‘Juice jacking’ plus music gift cards
Read Time: 6 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Many say that identity theft is unavoidable, undetectable, and unstoppable. But fraud examiners can use their skills to fight this ubiquitous crime.
Sam and Cindy were looking for a home healthcare worker to help them with their son who had physical disabilities. Sam, an experienced fraud investigator, did his research and hired Simon through a supposedly reputable service. Despite his best efforts, however, the couple opened the door to an "identity predator."
A few months after Simon began working at Sam and Cindy's home, creditors began calling the couple to demand that their son pay for past due auto and insurance payments. One day Simon didn't report for work. An insurance investigator then told Sam and Cindy that Simon was not only working under an alias but he had a long history of seeking employment that would give him access to personal records that he could use to steal identities.
Fortunately, Sam and Cindy didn't have to pay for the $23,000 car loan but they did have to spend hours preparing affidavits and explaining to creditors that their son's identity had been snatched. And their frustrations mounted when local law enforcement told them they wouldn't pursue the case because the home healthcare worker had purchased the car and insurance in another state. Meanwhile, "Simon" had slipped away to undoubtedly find some fresh victims.
Identity theft is often at the top of media reports and is always a hot subject for public forums. The characterizations of identity theft as "unavoidable," "undetectable," and "unstoppable," by government and law enforcement officials send chills down the backs of those who investigate and try to prevent this rampant crime. But as fraud examiners, we should know the latest on this ubiquitous crime so we can use our skills to fight it.
Scope of the Problem
Although there are steps that can be taken to minimize the risk of becoming the victim of identity theft, the Federal Trade Commission (FTC) has reported that one out of eight victims who call the commission's identity theft hotline report that they have been victimized by someone they know - either a family member, a neighbor or workplace acquaintance, a person employed by a financial institution with which they do business, or someone else they know.1
An identity thief needs the valuable possession of a potential victim - a social security number (SSN). The SSN opens up a whole world of nefarious opportunities for the identity thief. The Social Security Administration's Fraud Hotline received 16,375 calls from Oct. 10, 1997 through March 31, 1999. Of those calls, the Office of the Inspector General estimated that 13,345 (81.5 percent) involved identity theft.2 According to the analysis, the elderly aren't necessarily targeted; victims from the ages of 20 to 49 had the greatest frequency of occurrence. Some of the other categories of fraud related to identity theft listed by the analysis are summarized in the chart below:
| Complaint Types | Complaints |
| Obtaining credit cards | 3,152 |
| Obtaining work documents, licenses | 2,825 |
| Obtaining telephone and other services | 2,047 |
| Obtaining benefits, worker's compensation, unemployment, welfare, and income tax refunds | 1,228 |
| Opening bank accounts with stolen SSNs | 1,187 |
| Creating multiple identities | 696 |
| Using bogus SSN to avoid paying child support payments |
286 |
The Federal Trade Commission (FTC) is probably the most reliable source for identity fraud statistics. The FTC is compiling a centralized database, known as the Data Clearinghouse, for all federal, state, and local agencies as well as credit-reporting agencies and the general public. The most recent data publicly available covers the period from November 1999 through June 2001. Following3 are the available statistical categories (figures are displayed on pages 33 and 39):
The FTC reports 69,370 victims from November 1999 through June 2001. More than 30,000 victims reported that most of the offenses involved credit card fraud. The FTC data showed that the average age of an identity theft victim was 30, while the average age of consumers reporting complaints was 40 years of age.4 (Table 1)
Table 1
|
Consumer's age
|
Percentage of total complainants
|
|
65 and over
|
6.3
|
|
60-64
|
3.3
|
|
50-59
|
12.4
|
|
40-49
|
21.4
|
|
30-39
|
28.4
|
|
18-29
|
26.5
|
|
Under 18
|
1.7
|
|
Total
|
100.0
|
The largest number of complaints came from California, New York, Texas, and Florida, in that order. Cities with the largest number of complaints were New York City, Chicago, and Los Angeles, in that order. About 68 percent of the complaints to the FTC's Identify Theft hotline identified suspect information. The largest number of suspects came from New York City, Chicago, Miami and Detroit, in that order.
The FTC reported that 21 percent had a personal relationship with the suspect (Table 2).
Table 2
| Type of Relationship | Percentage |
| Family Member | 9.6 |
| Roommate/Co-Inhabitant | 2.4 |
| Neighbor | 1.3 |
| Workplace Coworker/Employer/Employee | 1.8 |
| Otherwise known | 5.6 |
| TOTAL | 20.7 |
Converse of this is that in the vast majority of cases - 79.3 percent of those reported - the victims didn't know the suspects. The average time span between the date of the identity theft and the date the victim realized that he or she had been robbed was 12 months.5
Identity Fraud Methods
From the Internet
The FTC has noted a rapid rise in the number of consumer complaints related to online fraud and deception. In 1997, the commission received fewer than 1,000 Internet fraud complaints; a year later, the number had increased eight-fold. In 2000, more than 25,000 complaints - roughly 26 percent of all fraud complaints logged into the FTC's complaint database, Consumer Sentinel, by various organizations that year - were related to online fraud and deception. Following are the various ways thieves are using the Internet:
In FTC v. Carlos Pereira d/b/a atariz.com, the defendants allegedly made unauthorized copies of 25 million pages from other Web sites, including those of Paine Webber and the Harvard Law Review.6 They would make just one change - hidden from view - on each copied page and insert a command that would redirect an unsuspecting surfer to another Web site that contained sexually explicit, adult-oriented material. Once at the adult site the defendants "mouse-trapped" consumers by incapacitating their Internet browser's "back" and "close" buttons. Instead of exiting, they'd be sent to additional adult sites in an endless loop.
Through the use of fleeting Web sites, falsified domain name registrations, and false names, cyber fraudsters victimize scores of users in a short time and leave no trace of their true existences.
Internet fraudsters also use "pretexting," or "social engineering," which includes impersonation of legitimate individuals from government agencies, law enforcement groups, charitable organizations, and businesses (such as banks) to obtain confidential information from individuals.
Next issue: More identity theft methods, federal laws, and ways to combat the problem.
John Langione, CFE, CIA, is a senior manager with Ernst & Young's New York office. Dr. Craig Ehlen, CFE, CPA, is professor of accounting at the University of Southern Indiana. Dr. Robert E. Holtfreter is Distinguished Professor of Accounting & Research at Central Washington University. Dr. Thomas Buckhoff, CFE, CPA, is EideBailly Professor of Forensic Accounting at North Dakota State University. Amy Southwood recently received her master's of science in accountancy.
Appendix
Methods to Protect Private Information
Methods to Secure Mail
Methods to Check and Secure Accounts
Identity Theft Web Sites
Following are some good sources of identity theft information:
www.consumer.gov/idtheft/
www.ustreas.gov/enforcement/nsit.html#Panel 2
www.clarkhoward.com/library/tips/identity_theft.html
Endnotes
1 Prepared statement of the Federal Trade Commission on "Internet Fraud" before the subcommittee on commerce, trade, and consumer protection of the committee on energy and commerce, United States House of Representatives, Washington, D.C., May 23, 2001 by Eileen Harrington, associate director of the Division of Marketing Practices in the FTC's Bureau of Consumer Protection.
2 Analysis of Social Security Number misuse allegations made to the Social Security Administration's Fraud Hotline - August 1999, A-15-99-92019 - Management Advisory Report from the Office of the Inspector General.
3 Federal Trade Commission, "Identity Theft Victim Complaint Data," October 2001.
4 FTC theft complaint data - "Figures and Trends on Identity Theft - November 1999 through June 2001."
5 FTC theft complaint data - "Figures and Trends on Identity Theft - November 1999 through June 2001."
6 FTC v. Carlos Pereira d/b/a atariz.com.
Unlock full access to Fraud Magazine and explore in-depth articles on the latest trends in fraud prevention and detection.
Read Time: 6 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 6 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 5 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 6 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 6 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE
Read Time: 5 mins
Written By:
Robert E. Holtfreter, Ph.D., CFE