You are on page 1of 4

1

Running Head: Short Paper Assignment 2

Short Paper Assignment 2 Thomas J. Moore Saint Petersburg College, Tarpon Springs CJE1669 - Identity Theft Investigations (Online) Thomas 5/28/13

A persons Social Security Number is a key identifier in the United States and its main purpose has evolved since its conception. One of the main problems when dealing with identity theft is that as a society, we do not respect the privacy of our selected identifiers. This is why I believe that if someone was to steal or obtain another persons personal identifier documents such as birth certificates, drivers licenses, or Social Security cards it would be the most effective in enabling Identity theft.

In fact, According to Jeff Wentworth our Social Security numbers are still printed and disclosed on some of our personal documents and, being traded on the internet for profit exposing us to identity theft risks. These actions are prohibited and illegal by Federal laws but, the laws and their enforcement have not been strong enough to fully prevent Social Security Number theft and misuse (Wentworth, 2007).

Identity theft is the fastest growing segment of computer crime but there are many others such as for instance one being called Dumpster Diving. Dumpster Diving becomes a crime when someone steals trash that is considered to be concealed. For example, the trash can that you collect your trash bags in, back by the garage, is considered concealed. Thieves cant help themselves to that trash without risking theft charges if caught. Another method that is used by identity thieves is Employment Fraud and according to Martin Biegelmans Identity Theft Handbook he states that Fraudsters use your name, Social Security Number, and other personal information to pose as you for employment (Biegelman, 2009, pg.30). Employment Fraud also involves activities such as fraudulent representation of income to a borrower who claims selfemployment in a non-existent company or who claims a higher position. The last method that I

will describe is Hacking and Electronic Intrusions. According to Jeremy Quittner Electronic Intrusions or Hacking is an unauthorized use of a computer specifically if it is intended to evade the security features of a computer or a network (Quittner, 2007).

Jeffrey Webster Lawson was so successful in his identity thievery because of many reasons such as always rolling around in luxury cars, always wearing nice clothing such as a fancy suit or a fancy name brand watch for instance, Martin Biegelman states that Jeffrey Webster Lawson would wear a Rolex watch to portray wealth and success (Biegelman, 2009, pg.40). Some other key points to Jeffrey Webster Lawsons success as an identity thieve, was he would always avoid being seen on a security camera. As well as, if he felt things were not going right or the possibility of being caught; he and his accomplice would bolt out of town. Lastly, Jeffrey Webster Lawson always made sure to keep his hands clean, so he would hire someone to do his dirty work for him.

References Biehelman, M. (2009). Identity theft handbook detection, prevention, and security. Hoboken, New Jersey: John Wiley & Sons, Inc.pp.30-40

Quittner, Jeremy (2007). Identity Theft: How you can protect yourself. All Hands; Issue 1081, p.36

Wentworth, Jeff (2007). Stop Identity Theft. Bulverde Standard (Canyon Lake, TX); Vol. 23 Issue 37, p.14

You might also like