We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byAlexia Mildred Powers
Modified over 2 years ago
eighteenseventyonelimited1© 2006 1871 Ltd Identity theft BCS North London Branch Stefan Fafinski and Emily Finch 28 November 2006
eighteenseventyonelimited2© 2006 1871 Ltd Agenda What is identity theft? –What is identity? Strategies of adaptation and diversification –The role of organised crime –Sources of information –A very personal harm The transformative nature of new technology The legal response Conclusions
eighteenseventyonelimited3© 2006 1871 Ltd What is identity theft?
eighteenseventyonelimited4© 2006 1871 Ltd What is identity? Personal identity Social identity Legal identity
eighteenseventyonelimited5© 2006 1871 Ltd Personal identity –Internalised view –‘I am …’ –‘What most of us think of when we think of the deepest and most ensuring features of our unique selves that constitute who we believe ourselves to be’ (Williams, 2001)
eighteenseventyonelimited6© 2006 1871 Ltd Social identity –Externalised view –‘How do you see me?’ –Multiple social identities –A necessary convenience to facilitate social interaction (Jung, 1988)
eighteenseventyonelimited7© 2006 1871 Ltd Legal identity –Accumulation of social facts –Established at birth and expands throughout life –Details can be added but not removed –About identifiability rather than identity ‘Who is this person?’ ‘Is this the same person?’
eighteenseventyonelimited8© 2006 1871 Ltd Classifications of identity PersonalBorn the illegitimate son of a Polish immigrant and a one-legged telephonist… SocialLawyer Reading FC bigot Donkey sanctuary chairman LegalNI number: ZR 76 23 18 C NHS number: 403217987 Driving licence: FAFIN etc.
eighteenseventyonelimited9© 2006 1871 Ltd Chronology of legal identity Birth certificate: name, place, date, parents Health records Education NI; Employment Financial records Marriage Credit history Mortgage Children Criminal record Professional qualifications Death
eighteenseventyonelimited10© 2006 1871 Ltd What is identity theft? Not a legal term –Identity theft will only be criminal if the fraudster’s conduct falls within the boundaries of the criminal law Liability depends what is done in the new identity –Around 150 common law and statutory deception offences Socially – synonymous with financial fraud Initial acquisition of identity Unlawful act using that identity How should it be conceptualised? –Appropriation of another’s identity (living or dead) irrespective of purpose or motivation
eighteenseventyonelimited11© 2006 1871 Ltd What does it mean for identity to be stolen? Media construction of identity theft creates a misapprehension that it is a two-stage process: –Assumption of identity of another –Commission of a substantive offence using that identity, generally financial fraud Identity theft has come to be synonymous with credit card fraud
eighteenseventyonelimited12© 2006 1871 Ltd Strategies of adaptation and diversification
eighteenseventyonelimited13© 2006 1871 Ltd Fraudsters’ responses to change With the advent of new developments to prevent fraud, fraudsters desist, adapt or diversify: –Cheques –Cheque guarantee cards –Credit cards –Switch and electronic transactions –Chip and PIN
eighteenseventyonelimited14© 2006 1871 Ltd Fraudsters’ response to Chip and PIN Desist –None of the fraudsters interviewed in the 2-year study planned to stop Adapt –Stolen cards abroad –Distance transactions –Buy cards only with PIN numbers Diversify –Steal identity and obtain fresh cards
eighteenseventyonelimited15© 2006 1871 Ltd An incomplete picture of the problem Other criminal purposes –Harassment –Bullying –Sham marriages –Driving offences Non-criminal purposes –Multiple relationships –Acceptable use of alternate identity
eighteenseventyonelimited16© 2006 1871 Ltd A ‘spare’ identity for motoring purposes 1,400 fraudulent driving licence applications detected by the DVLA (2001) Over 3,000 driving tests stopped due to doubts over driver’s identity (2001) Somali bus driver took 200 bogus driving tests (Daily Mail, 26 th September 2006)
eighteenseventyonelimited17© 2006 1871 Ltd Psychological suicide 210,000 adults go missing in UK every year, many never return 2 men vanish every day Fake suicide provides opportunity for fresh start
eighteenseventyonelimited18© 2006 1871 Ltd Cleaning a deviant identity Invisible man fakes death in Paddington rail crash (The Times, 6 th February 2000)
eighteenseventyonelimited19© 2006 1871 Ltd Creating a more favourable persona The Earl of Buckingham –Impostor took name of deceased child ‘Christopher Edward Buckingham’ –Adopted title last used in 1689 –Imprisoned under assumed name as impossible to establish ‘real’ identity
eighteenseventyonelimited20© 2006 1871 Ltd Creating a more favourable persona ‘Sir Alan Mcilwraite KBE DSO MC’ modified own identity Added progressively more honour and outlandish detail Fabricated substantiating evidence Worked in a Dell call centre
eighteenseventyonelimited21© 2006 1871 Ltd The role of organised crime Four distinct ‘organised’ typologies –Highly-organised, structured and hierarchical systems –Semi-structured networks of fraudsters operating co-operatively –Small organisations with a simple power delineation –Small self-contained operations that typically involve between one and four individuals Plus –Freelance experts Including ‘identity brokers’
eighteenseventyonelimited22© 2006 1871 Ltd Sources of information ‘Obvious’ sources –Electoral roll, Companies House, Land Registry Online sources –Chat rooms –Professional bodies –Social networking sites –Online auction sites –Email (impersonating target) Offline sources –Conversation with target –Conversation purporting to be target –Office paperwork and personnel files –Collaboration with holders of information
eighteenseventyonelimited23© 2006 1871 Ltd A very personal harm Individual victims –Fear arising from uncertainty as to how victimisation arose; where was the weak link? –Reluctance to use cards for payment or to disclose personal information –Sense of violation and loss of reputation Deceased children or relative –Sullies memory and reopens old wounds –“We don’t know who our daughter would have been but it wouldn’t have been this woman” Seen as far more worrying than financial loss
eighteenseventyonelimited24© 2006 1871 Ltd The transformative nature of new technology
eighteenseventyonelimited25© 2006 1871 Ltd Transformative nature of technology Transformative nature of new technology –More opportunities for ‘traditional’ crime –New opportunities for ‘traditional’ crime –Opportunities for new crimes ‘True’ cybercrimes Solely the product of the Internet Classification by type (COE Convention on Cybercrime 2001) –Harmful trespass –Acquisition, theft and deception –Obscenity –Violence
eighteenseventyonelimited26© 2006 1871 Ltd Cybercrimes transformed Harmful trespass Acquisition, theft and deception ObscenityViolence More opportunities for traditional crime Phreaking Pyramid schemes Trading sexual materials Stalking Harassment Bullying New opportunities for traditional crime Hacking Viruses 419 fraud Identity theft Online sex trade General hate speech Paedophile rings Opportunities for new crimes Spam Denial of service Intellectual property piracy E-auction scams Cybersex Cyberpimps Online grooming Targeted hate speech
eighteenseventyonelimited27© 2006 1871 Ltd The legal response
eighteenseventyonelimited28© 2006 1871 Ltd What is the law? Legislation with direct impact on cybercrime –Computer Misuse Act 1990 (as amended) –Data Protection Act 1998 –Privacy and Electronic Communications Regulations 2003 –Regulation of Investigatory Powers Act 2000 –Terrorism Act 2000 –Electronic Communications Act 2000 –Anti-terrorism Crime and Security Act 2001
eighteenseventyonelimited29© 2006 1871 Ltd Legislation with indirect impact Theft Act 1968, 1978 –Obtaining property by deception (s.15) –Obtaining a money transfer by deception (s.15A) But cannot deceive a machine Davies v. Flackett (1973), DC; Holmes (2004), CA –Blackmail (s.21) –Theft (s.1) But ‘identity’ does not amount to ‘property’ –No such offence as ‘identity theft’ –Currently no such offence as ‘fraud’
eighteenseventyonelimited30© 2006 1871 Ltd The recent legal response Identity Cards Act 2006, section 25 –Possession of false identity document with intention to establish, ascertain or verify registrable facts Fraud Act 2006 –Royal Assent 8 November 2006 but relevant provisions not yet in force –Fraud by false representation (section 2) –Fraud by failing to disclose information (section 3) –Fraud by abuse of position (section 4) –Obtaining services dishonestly (section 11) –Possessing (section 6) or making or supplying articles (section 7) for use in frauds Computer Misuse Act 1990 –as amended by Police and Justice Act 2006 – Royal Assent 8 November 2006 –Unauthorised access with intent to facilitate commission of a further offence (section 2) –Unauthorised access with intent to impair operation (new section 3)
eighteenseventyonelimited31© 2006 1871 Ltd How effective is the law? The short arm of the law –No proprietary rights in personhood –Transjurisdictional nature of the Internet Concerted international effort against cybercrime and malware not forthcoming –Difficulty in obtaining admissible evidence Forensic computing/Computer forensics has developed outside the main traditions of forensic science Issues of disclosure, testing, repeatability have been neglected – or not applied uniformly –Lack of specialist knowledge Victim, police, judge and jury Inaccessibility of expert evidence –Victims reluctant to come forward Crime goes unreported – ‘dark figure’ of cybercrime
eighteenseventyonelimited32© 2006 1871 Ltd How effective is the law? The law is –Slow-moving –Reactive –Fragmented –Uncertain –Underused –Often likely to fail on evidential grounds –Applicable only to England and Wales!
eighteenseventyonelimited33© 2006 1871 Ltd Conclusions
eighteenseventyonelimited34© 2006 1871 Ltd Conclusions Problem is unquantifiable in absolute terms –All trends suggest that reported instances (and thus financial impact) are growing –More quantitative research is needed Evidence to suggest move to more organised criminal activity –Although much ID theft is still committed by the low-level opportunist Criminals use ‘non obvious’ information to build up identity portfolio Potential financial gain from all facets of one identity can be great Harm is more that just financial – a very personal harm Law is changing, but its effects remain to be seen
eighteenseventyonelimited35© 2006 1871 Ltd Identity theft BCS North London Branch Stefan Fafinski and Emily Finch 28 November 2006
Protecting Yourself from Fraud including Identity Theft Advanced Level.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
By Andy Scott, Michael Murray and Adam Kanopa
LITHUANIAN CRIMINAL POLICE BUREAU Crimes in Cyberspace – Relevant Issues and Investigation Challenges ID Thefts – Issues, Legal Regulation, International.
Legal Considerations Members in Practice (MIP) Members in Business (MIB)
Lesson 2- Protecting Yourself Online. Determine the strength of passwords Evaluate online threats Protect against malware/hacking Protect against identity.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
Issues for Computer Users, Electronic Devices, Computer and Safety.
FINANCIAL ELDER ABUSE IN REAL ESTATE TRANSACTIONS September, 2012 By: Kelly L. Greenwood Burchells LLP Barristers & Solicitors.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS Objective 6.03 Understand cyber law BB30 Business Law 6.03Summer 2013.
By Renata Jaruseviciute 1 ©Renata Jaruseviciute. Financial Crime definition & types Regulatory body Legislation Questions to be asked yourself.
Scams & Schemes Common Sense Media.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Introduction and Overview of Digital Crime and Digital Terrorism
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Cyber laws and white collar CRIME, a ura perspective ; is uganda ready for the challenge? BY The Commissioner tax investigations department UGANDA REVENUE.
BTT12OI. Do you know someone who has been scammed online? What happened? Been tricked into sending someone else money (not who they thought they were)
BTT12OI. Do you know someone who has been scammed? What happened? Been tricked into sending someone else money (not who they thought they were)
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Welcome to Unit Nine CJ230 Identity Theft Prof. Hulvat.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Identity theft By: Blake D uncan.
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
It’s a Computer, M’Lud! Neil Barrett. Introduction The law and computers The law and computers The nature of computer evidence The nature of computer.
CRIMINAL LAW 1. Ahmed T. Ghandour.. CRIMES OF POWERFUL.
Crime & Malpractice AS Module Heathcote Ch. 10.
Computer Crime and CyberCrime Why we need Computer Forensics.
Computer Security Fundamentals by Chuck Easttom Chapter 3 Cyber Stalking, Fraud, and Abuse.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org
An Introduction to Computer Crimes. Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
© 2017 SlidePlayer.com Inc. All rights reserved.