Identity Theft

Hardcover
from $0.00

Author: Sandra K. Hoffman

ISBN-10: 1598841432

ISBN-13: 9781598841435

Category: Computer Crime

What are the common forms of identity theft? Who are the most likely targets? What is law enforcement doing to counter a crime perpetrated not only by petty thieves and sophisticated con artists, but by terrorists, money-launderers, and those involved in human trafficking, drug trafficking, and illegal immigration? Identity Theft: A Reference Handbook examines these questions and more.\ With the 1998 Identity Theft and Assumption Deterrence Act as its starting point, this informative volume...

Search in google:

A comprehensive examination of different forms of identity theft and its economic impact, including profiles of perpetrators and victims and coverage of current trends, security implications, prevention efforts, and legislative actions.

Preface xi1 Background and History 1What Is Identity Theft? 1Personal Identity Theft 2Business Identity Theft 3The History of Identity Theft 5Jacob and Esau 6Cade's Rebellion of 1450 6Sarah Wilson in Colonial America 7Czar Nicholas II and His Family 8The Great Imposter 9The Most Misused Social Security Number in History 10The Chicago Debacle 11The First Documented Multinational Internet Bank Robbery 12An Early Case of Credit Card Fraud 13The First Internet Murder 15Who Are the Perpetrators? 16Opportunity Takers or Makers 17Gender 19Age 23Ethnicity 24Criminal History 25Country of Origin 26Affiliation with Other Crimes 27Affiliation with Other Criminals 27Who Are the Victims? 29Types of Identity Theft 29Geographical Location 31Age 32References 342 Problems, Controversies, and Solutions 41The Victims' Experiences 41Methods of Detection and Time Lapse 42Types of Identity Theft and the Restoration Period 44Effects on Relationships 46Emotional and Medical Concerns 47Financial Losses 49The Second Insult 49Sources and Methods Used by Perpetrators to Access Identities 51Trends and Special Issues 53Tax Fraud 54Medical Fraud 54Real Estate Loan Fraud 56Offshoring Identities 57Data Breaches 59The Hidden Costs of the Crime 62Solving the Identity Theft Problem 62Responsibility Theories 63Government Responses 64References 833 Worldwide Perspective 89Canada 89United Kingdom 100Mexico 107Russia 109South Africa 112Asia 113The Threat to International and Homeland Security 115References 1184 Chronology 1235 Biographical Sketches139(1948-) Abagnale, Frank, Jr. 140(1942-) U.S. Attorney General Ashcroft, John 140(1932-) U.S. Representative (R-Va.) Bliley, Thomas Jerome, Jr. 141(1955-) Cahfornia Secretary of State Bowen, Debra 142(1950-) State Senator (D-Calif.) Calderon, Charles 143(1958-) U.S. Senator (D-Wash.) Cantwell, Maria 143(1954-) Indiana Attorney General Carter, Steve 144(1950-) State Assembly (R-Calif.) Cogdill, David 145(1968-) State Senator (R-Va.) Cuccinelli, Ken 146(1933-) U.S. Senator (D-Calif.) Feinstein, Dianne 146Foley, Linda 147Frank, Marl 148Givens, Beth 149(1942-) U.S. Senator (R-Tex. Gramm, William Philip 149(1958-) Governor (D-Va.) Kaine, Timothy M. 150(1942-) U.S. Senator (R-Ariz.) Kyi, Jon 151(1942-) U.S. Representative (R-Iowa) Leach, James Albert Smith 151(1940-) U.S. Senator (D-Vt) Leahy, Patrick 152(1966-) Illinois Attorney General Madigan, Lisa 153May, Johnny 153(1958-) State Assemblyman (R-Calif.) Oiler, Thomas 154"B. J." Ostergren, Betty, 154(1954-) Governor (D-N.Y.) Paterson, David A. 155(1948-) Ohio Attorney General Petro, James 156(1949-) State Senator (R-Calif.) Poochigian, Charles 157(1953-) State Senator (D-Calif.) Simitian, Joe 157(1930-) U.S. Senator (R-Pa.) Specter, Arlen 158(1949-) State Assemblyman (D-Calif.) Torlakson, Tom 159(1946-) State Senator (R-Calif.) Wyland, Mark, 1606 Data and Documents 163Executive Summary Consumer Fraud and Identity Theft Complaint Data January-December 2008 163President's Identity Theft Task Force 165Identity Theft and Assumption Deterrence Act 173Title V of the Gramm-Leach-Bliley Act, 1999 1807 Directory of Organizations, Associations, and Agencies 1998 Resources 219Print Resources 219Books 219Journals and Magazines 224Pamphlets/Booklets 236Nonprint Resources 237Glossary 247Index 253About the Author 263

\ From the Publisher"This resource is highly recommended for al libraries and anyone seeking information about this growing problem and what is being done to prevent it in the future."\ -\ ARBA\ ". . . a welcome addition to academic and community library Criminology reference collections in general, and should be considered essential reading by anyone having to deal with identity theft or its threat in their own lives."\ -\ Midwest Book Review\ "Clearly and precisely written, this volume offers extremely helpful references at the end of chapters. A plethora of recent publications are devoted to this topic, but few are arranged as reference handbooks or are so easy to consult. This book will be useful in both academic and public libraries. Summing Up: Recommended. Lower-level undergraduates and above; general readers."\ -\ Choice\ \ \