Identity Theft–A Contemporary Threat

Authors

  • Harshit Choubey

Keywords:

Identity theft, information technology, fastest-growing crime, unlawful exploitation, impersonation, illegal financial gain, detection and prevention, technology users, societies of the digital age, doctrinal method. Etc.

Abstract

Identity theft has historically risen in frequency as information technology has advanced, and it has since been acknowledged as the world’s fastest-growing crime. Identity theft is when someone else (usually a stranger) uses an individual’s identity without their prior consent, permission, or knowledge. Such types of impressions are mainly committing fraud, which usually results in financial harm to the victim and illegal financial gain to the person who perpetrates it. However, the main issue with identity theft is that it is quite hard to detect and prevent. People who have used technology extensively, such as college students, children, and others, are also prone to or can even fall prey to identity theft. It has been a major challenge for societies in the digital age. Individual victims experience catastrophic psychological and financial losses, and the consequences for society as a whole are immense. The major topics on identity theft reviewed in this research are the definition and meaning of identity theft, statistics
of identity theft, its types and stages, recording and reporting of identity theft, law enforcement issues and responses, effects, prevention, and defenses of identity theft. The research further found that access to personal information about potential victims, as well as the anonymity provided by the Internet, are significant facilitators of identity theft. In addition, the research has focused on the practices and operational environments of document-authenticating organizations that provide offenders with access to identification data. The researcher has followed the doctrinal and analytical methods of research and, at last, the inductive method, which helped to arrive at a certain conclusion. Within the research, the first chapter is the Introduction based on which the whole research is created. The next two succeeding chapters consists of an Operational Introduction, and Law Enforcement Issues and Response, which also includes an analysis of important international and national cases. The final chapter of the research consist of the Suggestions & Recommendations, and Conclusions. The researcher has concluded that people must be informed that not only is it unlawful to exploit others’ data, but it is also illegal to obtain personal and sensitive information about others. Identity thieves must understand that peeping into someone’s personal life is just as detrimental as peering into someone’s restroom. Nothing in this world is more unsettling than someone professing to be someone they are not.

References

Compare Collins Dictionary of Sociology, quoted in Covington, Peter. (2008). Culture and identity: success in sociology. Dublin, Ireland: Folens Limited. p. 12. ISBN 9781850082606.

Sda. (2014, September). Do they know, do they care? [Online] Researchgate.net. Available at https://www.researchgate.net/publication/280158483_Identity_theft_and_university_students_Do_they_know_do_they_care [Accessed on March 2024]

Mash. (2020). Data privacy rankings. [Online] Privacyhq. Available at https://privacyhq.com/news/world-data-privacy-rankings-countries/ [Accessed on March 2024]

Data Breach Report. (2023, January). [Online] IdtheftCenter. Available at https://www.idtheftcenter.org/wp-content/uploads/2023/01/ITRC_2022-Data-Breach-Report_Final-1.pdf [Accessed on March 2024]

Consumer Sentinel Network Data Book 2022. (2023, February). [Online] ftc.gov. Available at https://www.ftc.gov/reports/consumer-sentinel-network-data-book-2022 [Accessed on March 2024]

Number of Digital Fraud Cases in Russia 2021. (2023, March 21). [Online] Statista. Available at https://www.statista.com/statistics/1196329/number-of-digital-fraud-cases-in-russia/#:~:text= In%202021%2C%20249.2%20thousand%20fraud,first%20half%20of%20the%20year. [Accessed on March 2024]

Kaspersky. (2021, February 15). Spam and phishing. [Online] Securelist. Available at https://securelist.com/spam-and-phishing-in-2020/100512/ [Accessed on March 2024]

Maccart. (2022, December 29). Japan cybersecurity statistics. [Online] Comparitech. Available at https://www.comparitech.com/blog/information-security/japan-cybersecurity-statistics/ [Accessed on March 2024]

Basuroy. (2022, October 22). Number of online identity theft offences reported across India in 2021, by leading state. [Online] Statista. Available at https://www.statista.com/statistics/1097526/india-number-of-online-identity-theft-offences-registered-by-leading-state/ [Accessed on March 2024]

Gemalto. (2017). Breach level study index. [Online] Legal Service India. Available at https://www.legalserviceindia.com/legal/article-1780-identity-theft-a-threat-to-society.html [Accessed on March 2024]

Thomala L. (2023, February). Number of internet violations reported in China March 2021. [Online] Statista. Available at https://www.statista.com/statistics/1054173/china-report-number-on-online-violations/ [Accessed on March 2024]

Yu E. (2022, July). China data breach likely to fuel identity fraud. [Online] ZDnet. Available at https://www.zdnet.com/article/china-data-breach-likely-to-fuel-identity-fraud-smishing-attacks/ [Accessed on March 2024]

McAfee. (n.d.). 5 Common types of identity theft. [Online] Available at https://www.mcafee.com/learn/5-common-types-of-identity-theft/ [Accessed on March 2024]

True Identity part of Trans Union. (2023). How does identity theft happen? [Online] True Identity. Available at https://www.trueidentity.com/identity-theft-resource/how-it-happens [Accessed on March 2024]

Fraud Laws. (2019, December 23). All you need to know about identity theft. [Online] Available at https://fraud.laws.com/identity-theft/history-identity-theft [Accessed on March 2024]

Norton. (2013, August 8). Identity theft: what is it and how to avoid it. [Online] Available at from https://us.norton.com/blog/id-theft/what-is-identity-theft [Accessed on March 2024]

Grover. (2019, September 3). All you need to know about identity theft in cyberspace. [Online] Ipleaders. Available at https://blog.ipleaders.in/all-you-need-to-know-about-identity-theft-in-cyberspace-in-india/#How_to_Report_Identity_Theft_to_the_Police [Accessed on March 2024]

Federal Bureau of Investigation. (2023). How we can help you. [Online] FBI.gov. Available at https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/skimming [Accessed on March 2024]

Norton & Johansen. (2017, October 7). 7 Ways identity theft can happen to you. [Online] Norton. Available at https://lifelock.norton.com/learn/identity-theft-resources/ways-identity-theft-happen-can-happen [Accessed on March 2024]

Ravichandran (CEO of AURA). (2023, January 6). How does identity theft happen? [Online] Aura. Available at https://www.aura.com/learn/how-does-identity-theft-happen#2.-Lost-or-stolen-wallets [Accessed on March 2024]

Grover GR. (2019, September 3). All you need to know about identity theft in cyberspace. [Online] Ipleaders. Available at https://blog.ipleaders.in/all-you-need-to-know-about-identity-theft-in-cyberspace-in-india/#How_to_Report_Identity_Theft_to_the_Police [Accessed on March 2024]

Ramezani K. (2022, July 7). How your business is impacted by identity theft. [Online] Constellaintelligence. Available at https://constellaintelligence.com/how-your-business-is-impacted-by-identity-theft/ [Accessed on March 2024]

Burdova C. (2020, December 18). How to protect yourself from identity theft. [Online] Avast. Available at https://www.avast.com/c-prevent-identity-theft [Accessed on March 2024]

Re Zappos.com, Inc, Theresa Stevens and Others v. Zappos.com, Inc, 2018 SCC Online US CA 9C 104. [Online] Available at https://www.scconline.com/Members/SearchResult.aspx [Accessed on March 2024]

President Balochistan High Court Bar Association v. Federation of Pakistan & Others, 2012 SCC Online Pak SC 25. [Online] Available at https://www.scconline.com/Members/SearchResult.aspx [Accessed on March 2024]

Steven Bassett v. AMB Parking Services, Inc. and Others, 2018 SCC Online US CA 9C 113. [Online] Available at https://www.scconline.com/Members/SearchResult.aspx [Accessed on March 2024]

State of Tamil Nadu v. Suhas Katti, C. No. 4680 of 2004, [Online] Available at https://www.scconline.com/Members/SearchResult.aspx [Accessed on March 2024]

Nagarjun S. (2021, January 1). Suhas Katti v. State of Tamil Nadu. Indian Law Portal. [Online] Available at https://indianlawportal.co.in/suhas-katti-v-state-of-tamil-nadu/ [Accessed on March 2024]

Sanjay Jha v. State of Chhattisgarh, (2014) 3 SCC 202, [Online] Available at https://www.scconline.com/Members/SearchResult.aspx [Accessed on March 2024]

Corruption and Economic Crime Branch of UNODC (Director). (2007, August 15). Handbook on identity-related crime. UNODC.org. [Online] Available at https://www.unodc.org/documents/treaties/UNCAC/Publications/Handbook_on_ID_Crime/10-57802_ebooke.pdf [Accessed on March 2024]

Corruption and Economic Crime Branch of UNODC (Director). (2007, August 15). Handbook on identity-related Crime. UNODC.org. [Online] Available at https://www.unodc.org/documents/treaties/UNCAC/Publications/Handbook_on_ID_Crime/10-57802_ebooke.pdf [Accessed on March 2024]

Published

2023-12-16