+ All Categories
Home > Documents > Technology and Identity Theft

Technology and Identity Theft

Date post: 05-Apr-2018
Category:
Upload: givi-palagashvili
View: 219 times
Download: 0 times
Share this document with a friend

of 21

Transcript
  • 8/2/2019 Technology and Identity Theft

    1/21

    Givi Palagashvili

    I. IntroductionThe discovery and diffusion of technology has transformed crime and criminals, raising new

    challenges for the criminal justice system. However, many of these new and evolving forms of

    criminal activity remain, in large part, unexplored. This paper addresses the void by focusing

    on one type of deviance: identity theft. More specifically, the paper will: 1) provide an

    overview of the nature, causes and dynamics of national and international identity theft; 2)

    explore six case studies to highlight the diversity and complexity of this evolving form of

    crime; and 3) provide suggestions for combating identity theft, focusing on the dynamic tension

    between technology development and crime control.

    II. Identity theft: An Overview

    In todays society, identity theft has greatly risen in popularity among criminals. In the United

    States hundreds of thousands of people have their identities stolen each year. According to the

    Federal Trade Commission, identity theft is one of the fastest growing crimes in the United

    States. Identity theft is the appropriation of an individuals personal information to

    impersonate that person in a legal sense.(Identity Theft and Fraud Prevention). When a

    criminal steals someones identity it enables them to make financial and personal transactions

    in someone elses name, leaving the victim responsible for the costs. Criminals may use your

    personal information for various reasons such as to get a loan, buy drugs, get expensive

    medical treatments, and even kill someone in your name. Identity theft is a relatively new

    name for an age-old phenomenon

  • 8/2/2019 Technology and Identity Theft

    2/21

    Givi Palagashvili

    (Federal Reserve Bank of Boston). In past crime was a simple form of impersonation to act as

    another person with the intent to defraud others for personal gain. Imposters assumed the

    identities of others by imitating how their subjects dressed, behaved, and talked. This form of

    impersonation became ineffective as other forms of personal identifying information came into

    being (Hoffman 5). Also as time passed, criminals learned they could obtain enough

    information about a person from the trash without the need for killing the victim. One common

    practice was Dumpster diving this is when criminals would obtain bank statements, credit

    card information and other sensitive document and use it to represent someone else. As

    identity theft matured, criminals would steal directly from the mailbox to look for bank

    statement of individuals (Pragides). This method was successful and was easier then dumpster

    diving. Later telemarketing was used by criminals and brought a different form of crime.

    Telemarketers called people and told them they won a prize or were from charitable

    organization and asked about a donation. Once they received a donation they would convince

    people to give out personal information for verification purposes and use it to open credit card

    accounts, buy houses and other forms of illegal financial transactions (Pragides). However

    because of the development of technology, criminals have adopted new methods of committing

    crimes. Because people keep up with technology in order to conduct their daily life, people are

    required to adapt to information and discoveries that change the way we live. Since the early

    90s, the internet has grown in the United States and over the world. People became dependent

    on the internet and use in their everyday lives; they rely on it for safe and accurate exchange of

    information (McQuade). They constantly they give out personal data such as Social Security

    numbers, credit card numbers, and passwords without worrying. With the security measures in

    place people feel it is safe to exchange personal information and believe information is

  • 8/2/2019 Technology and Identity Theft

    3/21

    Givi Palagashvili

    confidential. However that is not always the case, criminals have also adapted to advancement

    in technology and, and today most crimes are committed over the internet. Today criminals use

    technology to devise new methods of theft in the form of cyber crimes (McQuade). Now

    criminals are using scams known as phishing to enter emails, hack in to another computer, and

    once their inside the computer network, they are able to view personal information and use it

    for personal benefits. Criminals have always taken advantage of new technologies in order to

    improve skills to combat security technologies.

    III. Case Studies: The Human Divisions of Identity Theft

    A general overview of identity theft reveals the nature, causes and broad parameters of this

    relatively new form of crime. How, broad sweeps do not uncover the unique qualities of

    individual cases. An overview of six cases reveals the complexities and human dimension of

    identity theft, as well as the challenges faced by the law enforcement officials in combating this

    evolving form if crime.

    Las Vegas Major Identity theft case:

    In 1979, a 73 year old man Arthur Gerald Jones fled his home and family in highland, Illinois

    and bought a social security number and other information on the black market for 800 dollars.

    The social security was stolen from a 50-year-old veteran named Clifton Goodenough. Jones

  • 8/2/2019 Technology and Identity Theft

    4/21

    Givi Palagashvili

    moved to Florida first however because of personal reasons he fled to Las Vegas in 1988, and

    found a job as a bookie at a casino. While back in Highland reports showed Jones was missing

    and was officially declared dead in 1986. Jones main tactic was using Goodenoughs Social

    Security number to pay taxes on his Las Vegas winning income. A first the IRS did not notice

    Jones was doing business with two Goodenoughs with the same ID number. While this was

    occurring Goodenough was living in Illinois. Goodenoughs did not think IRS took notice

    because he and Jones were filing their separate returns to different IRS regional offices. All of

    this changed when Goodenough moved to Arizona in the mid-1990s (Famham). The IRS

    noticed something suspicious because the real Goodenough and fake on were filing tax returns

    to the same office. Goodenough said he began hearing from the IRS asking why he was paying

    taxes on the extra income he was earning in Las Vegas. Goodenough responded and told the

    IRS and said he hasnt earned any money in Las Vegas and has not been in Las Vegas.

    (Famham). It appeared that Jones wasnt paying taxes on his earnings. This became frustrating

    for Goodenough because he found himself having to spend weeks worth of time writing to the

    IRS, Talking in the phone. In 1998 Goodenough went to get 20 dollars form an ATM machine

    and was told he lacked sufficient funds. He was unsure what has happened and immediately

    called his bank. The bank responded by say The IRS took your money. ( Farnham). Further

    he called the IRS and said I dont know what youre doing, I wasnt in Las Vegas, and I

    can prove it. (Farnham). He got his employer to write a letter testifying to his whereabouts on

    the dates in question. Eventually, the IRS relented, and put the money back in his account. In

    addition to the 75 dollars they charged him for the wire transfer. Goodenough personal life was

    seriously affected decided to take steps further. He and his wife got the phone number of the

    fake Goodenough in Las Vegas. When they called the fake Goodenough they found an easy-

  • 8/2/2019 Technology and Identity Theft

    5/21

    Givi Palagashvili

    going guy who insisted there must be some honest mistake. Goodenough was asking fake

    Goodenough personal question like what hospital he was born and where he grow up. It

    appeared they both had exactly the same stories. The police investigated more on the case and

    eventually ended a 15 years of Identity theft crime. Arthur Gerald Jones has been order to pay

    restitution to both the Social Security Administration and to the man whose identity he stole.

    Jones pleaded guilty to one count of felony identity fraud. He will be sentenced on January 31,

    2012 (Farnham).

    Massive NYC theft ring

    Accrording to Msnbc News since 2010 a criminal enterprise crime operating took place with

    the involvement of one bank and restaurant in Queens. The operation consisted of three bank

    workers, retail employees and restaurant workers would steal credit card numbers in a process

    known as skimming, this is when workers take information form a credit card and swipe it for

    payments and illegally sell the credit card numbers (Msnbc.com). Further different member of

    the criminal enterprise would steal personal information online. Later the information was

    given to the team responsible for manufacturers; they would forge Visas, MasterCards,

    Discover and Amercian Express cards. Further realistic identification was made with the stolen

    data. Credit cards were given to the teams criminal shoppers for spending sprees at higher-end

    stores including Apple, Bloomingdalessand Macys. Most of these products were resold in

    China, Europe and the Middle East. In result more than 13 million dollars was spend on IPads,

    IPhones, computers, watches and fancy handbags from Gucci and Lousi Vuitton. In addition

    suspects used the money to pay for hotel rooms and pricy cars. During the investigation

  • 8/2/2019 Technology and Identity Theft

    6/21

    Givi Palagashvili

    detectives found it hard to translate Russian, Farsi, and Arabic. Deputy Inspector Gregory

    Antonsen of the NYPDs organized theft and identity theft task force stated. Part of the

    problem, especially for foreign tourists in the U.S., is the, unlike overseas, credit card

    companies in the U.S. do not install special microchips that make skimming more difficult.(

    Msnbc.com). In addition Antonsen states "Thieves have an amazing knowledge of how to use

    technology.(Msnbc.com). He said. "The schemes and the imagination that is developing these

    days are really mind-boggling." Police searched several homes and seized computers, packaged

    electronics, and 650,000 dollars in cash, along with several weapons. The charges for this case

    included enterprise corruption, theft and grand larceny. In this operation about 111 people

    were charged and 86 are in custody; the other are still being questioned. Criminal were hit

    with over 100 charges, and is going on record for the largest identity theft takedown in U.S.

    History.(Msnbc.com).

    Largest credit card theft in U.S. history

    Eleven people including U.S. Secret Service informant have been charged with hacking nine

    major retailers and the theft and sale of more than 41 million credit card numbers (Huff Post).

    Reports states breach is believed to be the largest hacking and identity theft case ever

    prosecuted by the Department of Justice, which said the suspects were charged with

    conspiracy, computer intrusion, fraud and identity theft.( Huff Post). Three people were U.S.

    citizens and other s from Eastern Europe and China. The suspects hacked into wireless

    computer networks of retailers such as TJX Cos., BJs Wholesale Club, OfficeMax, Boston

    Marke, Barnes & Noble, Sports Authority, Fovever 21 and DSW and set up programs that

  • 8/2/2019 Technology and Identity Theft

    7/21

    Givi Palagashvili

    captured card numbers, passwords and account information. (Huff Post). The thieves that

    where responsible for this activity where just regular people that used a technique called ,

    wardriving, which involved cruising through different areas with a laptop and looking for

    accessible wireless internet signals. Once they located a vulnerable network, they installed

    specific programs that captured credit card numbers. Further the information was kept

    internationally on computer servers in countries like Ukraine and Latvia. The ring operated

    mostly in Eastern Europr, the Phillipines, China and Thailand (Huff Post). Albert Gonzalez of

    Miami was responsible for this crime, and is charged with computer fraud, wire fraud, access

    device fraud, aggravated identity theft and conspiracy. Further Gonzalez was feeding criminals

    with information about ongoing investigations and warning the criminals about possible

    dangers. Gonzalez faces maximum sentence of life in prison. Gonzalez was a member of U.S.

    Secret Service working on websites used to transfer stolen goods (Hoff Post).

    H & R Block Identity theft

    According toChicago Breaking News in Highland Indianan, A police officer pulled over a car

    that he suspected driving under the influence. Once the police officer approached the vehicle

    he noticed a female passenger nervously fidgeting in the back seat. The officer asks her what

    the issue was, and she responded she was looking for a bottle for her small child also in the car;

    however the officer noticed a gold Visa card at her feet (Chicago Breaking News). The name on the

    card did not match the woman. Officers arrested her and discovered she was a former H&R

    Blockemployee who has stolen the identities of dozens of clients and then collected hundreds of

    thousands of dollars in refunds after fraudulently filing customers names without their

  • 8/2/2019 Technology and Identity Theft

    8/21

    Givi Palagashvili

    knowledge. Once the car was searched officers have uncovered a large amount of evidence.

    They found a box full of H&R Block client information, numerous blank W-2 forms, about 100

    debit cards and yellow legal pads with columns of Social Security numbers, Pin numbers, dates

    of tax filing and whether the returns had been accepted or rejected authorities said. Coming at

    the height of tax season, the arrests of Francesca Foster, who worked at an H&R Block office

    in East Chicago and a second woman, illustrate the dangers citizens face when filing tax returns

    full of sensitive information and the ease in which scammers can use electronic filing to steal

    identities. H&R officials said the company follows several measures to protect customers'

    information, including data encryption and shredding of confidential data. (Chicago Breaking

    News).The business also said it provides victims with a year's subscription of identity-theft

    protection and helps them file the necessary forms with the IRS. (Chicago Breaking News).

    Internal Revenue Service officials said citizens need to have the same level of trust with their

    tax preparer as they do with their own doctor before giving out personal information. (Chicago

    Breaking News).

    Largest Medicare fraud in United States

    A highly organized group referred to as Armenian Power have encountered in many organized

    crime throughout United States and other countries around the world. The Medicare fraud

    occurred in the United States was considered largest in U.S. history (Rothfeld). Identities of

    doctors and patients were stolen and used for different clinics in 25 states to bill Medicare for

    more than 100 million for treatments no doctor ever performed and no patient ever received.

    This occurred over a four year period. There were over 118 clinics and over 100 million

  • 8/2/2019 Technology and Identity Theft

    9/21

    Givi Palagashvili

    dollars in bogus billing. 41 of the people accused had been arrested, 21 of them came from

    New York City, and many others in Los Angeles (Rothfeld). The leader of the organization

    was Armen Kazarian who is indentified as Vor which mean thief in-law which comes

    from a term used in the former Soviet Union. A person with that nickname is highly respected

    criminal boss. Law enforcement officials described Armenian Power as having an "extensive

    portfolio" that combined ruthlessness with opportunism, focusing on white-collar crime that

    included identity theft crimes such as credit-card skimming (Rothfeld). Total money stolen

    was around 163 million dollars in fraud. In addition the groups members and associates are

    charged with numerous crimes, including racketeering, health care fraud, identity theft, money

    laundering and bank fraud (Rothfeld).

    Celebrity Identity Theft

    According to New York Times identity theft is a common concern for celebrates because of

    their perceived wealth and status. Mayor Michael Bloomberg was a victim of Identity theft

    four years ago when two men have hacked into his personal financial account and were trying

    to steal 420,000 dollars from his account. According to prosecutors, Mr..Bostic created the

    Laderman Development Company in Elizabeth, N.J., and set up accounts in the companys

    name at two banks, PNC and Sovereign Bank. The problem occurred in early June when Mr.

    Bostic deposited 190,000 dollars into the Sovereign account and 230,000 dollars deposited into

    PNC bank account (chan). Both the checks were on Mr. Bloombergs personal account.

    However because of the size of the two checks, the bank decided to put it on hold for forgery.

    In August Mr. Bostic got arrested in New Jersey and was charged for grand larceny in the

  • 8/2/2019 Technology and Identity Theft

    10/21

    Givi Palagashvili

    second degree, and faces up to seven years in prison (Chan). In addition while investigation

    took place into forged checks another fraud was discovered. The second man was, Charles

    Nelson hacked into the Mr. Bloomberg account and stole 10,000 dollars from the bank account.

    He transferred the money to his E Trade account and used a debt card for purchases. Mr.

    Nelson got arrested in Newark, where a computer, documents and two guns were discovered.

    Mr. Nelson was convicted and sentenced up to seven years in prison. According to New York

    Times this was not the first time criminals have gone after the mayor. Before his election

    officials have investigated a case against a person from Kazakhstan who tried to extort money

    from Mr. Bloombergs account. In addition a man named Oleg Zezev in March 2000 has sent

    threatening emails saying he had infiltrated the companys computer system and wanted

    200,000 dollars. Mr.Bloomberg immediately contacted the F.B.I. about the threats. Months

    later the F.B.I tracked Mr. Zezev arrested him for extortion and was sentenced to 51 months in

    prison (chan).

    IV. Preventing Identity Theft: Direction for the Future

    Although it is very easy for someone to steal your identity, there are many ways to prevent

    identity theft. First, destroy all credit cards, and all financial statements; always use secure

    websites when making purchases over the Internet; dont talk about financial issues using

    wireless communications; call up your local DMV and request that your private information get

    protected from disclosure. Dont use your mothers maiden name on your passwords for credit

    cards. Be cautious of anyone calling to confirm personal information. Thoroughly review all of

    your bank, credit card, and phone statements for unusual activity. Dont carry around your

  • 8/2/2019 Technology and Identity Theft

    11/21

    Givi Palagashvili

    social security number. And most-importantly, secure your mail and monitor your credit by

    asking for credit report once a year and to watch for any unknown purchases.

    If you suspect that you are a victim of identity theft, there are different things that you could do.

    The first thing to do is be aware. Watch out for any unusual purchases; being denied a loan you

    have qualified for; watch when your personal records dont agree with personal records; look

    out for any unexplained changes in your bank access codes; and look out for any unusual calls

    regarding your personal or financial information. If you suspect foul play with your credit or

    feel that something may be wrong, contact your local law enforcement officials to look into it.

    Dont hesitate to follow up.

    If you are a victim of identity theft there are many different steps you can take to make sure

    that the crime is going to be solved or to make sure that this does not happen again. As with all

    crimes, report the crime to your local police departments immediately. Call the fraud unit at

    each of the big three credit bureaus to notify them of what has happened. Do not pay any bills

    or charges that result from identity theft. Write a victim statement of 100 words or less. Get

    copies of your credit reports. Call your credit card issuers to close accounts. Create new secret

    passwords and PIN numbers. Contact the Social Security Administration and advise them of

    what has happened. Contact an attorney to make sure you are not victimized again. Be

    persistent and follow up.

  • 8/2/2019 Technology and Identity Theft

    12/21

    Givi Palagashvili

    I. ConclusionToday, identity theft continues to remain a primary focus of law enforcement. As the crime rate

    for this offense continues to rapidly grow, law Enforcement officials as well as government

    representatives continue to target the crime and find ways to stop it. There are many things that

    officials must consider doing that would help prevent identity theft. For instance, provide a law

    enforcement response to high tech crime complaints 24 hours a day seven days a week.

    Knowledge, resources, and training should be shared among local law enforcement investigate

    agencies to prosecute Internet crime more effectively. Funding for a computer forensics lab,

    which will be essential for investigating and prosecuting Internet crimes, should be made

    available to legislation and should be enacted to help prosecute on-line crime. Finally,

    sentencing of this crime must also be put into perspective. One third of all identity theft

    offenders dont even get sent to prison, and those who do, dont even get lengthy terms.

    Representatives need to come up with legislation that would prosecute and fairly sentence

    criminals charged with identity theft because this crime surely is a victims crime. And

    remember, identity theft could happen to anyone, even to you.

  • 8/2/2019 Technology and Identity Theft

    13/21

    Givi Palagashvili

    Bibliography

    Chan, Sewell.Metro - City Room Blog - NYTimes.com. Web. 07 Dec. 2011.

    .

    Farnham, Alan. "Las Vegas Identity Theft Case Ends After 15 Years."ABCNews.com: Daily News,

    Breaking News and Video Broadcasts - ABC News. Web. 5 Dec. 2011.

    .

    Federal Reserve Bank of Boston. "Idenitity Theft Protect Yourselt." Web. 4 Dec.

    2011http://www.bos.frb.org/consumer/identity/idtheft.pdf

    Hoffman, Sandra K.Identity Theft. Greenwood, 2010. Print.

    Huff Post. "Biggest Identity Theft In History."Breaking News and Opinion on The Huffington

    Post. Web. 5 Dec. 2011. .

    http://www.bos.frb.org/consumer/identity/idtheft.pdfhttp://www.bos.frb.org/consumer/identity/idtheft.pdfhttp://www.bos.frb.org/consumer/identity/idtheft.pdf
  • 8/2/2019 Technology and Identity Theft

    14/21

    Givi Palagashvili

    Identity Theft and Fraud Prevention. "FTC: Identity Theft Is the Fastest Growing Crime."

    Identity Theft | Leader in Identity Protection and Credit Reports. Web. 07 Dec. 2011.

    .

    McQuade, Sam. "Technology-enabled Crime, Policing and Security." The Journal of Technology

    Studies (2003). Print.

    Msnbc.com. "11 Charged in Connection with Credit Card Fraud."Msnbc.com - Breaking News,

    Science and Tech News, World News, US News, Local News- Msnbc.com. Web. 5 Dec. 2011.

    .

    Pragides, Bernard. "History Of Identity Theft and Technology Advancements | Bernard

    Pragides."Bernard's Latest Writings. Web. 4 Dec. 2011.

    .

    Rothfeld, Michael. "Medicare Scheme Netted $35 Million, Officials Say." The Wall Street Journal.

    Web. 5 Dec. 2011.

  • 8/2/2019 Technology and Identity Theft

    15/21

    Givi Palagashvili

    " Woman Charged in H&R Block Identity Theft Case." Chicago Breaking News. Web. 07 Dec. 2011.

    .

  • 8/2/2019 Technology and Identity Theft

    16/21

    Givi Palagashvili

    Identity Theft: The Dialectics of Technological Developments and Crime Control

    Givi Palagashvili

    Professor Pisciotta

    CRJ 380 Senoir Seminar

    December 7, 2011

  • 8/2/2019 Technology and Identity Theft

    17/21

    Givi Palagashvili

  • 8/2/2019 Technology and Identity Theft

    18/21

    Givi Palagashvili

  • 8/2/2019 Technology and Identity Theft

    19/21

    Givi Palagashvili

    This article highlights a growing, almost unstoppable, problem with the advancement of

    technology today. It describes how the increase in technological advantages makes it more

    difficult to prevent the misuse of information on the internet. Identity theft was a highlighted

    crime in this situation as it has become easier to exploit this type of crime. Identities are sold

    around the world quickly after they are stolen through online auction sites operated by

    organized crime or hackers, and they are used for a number of purposes -- most of which do not

    need a personal presence where a retina scan might be used. This clip from the article

    highlights two critical problems with the current technological situation as well as revealing a

    potential problem with the proposed solution, which is physical identification.

    The first problem is the availability of internet sources that make a profit selling and buyingpersonal information. These sites are capable of quickly and discretely selling information such

    as credit card numbers, phone numbers, social security numbers and complete names to buyers

    across the world for a simple transfer of funds and an email. Considering the nature of this

    crime and its potential for easy money, it is no surprise that identity theft has become such a

    growing crime. Once the information has been stolen or purchased, it can be used to create

  • 8/2/2019 Technology and Identity Theft

    20/21

    Givi Palagashvili

    false duplicate identities of a person on the internet. This can result in several false purchases of

    various products in another persons name. However, it should be noted that these purchases

    are rarely sent to, or identified with, the person who had stole the information. It makes sense

    as a criminal would not want to identify themselves with the crime that they had justcommitted. An analogy was used that described a theft using a stolen credit card at an ATM.

    They would eventually be caught as many ATMs have cameras that watch and monitor the

    transactions. However, the internet does not have such a monitoring device which leads to the

    second problem.

    The second problem is the lack of identity on the internet. Because a computer only recognizes

    a person as a series of inputs it is possible to become anyone on a computer as long as you

    possess the necessary inputs. If a person has the inputs necessary than they can essentially

    become anyone that they wish to and the computer will not have the ability to distinguish the

    difference. This allows hackers and identity thieves to pass as anyone they want to as long as

    they have the necessary information to do so. This includes bank accounts, paypals, credit

    companies and online businesses. And because of the lack of identity given by the internet, it

    becomes increasingly more difficult to trace someone back to the crime.

    This has led many to suggest physical identification in the form of retina scanners and even

    fingerprint scanners. While this is just the tip of the suggestions offered, they seem to be the

    ones that are gaining ground in protection of information. However, the solution has some

    potential problems. By giving users a physical presence on the internet it infringes on the

    freedom offered by internet autonomy. This freedom will be lessened if everyone is given a

    traceable presence on the internet. This is one of the reasons that the article at hand suggests

    that a physical solution would be made impossible by the people who would reject it.

    Another problem is the implausibility of physical identification. While it is possible in the

    office places as well as in a few other places where information is publically accessible, it is not

    plausible on something as vast and flowing as the internet. I am at a loss as to how a system

    like this could be applied to any of the online business. Would they need direct access to a

    users personal computer to be able to gain access to the information needed? How much

    permission must outside sources be given in order for a system like this to function? Is it

    possible for hackers to scam a user into giving out their fingerprints and sensitive information?

  • 8/2/2019 Technology and Identity Theft

    21/21

    Givi Palagashvili

    While I see potential application to closed systems which are designed to function in a manner

    that allows physical identification, the internet has grown too far in complexity. So much so

    that it is often impossible to propose a single encompassing solution to fix an overall problem

    which leaves independent organizations to come up with their own solution. However, becausethese solutions often lack a physical way of identifying one person from another, they are often

    exposed to potential unauthorized access and possible identity theft. The article itself delves

    into the topic but its difficult to imagine that anyone is capable of understanding the problem to

    the depth that is needed in order to fix it.


Recommended