Date post: | 05-Apr-2018 |
Category: |
Documents |
Upload: | givi-palagashvili |
View: | 219 times |
Download: | 0 times |
of 21
8/2/2019 Technology and Identity Theft
1/21
Givi Palagashvili
I. IntroductionThe discovery and diffusion of technology has transformed crime and criminals, raising new
challenges for the criminal justice system. However, many of these new and evolving forms of
criminal activity remain, in large part, unexplored. This paper addresses the void by focusing
on one type of deviance: identity theft. More specifically, the paper will: 1) provide an
overview of the nature, causes and dynamics of national and international identity theft; 2)
explore six case studies to highlight the diversity and complexity of this evolving form of
crime; and 3) provide suggestions for combating identity theft, focusing on the dynamic tension
between technology development and crime control.
II. Identity theft: An Overview
In todays society, identity theft has greatly risen in popularity among criminals. In the United
States hundreds of thousands of people have their identities stolen each year. According to the
Federal Trade Commission, identity theft is one of the fastest growing crimes in the United
States. Identity theft is the appropriation of an individuals personal information to
impersonate that person in a legal sense.(Identity Theft and Fraud Prevention). When a
criminal steals someones identity it enables them to make financial and personal transactions
in someone elses name, leaving the victim responsible for the costs. Criminals may use your
personal information for various reasons such as to get a loan, buy drugs, get expensive
medical treatments, and even kill someone in your name. Identity theft is a relatively new
name for an age-old phenomenon
8/2/2019 Technology and Identity Theft
2/21
Givi Palagashvili
(Federal Reserve Bank of Boston). In past crime was a simple form of impersonation to act as
another person with the intent to defraud others for personal gain. Imposters assumed the
identities of others by imitating how their subjects dressed, behaved, and talked. This form of
impersonation became ineffective as other forms of personal identifying information came into
being (Hoffman 5). Also as time passed, criminals learned they could obtain enough
information about a person from the trash without the need for killing the victim. One common
practice was Dumpster diving this is when criminals would obtain bank statements, credit
card information and other sensitive document and use it to represent someone else. As
identity theft matured, criminals would steal directly from the mailbox to look for bank
statement of individuals (Pragides). This method was successful and was easier then dumpster
diving. Later telemarketing was used by criminals and brought a different form of crime.
Telemarketers called people and told them they won a prize or were from charitable
organization and asked about a donation. Once they received a donation they would convince
people to give out personal information for verification purposes and use it to open credit card
accounts, buy houses and other forms of illegal financial transactions (Pragides). However
because of the development of technology, criminals have adopted new methods of committing
crimes. Because people keep up with technology in order to conduct their daily life, people are
required to adapt to information and discoveries that change the way we live. Since the early
90s, the internet has grown in the United States and over the world. People became dependent
on the internet and use in their everyday lives; they rely on it for safe and accurate exchange of
information (McQuade). They constantly they give out personal data such as Social Security
numbers, credit card numbers, and passwords without worrying. With the security measures in
place people feel it is safe to exchange personal information and believe information is
8/2/2019 Technology and Identity Theft
3/21
Givi Palagashvili
confidential. However that is not always the case, criminals have also adapted to advancement
in technology and, and today most crimes are committed over the internet. Today criminals use
technology to devise new methods of theft in the form of cyber crimes (McQuade). Now
criminals are using scams known as phishing to enter emails, hack in to another computer, and
once their inside the computer network, they are able to view personal information and use it
for personal benefits. Criminals have always taken advantage of new technologies in order to
improve skills to combat security technologies.
III. Case Studies: The Human Divisions of Identity Theft
A general overview of identity theft reveals the nature, causes and broad parameters of this
relatively new form of crime. How, broad sweeps do not uncover the unique qualities of
individual cases. An overview of six cases reveals the complexities and human dimension of
identity theft, as well as the challenges faced by the law enforcement officials in combating this
evolving form if crime.
Las Vegas Major Identity theft case:
In 1979, a 73 year old man Arthur Gerald Jones fled his home and family in highland, Illinois
and bought a social security number and other information on the black market for 800 dollars.
The social security was stolen from a 50-year-old veteran named Clifton Goodenough. Jones
8/2/2019 Technology and Identity Theft
4/21
Givi Palagashvili
moved to Florida first however because of personal reasons he fled to Las Vegas in 1988, and
found a job as a bookie at a casino. While back in Highland reports showed Jones was missing
and was officially declared dead in 1986. Jones main tactic was using Goodenoughs Social
Security number to pay taxes on his Las Vegas winning income. A first the IRS did not notice
Jones was doing business with two Goodenoughs with the same ID number. While this was
occurring Goodenough was living in Illinois. Goodenoughs did not think IRS took notice
because he and Jones were filing their separate returns to different IRS regional offices. All of
this changed when Goodenough moved to Arizona in the mid-1990s (Famham). The IRS
noticed something suspicious because the real Goodenough and fake on were filing tax returns
to the same office. Goodenough said he began hearing from the IRS asking why he was paying
taxes on the extra income he was earning in Las Vegas. Goodenough responded and told the
IRS and said he hasnt earned any money in Las Vegas and has not been in Las Vegas.
(Famham). It appeared that Jones wasnt paying taxes on his earnings. This became frustrating
for Goodenough because he found himself having to spend weeks worth of time writing to the
IRS, Talking in the phone. In 1998 Goodenough went to get 20 dollars form an ATM machine
and was told he lacked sufficient funds. He was unsure what has happened and immediately
called his bank. The bank responded by say The IRS took your money. ( Farnham). Further
he called the IRS and said I dont know what youre doing, I wasnt in Las Vegas, and I
can prove it. (Farnham). He got his employer to write a letter testifying to his whereabouts on
the dates in question. Eventually, the IRS relented, and put the money back in his account. In
addition to the 75 dollars they charged him for the wire transfer. Goodenough personal life was
seriously affected decided to take steps further. He and his wife got the phone number of the
fake Goodenough in Las Vegas. When they called the fake Goodenough they found an easy-
8/2/2019 Technology and Identity Theft
5/21
Givi Palagashvili
going guy who insisted there must be some honest mistake. Goodenough was asking fake
Goodenough personal question like what hospital he was born and where he grow up. It
appeared they both had exactly the same stories. The police investigated more on the case and
eventually ended a 15 years of Identity theft crime. Arthur Gerald Jones has been order to pay
restitution to both the Social Security Administration and to the man whose identity he stole.
Jones pleaded guilty to one count of felony identity fraud. He will be sentenced on January 31,
2012 (Farnham).
Massive NYC theft ring
Accrording to Msnbc News since 2010 a criminal enterprise crime operating took place with
the involvement of one bank and restaurant in Queens. The operation consisted of three bank
workers, retail employees and restaurant workers would steal credit card numbers in a process
known as skimming, this is when workers take information form a credit card and swipe it for
payments and illegally sell the credit card numbers (Msnbc.com). Further different member of
the criminal enterprise would steal personal information online. Later the information was
given to the team responsible for manufacturers; they would forge Visas, MasterCards,
Discover and Amercian Express cards. Further realistic identification was made with the stolen
data. Credit cards were given to the teams criminal shoppers for spending sprees at higher-end
stores including Apple, Bloomingdalessand Macys. Most of these products were resold in
China, Europe and the Middle East. In result more than 13 million dollars was spend on IPads,
IPhones, computers, watches and fancy handbags from Gucci and Lousi Vuitton. In addition
suspects used the money to pay for hotel rooms and pricy cars. During the investigation
8/2/2019 Technology and Identity Theft
6/21
Givi Palagashvili
detectives found it hard to translate Russian, Farsi, and Arabic. Deputy Inspector Gregory
Antonsen of the NYPDs organized theft and identity theft task force stated. Part of the
problem, especially for foreign tourists in the U.S., is the, unlike overseas, credit card
companies in the U.S. do not install special microchips that make skimming more difficult.(
Msnbc.com). In addition Antonsen states "Thieves have an amazing knowledge of how to use
technology.(Msnbc.com). He said. "The schemes and the imagination that is developing these
days are really mind-boggling." Police searched several homes and seized computers, packaged
electronics, and 650,000 dollars in cash, along with several weapons. The charges for this case
included enterprise corruption, theft and grand larceny. In this operation about 111 people
were charged and 86 are in custody; the other are still being questioned. Criminal were hit
with over 100 charges, and is going on record for the largest identity theft takedown in U.S.
History.(Msnbc.com).
Largest credit card theft in U.S. history
Eleven people including U.S. Secret Service informant have been charged with hacking nine
major retailers and the theft and sale of more than 41 million credit card numbers (Huff Post).
Reports states breach is believed to be the largest hacking and identity theft case ever
prosecuted by the Department of Justice, which said the suspects were charged with
conspiracy, computer intrusion, fraud and identity theft.( Huff Post). Three people were U.S.
citizens and other s from Eastern Europe and China. The suspects hacked into wireless
computer networks of retailers such as TJX Cos., BJs Wholesale Club, OfficeMax, Boston
Marke, Barnes & Noble, Sports Authority, Fovever 21 and DSW and set up programs that
8/2/2019 Technology and Identity Theft
7/21
Givi Palagashvili
captured card numbers, passwords and account information. (Huff Post). The thieves that
where responsible for this activity where just regular people that used a technique called ,
wardriving, which involved cruising through different areas with a laptop and looking for
accessible wireless internet signals. Once they located a vulnerable network, they installed
specific programs that captured credit card numbers. Further the information was kept
internationally on computer servers in countries like Ukraine and Latvia. The ring operated
mostly in Eastern Europr, the Phillipines, China and Thailand (Huff Post). Albert Gonzalez of
Miami was responsible for this crime, and is charged with computer fraud, wire fraud, access
device fraud, aggravated identity theft and conspiracy. Further Gonzalez was feeding criminals
with information about ongoing investigations and warning the criminals about possible
dangers. Gonzalez faces maximum sentence of life in prison. Gonzalez was a member of U.S.
Secret Service working on websites used to transfer stolen goods (Hoff Post).
H & R Block Identity theft
According toChicago Breaking News in Highland Indianan, A police officer pulled over a car
that he suspected driving under the influence. Once the police officer approached the vehicle
he noticed a female passenger nervously fidgeting in the back seat. The officer asks her what
the issue was, and she responded she was looking for a bottle for her small child also in the car;
however the officer noticed a gold Visa card at her feet (Chicago Breaking News). The name on the
card did not match the woman. Officers arrested her and discovered she was a former H&R
Blockemployee who has stolen the identities of dozens of clients and then collected hundreds of
thousands of dollars in refunds after fraudulently filing customers names without their
8/2/2019 Technology and Identity Theft
8/21
Givi Palagashvili
knowledge. Once the car was searched officers have uncovered a large amount of evidence.
They found a box full of H&R Block client information, numerous blank W-2 forms, about 100
debit cards and yellow legal pads with columns of Social Security numbers, Pin numbers, dates
of tax filing and whether the returns had been accepted or rejected authorities said. Coming at
the height of tax season, the arrests of Francesca Foster, who worked at an H&R Block office
in East Chicago and a second woman, illustrate the dangers citizens face when filing tax returns
full of sensitive information and the ease in which scammers can use electronic filing to steal
identities. H&R officials said the company follows several measures to protect customers'
information, including data encryption and shredding of confidential data. (Chicago Breaking
News).The business also said it provides victims with a year's subscription of identity-theft
protection and helps them file the necessary forms with the IRS. (Chicago Breaking News).
Internal Revenue Service officials said citizens need to have the same level of trust with their
tax preparer as they do with their own doctor before giving out personal information. (Chicago
Breaking News).
Largest Medicare fraud in United States
A highly organized group referred to as Armenian Power have encountered in many organized
crime throughout United States and other countries around the world. The Medicare fraud
occurred in the United States was considered largest in U.S. history (Rothfeld). Identities of
doctors and patients were stolen and used for different clinics in 25 states to bill Medicare for
more than 100 million for treatments no doctor ever performed and no patient ever received.
This occurred over a four year period. There were over 118 clinics and over 100 million
8/2/2019 Technology and Identity Theft
9/21
Givi Palagashvili
dollars in bogus billing. 41 of the people accused had been arrested, 21 of them came from
New York City, and many others in Los Angeles (Rothfeld). The leader of the organization
was Armen Kazarian who is indentified as Vor which mean thief in-law which comes
from a term used in the former Soviet Union. A person with that nickname is highly respected
criminal boss. Law enforcement officials described Armenian Power as having an "extensive
portfolio" that combined ruthlessness with opportunism, focusing on white-collar crime that
included identity theft crimes such as credit-card skimming (Rothfeld). Total money stolen
was around 163 million dollars in fraud. In addition the groups members and associates are
charged with numerous crimes, including racketeering, health care fraud, identity theft, money
laundering and bank fraud (Rothfeld).
Celebrity Identity Theft
According to New York Times identity theft is a common concern for celebrates because of
their perceived wealth and status. Mayor Michael Bloomberg was a victim of Identity theft
four years ago when two men have hacked into his personal financial account and were trying
to steal 420,000 dollars from his account. According to prosecutors, Mr..Bostic created the
Laderman Development Company in Elizabeth, N.J., and set up accounts in the companys
name at two banks, PNC and Sovereign Bank. The problem occurred in early June when Mr.
Bostic deposited 190,000 dollars into the Sovereign account and 230,000 dollars deposited into
PNC bank account (chan). Both the checks were on Mr. Bloombergs personal account.
However because of the size of the two checks, the bank decided to put it on hold for forgery.
In August Mr. Bostic got arrested in New Jersey and was charged for grand larceny in the
8/2/2019 Technology and Identity Theft
10/21
Givi Palagashvili
second degree, and faces up to seven years in prison (Chan). In addition while investigation
took place into forged checks another fraud was discovered. The second man was, Charles
Nelson hacked into the Mr. Bloomberg account and stole 10,000 dollars from the bank account.
He transferred the money to his E Trade account and used a debt card for purchases. Mr.
Nelson got arrested in Newark, where a computer, documents and two guns were discovered.
Mr. Nelson was convicted and sentenced up to seven years in prison. According to New York
Times this was not the first time criminals have gone after the mayor. Before his election
officials have investigated a case against a person from Kazakhstan who tried to extort money
from Mr. Bloombergs account. In addition a man named Oleg Zezev in March 2000 has sent
threatening emails saying he had infiltrated the companys computer system and wanted
200,000 dollars. Mr.Bloomberg immediately contacted the F.B.I. about the threats. Months
later the F.B.I tracked Mr. Zezev arrested him for extortion and was sentenced to 51 months in
prison (chan).
IV. Preventing Identity Theft: Direction for the Future
Although it is very easy for someone to steal your identity, there are many ways to prevent
identity theft. First, destroy all credit cards, and all financial statements; always use secure
websites when making purchases over the Internet; dont talk about financial issues using
wireless communications; call up your local DMV and request that your private information get
protected from disclosure. Dont use your mothers maiden name on your passwords for credit
cards. Be cautious of anyone calling to confirm personal information. Thoroughly review all of
your bank, credit card, and phone statements for unusual activity. Dont carry around your
8/2/2019 Technology and Identity Theft
11/21
Givi Palagashvili
social security number. And most-importantly, secure your mail and monitor your credit by
asking for credit report once a year and to watch for any unknown purchases.
If you suspect that you are a victim of identity theft, there are different things that you could do.
The first thing to do is be aware. Watch out for any unusual purchases; being denied a loan you
have qualified for; watch when your personal records dont agree with personal records; look
out for any unexplained changes in your bank access codes; and look out for any unusual calls
regarding your personal or financial information. If you suspect foul play with your credit or
feel that something may be wrong, contact your local law enforcement officials to look into it.
Dont hesitate to follow up.
If you are a victim of identity theft there are many different steps you can take to make sure
that the crime is going to be solved or to make sure that this does not happen again. As with all
crimes, report the crime to your local police departments immediately. Call the fraud unit at
each of the big three credit bureaus to notify them of what has happened. Do not pay any bills
or charges that result from identity theft. Write a victim statement of 100 words or less. Get
copies of your credit reports. Call your credit card issuers to close accounts. Create new secret
passwords and PIN numbers. Contact the Social Security Administration and advise them of
what has happened. Contact an attorney to make sure you are not victimized again. Be
persistent and follow up.
8/2/2019 Technology and Identity Theft
12/21
Givi Palagashvili
I. ConclusionToday, identity theft continues to remain a primary focus of law enforcement. As the crime rate
for this offense continues to rapidly grow, law Enforcement officials as well as government
representatives continue to target the crime and find ways to stop it. There are many things that
officials must consider doing that would help prevent identity theft. For instance, provide a law
enforcement response to high tech crime complaints 24 hours a day seven days a week.
Knowledge, resources, and training should be shared among local law enforcement investigate
agencies to prosecute Internet crime more effectively. Funding for a computer forensics lab,
which will be essential for investigating and prosecuting Internet crimes, should be made
available to legislation and should be enacted to help prosecute on-line crime. Finally,
sentencing of this crime must also be put into perspective. One third of all identity theft
offenders dont even get sent to prison, and those who do, dont even get lengthy terms.
Representatives need to come up with legislation that would prosecute and fairly sentence
criminals charged with identity theft because this crime surely is a victims crime. And
remember, identity theft could happen to anyone, even to you.
8/2/2019 Technology and Identity Theft
13/21
Givi Palagashvili
Bibliography
Chan, Sewell.Metro - City Room Blog - NYTimes.com. Web. 07 Dec. 2011.
.
Farnham, Alan. "Las Vegas Identity Theft Case Ends After 15 Years."ABCNews.com: Daily News,
Breaking News and Video Broadcasts - ABC News. Web. 5 Dec. 2011.
.
Federal Reserve Bank of Boston. "Idenitity Theft Protect Yourselt." Web. 4 Dec.
2011http://www.bos.frb.org/consumer/identity/idtheft.pdf
Hoffman, Sandra K.Identity Theft. Greenwood, 2010. Print.
Huff Post. "Biggest Identity Theft In History."Breaking News and Opinion on The Huffington
Post. Web. 5 Dec. 2011. .
http://www.bos.frb.org/consumer/identity/idtheft.pdfhttp://www.bos.frb.org/consumer/identity/idtheft.pdfhttp://www.bos.frb.org/consumer/identity/idtheft.pdf8/2/2019 Technology and Identity Theft
14/21
Givi Palagashvili
Identity Theft and Fraud Prevention. "FTC: Identity Theft Is the Fastest Growing Crime."
Identity Theft | Leader in Identity Protection and Credit Reports. Web. 07 Dec. 2011.
.
McQuade, Sam. "Technology-enabled Crime, Policing and Security." The Journal of Technology
Studies (2003). Print.
Msnbc.com. "11 Charged in Connection with Credit Card Fraud."Msnbc.com - Breaking News,
Science and Tech News, World News, US News, Local News- Msnbc.com. Web. 5 Dec. 2011.
.
Pragides, Bernard. "History Of Identity Theft and Technology Advancements | Bernard
Pragides."Bernard's Latest Writings. Web. 4 Dec. 2011.
.
Rothfeld, Michael. "Medicare Scheme Netted $35 Million, Officials Say." The Wall Street Journal.
Web. 5 Dec. 2011.
8/2/2019 Technology and Identity Theft
15/21
Givi Palagashvili
" Woman Charged in H&R Block Identity Theft Case." Chicago Breaking News. Web. 07 Dec. 2011.
.
8/2/2019 Technology and Identity Theft
16/21
Givi Palagashvili
Identity Theft: The Dialectics of Technological Developments and Crime Control
Givi Palagashvili
Professor Pisciotta
CRJ 380 Senoir Seminar
December 7, 2011
8/2/2019 Technology and Identity Theft
17/21
Givi Palagashvili
8/2/2019 Technology and Identity Theft
18/21
Givi Palagashvili
8/2/2019 Technology and Identity Theft
19/21
Givi Palagashvili
This article highlights a growing, almost unstoppable, problem with the advancement of
technology today. It describes how the increase in technological advantages makes it more
difficult to prevent the misuse of information on the internet. Identity theft was a highlighted
crime in this situation as it has become easier to exploit this type of crime. Identities are sold
around the world quickly after they are stolen through online auction sites operated by
organized crime or hackers, and they are used for a number of purposes -- most of which do not
need a personal presence where a retina scan might be used. This clip from the article
highlights two critical problems with the current technological situation as well as revealing a
potential problem with the proposed solution, which is physical identification.
The first problem is the availability of internet sources that make a profit selling and buyingpersonal information. These sites are capable of quickly and discretely selling information such
as credit card numbers, phone numbers, social security numbers and complete names to buyers
across the world for a simple transfer of funds and an email. Considering the nature of this
crime and its potential for easy money, it is no surprise that identity theft has become such a
growing crime. Once the information has been stolen or purchased, it can be used to create
8/2/2019 Technology and Identity Theft
20/21
Givi Palagashvili
false duplicate identities of a person on the internet. This can result in several false purchases of
various products in another persons name. However, it should be noted that these purchases
are rarely sent to, or identified with, the person who had stole the information. It makes sense
as a criminal would not want to identify themselves with the crime that they had justcommitted. An analogy was used that described a theft using a stolen credit card at an ATM.
They would eventually be caught as many ATMs have cameras that watch and monitor the
transactions. However, the internet does not have such a monitoring device which leads to the
second problem.
The second problem is the lack of identity on the internet. Because a computer only recognizes
a person as a series of inputs it is possible to become anyone on a computer as long as you
possess the necessary inputs. If a person has the inputs necessary than they can essentially
become anyone that they wish to and the computer will not have the ability to distinguish the
difference. This allows hackers and identity thieves to pass as anyone they want to as long as
they have the necessary information to do so. This includes bank accounts, paypals, credit
companies and online businesses. And because of the lack of identity given by the internet, it
becomes increasingly more difficult to trace someone back to the crime.
This has led many to suggest physical identification in the form of retina scanners and even
fingerprint scanners. While this is just the tip of the suggestions offered, they seem to be the
ones that are gaining ground in protection of information. However, the solution has some
potential problems. By giving users a physical presence on the internet it infringes on the
freedom offered by internet autonomy. This freedom will be lessened if everyone is given a
traceable presence on the internet. This is one of the reasons that the article at hand suggests
that a physical solution would be made impossible by the people who would reject it.
Another problem is the implausibility of physical identification. While it is possible in the
office places as well as in a few other places where information is publically accessible, it is not
plausible on something as vast and flowing as the internet. I am at a loss as to how a system
like this could be applied to any of the online business. Would they need direct access to a
users personal computer to be able to gain access to the information needed? How much
permission must outside sources be given in order for a system like this to function? Is it
possible for hackers to scam a user into giving out their fingerprints and sensitive information?
8/2/2019 Technology and Identity Theft
21/21
Givi Palagashvili
While I see potential application to closed systems which are designed to function in a manner
that allows physical identification, the internet has grown too far in complexity. So much so
that it is often impossible to propose a single encompassing solution to fix an overall problem
which leaves independent organizations to come up with their own solution. However, becausethese solutions often lack a physical way of identifying one person from another, they are often
exposed to potential unauthorized access and possible identity theft. The article itself delves
into the topic but its difficult to imagine that anyone is capable of understanding the problem to
the depth that is needed in order to fix it.