At the end of each year, the Identity Theft Resource Center(R) reviews identity theft trends and patterns throughout the year. It examines the new directions this crime appears to be taking. The basis of this information includes: victims and their experiences, ITRC¡¯s expertise, and data from law enforcement on the ways criminals are stealing and using personal identifying information and financial records. Here are predicted trends for 2008 and reviews of 2007.
PREDICTIONS FOR 2008
• We only have to look at the papers to see that thieves are getting younger and younger. More and more people in their early 20¡¯s have been arrested, in possession of sophisticated forgery equipment. This is a strong indicator that identity theft is becoming a lucrative career path.
• Identity theft will continue to grow more international in scope. Scams will become more sophisticated and will be harder to detect, as thieves become more industrious and skilled at designing viruses, Trojans and ways to trick you into divulging personal identifying information.
• There will be an increase in the number of data breaches due to poor information handling policies and practices.
• There will be a continuation of contradictory studies with less agreement on victim census, cause and effect, facts and overall cost of identity theft. This will lead to confusion, misguided legislation and governmental actions.
• On the positive side, ITRC believes that businesses will develop and implement better ways to authenticate the identity of applicants including Internet and telephone applications.
• There will be a higher recognition of identity theft as a crime by law enforcement. This will lead to more reports written to assist victims in taking advantage of state and federal victim recovery rights.
• There will be more legislative action on the issue of identity theft, including limiting the use of Social Security numbers.
• States and non-profits will be in a better position to provide more victim assistance at no charge.
2007 IN REVIEW
• Check schemes increased as credit issuers make it more difficult to get credit without authentication. Not only were identity thieves stealing existing checks, they were also counterfeiting new checks that might contain your account number but a different name. Another ploy is to put your information on the top of a check and make up an account number, one you never opened.
• While the Internet is not the culprit, it has become a tool that identity thieves have embraced and abuse to find victims and commit fraudulent activities. Scamsters continued to exploit Web sites that promoted online auctions and want ads, job hunting, dating (sweetheart scams) and social networking to find victims.
• Scams continued to flourish, generally falling into known categories: lotteries, jury duty, IRS audits, Nigerian, account verification or phishing, money laundering and check cashing (you deposit checks for a company and then send them the money).
• Family members were stealing identities from each other, including children¡¯s identities. Some of the cases turn into an ¡°all in the family¡± situation. An ITRC study showed that the highest targeted category of children was between 0-5 years of age. Domestic identity theft continued to be a problem, often including former significant others.
• There was a symbiotic relationship between identity theft with other crimes to finance and enhance the growth of highly profitable crimes including meth and drugs, terrorism, and illegal trafficking of goods and persons.
• Misleading commercials continued to be shown on television that either glamorized identity theft or made light of this crime at the expense of existing victims. Sheila Gordon, ITRC¡¯s Director of Victim Services expressed this insight, ¡°From the victim¡¯s perspective, there is nothing glamorous about this crime. It takes hours of hard work, internal strength, time and courage to clean up the mess left by an imposter. However, you rarely hear about these stories. You hear about the exciting exploits of ¡®Bonnie and Clyde¡¯ or movies like ¡®Catch Me If You Can¡¯. In romanticizing identity theft, the media entices novices and young adults to try their skill at identity theft and to play the role.¡±
• The failure to believe someone could steal your identity generated apathy; therefore, individuals failed to take proactive steps to minimize risk. The glamorizing of this crime, and the failure to focus on the national problem of identity theft had had a desensitizing effect on the public. The availability of consumer education was still limited and might be faulty.
• There continued to be a lack of understanding by friends, family and the general public regarding the emotional impact of this crime on the victims, both short term and long term. This information appears every year in ITRC¡¯s The Aftermath Study, which focuses on the individual.
• The ITRC saw an increase of products being sold to capitalize on the identity theft fears of consumers. Unfortunately, some of these products do not carefully explain their limitations and lead consumers into believing that the product could completely protect them from this crime. Some products have merit but it is definitely a ¡°due diligence¡± environment.
• The year 2007 reflected continual blame on consumers as a primary cause of identity theft. Various studies and articles failed to explain that consumers, governmental agencies, ducational and medical facilities and businesses all need to handle sensitive personal information, especially Social Security numbers and financial account numbers, with the greatest care.
• On the positive side, there had been improved communication among businesses, consumers and law enforcement as to the causes and possible solutions to reduce identity theft crimes.
• There had been growing acknowledgement that identity theft was a multi-faceted crime and not just financial in nature. More cases of criminal identity theft, where the imposter used the victim¡¯s identity when arrested or cited, were being reported. Criminals were using a victim¡¯s Social Security number to work, collect welfare or unemployment, as well as get medical benefits and healthcare.
For more information, please send your e-mails to swm@infothe.com.
¨Ï2007 www.SecurityWorldMag.com. All rights reserved.
|