Understanding a Common Crime
By: Accident attorney Michael P. Ehline, Esq. After Google Places had merged our business law firm listing with a competitor about 40 miles away, we started researching identity theft. Hence, we created this pretty comprehensive treatise.
Definition of Identity Theft:
Identity theft occurs when another person assumes an individual’s identity. Here, the thief knows how to access financial resources. So they obtain credit and other benefits using the person’s name.
Identity theft makes a victim of the individual. So they suffer the adverse consequences of the thief using their credit. Sadly, victims are forced to pay all these costs. Plus, the name, Social Security number, credit card, or bank account number are all exposed without permission. Criminals do this to commit crimes or fraud.
Understanding The History of Identity Theft
The term identity theft has been used since 1964. Yes, it’s not possible to steal a person’s true identity. But the criminal can impersonate or assume their financial identity to commit fraud. Identity theft and data breaches can be challenging to recognize. After all, in most cases, the victim does not know that anyone else has personal or financial information.
According to the Federal Trade Commission, victims often don’t know how someone stole their information after a data breach. But they also found that identity fraud was not always a consequence of identity theft. After all, someone can steal or misappropriate personal information without committing fraud.
What is a Major Breach?
And this can occur when there is a significant data breach. According to a U.S. Government Accountability Office study, most data breaches did not result in detected occurrences of identity theft. But the report stated that the full extent of data breaches is unknown.
An unpublished study by Carnegie Mellon University reported that most identity theft cases are unknown. But the probability of becoming a victim of data breach identity theft is approximately 2%. One of the most significant data breaches consisted of about 4 million records. And according to the association of consumer information companies, it resulted in approximately 1800 instances of identity theft.
An article entitled “Cyber Crime Made Easy” discussed how hackers use malicious software. Security specialist Gunter Ollmann asked: are you “Interested in credit card theft? There is an app for that.” He was alluding to the ease of hackers accessing information online.
One of the newer programs infecting computers is called Zeus, which is hacker-friendly. And this makes it easy to use, even for an unknown hacker. It might be easy to use, but it is devastating for the computer user it affects.
The article said criminals could use Zeus programs to steal credit card information, relevant documents, and those necessary for homeland security use. Hackers gaining this information could not only use it for identity theft but possible terrorist attacks.
What Are Some Types of I.D? Theft?
The non-profit Identity Resource Center has divided identity theft into five categories, as follows:
- Criminal Identity Theft: This is posing as another person for financial or personal gain, a crime.
- Financial Identity Theft: This is using someone else’s identity to obtain goods, services, and credit.
- Child Identity Theft: This is using a child’s information to obtain credit, services, and goods or assume their identity.
- Medical Identity Theft: This is using another person’s identity to obtain medical care or drugs.
- Identity Cloning Theft: This is using someone else’s identity to assume their life status. It means using the person’s name in meeting people, employment, and other activities.
Other crimes are funded by I.D. theft.
- Illegal immigration
Also, identity cloning can be used to attack payment systems. Examples include online credit card processing and medical insurance.
Criminal Identity Theft Explained
This occurs when an identity thief impersonates another human to conceal their real identity. People that do this could be a person hiding from creditors or other persons. It could be an illegal immigrant or another who wants to become anonymous for personal reasons. Another type of euphemism for this is a “poser.”
A poster is a person that uses another’s photos and information on social networking sites, and they further relay credible stories. And many involve friends of a natural person they are attempting to imitate. One of the other things this type of I.D. thief does is acquire false credentials that will pass authentication in daily life. And this can continue indefinitely, without detection.
What is Identity Cloning?
So this is a great question. This theft happens when a thief assumes another’s name to conceal their real identity. So, for example, this is their form of the witness protection program. So let’s say they want to avoid being found by an ex-spouse or partner. And now, this can continue for an indefinite amount of time. And this remains especially true if the person can obtain false credentials in the assumed name that appears authentic.
Synthetic Identity Theft
This type of identity theft has become familiar with using characters that are either partially or wholly fictitious. This is commonly done by using an actual social security number, with a birth date and name that is not attached to this person. The stolen social security number will create adverse credit effects. And this holds concerning any creditor who issues a credit to the thief.
It’s hard to track this identity fraud since it does not usually show directly on the natural person’s credit report. And this could even show as a new file at the credit bureau or as a sub-file on the victim’s credit record.
What is Medical Identity Theft?
This type of identity theft uses an individual’s name and some of their information to obtain medical care, services, or drugs. The data they may use can include insurance information. The victim has no clue their name or other information is being used.
This type of event can cause the insurance’s actual owner to receive improper medical care. This can also lead to a potentially life-threatening medical decision since lowlifes placed incorrect information in the victim’s medical records.
What is Child Identity Theft?
Child identity theft is caused when a criminal steals a minor child’s social security number to gain credit. And it also increases other personal advantages. Of particular interest, the child has no credit history. So this makes this social security number very valuable to the theft that wants to steal it. They can obtain credit, get a driver’s license, and make large purchases, like buying a house, all under the guise that the social security number is their own.
So here, a family member or friend can be the culprit. But it can be done by a stranger that targets children. The fraud can continue undetected for years. After all, the victim is a minor who will not be using their number for years.
According to Carnegie Mellon Cylab, Richard Power discovered that approximately 10.2% of children were identity theft victims using data from All Clear ID. So about 40,000 children had information exposed.
How Do ID Thieves Get Your Personal Information?
These criminals need to obtain personal information to use another person’s identity to appear authentic. Some of the methods they use people are aware of.
But other methods exist.
- They get stuff by digging in dumpsters or garbage cans for personal information.
- I am using public records to gain personal information.
- Skimming credit card or bank card information with hand-held card readers in the general retail location helps make clone cards.
- We use contactless credit card readers to obtain data from RFID passports wirelessly.
- Mail theft, breaking into homes, pick-pocketing checks, bank cards, credit cards, passports, and identification cards are potential problems.
- Theft of checks to obtain account numbers and routing numbers.
- Gaining personal and banking information with malware, including trojan horse keystroke logging programs, spyware, and breaches in browser security are examples.
- They hack computer networks, databases, and systems to access large amounts of personal data.
- Acting fraudulently as customer service representatives or helping desk employees con individuals to disclose personal information, login information, or change password access.
- Account verification and compromise questions, like: “What is Your Mother’s Maiden Name?“
- Use social media sites to befriend individuals and gain trust to get their personal information.
- Social media photos are clickable and downloaded, with low security and privacy protection.
- They use information gained from an individual typing login and other personal information at public I.T. equipment locations. The term shoulder surfing describes this conduct.
- Use of breaches that result in personal information publication, which may include name, address, credit card numbers, and social security number.
- Impersonation of a trusted organization in emails, telephone calls, SMS text messages, or other communication forms. The goal is to have an individual provide personal information or login information. Most of us know this form of data collection as phishing. Thus, many corporations will never ask for this data on the phone or on their website.
- You are browsing social network sites, such as Facebook, Twitter, or MySpace, for personal information that users have published.
- Attacking weak passwords and reset password questions.
- They divert emails or posts to gain personal information, credit card numbers, banking or credit statements, and other personal data. And this can delay you from knowing there is a compromised account.
What About Personal Identity Protection?
The person is often unaware of how naïve they are. So they are careless with their personal information or login information.
Identity thieves count on this. And they can steal information like:
- Credit cards
- Utility bills
- Bank statements and other things from a person’s vehicle, office, snatched purse, or home.
The U.S. Federal Trade Commission, websites, and the Canadian Phone Busters organizations address identity theft. And they offer recommendations on preventing personal information from reaching another person’s hands.
You can partially eliminate identity theft by not using identifying information unnecessarily. I.T. systems and organizations should not require excessive personal data for identification and authentication purposes.
The requirement and data storage of personally identifying information such as social security numbers, driver’s license numbers, credit cards, national identification numbers, and other info will increase the risk of identity theft. This theft will keep happening unless adequately stored all the time.
Tips to Avoid Hijacking
- Hacking and phishing: We all know that electronic identity theft or malware is common today. Hence, you must often update computer security. Keeping the operating system and browser secure, patched, and running antivirus software can avoid unwanted theft. The individual should be cautious about their I.T. use.
In some cases, the thieves use obituaries, gravestones, and other sources to rip off a deceased person’s identity. They do so between their passing and the closing of their accounts. So this is a combination of a grieving family lacking concentration. And it’s also the credit checking process. Moreover, this type of crime can continue for an undetermined time. And it won’t stop until a family member or credit company notices the events.
Commercial identity theft protection services are available in many countries. For example, they offer protection from an annual or monthly membership fee. How it works is the service will typically set fraud alerts on your credit files. Also, each of the three major credit bureaus gets alerted. These heavily advertised services are helpful. But the actual value has been questioned.
What are the Identity Protection Organizations?
The Federal Trade Commission testified in May 1998 in front of the United States Senate. There, representatives discussed the sale and use of personal identifiers and Social Security numbers by data miners and credit raters. They agreed to self-regulating by the industry to restrict access to information on credit reports.
The industry restrictions vary according to the category of the customer. This variance exists because credit bureaus gather and disclose personal and credit information on a broad business range. Inadequate security by organizations holding individual data results in unauthorized access. So this places victims at risk of I.D. theft.
Privacy Rights Clearinghouse has documented more than 900 data breaches since January 2005 by U.S. government agencies and companies. This breach involved over 200 million records that contained sensitive personal information. The data included many that had social security numbers.
When a company has poor security standards, it can include:
- Failing to have adequate network security.
- They are failing to shred confidential documents before putting them in dumpsters.
- Brokering personal information to another business without the assurance of the other company maintaining security.
- Government failure in registering sole proprietorships, corporations, and partnerships to determine the article of incorporation officers are who they claim to be. This failure can result in criminals accessing personal information through credit ratings and data mining services.
- Credit card numbers stolen by people like call center agents mean there is access to the recorded calls.
- Laptop computer or portable media theft or carried out of the location. Typically, it contains personal information. Also, using encrypted devices reduces data exposure risks.
What is the Nationwide Impact of I.D? Theft?
Most of all, there was a decrease in the number of victims in the United States between 2003 and 2006. This decreased the dollar amount of identity fraud from $47 billion in 2003 to $15.6 billion in 2006. This scam resulted in personal losses of $4,789 in 2003 and $1,882 in losses for 2006.
According to the Identity Theft Resource Center in a 2003 survey:
- Approximately 73% of those surveyed said the crime involved the thief gaining access to a credit card.
- 15% of known I.D. theft remains business-related. And in those cases, it took the victims about 330 hours to resolve.
- Victim of identity fraud Michelle Brown testified in a U.S. Senate Committee Hearing. She said that a person used her identity between January 1998 and July 1999 to acquire more than $50,000 in goods and services. Brown said not only did the hacker damage her credit but escalated in crimes, including drug trafficking. This resulted in a warrant for Brown’s arrest; she had an erroneous arrest record and prison record. The woman got booked into the Chicago Federal Prison under her name.
- Also, fraud costs are estimated at £1.2 billion annually in the U.K. But experts believe the figure is much higher. For example, privacy groups do not think the numbers are correct. Mostly, they argue that statistics are a bargaining chip to listen to the introduction of national I.D. cards.
- Microsoft Research claimed in 2001 that fraud remains widely exaggerated. And they say the surveys are compromised and biased. So they argue the findings are not promising. But Australia estimated I.D. theft at between $1 billion and $4 billion in 2001.
The United States Legal Answers
In the United States, the increase in this crime has led to enacting the Identity Theft and Assumption Deterrence Act. In other words, the Federal Trade Commission appeared before the U.S. Senate to discuss F.T.C. crimes. And that meeting happened after the mass exploitation of consumer credit.
How the Exploited Data Was Used:
- Lines of credit
- Loan fraud
- Credit card fraud, along with commodities and services fraud.
The Identity Theft Deterrence Act amended U.S. Code Title 18, § 1028. This statute says it is a federal crime to steal an I.D. But it’s tricky because the perp must use an I.D. document issued by the United States. So you have to show the thief intended to defraud the United States. All this gets tried on a federal level if it exists. Get it?
30 Years in Prison?
Yes, it’s true. This sentence is outlined in 18 U.S.C. § 1028 and can carry a 5, 15, 20, or 30-year sentence in federal prison. Also, § 1028 (aggravated identity theft) permits consecutive sentencing. This act gave the Federal Trade Commission the authority to track incidences and dollar losses of particular interest.
Their body mainly focuses on consumer financial crimes. And it does not include the full range of all identification crimes. Charges brought by states or local law enforcement agencies will have different penalties than criminal charges on a federal level. It will depend on the state laws, in which each state can differ in punishments.
Office of Privacy Protection
California and Wisconsin have created the Office of Privacy Protection. This department helps citizens avoid issues with theft and identity theft recovery. Other states have followed California’s mandatory data breach notification laws. And this has resulted in all companies reporting data breaches to their customers.
Of particular interest, the I.R.S. created the I.R.S. Identity Protection Specialized Unit. Now taxpayer victims of federal tax-related identity theft have recourse. The taxpayer was required to submit Form 14039, their Identity Theft Affidavit.
Main Los Angeles Location
Michael Ehline is an inactive U.S. Marine and world-famous legal historian. Michael helped draft the Cruise Ship Safety Act and has won some of U.S. history’s largest motorcycle accident settlements. Together with his legal team, Michael and the Ehline Law Firm collect damages on behalf of clients. We pride ourselves on being available to answer your most pressing and difficult questions 24/7. We are proud sponsors of the Paul Ehline Memorial Motorcycle Ride and a Service Disabled Veteran Operated Business. (SDVOB.) We are ready to fight.
Go here for More Verdicts and Settlements.