Skip to main content

Identity Theft

  • Chapter
The Handbook of Security
  • 1625 Accesses

Abstract

There is an axiom in criminology that not long after an important technological innovation emerges there will be persons or groups who figure out illegal methods to exploit the new development. Authorities respond to such situations by establishing new control measures that are then countered by further tactics of depredation. Recent history regarding identity theft provides illustrations of this process. ATM machines, for instance, have made it easier for persons to access bank funds worldwide at any time of day or night. But they have encouraged criminals to locate out-of-the way ATMs and to hold up and rob persons soon after they draw cash from the machine. Thieves also at gunpoint have made individuals access their ATM accounts and then commandeered the funds withdrawn. The ATM operators responded by photographing customers, but thieves learned to stay out of the sight of the camera or to get youngsters to do their dirty work.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Abagnale, F.W. and Redding, S. (1980). Catch Me If You Can: The True Story of a Real Fake. New York: Grosset & Dunlap.

    Google Scholar 

  • Acoca, B. (2008). Scoping Paper on Online Identity Theft. OECD, Seoul, Korea: Ministry of Justice. Available on http://www.oecd.org/sti/40644196.pdf.

    Google Scholar 

  • Allison, S.F.L., Schuck, A.M. and Lersch, K.M. (2005). Exploring the Crime of Identity Theft: Prevalence, Clearance Rates and Victim/Offender Characteristics.. Journal of Criminal Justice, 33, 19–29.

    Article  Google Scholar 

  • Anderson, K. (2006). Who Are the Victims of Identity Theft? The Effects of Demographics.. Journal of Public Policy & Marketing, 25, 160–171.

    Article  Google Scholar 

  • Anderson, K.B., Durbin, E. and Salinger, A.M. (2008). Identity Theft.. Journal of Economic Perspectives, 22, 171–192.

    Article  Google Scholar 

  • Archer, N., Sproule, S. and Yuan, Y. (2012). Identity Theft and Fraud: Evaluating and Managing Risk. Ottawa: University of Ottawa Press.

    Google Scholar 

  • Associated Press (2011). Irish Expel Russian Envoy Over ID Theft for Spying. New York Times, 1 February.

    Google Scholar 

  • Australian Crime Commission (2008). Identity Fraud. Canberra, Australia: Commission.

    Google Scholar 

  • Benedict, R. (1946). The Chrysanthemum and the Sword: Patterns of Japanese Culture. Rutland, VT: Charles E. Tuttle.

    Google Scholar 

  • Bureau of Justice Statistics (2006). Identity Theft, 2004. Washington, DC: U.S. Government Printing Office.

    Google Scholar 

  • Claypole, T. and Payton, T. (2012). Protecting Your Internet Identity: Are You Naked Online? Lanham, MD: Rowman & Littlefield.

    Google Scholar 

  • Cohen, S. (1972). Folk Devils and Moral Panics: The Creation of the Mods and Rockers. Oxford, UK: MacGibbon and Kee.

    Google Scholar 

  • Cole, S. and Pontell, H.N. (2006). Don’t Be Low-Hanging Fruit: Identity Theft as Moral Panic, in Monahan, T. (ed.) Surveillance and Security: Technological Problems and Power in Everyday Life. London: Routledge. pp. 125–147.

    Google Scholar 

  • Copes, H. and Hochstetler, A. (2010). Interviewing the Incarcerated: Pitfalls and Promises, in Bernasco, W. (ed.) Offenders on Offending: Learning About Crime from Criminals. London: Willan. pp. 49–67.

    Google Scholar 

  • Copes, H., Kurley, K., Kane, J. and Huff, R. (2010). An Exploratory Study of Identity Theft Using a National Victimization Study.. Journal of Criminal Justice, 38, 1045–1052.

    Article  Google Scholar 

  • Copes, H. and Vieraitis, L.M. (2009a). Bounded Rationality of Identity Thieves: Using Offender-Based Research to Inform Policy. Criminology & Public Policy, 8, 237–262.

    Article  Google Scholar 

  • Copes, H. and Vieraitis, L.M. (2009b). Understanding Identity Theft: Offenders’ Accounts of Their Lives and Crimes.. Criminal Justice Review, 34, 329–349.

    Article  Google Scholar 

  • Copes, H. and Vieraitis, L.M. (2012). Identity Thieves: Motives and Methods. Boston: Northeastern University Press.

    Google Scholar 

  • Craats, Rennay (2005). Identity Theft: The Scary New Crime that Threatens All of Us. To ronto, ON: Altitude Publishers.

    Google Scholar 

  • Darrow, J.J. and Lichtenstein, S.D. (2008). Do You Really Need My Social Security Number?: Data Collection Practices in the Digital Age.. North Carolina Journal of Law and Technology, 10, 1–58.

    Google Scholar 

  • Earley, P. and Shur, G. (2002). WITSEC: Inside the Federal Witness Protection Program. New York: Bantam Books.

    Google Scholar 

  • Economist (2012, 11 August). China Is Taking Over the Fake ID Business. Economist, 11 August.

    Google Scholar 

  • Elgie, N. (2008). The Identity Theft Cat-and-Mouse Game: An Examination of the State and Federal Government’s Latest Maneuvers.. I/S: A Journal of Law and Policy for the Information Society, 4, 616–655.

    Google Scholar 

  • Emery, S. (2012). Police Seek Help in Identifying Suspects in ID-Theft Case. Orange County Register, 1 September, Local 12.

    Google Scholar 

  • Farrell, L. (2011). A Step in the Right Direction: Debit Card Interchange Fees in the Durbin Amendment.. Lewis & Clark Law Review, 15, 1078–1106.

    Google Scholar 

  • Gardiner, B. (2010). How Anyone Can Fake an ATM and Steal Your Money. Gozando, 2 December.

    Google Scholar 

  • Goode, E. and Ben-Yehuda, N. (1994). Moral Panics: The Social Construction of Deviance. Oxford, UK: Blackwell.

    Google Scholar 

  • Goran, S. (2008, 21 October). Identity Theft Twice as Likely in English-Speaking Countries. Available on http://www.bloomberg.com/apps/news?pid=newsarchive&sid=aqW3VvyTgO30

    Google Scholar 

  • Greenberg, J. (2009). I Never Promised You a Rose Garden. New York: Henry Holt.

    Google Scholar 

  • Hagan, J. (2010). Who Are the Criminals? The Politics of Crime Control in the Age of Roosevelt and the Age of Reagan. Princeton, NJ: Princeton University Press.

    Google Scholar 

  • Hirsch, R. (2012). Identity Theft Continues to Top FTC’s List of Consumer Complaints. National Law Review, 16 (21 May), 13.

    Google Scholar 

  • Hoffman, S.K. and McGinley, T.G. (2008). Identity Theft: A Reference Handbook. Santa Barbara, CA: ABC-Clio.

    Google Scholar 

  • Holden, S. (2011). A ‘Who Is It?’ More Than a Whodunit. New York Times, 14 July.

    Google Scholar 

  • Howard, H.M. (2005). The Negligent Enablement of Imposter: A Common-Sense Common Law Claim.. Duke Law Journal, 54, 1263–1294.

    Google Scholar 

  • Jackson, J.E. (1994). Fraud Masters: Professional Credit Card Offenders and Crime.. Criminal Justice Review, 19, 24–55.

    Article  Google Scholar 

  • Langton, L. (2011). Identity Thefts Reported by Households, 2005–2010. Washington, DC: Bureau of Justice Statistics, U.S. Government Printing Office.

    Google Scholar 

  • Marron, D. (2008). Altering Reality: Governing the Risk of Identity Theft.. British Journal of Criminology, 48, 20–38.

    Article  Google Scholar 

  • Martinez, J.A., Rutledge, P.C. and Sher, K.J. (2007). Fake ID Ownership and Heavy Drinking in Undergraduate College Students.. Psychology of Adolescent Behavior, 21, 226–232.

    Article  Google Scholar 

  • Mayer, R.N. (2006). Defending Your Financial Privacy: The Benefits and Limits of Self-Help Research Paper 2006–06. Washington, DC: AARP Public Policy Institute.

    Google Scholar 

  • McKelvey, B.R. (2001). Financial Institution’s Duty of Confidentiality to Keep Customers’ Personal Information from the Threat of Identity Theft.. UC Davis Law Review, 54, 1077–1126.

    Google Scholar 

  • McNally, M. and Newman, G.R. (eds.) (2008). Perspectives on Identity Theft. Monsey, NY: Criminal Justice Press.

    Google Scholar 

  • Pastrikos, C. (2004). Identity Theft Statutes: Which Will Protect Americans the Most?. Albany Law Review, 67, 1137–1157.

    Google Scholar 

  • Patrick v. Union State Bank (1995). 681 So. 2d 1364 (Alabama).

    Google Scholar 

  • Pontell, H.N. (2009). Identity Theft: Bounded Rationality, Research, and Policy.. Criminology & Public Policy, 8, 263–270.

    Article  Google Scholar 

  • Pontell, H.N., Brown, G.C. and Tosouni, A. (2008). Stolen Identities: A Victim Survey, in McNally, M.M. and Newman, G.R. (eds.). Perspectives on Identity Theft. Monsey, NY: Criminal Justice Press. pp. 57–85.

    Google Scholar 

  • Rasmussen, D. (2012). Teens Take a Risk When They Order Fake IDs from China. Arizona Republic, 20 June.

    Google Scholar 

  • Sovern, J. (2004). Stopping Identity Theft.. Journal of Consumer Affairs, 38, 233–243.

    Article  Google Scholar 

  • Spalek, B. (2006). Crime Victims: Theory, Policy and Practice. Hampshire, U.K.: Palgrave Macmillan.

    Google Scholar 

  • Stephan, M.J., Pennington, S., Krishnamurthi, G. and Reidy, J. (2009). Identity Burglary.. Texas Review of Law & Politics, 13, 401–417.

    Google Scholar 

  • Sullins, Lauren L. (2006). ‘Phishing’ for a Solution: Domestic and International Approaches to Decreasing Online Identity Theft.. Emory International Law Review, 20, 397–433.

    Google Scholar 

  • United States v. Hill (2012). No.11-2313 (7th Circuit).

    Google Scholar 

  • White, A.E. (2005). The Recognition of a Negligence Cause of Action for Victims of Identity Theft: Someone Stole My Identity, Now Who Is Going to Pay for It?. Marquette Law Review, 88, 847–866.

    Google Scholar 

  • Whitely, E.A. and Hosein, G. (2010). Global Challenges for Identity Policies. London: Palgrave Macmillan.

    Google Scholar 

  • Wright, R.T. and Decker, S.H. (1994). Burglars on the Job: Street Life and Residential Break-Ins. Boston: Northeastern University Press.

    Google Scholar 

  • Wright, R.T. and Decker, S.H. (1997). Armed Robbers in Action: Stickups and Street Culture. Boston: Northeastern University Press.

    Google Scholar 

  • Yoshida, T. (2009). The ‘Hey-It’s-Me’ Scam Is Not the Only Way, Symantec. Available on http://www.symantec.com/connect/blogs/hey-it-s-me-scam-not-only-way.

    Google Scholar 

  • Zietz, D. (1981). Women Who Embezzle or Defraud: A Study of Convicted Felons. New York: Praeger.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 Henry N. Pontell and Gilbert Geis

About this chapter

Cite this chapter

Pontell, H.N., Geis, G. (2014). Identity Theft. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-67284-4_14

Download citation

Publish with us

Policies and ethics