Term Paper on "Identity Theft in America and the Rest"

Term Paper 10 pages (2851 words) Sources: 10 Style: APA

[EXCERPT] . . . .

Identity Theft

In America and the rest of the world that uses internet regularly the emerging issue or the problem is that of identity theft. It is considered to be the fastest growing crime in America as millions of victims have been reported over a period of last couple of years. Identity theft is a crime when someone uses the personal information such as name, Social Security number, credit card number or other identifying information, without the permission of the concerned person to commit fraud or other crimes typically for economic gain. Identity theft can happen to anyone when an opportunity arises and thieves are not very particular to one's age.

Unlike our fingerprints, which are unique to each one of us and cannot be given to someone else for their use, our personal data - especially our Social Security number, our bank account or credit card number, our telephone calling card number, driver's license, PIN numbers, debit card numbers and other valuable identifying data - can be abused. If they fall into the wrong hands such as those criminal who steal identities the consequences could be very severe and damaging. In the United States and Canada, criminals have abused identities using Internet and computers. The Internet has become a breeding ground for criminals to obtain identifying data, such as passwords or even banking information. Many people respond to "Spam" - or unsolicited E-mail - that promises them some benefit but requests identifying data, without realizing that in many cases, the requester has no intention of keeping his promise. This is how criminals obtain large amount of personal data.

Identities have been used for false appl
Continue scrolling to

download full paper
ications for loans and credit cards, fraudulent withdrawals from bank accounts, fraudulent use of telephone calling cards, or obtaining other goods or privileges while some criminals have taken over identities altogether, running up vast debts and committing crimes while using the victim's names and the irony is that most victims don't even know how the perpetrators got their identity numbers and also the victim often has to prove his or her innocence.. As a result consumer fraud has threatened both the consumers and the economy, as it has become a big business now. For example, Federal Trade Commission (FTC) receives more questions and concerns about credit and credit fraud than any other topic.

Methods of Identity Theft

There are many methods being used for identity theft but when it comes to Internet then Phishing, Pharming and Spyware are commonly used. "The Internet Crime Complaint Center (IC3), a clearinghouse for law enforcement agencies dealing with cyber crime, received 103,959 complaints of genuine Internet fraud in 2004, according to its 'Internet Fraud Report.' Of those complaints, 71.2% involved online auction fraud, while credit or debit card fraud accounted for only 5.4%. Of the actual fraudulent transactions, 63% were performed via e-mail, while 23% were done via Web sites, real or false" (Bosworth, 2005).

Spyware

Spyware is a special kind of software that helps in collecting information about a person or organization without their knowledge usually by taking control over a computer connected to the Internet. Spyware gets installed on computers as part of free software, such as games and screen savers, and offered on the Internet. Email attachments, web links, and music or video downloads have also become a big source of spyware. Sometimes it also happens that a person is not even downloading any software or opening any email attachments but still some of the spywares are so strong that they can also exploit web browser vulnerabilities in "drive-by" downloads. These softwares try to make people believe about the legitimacy of certain downloads like web browser updates. Some common spywares used by cyber thieves include:

Keyloggers: Keyloggers as the name suggest use information put in by pressing key for passwords, account numbers, and usernames etc. Every keystroke a computer user makes is recorded and the information collected is used to commit crimes because of stolen identities. Mostly web sites are used for spreading keylogger programs.

Redirectors: This is the method in which users are redirected to a fake website where the user is asked to punch in the key information like password, username, and account information. Mostly these are counterfeit websites that imitate the genuine website.

Remote Access: it is one of the sophisticated methods in which criminals take control of a computer from a remote access point and use it not only for identity theft but also for illegal activities, such as sending spam or phishing emails or spreading keylogger programs.

As an immediate effect of these softwares computer of the users becomes slow and some systems even lead to a situation where they crash. Once these softwares make a place in a computer they reduce the consumer's ability to control his or her own computer by making changes to the computer's settings, including security settings. Apart from personal computers these spywares also affect computerized databases maintained by businesses, universities, and government agencies. The softwares were initially meant to monitor the computer use of employees and parents monitoring their children's online activities but presently they are increasingly used for identity theft. Even if these softwares are not used in identity theft still they cause a lot of trouble both mental and monetary in redressing the issues related to their computer's performance.

Phishing

Phishing is the act of faking as a legitimate business requiring information from the users through email for instance from a government representative or famous charity organization asking for donations etc. Or a fake web site like legitimate auction or merchant site etc. Bulk emailing is the most commonly method used for phishing. Phishing, however, is different from the spam email selling certain products or services in the sense that it persuades the user to voluntarily submit information. The emails are sent to million of users faking to be the representative of a particular company. Some of these receivers would turn out to be the actual customers of that particular company and thus they submit information. Apart from the personal users phishing has also affected government organizations like Internal Revenue Service. Some emails have been generated using the Internal Revenue Service ids asking users to submit key information like social security and credit card numbers. Phishers use such well-known and public organizations because people normally interact with them regularly through emails or web sites.

Some times phishers use the combination of emails and fake website to lure users into submitting their key information. Generally they send emails to users mentioning some serious issue which requires them to instantly log on to the official web site but these emails have links that appear to be original but take them to a fake web site on which users end up surrendering their important information.

Phishers after taking hold of information of users use them for their own benefits but some of them also sell such key information to other criminal organizations or individuals. Stolen information is easily available for sale even on internet. The whole market operates for the sale of data as well as sale and purchase of malicious software. Spyware and other software makers contact phishers. Buyers, sellers, intermediaries and other service personnel interact in this identity theft industry to plunder millions of internet users and even those who are not the regular users

Phishing is bait in which innocent and mostly new users get caught. With the passage of time the methods have advanced and emails and web sites have become more sophisticated and believable. Some sophisticated groups of phishing have used more advanced form of phishing called spear phishing in which they target specific users. "This hybrid form of phishing casts lures for specific victims instead of casting a net across cyberspace to catch hordes of unknown prey. Security specialists say that spear phishing is much harder to detect than phishing. Messages appear to be legitimately sent from well-known organizations with a twist, the e-mails are targeted at people known to have an established relationship with the imitated sender" (Brody, Mulig & Kimball, 2007).

Pharming

Pahrming can be considered an advanced form of phishing. Spyware, keyloggers, domain spoofing, domain hijacking, or domain cache poisoning are commonly used for Pharming but hijacking a web site and redirecting visitors to a fake site is the most commonly used method as discussed under spyware. Previously pharmers used emails to infect a users computer as when the user opened the email it directed to a particular web site that installed spyware on a user's PC. However, the technology for pharmers has advanced and they are not dependent on emails anymore. Viruses can attack using messengers or using key loggers

Pharmers also act in a very organized manner on the Internet. They now use variety of sophisticated method to redirect the traffic to their web sites. Changing web addresses, domain names, and slamming procedures these criminals have abused the information of many users on the Internet. As indicated earlier these pharmers have also not spared multinational,… READ MORE

Quoted Instructions for "Identity Theft in America and the Rest" Assignment:

The paper needs to written on Identity theft and needs to focus on Phishing Pharming and Spyware.

The paper must be minimum of 2500 words (10 pages)

Needs to be in new times roman (12) double spaced

need to use at least ten sources; they must be academic, with a maximum of three Web-based links and at least seven other references. The in-text citations and the References page entries must match. If you insert an in-text citation for a source, then that source must be listed on the References page in APA format.

I will be sending in 5 sources 3 web links and 2 article I found off proquest. I am going to let you pick the last 5 sources.

*****

How to Reference "Identity Theft in America and the Rest" Term Paper in a Bibliography

Identity Theft in America and the Rest.” A1-TermPaper.com, 2007, https://www.a1-termpaper.com/topics/essay/identity-theft-america/7367. Accessed 6 Jul 2024.

Identity Theft in America and the Rest (2007). Retrieved from https://www.a1-termpaper.com/topics/essay/identity-theft-america/7367
A1-TermPaper.com. (2007). Identity Theft in America and the Rest. [online] Available at: https://www.a1-termpaper.com/topics/essay/identity-theft-america/7367 [Accessed 6 Jul, 2024].
”Identity Theft in America and the Rest” 2007. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/identity-theft-america/7367.
”Identity Theft in America and the Rest” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/identity-theft-america/7367.
[1] ”Identity Theft in America and the Rest”, A1-TermPaper.com, 2007. [Online]. Available: https://www.a1-termpaper.com/topics/essay/identity-theft-america/7367. [Accessed: 6-Jul-2024].
1. Identity Theft in America and the Rest [Internet]. A1-TermPaper.com. 2007 [cited 6 July 2024]. Available from: https://www.a1-termpaper.com/topics/essay/identity-theft-america/7367
1. Identity Theft in America and the Rest. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/identity-theft-america/7367. Published 2007. Accessed July 6, 2024.

Related Term Papers:

Tax Fraud Research Paper

Paper Icon

Tax Fraud

Taxes, tax laws and tax obligations are essential to maintaining a society and civil order that are functional, healthy and progressive. Taxes are the primary source of revenue… read more

Research Paper 4 pages (1255 words) Sources: 4 Topic: Economics / Finance / Banking


American Domestic Terror Groups and International Essay

Paper Icon

American domestic terror groups and international terror groups forging common ties? Who are their common enemies? Please provide examples to support your answer. Also, you are encouraged to draw from… read more

Essay 5 pages (1694 words) Sources: 5 Style: APA Topic: Terrorism / Extremism / Radicalization


Art Violence and Social Engagement in Colombia Research Proposal

Paper Icon

Colombia is the third-largest recipient of military aid from the United States and is at a critical juncture in its turbulent history. More than three million people have been displaced… read more

Research Proposal 58 pages (19788 words) Sources: 35 Style: Chicago Topic: Latin America / Mexico / Caribbean


Science and Media Essay

Paper Icon

Science and Media

Public policy in the U.S. is and will hopefully forever remain an evolving body. The concepts that are appropriate today and the policies that surround them may… read more

Essay 4 pages (1472 words) Sources: 1+ Topic: Journalism / Media / PR / News


Cyber Crime Purpose and Audience Organization Literature Review

Paper Icon

Cyber Crime

Purpose & Audience

Organization of the Paper

Forms of Online Abuse and Crime

Social and Economic Impact of Online Crimes

Likely Victims of Cyber and Internet Scam

Youth… read more

Literature Review 7 pages (3159 words) Sources: 5 Topic: Crime / Police / Criminal Justice


Sat, Jul 6, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!