Home Computers; Our Greatest Weakness In The Fight Against Identity Theft

659 words - 3 pages

When we think of identity thefts we usually picture someone stealing a wallet or a purse and using the information inside to gain a bit of short term financial security. A deeper and more sinister cause may be right at our fingertips and we don't even realize it. Have you received suspicious emails lately saying "Your application for home refinancing has been approved," or "your credit card application has been approved." This and other examples of identity theft are on the rise across the nation. How are these bandits getting your information? Alarmingly more and more people are realizing that these culprits are stealing personal information right off of their home computers. In a recent article published by Adam S. Marlin (2003) titled "Online identity theft a growing concern" he illustrated how a California family physician religiously shredded every piece of mail prior to putting it out in his trash. Yet the doctor was charged with a $115,000.00 bill for medical equipment he never even purchased. The resulting investigation revealed that his social security number and credit card information were stolen from a small file saved on his home computer. Because the doctor failed employ a personal firewall on his home computer, his financial record is now tarnished. Law enforcement officials consider online identity theft the fastest-growing financial crime in the United States. The Social Security Administration received 7,867 complaints of misused social security numbers in 2000, nearly 11,000 complaints in 2001 and more than 30,000 in 2002. This growing epidemic of identity theft can largely be attributed to the use of unprotected information filed on home computers. Protection against identity theft from personal home computers can be effectively combated if owners install and properly maintain anti-virus programs and firewalls culminating in enhanced security consciousness.One line of protection that every home computer should employ, is the use of anti-virus software that blocks computer viruses such as Trojan Horse programs. A Trojan Horse virus is a...

Find Another Essay On Home Computers; our greatest weakness in the fight against identity theft

The Sentence (Identity Theft) Essay

816 words - 3 pages Identity theft has become a growing problem in the United States. It is "defined as the process of using someone else's personal information for your own personal gain." (SpendOnLife.com, 2009)When a person is arrested on charges of identity theft and then brought to trial, the judge needs to take into consideration various things before he or she hands down a sentence. Among those things are educational backgrounds, finances, standing in the

Juvenile Victimization in Identity Theft Essay

2325 words - 10 pages Juvenile Victimization in Identity Theft Introduction Identity theft is continuously growing crime, and over the past several years we have seen a rise in the victimization of juveniles in the horrendous crime. Three important terms which are addressed in this research (that are important to know and understand) are identity theft, juvenile, and victimization. According to the Bureau of Justice Statistics, identity theft is defined as “the

The Fight Against Pollution in China

728 words - 3 pages Polluting companies around China might be forgiven for feeling under pressure: they have good reason to be after China announced the latest measures to fight environmental damage. On February 11, news came out that in 2013 China's environmental watchdog blocked 32 projects – the combined value of which amounted to 118.4 billion yuan ($19.5 billion) - on the ground that they had broken rules protecting the environment. Zhai Qing, the vice

Targeted Killings in the Fight Against Terrorism

1485 words - 6 pages Introduction Just ten years ago the United States publically condemned Israel’s use of targeted killings against Palestinian terrorists. Martin S. Indyk, the former American ambassador to Israel, said in a statement on 5 July 2001, ''‘The United States government is very clearly on the record as against targeted assassinations…they are extrajudicial killings, and we do not support that.’'' However, after September 11th, the US makes frequent

Identity Theft and the Internet

1543 words - 6 pages sites of other police departments in Contra Costa County. Insatiable As I recovered from my initial feelings of helplessness, I could not get enough information about identity theft and the crime committed against me. The ultimate site is the Identity Theft Resource Center at http://www.idtheftcenter.org/. In the "Where Do I Go?" section on the home page are links to comprehensive answers to the questions posed by identity theft victims

the fight against hate

1722 words - 7 pages greatest value in such laws is the message that they convey to society that crimes against a particular group of people will not be tolerated”(Hate-Crime Laws, 3). Seeing the swastika would devastate the citizens attending the synagogue and the community around it. The graffiti didn’t just damage the building, but the hearts of the community as well. The laws are not able to punish thoughts or opinions, but the United States has the right to

The Fight Against Homelessness

1024 words - 5 pages you are disrupting the peace on the streets. Who to turn to when everybody has given up on you is going to be a hard decision. We, the more fortunate, need to come together to fight against homelessness. Imagine being in their shoes, scared, lost, cold, and hungry. In this paper, I will talk about the facts and statistics of the homeless, organizations providing and protecting them, the causes that put them where they are and different shelters

The Weakness in People

1861 words - 8 pages in pain they would rather just go the easier way out rather than struggle till the end. The human will is weak in that we try to fit ourselves based on society, pureeing ourselves from our own desires and what we want. Rather than expressing free will, we are constantly being forced to put on a facade to cover our identity in which we should actually have. Instead we are grotesque in that we want to hid our self, thus decreasing the value of life

Identity Theft and Possible Risk in Technology

1977 words - 8 pages , 11) Home address, and 12) Phone numbers. These twelve most wanted personal information from thieves can be used for different kinds of identity theft. In the United States, approximately 90% of the population could be identified by using three pieces of information, birth date, gender, and postal code (CIPPIC, 2007). Method of Identity Theft In order for thieves to commit an identity crime, they must first obtain the personal information of an

Identity Theft, Crime of the Future

1751 words - 7 pages . Each of these thefts will be defined, explained and given a possible solution against them. The occurrences of identify theft will be sharply reduced when we increase our security consciousness by guarding our internet usage, destroying private information we place in our trash and following a few simple guidelines of prevention.MethodPhishingInternet scammers lurking about for people's financial information have a new way to lure unsuspecting

Smoke in the Eye - The Fight Against Big Tobacco

965 words - 4 pages could prove that B&W did in fact know about the potential health hazards of cigarette smoking, yet continued to deny them for over thirty years. Professor Glantz released the documents into the UCSF library archives for all to see and study, and B&W launched several suits against Glantz and the university in a desperate attempt to retrieve the stolen documents, however they were unsuccessful in each and every case.Upon the release of the

Similar Essays

Identity Theft In Our Contemporary Society

2949 words - 12 pages Identity Theft in Our Contemporary Society Introduction How do you secure your identity with the Internet developing faster than can be protected? Attempting to stay ahead of the hackers and attackers has been a contentious effort since the Internet’s earliest days as a research project. Today, after thirty years of prolific development, security concerns have only increased. Designing computer systems and devices which are capable

Fight Club And Our Consumer Identity

1468 words - 6 pages Fight Club and Our Consumer Identity The narrator in the film Fight Club is questioned about his devastated condo and declares, "That condo was my life, okay? I loved every stick of furniture in that place. That was not just a bunch of stuff that got destroyed, that was me!" This attitude of defining self-identity through a consumer culture has become institutionalized in the American society. The film Fight Club addresses the excessive

Identity Theft In America Essay

1525 words - 7 pages “Most people are other people. Their thoughts are someone else’s opinions, their lives a mimicry, their passions a quotation” (Oscar Wilde). This quote illustrates how in our world, a person’s identity can be easily changed. Many Americans are effected by this problem today. Citizens, criminals, and the government all play a role in this process. However, many disagree as to whether identity theft should be allowed in our country. Based on the

The Identity Theft Crisis Essay

935 words - 4 pages theft rates are higher now than they have ever been. IRS says that identity fraud is on the rise. In 2012, 245,000 cases of I.D. fraud. Numbers taken to refund taxes have skyrocketed since 2008 (Ochs A.2.). With identity theft rates increasing, it is costing governments more money. It is estimated by the Home Office that identity fraud has costs 330 billion US dollars to the United Kingdom economy. In the first half of 2006, banking fraud doubled