ReviewEssays.com - Term Papers, Book Reports, Research Papers and College Essays
Search

Identity Theft

Essay by   •  February 18, 2011  •  Research Paper  •  2,017 Words (9 Pages)  •  1,453 Views

Essay Preview: Identity Theft

Report this essay
Page 1 of 9

IDENTITY THEFT

Identity theft and identity fraud refers to all types of crime where someone obtains and deceptively uses another person's personal data most commonly for personal economic gain. "Identity theft is the fastest growing crime in the United States, claiming 27.5 million victims since 1997." [1] Unlike your unique DNA, dental records and fingerprints, someone else at your expense can use your personal data, such as your Social Security number, bank account or credit card number, telephone calling card number, and other valuable identifying data, for personal profit. A smart criminal may be able to become "you" with sufficient information and use your identity to commit fraud.

With enough identifying information about an individual, a criminal can take over that individual's identity to conduct a wide range of crimes: for example, false applications for loans and credit cards, fraudulent withdrawals from bank accounts. These types also will include acts of forgery. They can also obtain other funds, items or privileges, which the criminal might not receive if he were to use his own identity and information. Many times the criminal makes certain that bills for the dishonestly obtained credit cards or other statements showing the dishonest withdrawals, are sent to an address other than the victim's, they may not become aware of what is happing until the crook has already caused significant damage on the victim's assets, credit, and reputation.

Many times, a victim's losses may consist of sizeable financial expenses linked with trying to re-establish his status in the community and rectifying incorrect information the criminal is responsible for. There may be great amounts of out-of-pocket financial losses to the victim as well.. The longer it takes to discover a theft relating to someone's identity, the harder it

- 2 -

is to resolve and the greater the amount of damage. It has been said, low- income and less educated people are the ones that take the longest to report suspicions of these types of theft.

In a book I recently read, the author, Robert Hammond says, "Thieves...will settle for anyone -- dead or alive, rich or poor, young or old. Just as long as they have a name." (pg. 61) [2] In an article written in June 2004 by Graeme Newman for the U. S. Department of Justice, he said the average age of a victim is about 42 years old. He also said that people who live in large metropolitan areas are more likely to become targets and also the elderly because they normally do not check their credit reports or apply for many loans. [3]

Identity Theft Laws in Louisiana can be found in the state laws La. Rev. Stat. Ann. ยง 14:67.16. According to the Identity Theft Louisiana Information: these are the Identity Theft Types Reported by Louisiana Victims. [4]

Rank Identity Theft Type No. of Victims Percentage

1 Credit Card Fraud 650 35%

2 Phone or Utilities Fraud 431 23%

3 Bank Fraud 314 17%

4 Government Documents or Benefits Fraud 192 10%

5 Employment-Related Fraud 114 6%

6 Loan Fraud 108 6%

- Other 351 19%

- Attempted Identity Theft 136 7%

Percentages are based on the 1,875 victims reporting from Louisiana. Percentages add to more than 100 because approximately 18% of victims from Louisiana reported experiencing more than one type of identity theft.

- 3 -

Top Louisiana Identity Theft Victim Locations

Victim City No. of Victims

New Orleans 310

Baton Rouge 170

Metairie 111

Shreveport 96

Monroe 72

The most common way for criminals to commit identity theft is through the use of a Social Security number (SSN), credit card and debit card numbers, PINs (personal identification numbers), passwords and other personal information. This is why you should never provide this information in response to an unsolicited phone call, fax, letter or e-mail, no matter how friendly or official the call may appear.

In public places, criminals may engage in "shoulder surfing." This is when someone watches you from a close location as you punch in your telephone calling card number, bank pin number or credit card number into a machine or phone. They also listen in on your conversation if you give your credit-card number over the telephone to a place such as a hotel, rental Car Company, telephone bill pay or purchases. Some criminals engage in "dumpster diving". This is where the crook goes to the extreme and goes through your garbage cans, a communal dumpster or trash bin to find copies of your checks, credit card or bank statements, or other records that have your name, address, social security number, driver's license number and/or telephone number. While stealing your automobile, a crook will take documents with this personal information.

When you receive applications for "pre-approved" credit cards in the mail, but discard them without tearing up the applications and cards, criminals may take them and try to activate

- 4 -

the cards for their use without your knowledge. If you receive your mail in a place where others can get to it, these people can simply take it and redirect your mail to another place. Another way to obtain someone else's identity is from a business or your place of employment. Unauthorized personnel of that company do not hold businesses responsible for the uses of personal records of employees or clients.

Today one of the most popular ways to steal an identity is through the computer. When on the internet we see popup ads, new toolbars in your browser, and irritating spam often. This how computer wiz crooks can get your valuable personnel information when you believe it is safe to enter it unto your computer. Your PC can be infected with adware, spyware, spybot, trojans or another internet parasite that allow them access to this information. These programs have the capability to trace your browsing routines and even steal such personal information as card and bank account numbers and passwords.

I talked with

...

...

Download as:   txt (12.8 Kb)   pdf (158.3 Kb)   docx (14.9 Kb)  
Continue for 8 more pages »
Only available on ReviewEssays.com
Citation Generator

(2011, 02). Identity Theft. ReviewEssays.com. Retrieved 02, 2011, from https://www.reviewessays.com/essay/Identity-Theft/39929.html

"Identity Theft" ReviewEssays.com. 02 2011. 2011. 02 2011 <https://www.reviewessays.com/essay/Identity-Theft/39929.html>.

"Identity Theft." ReviewEssays.com. ReviewEssays.com, 02 2011. Web. 02 2011. <https://www.reviewessays.com/essay/Identity-Theft/39929.html>.

"Identity Theft." ReviewEssays.com. 02, 2011. Accessed 02, 2011. https://www.reviewessays.com/essay/Identity-Theft/39929.html.