StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Virtual ID Thieves: A Menace Difficult to Apprehend - Essay Example

Cite this document
Summary
This research is being carried out to explore the problem of Identity theft in the United States. It is found out that drugs especially the use of methamphetamine is the common denominator among the thieves. The Internet is also making identity theft a breeze…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Virtual ID Thieves: A Menace Difficult to Apprehend
Read Text Preview

Extract of sample "Virtual ID Thieves: A Menace Difficult to Apprehend"

Virtual ID Thieves: A Menace Difficult to Apprehend This paper explores the problem of Identity theft in the United States. It is found out that drugs especially the use of methamphetamine is the common denominator among the thieves. The Internet is also making identity theft a breeze. Financial institutions are also making credits fast and efficient. These are few elements that proliferated identity theft. It has become a problem in the United States with many unsuspecting individuals who were victimized by virtual thieves. The New York Times (http://query.nytimes.com, 2006) stressed the menace in “Technology and Easy Credit Give Identity Thieves an Edge”. It reported that in United States, according to a Federal Trade Commission survey in 2003, “about 10 million Americans -- 1 in 30 -- had their identities stolen in the previous year, with losses to the economy of $48 billion” (http://query.nytimes.com, 2006). As a means to safeguard identity from the identity thieves, Arizona officials ordered people to “shred all documents and avoid giving Social Security numbers or bank account numbers to strangers over the telephone or the Internet” (http://query.nytimes.com, 2006). And another way is to do credit freeze wherein it enables consumers to “prevent bank or credit agencies from issuing new accounts in their names” (http://query.nytimes.com, 2006). In a personal viewpoint, a win-win solution perhaps requires legislative measures that will enforce stricter cooperation among the consumers, finance sector, and law enforcement agencies. A way to safeguard one’s identity is to install PIN (Personal Identification Number). Anyone can get involved in this measure especially those who wanted to be ultra-secure in their identity and wealth. This could be done by adding the feature once a person will apply for credit and/ or debit card. In every purchase, the person will input the PIN and verify the fingerprint through a biometric device. This measure, in all its grandeur, can guarantee that the same person–who owns the card–made the purchase. This can also protect the identity by installing the PIN and fingerprint verification to Social Security ID card and even Driver’s license as well. Moreover, it can hasten purchases in only two steps by dialing in the PIN and by verifying the fingerprint. Its relative cost of additional security feature will be recouped by the money saved from being stolen. It can solve the problem but it has its limits–you can’t buy online unless if you can verify your fingerprint through the screen. Another way to safeguard one’s identity is to avail of protective services that are readily available to card-holders. Anyone who pays $220 a year can benefit from LifeLock. It can provide the subscriber with “fraud alert asking to confirm that the customer applied for credit” (http://query.nytimes.com, 2006). In this way, it can stop any purchases or credits that are made illegitimately or without the direct intent or consent by the customer. It can also notify both the banks and the company. It can solve the problem but it has its limits–still it will leave your identity vulnerable to theft for purposes other than purchases, mortgage and credits. It is also costly on the part of the card holder. Ultimately, the best way is for the government to implement the existing policies and to pass stricter policies that can curb identity theft. Production, technology and finance sector, law enforcement agencies and the consumers had to get involved and cooperate together in this aspect. The government can pass resolutions that can get the banking sector and consumer responsible altogether. It can amend its existing laws to be relevant to the changing environment. State departments should prevent intrusions on its files especially the Social Security number. State departments should supervise internet postings. It can also provide safeguards to the retirees’ pensions. And, it can also regularly conduct crackdowns to mail thefts. The law enforcement agencies of the state will see to it that the legislative resolution or measures are enforced and implemented strictly. It can also regularly conduct buy-bust operations to ward off methamphetamine which is associated to not only identity theft but also violent behaviors such as murder and robbery. Aside from arresting criminals in the streets, cops should also find ways to apprehend criminals in the web. There should also be new inventions which can do just that. The results and benefits will be long term. It can dramatically reduce incidence of identity theft, and hacking as well. It can successfully solve the problem–it will gradually lessen incidence through time. The corresponding penalties can make a thief uncomfortably scared. All in all, identity theft is a serious problem. It affects many people. It has many damaging effects to the economy too. It has stolen a huge amount of money from Americans. Those behind the identity theft are no different from the robbers who ply the streets at night. It deserved the attention of the government and the private sector. There should be measures to stop proliferation of this case. Some of the solutions can render consistent results. Installing PINs and fingerprint verification can provide secure transactions. It can guarantee that the same person–who owns the card–made the purchase. Protective services can confirm the transaction with the company and the customer. It can provide fraud alerts that can notify both the company and the bank. But these two solutions had inherent limitations. You cannot verify your fingerprint in buying online. And identity is still vulnerable with protective services because it is exclusive only to purchases and credits. Besides, it is costly for some families. The government has to intervene in this major issue. It has to hold the private and public sector responsible altogether. Cooperation, responsibility and involvement are crucial. Law enforcement agencies should crackdown the drug menace, mail theft and other crimes, either on the Web or in the streets. Through time, the visible presence of efforts to curb identity theft will lessen the incidence of identity theft. After all, it is the state’s duty to serve and protect citizens from situations like this. We can make it if we will cooperate, get involved and let our call be heard in the halls of our government corridors. There should be a way to stop identity theft now so that the World Wide Web will be much safer for the next generations. Work Cited Leland, J., & Zeller, Jr., T. (May 30, 2006). Technology and Easy Credit Give Identity Thieves an Edge. New York Times. Retrieved from http://query.nytimes.com/gst/fullpage.html?res=9F07E1DA1F3EF933A05756C0A9609C 8B63&scp=2&sq=technoligy%20and%20easy%20credit%20give%20identity%20thieves %20an%20edge&st=cse&pagewanted=1 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Virtual ID Thieves: A Menace Difficult to Apprehend Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1419861-problem-solution-essay
(Virtual ID Thieves: A Menace Difficult to Apprehend Essay)
https://studentshare.org/information-technology/1419861-problem-solution-essay.
“Virtual ID Thieves: A Menace Difficult to Apprehend Essay”, n.d. https://studentshare.org/information-technology/1419861-problem-solution-essay.
  • Cited: 0 times

CHECK THESE SAMPLES OF Virtual ID Thieves: A Menace Difficult to Apprehend

In the Majority of the Population There Are Stigmata Surrounding the Nature of a Biker

In this regard, their criminality is camouflaged, hence it becomes difficult to apprehend and completely eliminate this sub-culture.... It is difficult to pursue the criminal gangs because they are friendly like anybody else and they have a broad social and criminal network....
9 Pages (2250 words) Research Paper

DOES AUDIT REGULATION ENSURE AUDITOR INDEPENDANCE

Independence has been examined as “an intensely felt professional philosophy”.... It is supposed that part of the solution in deciphering… The Ethics Committee of the International Federation of Accountants has also highlighted the notion of independence as an ethical subject in its principles The objective of the present research is to define the UK auditor's independence in the regulation of audit, the scope of competences and responsibilities of various professionals, and to evaluate who and what can be the best practice in auditor independence....
40 Pages (10000 words) Essay

Forced Labor

With an annual turnover of $ 9.... billion, human trafficking involves sex slavery and forced labor of nearly 800,000 people annually from East Europe, Asia and Africa to West Europe, Middle East and the U.... .... Victims are recruited by coercion, bribery, deception or abduction.... hellip; and girls are forced into prostitution, men and boys into hard labor, children into sex slavery and revolutionary soldiering and babies into adoption....
24 Pages (6000 words) Essay

The Definition of Drug and Its Abuse

This essay declares that drugs menace and the increasing crimes are together wrecking havoc on our society.... This research paper deals with the definition of drug and its abuse.... It then talks about the reason for people getting attracted to this vice and leads to a discussion on the nature of relationship between crime and drugs abuse....
31 Pages (7750 words) Essay

Car Robbery Prevention in the Abu Dhabi Emirate

Each instance is very difficult to discover and prevent as the target cars, locations and escape routes The car robbers have also turned to highly sophisticated equipments in perpetrating the crime.... Despite these innovations, car thieves continually show adeptness in highly mechanized and electronic knowledge thus beating these security gadgets.... Due to the inexpensiveness and the popularity of such second-hand cars, this kind of car theft has not only provided another source of income for car thieves but also another motive for stealing cars....
59 Pages (14750 words) Essay

Youth Gangs Impact on Solutions to Gang Crime

In this regard, their criminality is camouflaged; hence it becomes difficult to apprehend and eliminate this sub-culture.... It is difficult to pursue criminal gangs because they are friendly, like anybody else, and have a broad social and criminal network.... The paper "Youth Gangs' Impact on Solutions to Gang Crime" discusses that a youth gang is a form of sub-culture associated with radicalism, especially in the American region....
8 Pages (2000 words) Assignment

Are the Customers' Aware if the Products They Purchase Are Genuine or a Counterfeit

The author of the paper investigates if the customers are aware of the products that they are purchasing is genuine or a counterfeit, if there is any positive effect of buying a counterfeit product, and if counterfeit brands affect the choice of purchasing genuine brands for the consumers.... hellip; Pushing—in essence, trade promotion—is potentially very expensive, because it cuts margins to the bone....
12 Pages (3000 words) Research Paper

Causes, Remedies, and Solutions to Road Rage

The author of this essay "Cases of Road Rage" describes famous cases of road rages, the difference between 'aggressive driving' and 'road rage'.... This paper also outlines the causes and results of road rage.... nbsp;… Many drivers, therefore, started mischievously driving off lanes and cutting others off in bids to beat the kilometers long jam....
10 Pages (2500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us