In technical studies, identity fraud and online consumer security have become particularly important fields, requiring careful attention to secure the identity rights of e-consumers. This research is a dialogue about identity fraud. First of all, an introduction that gives a better understanding of the subject has been given. Popular ID fraud offences and safety issues are addressed. In order to provide a clear view of what measures have been taken to ensure the identity security of e-consumers, several significant laws have been addressed. Then, social, ethical and moral problems were discussed around identity theft. In the concluding paragraph, the article is summarised. APA referring was used appropriately.
Keywords: identity, theft, criminal, bank, information, computer, forensic, internet, security
With the rising use of the internet in our daily lives, the possibility of our identity being stolen is also growing. Let’s first get to know what identity fraud really is before going into the niceties of this definition.
Theft of identity is the act, according to Vacca, of stealing private information from an individual “in order to impersonate that person in a legal sense” (2005, p. 137). If a person’s identity is stolen, he is at great risk of facing the terrifying amount of monetary and individual deals in his name from the thief. Technology, along with its pros, has introduced highly technical and fashionable means of capturing everyone’s simple identifying information. Whatever the thief uses, the victim’s name and credibility are destroyed by identity theft because the victim is solely responsible for whatever financial or personal harm he faces. You will have to reveal bits of your personal details when making online transactions, such as your name, address, telephone number, bank information, credit card information, and so on. The thief may misuse this information after stealing it by, for example, applying for loans on the victim’s behalf, changing his billing address, obtaining a driving licence, applying for a job, applying for insurance or new bank accounts, obtaining permission to use the victim’s electronic signature for electronic transfers, or any other fraud.
While internet identity theft has made individuals uncertain about buying and selling online, checking their bank statements online, visiting auction websites or entering into business contracts or transactions, computer forensics has played a role in helping law enforcement agencies collect digital evidence and identify stolen identities as well as the criminals involved (Newman, 2009).
Common Identity Theft Crimes
Financial crimes mainly take account of the misuse of the victim’s credit card information, bank account information, social security number, or insurance information. Anderson (2008) asserts that “criminals can acquire this information easily by searching through discarded trash, social engineering over the telephone or through outright theft of the data”. The thief can initiate fraudulent financial activities by creating fake identities. Counterfeit bank statements and checks can be created using special softwares and tools. Photographs can be edited using easy applications. Karen (2010) states that financial cybercrimes have increased dramatically over the last years (see Figure 1). Figure 2 also shows the rate at which internet related identity theft is surging.
A thief, who happens to steal a person’s social security number (SSN), has all chances to get to his detailed personal information, according to Social Security Administration (2009, p. 2). The thief can then have access to all identification information from the databases and other data repositories that use SSNs as primary keys. He can then use his credit card information to apply for loans, do shopping and the leave the victim to pay the bills. The situation may lead to bankruptcy which can blow the victim out of his senses.
Identity theft has raised the topic of cyber stalking as well. Anderson, who works with Emerging Technology, Inc. (NTI), writes:
In a case where a person assumed the identity of a past employee who had been discharged by a corporation, NTI was involved. Over the Internet, the identity was used to terrorise a female Human Resources Manager who fired the user. After several weeks of investigation, we found that a peer worker inside the company fabricated the messages.
Forensic computing techniques have documented and addressed this and several other such cases that arise due to unsafe internet environments.
Identity Theft and Wireless Networks
Wireless network security is one of the main concerns since wireless networks strengthened their roots in the tech world and issues of personal information theft arose.
Every wireless network has its security risks. Hackers can easily get into the network and obtain personal information much enough to break into the victim’s bank account. However, wireless networks set up at homes are quite reliable as they are established in such a way that hackers cannot break into unless there is a particu+lar access code (Hernandez, 2008). When a person connects to the internet through a wireless network, the computer suggests several signal choices, some of which are secure and some are not. Secure ones need a password to get hooked. A hacker cannot break into secured networks as wireless network security for them is turned on. Point to consider is that one should never carry out personal transactions or banking or financial activities at place that offer free wireless networking like hotels and airports as one can never be sure of wireless network security at such places.
Identity Theft in Military
Keller states that identity theft has become one of the most important military issues of the new millennium (2007). Military has started relying heavily upon information technology for inter-communication, controlling vehicles and maneuver of security forces, inspection and processing of military signals. Thus, it becomes important to protect all sensitive and confidential information from enemy countries. More precisely, the objective of military information security is to protect its computers and information networks from intruders so as to eliminate the risk of crucial security information getting stolen, snooped into, disclosed or corrupted.
Safe Shopping Online
One should always do some research before falling for such offers by studying online reviews by other people and searching for any scam reports that the company might be having. For example, there are a lot of work-at-home jobs being offered at the internet with offers like lotteries or gifts or bonuses, most of which are just a scam trying to get the consumer’s personal information leading to their online profiling. Thus, it is very important to do some research work before giving out one’s curriculum vitae or resume which definitely contains all private information. It is also important to install an up-to-date anti-virus software program so as to protect the computer from scams and viruses that might travel to the system through malicious code. The e-mails must also be scam protected. The key sentence is that one should never give out one’s identity without making sure that the second party is a legitimate one.
Laws and Legislation
There are a number of laws that have been passed to eliminate the risk of identity theft. Some of these include:
Computer Fraud and Abuse Act (CFAA)
The CFAA was founded in 1984 and deals with penalties for intruders who gain access to confidential data stored on a computer without allowed access. When customers carry out commercial activities, participate in cross-border e-commerce and perform online business transactions and email interactions with online traders, computers need to be secured. It is illegal for someone without the permission of the person involved to get access to the transactional data. In the Act, the word secure computer is used to refer to those computers used by financial institutions to conduct domestic or international e-commerce. The Act applies sentences starting from 10 years to 20 years in jail for identity thieves.
Electronic Communications Privacy Act (ECPA)
Children’s Online Privacy Protection Act (COPPA)
Health Insurance Portability and Accountability Act (HIPAA)
This law was passed in order to eliminate the menace of identity theft. This information could either be stored in and exchanged through hard copied files or computer systems. The need for secure online networks initially arose when issues like computer viruses and internet fraud posed a threat to the security and privacy of data stored on online servers and health records. The consumers began to worry about their personal information so they had to be made sure that their data will not be affected or disclosed without their consent. So, Health Insurance Portability and Accountability Act (HIPAA) was put forth by U.S. Congress on August 21, 1996. Title II of HIPAA deals with the privacy issue of the consumer’s data and presents Privacy Rule which ensures fines and punishments for fraud and violation of the rule. The rule gives consumers the right to file complaints if they find anybody obtaining, selling or disclosing their information. This way, they can have their data protected and their communications confidential.
Ethical, Moral and Social Issues
Regarding identity fraud, there are several socio-ethical problems. Educating internet and computer system users on “intellectual property rights issues, privacy/ surveillance issues, access to data issues and issues of human-computer interaction” is relevant (Stahl, Carroll-Mayer and Norris, 2010, p. 298). Ethical cases should be able to apply principled reasoning to them. They should realise that the identity of the other person is something that is his own property and not his own; that they have no access to the personal data of others, and without the permission of the owner, they will not use or reveal it. A virtual world businessman should value the personal identity data of his employees and customers and take steps to lock and secure the databases and data warehouses from unauthorised access. Even at a very personal level, an internet user must realise that he is expected to protect and defend the identifying details of the second person and at the same time, should be aware of the security breaches proposed by the World Wide Web so that he can protect his own identity.
Putting everything together, it is very important for the consumers to remain alert while they are interacting with the online community. In spite of so many laws, legislations and Acts that have been passed to ensure the consumers’ protection online, still cases happen where they can become a victim to fraudulent activities and scams put forward by retail companies and vendors. Though, there are numerous true and honest websites performing in a sincere and straightforward fashion, but still, it is always a sensible idea to protect one’s identity and personal information before giving it out. It is vital to educate the e-consumers about their rights of protection so that they do not get trapped in the hands of criminals.
Figure 1. Increase in Financial Crimes
Figure 2: Increase in Identity Theft
- Anderson, M. (2008). Identity theft in financial crime cases. Identity Theft: Computer Forensics to the Rescue. Retrieved April 20, 2010 from http://www.forensics-intl.com/art18.html
- Hernandez, A., (2008). Internet Identity Theft – Wireless Network Security Issues. Retrieved April 20, 2010 from http://ezinearticles.com/?Internet- Identity- Theft- – – Wireless- Network- Security- Issues&id=1503146
- Karen, L. (2010). Identity theft and cybercrime statistics in picture graphs. Retrieved April 20, 2010 from http://blog.karenlodrick.com/2010/03/29/identity-theft-and-cybercrime-statistics-in-picture-graphs
- Keller, J. (2007). The importance of military information security. Military and Aerospace Electronics. Retrieved April 20, 2010 from http://mae.pennnet.com/articles/article_display.cfm?article_id=309174
- Newman, R. (2009). Computer Security: Protecting Digital Resources. USA: Jones & Bartlett Publishers.
- Social Security Administration. (2009). Identity theft and your social security number. Social Security. Retrieved April 20, 2010 from http://www.ssa.gov/pubs/10064.pdf
- Stahl, B., Carroll-Mayer, M., & Norris, P. (2010). Legal, professional, and ethical content. Forensic Computing: The Problem of Developing a Multidisciplinary University Course. Retrieved April 20, 2010 from http://www.cse.dmu.ac.uk/~bstahl/publications/2006_forensic_computing_course_development.pdf
- Vacca, J. (2005). Identity theft. Computer Forensics: Computer Crime Scene Investigation. USA: Cengage Learning.