Centenial Celebration

Transaction Search Form: please type in any of the fields below.

Date: April 30, 2024 Tue

Time: 2:00 am

Results for identity theft

41 results found

Author: Johnson, Mireille

Title: Am I Who I Say I Am? A Systems Analysis into Identity Fraud in New Zealand

Summary: This thesis examines the systems issues surrounding identity fraud in New Zealand. The research shows that New Zealand does have serious problems in its system, which in some cases facilitate identity fraud. There is a lack of synchronicity between New Zealand Government systems which undermines a whole of government approach to minimizing the risk of identity fraud. Issues in the private sector with identity fraud are just as serious, with financial advantage being one of the main reasons that identity fraud is committed. However, the lack of information sharing between the public and private sectors does not help stem the flow of identity fraud that is currently occurring.

Details: Auckland, NZ: Auckland University of Technology, 2009. 193p.

Source: Thesis, Institute of Public Policy

Year: 2009

Country: New Zealand

URL:

Shelf Number: 118258

Keywords:
Fraud
Identity Theft

Author: Booz Allen Hamilton

Title: Medical Identity Theft Final Report

Summary: This report includes considerations of policy and technical approaches to addressing issues of prevention, detection, and remediation of medical identity theft.

Details: Rockville, MD: Booz Allen Hamilton, 2009. 26p.

Source:

Year: 2009

Country: United States

URL:

Shelf Number: 117757

Keywords:
Identity Theft

Author: Queensland. Crime and Misconduct Commission

Title: Organised Fraud in Queensland: A Strategic Assessment

Summary: This 2009 fraud assessment report focuses on major organized crime groups and their use of fraud both as a means to earn money and as a facilitator of further criminal enterprise. Although many fraud offenses are opportunistic and carried out by individuals or groups, this assessment focuses on fraud committed by organized criminal networks against persons, businesses and companies; it does not extend to corporate sector fraud. This summary provides an overview of current and emerging issues relating online, credit card, identity and check fraud.

Details: Brisbane: Crime and Misconduct Commission, 2009. 27p.

Source: Internet Resource; Crime Bulletin, No. 10

Year: 2009

Country: Australia

URL:

Shelf Number: 118831

Keywords:
Computer Crimes
Economic Crimes
Fraud (Australia)
Identity Theft
Organized Crime (Australia)

Author: Australia. Parliament. House of Representatives. Standing Committee on Communications

Title: Hackers, Fraudsters and Botnets: Tackling the Problem of Cyber Crime. The Report of the Inquiry into Cyber Crime

Summary: This report asserts that Australian home computer users and small businesses have been left to fend for themselves against the growing problem of organized cyber crime. The committee makes 34 recommendations aimed at improving Australia's response to the growth of cyber crime, and further recommends that an Office of Online Security be established to coordinate cyber crime policy across the Commonwealth, State and Territory governments, and foster partnerships with industry and the community.

Details: Canberra: Australian Parliament, 2010. 260p.

Source: Internet Resource

Year: 2010

Country: Australia

URL:

Shelf Number: 119160

Keywords:
Computer Crimes
Cybercrime
Identity Theft
Internet Safety
Organized Crime

Author: Lanton, Lynn

Title: Identity Theft Reported by Households, 2007 - Statistical Tables

Summary: The report presents data on identity theft victimization reported by households from the National Crime Victimization Survey (NCVS). These statistical tables provide 2007 data on rates and types of identity theft, as well as demographic characteristics of victimized households and their monetary losses. Tables compare rates of identity theft victimization in 2005 to 2007. Estimates from the last half of 2008 are also presented and compared to estimates from the same 6-month period in 2007. Highlights include the following: 1) The number of households with at least one member who experienced one or more types of identity theft increased 23% from 2005 to 2007; 2) From 2005 to 2007, the number of households that experienced credit card theft increased by 31% and the number that experienced multiple types during the same episode increased by 37%; 3) During the 6-month period in 2008 for which identity theft victimization data was collected as part of the regular NCVS, 3.3% of households discovered that at least one member had been a victim of one or more types of identity theft.

Details: Washington, DC: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics, 2010. 5p.

Source: Internet Resource; National Crime Victimization Survey 2007. Accessed August 10, 2010 at http://bjs.ojp.usdoj.gov/index.cfm?ty=pbdetail&iid=2294

Year: 2010

Country: United States

URL: http://bjs.ojp.usdoj.gov/index.cfm?ty=pbdetail&iid=2294

Shelf Number: 119581

Keywords:
Credit Card Theft
Economic Crimes
Identity Theft
Victimization Surveys
Victims of Crime

Author: Kephart, Janice

Title: Fixing Flores: Assuring Adequate Penalties for Identity Theft and Fraud

Summary: This Backgrounder proposes statutory language fixes to federal identity theft and aggravated felony language in 18 U.S.C. §§ 1028 and 1028A to reverse the practical implications of the May 2009 Supreme Court ruling in Flores-Figueroa v. United States. Flores crippled prosecutors’ longstanding practice of using the aggravated identity theft statute by requiring that prosecutors now also prove that a defendant knew he was using a real person’s identity information, as opposed to counterfeit information not connected to an actual person. The statute is an important tool for immigration enforcement. Proving a defendant’s knowledge about his crime is always difficult, and impossible in some cases, even where there is substantial harm and clear victims. This is especially the situation with illegal aliens who buy identity information from third parties. The inevitable result of the Flores decision is to enable perpetrators an easy defense and to tie prosecutors’ hands. The defendant in the case was an illegal alien working at a steel plant in Illinois. The fixes proposed in this report attempt to encapsulate the original intent of Congress when it broadened federal criminal identity theft law in 1998 and added mandatory sentencing guidelines for identity theft in 2004. Ensuring adequate penalties for the ever-evolving crime of identity theft and fraud and better protecting victims of this pervasive crime was of paramount importance both times federal law was amended. Flores identified an inadvertent flaw in the statutory language and has now put the responsibility on Congress to fix the language or deal with the untenable result of an additional burden of proof on prosecutors, resulting in fewer identity theft cases being prosecuted or more defendants being let off the hook for serious crimes due to a legal loophole.

Details: Washington, DC: Center for Immigration Studies, 2010. 20p.

Source: Internet Resource: Center for Immigration Studies Backgrounder, Jan. 2010: Accessed August 19, 2010 at: http://www.cis.org/articles/2010/Flores-Figueroa.pdf

Year: 2010

Country: United States

URL: http://www.cis.org/articles/2010/Flores-Figueroa.pdf

Shelf Number: 119628

Keywords:
Fraud
Identity Theft
Illegal Aliens (U.S.)
Immigration (U.S.)

Author: Great Britain. Attorney General's Office. National Fraud Authority

Title: A Fresh Approach to Combating Fraud in the Public Sector: The Report of the Smarter Government Public Sector Fraud Taskforce

Summary: This report makes 33 recommendations in a wide range of areas including the need for better measurement and estimation of fraud in the public sector, putting a greater emphasis on fraud prevention, wider sharing of data and use of the newly established National Fraud Intelligence Bureau. It also encourages continued work to combat identity fraud. The report identifies a number of examples of good practice in parts of the public sector which should be implemented more widely and techniques which are starting to be used in the private sector that the public sector should evaluate. It also recommends cross-departmental projects should be established to counter procurement fraud and staff fraud which affect a number of departments and public services.

Details: London: National Fraud Authority, 2010. 79p.

Source: Internet Resource: Accessed August 22, 2010 at:

Year: 2010

Country: United Kingdom

URL:

Shelf Number: 119659

Keywords:
Fraud (U.K.)
Identity Theft

Author: Langton, Lynn

Title: Identity Theft Reported by Households, 2007 - Statistical Tables

Summary: This report presents data on identity theft victimization reported by households from the National Crime Victimization Survey. The statistical tables provide 2007 data on rates and types of identity theft, as well as demographic characteristics of victimized households and their monetary losses. The number of households with at least one member who experienced one or more types of identity theft increased 23% from 2005 to 2007. From 2005 to 2007, the number of households that experienced credit card theft increased by 31% and the number that experienced multiple types during the same episode increased by 37%. During the 6-month period in 2008 for which identity theft victimization data was collected, 3.3% of households discovered that at least one member had been a victim of one or more types of identity theft.

Details: Washington, DC: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics, 2010. 5p.

Source: Internet Resource: Accessed September 3, 2010 at: http://bjs.ojp.usdoj.gov/content/pub/pdf/itrh07st.pdf

Year: 2010

Country: United States

URL: http://bjs.ojp.usdoj.gov/content/pub/pdf/itrh07st.pdf

Shelf Number: 119742

Keywords:
Credit Card Fraud
Crime Statistics
Identity Theft
Victimization Surveys

Author: Mortensen, Ronald W.

Title: Illegal, but Not Undocumented: Identity Theft, Document Fraud, and Illegal Employment

Summary: This backgrounder examines illegal immigration-related document fraud and identity theft that is committed primarily for the purpose of employment. It debunks three common misconceptions: illegal aliens are “undocumented;” the transgressions committed by illegal aliens to obtain jobs are minor; and illegal-alien document fraud and identity theft are victimless crimes. It discusses how some community leaders rationalize these crimes, contributing to a deterioration of the respect for laws in our nation, and presents a variety of remedies, including more widespread electronic verification of work status (E-Verify and the Social Security Number Verification Service) and immigrant outreach programs to explain the ramifications and risks of document fraud and identity theft.

Details: Washington, DC: Center for Immigration Studies, 2009. 19p.

Source: Internet Resource: Accessed September 10, 2010 at: http://www.cis.org/articles/2009/back809.pdf

Year: 2009

Country: United States

URL: http://www.cis.org/articles/2009/back809.pdf

Shelf Number: 119781

Keywords:
Document Fraud
Identity Theft
Illegal Aliens
Immigrants
Immigration

Author: Kane, John

Title: The 2005 National Public Survey on White Collar Crime

Summary: Within recent years, instances of white collar crime have become a topic of increasing frequency within the news. Security data breaches and crimes such as identity theft, credit card fraud, disaster fraud, and mortgage fraud have pervaded recent media reports, and scandals involving corporations such as Enron, Worldcom, Tyco, HealthSouth, and ImClone have dominated airtime. Furthermore, monetary estimates from the Federal Bureau of Investigation and the Association of Certified Fraud Examiners approximate the annual cost of white collar crime to be between $300 and $660 billion. Despite the evidence of the widespread nature of white collar crime, there remain few empirical studies devoted to assessing the prevalence of white collar crime as it relates to the general public. In response to this, NW3C conducted the 2005 National Public Survey on White Collar Crime (a follow-up to NW3C’s original National Public Survey on White Collar Crime conducted in 1999). By utilizing household and individual measures, this nationally-representative survey highlights the public’s recent experiences with white collar crime including victimization, reporting behaviors, and perceptions of crime seriousness.

Details: Fairmont, WV: National White Collar Crime Center, 2006. 45p.

Source: Internet Resource: Accessed October 6, 2010 at: http://www.nw3c.org/research/national_public_survey.cfm

Year: 2006

Country: United States

URL: http://www.nw3c.org/research/national_public_survey.cfm

Shelf Number: 119868

Keywords:
Credit Card Fraud
Crime Surveys
Fraud
Identity Theft
Public Opinion
Victimization
Victims of Crime
White Collar Crime

Author: Financial Crimes Enforcement Network

Title: Identity Theft: Trends, Patterns, and Typologies Reported in Suspicious Activitiy Report Filed by Depository Institute January 1, 2003 - December 31, 2009

Summary: Identity theft was the sixth most frequently reported characterization of suspicious activity within the period of the study, behind structuring/money laundering, check fraud, mortgage loan fraud, credit card fraud, and counterfeit check fraud. Based upon analysis of the study sample, the number of identity theft-related depository institution SAR filings submitted during calendar year (CY) 2009 was 123 percent higher than the number reported in CY 2004. This compares with an 89 percent increase in the numbers of all depository institution SAR filings made in CY 2004 versus CY 2009.6 Over 86 percent of sample depository institution SAR filings bearing either the identity theft suspicious activity characterization or identity theft-associated keywords in their narratives actually described identity theft. Most of the remainder of the filings described identity fraud or provided insufficient information to confirm identity theft. Credit card fraud was the most frequently co-reported suspicious activity characterization with identity theft, appearing in over 45.5 percent of sample filings. In about 30 percent of these filings reporting the successful takeover of an existing credit card account, and 17 percent reporting the successful unauthorized set up of a new credit card account, the alleged identity thief added his/her name to the account as an authorized user. Several types of loan accounts were reportedly abused in 31 percent of filings. In 56.5 percent of filings specifically reporting student loan fraud, subjects included both their name and the victim’s name on the loan application as either the borrower or co-signer. Analysis of the sample indicated that filers reporting auto loan fraud facilitated by identity theft were successful in identifying these loans as fraudulent prior to funding in 49.5 percent of filings. Similarly, filers reporting student loan fraud facilitated by identity theft identified the loans as fraudulent prior to funding in 54.5 percent of filings. Nearly 27.5 percent of sample identity theft SAR narratives reported that the identity theft victim knew the suspected thief, who was usually a family member, friend, acquaintance, or an employee working in the victim’s home. Computer-assisted identity theft was described in 4 percent of filings. Fraud rings that employ identity theft to further their illicit activities were reported in 3.5 percent of filings overall, with the year-to-year trend line strongly up in every period except 2005-2006. Victims reportedly discovered identity theft through review of their own account activity in about 28 percent of filings in the sample. Filers credited routine financial institution account monitoring with uncovering identity theft in nearly another 21 percent of sample filings, and checks of commercial databases at account set-up in 14.5 percent of sample filings. Credit reports, law enforcement investigations, collection agencies, and credit monitoring services were responsible for revealing identity theft in a decreasing percentage of sample filings.

Details: Washington, DC: U.S. Department of the Treasury, Financial Crimes Enforcement Network, 2010. 36p.

Source: Internet Resource: Accessed October 25, 2010 at: http://www.fincen.gov/news_room/rp/reports/pdf/ID%20Theft.pdf

Year: 2010

Country: United States

URL: http://www.fincen.gov/news_room/rp/reports/pdf/ID%20Theft.pdf

Shelf Number: 120071

Keywords:
Computer Crimes
Credit Card Fraud
Fraud
Identity Theft

Author: Cross-Border Crime Forum

Title: Identity-Related Crime: A Threat Assessment. A Report to the Attorney General of the United States and the Minister of Public Safety of Canada

Summary: This threat assessment focuses on five aspects of the identity-related crime problem as it affects Canada and the United States: (1) the scope and extent of the problem; (2) the purposes of identity-related crime; (3) the categories of individuals who engage in or are victimized by identity-related crime; (4) the methods and techniques that criminals use to commit identity-related crime; and (5) the responses to the problem. Its purpose is to identify and describe the most problematic features of this crime problem, as well as the approaches being used in both countries to combat it. Annually, a significant percentage of the U.S and Canadian populations is the victim of some kind of identity-related crime. The continuing vulnerability and insecurity of various types of payment mechanisms and identification documents is one of the persistent problems in combating identity-related crime. Criminals and criminal organizations engage in a wide variety of identity-related crime to commit fraud, unlawfully obtaining goods, services, or benefits from the public or private sector.

Details: S.l.: Cross-Border Crime Forum, 2010. 27p.

Source: Internet Resource: Accessed December 21, 2010 at: http://www.justice.gov/criminal/fraud/documents/reports/2010/11-01-10mass-market-fraud.pdf

Year: 2010

Country: United States

URL: http://www.justice.gov/criminal/fraud/documents/reports/2010/11-01-10mass-market-fraud.pdf

Shelf Number: 120565

Keywords:
Cybercrime
Identity Theft

Author: Detica

Title: The Cost of Cyber Crime. A Detica Report in Partnership with the Office of Cyber Security and Information Assurance in the Cabinet Office

Summary: "Few areas of our lives remain untouched by the digital revolution. Across the world, there are now nearly two billion internet users and over five billion mobile phone connections; every day, we send 294 billion emails and five billion SMS messages. Over 91 per cent of UK businesses and 73 per cent of UK households have internet access and £47.2 billion was spent online in the UK alone in 2009. Our society is now almost entirely dependent on the continued availability, accuracy and confidentiality of its Information and Communications Technology (ICT). We need it for our economic health, for the domestic machinery of government, for national defence and for our day-to-day social and cultural existence. As well as significant benefits, the technology has also enabled old crimes to be committed in new and more subtle ways. In its National Security Strategy, cyber threats are recognised by the Government as one of four ‘Tier One’ risks to the UK’s security. But estimates of the cost of cyber crime have until now not been able to provide a justifiable estimate of economic impact and have failed to address the breadth of the problem. Therefore, the Office of Cyber Security and Information Assurance (OCSIA) worked with Detica to look more closely at the cost of cyber crime in the UK and, in particular, to gain a better appreciation of the costs to the UK economy of Intellectual Property (IP) theft and industrial espionage. Further developments of cyber crime policy, strategies and detailed plans will thus benefit from this insight."

Details: London: U.K. Cabinet Office, 2011. 32p.

Source: Internet Resource: Accessed February 22, 2011 at: http://www.cabinetoffice.gov.uk/sites/default/files/resources/the-cost-of-cyber-crime-full-report.pdf

Year: 2011

Country: United Kingdom

URL: http://www.cabinetoffice.gov.uk/sites/default/files/resources/the-cost-of-cyber-crime-full-report.pdf

Shelf Number: 120839

Keywords:
Costs of Crime
Cybercrime
Extortion
Identity Theft
Internet Crimes
Internet Safety

Author: Cross Border Crime Forum. Mass-Marketing Fraud Subgroup

Title: Mass-Marketing Fraud A Report to the Minister of Public Safety of Canada and the Attorney General of the United States

Summary: In April 1997, then-Prime Minister of Canada Jean Chrétien and then-President of the United States Bill Clinton directed the preparation of a joint study examining ways to counter the serious and growing problem of cross-border telemarketing fraud. In November 2007, a binational working group established for that purpose provided a report to the Prime Minister and the President that contains a detailed examination of the problem and a series of recommendations to improve both countries’ responses to the problem. Those recommendations included identification of telemarketing fraud as a serious crime; establishment of regional task forces to cooperate across the international border; coordination of strategies to control telemarketing fraud between both countries at agency, regional, and national levels; operation of an ongoing binational working group to provide overall coordination; and other recommendations to address information-gathering, evidence-sharing and mutual legal assistance, extradition, and public education and prevention. The 1997 Report became a general blueprint for coordinated binational actions against telemarketing fraud. In the ten years since the issuance of the 1997 Report, Canada and the United States have not only carried out all of the recommendations in that Report, but have made even greater strides in combating what is now termed mass-marketing fraud - i.e., fraud schemes that use mass communications methods, such as telemarketing, the Internet, and mass mailing to contact and communicate with large numbers of prospective victims and to obtain funds from victims. This Report has three purposes. First, it will describe the principal trends and developments since 2003 in four major types of crime associated with mass-marketing fraud (i.e., telemarketing fraud schemes, Internet fraud schemes, Nigerian fraud, and identity theft). Second, it will summarize the principal approaches that law enforcement in both countries have adopted since 2003 to combat mass-marketing fraud more effectively. Third, it will report on recommendations that this Subgroup made in 2003 as part of a binational action plan to combat mass-marketing fraud, and set out additional recommendations that address changes in the nature and types of mass-marketing fraud that have emerged since 2003.

Details: Ottawa: Public Safety Canada, 2008. 47p.

Source: Internet Resource: Accessed March 29, 2011 at: http://www.publicsafety.gc.ca/prg/le/oc/_fl/mass-marketing-fraud-2008-5-year-report-eng.pdf

Year: 2008

Country: United States

URL: http://www.publicsafety.gc.ca/prg/le/oc/_fl/mass-marketing-fraud-2008-5-year-report-eng.pdf

Shelf Number: 121198

Keywords:
Identity Theft
Internet Crimes
Mass Communications
Nigerian Fraud
Telemarketing Fraud (U.S. and Canada)

Author: Huff, Rodney

Title: The 2010 National Public Survey On White Collar Crime

Summary: The 2010 National Public Survey on White Collar Crime was designed by the National White Collar Crime Center to measure the public’s experience with white collar crime in the following areas: ● Victimization ● Reporting behaviors ● Perceptions of crime seriousness The survey was administered from June to August, 2010 and employed random digit dialing techniques to provide a national sample. Landline and cell phone interviews of 2,503 adult participants were conducted in English and Spanish. Respondents were asked about experiences within their households concerning white collar crime within the past 12 months, as well as about personal encounters with these crimes within the past 12 months. The experiences measured were mortgage fraud, credit card fraud, identity theft , unnecessary home or auto repairs, price misrepresentation, and losses occurring due to false stockbroker information, fraudulent business ventures, and Internet scams. The study found that: ● 24% of households and 17% of individuals reported experiencing at least one form of these victimizations within the previous year ● Respondents reported victimization at both household and individual levels most oft en as a result of credit card fraud, price misrepresentation, and unnecessary object repairs In conjunction with direct victimization questions, respondents were asked whether or not the victimization was reported to law enforcement or other entities that might be able to assist the victim. Of the household victimizations: ● 54.7% were reported to at least one external recipient or agency (e.g., credit card company, business or person involved, law enforcement, consumer protection agency, personal att orney, etc.) ● Only 11.7% were reported to law enforcement or some other crime control agency. In an effort to gauge public perception of the seriousness of crime, respondents were presented with 12 scenarios that included various white collar crimes as well as traditional offenses. The scenarios were grouped into eight categories. These categories were, in turn, ordered into four dichotomies: (1) white collar/traditional crime, (2) crimes involving physical harm/money, (3) crimes involving organizational/individual off enders, and (4) crimes involving high-status/low-status offenders. Based upon the categorization, findings suggest that: ● Respondents viewed white collar crime as slightly more serious than traditional crime types ● Offenses committed at the organizational level were viewed more harshly than those committed by individuals ● Crimes committed by high-status off enders (those in a position of trust) were seen as more troubling than those committ ed by low-status persons. By collecting responses related to victimization, reporting behaviors, and perceptions of crime seriousness, the present survey reveals valuable information concerning the public’s experiences with white collar crime: ● Nearly one in four households was victimized by white collar crime within the previous year ● Few victimization reports reached crime control agencies. The survey also inquired about respondents’ perceptions of the impact of white collar crime on the current economic crisis, as well as the level of resources appropriated by the government to fight white collar crime. The survey found that: ● A majority believed white collar crime has contributed to the current economic crisis ● Nearly half the participants said that government is not devoting enough resources to combat white collar crimes.

Details: Fairmont, WV: National White Collar Crime Center, 2010. 57p.

Source: Internet Resource: Accessed April 18, 2011 at: http://crimesurvey.nw3c.org/docs/nw3c2010survey.pdf

Year: 2010

Country: United States

URL: http://crimesurvey.nw3c.org/docs/nw3c2010survey.pdf

Shelf Number: 121388

Keywords:
Credit Card Fraud
Crime Seriousness
Crime Surveys
Identity Theft
Victimization
White Collar Crime

Author: Australian Crime Commission

Title: Organised Crime in Australia 2011

Summary: The Organised Crime in Australia 2011 report is the third and largest report of its kind that the Australian Crime Commission has produced since 2008. The latest edition provides the most comprehensive unclassified profile of organised crime in Australia, including the characteristics of those involved, what drives them, the activities they are involved in and the extent and impact of organised crime. Most organised criminal activities in Australia are focused on illicit drug markets, although organised crime groups also engage in a wide variety of associated criminal activity including tax evasion, money laundering, fraud, identity crime and high tech crime. The impact of organised crime in Australia is serious and far exceeds the direct harm caused by the specific offences. In fact, the activities of high-threat serious and organised criminal enterprises result in significant harm to the Australian community. There are significant losses to the economy, including the redirection of resources that might otherwise be invested in legitimate business, reductions in tax revenue and increasing costs of law enforcement and regulation. The widespread impact extends to costs associated with longer-term health and social harm. The activities of organised criminal enterprises can also undermine public confidence in the integrity of key business sectors and government institutions.

Details: Canberra: Australian Crime Commission, 2011. 103p.

Source: Internet Resource: Accessed April 21, 2011 at: http://www.crimecommission.gov.au/publications/oca/_files/2011/oca2011.pdf

Year: 2011

Country: Australia

URL: http://www.crimecommission.gov.au/publications/oca/_files/2011/oca2011.pdf

Shelf Number: 121465

Keywords:
Drug Markets
Drug Trafficking
Fraud
Identity Theft
Money Laundering
Organized Crime (Australia)
Tax Evasion

Author: CIFAS - The UK's Fraud Prevention Service

Title: Digital Thieves: A Special Report on Online Fraud

Summary: In Digital Thieves, CIFAS and a wide range of fraud prevention experts have combined not only to focus on identity fraud and account takeover, but also to explain specifically the online dimension to these crimes. There are tips on staying safe online and protected from fraud; stories from the victims of fraud; a series of maps laying bare the true, alarming, scale of these crimes; an examination of how businesses can fall victim; and articles looking at how internet crime has developed and what may, or may not, happen next.

Details: London: CIFAS, 2010. 28p.

Source: Internet Resource: Accessed July 18, 2011 at: http://www.cifas.org.uk/secure/contentPORT/uploads/documents/CIFAS%20Reports/Digital_Thieves_October2010.pdf

Year: 2010

Country: United Kingdom

URL: http://www.cifas.org.uk/secure/contentPORT/uploads/documents/CIFAS%20Reports/Digital_Thieves_October2010.pdf

Shelf Number: 122091

Keywords:
Computer Crimes
Fraud (U.K.)
Identity Theft
Online Victimization

Author: Hutchings, Alice

Title: Review of Computer Chip Identification Systems

Summary: This paper reviews the key literature relating to embedded computer chip identification systems such as those used in smartcards and ePassports. It identifies social, policy and legal issues associated with their use, particularly as they relate to the Australian context. Computer chip identification systems, while offering many benefits, may contain valuable personal data and/or provide access to restricted areas. Therefore, the use of this technology has potential implications for the commission of offences such as identity theft, identify fraud and even terrorism. Embedded computer chip identification systems are considered to be a countermeasure against identity theft as they include additional security measures compared to their predecessors (e.g. magnetic strip cards). However, due to the nature of the records that may be stored on the chip, including identification information and biometric data, they are valuable to offenders and breaches of their security may actually facilitate this type of offence. Choo, Smith and McCusker (2007, p. xiii) predict that “the future will also see new hardware devices and software programs that seek to compromise the quality of data-protection mechanisms used in smartcards”. This paper provides an overview of computer chip identification systems, discusses potential vulnerabilities relating to the misuse of this technology, and the regimes for data protection and privacy, including the technical standards that apply in Australia and internationally.

Details: Nathan, QLD: ARC Centre of Excellence in Policing and Security, 2010. 8p.

Source: Internet Resource: Briefing Paper, Issue 1: Accessed July 20, 2011 at: http://www.ceps.edu.au/files/file/No_%201%20Alice%20Hutchings.pdf

Year: 2010

Country: Australia

URL: http://www.ceps.edu.au/files/file/No_%201%20Alice%20Hutchings.pdf

Shelf Number: 122117

Keywords:
Computer Crimes (Australia)
Computer Security
Identity Fraud
Identity Theft
Terrorism

Author: Rush, Howard

Title: Crime Online: Cybercrime and Illegal Innovation

Summary: With the growing sophistication and use of information technology, the past decade has seen a major growth in cybercrime. Broadly described, cybercrime refers to all types of crime that exploit modern telecommunications networks, in which computers or computer networks are used for criminal activity. This report focuses exclusively on financial cybercrime, specifically credit card fraud and identity theft. Financial cybercrime has increased dramatically in recent years and looks set to increase further as the proliferation of communications technology proceeds apace and reaches regions of the world with many underemployed poor people with information technology skills who can take advantage of cybercrime opportunities. The current global recession will likely increase this trend still further.

Details: Brighton, UK: CENTRIM, University of Brighton, 2009. 97p.

Source: Internet Resource: Accessed October 22, 2011 at: http://eprints.brighton.ac.uk/5800/

Year: 2009

Country: United Kingdom

URL: http://eprints.brighton.ac.uk/5800/

Shelf Number: 123116

Keywords:
Computer Crimes
Credit Card Fraud
Cybercrimes
Financial Crimes
Identity Theft
Online Victimization

Author: Smyth, Sara M.

Title: Measuring the Extent of Cyber-Fraud in Canada: A Discussion Paper on Potential Methods and Data Sources

Summary: Central to developing and monitoring the progress of strategies for combating cyber crime is reliable information about crime volume, in terms of the number of incidents and offenders, the prevalence of cyberspace tools for the commission of crime, as well as the number of victims. This discussion paper assesses the potential for using innovative methodologies to estimate the scope of cyber-fraud, identifies existing data sources and gaps, and suggests novel sources of data that may help provide a more accurate picture of the degree of cyber-fraud in Canada. Further, possible ways to determine the proportions of cyber-fraud attributable to criminal networks rather than single individuals are discussed. This research is informed by a literature review and interviews with law enforcement and Information Technology (IT) personnel. The literature review and interviews show that the largest impediment to effectively managing the problem of cyber-fraud is the lack of reliable data. The Government of Canada primarily relies on police-reported data for information about cyber-fraud. Yet, there are a number of reasons why fraud incidents are not reported to police. For example, companies may prefer to handle such matters internally, or individuals may only report that they were defrauded to their financial institution. This research shows that current information about cyber-fraud is being funnelled to a variety of different organizations, including banks, regulatory agencies and various police agencies, or is simply not recorded. There is a clear shortage of data measuring the prevalence and costs of cyber-fraud in Canada and the available information is incomplete and fragmented. The lack of reporting of cyber-fraud incidents by individual and corporate/government victims means that many cases are not recorded or represented in official crime statistics This research demonstrates a strong need for the creation of a national centre to record and measure data relating to cyberfraud across Canada. A central databank of known cyber-fraud offenders and cases across the country could facilitate the identification and tracking of suspects in cyber-fraud cases and could further understanding regarding when one individual, or group of individuals, is committing fraud all over the country. Ultimately, a national databank on cyber-fraud incidents could give law enforcement officials a better understanding of the types of cyber-fraud being committed in Canada. Sophisticated technologies and the global distribution of computer networks also increase the difficulty of detecting and addressing cyber-fraud and hinder the ability to find and prosecute criminals operating online. In addition, there are operational challenges related to ensuring that law enforcement officials have the training and resources they need to adequately address the problem and able to identify perpetrators of cyber-frauds. Attempting to locate a perpetrator is problematic in many cases of cyber-fraud because skilled attackers cover their tracks by using proxies and other technical obfuscation methods. This research suggests that the best source for further information on cyber-fraud is offender populations. Offender interviews may help uncover the network structure of hidden populations and help the law enforcement community to identify key players within the group. Of the options available for hidden populations, a truncated Poisson model is suggested as the most effective model. Ideally, this research could help pave the way for data collection and analysis that would better inform law enforcement officials, investigators, and policy makers about the extent of cyber-fraud and cyber-criminal populations in Canada. This research may contribute toward the enhancement of prevention and suppression strategies, as well as the development of an empirical means for evaluating the effectiveness of initiatives, including elements of Canada’s Cyber Crime Strategy.

Details: Ottawa: Public Safety Canada, 2011. 65p.

Source: Internet Resource: Report No. 020, 2011: Accessed November 22, 2011 at: http://publications.gc.ca/collections/collection_2011/sp-ps/PS14-4-2011-eng.pdf

Year: 2011

Country: Canada

URL: http://publications.gc.ca/collections/collection_2011/sp-ps/PS14-4-2011-eng.pdf

Shelf Number: 123422

Keywords:
Computer Crimes
Cybercrime (Canada)
Fraud
Identity Theft
Internet Crimes

Author: Budzilowicz, Lisa M.

Title: Who's on First? Challenges Facing Prosecutors and Financial Institutions in Responding to Identity Theft

Summary: Prosecutors and law enforcement struggle with how to approach victimized financial institutions and their consumers. Prosecutors rely on prompt reporting of crime and they need to access financial institutions' information, such as account data, video evidence, and witness statements, as evidence of the crimes. This report examines how prosecutors and financial institutions can work together to prevent, investigate, and prosecution identity theft.

Details: Alexandria, VA: National District Attorneys Association, American Prosecutors Research Institute, 2007. 66p.

Source: Internet Resource: Special Topics Series: Accessed January 13, 2012 at: http://www.ndaa.org/pdf/pub_whos_on_first_07.pdf

Year: 2007

Country: United States

URL: http://www.ndaa.org/pdf/pub_whos_on_first_07.pdf

Shelf Number: 123607

Keywords:
Consumer Fraud
Cybercrime
Financial Crimes
Identity Theft
Prosecutors

Author: Levi, Michael

Title: eCrime Reduction Partnership Mapping Study

Summary: High quality data on eCrimes are hard to find, both nationally and internationally. This makes rational policy decisions for both public and private sectors – which anyway are interdependent in both directions – even more difficult than they would otherwise be, as nation states grapple falteringly with transnational crimes and with transnational legal processes, priorities and scarce resources. • The majority of eCrime data collection practices adopt sub-standard methodologies that produce a very partial picture of the problem. Large government surveys, such as the Crime Survey for England and Wales (formerly the British Crime Survey), the Offending, Crime and Justice Survey and Commercial Victimisation Survey only intermittently include questions that relate directly to eCrimes, though the CSEW and the Scottish Crime and Justice Survey have looked regularly at card and identity crimes, and fear of them, and have found that identity thefts arouse more concern than do other crimes. Identity thefts can occur offline, but it seems plausible that when responding, people will be thinking about online data ‘theft’ from hacking or social engineering. eCrime questions in European surveys, such as the Community Surveys on ICT Usage, have been found to be unreliable. Vendor sources, such as private security surveys, are often based on breach data identified by vendor software, resulting in partial datasets. Official criminal justice related datasets rely on both reported and officially recorded incidents of eCrimes, while even good administrative data in the private sector (e.g. UK Payments, CIFAS Fraud Prevention Service) cannot avoid excluding unidentified eFrauds (for example in the large category of ‘bad debt’). In the UK only the Oxford Internet Surveys and the Information Security Breaches Survey (pre-2010) produce eCrimes data that are of gold-standard methodologically: however neither of them survey or estimate direct or indirect economic losses from eCrimes. • The introduction of security breach notification requirements to some UK public and private sector organisations in May 20111 may provide a more robust evidence base on eCrimes breaches. It is however too early to assess the quality of this new data stream that is only recently under the coordination of the Office of Communications (Ofcom) and the Information Commissioner’s Office (ICO). • Based on the best data available, an upward trend is evident for both domestic and business related eCrimes. The Information Security Breaches Survey (2010) indicates a sharp upward trend in all business eCrimes compared to 2008 data. While less extreme, the upward trend in domestic data as recorded by the Oxford Internet Survey (2011) applies to all eCrimes other than obscenity. • Independent of actual levels of fraud, there is high public anxiety about eCrimes, and such anxieties require ‘reassurance policing’ that contains both real responses to experienced crimes and a range of public and third party measures to guide sound as well as just profitable risk-reduction practices.

Details: Cardiff, Wales: Cardiff Centre for Crime, Law and Justice Cardiff School of Social Sciences, 2012. 85p.

Source: Iinternet Resource: Accessed November 28, 2012 at: http://dpalliance.org.uk/wp-content/uploads/2012/09/20120910-eCrime_Reduction_Partnership_Mapping_Study.pdf

Year: 2012

Country: United Kingdom

URL: http://dpalliance.org.uk/wp-content/uploads/2012/09/20120910-eCrime_Reduction_Partnership_Mapping_Study.pdf

Shelf Number: 127027

Keywords:
Computer Crime (U.K.)
Computer Fraud
Crime Surveys
Identity Theft
Victimization Surveys
White-Collar Crime

Author: Smith, Russell G.

Title: Identity Crime and Misuse in Australia: Results of the 2013 Online Survey

Summary: Identity crime and misuse of personal information affect all sectors in Australia and cost individuals, business and government many millions of dollars annually. In the public sector, the misuse of personal information has been recognised in income tax evasion, customs duty and GST fraud, superannuation fraud, obtaining welfare and health care benefit fraud achieved through the use of false names, immigration fraud and taking English language tests (a key requirement for visas) for someone else. In the private sector, the problem areas have been identified as opening bank accounts in false names to obtain finance, ATM fraud, online and mobile banking and payment card fraud, funds transfer fraud, and securities and investment fraud. In addition to these and other financial crime risks, misuse of identity can also arise in connection with violent crime, such as where individuals have sought to avoid detection and prosecution for murder, robbery and acts of terrorism by pretending to be someone else. In May 2013, in order to explore the nature and scope of identity crime and misuse in Australia, the Australian Institute of Criminology was commissioned by the Attorney-General's Department to undertake a national survey. This project is one of a series of initiatives that are being implemented as part of the National Identity Security Strategy, Australia's national response to enhancing identity security, which seeks to prevent identity crime and misuse, contribute to national security and facilitate the benefits of the digital economy. Subsequently, the Australian Institute of Criminology used an online research panel to generate a sample of 5,000 Australians aged 15 years and over to measure personal experiences of identity crime. The survey covered the number of contacts, responses and victimisation incidents experienced, as well as financial loss and other impacts, reporting and response activities, and victims' perceptions of changing levels of risk. Detailed demographic information was also collected that enabled profiles of victims to be created. This report presents the results of the survey. The findings confirm prior research that has found that identity crime affects a relatively high proportion of Australians who report substantial financial and other impacts. Raising awareness of the risks that individuals face, and gathering sound statistical data on the problem, is an effective way to address the problem. In order to monitor changes from year to year in the nature and extent of identity crime, it is proposed that this survey will be replicated on a regular basis.

Details: Canberra: Australian Institute of Criminology, 2014. 73p.

Source: Internet Resource: Research and Public Policy Series 128: Accessed May 5, 2014 at: http://aic.gov.au/media_library/publications/rpp/128/rpp128.pdf

Year: 2014

Country: Australia

URL: http://aic.gov.au/media_library/publications/rpp/128/rpp128.pdf

Shelf Number: 132240

Keywords:
Computer Crimes
Digital Crimes
Financial Crimes
Fraud
Identity Theft

Author: Bileski, Matthew

Title: Identity Theft Arrest and Case Processing Data: An Analysis of the Information in Arizona's Computerized Criminal History Record System

Summary: Over the years, the criminal justice system in Arizona has come to rely upon the information that the criminal history record repository, specifically the Arizona Computerized Criminal History (ACCH) record system, contains for criminal background checks, for employment qualifications, and for firearms purchases. The ACCH records, housed at the Arizona Department of Public Safety (AZDPS), provide arrest and subsequent case disposition information (i.e., charges filed, convictions, sentences, etc.) for all felony, sexual, driving under the influence, and domestic violence-related offenses that take place throughout Arizona. Criminal history records are also a valuable resource for research within the criminal justice system. Researchers at the Arizona Statistical Analysis Center (SAC) of the Arizona Criminal Justice Commission used a repository extract provided by AZDPS to assess the identity theft-related (i.e., identity theft, aggravated identity theft, and identity trafficking) offenses present in the ACCH repository. The following report presents the findings of the identity theft research carried out by SAC researchers. Data is also provided regarding the completeness of records within the repository, specifically the percentage of arrest charges with subsequent case disposition information present in the repository by January 2011. The following are some of the key findings within the report: - All three identity theft-related offenses- identity theft, aggravated identity theft, and identity trafficking- increased substantially in the total number of arrests and arrest charges over the reporting period. Identity theft arrest charges increased by 455.6 percent from FY 2001 to FY 2010. Since both offenses did not debut in the Arizona Revised Statutes until FY 2006, aggravated identity theft and identity trafficking arrest charges increased by 113.8 and 45.0 percent, respectively, from FY 2006 to FY 2010. - From FY 2001 to FY 2010, 37.2 percent of identity theft-related arrest charges in the ACCH were missing case disposition information. With the exception of complex cases, FY 2010 arrest charges had the maximum 180 days for disposition processing in the AZDPS data extract, as outlined by Arizona Supreme Court Rule 8.2.a.(2). - Over the ten-year period, the percentage of identity theft-related arrest charges leading to an identity theft-related conviction ranged between 11.8 and 20.6 percent. - More probation sentences were assigned to identity theft convictions than any other sentence type. For aggravated identity theft and identity trafficking, convictions were given prison sentences more than any other sentence. Identity trafficking convictions led to a prison or jail sentence 80 percent of the time or greater, followed by aggravated identity theft at greater than 75 percent, and identity theft at more than 50 percent from FY 2001 to FY 2010. - Offenders arrested for or convicted of identity theft-related charges were likely to be white males between the ages of 25 and 34.

Details: Phoenix, AZ: Arizona Criminal Justice Commission, 2013. 50p.

Source: Internet Resource: Accessed May 8, 2014 at: http://www.azcjc.gov/ACJC.Web/Pubs/Home/ID%20Theft%20Report_FINALWeb.pdf

Year: 2013

Country: United States

URL: http://www.azcjc.gov/ACJC.Web/Pubs/Home/ID%20Theft%20Report_FINALWeb.pdf

Shelf Number: 132290

Keywords:
Arrest Data
Computerized Record Keeping
Criminal Case Processing
Identity Theft

Author: Minnesota. Department of Public Safety, Office of Justice Programs

Title: Financial Crime and Identity Theft: Law Enforcement Response, Challenges and Resource Needs. Report of Minnesota Law Enforcement Identity Theft Survey

Summary: In August and September of 2013 the Minnesota Department of Public Safety Office of Justice Programs sent an on-line survey to all 87 county sheriffs and to 317 municipal police departments. Respondents were asked to complete an online survey about their departmental characteristics, experiences with financial crimes and identity theft, victim assistance, and training needs. A total of 35 sheriffs completed surveys, as did 156 municipal police departments. A total of 384 emails were delivered for a 50 percent response rate. Data were imported into a statistical analysis program and analyzed. Overall results from the survey are presented graphically. Analysis was also completed to see if there were any significant differences based on geography (urban vs. Greater Minnesota) or law enforcement type (municipal police departments vs. sheriffs' offices). Any statistically significant differences are discussed in text boxes throughout the report.

Details: St. Paul, MN: Minnesota Department of Public Safety, 2013.

Source: Internet Resource: Accessed May 17, 2014 at: https://dps.mn.gov/divisions/ojp/forms-documents/Documents/Financial%20Crime%20and%20Identity%20Theft%20Report%20Final.pdf

Year: 2013

Country: United States

URL: https://dps.mn.gov/divisions/ojp/forms-documents/Documents/Financial%20Crime%20and%20Identity%20Theft%20Report%20Final.pdf

Shelf Number: 132388

Keywords:
Crime Statistics
Financial Crimes
Identity Theft

Author: Hartwig, Robert P.

Title: Cyber Risks: The Growing Threat

Summary: Amid a rising number of high profile mega data breaches-most recently at eBay, Target and Neiman Marcus-government is stepping up its scrutiny of cyber security. This is leading to increased calls for legislation and regulation, placing the burden on companies to demonstrate that the information provided by customers and clients is properly safeguarded online. Despite the fact that cyber risks and cyber security are widely acknowledged to be a serious threat, many companies today still do not purchase cyber risk insurance. However, this is changing. Recent legal developments underscore the fact that reliance on traditional insurance policies is not enough, as companies face growing liabilities in this fast-evolving area. Specialist cyber insurance policies have been developed by insurers to help businesses and individuals protect themselves from the cyber threat. Market intelligence suggests that the types of specialized cyber coverage being offered by insurers are expanding in response to this fast-growing market need. There is also growing evidence that in the wake of the Target data breach and other high profile breaches, the number of policies is increasing, and that insurance has a key role to play as companies and individuals look to better manage and reduce their potential financial losses from cyber risks in future.

Details: Insurance Information Institute, 2014. 27p.

Source: Internet Resource: White Paper: Accessed July 23, 2014 at: http://www.iii.org/sites/default/files/docs/pdf/paper_cyberrisk_2014.pdf

Year: 2014

Country: United States

URL: http://www.iii.org/sites/default/files/docs/pdf/paper_cyberrisk_2014.pdf

Shelf Number: 132740

Keywords:
Computer Crime
Cyber Security
Cybercrime
Identity Theft
Internet Crime

Author: Cheney, Julia

Title: Consumer Use of Fraud Alerts and Credit Freezes: An Empirical Analysis

Summary: Fraud alerts - initial fraud alerts, extended fraud alerts, and credit freezes - help protect consumers from the consequences of identity theft. At the same time, they may impose costs on lenders, credit bureaus, and, in some instances, consumers. We analyze a unique data set of anonymized credit bureau files to understand how consumers use these alerts. We document the frequency and persistence of fraud alerts and credit freezes. Using the experience of the data breach at the South Carolina Department of Revenue, we show that consumers who file initial fraud alerts or credit freezes likely do so out of precaution. Consumers who file extended alerts are more likely to be actual victims of identity theft. We find that consumers are heterogeneous in their choice of alerts and that their choices are correlated with important characteristics found in their credit bureau files. These facts are useful for interpreting consumer responses to data breaches and for policymakers.

Details: Philadelphia: Federal Reserve Bank of Philadelphia, 2014. 40p.

Source: Internet Resource: Accessed September 29, 2014 at: http://www.philadelphiafed.org/consumer-credit-and-payments/payment-cards-center/publications/discussion-papers/2014/D-2014-IdentityTheft.pdf

Year: 2014

Country: United States

URL: http://www.philadelphiafed.org/consumer-credit-and-payments/payment-cards-center/publications/discussion-papers/2014/D-2014-IdentityTheft.pdf

Shelf Number: 133474

Keywords:
Consumer Fraud (U.S.)
Credit Card Fraud
Identity Theft

Author: Doyle, Charles

Title: Cybercrime: An Overview of the Federal Computer Fraud and Abuse Statute and Related Federal Criminal Laws

Summary: The Computer Fraud and Abuse Act (CFAA), 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law. It protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This is a brief sketch of CFAA and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326, 122 Stat. 3560 (2008).

Details: Washington, DC: Congressional Research Service, 2014. 96p.

Source: Internet Resource: CRS Report 97-1025: Accessed October 22, 2014 at: http://fas.org/sgp/crs/misc/97-1025.pdf

Year: 2014

Country: United States

URL: http://fas.org/sgp/crs/misc/97-1025.pdf

Shelf Number: 133802

Keywords:
Computer Crimes
Computer Fraud
Cybercrime (U.S.)
Identity Theft
Internet Crimes

Author: Australia. Attorney-General's Department

Title: Improving the Measurement of Identity Crime and Misuse in Australia: Recommendations from the National Identity Crime and Misuse Measurement Framework Project

Summary: Traditional identity crime methodologies are continually being adapted to evolving technologies such as mobile devices, social media and cloud computing. This provides criminals with improved capabilities and opportunities to steal or manipulate personal and financial data, and can increase the number of potential victims of identity crime. On 21 October 2014, the Minister for Justice, the Hon Michael Keenan MP, released a report from the National Identity Crime and Misuse Measurement Framework pilot. The report was developed by the Attorney-General's Department and brought together available data from over 50 different Commonwealth, state and territory agencies as well as the private sector. The report found that identity crime is one of the most common crime types in Australia, affecting between 750 000 to 900 000 people each year, with an estimated annual cost of at least $1.6 billion. This project marks one of the first attempts by any government worldwide to systematically measure the incidents and impacts of identity crime. Identity crime has become one of the fastest growing and most common crimes affecting Australians each year - more people report being a victim of identity crime than assault, robbery, motor vehicle theft or household break-ins. In addition to the key findings of the project, a companion report has been developed containing recommendations for improving the quality and availability of data for measuring identity crime. These recommendations are primarily focussed on the systems of government agencies - reflecting the scope of the initial pilot exercise - but also recognise the need to further engage the private sector as a critical source of information and insights into the nature of identity crime and its impacts. The National Identity Crime and Misuse Measurement Framework report includes the results of community survey on identity crime that was commissioned by the Attorney-General's Department. This survey was conducted by the Australian Institute of Criminology (AIC) in 2013 and found that 9.4 per cent of 5000 respondents reported having their personal information stolen or misused in the previous 12 months, with 21 per cent reporting they were a victim at some point in their life. Of those reporting misuse in the previous 12 months, five per cent lost money as a result, at an average of just over $4000 per incident. As incidents may be underreported, the true extent of identity crime victimisation is likely to be much higher.

Details: Barton, ACT: Attorney-General's Department, 2014. 23p.

Source: Internet Resource: Accessed May 16, 2015 at: http://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/ImprovingMeasurementIdentityCrimeAndMisuseInAustralia.pdf

Year: 2014

Country: Australia

URL: http://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/ImprovingMeasurementIdentityCrimeAndMisuseInAustralia.pdf

Shelf Number: 135441

Keywords:
Computer Crimes
Crime Statistics
Crimes Against Businesses
Cybercrime
Identity Theft

Author: Australia. Attorney-General's Department

Title: Identity crime and misuse in Australia: Key findings from the National Identity Crime and Misuse Measurement Framework Pilot

Summary: Efforts to combat identity crime require a reliable evidence base that quantifies the complete nature and extent of the problem. In Australia and also internationally, there are limited sources of comprehensive, reliable data about identity crime and its consequences. To address this gap in knowledge, the Council of Australian Governments (COAG) agreed in 2012 that work should be undertaken to develop a national measurement framework for identity crime to better inform efforts to implement the National Identity Security Strategy (NISS). This report presents the key findings from a pilot data collection exercise that was undertaken as part of the project established to develop this measurement framework. Key finding: Each year around 4 to 5% of Australians (around 750,000 to 937,000 people) experience identity crime resulting in a financial loss. However, the true extent of identity crime is likely to be unknown, as a considerable proportion of incidents go unreported. The Australian Institute of Criminology conducted a 5,000-person online community survey (the AIC Survey) in 2013 as part of this pilot. They found that 9.4 percent of respondents reported having their personal information stolen or misused in the previous 12 months, with five percent reporting that they suffered financial losses as a result (Smith & Hutchings 2014). Identity crime is likely under-reported by both individual victims and organisations. For example, recent research has shown that only 50 percent of credit card fraud victims and 66 percent of identity theft victims reported the incident to a formal institution, such as law enforcement or a financial institution (ABS 2012). Key finding: Compared with other personal and theft-related crimes (i.e. assault, robbery, break-ins and motor vehicle theft), identity crime is one of the most prevalent crime types affecting Australians each year. Key finding: The price of fraudulent identity credentials suggests they are relatively cheap and easy to obtain. This is reflected in the variety of ways that these credentials are used to commit identity fraud. Information on data breaches (many of which go unreported) also suggests that the personal information needed to create fraudulent identity documents is also available to those willing to seek it out. Key finding: State and territory police detect up to an estimated 30,000 identity crimes each year, with around 24,000 offences proven guilty in a court of law. As identity crimes are often recorded under other related offences such as fraud, the actual number of identity crimes is likely much higher. Key finding: The majority of identity victims lose relatively small amounts of money (up to $1,000), although in some cases losses can run to hundreds of thousands of dollars. A significant proportion of victims also experience demands on their time or other adverse impacts to their mental or physical health, reputations or general wellbeing. Key finding: Only a small proportion of victims of identity crime report the incident to relevant organisations. Court-issued victims' certificates appear significantly underutilised as a mechanism to assist victims in recovering from the consequences of identity crime. Key finding: There are an increasing number of identity credentials that can be verified through the Document Verification Service (DVS), as well as a growing demand for the service amongst government and private sector organisations. Key finding: The estimated economic impact of identity crime in Australia is likely to exceed $1.6 billion per year. In light of the limited data available and the underreporting of identity crime, by both individuals and organisations, this is likely to be a conservative estimate. Key finding: Aside from underreporting, the single biggest limitation on efforts to measure identity crime is the lack of standardisation between organisations over definitions and how incidents are recorded.

Details: Barton, ACT: Attorney-General's Department, 2014. 92p.

Source: Internet Resource: Accessed May 16, 2015 at: http://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/IdentityCrimeAndMisuseInAustralia.pdf

Year: 2014

Country: Australia

URL: http://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/IdentityCrimeAndMisuseInAustralia.pdf

Shelf Number: 135442

Keywords:
Computer Crimes
Credit Card Fraut
Crime Statistics
Crimes Against Businesses
Cybercrime
Financial crimes
Identity Theft

Author: Australian Crime Commission

Title: Organised Crime in Australia 2015

Summary: The Organised Crime in Australia 2015 report provides the most comprehensive contemporary profile of serious and organised crime in Australia. The report provides the context in which organised crime operates in Australia and gives an overview of each of the key illicit markets and the activities which fundamentally enable serious and organised crime. The report provides government, industry and the public with information they need to better respond to the threat of organised crime, now and into the future. Organised Crime in Australia is an unclassified version of the Australian Crime Commission's Organised Crime Threat Assessment (OCTA) which is part of the Picture of Criminality in Australia suite of products. The OCTA is a classified assessment of the level of risk posed by various organised crime threats, categorised by activity, market and enabler.

Details: Canberra: ACC, 2015. 87p.

Source: Internet Resource: Accessed May 23, 2015 at: https://www.crimecommission.gov.au/sites/default/files/FINAL-ACC-OCA2015-180515.pdf

Year: 2015

Country: Australia

URL: https://www.crimecommission.gov.au/sites/default/files/FINAL-ACC-OCA2015-180515.pdf

Shelf Number: 135763

Keywords:
Cybercrime
Identity Theft
Illicit Markets
Organized Crime

Author: CIFAS

Title: Fraudscape: UK fraud trends

Summary: In 2014, there were 276,993 frauds recorded by Cifas Members; an increase of 25% on 2013 levels. While fraud levels often fluctuate year by year, the overall trend is clear - recorded fraud is increasing. Cifas recorded frauds act as a sound barometer for the fraud landscape of the UK. Cifas Members span a range of sectors, including banking, grant giving, credit card, asset finance, retail credit, mail order and online retailer, insurance, telecommunications and public sector. Members report and share confirmed fraud cases using the Cifas National Fraud Database in order to detect and prevent further fraud. In 2014 Cifas Members prevented an estimated $1 billion of fraud through Cifas systems. The data included in this report gives a solid indication of the nature and scale of fraud but it is by no means the full picture. It remains the case that there is no one indicator for fraud levels in the UK, meaning that the true levels of fraud will be far higher. This report explores the key themes and trends from Cifas data in 2014. It is designed to give a simple overview of trends and recommends ideas for further specialist research. Cifas will publish a series of in-depth reports throughout 2015/16.

Details: London: Cifas, 2015. 24p.

Source: Internet Resource: Accessed June 5, 2015 at: http://www.cifas.org.uk/secure/contentPORT/uploads/documents/External%20-%20Fraudscape%20main%20report%20for%20website.pdf

Year: 2015

Country: United Kingdom

URL: http://www.cifas.org.uk/secure/contentPORT/uploads/documents/External%20-%20Fraudscape%20main%20report%20for%20website.pdf

Shelf Number: 135916

Keywords:
Financial Crimes
Fraud
Identity Theft

Author: Smith, Russell G.

Title: Identity crime and misuse in Australia: Results of the 2014 online survey

Summary: To understand the trends associated with identity crime and misuse in Australia, the Australian Institute of Criminology (AIC) was, in 2014, commissioned by the Commonwealth Attorney-General's Department to undertake a national survey of the problem for the second time. The study is one of a series of initiatives being implemented as part of the National Identity Security Strategy, Australia's national response to enhancing identity security, which seeks to prevent identity crime and misuse, contribute to national security and facilitate the benefits of the digital economy.

Details: Canberra: Australian Institute of Criminology, 2015. 78p.

Source: Internet Resource: Research and Public Policy Series no.130: Accessed September 16, 2015 at: http://aic.gov.au/media_library/publications/rpp/130/rpp130.pdf

Year: 2015

Country: Australia

URL: http://aic.gov.au/media_library/publications/rpp/130/rpp130.pdf

Shelf Number: 136754

Keywords:
Identity Theft
National Security

Author: Queensland Organised Crime Commission of Inquiry

Title: Report

Summary: The Commission commenced on 1 May 2015, by Commissions of Inquiry Order (No. 1) 2015, to make inquiry into the extent and nature of organised crime in Queensland and its economic and societal impacts. The otherwise very broad nature of such an inquiry was somewhat narrowed by the Terms of Reference within the Order in Council, which focused the Commission on four key areas: - the major illicit drug and/or precursor markets - online child sex offending, including the child exploitation material market - financial crimes, primarily investment/financial market fraud and financial data theft - the relationship between organised crime and corruption in Queensland. The Commission was also required to investigate the extent to which organised crime groups use various enabling mechanisms or services: in particular, money laundering, cyber and technology-enabled crime, identity crime, professional facilitators, violence and extortion. In carrying out the Inquiry, the Commission was to examine the adequacy and appropriateness of current responses to organised crime by law enforcement, intelligence, and prosecution agencies, as well as the adequacy of legislation and of the resources available to such agencies. The six-month timeframe given for the Inquiry was limited, given the areas required to be examined.

Details: Sydney: The Commission, 2015. 578p.

Source: Internet Resource: Accessed March 30, 2016 at: https://www.organisedcrimeinquiry.qld.gov.au/__data/assets/pdf_file/0017/935/QOCCI15287-ORGANISED-CRIME-INQUIRY_Final_Report.pdf

Year: 2015

Country: Australia

URL: https://www.organisedcrimeinquiry.qld.gov.au/__data/assets/pdf_file/0017/935/QOCCI15287-ORGANISED-CRIME-INQUIRY_Final_Report.pdf

Shelf Number: 138491

Keywords:
Child Sexual Exploitation
Corruption
Cybercrime
Drug Markets
Drug Trafficking
Financial Crimes
Identity Theft
Money Laundering
Motorcycle Gangs
Organized Crime

Author: Rebovich, Donald J.

Title: The New Face of Identity Theft: An Analysis of Federal Case Data for the Years 2008 through 2013

Summary: The purpose of this study was to provide empirical evidence on which law enforcement can base enhanced proactive identity theft control and prevention efforts. It focuses on the increasing number of identity theft and fraud cases committed against individuals and organizations in the U.S. As a result of this study of closed United States Attorney Office identity theft/fraud cases (2008-2013), empirical data concerning the way in which criminals are adapting to law enforcement investigative methods by designing new means for committing such crimes are available to law enforcement agencies and corporate security and fraud investigators. The study is intended to serve as a follow-up to CIMIP's first study in this area published in October of 2007, Identity Fraud Trends and Patterns: Building a Data-Based Foundation for Proactive Enforcement (2007, Gordon, Rebovich, Choo and Gordon). One of the goals is to, where possible, compare results from this study with those of the 2007 study to assess the degree to which characteristics of identity fraud have remained consistent or have changed over time. The analysis will help enable law enforcement to move from a reactive posture to a proactive one. The purpose of this project is to provide law enforcement and policy makers with a proactive means of combating identity theft and fraud and enhancing the response to reports of victimization. The data for the study was collected from open source information available on United States Attorney Office identity theft prosecutions. Twenty four hundred and fifty two (2,452) offenders involved in 1,306 cases with an identity theft component, which were prosecuted between 2008 and 2013, were reviewed; data was analyzed on 1,395 convicted offenders (involved in 844 cases), as the other indicted offenders were excluded due to lack of conviction disposition.

Details: Utica, NY: Center for Identity Management and Information Protection, Utica College, 2015. 50p.

Source: Internet Resource: accessed April 22, 2016 at: https://www.utica.edu/academic/institutes/cimip/New_Face_of_Identity_Theft.pdf

Year: 2015

Country: United States

URL: https://www.utica.edu/academic/institutes/cimip/New_Face_of_Identity_Theft.pdf

Shelf Number: 138721

Keywords:
Fraud
Identity Theft

Author: Emami, Catherine

Title: Use and acceptance of biometric technologies among victims of identity crime and misuse in Australia

Summary: Biometric technologies make use of an individual's unique biological characteristics to identify them in their dealings with government and business. Common biometrics include fingerprints, iris recognition, voice pattern recognition and facial recognition, among others. There has been a considerable increase in the uptake of biometric technologies by a number of organisations in recent years, as society looks for ways to safeguard personal information from potential misuse. For instance, fingerprint scanning - once the mainstay of forensic policing - is increasingly used as a means of verifying the identity of mobile phone and tablet users. In 2014, the Australian Institute of Criminology conducted an online survey to gain a greater understanding of identity crime and misuse in Australia. The survey also asked a sample of Australian victims of identity crime about their experiences of, and willingness to use, biometric technologies. This paper presents the results of the research, which indicate generally high levels of previous exposure to biometrics. It also presents some unexpected findings concerning those willing to take up biometrics in the future.

Details: Canberra: Australian Institute of Criminology, 2016. 6p.

Source: Internet Resource: Trends & issues in crime and criminal justice no. 511: Accessed May 5, 2016 at: http://aic.gov.au/media_library/publications/tandi_pdf/tandi511.pdf

Year: 2016

Country: Australia

URL: http://aic.gov.au/media_library/publications/tandi_pdf/tandi511.pdf

Shelf Number: 138940

Keywords:
Biometrics
DNA Fingerprinting
Facial Recognition
Forensics
Identity Theft

Author: Mikhed, Vyacheslav

Title: Out of Sight, Out of Mind: Consumer Reaction to News on Data Breaches and Identity Theft

Summary: We use the 2012 South Carolina Department of Revenue data breach to study how data breaches and news coverage about them affect consumers' take-up of fraud protections. In this instance, we find that a remarkably large share of consumers who were directly affected by the breach acquired fraud protection services immediately after the breach. In contrast, the response of consumers who were not directly exposed to the breach, but who were exposed to news about it, was negligible. Even among consumers directly exposed to the data breach, the incremental effect of additional news about the breach was small. We conclude that, in this instance, consumers primarily responded to clear and direct evidence of their own exposure to a breach. In the absence of a clear indication of their direct exposure, consumers did not appear to revise their beliefs about future expected losses associated with data breaches.

Details: Philadelphia: Federal Research Bank of Philadelphia: 2015. 41p.

Source: Internet Resource: Working Paper No. 15-42: Accessed May 6, 2016 at: www.philadelphiafed.org

Year: 2015

Country: United States

URL: www.philadelphiafed.org

Shelf Number: 138959

Keywords:
Consumer Fraud
Consumer Protection
Identity Theft

Author: Blascak, Nathan

Title: Identity Theft as a Teachable Moment

Summary: This paper examines how a negative shock to the security of personal finances due to severe identity theft changes consumer credit behavior. Using a unique data set of linked consumer credit data and alerts indicating identity theft, we show that the immediate effects of fraud on consumers are typically negative, small, and transitory. After those immediate effects fade, identity theft victims experience persistent, positive changes in credit characteristics, including improved risk scores (indicating lower default risk). We argue that these changes are consistent with increased salience of credit file information to the consumer at the time of severe identity theft.

Details: Philadelphia: Research Department, Federal Reserve Bank of Philadelphia, 2016. 49p.

Source: Internet Resource: RB of Philadelphia Working Paper No. 16-27 : Accessed November 10, 2016 at: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2859366

Year: 2016

Country: United Kingdom

URL: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2859366

Shelf Number: 146277

Keywords:
Consumer Protection
Fraud
Identity Theft

Author: Australia. Attorney-General's Department

Title: Identity crime and misuse in Australia 2016

Summary: This is the third in a series of reports that seek to analyse the nature and extent of identity crime and misuse in Australia. These reports compile data from Commonwealth, state and territory agencies, as well as the private sector and other non-government sources. The Attorney-General’s Department leads the development of these reports as a key initiative of the National Identity Security Strategy. Cost of identity crime The annual cost of identity crime in Australia is $2.2b. This includes the direct and indirect losses incurred by government agencies and individuals; and the cost of identity crimes recorded by police. The costs of preventing and responding to identity crime are estimated to be a further $390m, bringing the total economic impact of identity crime in Australia to approximately $2.6b per year. These figures represent a revised estimate of the cost of identity crime in Australia to $2.2b compared to the estimate of $2b from the 2013–14 report. This is due to better availability of data and is not necessarily an indicator of change over the intervening time.

Details: Canberra: Attorney-General's Department, 2016. 91p.

Source: Internet Resource: Accessed December 6, 2016 at: https://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/Identity-crime-and-misuse-in-Australia-2016.pdf

Year: 2016

Country: Australia

URL: https://www.ag.gov.au/RightsAndProtections/IdentitySecurity/Documents/Identity-crime-and-misuse-in-Australia-2016.pdf

Shelf Number: 147922

Keywords:
Computer Crimes
Costs of Crime
Cybercrime
Financial Crimes
Fraud
Identity Theft

Author: Newman, Graeme R.

Title: Identity Theft

Summary: This guide addresses identity theft, describing the problem and reviewing factors that increase the risks of it. It then identifies a series of questions to help you analyze your local problem. Finally, it reviews responses to the problem, and what is known about them from evaluative research and police practice. The term identity fraud is sometimes used to include the whole range of identity theft related crimes (Economic Crime Institute 2003). Identity theft is a new crime, facilitated through established, underlying crimes such as forgery, counterfeiting, check and credit card fraud, computer fraud, impersonation, pickpocketing, and even terrorism. It became a federal crime in the United States in 1998, with the passage of the Identity Theft Assumption and Deterrence Act.1 This act identifies offenders as anyone who ...knowingly transfers or uses, without lawful authority, any name or number that may be used, alone or in conjunction with any other information, to identify a specific individual with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of Federal law, or that constitutes a felony under any applicable State or local law. A significant feature of identity theft is the offender's repeated victimization of a single person. This may include repeatedly using a stolen credit card, taking over a card account, or using stolen personal information to open new accounts. A victimization survey conducted by the Federal Trade Commission (FTC) found that 16 percent of victims whose credit cards were misused said the people responsible had also tried to "take over" the accounts by doing such things as changing the billing address or adding themselves to the card as an authorized user (Federal Trade Commission 2003a).[Full Text] Congressional hearings on identity theft in the 1990s revealed that police generally did not regard those whose identities had been stolen as the true victims, since the credit card companies took the financial loss. In addition, the companies typically did not report their losses to local police (or to anyone else, for that matter). Studies also showed that victims rarely reported the loss or theft of a card to the police, since they believed that the card company would cover the loss. However, because the repeated use of a victim's identity caused serious disruption and emotional damage, more victims began to report the offense. It is likely that your initial exposure to identity theft will be the request of a victim for a police report about the incident. Credit-reporting agencies now require that victims do so as part of the an "identity theft affidavit." that the victim submit a police report. Until recently, victims had a hard time getting such reports from the police. However, in response to growing media coverage and congressional testimony concerning identity theft, the International Association of Chiefs of Police (IACP) adopted a resolution in 2000 urging all police departments to provide incident reports and other assistance to identity theft victims. It is also possible that people you have stopped or questioned have given you a fake ID-or a legitimate ID acquired with a false or forged document. - WHEREAS, reports of identity theft to local law enforcement agencies are often handled with the response 'please contact your credit card company,' and often no official report is created or maintained, causing great difficulty in accounting for and tracing these crimes, and leaving the public with the impression their local police department does not care... RESOLVED, that the International Association of Chiefs of Police calls upon all law enforcement agencies in the United States to take more positive actions in recording all incidents of identity theft and referring the victims to the Federal Trade Commission..." (International Association of Chiefs of Police 2000). It is difficult, though not impossible, for local police to influence some important factors that contribute to identity theft. These concern the ways that businesses and government agencies manage clients' personal information (for example, the procedures your motor vehicle department uses to authenticate driver's license applications); and the policies and practices of financial institutions in dealing with fraud (for example, the ease with which they provide applicants with credit cards and convenience checks). That said, this guide will help you determine what you can do to prevent identity theft and help victims in your jurisdiction.

Details: Washington, DC: U.S. Department of Justice Office of Community Oriented Policing Services. 2--4. 78p.

Source: Internet Resource: Problem-Oriented Guides for Police Problem-Specific Guides Series No. 25: Accessed May 21, 2018 at: http://www.popcenter.org/problems/pdfs/Identity_Theft.pdf

Year: 2004

Country: United States

URL: http://www.popcenter.org/problems/pdfs/Identity_Theft.pdf

Shelf Number: 94153

Keywords:
Credit Card Theft
Fraud
Identity Theft

Author: Smith, Russell G.

Title: Identity crime and misuse in Australia: Results of the 2016 online survey

Summary: Identity crime involving misuse of personal information is arguably one of the most prevalent criminal activities in Australia, affecting individuals, businesses and government agencies alike. It is estimated that identity crime affects hundreds of thousands of Australians each year (AGD 2016). In April 2007, the Council of Australian Governments (COAG) agreed to the National Identity Security Strategy to protect the identities of Australians in a more regulated and efficient way. This arose out of emerging evidence at the time that large numbers of Australians experience misuse of their personal information for criminal purposes each year (Cuganesan & Lacey 2003; OAIC 2007). The strategy sought to enhance identification and verification processes throughout Australia and to develop other measures to combat identity crime, including the creation of a national Document Verification Service to verify the authenticity of identity credentials and the development of reliable, consistent and nationally interoperable biometric security measures for use in all jurisdictions (AGD 2012). The strategy also recognised the need to quantify the nature and extent of identity crime and misuse of personal information, particularly the victimisation experiences of Australians. It recommended the creation of an identity crime and misuse longitudinal measurement framework that could be used to measure the effectiveness of policy and practice throughout Australia. As part of the measurement framework, large-scale surveys have been conducted by the Australian Institute of Criminology (AIC) to determine respondents' experiences of victimisation-over their lifetime and during the preceding 12 months-and their perceptions of the risk of identity crime in the ensuing 12 months. This report presents the results of the latest identity crime and misuse survey, undertaken by the AIC in May 2016. It updates information obtained in earlier surveys, undertaken in 2013 and 2014, and provides an indication of how the identity crime and misuse of personal information environment has changed in Australia since 2013. Future surveys will continue to track not only changes in victimisation rates but also the economic impact of identity crime and misuse.

Details: Canberra: Australian Institute of Criminology, 2018. 111p.

Source: Internet Resource: Statistical Report 06: Accessed May 29, 2018 at: https://aic.gov.au/publications/sr/sr6

Year: 2018

Country: Australia

URL: https://aic.gov.au/publications/sr/sr6

Shelf Number: 159376

Keywords:
Crime Statistics
Fraud
Identity Theft
Victimization