Академический Документы
Профессиональный Документы
Культура Документы
Abstract
Identity theft is considered to be one of the fastest growing crimes in America. Due to the technological advancements and
the almost ubiquitous use of computers and the Internet, identity theft is a crime that can occur practically anywhere. This
article explores the various types of identity theft including medical identity theft, nancial identity theft, and child identity
theft. Additionally, this article highlights the prevalence of identity theft and its costs to victims both monetarily and in
relation to physical and emotional stress. Finally, this article examines the recent strides of legislation to identify and combat
identity theft.
Introduction
Many argue that identity thefts and cybercrimes involving fraud
are considered the fastest growing crime in America (Cole
and Pontell, 2006, p. 125). However, it is difcult for
researchers and scholars to truly understand the prevalence,
cost, and type of identity theft and fraud that occur, because
there is not a universally agreed-upon denition (Allison
et al., 2005). This varied and vague denition leads to a lack
of reliable data that makes it difcult to capture the true
numbers regarding the commission of this crime. This article
explores several aspects of identity theft, including how practitioners and scholars dene identity theft, as well as the various
offenses that are considered identity theft. Additionally, current
estimates of both the prevalence and costs of these crimes are
considered as well as the target demographics of both victims
and offenders. Moreover, a brief discussion of one of the
most well-known international identity theft scams is included.
Finally, this article explores the evolution of legislation meant
to safeguard victims from identity thefts and assist those who
are victimized.
International Encyclopedia of the Social & Behavioral Sciences, 2nd edition, Volume 5
http://dx.doi.org/10.1016/B978-0-08-097086-8.45054-3
633
634
635
These data revealed that nearly half of all offenders are between
the ages of 24 and 34 and one-third are between 35 and
49 years old. In terms of race and ethnicity, over half were black
while whites and Hispanics account for nearly 40% of
offenders (Copes and Vieraitis, 2012). While research has
made strides in understanding the risks of victimization,
scholars have only recently attempted to understand the motivations of identity theft offenders. In one of the rst studies that
interviewed these offenders in federal prisons, Copes and
Vieraitis (2009) examined how an offenders experiences and
life circumstances affected their decision to commit identity
theft. The primary motivation for committing this type of fraud
was a desire for money. Offenders often viewed identity theft as
an easy crime that was extremely rewarding. Often, these individuals perceived their risk of capture to be extremely low,
because of their supposed advanced skills and the perceived
incompetence of law enforcement. Finally, it is of interest to
note that many of these offenders justied their crimes by
claiming that no real harm was caused to any of their victims.
636
While these crimes can take various forms, 419s are essentially
money scams that affect individuals all over the world. Before
the increased use of the Internet, those who perpetrated this
offense would send letters to various residential addresses to
build a relationship with a potential target and then swindle
money. However, the use of technology has led to enhanced
419s wherein the offender uses a variety of tools to discover
information about the target online, such as hacking into sites,
scanning web pages for email addresses, and targeting victims
in online chat rooms (Atta-Asamoah, 2009). Once this information has been procured, the scammer then uses the identity
of the victim to scam and exploit him/her. The continued use of
this tactic to commit identity fraud, money laundering, and
theft has permeated West African nations so much so that it
has moved from incidents committed by individuals into
loosely organized networks.
Conclusion
Identity theft may not be a new phenomenon, but the prominence of the Internet and our reliance upon technology has not
only allowed for an increase in such offenses, but has also
changed how this crime is perpetrated. Child identity theft,
medical identity theft, social security fraud, credit card fraud,
and data breaches affect over 8.6 million American households
yearly. The costs of these offenses are staggering. Monetary losses number in the billions and victims report feelings of
betrayal, distrust, and powerlessness. The rapid development
of technology and increasing use of the Internet has allowed
offenders to target victims from anywhere on the globe.
Scholars and practitioners alike are grappling with understanding this ever-changing phenomenon. By lacking
a common denition of these crimes, it is not only difcult
to measure the prevalence and costs of these offenses, but
lawmakers are faced with the arduous task of creating effective
legislation. Both legislators and academics have turned their
interest on these crimes and are seeking to understand not
only the crime itself, but how to deter such victimizations.
Bibliography
Allison, S.F.H., Schuck, A.M., Lersch, K.M., 2005. Exploring the crime of identity theft:
prevalence, clearance rates and victim/offender characteristics. Journal of Criminal
Justice 33, 1929.
Anderson, K.B., 2006. Who are the victims of identity theft? The effect of demographics. Journal of Public Policy and Marketing 25, 160171.
Atta-Asamoah, A., 2009. Understanding the West African cyber crime process. African
Security Review 18, 105114.
Beltran, G., 2013. Trends in Child Identity Theft. Identity Theft Resource Center. http://
www.idtheftcenter.org/Child-ID-Theft/trends-in-child-identity-theft.html (accessed
15.08.13.).
Bureau of Justice Statistics, 2011. Identity Theft Reported by Households,
20052010. U.S. Government Printing Ofce, Washington, D.C.
637
Cole, S.A., Pontell, H., 2006. Dont be low hanging fruit: Identity theft as moral panic.
In: Monahan, T. (Ed.), Surveillance and Security. Routledge, London,
pp. 125147.
Copes, H., Kerley, K.R., Huff, R., Kane, J., 2010. Differentiating identity theft: an
exploratory study of victims using a national victimization survey. Journal of
Criminal Justice 28, 10451052.
Copes, H., Vieraitis, L.M., 2009. Bounded rationality of identity thieves: using
offender-based research to inform policy. Criminology & Public Policy 8,
237262.
Copes, H., Vieraitis, L.M., 2012. Identity Thieves: Motives and Methods. Northeastern
University Press, Boston.
Davis, K., Stevenson, A., 2004. Theyve got your numbers. Kiplingers Personal
Finance 58, 7277.
Fair & Accurate Credit Transactions Act of 2003, 2003. Bills and Statutes (PL 108-159,
December 4, 2003). http://www.gpo.gov/fdsys/pkg/PLAW-108publ159/pdf/PLAW108publ159.pdf (accessed 08.08.13.).
Financial Fraud Enforcement Task Force, 2010. First Year Report: Financial Fraud
Enforcement Task Force. http://www.stopfraud.gov/docs/FFETF-Report-LR.pdf
(accessed 08.08.13.).
Federal Trade Commission, 2007. 2006 Identity Theft Report. http://www.ftc.gov/os/
2007/11/SynovateFinalReportIDTheft2006.pdf (accessed 08.08.13.).
Federal Trade Commission, 2009. Consumer Sentinel Network Data Book for
JanuaryDecember 2008. Federal Trade Commission, Washington, DC.
Federal Trade Commission, 2012. Consumer Sentinel Network Data Book for
JanuaryDecember 2011. Federal Trade Commission, Washington, DC.
Identity Theft Penalty Enhancement Act, 2004. (PL 108-275, July 15, 2004). Bills and
Statutes. http://www.gpo.gov/fdsys/pkg/PLAW-108publ275/pdf/PLAW-108publ275.
pdf (accessed 08.08.13.).
Identity Theft Resource Center, 2013. 2012 Breach List. http://www.idtheftcenter.org/
images/breach/Breach_Report_2012.pdf (accessed 15.08.13.).
Levi, M., 2008. Organized fraud and organizing funds: unpacking research on
networks and organization. Criminology and Criminal Justice 8, 289419.
May, J., 2012. Child Identity Theft Report 2012. Identity Thieves Target Young Children:
What Parents Need to Know to Protect Their Kids. AllClear ID Alert Network. http://
www.idtheftcenter.org/Child-ID-Theft/trends-in-child-identity-theft.html (accessed
15.08.13.).
Morton, H., 2012. Identity theft state statutes. National Conference of States Legislatures. http://www.ncsl.org/issues-research/banking/identity-theft-state-statutes.
aspx (accessed 08.08.13.).
Newmann, Q.J., 1999. Identity Theft: The Cybercrime of the Millennium. Loompanics
Unlimited, Port Townsend, WA.
Piquero, N.L., Cohen, M.A., Piquero, A.R., 2011. How much is the public willing to pay
to be protected from identity theft? Justice Quarterly 28, 437459.
Pontell, H.N., Brown, G.C., Tosouni, A., 2008. Stolen identities: a victim survey. In:
Newman, G., McNally, M. (Eds.), Crime Prevention Studies: Identity Theft and
Opportunity. Criminal Justice Press, New York, pp. 5786.
Pontell, H.N., 2009. Identity theft: bounded rationality, research and policy. Criminology
& Public Policy 8, 263270.
The Presidents Identity Task Force, 2008. The Presidents Identity Theft Task Force
Report. http://www.idtheft.gov/reports/IDTReport2008.pdf (accessed 08.08.13.).
Rocha, K., 2013. Medical Identity Theft: The Basics. The Identity Theft Resource
Center. http://www.idtheftcenter.org/Medical-ID-Theft/medical-identity-theft.html
(accessed 15.08.13.).
United States General Accounting Ofce, 2002. Identity Fraud: Greater Awareness and
Use of Existing Data Needed. Publication No. USAGAO-02766. http://www.gao.
gov/assets/240/234959.pdf (accessed 08.08.13.).
White, M.D., Fisher, C., 2008. Assessing our knowledge of identity theft. Criminal
Justice Review 19, 324.
Relevant Websites
http://www.bjs.gov/index.cfm?tytp&tid42 Bureau of Justice Statistics: Identity
Theft.
http://www.consumer.ftc.gov/features/feature-0014-identity-theft Federal Trade
Commission Consumer Information.
http://www.stopfraud.gov/ Financial Fraud Enforcement Task Force.
http://www.idtheftcenter.org/ Identity Theft Resource Center.
http://idtheft.gov/ The Presidents Task Force on Identity Theft.
https://www.privacyrights.org/Identity-Theft-Data-Breaches
Privacy
Rights
Clearinghouse.