Monday, March 4, 2019

Modern Technology Has Brought the Resurgence of Identity Theft Essay

individuality stealth is one horror that has spawned from technological advancements. Criminals have developed numerous strategies on how to steal underground and in the flesh(predicate) info. Dealing with indistinguishability thieving may be a ch in allenge since justness enforcement personnel may not be full competent in handling the cases since they may lack the directd skills to be open to deal with such a disgust while cloistered people and even businesses have lost much because of this type of offense.The crook of cases of personal individualism stealth has been constantly on the rise however, the prevalence of the crime may as well be blamed on advanced(a) technology itself. Modern technology has brought about many conveniences for run-of-the-mill people and even for identicalness thieves. From hardly less than 10,000 shrouded cases of individuality stealth in 1999, the figure steadily climbed reaching around 50,000 in 2003 and more than 80,000 in 2006 (Infocycle, 2007). In the United Kingdom, credit card imposter has as well been consistently increasing.In 2007, over 7,000 credit cards and calculate cards were either lost or stolen. CPP Card Protection has indicated a 77 percent increase in credit card boloney compared to the figure on 2006 (Experian QAS, 2008). According to a study by Gartner, identity theft claimed 15 million victims in 2006 alone. The US Justice department has recorded 226 cases of identity theft in 2005 but in the runner half of 2006 alone, there were already 432 cases. The FBI also indicated that it is working on 1,587 cases relating to identity theft (ITRC, 2007).Preventing identity theft may not be as easy as it seems. Joel Reidenberg and Lawrence Lessig said concentrating on the architectures of control to foresee identity theft is the way to go. Solove, on the early(a) hand, indicates that architectures of vulnerability should also be considered in addition to architectures of control. Accordin g to Solove, shaping architectures should be the focal point in the protection of privacy and not on remedies and penalties. He remark that architectures often provide a vulnerable point that identity thieves take advantage of.It is this lack of security that identity thieves are able to use a persons personal information. He suggests that a public identification system be created as a resolution to the problem (Solove, 2003). It is exactly new technology that produces these architectures and they are greatly blemished since many people can still bypass its security functions bear witness by the prevalence of identity theft on the cyberspace. Identity theft has gained much notoriety in the advent of buying and selling on the Internet.However, identity thieves can still use the old methods for obtaining personal information. putting surface methods are stealing wallets or mails, looking through residential trashcans or business dumpsters, posing as whatsoeverone legally permitt ed to approaching personal information such as credit reports, or bribing their way to postulate the information (Newman, et. al. 2005). A phishing scam is another method of getting personal information out of a person. The Anti-Phishing Workgroup indicated that there are sole(prenominal) 4,564 phishing websites in July 2005 but the number increased to 23,670 as of July 2006.A study at the University of Indiana also indicated that 14 percent of phishing scams are successful which contradicts the Gartner report which indicates only a three percent success rate. The Gartner research also found out that financial losses from phishing scams were $137 million in 2004 acclivity to $2. 8 billion in 2006 (ITRC, 2007). The fight against identity theft may be considered rather ineffective since law enforcement personnel lack the inevitable resources to combat such a crime which is computer-related.Britz indicates that this kind of crime requires law enforcers to have knowledge of compute rs and other digital stuff. It may be noted that many law enforcement agencies do not have well-trained personnel to mete out such cases. These personnel may also be acting some(prenominal) capacities at a given time. Computer technology has increased at an exponential rate as did technology related crime and this would require that law enforcers be trained to effectively handle such crimes (Britz, 2004). As technology improves, security is being compromised and this can be proven by the increasing number of identity theft crimes.While it is true that online banking and other services on the Internet provide much convenience, it also provides lesser risks of capture for identity thieves. Law enforcers could do little do prevent identity theft or to investigate such since not all of them have the capacity to do so and identity thieves are ameliorate their arsenal of identity stealing techniques. Technology might also be considered as the root of the prevalence of identity theft. E ven as identity theft was not considered a crime before 1998, it has existed for a foresighted time.Modern computing and telecommunications technology has once again popularized identity theft since identity thieves can better elude law enforcers compared to going to a bank and making a transaction using stolen information (Arnold, 2000). rule has always tried to carry on cyber crime, but it is challenging for lawmakers to keep up since technology quickly evolves and cyber crime evolves with it. A good approach would be improving security measures, educating users, adopting a vigilant approach in combating cyber crime and a police force that is well-equipped to handle such crimes (Alaganandam, et. al. , 2005).Identity theft and other cyber crimes are also classified as white-collar crimes, thus, offenders do not receive harsh penalties. They can even use the cash plundered to pay for their defense and they serve at least only one year in prison (Arnold, 2000). Identity thieves m ust be dealt with harsher penalties since they operate on a much larger scale straightaway and are even comparable to bank robbers only less inclined to being caught and given much less media attention.The number of cases of identity theft is increasing at an exponential rate but this could most probably be blamed on modern technology especially since the Internet has become commercialized. New technology comes with new opportunities for identity thieves to gain access to personal information and using it for personal gains. Legislation can address this problem but it would prove to be a challenge since identity thieves are finding new ways of how to steal personal information as technology develops.Legislation must also address this by rendering harsher penalties for cyber criminals as they operate just like ordinary criminals, the only difference is that they work discreetly and have not been given media attention. Also, the victims do not really know that they have been victim ized until after some time the thieving takes places. References Alaganandam, H. , Mittal, P. , Singh, A. , & Fleizach, C. , 6 December 2005. Cybercriminal Activity. Retrieved family line 7, 2008, from sysnet. ucsd. edu/cfleizac/WhiteTeam-CyberCrime. pdf Arnold, T. 2000 June.Internet Identity Theft A Tragedy for Victims. Software and Information Industry Association. Retrieved September 7, 2008, from www. siia. net/software/pubs/iit-00. pdf Britz, M. (2004). Computer Forensics and Cyber Crime An Introduction. Upper Saddle River, NJ Pearson Prentice Hall. Experian QAS. 22 August 2008. Holiday Fraud Threat. Retrieved September 3, 2008, from http//www. qas. co. uk/ come with/data-quality-news/holiday_fraud_threat_2614. htm Identity Theft Resource Center. 30 April 2007. Facts and Statistics. Retrieved September 3, 2008, from http//www. idtheftcenter.org/artman2/publish/m_facts/Facts_and_Statistics. shtml Infocycle. (2007). political science Bodies Must Play Their Part in Securing Again st Identity Theft. Retrieved September 3, 2008, from http//www. infocycle. co. uk/index. php? election=com_content&task=view&id=43&Itemid=43 Newman, G. & McNally, M. 2005 July. Identity Theft literary productions Review. Retrieved September 3, 2008, from http//www. ncjrs. gov/pdffiles1/nij/grants/210459. pdf. Solove, D. (2003). Privacy, and the Architecture of Vulnerability. Hastings Law Journal, 54. p. 1227. Retrieved September 3, 2008, from http//ssrn. com/abstract=416740

No comments:

Post a Comment