionally vague, as would violate due process; statute explic...) |
No edit summary |
||
Line 1: | Line 1: | ||
==Identity theft== | '''Identity theft''' IS A FORM of stealing another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if he or she is held accountable for the perpetrator's actions. Organizations and individuals who are duped or defrauded by the identity thief can also suffer adverse consequences and losses, and to that extent are also victims. | ||
The term ''identity theft'' was coined in 1964 and is actually a misnomer because it is not literally possible to steal an [[Personal identity (philosophy)|identity]] as such - more accurate terms would be ''identity fraud'' or impersonation or ''identity cloning'', but ''identity theft'' has become commonplace. | |||
"Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained," and identity theft is not always detectable by the individual victims, according to a report done for the FTC. Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A US Government Accountability Office study determined that "most breaches have not resulted in detected incidents of identity theft". The report also warned that "the full extent is unknown". A later unpublished study by Carnegie Mellon University noted that "Most often, the causes of identity theft is not known," but reported that someone else concluded that "the probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%". More recently, an association of consumer data companies noted that one of the largest data breaches ever, accounting for over four million records, resulted in only about 1,800 instances of identity theft, according to the company whose systems were breached. | |||
A recent article entitled, “Cyber Crime Made Easy" explained the level to which hackers are using malicious software. As one security specialist named Gunter Ollmann said, “Interested in credit card theft? There’s an app for that.” This statement summed up the ease with which these hackers are accessing all kinds of information online. The new program for infecting users’ computers is called [[Zeus (trojan horse)|Zeus]]; and the program is so hacker friendly that even an inexperienced hacker can operate it. Although the hacking program is easy to use, that fact does not diminish the devastating effects that Zeus (or other software like Zeus) can do to a computer and the user. For example, the article stated that programs like Zeus can steal credit card information, important documents, and even documents necessary for homeland security. If the hacker were to gain this information, it would mean identity theft or even a possible terrorist attack. (Giles, Jim. "Cyber Crime Made Easy." New Scientist 205.2752 (2010): 20-21. Academic Search Premier. EBSCO. Web. 3 Oct. 2010.) | |||
== Types == | |||
Sources such as the non-profit Identity Theft Resource Center sub-divide identity theft into five categories: | |||
* Criminal identity theft (posing as another person when apprehended for a crime) | |||
* Financial identity theft (using another's identity to obtain credit, goods and services) | |||
* Identity cloning (using another's information to assume his or her identity in daily life) | |||
* Medical identity theft (using another's identity to obtain medical care or drugs) | |||
* Child identity theft. | |||
Identity theft may be used to facilitate or fund other crimes including illegal immigration, terrorism, [[phishing]] and espionage. There are cases of identity cloning to attack payment systems, including online credit card processing and medical insurance. | |||
Usually, identity thieves are attention seekers, do it for fun, revenge or to malign somebody’s reputation. Occasionally, they impersonate others for non-financial reasons—for instance, to receive praise or attention for the victim's achievements. | |||
=== Identity cloning and concealment === | |||
In this situation, the identity thief impersonates someone else in order to conceal their own true identity. Examples might be illegal immigrants, people hiding from creditors or other individuals, or those who simply want to become "anonymous" for personal reasons. Another example are ''posers'', a label given to people who use somebody else’s photos and information through social networking sites. Mostly, posers create believable stories involving friends of the real person they are imitating. Unlike identity theft used to obtain credit which usually comes to light when the debts mount, concealment may continue indefinitely without being detected, particularly if the identity thief is able to obtain false credentials in order to pass various authentication tests in everyday life. | |||
=== Criminal identity theft === | |||
When a criminal fraudulently identifies himself to police as another individual at the point of arrest, it is sometimes referred to as "Criminal Identity Theft." In some cases criminals have previously obtained state-issued identity documents using credentials stolen from others, or have simply presented fake ID. Provided the subterfuge works, charges may be placed under the victim's name, letting the criminal off the hook. Victims might only learn of such incidents by chance, for example by receiving court summons, discovering their drivers licenses are suspended when stopped for minor traffic violations, or through background checks performed for employment purposes. | |||
It can be difficult for the victim of a criminal identity theft to clear their record. The steps required to clear the victim's incorrect criminal record depend on what jurisdiction the crime occurred in and whether the true identity of the criminal can be determined. The victim might need to locate the original arresting officers and prove their own identity by some reliable means such as fingerprinting or DNA fingerprinting, and may need to go to a court hearing to be cleared of the charges. Obtaining an expungement of court records may also be required. Authorities might permanently maintain the victim's name as an alias for the criminal's true identity in their criminal records databases. One problem that victims of criminal identity theft may encounter is that various data aggregators might still have the incorrect criminal records in their databases even after court and police records are corrected. Thus it is possible that a future background check will return the incorrect criminal records. This is just one example of the kinds of impact that may continue to affect the victims of identity theft for some months or even years after the crime, aside from the psychological trauma that being 'cloned' typically engenders. | |||
=== Synthetic identity theft === | |||
A variation of identity theft which has recently become more common is ''synthetic identity theft'', in which identities are completely or partially fabricated. The most common technique involves combining a real [[social security number]] with a name and birth date other than the ones associated with the number. Synthetic identity theft is more difficult to track as it doesn't show on either person's credit report directly, but may appear as an entirely new file in the credit bureau or as a subfile on one of the victim's credit reports. Synthetic identity theft primarily harms the creditors who unwittingly grant the fraudsters credit. Individual victims can be affected if their names become confused with the synthetic identities, or if negative information in their subfiles impacts their credit ratings. | |||
=== Medical identity theft === | |||
Medical identity theft occurs when someone uses a person's name and sometimes other parts of their identity—such as insurance information—without the person's knowledge or consent to obtain medical services or goods, or uses the person’s identity information to make false claims for medical services or goods. Medical identity theft frequently results in erroneous entries being put into existing medical records, which may in turn lead to inappropriate and potentially life-threatening decisions by medical staff. | |||
=== Child identity theft === | |||
Child identity theft occurs when a minor’s Social Security number is used by another person for the imposter’s personal gain. The imposter can be a family member, a friend, or even a stranger who targets children. The Social Security numbers of children are valued because they do not have any information associated with them. Thieves can establish lines of credit, obtain driver’s licenses, or even buy a house using a child’s identity. This fraud can go undetected for years, as most children don’t discover the problem until years later. Child identity theft is fairly common, and studies have shown that the problem is growing. The largest study on child identity theft, as reported by Richard Power of the Carnegie Mellon Cylab with data supplied by AllClear ID, found that of 40,000 children 10.2% were victims of identity theft. | |||
== Techniques for obtaining and exploiting personal information for identity theft == | |||
Identity thieves typically obtain and exploit [[Personally identifiable information]] about individuals, or various credentials they use to authenticate themselves, in order to impersonate them. Examples include: | |||
* Rummaging through rubbish for personal information (Dumpster diving) | |||
* Retrieving personal data from redundant IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold on without having been properly sanitized | |||
* Using public records about individual citizens, published in official registers such as electoral rolls | |||
* Stealing bank or credit cards, identification cards, passports, authentication tokens ... typically by pickpocketing, burglary or mail theft | |||
* [[Skimming (credit card fraud)|Skimming]] information from bank or credit cards using compromised or hand-held card readers, and creating clone cards | |||
* Using [[Wireless identity theft|'contactless' credit card readers]] to acquire data wirelessly from RFID-enabled passports | |||
* Observing users typing their login credentials, credit/calling card numbers etc. into IT equipment located in public places ([[Shoulder surfing (computer security)|shoulder surfing]]) | |||
* Stealing personal information from computers using [[malware]], particularly [[Trojan horse (computing)|Trojan horse]] [[keystroke logging]] programs or other forms of [[spyware]] | |||
* [[Hacker (computer security)|Hacking]] computer networks, systems and databases to obtain personal data, often in large quantities | |||
* Exploiting [[Data breach|breaches]] that result in the publication or more limited disclosure of personal information such as names, addresses, Social Security number or credit card numbers | |||
* Advertising bogus job offers in order to accumulate curriculum vitae and applications typically disclosing applicants' names, home and email addresses, telephone numbers and sometimes their banking details | |||
* Exploiting insider access and abusing the rights of privileged IT users to access personal data on their employers' systems | |||
* Infiltrating organizations that store and process large amounts or particularly valuable personal information | |||
* Impersonating trusted organizations in emails, SMS text messages, phone calls or other forms of communication in order to dupe victims into disclosing their personal information or login credentials, typically on a fake corporate website or data collection form ([[phishing]]) | |||
* Brute-force attacking weak passwords and using inspired guesswork to compromise weak password reset questions | |||
* Obtaining castings of fingers for falsifying [[fingerprint identification]]. | |||
* Browsing social network service websites for personal details published by users, often using this information to appear more credible in subsequent social engineering activities | |||
* Diverting victims' email or post in order to obtain personal information and credentials such as credit cards, billing and bank/credit card statements, or to delay the discovery of new accounts and credit agreements opened by the identity thieves in the victims' names | |||
* Using false pretenses to trick individuals, customer service representatives and help desk workers into disclosing personal information and login details or changing user passwords/access rights ([[pretexting]]) | |||
* Stealing cheques (checks) to acquire banking information, including account numbers and Routing transit number | |||
* Guessing Social Security numbers by using information found on Internet social networks such as Facebook and MySpace | |||
* Low security/privacy protection on photos that are easily clickable and downloaded on social networking sites. | |||
* Befriending strangers on social networks and taking advantage of their trust until private information are given. | |||
== Individual identity protection == | |||
The acquisition of personal identifiers is made possible through serious breaches of [[privacy]]. For consumers, this is usually a result of them naively providing their personal information or login credentials to the identity thieves as a result of being duped but identity-related documents such as credit cards, bank statements, utility bills, checkbooks etc. may also be physically stolen from vehicles, homes and offices, or directly from victims by pickpockets and bag snatchers. Guardianship of personal identifiers by consumers is the most common intervention strategy recommended by the [[US Federal Trade Commission]], PhoneBusters and most sites that address identity theft. Such organizations offer recommendations on how individuals can prevent their information falling into the wrong hands. | |||
Identity theft can be partially mitigated by ''not'' identifying oneself unnecessarily (a form of information security control known as risk avoidance). This implies that organizations, IT systems and procedures should not demand excessive amounts of personal information or credentials for identification and authentication. Requiring, storing and processing personal identifiers (such as Social Security number, national identification number, drivers license number, credit card number, etc.) increases the risks of identity theft unless this valuable personal information is adequately secured at all times. | |||
To protect themselves against electronic identity theft by [[phishing]], [[hacker (computer security)|hacking]] or malware, individuals are well advised to maintain [[computer security]], for example by keeping their operating system fully patched against known security vulnerabilities, running antivirus software and being cautious in their use of IT. | |||
Identity thieves sometimes impersonate dead people, using personal information obtained from death notices, gravestones and other sources to exploit delays between the death and the closure of the person's accounts, the inattentiveness of grieving families and weaknesses in the processes for credit-checking. Such crimes may continue for some time until the deceased's families or the authorities notice and react to anomalies. | |||
In recent years, commercial identity theft protection/insurance services have become available in many countries. These services purport to help protect the individual from identity theft or help detect that identity theft has occurred in exchange for a monthly or annual membership fee or premium. The services typically work either by setting fraud alerts on the individual's credit files with the three major credit bureaus or by setting up credit report monitoring with the credit bureau. While identity theft protection/insurance services have been heavily marketed, their value has been called into question. | |||
== Identity protection by organizations == | |||
In their May 1998 testimony before the United States Senate, the Federal Trade Commission (FTC) discussed the sale of Social Security numbers and other personal identifiers by credit-raters and data miners. The FTC agreed to the industry's self-regulating principles restricting access to information on credit reports. According to the industry, the restrictions vary according to the category of customer. Credit reporting agencies gather and disclose personal and credit information to a wide business client base. | |||
Poor stewardship of personal data by organizations, resulting in unauthorized access to sensitive data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse has documented over 900 individual data breaches by US companies and government agencies since January 2005, which together have involved over 200 million total records containing sensitive personal information, many containing social security numbers. Poor corporate diligence standards which can result in data breaches include: | |||
* failure to shred confidential information before throwing it into dumpsters | |||
* failure to ensure adequate [[network security]] | |||
* the theft of laptop computers or portable media being carried off-site containing vast amounts of personal information. The use of strong [[encryption]] on these devices can reduce the chance of data being misused should a criminal obtain them. | |||
* the brokerage of personal information to other businesses without ensuring that the purchaser maintains adequate security controls | |||
* Failure of governments, when registering sole proprietorships, partnerships, and corporations, to determine if the officers listed in the Articles of Incorporation are who they say they are. This potentially allows criminals access to personal information through credit rating and [[data mining]] services. | |||
The failure of corporate or government organizations to protect [[consumer privacy]], [[client confidentiality]] and [[political privacy]] has been criticized for facilitating the acquisition of personal identifiers by criminals. | |||
Using various types of [[biometric]] information, such as fingerprints, for identification and authentication has been cited as a way to thwart identity thieves, however there are technological limitations and privacy concerns associated with these methods as well. | |||
== Regional legal responses == | |||
=== Australia === | |||
In Australia, each state has enacted laws that dealt with different aspects of identity or fraud issues. Some States have now amended relevant criminal laws to reflect crimes of identity theft, such as the Criminal Law Consolidation Act 1935 (SA), Crimes Amendment (Fraud, Identity and Forgery Offenses) Act 2009 and also in Queensland under the Criminal Code 1899 (QLD). Other States and Territories are in states of development in respect of regulatory frameworks relating to identity theft such as Western Australia in respect of Criminal Code Amendment (Identity Crime) Bill 2009. | |||
On the Commonwealth level, under the ''Criminal Code Amendment (Theft, Fraud, Bribery & Related Offenses) Act 2000'' which amended certain provisions within the ''Criminal Code Act 1995'', | |||
:{{Cquote|'''135.1 General dishonesty''' | |||
(3) A person is guilty of an offense if: | |||
a) the person does anything with the intention of dishonestly ''causing a loss to another person''; and | |||
b) the other person is a Commonwealth entity. | |||
Penalty: ''Imprisonment for 5 years''.}} | |||
Likewise, each state has enacted their own privacy laws to prevent misuse of personal information and data. The Commonwealth ''Privacy Act'' is applicable only to Commonwealth and territory agencies, and to certain private sector bodies (where for example they deal with sensitive records, such as medical records, or they have more than $3 million turnover PA). | |||
=== Canada === | |||
Under section 402.2 of the ''Criminal Code of Canada,'' | |||
:{{Cquote|Everyone commits an offense who knowingly obtains or possesses another person’s identity information in circumstances giving rise to a reasonable inference that the information is intended to be used to commit an indictable offense that includes fraud, deceit or falsehood as an element of the offense. | |||
is guilty of an indictable offense and liable to imprisonment for a term of not more than five years; or is guilty of an offense punishable on summary conviction.}} | |||
Under section 403 of the ''Criminal Code of Canada,'' | |||
:{{Cquote|(1) Everyone commits an offense who fraudulently impersonates another person, living or dead, | |||
(a) with intent to gain advantage for themselves or another person; | |||
(b) with intent to obtain any property or an interest in any property; | |||
(c) with intent to cause disadvantage to the person being impersonated or another person; or | |||
(d) with intent to avoid arrest or prosecution or to obstruct, pervert or defeat the course of justice. | |||
is guilty of an indictable offense and liable to imprisonment for a term of not more than 10 years; or guilty of an offense punishable on summary conviction.}} | |||
In Canada, ''Privacy Act'' (federal legislation) covers only federal government, agencies and crown corporations. Each province and territory has its own privacy law and privacy commissioners to limit the storage and use of personal data. | |||
For the private sector, the purpose of the Personal Information Protection and Electronic Documents Act ( 2000, c. 5 ) (known as PIPEDA) is to establish rules to govern the collection, use and disclosure of personal information; except for the provinces of Quebec, Ontario, Alberta and British Columbia were provincial laws have been deemed substantially similar. | |||
=== France === | |||
In France, a person convicted of identity theft can be sentenced up to five years in prison and fined up to euro 75,000. | |||
=== Hong Kong === | |||
Under HK Laws. Chap 210 ''Theft Ordinance'', sec. 16A Fraud | |||
:{{Cquote|(1) If any person by any deceit (whether or not the deceit is the sole or main inducement) and with '''intent to defraud''' induces another person to commit an act or make an omission, which results either- | |||
(a) in '''benefit to any person''' other than the second-mentioned person; or | |||
(b) in prejudice or a substantial risk of prejudice to any person other than the first-mentioned person, | |||
the first-mentioned person commits the offense of fraud and is liable on conviction upon indictment to '''imprisonment for 14 years'''.}} | |||
Under the ''Personal Data (Privacy) Ordinance'', it established the post of Privacy Commissioner for Personal Data and mandate how much personal information one can collect, retain and destruction. This legislation also provides citizens the right to request information held by businesses and government to the extent provided by this law. | |||
=== India === | |||
Under the Information Technology Act 2000 Chapter IX Sec 43 (b) | |||
:{{Cquote|If any person without permission of the owner or any other person who is in charge of a computer, computer system or computer network, | |||
(b) downloads, copies or extracts any data, computer data base or information | |||
from such computer, computer system or computer network including information or | |||
data held or stored in any removable storage medium; | |||
he shall be liable to pay damages by way of compensation not exceeding one crore rupees | |||
to the person so affected.}} | |||
=== Philippines === | |||
Social networking sites are one of the most famous spreader of ''posers'' in the online community, giving the users freedom to place any information they want without any verification that the account is being used by the real person. | |||
Philippines, known as the 10th heavy users of Facebook and other social networking sites such as Twitter, Multiply and Tumblr has been known as source to various identity theft problems. Identity of those people who carelessly put personal information on their profiles can easily be stolen just by simple browsing. There are people who meet online, get to know each other through the free Facebook chat and exchange of messages that then leads to sharing of private information. Others get romantically involved with their online friends that they tend to give too much information such as their social security number, bank account and even personal basic information such as home address and company address. | |||
This phenomena lead to the creation of Senate Bill 52: Cyber-crime Prevention Act of 2010. Section 2 of this bill states that it recognizes the importance of communication and multimedia for the development, exploitation and dissemination of information but violators will be punished by the law through imprisonment of ''prison mayor'' or a fine ranging from Php200,000 and up, but not exceeding 1 million, or depending on the damage caused, or both (Section 7). | |||
=== Sweden === | |||
Sweden have had relatively little problems with identity theft. This is because only Swedish [[identity document]]s have been accepted for identity verification. Stolen documents are traceable by banks and some other institutions. The banks have the duty to check the identity of people withdrawing money or getting loans. If a bank gives money to someone using an identity document reported as stolen, the bank must take the loss. From 2008 any EU passport are valid in Sweden for identity check, and Swedish passports are valid all over the EU. This makes it harder to detect stolen documents, but still banks in Sweden must ensure that stolen documents are not accepted. | |||
Other types of identity theft than over the bank desk have become more common in Sweden. One common example is ordering a credit card to someone who has an unlocked letterbox and is not home on daytime. The thief steals the letter with the credit card and then the letter with the code which typically arrives a few days later. Usage of a stolen credit card is hard in Sweden, since an identity document or a PIN code it is normally demanded. If the shop does not demand that, it must take the loss from stolen credit cards. The method of observing someone using the credit card PIN code, stealing the card or [[skimming (credit card fraud)|skimming]] it, and then use the card, has become more common. | |||
Legally, Sweden is an open society. [[Freedom of information legislation|The Principle of Public Access]] says that all information kept by public authorities must be available for anyone except in certain cases. Specifically anyone's address, income, taxes etc. are available to anyone. This makes fraud easier (the address is protected for certain people needing it). | |||
To impersonate someone else and gain money from it is a kind of [[fraud]], which is described in the [[Criminal Code]] (Swedish:Brottsbalken). | |||
=== United Kingdom === | |||
In the United Kingdom personal data is protected by the [[Data Protection Act 1998]]. The Act covers all personal data which an organization may hold, including names, birthday and anniversary dates, addresses, telephone numbers, etc. | |||
Under English law (which extends to Wales but not necessarily to Northern Ireland or Scotland), the [[Deception (criminal law)|deception]] offenses under the [[Theft Act 1968]] increasingly contend with identity theft situations. In ''R v Seward'' (2005) EWCA Crim 1941 the defendant was acting as the "front man" in the use of stolen credit cards and other documents to obtain goods. He obtained goods to the value of £10,000 for others who are unlikely ever to be identified. The Court of Appeal considered sentencing policy for deception offenses involving "identity theft" and concluded that a prison sentence was required. Henriques J. said at para 14:"Identity fraud is a particularly pernicious and prevalent form of dishonesty calling for, in our judgment, deterrent sentences." | |||
Increasingly, organizations, including Government bodies will be forced to take steps to better protect their users' data. | |||
Stats released by CIFAS - The UK's Fraud Prevention Service show that there were 89,000 victims of identity theft in the UK 2010. This compared with 2009 where there were 85,000 victims. Men in their 30s and 40s are the most common UK victims and identity fraud now accounts for nearly half of all frauds recorded. | |||
=== United States === | |||
The increase in crimes of identity theft led to the drafting of the Identity Theft and Assumption Deterrence Act. In 1998, The Federal Trade Commission appeared before the United States Senate. The FTC discussed crimes which exploit consumer credit to commit loan fraud, mortgage fraud, lines-of-credit fraud, [[credit card fraud]], commodities and services frauds. The Identity Theft Deterrence Act (2003)ITADA amended [http://www.law.cornell.edu/uscode/uscode18/usc_sec_18_00001028---A000-.html U.S. Code Title 18, § 1028] ("Fraud related to activity in connection with identification documents, authentication features, and information"). The statute now makes the possession of any "means of identification" to "knowingly transfer, possess, or use without lawful authority" a federal crime, alongside unlawful possession of identification documents. However, for federal jurisdiction to prosecute, the crime must include an "identification document" that either: (a) is purportedly issued by the United States, (b) is used or intended to defraud the United States, (c) is sent through the mail, or (d) is used in a manner that affects interstate or foreign commerce. ''See'' (c). Punishment can be up to 5, 15, 20, or 30 years in federal prison, plus fines, depending on the underlying crime per (b). In addition, punishments for the unlawful use of a "means of identification" were strengthened in § 1028A ("Aggravated Identity Theft"), allowing for a consecutive sentence under specific enumerated felony violations as defined in § 1028A(c)(1) through (11). | |||
The Act also provides the [[Federal Trade Commission]] with authority to track the number of incidents and the dollar value of losses. Their figures relate mainly to consumer financial crimes and not the broader range of all identification-based crimes. | |||
If charges are brought by state or local law enforcement agencies, different penalties apply depending on the state. | |||
Six Federal agencies conducted a joint task force to increase the ability to detect identity theft. Their joint recommendation on "red flag" guidelines is a set of requirements on financial institutions and other entities which furnish credit data to credit reporting services to develop written plans for detecting identity theft. The FTC has determined that most medical practices are considered creditors and are subject to requirements to develop a plan to prevent and respond to patient identity theft. | |||
Identity theft complaints as a percentage of all fraud complaints decreased from 2004-2006. The Federal Trade Commission reported that fraud complaints in general were growing faster than ID theft complaints. The findings were similar in two other FTC studies done in 2003 and 2005. In 2003, 4.6 percent of the US population said they were a victim of ID theft. In 2005, that number had dropped to 3.7 percent of the population. The Commission's 2003 estimate was that identity theft accounted for some $52.6 billion of losses in the preceding year alone and affected more than 9.91 million Americans; the figure comprises $47.6 billion lost by businesses and $5 billion lost by consumers. | |||
According to the Federal Trade Commission (FTC), a report released in 2007 revealed that 8.3 million American adults, or 3.7 percent of all American adults, were victims of identity theft in 2005. | |||
The latest report from the FTC showed that ID theft increased by 21% in 2008. However, credit card fraud, that crime which is most closely associated with the crime of ID theft, has been declining as a percentage of all ID theft. In 2002, 41% of all ID theft complaints involved a credit card. That percentage has dropped to 21% in 2008. | |||
Two states, California and Wisconsin have created an Office of Privacy Protection to assist their citizens in avoiding and recovering from identity theft. | |||
In Massachusetts in 2009-2010, Governor Deval Patrick made a commitment to balance consumer protection with the needs of small business owners. His Office of Consumer Affairs and Business Regulation announced certain adjustments to Massachusetts' identity theft regulations that maintain protections and also allows flexibility in compliance. These updated regulations went into effect on March 1, 2010. The regulations are clear that their approach to data security is a risk-based approach important to small businesses and might not handle a lot of personal information about customers. | |||
==== Notification ==== | |||
Most states followed California's lead and enacted mandatory data breach notification laws. As a result, companies that report a data breach typically report it to all their customers. | |||
== Spread and impact == | |||
Surveys in the USA from 2003 to 2006 showed a decrease in the total number of victims and a decrease in the total value of identity fraud from US$47.6 billion in 2003 to $15.6 billion in 2006. The average fraud per person decreased from $4,789 in 2003 to $1,882 in 2006. | |||
The 2003 survey from the Identity Theft Resource Center found that: | |||
* Only 15% of victims find out about the theft through proactive action taken by a business | |||
* The average time spent by victims resolving the problem is about 330 hours | |||
* 73% of respondents indicated the crime involved the thief acquiring a credit card | |||
In a widely publicized account, Michelle Brown, a victim of identity fraud, testified before a U.S. Senate Committee Hearing on Identity Theft. Ms. Brown testified that: "over a year and a half from January 1998 through July 1999, one individual impersonated me to procure over $50,000 in goods and services. Not only did she damage my credit, but she escalated her crimes to a level that I never truly expected: she engaged in drug trafficking. The crime resulted in my erroneous arrest record, a warrant out for my arrest, and eventually, a prison record when she was booked under my name as an inmate in the Chicago Federal Prison." | |||
In Australia, identity theft was estimated to be worth between AUS $1billion and AUS $4 billion per annum in 2001. | |||
In the United Kingdom the Home Office reported that identity fraud costs the UK economy £1.2 billion annually (experts believe that the real figure could be much higher) although privacy groups object to the validity of these numbers, arguing that they are being used by the government to push for introduction of British national identity card. Confusion over exactly what constitutes identity theft has led to claims that statistics may be exaggerated. | |||
An extensively reported study from Microsoft Research in 2011 finds that estimates of identity theft losses contain enormous exaggerations, writing that surveys "are so compromised and biased that no faith whatever can be placed in their findings." | |||
== Famous identity thieves == | |||
* Frank Abagnale | |||
* Albert Gonzalez | |||
* Radovan Karadžić | |||
* Michael Sabo | |||
* John Stape | |||
== See also == | |||
* [[2007 UK child benefit data misplacement]] | |||
* [[201 CMR 17.00]] (Massachusetts personal information protection law) | |||
* [[Bank fraud]] | |||
* [[Capgras delusion]] | |||
* [[Check fraud]] | |||
* [[Check washing]] | |||
* [[Credit card fraud]] | |||
* [[Credit profile number]] | |||
* [[Fair and Accurate Credit Transactions Act]] | |||
* [[Fair Credit Billing Act]] | |||
* [[Fair Credit Reporting Act]] | |||
* [[Ghosting (identity theft)]] | |||
* [[Hacking]] | |||
* [[Identity document forgery]] | |||
* [[Identity fraud]] | |||
* [[Identity score]] | |||
* [[Impostor]] | |||
* [[Lapsed lurker]] | |||
* [[Pharming]] | |||
* [[Phishing]] | |||
* [[RFID]] | |||
* [[Spam (Electronic)|Spam]] | |||
* [[Wireless identity theft]] | |||
==External links== | |||
* [http://www.criminal-justice-careers.com/crime/id-theft.html The New Era of Identity Theft]–[Criminal Justice Resources] | |||
* [http://www.ftc.gov/bcp/edu/microsites/idtheft/ Identity theft] – United States [[Federal Trade Commission]] | |||
* [http://www.idtheft.gov The President’s Task Force on Identity Theft] – a government task force established by US President George W. Bush to fight identity theft. | |||
* {{dmoz|Society/Crime/Theft/Identity_Theft}} | |||
* [http://www.mysecurecyberspace.org/encyclopedia/index/identity-theft.html#msc.encyclopedia.identitytheft Identity Theft] – Carnegie Mellon University | |||
* [http://www.ojp.usdoj.gov/nij/topics/crime/id-theft/welcome.htm Identity Theft: A Research Review, National Institute of Justice 2007] | |||
* [http://www.usdoj.gov/criminal/fraud/websites/idtheft.html Identity Theft and Fraud] – [[United States Department of Justice]] | |||
* [http://www.getidsmart.com/ Get ID Smart] 'Public service site offering free prevention tips' | |||
* [http://www.msnbc.msn.com/id/17805134/ Dateline NBC investigation] 'To Catch an ID Thief' | |||
* [http://incredibleinternet.com/identity-theft/id-theft-curriculum Downloadable identity theft curriculum for educators] | |||
* {{cite news |first= |last= |coauthors= |title=Transcript of Attorney General Alberto R. Gonzales and FTC Chairman Deborah Platt Majoras Announcing the Release of the President's Identity Theft Task Force |date=April 23, 2007 |publisher= |url=http://www.usdoj.gov/ag/speeches/2007/ag_speech_0704231.html |work=US Department of Justice |pages= |accessdate=2007-04-24 | |||
|language= |archiveurl = http://web.archive.org/web/20070911112747/http://www.usdoj.gov/ag/speeches/2007/ag_speech_0704231.html |archivedate = September 11, 2007}} | |||
* [http://farsec.net/?id=4e212081 Preventing ID theft] | |||
==Cumulative Supplement== | ==Cumulative Supplement== | ||
'''Cases:''' | '''Cases:''' | ||
Identity theft statute, as applied to defendant, was not unconstitutionally vague, as would violate due process; statute explicitly prohibited an individual from improperly accessing another's account at a financial institution, and that was exactly what defendant did by misappropriating victim's Social Security number, using the number to obtain Social Security card and driver's license in victim's name, and using card and license to obtain a job, at which job defendant's wages were reported to Internal Revenue Service (IRS) in victim's name, so that defendant accessed victim's account with IRS and thereby the United States Treasury, which was the nation's foremost banking institution. U.S.C.A. Const.Amend. 14; West's Ga.Code Ann. §§ 16-9-120(5)(F), 16-9-121. Hernandez v. State, 281 Ga. 559, 639 S.E.2d 473 (2007); West's Key Number Digest, Constitutional Law 258(3.1). | |||
Identity | [[Category:Identity]] | ||
[[Category:Theft]] | |||
[[Category:Crimes]] | |||
[[Category:Personal identification documents]] |
Revision as of 14:33, 12 November 2011
Identity theft IS A FORM of stealing another person's identity in which someone pretends to be someone else by assuming that person's identity, typically in order to access resources or obtain credit and other benefits in that person's name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if he or she is held accountable for the perpetrator's actions. Organizations and individuals who are duped or defrauded by the identity thief can also suffer adverse consequences and losses, and to that extent are also victims.
The term identity theft was coined in 1964 and is actually a misnomer because it is not literally possible to steal an identity as such - more accurate terms would be identity fraud or impersonation or identity cloning, but identity theft has become commonplace.
"Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained," and identity theft is not always detectable by the individual victims, according to a report done for the FTC. Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A US Government Accountability Office study determined that "most breaches have not resulted in detected incidents of identity theft". The report also warned that "the full extent is unknown". A later unpublished study by Carnegie Mellon University noted that "Most often, the causes of identity theft is not known," but reported that someone else concluded that "the probability of becoming a victim to identity theft as a result of a data breach is ... around only 2%". More recently, an association of consumer data companies noted that one of the largest data breaches ever, accounting for over four million records, resulted in only about 1,800 instances of identity theft, according to the company whose systems were breached.
A recent article entitled, “Cyber Crime Made Easy" explained the level to which hackers are using malicious software. As one security specialist named Gunter Ollmann said, “Interested in credit card theft? There’s an app for that.” This statement summed up the ease with which these hackers are accessing all kinds of information online. The new program for infecting users’ computers is called Zeus; and the program is so hacker friendly that even an inexperienced hacker can operate it. Although the hacking program is easy to use, that fact does not diminish the devastating effects that Zeus (or other software like Zeus) can do to a computer and the user. For example, the article stated that programs like Zeus can steal credit card information, important documents, and even documents necessary for homeland security. If the hacker were to gain this information, it would mean identity theft or even a possible terrorist attack. (Giles, Jim. "Cyber Crime Made Easy." New Scientist 205.2752 (2010): 20-21. Academic Search Premier. EBSCO. Web. 3 Oct. 2010.)
Types
Sources such as the non-profit Identity Theft Resource Center sub-divide identity theft into five categories:
- Criminal identity theft (posing as another person when apprehended for a crime)
- Financial identity theft (using another's identity to obtain credit, goods and services)
- Identity cloning (using another's information to assume his or her identity in daily life)
- Medical identity theft (using another's identity to obtain medical care or drugs)
- Child identity theft.
Identity theft may be used to facilitate or fund other crimes including illegal immigration, terrorism, phishing and espionage. There are cases of identity cloning to attack payment systems, including online credit card processing and medical insurance.
Usually, identity thieves are attention seekers, do it for fun, revenge or to malign somebody’s reputation. Occasionally, they impersonate others for non-financial reasons—for instance, to receive praise or attention for the victim's achievements.
Identity cloning and concealment
In this situation, the identity thief impersonates someone else in order to conceal their own true identity. Examples might be illegal immigrants, people hiding from creditors or other individuals, or those who simply want to become "anonymous" for personal reasons. Another example are posers, a label given to people who use somebody else’s photos and information through social networking sites. Mostly, posers create believable stories involving friends of the real person they are imitating. Unlike identity theft used to obtain credit which usually comes to light when the debts mount, concealment may continue indefinitely without being detected, particularly if the identity thief is able to obtain false credentials in order to pass various authentication tests in everyday life.
Criminal identity theft
When a criminal fraudulently identifies himself to police as another individual at the point of arrest, it is sometimes referred to as "Criminal Identity Theft." In some cases criminals have previously obtained state-issued identity documents using credentials stolen from others, or have simply presented fake ID. Provided the subterfuge works, charges may be placed under the victim's name, letting the criminal off the hook. Victims might only learn of such incidents by chance, for example by receiving court summons, discovering their drivers licenses are suspended when stopped for minor traffic violations, or through background checks performed for employment purposes.
It can be difficult for the victim of a criminal identity theft to clear their record. The steps required to clear the victim's incorrect criminal record depend on what jurisdiction the crime occurred in and whether the true identity of the criminal can be determined. The victim might need to locate the original arresting officers and prove their own identity by some reliable means such as fingerprinting or DNA fingerprinting, and may need to go to a court hearing to be cleared of the charges. Obtaining an expungement of court records may also be required. Authorities might permanently maintain the victim's name as an alias for the criminal's true identity in their criminal records databases. One problem that victims of criminal identity theft may encounter is that various data aggregators might still have the incorrect criminal records in their databases even after court and police records are corrected. Thus it is possible that a future background check will return the incorrect criminal records. This is just one example of the kinds of impact that may continue to affect the victims of identity theft for some months or even years after the crime, aside from the psychological trauma that being 'cloned' typically engenders.
Synthetic identity theft
A variation of identity theft which has recently become more common is synthetic identity theft, in which identities are completely or partially fabricated. The most common technique involves combining a real social security number with a name and birth date other than the ones associated with the number. Synthetic identity theft is more difficult to track as it doesn't show on either person's credit report directly, but may appear as an entirely new file in the credit bureau or as a subfile on one of the victim's credit reports. Synthetic identity theft primarily harms the creditors who unwittingly grant the fraudsters credit. Individual victims can be affected if their names become confused with the synthetic identities, or if negative information in their subfiles impacts their credit ratings.
Medical identity theft
Medical identity theft occurs when someone uses a person's name and sometimes other parts of their identity—such as insurance information—without the person's knowledge or consent to obtain medical services or goods, or uses the person’s identity information to make false claims for medical services or goods. Medical identity theft frequently results in erroneous entries being put into existing medical records, which may in turn lead to inappropriate and potentially life-threatening decisions by medical staff.
Child identity theft
Child identity theft occurs when a minor’s Social Security number is used by another person for the imposter’s personal gain. The imposter can be a family member, a friend, or even a stranger who targets children. The Social Security numbers of children are valued because they do not have any information associated with them. Thieves can establish lines of credit, obtain driver’s licenses, or even buy a house using a child’s identity. This fraud can go undetected for years, as most children don’t discover the problem until years later. Child identity theft is fairly common, and studies have shown that the problem is growing. The largest study on child identity theft, as reported by Richard Power of the Carnegie Mellon Cylab with data supplied by AllClear ID, found that of 40,000 children 10.2% were victims of identity theft.
Techniques for obtaining and exploiting personal information for identity theft
Identity thieves typically obtain and exploit Personally identifiable information about individuals, or various credentials they use to authenticate themselves, in order to impersonate them. Examples include:
- Rummaging through rubbish for personal information (Dumpster diving)
- Retrieving personal data from redundant IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold on without having been properly sanitized
- Using public records about individual citizens, published in official registers such as electoral rolls
- Stealing bank or credit cards, identification cards, passports, authentication tokens ... typically by pickpocketing, burglary or mail theft
- Skimming information from bank or credit cards using compromised or hand-held card readers, and creating clone cards
- Using 'contactless' credit card readers to acquire data wirelessly from RFID-enabled passports
- Observing users typing their login credentials, credit/calling card numbers etc. into IT equipment located in public places (shoulder surfing)
- Stealing personal information from computers using malware, particularly Trojan horse keystroke logging programs or other forms of spyware
- Hacking computer networks, systems and databases to obtain personal data, often in large quantities
- Exploiting breaches that result in the publication or more limited disclosure of personal information such as names, addresses, Social Security number or credit card numbers
- Advertising bogus job offers in order to accumulate curriculum vitae and applications typically disclosing applicants' names, home and email addresses, telephone numbers and sometimes their banking details
- Exploiting insider access and abusing the rights of privileged IT users to access personal data on their employers' systems
- Infiltrating organizations that store and process large amounts or particularly valuable personal information
- Impersonating trusted organizations in emails, SMS text messages, phone calls or other forms of communication in order to dupe victims into disclosing their personal information or login credentials, typically on a fake corporate website or data collection form (phishing)
- Brute-force attacking weak passwords and using inspired guesswork to compromise weak password reset questions
- Obtaining castings of fingers for falsifying fingerprint identification.
- Browsing social network service websites for personal details published by users, often using this information to appear more credible in subsequent social engineering activities
- Diverting victims' email or post in order to obtain personal information and credentials such as credit cards, billing and bank/credit card statements, or to delay the discovery of new accounts and credit agreements opened by the identity thieves in the victims' names
- Using false pretenses to trick individuals, customer service representatives and help desk workers into disclosing personal information and login details or changing user passwords/access rights (pretexting)
- Stealing cheques (checks) to acquire banking information, including account numbers and Routing transit number
- Guessing Social Security numbers by using information found on Internet social networks such as Facebook and MySpace
- Low security/privacy protection on photos that are easily clickable and downloaded on social networking sites.
- Befriending strangers on social networks and taking advantage of their trust until private information are given.
Individual identity protection
The acquisition of personal identifiers is made possible through serious breaches of privacy. For consumers, this is usually a result of them naively providing their personal information or login credentials to the identity thieves as a result of being duped but identity-related documents such as credit cards, bank statements, utility bills, checkbooks etc. may also be physically stolen from vehicles, homes and offices, or directly from victims by pickpockets and bag snatchers. Guardianship of personal identifiers by consumers is the most common intervention strategy recommended by the US Federal Trade Commission, PhoneBusters and most sites that address identity theft. Such organizations offer recommendations on how individuals can prevent their information falling into the wrong hands.
Identity theft can be partially mitigated by not identifying oneself unnecessarily (a form of information security control known as risk avoidance). This implies that organizations, IT systems and procedures should not demand excessive amounts of personal information or credentials for identification and authentication. Requiring, storing and processing personal identifiers (such as Social Security number, national identification number, drivers license number, credit card number, etc.) increases the risks of identity theft unless this valuable personal information is adequately secured at all times.
To protect themselves against electronic identity theft by phishing, hacking or malware, individuals are well advised to maintain computer security, for example by keeping their operating system fully patched against known security vulnerabilities, running antivirus software and being cautious in their use of IT.
Identity thieves sometimes impersonate dead people, using personal information obtained from death notices, gravestones and other sources to exploit delays between the death and the closure of the person's accounts, the inattentiveness of grieving families and weaknesses in the processes for credit-checking. Such crimes may continue for some time until the deceased's families or the authorities notice and react to anomalies.
In recent years, commercial identity theft protection/insurance services have become available in many countries. These services purport to help protect the individual from identity theft or help detect that identity theft has occurred in exchange for a monthly or annual membership fee or premium. The services typically work either by setting fraud alerts on the individual's credit files with the three major credit bureaus or by setting up credit report monitoring with the credit bureau. While identity theft protection/insurance services have been heavily marketed, their value has been called into question.
Identity protection by organizations
In their May 1998 testimony before the United States Senate, the Federal Trade Commission (FTC) discussed the sale of Social Security numbers and other personal identifiers by credit-raters and data miners. The FTC agreed to the industry's self-regulating principles restricting access to information on credit reports. According to the industry, the restrictions vary according to the category of customer. Credit reporting agencies gather and disclose personal and credit information to a wide business client base.
Poor stewardship of personal data by organizations, resulting in unauthorized access to sensitive data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse has documented over 900 individual data breaches by US companies and government agencies since January 2005, which together have involved over 200 million total records containing sensitive personal information, many containing social security numbers. Poor corporate diligence standards which can result in data breaches include:
- failure to shred confidential information before throwing it into dumpsters
- failure to ensure adequate network security
- the theft of laptop computers or portable media being carried off-site containing vast amounts of personal information. The use of strong encryption on these devices can reduce the chance of data being misused should a criminal obtain them.
- the brokerage of personal information to other businesses without ensuring that the purchaser maintains adequate security controls
- Failure of governments, when registering sole proprietorships, partnerships, and corporations, to determine if the officers listed in the Articles of Incorporation are who they say they are. This potentially allows criminals access to personal information through credit rating and data mining services.
The failure of corporate or government organizations to protect consumer privacy, client confidentiality and political privacy has been criticized for facilitating the acquisition of personal identifiers by criminals.
Using various types of biometric information, such as fingerprints, for identification and authentication has been cited as a way to thwart identity thieves, however there are technological limitations and privacy concerns associated with these methods as well.
Regional legal responses
Australia
In Australia, each state has enacted laws that dealt with different aspects of identity or fraud issues. Some States have now amended relevant criminal laws to reflect crimes of identity theft, such as the Criminal Law Consolidation Act 1935 (SA), Crimes Amendment (Fraud, Identity and Forgery Offenses) Act 2009 and also in Queensland under the Criminal Code 1899 (QLD). Other States and Territories are in states of development in respect of regulatory frameworks relating to identity theft such as Western Australia in respect of Criminal Code Amendment (Identity Crime) Bill 2009.
On the Commonwealth level, under the Criminal Code Amendment (Theft, Fraud, Bribery & Related Offenses) Act 2000 which amended certain provisions within the Criminal Code Act 1995,
Likewise, each state has enacted their own privacy laws to prevent misuse of personal information and data. The Commonwealth Privacy Act is applicable only to Commonwealth and territory agencies, and to certain private sector bodies (where for example they deal with sensitive records, such as medical records, or they have more than $3 million turnover PA).
Canada
Under section 402.2 of the Criminal Code of Canada,
Under section 403 of the Criminal Code of Canada,
In Canada, Privacy Act (federal legislation) covers only federal government, agencies and crown corporations. Each province and territory has its own privacy law and privacy commissioners to limit the storage and use of personal data. For the private sector, the purpose of the Personal Information Protection and Electronic Documents Act ( 2000, c. 5 ) (known as PIPEDA) is to establish rules to govern the collection, use and disclosure of personal information; except for the provinces of Quebec, Ontario, Alberta and British Columbia were provincial laws have been deemed substantially similar.
France
In France, a person convicted of identity theft can be sentenced up to five years in prison and fined up to euro 75,000.
Hong Kong
Under HK Laws. Chap 210 Theft Ordinance, sec. 16A Fraud
Under the Personal Data (Privacy) Ordinance, it established the post of Privacy Commissioner for Personal Data and mandate how much personal information one can collect, retain and destruction. This legislation also provides citizens the right to request information held by businesses and government to the extent provided by this law.
India
Under the Information Technology Act 2000 Chapter IX Sec 43 (b)
Philippines
Social networking sites are one of the most famous spreader of posers in the online community, giving the users freedom to place any information they want without any verification that the account is being used by the real person.
Philippines, known as the 10th heavy users of Facebook and other social networking sites such as Twitter, Multiply and Tumblr has been known as source to various identity theft problems. Identity of those people who carelessly put personal information on their profiles can easily be stolen just by simple browsing. There are people who meet online, get to know each other through the free Facebook chat and exchange of messages that then leads to sharing of private information. Others get romantically involved with their online friends that they tend to give too much information such as their social security number, bank account and even personal basic information such as home address and company address.
This phenomena lead to the creation of Senate Bill 52: Cyber-crime Prevention Act of 2010. Section 2 of this bill states that it recognizes the importance of communication and multimedia for the development, exploitation and dissemination of information but violators will be punished by the law through imprisonment of prison mayor or a fine ranging from Php200,000 and up, but not exceeding 1 million, or depending on the damage caused, or both (Section 7).
Sweden
Sweden have had relatively little problems with identity theft. This is because only Swedish identity documents have been accepted for identity verification. Stolen documents are traceable by banks and some other institutions. The banks have the duty to check the identity of people withdrawing money or getting loans. If a bank gives money to someone using an identity document reported as stolen, the bank must take the loss. From 2008 any EU passport are valid in Sweden for identity check, and Swedish passports are valid all over the EU. This makes it harder to detect stolen documents, but still banks in Sweden must ensure that stolen documents are not accepted.
Other types of identity theft than over the bank desk have become more common in Sweden. One common example is ordering a credit card to someone who has an unlocked letterbox and is not home on daytime. The thief steals the letter with the credit card and then the letter with the code which typically arrives a few days later. Usage of a stolen credit card is hard in Sweden, since an identity document or a PIN code it is normally demanded. If the shop does not demand that, it must take the loss from stolen credit cards. The method of observing someone using the credit card PIN code, stealing the card or skimming it, and then use the card, has become more common.
Legally, Sweden is an open society. The Principle of Public Access says that all information kept by public authorities must be available for anyone except in certain cases. Specifically anyone's address, income, taxes etc. are available to anyone. This makes fraud easier (the address is protected for certain people needing it).
To impersonate someone else and gain money from it is a kind of fraud, which is described in the Criminal Code (Swedish:Brottsbalken).
United Kingdom
In the United Kingdom personal data is protected by the Data Protection Act 1998. The Act covers all personal data which an organization may hold, including names, birthday and anniversary dates, addresses, telephone numbers, etc.
Under English law (which extends to Wales but not necessarily to Northern Ireland or Scotland), the deception offenses under the Theft Act 1968 increasingly contend with identity theft situations. In R v Seward (2005) EWCA Crim 1941 the defendant was acting as the "front man" in the use of stolen credit cards and other documents to obtain goods. He obtained goods to the value of £10,000 for others who are unlikely ever to be identified. The Court of Appeal considered sentencing policy for deception offenses involving "identity theft" and concluded that a prison sentence was required. Henriques J. said at para 14:"Identity fraud is a particularly pernicious and prevalent form of dishonesty calling for, in our judgment, deterrent sentences."
Increasingly, organizations, including Government bodies will be forced to take steps to better protect their users' data.
Stats released by CIFAS - The UK's Fraud Prevention Service show that there were 89,000 victims of identity theft in the UK 2010. This compared with 2009 where there were 85,000 victims. Men in their 30s and 40s are the most common UK victims and identity fraud now accounts for nearly half of all frauds recorded.
United States
The increase in crimes of identity theft led to the drafting of the Identity Theft and Assumption Deterrence Act. In 1998, The Federal Trade Commission appeared before the United States Senate. The FTC discussed crimes which exploit consumer credit to commit loan fraud, mortgage fraud, lines-of-credit fraud, credit card fraud, commodities and services frauds. The Identity Theft Deterrence Act (2003)ITADA amended U.S. Code Title 18, § 1028 ("Fraud related to activity in connection with identification documents, authentication features, and information"). The statute now makes the possession of any "means of identification" to "knowingly transfer, possess, or use without lawful authority" a federal crime, alongside unlawful possession of identification documents. However, for federal jurisdiction to prosecute, the crime must include an "identification document" that either: (a) is purportedly issued by the United States, (b) is used or intended to defraud the United States, (c) is sent through the mail, or (d) is used in a manner that affects interstate or foreign commerce. See (c). Punishment can be up to 5, 15, 20, or 30 years in federal prison, plus fines, depending on the underlying crime per (b). In addition, punishments for the unlawful use of a "means of identification" were strengthened in § 1028A ("Aggravated Identity Theft"), allowing for a consecutive sentence under specific enumerated felony violations as defined in § 1028A(c)(1) through (11).
The Act also provides the Federal Trade Commission with authority to track the number of incidents and the dollar value of losses. Their figures relate mainly to consumer financial crimes and not the broader range of all identification-based crimes.
If charges are brought by state or local law enforcement agencies, different penalties apply depending on the state.
Six Federal agencies conducted a joint task force to increase the ability to detect identity theft. Their joint recommendation on "red flag" guidelines is a set of requirements on financial institutions and other entities which furnish credit data to credit reporting services to develop written plans for detecting identity theft. The FTC has determined that most medical practices are considered creditors and are subject to requirements to develop a plan to prevent and respond to patient identity theft.
Identity theft complaints as a percentage of all fraud complaints decreased from 2004-2006. The Federal Trade Commission reported that fraud complaints in general were growing faster than ID theft complaints. The findings were similar in two other FTC studies done in 2003 and 2005. In 2003, 4.6 percent of the US population said they were a victim of ID theft. In 2005, that number had dropped to 3.7 percent of the population. The Commission's 2003 estimate was that identity theft accounted for some $52.6 billion of losses in the preceding year alone and affected more than 9.91 million Americans; the figure comprises $47.6 billion lost by businesses and $5 billion lost by consumers.
According to the Federal Trade Commission (FTC), a report released in 2007 revealed that 8.3 million American adults, or 3.7 percent of all American adults, were victims of identity theft in 2005.
The latest report from the FTC showed that ID theft increased by 21% in 2008. However, credit card fraud, that crime which is most closely associated with the crime of ID theft, has been declining as a percentage of all ID theft. In 2002, 41% of all ID theft complaints involved a credit card. That percentage has dropped to 21% in 2008.
Two states, California and Wisconsin have created an Office of Privacy Protection to assist their citizens in avoiding and recovering from identity theft.
In Massachusetts in 2009-2010, Governor Deval Patrick made a commitment to balance consumer protection with the needs of small business owners. His Office of Consumer Affairs and Business Regulation announced certain adjustments to Massachusetts' identity theft regulations that maintain protections and also allows flexibility in compliance. These updated regulations went into effect on March 1, 2010. The regulations are clear that their approach to data security is a risk-based approach important to small businesses and might not handle a lot of personal information about customers.
Notification
Most states followed California's lead and enacted mandatory data breach notification laws. As a result, companies that report a data breach typically report it to all their customers.
Spread and impact
Surveys in the USA from 2003 to 2006 showed a decrease in the total number of victims and a decrease in the total value of identity fraud from US$47.6 billion in 2003 to $15.6 billion in 2006. The average fraud per person decreased from $4,789 in 2003 to $1,882 in 2006.
The 2003 survey from the Identity Theft Resource Center found that:
- Only 15% of victims find out about the theft through proactive action taken by a business
- The average time spent by victims resolving the problem is about 330 hours
- 73% of respondents indicated the crime involved the thief acquiring a credit card
In a widely publicized account, Michelle Brown, a victim of identity fraud, testified before a U.S. Senate Committee Hearing on Identity Theft. Ms. Brown testified that: "over a year and a half from January 1998 through July 1999, one individual impersonated me to procure over $50,000 in goods and services. Not only did she damage my credit, but she escalated her crimes to a level that I never truly expected: she engaged in drug trafficking. The crime resulted in my erroneous arrest record, a warrant out for my arrest, and eventually, a prison record when she was booked under my name as an inmate in the Chicago Federal Prison."
In Australia, identity theft was estimated to be worth between AUS $1billion and AUS $4 billion per annum in 2001.
In the United Kingdom the Home Office reported that identity fraud costs the UK economy £1.2 billion annually (experts believe that the real figure could be much higher) although privacy groups object to the validity of these numbers, arguing that they are being used by the government to push for introduction of British national identity card. Confusion over exactly what constitutes identity theft has led to claims that statistics may be exaggerated.
An extensively reported study from Microsoft Research in 2011 finds that estimates of identity theft losses contain enormous exaggerations, writing that surveys "are so compromised and biased that no faith whatever can be placed in their findings."
Famous identity thieves
- Frank Abagnale
- Albert Gonzalez
- Radovan Karadžić
- Michael Sabo
- John Stape
See also
- 2007 UK child benefit data misplacement
- 201 CMR 17.00 (Massachusetts personal information protection law)
- Bank fraud
- Capgras delusion
- Check fraud
- Check washing
- Credit card fraud
- Credit profile number
- Fair and Accurate Credit Transactions Act
- Fair Credit Billing Act
- Fair Credit Reporting Act
- Ghosting (identity theft)
- Hacking
- Identity document forgery
- Identity fraud
- Identity score
- Impostor
- Lapsed lurker
- Pharming
- Phishing
- RFID
- Spam
- Wireless identity theft
External links
- The New Era of Identity Theft–[Criminal Justice Resources]
- Identity theft – United States Federal Trade Commission
- The President’s Task Force on Identity Theft – a government task force established by US President George W. Bush to fight identity theft.
- Template:Dmoz
- Identity Theft – Carnegie Mellon University
- Identity Theft: A Research Review, National Institute of Justice 2007
- Identity Theft and Fraud – United States Department of Justice
- Get ID Smart 'Public service site offering free prevention tips'
- Dateline NBC investigation 'To Catch an ID Thief'
- Downloadable identity theft curriculum for educators
- Template:Cite news
- Preventing ID theft
Cumulative Supplement
Cases: Identity theft statute, as applied to defendant, was not unconstitutionally vague, as would violate due process; statute explicitly prohibited an individual from improperly accessing another's account at a financial institution, and that was exactly what defendant did by misappropriating victim's Social Security number, using the number to obtain Social Security card and driver's license in victim's name, and using card and license to obtain a job, at which job defendant's wages were reported to Internal Revenue Service (IRS) in victim's name, so that defendant accessed victim's account with IRS and thereby the United States Treasury, which was the nation's foremost banking institution. U.S.C.A. Const.Amend. 14; West's Ga.Code Ann. §§ 16-9-120(5)(F), 16-9-121. Hernandez v. State, 281 Ga. 559, 639 S.E.2d 473 (2007); West's Key Number Digest, Constitutional Law 258(3.1).