This website uses cookies to ensure you have the best experience. Learn more

Combating Identity Theft Essay

1999 words - 8 pages

1.1 What is identity theft?
Identity Theft, in a very simple term, is stealing a person's private identifying information, usually for financial gain. It is prevalent throughout the world and there are several ways to steal one’s identity. Stealing one’s identity doesn’t require much information. By getting the name, date of birth and address of a person, one can easily steal the person’s identity.
1.2 What does this paper focuses on?
The paper focuses on identifying:
 The common types of identity theft.
 The issues associated with identity theft.
 The most commonly affected sectors
 Technologies and techniques utilized/implemented by organizations to combat it. ...view middle of the document...

 Breach the data stored in the system to obtain personal information.

The main motive behind identity theft is to get benefit (mostly financially) to the fullest without having to spend any of their money. The most common issues associated with identity theft are:
 Financial loss
 Denial of credits
 Increased debts
 Loss of time in investigating/ resolving crime.
 Arrest
 Reputation loss

4.1 Identity Theft Assumption Deterrence Act:
In 1988, Congress passed the act that criminalized identity theft at the federal level. The act provided penalties for individuals who either committed or attempted to commit identity theft. The penalties included up to 15 years imprisonment and a maximum fine of $250,000. It establishes that the person whose identity was stolen is a true victim.

4.2 Identity Theft Penalty Enhancement Act:
Congress further enhanced the penalty by providing two to five year imprisonment for identity theft committed in relation to other federal crimes. The act amends the federal crimes to establish penalties for aggravated identity theft in addition to the existing punishments for related felonies. Two years of imprisonment is added for knowingly transferring, possessing or using another person’s identity. Five years of imprisonment is added for using false identifications to impose terrorist acts.

4.3 Identity Theft Enforcement and Restitution Act of 2008:
This act is little bit different from the rest of the acts enacted by the government. The act provides law enforcement with broader ability to combat liability on bad actors. The act authorized restitution to identity theft victims for their time spent recovering from the harm caused by the actual or intended identity theft.

Several Organizations were working hard to implement new technologies that could successfully combat the identity theft. Nowadays, the data being carried by internet is extremely huge and majority of person’s identification information are somehow linked to the internet. So, organization has to make the data communication in internet highly secure. This need resulted in the evolution of cryptography concepts. Though there are thousands of technologies implemented by several organizations to mitigate identity theft, this paper focuses on describing three technologies that has been served as a basis for several new technologies.
5.1 Knowledge Based Authentication:
Knowledge Based Authentication, commonly referred to as KBA, is a method of authenticating the legitimacy of one’s identity prior to granting the accessibility to that user. Authentication is considered as the first layer of defense against identity theft. Usually, the process seeks elements like Username, Password, PIN etc to evaluate the legitimacy of user. KBA is used to check the identity of the user before providing them with access and it can be...

Find Another Essay On Combating Identity Theft

Computer Crime Essay

1796 words - 8 pages . The top five cyber-crimes are the following: tax-refund fraud, corporate account takeover, identity theft, theft of sensitive data, and theft of intellectual property (Singleton 2). Also, all cyber-crimes have three things in common; the tools needed to commit the crime, a strategy on how to follow through with the crime, and the outcome which is the crime itself (Singleton 2). There are also different forms of cyber-crime, and the top two are

How to combat spam Essay

1811 words - 8 pages , the costs of which are borne by ISPs, businesses and consumers. Spam affects ISPs by slowing down or even failing the network and indirectly resulting in defaming ISPs’s reputation. Consumers are suffering from unwanted emails, filling up their boxes, which may contain violent or vulgar materials, fraudulent advertisements, identity or bank credentials theft and malicious software. It takes time to delete all junk emails and in the process

Internet Law And The Economy

1379 words - 6 pages countries and vice versa. In order to be effective, a uniform body, like Interpol, needs to be created with international jurisdiction over the internet. Identity theft, stock manipulation, and fraudulent sales are examples of crimes committed on the internet and virtually go unpunished. Even if law enforcement is able to catch up to the perpetrator, it is usually too late. Law and order in this new economy is the responsibility of everyone using the

Digital Crime and Terrorism Case Study

1506 words - 6 pages are done through the web and this will help law enforcers to deal with cyber criminals who gain access to documents and information that they are not entitled to (Taylor, Caeti, & Fritsch, 2010, pp. 310-312). Forecast 2: Internet fraud and identity theft The issue of monetary fraud through the internet is one that is becoming challenging to law enforcers because of the increase in the number of people and companies who sell and buy through

The Crime of Rape

2479 words - 10 pages ). Sexual penetration involves the introduction of a person's penis, object, or other body parts into the vagina, anus, or mouth of another person. Consent requires agreement that is free; if a person has been a) threatened, b) is fearful for themselves or someone else, c) is mistaken about the identity of the person or the nature of the sexual act, d) wrongly believes the act is for medical purposes, e) is incapable of consenting because of the

Team Leadership

2198 words - 9 pages . Executives create zero-tolerance policies that outlaw antisocial behaviors and follow these guidelines themselves. They use their power constructively, confronting and punishing offenders at the first sign of trouble (Pearson, Andersson & Porath 2000). Moral leaders also address contextual triggers of destructive actions such as oppressive supervision, job stress, unpleasant working conditions, perceived injustice, threats to group identity, and

Pink Panthers

1989 words - 8 pages -legitimate businesses that facilitate smuggling, money laundering, financial frauds, piracy of intellectual property, identity theft and other illicit venture” (Viano). This is once again seen through the Pink Panthers who use money earned in different areas of the world to launder money through investment in legitimate “cafes, restaurants, and real estate”. The three aforementioned aspects of globalization, _____rename them____,exemplify that on one


2293 words - 9 pages technique misleads users about the identity of the entity requesting permission to install software. One such technique is the "pop-under exploit." With this technique, for example, users visiting their favorite news website are presented with a Security Warning dialogue box asking if they want to install a software program. These users may click "Yes" because they believe that the request is from the operator of the news website. In fact, the person

Speaker identification and verification over short distance telephone lines using artificial neural networks

2481 words - 10 pages embezzlement. In today’s complex economic times, businesses and individuals are both falling victims to these devastating crimes. Employees embezzle funds or steal goods from their employers, then disappear or hide behind legal issues. Individuals can easily become helpless victims of identity theft, stock schemes and other scams that rob them of their money White collar crime occurs in the gray area where the criminal law ends and civil law

Terrorism Today

4474 words - 18 pages that his family made in the construction industry, building luxury mansions for Saudi Arabia's oil- billionaires.Terrorist financing was a hot topic after the events of September 11, 2001. The US passed the USA PATRIOT Act, among other reasons, to ensure that both combating the financing of terrorism (CFT) and anti-money laundering (AML) was given sufficient focus by US financial institutions. The act also had extra-territorial impact and non-US

Policing study notes

10083 words - 40 pages manslaughter was 16,204 murders which amounts to 5.6 murders for every 100,000 Americans. The other crime measure, the National Crime Victimization Survey, reports crime data on bases of results of interviews with people many who did not report the crime to police. The UCR data only includes incidents actually reported to the police. The figures for motor vehicle theft (auto larceny) are closest in both reports. This is because most people in the United

Similar Essays

Community Oriented Policing Essay

1618 words - 6 pages and Cops uses this information so that other agencies can benefit and learn from others experiences.However, each portion of the (COP) program offers beneficial assistance to the programs over-all success. Further, theft can be a problem for a community's well-being therefore; importance should be shown to each aspect of theft including identity theft. Identity theft occurs when a criminal uses or takes someone else's personal information as

Identity Theft In Our Contemporary Society

2949 words - 12 pages Identity Theft in Our Contemporary Society Introduction How do you secure your identity with the Internet developing faster than can be protected? Attempting to stay ahead of the hackers and attackers has been a contentious effort since the Internet’s earliest days as a research project. Today, after thirty years of prolific development, security concerns have only increased. Designing computer systems and devices which are capable

Cyber Crimes Reflected Through Television Programs

1058 words - 5 pages ). Computers and computer systems are the chosen vessel to carry out these crimes, identity theft, and espionage, theft of sensitive information, computer intrusion, and corporate account takeovers. Cyber crimes have rapidly become the number one threat to the United States and its citizens; the progression of these crimes has demanded the attention of US Intelligence. According to James Clapper, Director of Intelligence, Terrorism has been

Different Methods Of Cyber Crime And Their Effects On Modern Society

1363 words - 5 pages safety of their own home. Cybercrime comes in many forms. The most common are personal or group crimes such as “hate crimes, telemarketing and internet frauds, identity theft, and credit card thefts” (Webopedia, 2013). Even more dangerous cybercrimes include “cyber-based terrorism and espionage”, which present national safety threats (Federal Bureau of Investigation, 2013). Cybercrime used to be a difficult act to commit, as hacking programs