Abstract
There is an axiom in criminology that not long after an important technological innovation emerges there will be persons or groups who figure out illegal methods to exploit the new development. Authorities respond to such situations by establishing new control measures that are then countered by further tactics of depredation. Recent history regarding identity theft provides illustrations of this process. ATM machines, for instance, have made it easier for persons to access bank funds worldwide at any time of day or night. But they have encouraged criminals to locate out-of-the way ATMs and to hold up and rob persons soon after they draw cash from the machine. Thieves also at gunpoint have made individuals access their ATM accounts and then commandeered the funds withdrawn. The ATM operators responded by photographing customers, but thieves learned to stay out of the sight of the camera or to get youngsters to do their dirty work.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Abagnale, F.W. and Redding, S. (1980). Catch Me If You Can: The True Story of a Real Fake. New York: Grosset & Dunlap.
Acoca, B. (2008). Scoping Paper on Online Identity Theft. OECD, Seoul, Korea: Ministry of Justice. Available on http://www.oecd.org/sti/40644196.pdf.
Allison, S.F.L., Schuck, A.M. and Lersch, K.M. (2005). Exploring the Crime of Identity Theft: Prevalence, Clearance Rates and Victim/Offender Characteristics.. Journal of Criminal Justice, 33, 19–29.
Anderson, K. (2006). Who Are the Victims of Identity Theft? The Effects of Demographics.. Journal of Public Policy & Marketing, 25, 160–171.
Anderson, K.B., Durbin, E. and Salinger, A.M. (2008). Identity Theft.. Journal of Economic Perspectives, 22, 171–192.
Archer, N., Sproule, S. and Yuan, Y. (2012). Identity Theft and Fraud: Evaluating and Managing Risk. Ottawa: University of Ottawa Press.
Associated Press (2011). Irish Expel Russian Envoy Over ID Theft for Spying. New York Times, 1 February.
Australian Crime Commission (2008). Identity Fraud. Canberra, Australia: Commission.
Benedict, R. (1946). The Chrysanthemum and the Sword: Patterns of Japanese Culture. Rutland, VT: Charles E. Tuttle.
Bureau of Justice Statistics (2006). Identity Theft, 2004. Washington, DC: U.S. Government Printing Office.
Claypole, T. and Payton, T. (2012). Protecting Your Internet Identity: Are You Naked Online? Lanham, MD: Rowman & Littlefield.
Cohen, S. (1972). Folk Devils and Moral Panics: The Creation of the Mods and Rockers. Oxford, UK: MacGibbon and Kee.
Cole, S. and Pontell, H.N. (2006). Don’t Be Low-Hanging Fruit: Identity Theft as Moral Panic, in Monahan, T. (ed.) Surveillance and Security: Technological Problems and Power in Everyday Life. London: Routledge. pp. 125–147.
Copes, H. and Hochstetler, A. (2010). Interviewing the Incarcerated: Pitfalls and Promises, in Bernasco, W. (ed.) Offenders on Offending: Learning About Crime from Criminals. London: Willan. pp. 49–67.
Copes, H., Kurley, K., Kane, J. and Huff, R. (2010). An Exploratory Study of Identity Theft Using a National Victimization Study.. Journal of Criminal Justice, 38, 1045–1052.
Copes, H. and Vieraitis, L.M. (2009a). Bounded Rationality of Identity Thieves: Using Offender-Based Research to Inform Policy. Criminology & Public Policy, 8, 237–262.
Copes, H. and Vieraitis, L.M. (2009b). Understanding Identity Theft: Offenders’ Accounts of Their Lives and Crimes.. Criminal Justice Review, 34, 329–349.
Copes, H. and Vieraitis, L.M. (2012). Identity Thieves: Motives and Methods. Boston: Northeastern University Press.
Craats, Rennay (2005). Identity Theft: The Scary New Crime that Threatens All of Us. To ronto, ON: Altitude Publishers.
Darrow, J.J. and Lichtenstein, S.D. (2008). Do You Really Need My Social Security Number?: Data Collection Practices in the Digital Age.. North Carolina Journal of Law and Technology, 10, 1–58.
Earley, P. and Shur, G. (2002). WITSEC: Inside the Federal Witness Protection Program. New York: Bantam Books.
Economist (2012, 11 August). China Is Taking Over the Fake ID Business. Economist, 11 August.
Elgie, N. (2008). The Identity Theft Cat-and-Mouse Game: An Examination of the State and Federal Government’s Latest Maneuvers.. I/S: A Journal of Law and Policy for the Information Society, 4, 616–655.
Emery, S. (2012). Police Seek Help in Identifying Suspects in ID-Theft Case. Orange County Register, 1 September, Local 12.
Farrell, L. (2011). A Step in the Right Direction: Debit Card Interchange Fees in the Durbin Amendment.. Lewis & Clark Law Review, 15, 1078–1106.
Gardiner, B. (2010). How Anyone Can Fake an ATM and Steal Your Money. Gozando, 2 December.
Goode, E. and Ben-Yehuda, N. (1994). Moral Panics: The Social Construction of Deviance. Oxford, UK: Blackwell.
Goran, S. (2008, 21 October). Identity Theft Twice as Likely in English-Speaking Countries. Available on http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aqW3VvyTgO30
Greenberg, J. (2009). I Never Promised You a Rose Garden. New York: Henry Holt.
Hagan, J. (2010). Who Are the Criminals? The Politics of Crime Control in the Age of Roosevelt and the Age of Reagan. Princeton, NJ: Princeton University Press.
Hirsch, R. (2012). Identity Theft Continues to Top FTC’s List of Consumer Complaints. National Law Review, 16 (21 May), 13.
Hoffman, S.K. and McGinley, T.G. (2008). Identity Theft: A Reference Handbook. Santa Barbara, CA: ABC-Clio.
Holden, S. (2011). A ‘Who Is It?’ More Than a Whodunit. New York Times, 14 July.
Howard, H.M. (2005). The Negligent Enablement of Imposter: A Common-Sense Common Law Claim.. Duke Law Journal, 54, 1263–1294.
Jackson, J.E. (1994). Fraud Masters: Professional Credit Card Offenders and Crime.. Criminal Justice Review, 19, 24–55.
Langton, L. (2011). Identity Thefts Reported by Households, 2005–2010. Washington, DC: Bureau of Justice Statistics, U.S. Government Printing Office.
Marron, D. (2008). Altering Reality: Governing the Risk of Identity Theft.. British Journal of Criminology, 48, 20–38.
Martinez, J.A., Rutledge, P.C. and Sher, K.J. (2007). Fake ID Ownership and Heavy Drinking in Undergraduate College Students.. Psychology of Adolescent Behavior, 21, 226–232.
Mayer, R.N. (2006). Defending Your Financial Privacy: The Benefits and Limits of Self-Help Research Paper 2006–06. Washington, DC: AARP Public Policy Institute.
McKelvey, B.R. (2001). Financial Institution’s Duty of Confidentiality to Keep Customers’ Personal Information from the Threat of Identity Theft.. UC Davis Law Review, 54, 1077–1126.
McNally, M. and Newman, G.R. (eds.) (2008). Perspectives on Identity Theft. Monsey, NY: Criminal Justice Press.
Pastrikos, C. (2004). Identity Theft Statutes: Which Will Protect Americans the Most?. Albany Law Review, 67, 1137–1157.
Patrick v. Union State Bank (1995). 681 So. 2d 1364 (Alabama).
Pontell, H.N. (2009). Identity Theft: Bounded Rationality, Research, and Policy.. Criminology & Public Policy, 8, 263–270.
Pontell, H.N., Brown, G.C. and Tosouni, A. (2008). Stolen Identities: A Victim Survey, in McNally, M.M. and Newman, G.R. (eds.). Perspectives on Identity Theft. Monsey, NY: Criminal Justice Press. pp. 57–85.
Rasmussen, D. (2012). Teens Take a Risk When They Order Fake IDs from China. Arizona Republic, 20 June.
Sovern, J. (2004). Stopping Identity Theft.. Journal of Consumer Affairs, 38, 233–243.
Spalek, B. (2006). Crime Victims: Theory, Policy and Practice. Hampshire, U.K.: Palgrave Macmillan.
Stephan, M.J., Pennington, S., Krishnamurthi, G. and Reidy, J. (2009). Identity Burglary.. Texas Review of Law & Politics, 13, 401–417.
Sullins, Lauren L. (2006). ‘Phishing’ for a Solution: Domestic and International Approaches to Decreasing Online Identity Theft.. Emory International Law Review, 20, 397–433.
United States v. Hill (2012). No.11-2313 (7th Circuit).
White, A.E. (2005). The Recognition of a Negligence Cause of Action for Victims of Identity Theft: Someone Stole My Identity, Now Who Is Going to Pay for It?. Marquette Law Review, 88, 847–866.
Whitely, E.A. and Hosein, G. (2010). Global Challenges for Identity Policies. London: Palgrave Macmillan.
Wright, R.T. and Decker, S.H. (1994). Burglars on the Job: Street Life and Residential Break-Ins. Boston: Northeastern University Press.
Wright, R.T. and Decker, S.H. (1997). Armed Robbers in Action: Stickups and Street Culture. Boston: Northeastern University Press.
Yoshida, T. (2009). The ‘Hey-It’s-Me’ Scam Is Not the Only Way, Symantec. Available on http://www.symantec.com/connect/blogs/hey-it-s-me-scam-not-only-way.
Zietz, D. (1981). Women Who Embezzle or Defraud: A Study of Convicted Felons. New York: Praeger.
Editor information
Editors and Affiliations
Copyright information
© 2014 Henry N. Pontell and Gilbert Geis
About this chapter
Cite this chapter
Pontell, H.N., Geis, G. (2014). Identity Theft. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-67284-4_14
Download citation
DOI: https://doi.org/10.1007/978-1-349-67284-4_14
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-67286-8
Online ISBN: 978-1-349-67284-4
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)