Wednesday, April 10, 2019

Modern Technology Has Brought the Resurgence of Identity Theft Essay Example for Free

Modern Technology Has Brought the Resurgence of individuality Theft EssayIdentity thieving is one criminal offence that has spawned from technological advancements. Criminals have developed many a(prenominal) strategies on how to steal confidential and personal information. Dealing with identity thievery may be a challenge since jurisprudence enforcement personnel may not be fully competent in treatment the cases since they may lack the required skills to be able to deal with such a crime magical spell private community and even businesses have disordered lots because of this type of crime.The number of cases of identity stealth has been constantly on the rise however, the prevalence of the crime may as well be demonic on modern technology itself. Modern technology has brought about many conveniences for ordinary people and even for identity thieves. From completely less than 10,000 reported cases of identity theft in 1999, the figure steady climbed reaching around 50,000 in 2003 and more than 80,000 in 2006 (Infocycle, 2007). In the United Kingdom, credit measure burlesque has also been consistently increasing.In 2007, over 7,000 credit cards and debit cards were either lost or stolen. CPP Card Protection has indicated a 77 part increase in credit card fraud compargond to the figure on 2006 (Experian QAS, 2008). According to a study by Gartner, identity theft claimed 15 million victims in 2006 alone. The US Justice Department has recorded 226 cases of identity theft in 2005 alone in the first half of 2006 alone, there were already 432 cases. The FBI also indicated that it is working on 1,587 cases relating to identity theft (ITRC, 2007).Preventing identity theft may not be as easy as it seems. Joel Reidenberg and Lawrence Lessig said c erstntrating on the architectures of control to prevent identity theft is the way to go. Solove, on the other hand, indicates that architectures of vulnerability should also be considered in addition to arc hitectures of control. According to Solove, shaping architectures should be the focal head up in the fortress of privacy and not on remedies and penalties. He noted that architectures often provide a vulnerable point that identity thieves take advantage of.It is this lack of security that identity thieves argon able to use a persons personal information. He suggests that a public identification system be created as a solution to the problem (Solove, 2003). It is exactly new technology that produces these architectures and they are greatly flawed since many people can still bypass its security functions evidenced by the prevalence of identity theft on the meshing. Identity theft has gained much notoriety in the advent of buying and selling on the meshwork.However, identity thieves can still use the old methods for obtaining personal information. Common methods are stealing wallets or mails, looking through residential trashcans or business dumpsters, posing as someone legally per mitted to memory access personal information such as credit reports, or bribing their way to get the information ( impudentlyman, et. al. 2005). A phishing scam is another method of getting personal information out of a person. The Anti-Phishing Workgroup indicated that there are only 4,564 phishing websites in July 2005 but the number increased to 23,670 as of July 2006.A study at the University of inch also indicated that 14 percent of phishing scams are successful which contradicts the Gartner report which indicates only a three percent success rate. The Gartner research also found out that financial losses from phishing scams were $137 million in 2004 ascension to $2. 8 billion in 2006 (ITRC, 2007). The fight against identity theft may be considered rather unavailing since law enforcement personnel lack the necessary resources to combat such a crime which is computer-related.Britz indicates that this kind of crime requires law enforcers to have cogniseledge of computers and other digital stuff. It may be noted that many law enforcement agencies do not have well-trained personnel to handle such cases. These personnel may also be acting several capacities at a given time. Computer technology has increased at an exponential rate as did technology related crime and this would require that law enforcers be trained to effectively handle such crimes (Britz, 2004). As technology improves, security is being compromised and this can be proven by the increasing number of identity theft crimes.While it is true that online banking and other services on the Internet provide much convenience, it also provides lesser risks of capture for identity thieves. Law enforcers could do little do prevent identity theft or to investigate such since not all of them have the capacity to do so and identity thieves are improving their arsenal of identity stealing techniques. Technology mightiness also be considered as the root of the prevalence of identity theft. Even as identi ty theft was not considered a crime before 1998, it has existed for a long time.Modern computing and telecommunications technology has once again popularized identity theft since identity thieves can better elude law enforcers compared to going to a bank and making a transaction using stolen information (Arnold, 2000). regulation has always tried to turn cyber crime, but it is challenging for lawmakers to keep up since technology quickly evolves and cyber crime evolves with it. A good start out would be improving security measures, educating users, adopting a vigilant approach in combating cyber crime and a constabulary force that is well-equipped to handle such crimes (Alaganandam, et. al. , 2005).Identity theft and other cyber crimes are also classified as white-collar crimes, thus, offenders do not receive harsh penalties. They can even use the money sacked to pay for their defense and they serve at least only one year in prison (Arnold, 2000). Identity thieves mustiness b e dealt with harsher penalties since they operate on a much larger scale like a shot and are even comparable to bank robbers only less inclined to being caught and given much less media attention.The number of cases of identity theft is increasing at an exponential rate but this could more or less likely be blamed on modern technology especially since the Internet has become commercialized. New technology comes with new opportunities for identity thieves to gain access to personal information and using it for personal gains. Legislation can address this problem but it would prove to be a challenge since identity thieves are finding new ways of how to steal personal information as technology develops.Legislation must also address this by rendering harsher penalties for cyber criminals as they operate just like ordinary criminals, the only difference is that they work discreetly and have not been given media attention. Also, the victims do not really know that they have been victimi zed until after some time the thieving takes places. References Alaganandam, H. , Mittal, P. , Singh, A. , Fleizach, C. , 6 December 2005. Cybercriminal Activity. Retrieved September 7, 2008, from sysnet. ucsd. edu/cfleizac/WhiteTeam-CyberCrime. pdf Arnold, T. 2000 June.Internet Identity Theft A Tragedy for Victims. Software and Information Industry Association. Retrieved September 7, 2008, from www. siia. net/ packet/pubs/iit-00. pdf Britz, M. (2004). Computer Forensics and Cyber Crime An Introduction. Upper Saddle River, NJ Pearson Prentice Hall. Experian QAS. 22 August 2008. Holiday fake Threat. Retrieved September 3, 2008, from http//www. qas. co. uk/company/data-quality-news/holiday_fraud_threat_2614. htm Identity Theft Resource Center. 30 April 2007. Facts and Statistics. Retrieved September 3, 2008, from http//www. idtheftcenter.org/artman2/publish/m_facts/Facts_and_Statistics. shtml Infocycle. (2007). Government Bodies must(prenominal) Play Their Part in Securing Against Identity Theft. Retrieved September 3, 2008, from http//www. infocycle. co. uk/index. php? option=com_contenttask=viewid=43Itemid=43 Newman, G. McNally, M. 2005 July. Identity Theft publications Review. Retrieved September 3, 2008, from http//www. ncjrs. gov/pdffiles1/nij/grants/210459. pdf. Solove, D. (2003). Privacy, and the Architecture of Vulnerability. Hastings Law Journal, 54. p. 1227. Retrieved September 3, 2008, from http//ssrn. com/abstract=416740

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.