THE IMPACT OF THE FAIR AND ACCURATE CREDIT TRANSACTIONS ACT... ON IDENTITY THEFT THROUGH THE SITUATIONAL CRIME PREVENTION THEORY

THE IMPACT OF THE FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (2003)
ON IDENTITY THEFT THROUGH THE SITUATIONAL CRIME PREVENTION THEORY
AND PRACTICES
A Thesis
Presented to the faculty of the Division of Criminal Justice
California State University, Sacramento
Submitted in partial satisfaction of
the requirements for the degree of
MASTER OF SCIENCE
in
Criminal Justice
by
Andrey Lesnyakov
SPRING
2013
© 2013
Andrey Lesnyakov
ALL RIGHTS RESERVED
ii
THE IMPACT OF THE FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (2003)
ON IDENTITY THEFT THROUGH THE SITUATIONAL CRIME PREVENTION THEORY
AND PRACTICES
A Thesis
by
Andrey Lesnyakov
Approved by:
__________________________________, Committee Chair
Sue C. Escobar, J.D., Ph.D.
__________________________________, Second Reader
David H. Swim, D.P.A.
____________________________
Date
iii
Student: Andrey Lesnyakov
I certify that this student has met the requirements for format contained in the University format
manual, and that this thesis is suitable for shelving in the Library and credit is to be awarded for
the thesis.
__________________________, Graduate Coordinator ___________________
Yvette Farmer, Ph.D.
Date
Division of Criminal Justice
iv
Abstract
of
THE IMPACT OF THE FAIR AND ACCURATE CREDIT TRANSACTIONS ACT (2003)
ON IDENTITY THEFT THROUGH THE SITUATIONAL CRIME PREVENTION THEORY
AND PRACTICES
by
Andrey Lesnyakov
Statement of Problem – With the problem of identity theft presenting a significant challenge to
modern law enforcement and considering the impact this crime has had as on individual
consumers, as well as on the field of criminal justice in general, it is not surprising that there has
been an urgent need to develop an approach that would help solve this problem. A lot of
strategies and measures have been developed with the goal to protect consumers and
organizations from identity theft and one of these measures is the Fair and Accurate Credit
Transactions Act that was enacted in 2003. The main goal of this study is to determine the
impact that this very act has had on problem of identity theft. By looking at the total number of
identity theft incidents, fraud incidents, as well as bank and credit card fraud incidents, the
research will determine the impact the legislation has had on the problem of identity theft and
whether or not it is rational to implement similar laws in the future.
Sources of Data – The data that will be used for this research will come from an already
existing database that was created by the Consumer Sentinel Network and that belongs to the
v
Federal Trade Commission. All the statistics and the reports from which the data will be
extracted will come from this database.
Conclusions Reached – The main conclusion of this work is that the Fair and Accurate Credit
Transactions Act of 2003 has had a significant impact on the problem of identity theft. The total
number of incidents, as well as the total number of fraud complaints, has been steadily going up
since the enactment of the law. In the meantime, the number of credit card fraud and bank fraud
incidents has been going down. While, more likely than not, there will be amendments to this
act, this legislation does appear to be an important tool that the system of criminal justice has at
its disposal in its fight against the problem of identity theft.
_______________________, Committee Chair
Sue C. Escobar, J.D., Ph.D.
_______________________
Date
vi
ACKNOWLEDGEMENTS
This thesis would not have been possible if it was not for continuous encouragement and
support from my parents. Thank You!
vii
TABLE OF CONTENTS
Page
Acknowledgements ................................................................................................................ vii
List of Tables............................................................................................................................ x
List of Figures .......................................................................................................................... xi
Chapter
1. INTRODUCTION .............................................................................................................. 1
2. LITERATURE REVIEW .................................................................................................... 7
Introduction .................................................................................................................. 7
Identity Theft Prevention ............................................................................................. 7
Identity Theft .............................................................................................................. 17
Fraud........................................................................................................................... 22
The Fair and Accurate Credit Transactions Act (2003) ............................................ 39
Conclusion.................................................................................................................. 45
3. METHODOLOGY ............................................................................................................ 49
Research Design ........................................................................................................ 49
Data Collection .......................................................................................................... 50
Independent Variable and Dependent Variable ......................................................... 51
Hypotheses ................................................................................................................ 52
Data Analysis ............................................................................................................ 53
Data Analysis – Coding Sheets ................................................................................. 54
Human Subjects......................................................................................................... 56
Strengths & Limitations of the Research................................................................... 57
viii
4. ANALYSIS OF THE FINDINGS ..................................................................................... 58
Introduction .............................................................................................................. 58
Analysis of the Dependent Variables ....................................................................... 59
Total Number of Identity Theft Incidents ................................................... 59
Total Number of Fraud Complaints ............................................................ 67
Misuse of Personal Information .................................................................. 74
Credit Card and Bank Fraud Incidents .......................................... 75
Credit Card and Bank Fraud Rates ................................................ 79
Data Analysis Summary .............................................................................. 84
5. CONCLUSION ................................................................................................................... 88
Introduction .............................................................................................................. 88
Overview of the F.A.C.T.A. (2003).......................................................................... 90
Research Questions, Hypotheses and Variables Examined ...................................... 90
Data Collection ......................................................................................................... 91
Important Findings.................................................................................................... 93
Future Research ........................................................................................................ 98
Conclusion ................................................................................................................ 98
Appendix A. Coding Sheets .................................................................................................. 102
Appendix B. Human Subjects Application ........................................................................... 104
References ............................................................................................................................. 115
ix
LIST OF TABLES
Tables
Page
1.
Total Number of Incidents and Total Number of Fraud Complaints ........................... 60
2.
Total Number of Credit Card Fraud and Bank Fraud Incidents and Percentages of Total
Incidents .............................................................................................................. 76
x
LIST OF FIGURES
Figures
Page
1.
The Total Number of Identity Theft Incidents ............................................................. 64
2.
The U.S. Population (2000-2010) ............................................................................... 66
3.
The Identity Theft Rates ............................................................................................... 66
4.
The Total Number of Fraud Complaints ...................................................................... 70
5.
The Rates of Fraud Complaints .................................................................................... 71
6.
The Total Number of Credit Card Fraud and Bank Fraud Incidents ............................ 79
7.
Credit Card Fraud and Bank Fraud Rates .................................................................... 83
xi
1
Chapter 1
Introduction
The problem of identity theft, which is a relatively new crime, can have a
huge negative impact on its victims when their personal information gets stolen and
used for criminals’ gains. In 2010 alone, about 8.1 million Americans reported
being a victim of identity theft that cost them around $37 billion dollars (Finklea,
2012). However, despite the fact that a lot of research is dedicated to finding out
how the situational crime prevention framework is applied to this type of problem
and what measures are effective, some questions remain unanswered. While it has
been shown that such simple steps as a careful review of monthly banking bills and
statements, anti-virus computer software or not using one’s mail box for outgoing
mail, among many others, can significantly reduce chances of becoming a victim,
there are still some measures that have not been shown to be effective (Dadisho,
2005).
The consensus is that it is all about target hardening and situational crime
prevention. The concept of the situational crime prevention involves “the
manipulation of environmental conditions and situational circumstances to reduce
opportunities to commit crime” (Shukla & Bartgis, 2010, p.340). The uniqueness of
this approach is that it puts the entire emphasis on the criminal event and not the
offender. By taking into consideration all circumstances and factors that led to that
specific crime, the situational crime prevention perspective is trying to identify
2
common patterns and characteristics of that particular type of crime. In the
meantime, it is not concerned with what role an offender played in that offense. The
situational crime prevention model contains such components as theoretical
framework, standard methodology that is based on action-research, techniques and
practices that reduce opportunities for crime, as well as the literature evaluating
what already has been done (Shukla & Bartgis, 2010). Therefore, the main purpose
of this model is to understand what factors lead to a crime, what opportunities are
presented to a criminal and what can be done to eliminate these opportunities
(Shukla & Bartgis, 2010).
There are several strategies and techniques directed at reducing the number
of opportunities with which a criminal is presented when deciding whether or not to
commit a crime. The very first strategy is increasing the risks of crime. This
measure would include such aspects as the introduction of surveillance systems,
along with an increased number of security guards (Shukla & Bartgis, 2010). Any
strategy that can improve the chances of a criminal being apprehended is assumed
to increase the risks of committing that crime for an offender. Thus, when it is more
likely that risks outweigh the crime’s benefits, a potential offender would not
commit that crime (Shukla & Bartgis, 2010). Another strategy would include
reducing the rewards of crime. Decreasing the amount of benefits gained from a
crime can be achieved by identifying/marking one’s property or by simply
3
concealing it. Examples of this can include “removable car radios or graffiti
cleanup” (Shukla & Bartgis, 2010, p.341).
Increasing the efforts of crime prevention and making a potential crime as a
dangerous and risky undertaking can also play a significant role in reducing the
number of opportunities for a criminal. The main logic here is that if you make the
main target too difficult to reach, an offender is less likely to go for it. This strategy
would include such features as increased surveillance through closed-circuit
television systems or increased security staff, electronic access or more
complicated screening processes when trying to reach the target. All of these
features would concentrate on target hardening and good examples would include
physical barriers to parking lots or “placing photos on credit cards” (Shukla &
Bartgis, 2010, p.341). The final strategy is to remove excuses for crime. This can
be achieved through setting and posting specific rules, laws and regulations. Good
examples would include rental and mortgage agreements, speed limit indicators and
other posted signs, such as ‘no smoking’ or ‘no trespassing’ (Shukla & Bartgis,
2010).
However, there is no guarantee that even if the situational crime prevention
model is applied and if a person were to follow all of the ‘how to protect oneself
from identity theft’ instructions, one could still become a victim of identity theft.
Nevertheless, if one takes all necessary precautions, the prospects of having good
protection will definitely be much better (Dadisho, 2005). If there is no opportunity
4
to commit a crime, there probably will not be any crime. If one does not leave
anything in the dumpster, mail box or on the street that has his/her personal
information, a criminal will not be able to steal it and use it for personal gains
(Dadisho, 2005). If one uses proper computer software and is careful when working
online, there are more chances that a computer network will not be breached. If one
does not provide the identifying information to those who do not need it, people
who have no business having it will never end up in possession of it. Therefore, it
is less likely to be lost or misused (Dadisho, 2005). Finally, if one monitors his/her
bank statements and credit score reports, that individual is more likely to notice the
problem in the very beginning. This last point leads to the fact that in order to assist
consumers in their fight against this relatively new crime, several laws and
regulations have been created and their main goal is to stop the identity theft in its
earliest stages (Dadisho, 2005).
Identity theft became a federal crime in 1998 and with the development and
increased use of technology, especially the Internet, this particular problem started
presenting more and more danger to the general public (Finklea, 2012). As a result,
there was an urgent need to have strong legislation in place that would give
consumers protection and certain rights that would ensure their safety against
online criminals. Moreover, a variety of industries that deal with confidential
information of their clientele were strongly recommended to have a set of measures
that would help them to protect this very information (Finklea, 2012).
5
In 1998, the Identity Theft Assumption Deterrence Act was passed and it
made the crime of identity theft a federal offense, while it also established a set of
penalties for those who even tried committing identity theft, as well as for those
who provided assistance in the commission of a crime (Finklea, 2012).
Furthermore, this Act directed the Federal Trade Commission to gather all the
complaints and law enforcement data regarding identity theft. The Identity Theft
Penalty Enhancement Act that was passed six years later strengthened the federal
position in relation to prosecution of identity theft even further (Finklea, 2012). It
also established a new set of penalties that included sanctions for such offenses as
aggravated identity theft, where a criminal could get an additional sentence
depending on that particular offense in relation to other federal crimes (Finklea,
2012).
In 2003, the Fair and Accurate Credit Transactions Act (F.A.C.T.A.)
became a federal law. The main goal here was to “amend the Fair Credit Reporting
Act (F.C.R.A.), to prevent identity theft, improve resolutions of consumer disputes,
improve the accuracy of consumer records, make improvements in the use of, and
consumer access to, credit information” (108th US Congress, 2003). The F.C.R.A.,
which was originally passed in 1970, addressed such issues as dissemination of
consumer information and the ways in which it can be used. In a sense, it represents
the foundation of credit rights granted to the American consumers. The F.A.C.T.A.
legislation was also a response to the increased number of identity theft crimes and
6
was supposed to help alleviate the problem by granting certain rights to consumers.
Among them were the rights to obtain credit reports free of charge, place a fraud
alert on one’s credit history, as well as some others. Nevertheless, it is still not clear
how, despite all these proposed anti-identity theft measures, effective this Act
really is (Holtfreter & Holtfreter, 2006). As a result, this thesis will fill this void
and determine how the problem of identity theft has been impacted since the
implementation of this Act.
Therefore, the main research question is – how has the Fair and Accurate
Credit Transaction Act of 2003 impacted the problem of identity theft? This work
will look at the Federal Trade Commission database and conduct secondary data
analysis in trying to determine how the total number of identity theft incidents and
the number of fraud complaints has changed over the last few years. Additionally,
this study will determine the changes in how personal information has been used by
criminals. More specifically, this study will look at the areas of bank fraud and
credit card fraud. The importance of this study cannot be underestimated, as it will
help to determine the effect of the federal legislation on the problem and what
works and what does not from the letter of the law perspective. It will demonstrate
recent trends in identity theft and will shed more light on the F.A.C.T.A. legislation
and also show if enacting similar laws in the future would make sense.
7
Chapter 2
Literature Review
Introduction
Though the concept of situational crime prevention has been effectively
applied to such areas as auto theft (Linden & Chatuverdi, 2005), crime prevention
through environmental design (Farrington et al., 2007), date/sexual assault
prevention (Parkhill et al., 2009) and drug abuse prevention (Shukla & Bartgis,
2010), this study focuses on identity theft, as well as credit card and bank fraud.
Specifically, this study examines the impact of the F.A.C.T.A. legislation, as a
mechanism of situational crime prevention, on identity theft and bank and credit
card fraud rates. The literature review that follows will address prior studies which
have examined the theoretical framework of situational crime prevention as applied
to identity theft and two types of fraud.
Identity Theft Prevention
The rise of the Internet during the last few years made our lives so much
easier, whether it is how we pay our bills or how we meet new people. However,
this convenience comes at a price. The era of the new technologies brings a new
type of crime – cyber crime, the one that is committed by using the Internet. The
most common cyber crime that we face today is an identity theft (Dadisho, 2005).
Given the unconventional character of this type of a crime, it is very difficult for
law enforcement to prevent it simply by using traditional crime prevention tactics,
8
such as increased patrol of the ‘hot spot.’ As a result, implementation of
nontraditional strategies might help in fighting this invisible crime. These strategies
can include campaigns that would emphasize the importance of cooperation
between law enforcement and public (Dadisho, 2005).
In his work on identity theft and police response, Dadisho (2005) suggests
that the main aspect here is prevention. Prevention, in turn, depends a lot on a
potential victim and precautions that are taken by the victim. The author
recommends a few actions that, if taken, can significantly reduce a chance of
becoming a victim of an identity theft. First of all, it is necessary to protect one’s
own mail and always remove it on time. For outgoing mail, it is safer to use an
official postal service mailbox and not leave it in one’s own mailbox. Since these
mailboxes represent an easy target for thieves, outgoing mail containing some
sensitive material can easily get stolen (Dadisho, 2005). Another necessary action
that has to be taken is to carefully review monthly bills and bank statements in
order to identify any suspicious activities and report them to anti-fraud authorities.
Also, it is very important not to provide any personal information to various offers
made as in person or phone, so online, in regards to claim a prize or to enter a
lottery (Dadisho, 2005). If one has to provide any identifying and personal
information, s/he has to be certain that this information is going to be kept
confidential and that it is actually required by law to present that sort of
information. Other precautions include not using the social security number, unless
9
it is required by law, not carrying more credit cards than is absolutely necessary.
Constant monitoring of credit score reports is also very important and can help in
detecting problems in early stages. Considering that it might be very difficult to
identify the identity theft until it is too late, taking these precautions can help to
stop this crime just in time (Dadisho, 2005).
A study by Holt and Turner (2012) emphasizes the importance of rational
online behavior. They emphasize the idea that is well-known but not well-followed
by everybody – you have to be rational and smart when working online. The riskier
one’s online behavior is, the more chances that person has to become a victim of
identity theft. Also, according to the findings here, potential victims can do a lot in
terms of prevention of the problem by being aware of what is going on when they
are online, what they do and what they should not do. Having proper anti-virus
software should also significantly reduce the risk of victimization. Since so many
identity theft incidents take place via the Internet by criminals breaching computer
systems/networks that might contain such sensitive information as passwords, dates
of birth, social security numbers and so on, having this type of protective program
is a must (Holt & Turner, 2012).
DelGrosso (2001), in his work on identity theft, emphasizes the type of
devastating impact this crime might have on its victim. And the primary reason for
the devastation is the amount of time for which it can go undetected. It might take
on average about 14 months for victims to discover that they had their personal
10
information had been stolen (DelGrosso, 2001). DelGrosso (2001) also emphasizes
the importance of preventive measures. Like Dadisho (2005), DelGrosso (2001)
also states that it is necessary to take proper precautions when dealing with
outgoing mail and be very careful when providing personal identification
information. The author suggests that such information should be provided to only
those entities who are required by law to have it (DelGrosso, 2001). Social security
numbers should not be used for identification purposes unless it is required by law.
Just like Dadisho (2005), DelGrosso (2001) also recommends a careful review of
monthly bills and statements and retaining copies of these documents for at least a
year. All old documents, if no longer needed, have to be either shredded or
otherwise destroyed (DelGrosso, 2001).
Another course of action that DelGrosso (2001) emphasizes is the role of
businesses in identity theft prevention. Companies and organizations can create
special programs that would help employees to learn about “legal, regulatory, and
organizational resources” (DelGrosso, 2001, p.75). Also, it would allow employees
to work closely with the human resources departments and get to know privacy
policies and recommendations on how to prevent an identity theft (DelGrosso,
2001).
Another study by McRae (2003) on identity theft addresses the issue of
students keeping their identities safe when online. But, there is no doubt about that,
these very suggestions can be applicable to all other segments of populations as
11
well. McRae (2003) recommends for students (and presumably the general public
as well) to always carefully monitor their bank accounts and if there are some
questionable transactions on bills and statements, that might be the first sign that
there has been an unauthorized access to that person’s private information. McRae
(2003) emphasizes the importance of signing up for fraud alerts and regularly
checking one’s own credit score. Any abnormalities with a credit score might be a
pretty good indicator that there might be a problem. Just like DelGrosso (2001),
McRae’s (2003) findings suggested to not carry more information than it is
absolutely necessary. For example, one does not have to carry a social security card
on him/her all the time. The same goes for credit cards. Finally, a consumer has to
be aware of to whom s/he provides his/her personal information and why that type
of information is actually requested. In other words, there are people that might not
need the type of information for which they are asking. Therefore, a consumer is
not obliged to give away such facts as his/her date of birth or social security
number (McRae, 2003).
In addition to students, another vulnerable group here would be travelers.
Most of the victims in this category are businessmen who constantly travel and
most of the time they have to rely on such electronic devices as smart phones and
laptops, which, of course, can be easily hacked or simply lost. It has been estimated
that travelers lost more than 11,000 electronic devices last year at US airports
(Trejos, 2011). Lost smart phones and laptops accounted for 40 percent each
12
(Trejos, 2011). For the most part travelers also have to stay at hotels, which
oftentimes have unsecured internet networks and that certainly might contribute to
the problem of identity theft, as it has been shown that about 38 percent of this
crime does take place at hotels (Trejos, 2011).
Trejos (2011) also provides a discussion on how one can maximize his/her
chances of not becoming a victim of identity theft. According to Trejos (2011), as
well as DelGrosso (2001) and McRae (2003), it is very important for a person who
is going on a trip to not take more credit cards than is necessary. It is recommended
to take one primary credit card and another one as a back-up. A wallet can easily be
lost or stolen; therefore, it is more rational to leave as many unnecessary credit
cards at home as possible. Trejos (2011) also suggests that it would be smart to
write down the phone numbers of credit companies and keep them in a secure
location and when paying for airline tickets, to use credit cards instead of debit, as
it will reduce liability, should there be a problem. And a final piece of advice for
travelers is not to announce their trip plans, because it can potentially attract
burglars while that individual is on a trip (Trejos, 2011).
Carrns (2011), who conducted a study on identification information in
banking environments, also points out the idea that banks should not be asking for
customers’ social security numbers whenever a client has a question about his/her
account. There has to be a better way to verify one’s identity without making a
customer provide such sensitive information (Carrns, 2011). Furthermore, the
13
author also suggests that using partial social security numbers is also undesirable
and might lead to problems of keeping too much of sensitive information by the
people who have no business having it. Finally, just like with the general public,
banking institutions have to make sure that their databases are secure and they also
need to have a system that would be able to send out timely alerts when something
suspicious is going on with their clients’ accounts (Carrns, 2011).
Fighting cyber crime depends on various official state laws and regulations
as well. While trying to determine how effective this strategy can be, Holtfreter and
Holtfreter (2006) look at the US legislation that addresses identity theft. The
authors look at different provisions of the Fair and Accurate Credit Transactions
Act (F.A.C.T.A.) and the Identity Theft Penalty Act (I.T.P.E.A.) and try to measure
their effectiveness. The main purposes behind the first Act were to reduce the
number of identity theft incidents, improve conflict resolutions for consumers,
make sure that consumer records and credit information are accurate, as well as to
ensure the ease of access to personal information by consumers (Holtfreter &
Holtfreter, 2006). Meanwhile, the second Act focused on establishing harsher and
stricter penalties for aggravated identity theft. These two Acts led to the
introduction of such aspects as harsher penalties for identity theft criminals, fraud
alerts, ‘red flags’, as well as the mechanisms that would help blocking identity theft
(Holtfreter & Holtfreter, 2006).
14
The introduction of fraud alert systems allowed banking institutions to
inform creditors of possible fraud activities and after confirming the identity of a
consumer, proper measures would be taken. Also, credit score reporting agencies
will be notified that there could be potential fraudulent activities on that particular
person’s account. Holtfreter and Holtfreter (2006) also emphasize the importance
of proper disposal of credit cards and all financial records associated with them.
Moreover, one of the provisions of the F.A.C.T.A. legislation included the
requirement for credit and debit card numbers contained on sales receipts to be
truncated (Holtfreter & Holtfreter, 2006). Moreover, those who make business
transactions using credit cards will not be allowed to indicate when the expirations
dates are. The credit card agencies also cannot use the full social security number;
now, they would have to eliminate the first five digits. This is supposed to lead to
decreased identity theft rates, as a lot less personal information will be available for
thieves. Another change under these new Acts was involvement of all federal
banking and credit score reporting agencies to maintain a list of patterns, practices
and forms of various activities that might indicate fraud. Therefore, a quick
response would be possible and it could minimize the damage and result in
preventing the crime (Holtfreter & Holtfreter, 2006).
When dealing with identity theft, victims also have to know that there are
specific rules and regulations available that deal with this type of problem. The
Statement of Rights for Identity Theft Victims lists a number of federal rights that a
15
person dealing with the problem has to be aware of. They include reasonable and
timely notifications about any public proceedings, protection from the accused, as
well as to what resources are available to victims in case their personal information
had been stolen. A victim of identity theft has to know that s/he is protected by
laws in regards to documenting the theft, communicating with credit agencies,
limiting financial losses and resolving any disputes that were the result of identity
theft. Each law is very specific and covers a lot of issues. Therefore, it is important
for a victim to know that such laws exist and there is someone who can help
(Federal Trade Commission and Department of Justice, 2011).
In another study, White and Fisher (2008) use the situational crime
prevention model and emphasize the importance of creating secure places and
improved guardianship in order to reduce the number of opportunities for the crime
of identity theft (White & Fisher, 2008). They propose such changes as more
security when opening a new account, elimination of blind mailings, increased
police and public education, national uniform definitions and model law, national
uniform reporting system, proper police training and quick response, and a flexible
crime reporting system (White & Fisher, 2008).
Under this framework, the authors propose prohibiting checks, credit card
applications and credit cards themselves to be mailed through blind mailings
(White & Fisher, 2008). Considering that mail theft is a serious problem and that
identity theft oftentimes is what follows it, this step would help to significantly
16
reduce the number of opportunities for a crime to occur and result in fewer identity
thefts. Inventing new procedures for opening new accounts is also very important.
Here, it would be necessary to make it mandatory to implement the system of
callback verification, placing photographs, or involving biometric technologies to
verify an applicant’s or a client’s identity and that the person asking for a service is
in fact who s/he claims to be (White & Fisher, 2008). New emphasis also has to be
directed towards the Internet, as that is the place from where the identification
information can easily be stolen. Police should be educating the public about
dangers and potential ways to avoid an identity theft through community outreach
programs (White & Fisher, 2008).
Clear, standard definitions of both identity theft and identity theft offenses
have to be established. Police departments should be more flexible when working
with identity theft and trying to identify this crime’s patters in their reports of
crimes (White & Fisher, 2008). Police officers need to have special skills and
training to fight cybercrimes, as well as specifically oriented task forces that have
to be organized. So, by proposing these recommendations that address the identity
theft problem by implementing more secure places and improved guardianship, the
authors hope that it will help to reduce the number of opportunities for committing
a crime (White & Fisher, 2008).
17
Identity Theft
Copes et al. (2010), in their study on the problem of identity theft and
profile of victims and offenders, state that the typical victim of identity theft is
more likely to be a white female, college graduate, between the ages of 35 and 54
with an income of more than $50,000 per year (Copes et al., 2010). This individual
is more likely to report a crime and not engage in a behavior that would
significantly differ from other citizens. Also, members of this group do not appear
to be using the Internet more frequently than others. However, individuals who
spend more time online are those ones who became victims of existing credit card
fraud. And those who became victims of existing fraud and new credit card fraud
are more likely to spend less time online than the previous category of consumers
(Copes et al., 2010).
The authors also state that the vast majority of offenders do not actually use
the Internet. Moreover, only about 20 percent used the Internet in some way to
commit crimes, while only about 10 percent used the Internet exclusively (Copes et
al., 2010). In fact, what criminals usually utilize includes dumpsters and mailboxes
that potentially contain personal information. Such information can also be
obtained through places of employment, phishing and hacking. The study
emphasizes the importance of educational programs on protecting one’s identity.
These programs have to be available to the general public and that would help
show all the dangers of identity theft, as well as such aspects as its prevention,
18
consequences and what resources are available to fight this problem. Moreover, the
goal here has to be to reach as many people as possible from as many social
backgrounds as possible because who is more likely to be victimized is going to be
from a low income social status without much educational background (Copes et
al., 2010).
Allison et al. (2005) also point out the importance of the problem of identity
theft and state that the actual crime rates are higher than what they are believed to
be now. Moreover, this crime has been on the rise and its increasing rates are
higher than those of such other crimes as robbery, auto theft, check and card fraud
(Allison et al., 2005). Also, the clearance rates for the crime of identity theft are
much lower than they are for other aforementioned types of crime. As a result,
Allison et al. (2005) point out that it is necessary to be allocating more resources to
this problem, as well as more research is necessary. This crime does not generate as
much attention as do violent crimes where there is a clearly defined victim that
everybody can see. Nevertheless, identity theft does impact lots of lives and close
attention has to be paid to this problem (Allison et al., 2005).
The authors of this study also state that an identity theft offender is more
likely to be an African American female who is either unemployed or working
alone and who does not have any connections to a victim, who, in his/her turn,
tends to be a White male (Allison et al., 2005). In addition to extra resources that
have to be allocated to law enforcement, some resources have to be utilized in order
19
to educate the general public on the dangers of identity theft, both from the
offender and victim perspectives. If utilized properly, there is a good chance that
the arrest clearance rates, as well as the situation in general, will significantly
improve (Allison et al., 2005).
Moon et al. (2010) look at the specific segment of population – youth – and
try identifying who are especially vulnerable to committing online crime.
According to the authors, those with low self-control are more likely to engage in
illegal online activities, such as illegal downloads and using personal information
of others for personal gains. Also, what the study points out is that the number of
hours spent online and membership status in various online computer clubs is
correlated with computer crime (Moon et al., 2010). The more time one spends
online and the more s/he participates in online clubs, the more likely that individual
will be involved in some kind of online illegal activities. This, as speculated by the
authors, might be due to more skills and knowledge that a person gains after having
spent lots of hours online (Moon et al., 2010).
Also, males are more likely to engage in illegal online activities than their
female counterparts (Moon et al., 2010). Moreover, this segment of the population
is more likely to be better educated as computer knowledge does require some
technological knowledge. The authors, however, emphasize that more research is
absolutely necessary in this field in order to better understand what affects youth
20
and who are more likely to offend, as well as what motivational factors are present
that lead to that particular crime (Moon et al., 2010).
Jackson (2004) also emphasizes the importance of research that is
absolutely necessary in order to be able to understand the impact the crime of
identity theft has on victims and offenders, consumer credit system, as well as the
entire criminal justice system. Considering the economic impact of this crime, this
approach has to be prioritized by those in the field of criminal justice. The author
points out that offenders are more likely to be quite intelligent, have the right type
of resources and skills, as well as talent (Jackson, 2004). Moreover, involvement in
this type of crime includes some kind of rational decision-making process where
the benefits outweigh the risks. Consequently, this decision is based on evaluation
of one’s skills, resources, and risks and benefits (Jackson, 2004).
What also makes this problem even worse is that it can be relatively easy
for offenders to get away with their crime due to detection difficulties (Jackson,
2004). Another problem here is that many banking institutions or companies where
fraud can occur decide not to report crimes if losses are insignificant (Jackson,
2004). Prosecution and authorities may also decide not to file charges against an
individual due to a lack of evidence. As a result, this makes the crime of identity
theft an attractive target as more often than not a criminal can get away with it
(Jackson, 2004).
21
Riem (2001) explores the area of fraud and identity theft and the author
points out that there might be several methods through which one’s personal
information can be obtained. One of the most obvious ways is through a hacker
getting access to a secure database that might contain personal information. Also,
personal information might be obtained by deception. Here, for example, a victim
can be promised a trip or an expensive electronic item and asked to provide his/her
personal information in order to be able to claim a prize. Once such information is
provided, a victim never hears back from those who promised a prize and the
information is used for criminals’ gains (Riem, 2001). Other ways might include
mail theft or negligence on the part of organizations that have confidential
information and are supposed to keep it in a secure place (Riem, 2001).
The author also identifies skimming as another very dangerous recent trend
that has resulted in more identity theft incidents (Riem, 2001). Certain employees
in the public sector, especially where an employee has contact with credit cards, get
recruited and are paid for obtaining credit card information (Riem, 2001). This
information is used and copied onto criminals’ counterfeit credit cards and these
cards can be used for a short period of time. A true owner of that account will be
charged with all the purchases. This problem is quite serious and the author points
out that there are no boundaries for this crime, as sometimes entire crime rings are
involved in this and oftentimes personal information is stolen by somebody who
lives on a different continent (Riem, 2001). Moreover, this information is then most
22
likely to be used as a bargaining tool. In a sense, this represents a business machine
on the international scale. Therefore, efforts to stop the crime of identity theft have
to involve a variety of international players and require a lot of cooperation (Riem,
2001).
Fraud
Hunter (2006), in a study about stolen credit cards, also emphasizes the idea
of international crime rings that are responsible for personal information theft and
how it is almost impossible to investigate and prosecute such cases due to victims
and offenders being on different continents and not a lot of cooperation from
foreign nations. Moreover, the author also states that it is a whole new business
nowadays when personal information, such as identifying information and bank
and credit account numbers, gets stolen only to be resold later (Hunter, 2006). As a
result, it might be very difficult to trace who the original offender was and where
the initial theft took place. Another threat of this crime is that a lot of terrorist
organizations are funded through these illegal activities (Hunter, 2006).
The work by Hunter (2006) also points out that as long as payment systems
exist, so will the crime and it is impossible to defeat identity theft. Moreover, some
critics even state that all that is being done is just shifting focus from cardholders to
merchants and by introducing new technologies, such as PIN numbers and
electronic chips, the problem is not taken care of, but now there is a different party
that is held responsible. Nevertheless, the author emphasizes the idea of technology
23
and that its role cannot be underestimated. What also might be helpful is including
various biometric innovations that certainly have a lot of potential to make one’s
personal financial information more secure (Hunter, 2006). However, another
aspect that has to be taken into consideration is the idea of education, and the more
consumers know about all the dangers this crime brings with it, the more prepared
s/he will be, should something like this occur (Hunter, 2006).
A study by Churyk et al. (2008) looked at the problem of fraud and the
authors of this work concentrated on the aspect of fraud detection. It is
acknowledged that the consequences of fraud can be quite devastating and many
large and well-known companies have been recently unraveled by such a problem.
Among them are such companies as Xerox and Enron, just to name a few. As a
result, the authors propose that being able to detect fraud in its early stages is
crucial and, therefore, efforts have to be made in order to come up with strategies
that would enable authorities to detect such a problem early (Churyk et al., 2008).
The study looks at the idea that at the companies where fraudulent activities are
present, the management tends to choose a specific language when providing their
statements and financial information to various auditing entities during mandatory
audits (Churyk et al., 2008).
Churyk et al. (2008) look at a very extensive list of companies and firms
audited by the Accounting and Auditing Enforcement. Moreover, they compare the
language choice among those companies who were audited just once and those
24
companies that were asked to provide their statements with all the required
financial information for the second time. This second time, in turn, is more likely
to mean that there in fact might be something suspicious going on (Churyk et al.,
2008). The findings were quite interesting and those firms that were asked to
provide their restatements, on average, used fewer optimistic words, fewer words in
sentences, more words attributed to downward direction of their respective
company, more words and phrases utilized in past tense and a lot fewer of such
references as I or me; instead, there were more of such words as the company, us
and we. Furthermore, the authors decided to look at the examples of such
companies as Enron and WorldCom and compare the language of their
restatements to statements of those companies that were not asked to provide such
information for the second time (Churyk et al., 2008). The results were compelling
and the difference in the usage of negative words was quite significant (61 vs. 15).
The restatements also contained almost twice as many of the words attributed to
downward direction of the company compared to other companies (Churyk et al.,
2008). According to the authors, the technique of content analysis is not one
hundred percent accurate, but still it is a powerful tool in the hands of accountants
and the financial information provided by companies can reveal a lot of information
that can help to detect fraud in its early stages. Moreover, it will allow professional
accountants to identify information that is misstated and help avoiding much bigger
problems in the future (Churyk et al., 2008).
25
Another type of fraud that has been presenting a pretty serious problem
nowadays is online in-auction fraud, which can consist of such aspects as multiple
bidding or false bids (Dong et al., 2009). With the ever-rising popularity of such
auction websites as Amazon and EBay, the consensus that something has to be
done in regards to online fraud is currently bigger than ever. Dong et al. (2009) take
a look at this problem and try to come up with the solutions that might help to
alleviate this problem. Auction fraud, as described by the authors, can involve pre-,
in- and post-auction fraud (Dong et al., 2009). These categories, in their turn,
include such activities as misrepresentation, black market and non-delivery, among
some others. In-auction fraud can include fraud on both the seller’s and buyer’s
sides and might involve such aspects as false bids, bidding rings or multiple
bidding, to name a few (Dong et al., 2009). Considering the nature of the Internet,
the authors acknowledge that the solution for this problem is not easy to find.
Nevertheless, the authors of this work do propose several computer software and
systems that can make online auctions much safer and more reliable (Dong et al.,
2009).
One of the systems proposed by Dong et al. (2009) should include several
agents in it and each of these agents would be responsible for such areas as
security, bidding, as well as monitoring. This would allow identifying any
suspicious users and activity that are noticed on that particular auction system
(Dong et al., 2009). Other potential solutions might include certain software that
26
would provide cryptographic assistance with locating malicious bidders and
auctions. Also, coming up with effective statistical approach can prove to be very
helpful as well. Various algorithmic equations would be able to, more or less,
accurately tell potential buyers or sellers that a particular account might be
fraudulent. These so-called reputation approaches can be quite complex and do
require analyzing huge amounts of historical data; therefore, they might be very
difficult to create (Dong et al., 2009). In-auction fraud detection is difficult to
achieve and does require some serious and complex mathematical models that
would be able to accurately predict the problem of fraud. Once again, with the
prevalence of the online auction systems nowadays, there is an urgent need to come
up with a model that would be able to effectively protect consumers when shopping
online. It is definitely not easy, but certainly can be done (Dong et al., 2009).
A study on credit card fraud conducted by Slotter (2009) identified several
key areas that are especially problematic nowadays. According to the study, the
vast majority of credit card fraud takes place through mail theft, counterfeiting and
advanced payment schemes. What is usually targeted by mail thieves is financial
information that can contain new credit cards, social security numbers, account
information or credit applications. Once such information is obtained, these
criminals can either use already existing cards or make requests for new lines of
credit with somebody else’s personal information (Slotter, 2009). Another way to
utilize stolen information is by making fake credit cards and considering the type of
27
technology that is available today, such cards can be pretty similar to real ones and
they, as a result, would be very difficult to detect (Slotter, 2009). Advanced
payment schemes can include using more credit than what the line of credit is and
utilizing fraudulent checks. Since it takes time for a check to clear, it might take
some time before such an activity is tagged as suspicious or fraudulent, but at that
point it might be too late (Slotter, 2009).
Nevertheless, there are several things that can be done in order to minimize
the problem of credit card fraud. From the technological perspective, there are
several promising changes that can be introduced and that can have a serious
impact on credit card fraud. One of the changes can be placing photographs on
actual cards (Slotter, 2009). Another innovation can be having computer microchips with personal information inserted into every credit card. Not only will it give
more security and protection to the cards’ owners, but it will give them a chance to
authorize offline transactions and conduct financial activities from remote locations
with more security (Slotter, 2009). Also, the role of law enforcement cannot be
underestimated here, and cooperation among various law enforcement agencies is
very important. Moreover, this problem has to involve agencies on municipal,
county, state and federal levels as this crime does not know boundaries (Slotter,
2009). Credit cards that we know and are familiar with today are more likely to
have some serious changes in the near future, as more and more security features
will be added. However, it will provide for new challenges and opportunities for
28
criminals and more problems for law enforcement when dealing with such crime
(Slotter, 2009).
Sullivan (2008) also looks at the idea of having smart cards implemented.
The author acknowledges the seriousness of the credit card fraud problem and the
impact it has been having on the nation’s economy, as well as its numerous victims
(Sullivan, 2008). Since payment authorization is a pretty efficient step in protecting
a consumer from fraud, it is something that has to be taken seriously. Nevertheless,
since personal information, such as full name, date of birth, social security or home
address, can easily be duplicated and utilized by criminals when using a card for
fraudulent activities, this step has to be taken to the next level (Sullivan, 2008).
Having smart cards with special chips installed that would make copying unique
personal identifiers almost impossible is a great idea (Sullivan, 2008).
However, Sullivan (2008) is concerned that the criminals will shift their
time and efforts towards other types of payments, the ones with weaker security
features. Therefore, according to the author, it would be necessary to ensure that
other payment methods are well protected as well. Furthermore, having a uniform
set of standards can be quite difficult and if there is a complex security system and
if one single authorization process is in place, it is absolutely necessary to have the
standards be clearly laid out and enforced properly (Sullivan, 2008). Even though
the implementation of smart cards do have promising results, it is necessary to
29
remember all the challenges that will arise. Moreover, security measures for other
payment methods have to be improved as well (Sullivan, 2008).
A study done by Barker et al. (2008) on the problem of credit card fraud
also acknowledges
this type of crime and how it is no longer a problem of a
certain region or state, but instead it is now a global phenomenon that affects a lot
of people all around the globe. Furthermore, consequences of this problem can be
very serious and last for a long time after an actual crime takes place. Nevertheless,
certain prevention steps can and have to be taken in order to minimize the impact of
this crime. Barker et al. (2008) also emphasize the importance of computer chips
with personal information being inserted into every credit card. What this means is
that consumers will have much more security as such chips are almost impossible
to duplicate and in order to authorize a transaction, an owner will have to use
his/her PIN number, and not just sign a receipt (Barker et al., 2008).
What also can prove to be helpful is that it might be necessary to introduce
stricter regulations when it comes down to purchasing equipment that is used in
card manufacturing. As a result, if such technology is difficult to obtain, this might
significantly reduce the problem of illegal manufacturing. This step will require a
lot of collaboration on the part of those companies who suffer from this type of
crime, but the final results can be quite good (Barker et al., 2008). The authors also
emphasize the importance of educating merchants to be able to recognize
fraudulent credit cards and any activities that might be suspicious and potentially
30
fraudulent (Barker et al., 2008). Another segment of the population that has to be
educated is consumers. Despite the problem of credit card fraud being so
widespread, many people are still relatively unaware of exactly how serious it
actually is. By educating the general public on such matters as the crime itself and
its consequences and prevention, it would be possible to make the public less
susceptible to becoming victims of the problem of credit card fraud (Barker et al.,
2008).
A study by Levi (1998) also looks at the problem of credit card fraud and
tries to explain how fraudsters tend to adapt to any changes that are being
introduced in order to prevent this problem. The author acknowledges that credit
card fraud usually takes place as a result of a credit card being stolen, either
through mail theft or burglary or robbery, credit application, counterfeit
transactions, manufacturing counterfeit cards or by placing orders using a genuine
card but intentionally indicating a wrong address (Levi, 1998). This study does
acknowledge all the difficulties that law enforcement is facing when dealing with
this problem. Moreover, it states that it is oftentimes the case that criminals are not
caught (Levi, 1998). Also, the author points out that there are several categories of
offenders. Some act on an individual level whereby a person simply uses stolen
cards to buy either a couple of relatively big purchases or several smaller items,
such as groceries or clothes. Others operate on a ‘professional level,’ where they
31
belong to well-organized rings and utilize stolen information for fraudulent
purposes (Levi, 1998).
As a solution for this problem, Levi (1998) suggests that the introduction of
such features as placing fingerprints or pictures on actual credit cards might help in
protecting consumers. Furthermore, adding more and more security features is
more likely to provide more security to credit cards. However, what this will do is
that the crime of credit card fraud is more likely to shift away from the regions
where such cards are widespread to the areas where consumers use cards without
these security features (Levi, 1998). Also, the author suggests that while security
features will keep on developing and improving, so will the criminals’ skills (Levi,
1998). Moreover, certain fraudulent websites can be created with the goal to collect
credit card and PIN number information from their customers. Even though such a
website might look legitimate, in reality it can be a fraud. Therefore, a lot has to be
done in order to develop a security protocol that would provide maximum
protection (Levi, 1998).
A study by Pratt et al. (2010) also looks at the problem of credit card fraud
and tries to integrate the routine activity theory with this problem. According to the
authors, new changes in technology will attract a new segment of potential
offenders, the ones who will be more motivated and who will have more computer
and technology knowledge (Pratt et al., 2010). With the expansion of the Internet,
there has been an increase in the number of a specific sector of criminals –
32
cybercriminals (Pratt et al., 2010). According to the authors, a lot here depends on
how much a person spends time online and whether or not s/he makes any
purchases online and how many. These conditions, in their turn, can predispose one
to becoming a victim of online credit card fraud (Pratt et al., 2010).
The main recommendation the authors are proposing is creating a set of
educational programs that would make sure that the general public is well aware of
all the dangers this problem brings with itself (Pratt et al., 2010). By educating the
public about such aspects as prevention and consequences it would be possible to
ensure that more and more consumers know how to take care of their online
financial business, as well as how to take all the precautionary measures that would
help them keep all the confidential information out of the hands of criminals. A lot
here depends on exposure and target availability. The more time a consumer spends
online and the more financial transactions take place on suspicious websites, the
more exposure there will be and thus, more chances to become a victim of credit
card fraud (Pratt et al., 2010).
Another study by Levi (2008) looks at the types of fraud and how they
change based on various factors, such as economy and age. The author pays special
attention to globalization and it is this phenomenon that brought new types of
fraud, the ones that were not present a couple of decades prior. Such aspects as
business environment as well as how the law is actually enforced oftentimes
dictates whether or not one will engage in fraudulent activities. The study does
33
acknowledge that throughout recent history, not a lot of attention has been given to
the problem of fraud. The author states that the system is more likely to be
interested in more serious crimes and since the victims of fraud are different from
victims of more serious crimes, this crime has not gotten wide recognition until
recently (Levi, 2008).
The problem of fraud and the criminals who are involved in this type of
crime depends on the economic situation inside that particular region. According to
the author, more and more people might be susceptible to committing low-tech
fraud that does not require extensive technological knowledge, which would allow
them to stay afloat and avoid financial crisis (Levi, 2008). They will also be more
likely to take more risks. Moreover, a society can start seeing new types of fraud
due to new industrial or technological innovations. As far as the age factor goes,
those who get involved in technological fraud are more likely to be younger
individuals. The older groups would probably end up committing the type of fraud
that does not require much technological knowledge and that relies on older
programs and innovations, and something that would require engaging in areas that
have been around for quite some time (Levi, 2008).
The aspect of collaboration amongst various entities is also supported by
Greene (2009). In this work, the author once again emphasizes the problems that
credit card fraud and fraud in general bring to American consumers. Moreover, it is
stated that the actual losses associated with fraud are significantly higher than what
34
they are thought to be (Greene, 2009). What is even more problematic is that this
problem is very difficult to fight against, as there has been a shift from one area to
another. In other words, with the development of new technologies and certain
changes in social environment, old methods of fraud get replaced by new types of
fraud (Greene, 2009). However, the main problem stays the same – both the
governmental entities and individual consumers lose many resources as a result of
fraud. Good examples of such changes include relatively new phishing scams or
offshore fraud or even activities associated with recruiting insiders that work in
credit agencies or those organizations that have extensive access to personal
information (Greene, 2009).
The author points out that fraud can have consequences that extend
additional financial losses on individual and organizational levels (Greene, 2009).
Fraud can also present a significant danger to national security and interests abroad.
Therefore, an effective system to combat this problem has to be implemented
(Greene, 2009). The study talks about the special alert programs that would help
banking institutions to receive notifications regarding those credit cards that this
system flags as suspicious. This condition, in turn, might be based on the account
pattern, which can include purchase or withdrawal history, or something that is out
of extraordinary (Greene, 2009). Moreover, the author proposes introducing the
profiling system both for consumers and merchants. This will allow for creating a
consumer profile where data will be stored that would show patterns in one’s
35
purchasing, transaction and withdrawal activities. Therefore, if something unusual
occurs, that particular activity will be tagged and this can potentially result in early
fraud detection (Greene, 2009). But the main aspect that Greene (2009) emphasizes
is collaboration among various industries that is absolutely necessary as the
problem of fraud is simply too big to be fought against separately. Cooperation
from the private sector is also necessary, as new technological developments lead
to new types of fraud. Furthermore, the author refers to the efforts against fraud as
war, and it is impossible to win this war without help from others (Greene, 2009).
A study conducted by Lee et al. (2010) looks at another aspect of fraud –
phantom online credit card transactions. This type of transaction is a fake one and
the key component here is an agreement between a seller and a buyer. The goal
here is to obtain a loan (Lee et al., 2010). The authors acknowledge the importance
of the internet nowadays and how online auctions made everybody’s lives so much
easier when it is almost impossible to find anything that would not be available
online. However, the negative side of all this is that there is plenty of room for
fraud to exist and many criminals take advantage of that (Lee et al., 2010). Despite
all the seriousness that phantom credit transactions mean for auction websites,
detection of this problem has not been easy. Moreover, since it is more difficult to
be detected online, this type of fraud has really blossomed recently, especially on
not-so-well-known auction websites. Lee et al. (2010) developed several strategic
considerations that have to be in place in order to be able to effectively detect
36
online fraud in its early stages (Lee et al., 2010). These considerations are
addressed below.
After having conducted an analysis of online bids for laptop computers, Lee
et al. (2010) had been able to come up with three factors that are present whenever
there is a phantom credit transaction is present. First of all, according to the
authors, the starting bid for that particular item is significantly higher than it is for
the same item on other auctions. Also, such an auction for that item is usually much
shorter as well. And the reason for this is that the goal with a fake transaction is to
close out a deal as soon as possible, as compared to a ‘normal’ auction where the
main priority is to secure the highest payment (Lee et al., 2010). Also, a low
seller’s credit history is a great indicator too. Moreover, the authors state that low
credit is one of the most important signs for the detection of online fraud.
Therefore, credit evaluation systems have to be adopted by auction agencies in
order to be able to get rid of fraudsters (Lee et al., 2010). As a result, all these
factors have to be carefully looked at. Considering that auctions with phantom
transactions on average have 73% of bids that have higher starting prices, 98% of
auctions that are shorter in length and 96% of sellers that have lower credit scores,
these factors have to be examined pretty carefully (Lee et al., 2010). Early detection
might be the key to solution for the problem of online auction fraud (Lee et al.,
2010).
37
Another study on the problem of credit card fraud was done by Prabowo
(2011). According to the author, who also acknowledges all the seriousness of the
problem of fraud, it is very important to come up with effective anti-fraud strategy
and it is absolutely crucial to understand what resources it is necessary to allocate
in order to be able to solve this problem. The author refers to the fight against this
type of crime as when two players are playing chess. In other words, there is a lot
of strategy on both the offenders’ and the law enforcement agencies’ parts. Actions
of one player are in large part dictated by actions of another. And in the end, of
course, the winner will be the player who has a better strategy and who managed to
come up with a more sound strategy (Prabowo, 2011).
The main recommendation that Prabowo (2011) gives is that when
combating the problem of credit card fraud, the aspect of prevention has to be
considered just as important as investigation and prosecution. Also, it is very
important to be able to anticipate future threats and be ready for them. In fact, it has
to have the same priority level as fighting against current and existing threats. Due
to technology that is constantly developing, new types of fraud are evolving as well
and criminals take opportunities to explore new areas that potentially might have
security gaps. As a result, new and previously unseen types of crime appear and
modern law enforcement has to be ready for that (Prabowo, 2011). Also, the author
emphasizes the idea of cooperation among numerous players, such as individual
consumers, merchants, government entities, banks and other financial institutions
38
(Prabowo, 2011). Without such a cooperation and having one goal in common, it
will be very difficult to stop the crime (Prabowo, 2011).
A study by Gates and Jacob (2009) also emphasizes cooperation between
the government and private sector as something that is absolutely necessary.
Moreover, they state that fraud is something that is always going to exist in one
form or another and if we were to get rid of all forms of fraud altogether, it would
be necessary to shut down all payment systems (Gates & Jacob, 2009). Obviously,
this is not going to happen. What can be done, however, is to try maximizing data
security. This, in turn, can be achieved when various players, both from public and
private sectors, buy into this system. What is also necessary is to create some form
of uniformity with a clear set of standards and rules (Gates & Jacob, 2009). The
authors also emphasize that the aspect of innovation cannot be impacted here. Once
again, Gates and Jacob (2009) also acknowledge constantly developing technology
and the problem of fraud that is evolving as well. With so many different
perspectives on fraud, its consequences, and its future, it is very important to find
some form of consensus, which will be absolutely crucial in the future combat
against this problem (Gates & Jacob, 2009).
Caminer (1985) also acknowledges the importance of the cooperation
among various actors in the fight against this problem. The author states that this is
problem is not likely to go anywhere anytime soon. Considering that this crime
actually grows faster than the use of credit cards themselves, certain anti-fraud
39
measures have to be implemented. The fact that fraud is so widespread nowadays is
in large part due to a high number of credit cards that so many consumers possess
(Caminer, 1985). Furthermore, the crime of fraud is not easy to detect and since all
that the criminals need to have is a credit card number and not the actual card, the
crime of fraud is not technologically complicated and does not require extensive
knowledge (Caminer, 1985).
The author states that despite the anti-fraud measures taken by the credit
issuing agencies, they are not likely to have a long-term effect (Caminer, 1985). In
fact, the result is most likely to have a short-term impact. What is necessary,
however, is a strong federal legislation that would thoroughly address this problem.
In addition to cooperation, it is also expected that various governmental entities
will invest a significant amount of resources that would be necessary to not just
combat the crime, but also to understand the nature of the problem. Also, it can
lead to the introduction of a clear set of standards and definitions that would allow
for a more effective implementation of such legislation (Caminer, 1985).
The Fair and Accurate Credit Transactions Act (2003)
The Fair and Accurate Credit Transactions Act of 2003 was created in order
to amend the Fair Credit Reporting Act and add new sections that would make the
legislation stronger in terms of its efforts in combating the problem of identity
theft, as well as give consumers more rights and protection in order to avoid this
very serious problem (Privacy Rights Clearinghouse). Among the new changes
40
were such aspects as how one’s personal information could be shared, privacy,
accuracy, as well as consumer rights. One of the initiatives that was specifically
emphasized by the legislation creators was monitoring, and one of the means
through which a consumer can ensure that his personal information is up to date
and not being used by somebody else is through getting a credit report. Every
consumer has a right to obtain one free credit report per year through all three
major credit reporting agencies – Experian, TransUnion, and Equifax (Privacy
Rights Clearinghouse). Before the F.A.C.T.A. went into effect, consumers had to
pay for such services. Nowadays, however, anybody can order such a report
through a particular website (e.g., annualcreditreport.com or freecreditreport.com)
or by calling a certain number that also can be found there. Also, one is entitled to a
copy of his/her free report even if s/he is unemployed at the time of request.
Therefore, the main idea behind this is that if a consumer can get access to such a
report and be able to monitor his/her credit history, s/he is more likely to notice any
abnormalities with his account and stop the problem of identity theft in its earliest
stages (Privacy Rights Clearinghouse).
Another change that was brought by the implementation of the F.A.C.T.A.
was the fraud alert system. By calling credit reporting agencies consumers now
could place a 90-day fraud alert on their account. While doing this, they also had to
make sure to provide proof of their identity to the agency where they are calling to
make a fraud request. This alert, however, could be extended up to seven years,
41
given that a consumer could provide a reason for such an action, along with a
police report that would justify such a drastic measure (Privacy Rights
Clearinghouse). Also, what was proposed was the ability of military personnel to
place alerts on their account that would warn the credit reporting agencies in case if
there is something suspicious going on with these accounts. In other words, if a
person is out of the country, and yet his/her account is being used or new credit
cards are being requested, that would give something to think about to the credit
agencies and hopefully make an inquiry in regards to what might be going on
(Privacy Rights Clearinghouse).
Also, whenever a fraud alert is placed and a credit reporting agency is asked
to provide additional credit, it is their responsibility to try to contact a consumer
whose name is being used for requesting a new line of credit. This can be done
either through a phone number or regular mail (Privacy Rights Clearinghouse).
Moreover, the agencies also have to make sure that the identity of a consumer is
verified. Furthermore, whenever a fraud alert is requested, a consumer has the right
to obtain a free copy of his credit report. Finally, credit reporting agencies can also
block certain things on one’s credit report history that had been caused by the crime
of identity theft (Privacy Rights Clearinghouse).
Under the F.A.C.T.A., receipts for credit transactions cannot contain more
than the last five account numbers. Moreover, these receipts cannot contain
expiration dates. The intent behind this is to limit the identifying information
42
should a criminal get access to such a document (Privacy Rights Clearinghouse).
Also, whenever a consumer requests a copy of his/her file, s/he may ask for the last
five digits of his social security number to not be included in the paperwork. As far
as victim rights go, a consumer may request transaction records and all the reports
available regarding a crime from the businesses where that consumer’s personal
information had been used. A consumer has to make sure that such a request is
made in writing and that his/her identity is verified. Nevertheless, a business can
still reject the request if they are unable to verify the requesting party’s identity, as
well as if there are some misrepresentations of certain facts (Privacy Rights
Clearinghouse). Furthermore, if a collection agency is contacting a consumer in
regards to a debt that has been the result of the crime of identity theft, then a
collection agency has to clearly state that. Also, a creditor is entitled to get an
activity history that would include prior credit applications, as well as an account
summary (Privacy Rights Clearinghouse).
What also was emphasized by the F.A.C.T.A. legislation is that a lot has to
depend not just on individual consumers, but on the credit reporting agencies as
well, and they are the ones who have to take appropriate steps in making sure that
their clients’ personal information is not being used for criminals’ gains (Privacy
Rights Clearinghouse). As a result, the new system of ‘red flags’ was implemented
to warn these agencies that there could be something suspicious going on with a
particular account. As established with assistance from the F.A.C.T.A. among the
43
most common red flags included the following facts: fraud alerts placed by
consumers, unusual trends and patterns in one’s purchasing and activity history,
documents that appear to be forged or that are inconsistent with what the agency
has on file, suspicious home addresses or phone numbers or if they have been
noticed on prior fraudulent applications, suspicious social security numbers that do
not match a date of birth or a name on file, relatively prolonged inactivity of an
account followed by a series of transactions, mail being returned while the account
is still being used, or if there are notices from an account holder, as well as law
enforcement agencies (Privacy Rights Clearinghouse).
Another significant and quite common red flag is a change of address
followed by a request for a card replacement. As a result, it is the responsibility of
an agency issuing a credit card to take all necessary steps to verify the validity of a
change of address. Moreover, whenever there is a change of address and a request
for a new card, credit issuers have to contact a consumer whose name is being used
to make sure that the requests for changes are legitimate and this has to be done
within the first thirty days upon receiving a request (Privacy Rights Clearinghouse).
Also, whenever there is a request for a consumer report, either through a credit card
application or a rental agreement, the credit reporting agencies have to corroborate
with the entities from where the request for consumer reports have originated and
have to report any discrepancies in such areas as name or contact information.
44
Financial institutions, in turn, have to take all necessary steps to ensure that the
creditor’s information and identity are verified (Privacy Rights Clearinghouse).
Under the F.A.C.T.A., all businesses that deal with consumer reports have
to take all necessary measures to make sure that these very reports or any other
reports that contain personal identifying information are properly destroyed and
thus, will not end up in the hands of criminals. The agencies that fall under the
category of those who have to work with consumer reports the most include
insurance agencies, automobile dealers, landlords, government agencies and
employers (Privacy Rights Clearinghouse). Also, consumers were granted certain
rights by the implementation of the F.A.C.T.A. legislation. Among them are the
rights to block any information that has been the result of identity theft, as well as
to receive copies of all the documents, application or any records that had been
used in the commission of the crime. Finally, credit reporting agencies have to give
the victims of this crime a notice with what specific rights they have (Privacy
Rights Clearinghouse).
Another aspect that is emphasized by the F.A.C.T.A. is accuracy and,
therefore, making sure that all the information contained in the report is accurate is
crucial. Under this new legislation, financial institutions are now obligated to
provide early warnings for consumers whenever there is something suspicious
going on with that particular account (Privacy Rights Clearinghouse). Also, the
aspect of privacy is prioritized as well, and no consumer report can contain any
45
information that would be related to one’s medical records. Moreover, a
consumer’s consent is required if his/her medical information is to be released
either for employment or credit purposes (Privacy Rights Clearinghouse). Other
rights under F.A.C.T.A. include workplace investigations, sharing of information,
as well as how to dispute and resolve certain disagreements which are the results of
inaccurate credit report or findings (Privacy Rights Clearinghouse).
Holtfreter and Holtfreter (2006) looked at the impact of the Fair and
Accurate Credit Transaction Act (2003) in conjunction with the Identity Theft
Penalty Act (2004). The authors acknowledged the importance of similar
legislation and the fact that amendments would be added to both laws in the future.
Nevertheless, the main conclusion of the study was that it would take some time in
order to be able to draw a sound conclusion. More data were needed and also
Holtfreter and Holtfreter (2006) proposed an idea that it could be quite useful,
which was to do a cross-cultural analysis and compare anti-identity theft efforts to
those of foreign nations (Holtfreter & Holtfreter, 2006).
Conclusion
This literature review shows that the main purpose of the situational crime
prevention framework is to identify and implement the ways for reducing the
number of opportunities for a criminal to commit a crime. Target hardening, in
turn, is the central idea. Target hardening can be done through a variety of ways,
starting with not using one’s mailbox for outgoing mail and ending with rational
46
behavior when being online, such as not using suspicious websites or indicate
personal information on those websites that do not have security system installed.
The situational crime prevention perspective is developed separately for every type
of crime and its measures are specific, depending on what they are directed at. In
other words, what can be applied to auto theft prevention is useless in an effort to
reduce the amount of drugs on the streets. What works for preventing an identity
theft would not work for avoiding situations that might result in violent assault.
Despite the specificity and uniqueness of this framework in regards to each separate
type of crime, they, nevertheless, share all the main fundamentals of this model.
Auto theft prevention measures, for example, could involve such strategies
and techniques as making sure that a car is always locked when left unattended and
that the ignition keys are never left in the car and if held at home, be kept in a safe
and secure location. Manufacturers, by introducing new security features, can also
significantly lower the risks of a car getting stolen. In the meantime, increased law
enforcement patrol of the ‘hot spots’ along with implementation of such programs
as the ‘bait car’ can deter potential thieves as well (Linden & Chatuverdi, 2005).
Also, increased patrols of the ‘hot spots’ can be very efficient for reducing the
number of drugs on the streets. Restricting access to the key ingredients, from
which some illicit drugs are made, can reduce the amount of those drugs produced.
New policies and regulations directed at those types of drugs and all associated
penalties can prove to be very efficient as well (Shukla & Bartgis, 2010).
47
Such simple measures as shredding all unnecessary financial paperwork and
not using one’s mailbox for outgoing mail can prevent one from becoming a victim
of identity theft. Numerous laws that target cyber crime can also be very effective.
For example, the Federal Information Security Management Act was implemented
in 2002 that required all federal agencies to develop and implement a security
system that would protect their employees’ personal information. Such a system
was supposed to protect personal information from unauthorized access and use, as
well as guarantee confidentiality. The result was a much better security protocol for
federal employees (NIoSaT). Likewise, a simple change in lighting system and
surveillance system can make a public parking garage much safer, for example. The
introduction of the surveillance system and good locks can also have a positive
effect on safety of convenience stores and apartment complexes (Farrington et al.,
2007). Finally, being rational when it comes to alcohol consumption (i.e., drinking
in moderation) and not use alcohol with strangers at unfamiliar settings and
willingness to have an open and sincere discussion with a partner, along with
various educational programs on sexual assault prevention, can prove to be crucial
in preventing one from becoming a victim of rape (Parkhill et al., 2009).
Despite the fact that each of these types of crime involves different
measures, they all, as it was mentioned previously, share the main fundamentals.
Whatever the particular type of crime might be, the main goal of the situational
crime prevention framework is to make the target as difficult to reach for the
48
offender as possible. Besides making it too difficult, this model focuses on making
it too risky as well. If potential risks outweigh the potential benefits, an offender
would most likely not go for it. Finally, another important detail that one can see
from this literature review is that, whether the crime is identity theft or fraud, crime
prevention depends a lot on a would-be-victim’s behaviors and preventative
actions, as well as the tactics used by would-be criminals. In other words, in most
cases proper and timely precautions can reduce the chances of becoming a victim.
Victims are usually the ones who, due to their lack of attention or just simple
carelessness, provide opportunities for criminals and all that the latter ones have to
do is just to seize the moment. Therefore, by being more careful and aware, one can
significantly reduce the number of opportunities for an offender and that will
demonstrate the main principle of the situational crime prevention perspective at
work.
49
Chapter 3
Methodology
Research Design
In general, this research is designed to be exploratory and descriptive. It
explains how the presence or absence of the F.A.C.T.A (2003) affects identity theft
crimes and fraud complaints. Specifically, the research examines the impact of the
F.A.C.T.A. legislation on the total number of incidents reported, the total number
of fraud complaints, and how personal information is being misused (which will be
represented by the following categories: credit card fraud and bank fraud). The
importance of this analysis cannot be underestimated, as it will help to determine
the effect of this particular federal legislation on the problem and show what works
and what does not from the letter of the law perspective. It will demonstrate how
such protective policies impact the problem of identity theft and how this
legislation might be improved and what amendments might be necessary in order to
make it more effective in terms of lowering identity theft and fraud-type crime.
Therefore, this research will examine how the implementation of the legislation has
impacted the problem of identity theft and fraud.
This study will implement the interrupted time-series design. The
interrupted time-series design demonstrates an effect of a treatment or an
intervention that can be seen through the change in patterns of the pre- and posttreatment/intervention periods of time (Glass, 1997). Such an effect can be seen and
50
measured only if there is a difference in these pre- and post-treatment results
patterns (Lewis-Beck et al., 2004). In other words, if what is being measured does
not differ at all, then it would be very difficult to find any statistical significance in
the introduction of that particular treatment option and make any conclusions. And
on the contrary, if these patterns clearly differ from one another, then it is possible
to demonstrate the effect of that treatment. Moreover, the interrupted time-series
design includes repeated measurements of a dependent variable taken over a certain
period of time both before and after the introduction of an intervention and then,
any changes in these measurements can be compared to one another, as well as
both pre- and post-intervention periods of time can be compared to each other as
well. As a result, any effects of the independent variable (treatment or intervention)
can be observed and recorded (Lewis-Beck et al., 2004).
Data Collection
The data collection strategy for this study is through a primary data source,
which is the database created by the Sentinel Consumer Network and that belongs
to the Federal Trade Commission. The data have already been compiled and
currently exist in the form of several different reports and each report represents a
certain calendar year and consists of numerous sections, among which are fraud
and identity theft complaints, victim characteristics and statistics for every
individual state. Each section has several subsections in it; each of the subsections
provides more details for that particular section covering a specific side of the
51
identity-theft problem. These reports are widely available to the public and are
accessible by going to a Federal Trade Commission website
(http://www.ftc.gov/bcp/edu/microsites/idtheft/ reference-desk/national-data.html),
where one can see a series of PDF files with each report having a proper title.
Therefore, no extensive technological knowledge on part of a reader is required to
be able to access these files.
The database, which comprises the statistical portion of the reports from
where the required data will be extracted, includes national statistics for
consecutive years (2000-2010). These statistics include the number of incidents
reported, fraud and identity theft complaints, crime descriptions, victim
characteristics, amounts of monetary losses, as well as state complaint information
and state and metropolitan areas ranking.
Independent and Dependent Variables
The independent variable (IV) for this research will be the presence or
absence of the F.A.C.T.A. (2003) legislation. The F.A.C.T.A. legislation itself is
fixed and cannot change. Therefore, it is its presence or absence (before and after
the F.A.C.T.A. was enacted) that will be evaluated with respect to how it affects the
dependent variables. The research will be measuring the impact the independent
variable - presence or absence of the F.A.C.T.A. - has had on the problem of
identity theft.
The dependent variables (DV) in this research will be the total number of
52
identity theft incidents reported, the total number of fraud complaints, and how
personal information is being misused. This last dependent variable (‘how personal
information is being misused’) will include the following categories as types of
misuse: credit card fraud and bank fraud. The impact of the IV on the DVs will be
expressed in terms of changes in the number of identity theft incidents reported, the
number of fraud complaints, as well as how personal information is being misused.
In terms of the present research, the dependent variables will be examined
before and after the introduction of the F.A.C.T.A. (2003) legislation. In other
words, the research will be looking at the data for the period of 2000-2002, before
the treatment was introduced, which in the study will be the F.A.C.T.A. (2003), and
the data that will demonstrate what had occurred following the implementation of
this legislation and that will be the period of 2003-2010. The two periods of time
(pre- and post-treatment) are not equal in length; however, this is due to lack of
data availability on identity theft for the period of time preceding 2000. The
statistics were taken for each year separately and comparison will be made on a
year-by-year basis for the two periods of time (before and after).
Hypotheses
H1: Following the implementation of the F.A.C.T.A. legislation, the total number
of identity theft incidents, as well as identity theft rates, will decrease.
H2: Following the implementation of the F.A.C.T.A. legislation, the total number
of fraud complaints, as well as fraud complaints rates, will decrease.
53
H3: Following the implementation of the F.A.C.T.A. legislation, the number of
incidents where personal information is being used for the purposes of credit card
fraud and bank fraud, as well as credit card fraud and bank fraud rates, will
decrease.
Data Analysis
It is expected that with the implementation of the F.A.C.T.A. legislation, the
number of identity theft and fraud incidents cases, as well as their rates, will
decrease. This is thought to be the case because the new legislation, as well as
credit-issuing agencies having stricter monitoring and screening procedures when
issuing a line of credit, will lead to few incidents of identity theft and fraud.
Another aspect that is expected to have changed is how personal information is
being misused. It is expected that the number of the cases where personal
information is being used for the purposes of credit card fraud and bank fraud, as
well as these crimes’ rates, has been decreasing.
For the purpose of data analysis for this research, the Excel spreadsheet
software will be utilized. The statistics used for this research includes the total
number of incidents reported, the total number of fraud incidents reported, as well
as the number of cases where personal information had been used for bank fraud or
credit card fraud. Moreover, for the ‘how personal information is misused’
dependent variable, which includes ‘bank fraud’ and ‘credit card fraud’ as types of
misuse, the statistics also include what the percentages for that particular crime for
54
that specific year are in relation to all other types of fraud for that calendar year.
The statistics used in this work are representing eleven calendar years, 2000-2010,
and the two tables utilized in this study include the names of the dependent
variables, the years that are considered, as well as the numbers for every variable
that this research is looking at for every corresponding year.
Data Analysis – Coding Sheets
Secondary data analysis on a primary data source, which consists of a
series of the Consumer Sentinel Network reports that are publicly available on the
Federal Trade Commission website, was utilized in this research. This study has
two different coding sheets. These coding sheets can be found in Appendix A. The
first coding sheet contains the data for these two dependent variables: the total
number of incidents reported and the total number of fraud complaints. These
statistics will be represented in numbers, and not percentages. The required data
will be extracted from the database and inserted into the appropriate table. The first
coding sheet has three vertical columns (year, the total number of incidents
reported, the total number of fraud complaints) and twelve vertical rows (one for
each year – 2000-2010 – and one for the dependent variables). The second coding
sheet contains the required data from the same database and it will be created for
the ‘how personal information is being misused’ variable. It has twelve vertical
columns (one for each year – 2000-2010 – and one for the type how personal
information is being misused). The numbers in this coding sheet will be
55
representing the number of incidents for the following types of how personal
information is being misused: credit card fraud and bank fraud.
The data have already been compiled and currently exist in the form of
several different reports and each report represents a certain calendar year and
consists of numerous sections, among which are fraud and identity theft
complaints, victim characteristics and statistics for every individual state, as well as
different metropolitan centers. Each section has several subsections in it; each of
the subsections provides more details for that particular section covering a specific
side of the identity-theft problem. Every report also has the list of appendices that a
reader can find throughout the document.
More specifically, the reports are located in the ‘Fighting Back against
Identity Theft’ section. Also, all of them belong to the national data category and
represent formal Federal Trade Commission complaint data. There are eleven
reports for each calendar year starting from 2000 and ending in 2010. Each
reporting year starts in January and ends in December. The national data provided
in this section also includes the 2003 and 2006 identity theft survey reports.
Moreover, one of the files provides the Federal Trade Commission overview of the
identity theft program. Every report consists of numerous charts, graphs, tables and
other visual aids for representing the data. The reports have background
information on the Consumer Sentinel Network, an organization responsible for
creating the database, as well as an overview of the identity theft problem. There is
56
no narrative portion in these reports, but instead, the rest of them consist of
statistical data for a variety of already aforementioned categories.
Human Subjects
Despite the use of secondary data analysis on a primary data source, it was
necessary to submit an application to the Division of Criminal Justice’s Human
Subjects Review Committee for evaluation. A copy of the application submitted for
approval can be found in Appendix B. This research uses data from the Federal
Trade Commission database. Since the data has previously been collected and
published on a publicly accessible website and is deidentified, the research is
considered exempt. No plan for the protection of the data is warranted. Since the
database from which the necessary data will be taken is publicly available, this
study does not need any security measures, data handling procedures, retention
procedures, data destruction date or any other similar aspects. Also, since this
research is relying on secondary data analysis, there are no subjects that will
participate in the study. Therefore, there is no plan for recruiting people and
creating criteria for inclusion or exclusion. Neither are there any inducements for
subjects’ participation. Since the researcher has no affiliations with the Federal
Trade Commission or any legislators and policymakers behind the Fair and
Accurate Credit Transactions Act (2003), the U.S. Congress or any credit reporting
agency, no conflict of interest is expected. The researcher’s role in this study will
be solely to analyze the impact of the F.A.C.T.A. (2003) legislation. The results of
57
this study, regardless whether or not the main hypothesis is supported, will be
recorded and reflected in the ‘analysis’ and ‘conclusion’ sections of this research.
Strengths & Limitations of the Research
This study has its strengths and limitations. The main strength of the
research is that it will provide the latest trends and patterns for this type of crime.
Specifically, it will shed some light on the effectiveness of the F.A.C.T.A. (2003)
legislation and whether or not it would be practical to implement similar types of
laws in the future and, therefore, will help to develop something that would be
more efficient and effective. The implementation of the interrupted time-series
design and looking at any changes bring some advantages, as it is possible to look
at the identity theft situation and how it had been changing from one year to
another. Also, this will illustrate the whole picture for the pre- and post-treatment
periods and would allow comparing them with one another as well.
The main limitations for this study, however, will be the fact that there
might be additional factors responsible for any changes observed and, as a result,
something else in reality might be the biggest contributing factor. Therefore, it is
always important to keep in mind the idea that there might be something else that
could have influenced the final results.
58
Chapter 4
Analysis of the Findings
Introduction
This study implemented the interrupted time-series design, in which the
dependent variables were looked at before and after the introduction of the
F.A.C.T.A. (2003) legislation (treatment). In other words, the research looked at
the data for the period of 2000-2002, before the treatment was introduced, and the
data that demonstrated what had occurred following the implementation of this
legislation and that would be the period of 2003-2010. The two periods (pre- and
post-treatment) are not equal in length; however, this is due to lack of data
availability on identity theft for the period preceding 2000. Once again, the study is
interested in how the problem of identity theft, which was represented in changes in
such characteristics as the number of fraud complaints, the total number of
incidents and how the stolen personal information is being misused, has changed
starting from the aforementioned periods of time before the legislation took effect
and after it was enacted. The statistics were taken for each year separately and
comparison was made on a year-by-year basis for the two periods of time (before
and after). Furthermore, the pre- and post-treatment periods of time were compared
with each other as well.
59
Analysis of Dependent Variables
The Total Number of Identity Theft Incidents and the Rates of Identity
Theft Incidents. The first dependent variable that this study examined was the
‘total number of identity theft incidents’ and the ‘rate of identity theft incidents’ is
the second variable. The data for these two dependent variables were represented
through the actual number of incidents recorded and the rates of identity theft
incidents. The relationship between the independent variable, which is presence and
absence of the F.A.C.T.A. legislation, and these particular dependent variables was
opposite from what was hypothesized. In other words, with the presence of the
treatment (the legislation itself), the total number of incidents, as well as the rates
of identity theft incidents, should have gone down, but instead, the number of
incidents and the rates went up.
Table 1 below presents the data (along with the data for the ‘total number of
fraud complaints’ variable) for the ‘total number of identity theft incidents’
variable. While trying to compare the first three years of the pre-treatment period of
time and how the situation had been changing from one year to another, it can be
seen that the number of incidents had been on the rise throughout that specific
period. The year of 2001 saw an increase of the incidents reported in the amount of
almost 100,000 compared to the year of 2000 (325,519 compared to 230,628).
Furthermore, in 2002, there were more than 551,000 incidents recorded and that
was almost 226,000 more incidents than in the year prior. As it can be seen, the
60
period of time preceding the implementation of the F.A.C.T.A. legislation had
witnessed an increase in the number of incidents reported with an approximately
100,000 increase in 2001 and an approximately 226,000 increase in 2002.
Table 1
Total Number of Incidents and Total Number of Fraud Complaints
Year
Total Number of Incidents
Total Number of Fraud
Complaints
2000
230,628
111,255
2001
325,519
137,306
2002
551,622
242,783
2003
713,657
331,366
2004
860,383
410,298
2005
909,314
437,585
61
2006
906,129
423,672
2007
1,066,150
503,797
2008
1,241,086
609,595
2009
1,377,845
680, 704
2010
1,339,265
725,087
The first year following the implementation of the treatment, the year of
2003, saw 713,657 incidents and that was approximately 160,000 more than what
was recorded in the last year of the pre-treatment period (713,657 vs. 551,622). The
next year, 2004, had more than 860,000 incidents recorded and that represented an
increase by almost 150,000 compared to the previous year. The following year,
however, the year of 2004, also saw an increase in the number of incidents
reported, but compared to 2004, the difference was only about 50,000 incidents
(909,314 in 2005 vs. 860,383 in 2004). Year 2006 shows that the number of
incidents was not rising as it had been in prior years. Moreover, the year of 2006
62
actually saw a decline in the number of incidents and the number dropped by a little
bit more than 3,000 incidents compared to the previous year. However, this trend of
slight rise and even decline in the number of incidents reported was very brief and
the year of 2007 witnessed more than 150,000 incidents compared to 2006
(1,066,150 vs. 906,126). This trend continued in 2008 as there was an increase by
almost 180,000 incidents and the year of 2009 saw another rise when there were
recorded almost 1,378,000 incidents and that was approximately 135,000 incidents
more than in the year prior. Finally, the last year that this research was looking at,
2010, had seen a decline by almost 40,000 in the number of the cases recorded
(1,339,265 vs. 1,377,845).
The relationship between the independent variable (presence or absence of
the F.A.C.T.A. legislation) and this particular dependent variable, the total number
of identity theft incidents, is opposite from what was hypothesized. It is
hypothesized that with the implementation of the F.A.C.T.A. legislation, the
number of incidents and the crime rates would decrease. What this shows is that
this particular hypothesis is not supported. It is necessary to point out that the
number of incidents had been on the rise in the years preceding the treatment.
Moreover, the last year of the pre-treatment period, the year of 2002, saw
approximately 320,000 incidents more compared to the first year of the same
period, the year of 2000. Following the implementation of the F.A.C.T.A., the
number of incidents had been steadily rising and five calendar years (2003, 2004,
63
2007, 2008, and 2009) had witnessed an increase of more than 100,000 incidents
compared to the previous year. There was an interesting trend that was observed
two different times, however very brief, when the number of incidents reported was
on the decline. The year of 2006 saw about 3,000 incidents less than what was
recorded in 2005 and the year of 2010 saw approximately 40,000 incidents fewer
compared to 2009.
The number of the incidents reported had been going up following the
implementation of the F.A.C.T.A. with the exception of the year of 2006, when
there was a relatively small decline in the amount of approximately 3,000 incidents.
However, what followed that year was another three years where the numbers were
once again going up by at least 100,000 incidents until there was a second decline,
in the amount of about 40,000 incidents, in 2010. Figure 1 below shows the trends
observed while conducting this study. Due to data availability limitations, it is
unclear if that was just a one year decline or something that could represent the
beginning of a new trend. Therefore, since there is no data for the years of 2011 and
2012, there is no way to say how the year of 2010 looks like in relation to the
following years.
64
1,600,000
1,400,000
1,200,000
1,000,000
800,000
600,000
400,000
200,000
0
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
Figure 1. The Total Number of Identity Theft Incidents
As far as the rates of the identity theft incidents go, the trend observed here
is very similar to the trends that can be seen when looking at the raw numbers. For
the purpose of this study, the rates are represented by a number of the identity theft
incidents per 100,000 residents of the United States. The formula for calculating
these rates was the total population divided by 100,000, and then number of crimes
for the ‘total number of identity theft incidents’ and the ‘total number of fraud
complaints’ variables was divided by the result from the first equation. The data for
the U.S. population were taken from the U.S. Census Bureau.
The Figures 2 and 3 below show the data for the U.S. population and the
rates of the identity theft incidents, respectively. The very first year that this study
looked at, the year of 2000, had a rate of 81.74 incidents per 100,000 residents.
65
During the year of 2001, this rate went up to 114.23 incidents. The last year of pretreatment period, the year of 2002, saw a rate of 191.78 incidents. As it can be seen
here, these rates had been steadily going up and the last year of the pre-treatment
period, 2002, saw an increase of approximately 110 incidents per every 100,000
residents of the United States.
The first year following the implementation of the F.A.C.T.A., the year of
2003, had a rate of 246 incidents per 100,000 residents. The rate continued to rise
and in 2004 it was 293.84 incidents. Furthermore, this trend continued in 2005 as
well, and it became 307.7 incidents. Just like the total number of identity theft
incidents went down in the year of 2006, the same goes for the rate of the identity
theft incidents, as it went down by almost 4 incidents per every 100,000 (303.68 vs.
307.7). Nevertheless, this trend of the rate going down did not last, and the year of
2007 saw another increase and the rate of identity theft incidents became 353.93
incidents. In 2008, there was another increase of more than 50 incidents per every
100,000 residents and now was 408.13. The year of 2009 saw an increase again,
and the rate for this year was 449.15 incidents. Finally, in 2010, the rate went down
to 432.93 incidents. It is necessary to point out that the total number of identity
theft incidents went down as well.
66
315,000,000
310,000,000
305,000,000
300,000,000
295,000,000
290,000,000
285,000,000
280,000,000
275,000,000
270,000,000
265,000,000
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
U.S. Population (2000-2010)
Figure 2. The U.S. Population (2000-2010)
449.15
432.93
408.13
353.93
293.84
307.7
303.68
246
191.78
114.23
81.74
2000
2001
2002
2003
2004
Figure 3. The Identity Theft Rates
2005
2006
2007
2008
2009
2010
67
Nevertheless, it is safe to say that the total numbers of the incidents reported
after the F.A.C.T.A. got implemented in 2003, as well as the rates of the identity
theft incidents, in fact had been rising. Compared to the very first year that this
research looked at, the year of 2000, the final year of this study, the year of 2010,
saw almost a 580% increase in the number of incidents. It is necessary to
acknowledge that the number and rates of identity theft incidents had been going
up during the pre-treatment period as well. The rate of these incidents per every
100,000 residents had been rising as well, and the last year that this research looked
at, 2010, saw an increase of approximately 351 incidents per 100,000 residents.
This might suggest that there potentially can be additional factors present that were
responsible for this situation. For example, more people could have been reporting
more crimes or the law could have been capturing more crimes. In addition, the rise
in the number of this crime could have been due to the development of new
technologies, which might have created more opportunities of which criminals may
take advantage. The data leave open the likelihood of another factor influencing the
declining rate of the number of identity theft incidents since the enactment of the
F.A.C.T.A..
Total Number of Fraud Complaints and Fraud Complaints Rates. The
third and fourth dependent variables that this research examined were the total
number of fraud complaints and the rates of fraud complaints. The relationship here
is the opposite of what was hypothesized; in other words, with the implementation
68
of the F.A.C.T.A. legislation, the total number of fraud complaints and the rate of
fraud complaints should decrease. The independent variable is the same – it is the
presence or absence of the treatment (F.A.C.T.A.), and these particular dependent
variables involve the total number of fraud complaints, as well as rates of fraud
complaints. All the data are represented through the actual numbers and rates of
fraud complaints. When looking at the pre-treatment period of time, it can be seen
that the number of fraud complaints had been going up. The very first year that this
study was concerned with, 2000, had 111,255 incidents recorded. The following
year saw over 26,000 complaints more (137,306 vs. 111,255). The year of 2002
had experienced a much higher increase in the number of fraud complaints – this
time it was more than 105,000 complaints more compared to 2001. As a result, a
certain trend can be seen for the years preceding the implementation of the
treatment – the number of fraud complaints had been going up. It is also necessary
to point out that compared to 2001, in 2002 the number of complaints went up by
almost four times more than in the previous year.
The first year of the post-treatment period, the year of 2003, had witnessed
an increase in the amount of almost 90,000 complaints compared to the last year of
pre-treatment period (331,366 vs. 242,783). This trend continued in 2004, when
there was an increase in the number of complaints again; however, this time the
total number went up by approximately 80,000 cases. Another increase, although
smaller than for the year prior, was observed for the year of 2005 as well. The
69
number of fraud complaints went up by about 25,000 complaints. However, the
trend of increasing numbers of complaints stopped in the year of 2006 when the
number dropped to 423,672 compared to 437,585 in 2005. That represented an
approximately 14,000 decline in the number of fraud complaints. But that did not
materialize in any kind of trend as the very next year, the year of 2007, saw an
approximately 80,000 increase (503,797 compared to 423,672 in 2006). Moreover,
the very next year, 2008, saw even larger increase as the total number of fraud
complaints went up by almost 106,000 cases (609,595 for the year of 2008). The
year of 2009 saw another increase in the number of complaints and even though it
was not as great as for the year prior, it still represented an approximately 70,000
increase. Finally, the last year of the post-treatment period, the year of 2010, had
witnessed an approximately 45,000 increase (725,087 vs. 680,704 in 2009). The
trends discussed in this part are illustrated in Figure 4, which can be found below.
70
800,000
700,000
600,000
500,000
400,000
300,000
200,000
100,000
0
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
The Total Number of Fraud Complaints
Figure 4. The Total Number of Fraud Complaints
As far as fraud complaints rates go, there had been a trend similar to the
trend observed with the raw numbers of fraud complaints. The very first year that
this research looked at, the year of 2000, saw the rate of 39.43 complaints for every
100,000 residents of the United States. The rate went up by slightly less than 9
complaints during the next year, 2001, and became 48.18 complaints. However, the
following year, 2002, saw an increase that was much larger that what was observed
in 2001 and the rate of fraud complaints for every 100,000 residents became 84.41
complaints.
The first year following the implementation of the F.A.C.T.A., the year of
2003, saw another increase in the rate of fraud complaints and it became 114.22
complaints. In 2004, this trend continued and the rate became 140.12 complaints
71
for every 100,000 residents. The year of 2005 saw the rate of 148.07 complaints
and that was almost 8 complaints more than what was recorded in 2004. The year
of 2006, however, saw a decline in the rate of fraud complaints. This is similar to
the number of fraud complaints, as this number went down as well. In the year of
2006, the rate was 141.99, while the year of 2007 saw another increase and the rate
became 167.25 complaints. The rate continued to go up, and in the very next year,
2008, it was slightly more than 200 complaints per every 100,000 residents
(200.47). The years of 2009 and 2010 saw increases in the rates of fraud complaints
as well, with the rates being 221.89 and 234.39 respectively. Figure 5 below
presents these findings.
The Rates of Fraud Complaints
234.39
221.89
200.47
167.25
148.07 141.99
140.12
114.22
84.41
39.43
2000
48.18
2001
2002
2003
2004
2005
Figure 5. The Rates of Fraud Complaints
2006
2007
2008
2009
2010
72
The relationship between the dependent variable, the presence and absence
of the F.A.C.T.A. legislature, and these particular dependent variables, the total
number of fraud complaints, as well as the rate of fraud complaints, is opposite
from what was hypothesized. It is hypothesized that with the implementation of this
law, the number of fraud complaints and the corresponding crime rates would be
declining. What this data analysis shows is that the main hypothesis in regards to
these particular dependent variables is not supported. It is also necessary to point
out that the number and rates of fraud complaints have been rising during the pretreatment period. Moreover, the last year for this period showed an increase in the
amount of approximately 105,000 reports and compared to the previous year, that
was more than four times greater than what the year of 2001 had experienced.
Therefore, the last year of this period of time saw almost 130,000 complaints more
than what was recorded in the first year.
Following the implementation of the legislation, the number of fraud
complaints had been rising. Furthermore, five different calendar years had
experienced an increase of at least 70,000 complaints compared to the year prior
(2003, 2004, 2007, 2008, and 2009). Also, the very first year following the
implementation of the law had seen an increase in the amount of approximately
90,000 more reports compared to the last year of the pre-treatment period (331,366
in 2003 compared to 242,783 in 2002). Another thing that has to be pointed out is
that one calendar year, the year of 2006, had experienced a decline in the number of
73
fraud complaints. In fact, about 14,000 fewer incidents were recorded in 2006
compared to what was recorded in 2005 (423,672 vs. 437,585). Also, the year of
2005, even though it still had experienced an increase in the number of reports, it
was much smaller than what was observed in the years prior (27,000 in 2005
compared to approximately 80,000 and approximately 90,000 in 2004 and 2003
respectively).
The rates of fraud complaints for every 100,000 residents had been going
up, with the exception of the year of 2006, when the rate dropped from 148.07 in
2005 to 141.99 in 2006. During all other years that this research looked at, the rate
of fraud complaints had been going up. In fact, the last year of this study, the year
of 2010, saw an increase of almost 195 complaints per every 100,000 residents
compared to the year of 2000. Moreover, compared to the last year of the pretreatment period, 2002, the last year of post-treatment period, 2010, saw an increase
of almost 150 complaints. It is necessary to point out that the fraud complaint rates
had been going up during the pre-treatment period as well.
As these results showed, the main hypothesis is not supported. The number
of fraud complaints had been on the rise following the implementation of the
F.A.C.T.A. legislation. Although, it is necessary to point out that during the years
preceding the enactment of the law, there was also an increase in the number of
cases. The year of 2006 saw an approximately 14,000 decline in the number of
fraud complaints; however, this was observed during only one year, and starting
74
with the following year, 2007, the number of complaints started going up again.
Due to data availability limitations following the year of 2010, it is unclear what
the statistics for 2011 and 2012 might be. However, it can be seen that based on the
data in hand, the total number of fraud complaints and the rates of fraud complaints
had been going up, with the exception of the year of 2006. Compared to the very
first year that this research looked at, the last year had an increase of more than
650% in the number of complaints. Another interesting detail that is worth pointing
out is that the ‘total number of incidents and the rates of identity theft incidents’
and ‘total number of fraud complaints the rates of fraud complaints’ variables show
that the calendar year of 2005 showed an increase that was significantly smaller
than what was observed in the years prior. Moreover, the year of 2006 actually
showed a decline in the number of incidents and fraud complaints respectively, as
well as the rates of identity theft incidents and fraud complaints, followed by an
increase the very next year. Nevertheless, this data analysis shows that with the
exception of 2006, the number of incidents and fraud complaints, as well as their
rates, had been rising following the implementation of the F.A.C.T.A. legislation.
Misuse of Personal Information. The fifth, and final, dependent variable
that this research examined is how personal information was being misused. More
specifically, this study looked at two different types of misuse, bank fraud and
credit card fraud, and the findings showed support in terms of what has been
hypothesized. It is hypothesized that with the implementation of the F.A.C.T.A.
75
legislation, the number of incidents where personal information is being used for
the purposes of credit card fraud and bank fraud, as well these crimes’ rates, should
be declining. The data for credit card and bank fraud have been presented together,
however only for purposes of illustrating these data for these crimes’ incidents and
rates. In general, the results presented below in both the narrative and figures show
that, while for a period of time the incidents and rates of credit card and bank fraud
had been rising (therefore, not supporting the hypothesis), after some time, the
numbers of incidents and rates for both credit card and bank fraud eventually went
down, thereby supporting the hypothesis regarding the ‘misuse of personal
information’ dependent variable.
Credit Card and Bank Fraud Incidents. While looking at credit card fraud
and bank fraud incidents, the data, which can be found in Table 2, showed that the
very first year that this study was concerned with had experienced almost 13,000
incidents, which accounted for 41% of the total number of identity theft incidents.
However, this number went up by almost three times during the following year,
2001 (36,190 compared to 12,900 in 2000) and that represented 42% of all
incidents. The last year of the pre-treatment period recorded almost 68,000 of
incidents, an increase by more than 30,000, which accounted for 41% of all
recorded incidents. As it can be seen, the percentage of the credit card fraud side
stayed relatively constant; however, the number of credit card fraud incidents had
been going up significantly, by 23,000 and 31,000 respectively.
76
Table 2
Total Number of Credit Card Fraud and Bank Fraud Incidents and Percentages of
Bank Fraud
Credit Card Fraud
Total Incidents
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
12900
36190
67963
70918
69039
66446
61508
59438
62796
47273
37587
41%
42%
41%
32%
28%
26%
25%
23%
20%
17%
15%
4100
11201
27509
36533
44382
43446
39365
33595
34538
27807
25058
13%
13%
16%
17%
18%
17%
16%
13%
11%
10%
10%
Figure 6 below illustrates the number of credit card fraud as well as bank
fraud incidents. The first year of the post-treatment period recorded more than
70,000 cases involving credit card fraud, but the total percentage dropped to 32%
of all incidents. Compared to the previous year, the year of 2003 had experienced
just approximately 3,000 incidents more. The very next year, 2004, saw something
that had not been seen before – the decline in number of incidents, as there were
69,039 incidents recorded, which was almost 2,000 less than in 2003. Moreover,
that accounted for even smaller percentage number of all incidents compared to the
year prior – 28%. The year of 2005 saw another decline in the number of incidents
77
involving credit card fraud (66,446 compared to 69,039 in 2004). Also, the
percentage of the total number of incidents continued to go down as well (26% to
28% from the year prior). This trend continued in the next two years when, in 2006
and 2007, the numbers of these types of incidents continued to decline (61,508 in
2006 and 59,438 in 2007). Furthermore, the total percentages continued to go down
as well (25% of all incidents in 2006 and 23% in 2007). However, the year of 2008
had experienced 67,796 incidents and that was an increase by more than 3,000
cases where credit card fraud was involved. Nevertheless, the percentage of all
incidents kept on decreasing – 20% for the year of 2008. The year of 2009 and
2010 once again saw the number of incidents on decline, with 47,273 cases being
recorded in 2009 and 37,587 in 2010. The percentage numbers continued to be on
decline as well (17% in 2009 and 15% in 2010).
Bank fraud is another example related to ‘how personal information is being
misused’ dependent variable. Once again, with the implementation of the
F.A.C.T.A. legislature, the number of bank fraud incidents, as well as the rates of
bank fraud, should decrease. The very first year that this study was looking at, the
year of 2000, had recorded a little bit more than 4,000 incidents, which represented
13% of all incidents. The following year saw an increase of more than 12,000;
however, as far as percentages go, there was no increase or decrease compared to
the year prior (16,371 incidents vs. 4,100 incidents in 2000). The last year from the
pre-treatment period had experienced more than 27,000 cases where bank fraud
78
was involved, which represented an approximately 16,000 increase compared to the
year prior (27,509 vs. 11,201). Moreover, the total percentage went up by three
points as well.
The first year, 2003, after the F.A.C.T.A. went into effect had seen another
increase in the number of the incidents that resulted in bank fraud. In fact, 36,533
incidents were recorded that year and the percentage went up to 17% and that was a
1% increase compared to 2002. This trend continued the following year and the
year of 2004 had experienced more than 44,000 incidents, and that was almost
8,000 incidents more than in the year prior. The total percentage again had
increased by 1% and now was 18% out of all incidents. The next year, 2005,
however, saw what had not been seen in the years prior – there was a decline in the
number of incidents. The number dropped by about 1,000 (43,446 in 2005 vs.
44,382 in 2004). The percentage went down by 1% and became 17%. Moreover,
this trend continued for the next two years, as the number of the incidents that
resulted in bank fraud kept going down. The year of 2006 had witnessed 39,365
incidents, while the following year, 2007, had experienced 33,595 cases.
Furthermore, the number of bank fraud incidents in relation to the total number of
incidents continued to go down as well (16% and 13% in 2006 and 2007
respectively). The year of 2008 saw an increase in the number of incidents;
however, 2008 had experienced only about 1,000 cases more compared to the year
prior. Nevertheless, the percentage still continued to go down and became 11%.
79
This increase proved to be a one-year occurrence and the following two years had
witnessed a drop in the number of incidents, as 27,807 cases were recorded in 2009
(7,000 less than in 2008) and 25,058 cases in 2010 (2,000 less than in 2009). The
percentage stayed the same – 10%.
80000
70000
60000
50000
40000
30000
20000
10000
0
2000
2001
2002
2003
2004
2005
Credit Card Fraud Incidents
2006
2007
2008
2009
2010
Bank Fraud Incidents
Figure 6. The Total Number of Credit Card Fraud and Bank Fraud Incidents
Credit Card and Bank Fraud Rates. In the year of 2000, the rate of credit
card fraud for every 100,000 residents of the United States was 4.57 incidents. This
rate went up by more than 8 incidents during the following year, 2001, and became
12.7. Furthermore, the rate increased by another almost 11 incidents and in 2002
the rate became 23.63. The first year following the implementation of the
F.A.C.T.A., the year of 2003, saw a slight increase and the rate became 24.45
incidents. The rate went down during the next year, 2004, and became 23.58
80
incidents. Moreover, the rate of credit card fraud incidents continued going down in
the following three years, 2005, 2006 and 2007 with the rates being 22.49, 20.61
and 19.73 incidents respectively. The year of 2008 saw an increase in the number
of credit card fraud incidents and the rate of this crime also went up from 19.73 in
2007 to 20.68 in 2008. However, this trend did not materialize into a long-term
trend, and in 2009, the rate dropped to 15.41 incidents. In 2010, the rate dropped
down even further and became 12.15 incidents. This shows that the rate of credit
card fraud incidents had been on the rise during the pre-treatment years, as well as
the first year following the implementation of the F.A.C.T.A.. However, starting
with the year of 2004, the rate had been steadily going down with the exception of
2008, when the rate slightly went up by less than on incident (from 19.73 in 2007
to 20.65 in 2008).
What these data demonstrate is that the main hypothesis in regards to the
credit card fraud is supported. What can be extracted is that the number of the
credit card fraud incidents had been on the rise prior to the implementation of the
F.A.C.T.A. when these numbers had been going up by almost 24,000 and more
than 30,000 incidents in 2001 and 2002 respectively. This trend continued in 2003;
however, the increase was only by about 3,000 incidents. From that point on, the
number of incidents had been on decline, with the sole exception being the year of
2008 when the number of the credit card fraud incidents went up by about 3,000.
As the following years had demonstrated, this was just a one-year occurrence and
81
after that year the numbers continued to go down by approximately 15,000
incidents in 2009 and approximately 10,000 in 2010. As far as credit card fraud
rates go, a similar trend can be observed here as well. The rates had been going up
prior to the implementation of the F.A.C.T.A. and one year thereafter; however, as
the data demonstrate, the rates for credit card fraud had been steadily going down
since then, with the exception of the year of 2008, and then started going down
again.
What has been going on with this particular variable following the year of
2010 is unclear due to data availability limitations. Also, the total percentages of
the incidents involving credit card fraud incidents out of all incidents kept declining
steadily through the years that this research had been concerned with. The pretreatment period showed that the number of incidents where personal information
had been used for the purpose of credit card fraud accounted for approximately
41%-42%. However, this percentage started declining steadily following the
implementation of the F.A.C.T.A. legislature. The final percentage was just 15%,
and that was significantly smaller compared to the 41% observed in the very first
year, 2000. Therefore, the main hypothesis is supported, as the number of credit
card fraud incidents was on the decline after the law became enacted. These
findings also suggest that there could be something else going on, and people could
have started being more cautions when it comes down to using credit cards, as well
as the law itself was acting as a deterrent for card fraud criminals. Nevertheless, it
82
does open the likelihood of another factor influencing the declining rate of credit
card fraud incidents since the enactment of the F.A.C.T.A..
In terms of bank fraud incidents, the rate, in the year of 2000, was 1.45. The
following year, 2001, the rate went up to 3.93 incidents. The last year of the pretreatment period saw the rate rise by almost 6 incidents, and the rate became 9.56
incidents. The first two years following the implementation of the F.A.C.T.A. had
experienced the crime rate going up, with the rates being 12.59 and 15.16 in the
years of 2003 and 2004 respectively. Starting with the year of 2005 the rate starting
declining and in 2005 it was 14.7 incidents, while in 2006 and 2007 the rate was
13.19 and 11.15 incidents respectively. The year of 2008 had experienced a slight
rise in the number of bank fraud incidents. The rate of this crime, in its turn, also
went up from 11.15 in 2007 to 11.36 incidents in 2008. However, in 2009 the rate
went down by more than 2 incidents (9.06 in 2009 from 11.36 in 2008). The year of
2010 saw another decrease and the rate was 8.10 incidents. What this shows is that
the bank fraud rate for every 100,000 residents had been steadily going up;
however, starting with the year of 2005 it started going down, with the sole
exception being the year of 2008 where there was a slight increase. The rate
changes for bank fraud, as well credit card fraud, are presented in Figure 7 below.
83
Credit Card Fraud Rates
23.63
24.45
23.58
Bank Fraud Rates
22.49
20.61
15.16
12.7
14.7
12.59
20.65
15.41
13.19
11.15
9.56
4.57
19.73
12.15
11.36
9.06
8.1
3.93
1.45
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
Figure 7. Credit Card Fraud and Bank Fraud Rates
What this data demonstrated is that the main hypothesis in regards to the
bank fraud incidents and the rate of bank fraud is also supported. The numbers of
this type of incident had been going up prior to the implementation of the
F.A.C.T.A. legislation. Moreover, there were increases by more than 7,000
incidents in 2001 and more than 16,000 incidents in 2002. The first year of the
post-treatment period had seen another increase, which accounted for
approximately 9,000 cases. This number continued to increase in 2004 as well.
However, starting with the following year, 2005, the number of incidents where
bank fraud was involved started going down (by approximately 4,000 and
approximately 6,000 incidents in 2006 and 2007 respectively). In 2008 this number
had increased by about 1,000 cases; this number was shown to be just a one-year
84
occurrence and the following two years saw decreasing numbers as well. The rates
of this crime had been going up prior to the implementation of the F.A.C.T.A. and
for two years thereafter; however, starting in 2005, the rates started gradually going
down with the exception of the year of 2008 when there was a slight increase, but
after that, the rates started declining once again.
Also, what can be extracted from this data is that the percent of the bank
fraud incidents, treated as a proportion of the total number of identity theft
incidents, had been going up in the pre-treatment period, as well as the first two
years immediately thereafter. However, starting with the year of 2004, the
percentages had been steadily going down. What has been going on following 2010
is unclear due to data availability limitation. All this leads to a conclusion that the
main hypothesis in regards to the bank fraud incidents is supported, as the number
of incidents had been going down starting with the year of 2004, with the sole
exception being the year of 2008; however, the increase that year was only about
1,000 cases and it did not transform into a long-term trend and was observed for
just one year.
Data Analysis Summary
To summarize the data analysis presented in this section, there were five
different dependent variables that this research was looking at and how they were
affected by the independent variable, which was either the presence or the absence
of the F.A.C.T.A. legislation. The relationships for the first four dependent
85
variables, the ‘total number of identity theft incidents’ and the ‘rates of identity
theft’, as well as the ‘total number of fraud complaints’ and the ‘rates of fraud
complaints,’ were opposite from what was hypothesized. The findings showed that
there was an increase in the number of incidents and rates for each of these four
variables with the implementation of the F.A.C.T.A. In other words, with the
implementation of the law, it was hypothesized that the total number of identity
theft incidents and the total number of fraud complaints, as well as the rates for
these crimes, would be going down. The hypothesis for the ‘total number of
identity theft incidents’ and the ‘rates of identity theft’ dependent variables has not
been supported. The total number of identity theft incidents had been steadily
rising, with the exceptions being the years of 2006 and 2010. However, the 2006
decline was only by about 3,000 incidents while in 2010 it accounted for almost
40,000 cases. It is not clear what this situation looked like following the year of
2010, as there is no available data. The rate of identity theft incidents was also on
the rise with the years of 2006 and 2010 being the only two exceptions. It is
necessary to point out that the year 2006 had experienced only about 4 incidents
less than year 2005.
The total number of fraud complaints had been rising as well and the only
exception where there was a decline was the year of 2006. The same applies to the
crime rates for fraud. For all other years that were looked at during this research,
there was an increase. What is worth pointing out that, for both ‘total number of
86
fraud complaints’ and the ‘rates of fraud complaints’ dependent variables, the year
of 2006 had experienced a decline in both the total number of incidents and fraud
complaints, as well as these crimes’ rates. Also, it is necessary to acknowledge that
these numbers had been on the rise during the pre-treatment period as well.
The fifth dependent variable, ‘how personal information is being misused,’
was represented by bank fraud and credit card fraud incidents and these crimes’
rates. It was hypothesized that with the implementation of the F.A.C.T.A., the
number of incidents where personal information was being used for the purpose of
credit card fraud and bank fraud, as well as these crimes’ rates, should go down.
The main hypothesis in regards to this variable, in terms of the two types of identity
theft, has been supported. Moreover, the number of such incidents had been
steadily declining over the years. Both of these types of misuse had experienced an
increase in the number of incidents during the pre-treatment period and
immediately following the introduction of the law; however, starting with the year
of 2003 (credit card fraud) and 2004 (bank fraud), the number of incidents started
to decline. The same applies to the corresponding crime rates as well. The total
percentages for which these two variables accounted in relation to the total number
of incidents showed a similar trend – they had been steadily going down over the
years that this research has been examining. Also, an interesting detail that has to
be pointed out is that there was a slight increase in the number of both the bank
fraud and the credit card fraud incidents in 2008. Nevertheless, as it can be seen
87
from this data analysis, unlike the first two hypotheses, the main hypothesis for the
dependent variable, ‘how personal information is being misused,’ as illustrated by
two types of misuse (credit card and bank fraud), unlike the first two hypotheses,
has been demonstrated and the expected relationship has been shown.
As a result, since the F.A.C.T.A. legislation was implemented in 2003, there
had been more identity theft incidents and fraud complaints and the rates for these
crimes went up as well. Since the main goal of the legislation was to reduce the
number and rates of identity thefts, questions about its effectiveness and purpose
might arise. However, this increase might be explained by the law capturing more
and more incidents and considering developments in modern technology, there
might be many more areas susceptible to consumers’ information being stolen.
Besides, it also might lead to more opportunities for fraud that criminals can
potentially explore. This trend can also be the result of people being more aware of
the problem of identity theft, as well as credit agencies paying more attention to it,
and this can lead to changes in the reporting patterns as well. Therefore, these data
do not necessarily mean that this legislation has been unsuccessful in terms of its
purpose. It is necessary to take into consideration such factors as changes in
technology and the fact that consumers are more aware about the problem of
identity theft and fraud in terms of which future research could focus.
88
Chapter 5
Conclusion
Introduction
This research started with the description of the negative impact that the
problem of identity theft has on its victims. No wonder that numerous
comprehensive steps have been developed that one has to follow in order to
significantly reduce the chances of becoming a victim. However, these measures do
not have to be very complicated at all and such simple steps as being careful when
providing financial information online, not using one’s mailbox for an outgoing
mail or reviewing monthly statements on a regular basis, among many others, can
provide protection and reduce one’s chances against the criminals responsible for
this type of problem.
Moreover, as the scholarly literature has identified, a lot depends on the
idea of target hardening and if there are no opportunities for a crime to be
committed, that crime is most likely will not take place at all. As a result, the
framework of the situational crime prevention model has been applied to this study.
The main idea behind this model is that by manipulating the surrounding
environment or by creating a certain set of rules, enacting legislation, such as the
F.A.C.T.A., and altering circumstances, it is possible to prevent a certain type of
crime, such as identity theft, which, in its turn, depends on what specific measures
are taken. As it could be seen from this research, the number of identity theft
89
incidents and fraud complaints, as well as the corresponding crime rates, had been
on the rise. From this perspective, it can be said that the legislation has not been
able to reach its goal. However, what also might be going on is that with this law in
place, consumers have a very important tool at their disposal when it comes down
to fighting identity theft, and they may be simply reporting more crimes. Also,
another possibility is that the legislation covers many more incidents than it used to
and there are just more areas where fraudulent activities might take place. As a
result, this leads to larger numbers and higher rates of identity theft and fraud
incidents.
The review of the literature presented in this study demonstrates how the
idea of situational crime prevention can be applied to such fields as identity theft
prevention and fraud prevention. As a result, previous research shows how
numerous situational crime prevention measures, if taken and applied properly, can
reduce one’s chances of becoming a victim of this particular crime. The problem of
identity theft is of a special interest to this study and, of course, the concept of
situational crime prevention is paramount here. As it was mentioned before, a lot of
steps have been developed in order to combat the problem of identity theft and lots
of simple steps can be quite helpful when trying to protect one’s identity. By
adjusting one’s behavior and taking certain actions, a person may be able to
significantly reduce his/her chances of becoming prey to identity theft criminals.
What is also worth mentioning is that the majority of these anti-identity theft
90
measures require individual actions; however, there have been a number of such
measures that actually implement the involvement of various governmental entities,
and it is the latter which has been the central focus of analysis in this thesis.
Overview of the F.A.C.T.A.
The Fair and Accurate Credit Transactions Act, which was passed by the
United States Congress in 2003, was created as a response to the increasing number
of the identity theft incidents and the main goal of this legislation was to prevent
identity theft, improve the accuracy of consumer reports, as well as help to resolve
consumer disputes. Moreover, this Act granted certain rights, among which were
the rights to obtain one free credit report annually and place a fraud alert on one’s
credit history. Nevertheless, there has not been a lot of research done in regards to
how effective the F.A.C.T.A. (2003) really is and it has not been clear how the
problem of identity theft has changed since this law got implemented. As a result,
this research filled this void and showed what effect the new changes had and
demonstrated what the most recent trends in this particular crime were.
Research Question, Hypotheses and Variables Examined
The main question of this study was - how has the Fair and Accurate Credit
Transaction Act of 2003 impacted the problem of identity theft? The independent
variable was represented by either the absence of the F.A.C.T.A. (treatment), which
is the period from 2000 through 2002, or the presence of the treatment, which is the
period starting with 2003 and ending in 2010. The study has five dependent
91
variables, which include the total number of identity theft incidents and the
corresponding crime rates, the total number of fraud complaints and the
corresponding crime rates, and how personal information is being misused (this
particular variable includes two types of misuse: credit card fraud incidents and
bank fraud incidents, as well as the corresponding crimes rates). The research
examined three main hypotheses. With respect to the first two dependent variables,
total number of identity theft incidents and the corresponding crime rates, the total
number of fraud complaints and the corresponding crime rates, it was expected that
with the implementation of the F.A.C.T.A., the total number of incidents and the
total number of fraud complaints should have gone down. For the ‘how personal
information is being misused’ variable, it was expected that with the
implementation of the F.A.C.T.A., the number of credit card fraud and bank fraud
incidents should decrease as well.
Data Collection
This research involved a secondary data analysis. The data were collected
from a primary data source, the database that was created by the Sentinel Consumer
Network, which belongs to the Federal Trade Commission. All of the statistical
components are compiled and currently exist in the form of several reports that can
be found on the Federal Trade Commission website. These reports consist of a
variety of statistics for such aspects as identity theft incidents, victim
characteristics, fraud complaints, amounts of monetary losses, statistics for every
92
different state, as well as metropolitan rankings. The reports, it is necessary to point
out, represent consecutive years (2000-2010). This database and the reports
contained in it are widely available online to the public and no specific knowledge
is required on the part of a user in order to be able to access this information.
This study implemented the interrupted time-series design, in which the
dependent variables were looked at before and after the introduction of the
F.A.C.T.A. (2003) legislation. In other words, the research was looking at the data
for the period of 2000-2002, before the treatment was introduced, which in the
study was the F.A.C.T.A. (2003), and the data that demonstrated what had occurred
following the implementation of this legislation and that would be the period of
2003-2010. The two periods of time (pre- and post-treatment) are not equal in
length; however, this is due to lack of data availability on identity theft for the
period of time preceding 2000. Once again, the study is interested in how the
problem of identity theft, which was represented in changes in such characteristics
as the number of fraud complaints, the total number of incidents and how the stolen
personal information is being misused, has changed starting from the
aforementioned periods of time before the legislation took effect and after it was
enacted. The numbers were taken for each year separately and comparison was
made on a year-by-year basis for the two periods of time (before and after).
93
Important Findings
After having concluded the data analysis, several important findings have
been revealed. The main hypothesis in regards to the ‘total number of incidents’
and the ‘rate of identity theft incidents’ dependent variables is not supported. The
number of the incidents reported had been going up following the implementation
of the F.A.C.T.A. with the exception of the year of 2006, when there was a
relatively small decline in the amount of 3,000 incidents. However, what followed
that year was another three years where the numbers were once again going up by
at least 100,000 incidents until there was a second decline, in the amount of
approximately 40,000 incidents, in 2010. Due to data availability limitations, it is
unclear if that was just a one year decline or something that could represent the
beginning of a new trend. Therefore, since there is no data for the years of 2011 and
2012, there is no way to know how the year of 2010 looks like in relation to the
following years. Nevertheless, it is safe to say that the total numbers of the
incidents reported, after the F.A.C.T.A. got implemented in 2003, in fact had been
rising. Compared to the very first year that this research looked at, the year of 2000,
the final year of this study, the year of 2010, saw almost a 580% increase.
Although, it is necessary to acknowledge that the number of incidents reported had
been going up during the pre-treatment period as well.
The rates of the identity theft incidents had been steadily going up as well.
The last year that this study looked at, 2010, saw a rate of 432.93 incidents for
94
every 100,000 U.S. residents, and that was about 351 incidents more than what was
observed in the very first year of the pre-treatment period, the year of 2000 (81.74).
Compared to the last year of the pre-treatment period, the year of 2002, the rate that
was observed during the last year of the post-treatment period went up by almost
241 incidents (191.78 incidents in 2002). There were a couple exceptions, however,
when in 2006 the rated dropped down by almost 4 incidents (from 307.3 in 2005 to
303.68 in 2006). There was also a decline observed in the last year of the study, the
year of 2010.
The second hypothesis in regards to the ‘total number of fraud complaints’
and the ‘rate of fraud complaints’ dependent variables was also not supported. The
number of fraud complaints had been on the rise following the implementation of
the F.A.C.T.A. legislation. Although, once again, it is necessary to point out that
during the years preceding the enactment of the law, there was also an increase in
the number of reports. The year of 2006 saw a 14,000 decline in the number of
fraud cases; however, this was observed during only one year, and starting with the
following year, 2007, the number of complaints started going up again. Due to data
availability limitations following the year of 2010, it is unclear what the statistics
for 2011 and 2012 might be. However, it is safe to say that based on the data in
hand, the total number of fraud complaints had been going up, with the exception
of the year of 2006. Compared to the very first year that this research looked at, the
last year had an increase of more than 650% in the number of complaints. The rate
95
of fraud complaints had also been going up with the only exception being the year
of 2006, when the rate dropped down by about 6 incidents (141.99 incidents in
2006 compared to 148.07 incidents in 2007). The last year that this study looked at,
2010, saw an increase of almost 195 incidents (234.39 compared to 39.43 in 2000).
Moreover, the year of 2010 saw almost 150 incidents more than the last year of the
pre-treatment period (84.41 in 2002).
Another interesting detail that is worth pointing out is that, for the four
dependent variables—the ‘total number of incidents’ and the ‘rates of identity theft’
and ‘total number of fraud complaints’ and the ‘rates of fraud complaints’—the
findings show that the calendar year of 2005 showed an increase that was
significantly smaller than what was observed in the years prior. Moreover, the year
of 2006 actually showed a decline in the number of incidents and fraud complaints
respectively, as well as these crimes’ rates, followed by a significant increase the
very next year. Nevertheless, this data analysis shows that with the exception of
2006, the number of incidents and fraud complaints, and these crimes’ rates, had
been rising following the implementation of the F.A.C.T.A. legislature. This shows
that something must have occurred in 2006. Perhaps, future research can elaborate
on this topic, as there might be additional factors present that influenced the results
observed during that year.
The ‘how personal information is being misused’ dependent variable was
represented by bank fraud and credit card fraud incidents, as well as the rates for
96
these two types of identity theft. It was hypothesized that with the implementation
of the F.A.C.T.A., the number of incidents where personal information is being
used for the purpose of credit card fraud and bank fraud, as well as the rates for
these crimes, has been going down. This hypothesis in regards to both of these
types of identity theft has been supported. Moreover, the number and rates of such
incidents had been steadily declining over the years. Both of these variables had
experienced an increase in the number of incidents during the pre-treatment period
and immediately following the introduction of the law; however, starting with the
year of 2003 (credit card fraud) and 2004 (bank fraud), the number of incidents
started to decline. The same goes for total percentages for which these two
variables accounted for in relation to the total number of incidents – they had been
steadily going down over the years that this research has been looking at. Also, an
interesting detail that has to be pointed out is that there was a slight increase in the
number of both the bank fraud and the credit card fraud incidents in 2008.
Nevertheless, as it can be seen from this data analysis, this hypothesis for this
particular dependent variable, unlike the first two hypotheses, is supported.
The rates for credit card fraud and bank fraud crimes had experienced
similar trends that can be seen with the raw numbers for these crimes. The rates had
been steadily going up; however, starting with the year of 2004 (for credit card
fraud) and 2005 (for bank fraud), the rates started going down. As a result, the rates
of bank fraud incidents were almost 7 incidents less in 2010 compared to the year
97
of 2004 (8.10 vs. 15.16). For credit card fraud incidents, the rate dropped by more
than 11 incidents (12.15 in 201 vs. 23.58 in 2004).
What the results of this study show is that there have been some
measureable changes in the problem of identity theft since the implementation of
the F.A.C.T.A. in 2003. Moreover, the Fair and Accurate Credit Transaction Act
does represent an important attempt in the war against identity theft and there is
hope that this problem will eventually cease to exist. Nevertheless, as the literature
review presented in this study showed, this problem in large part comes down to
how accurate and diligent consumers are when working with their financial
information both in person and online. Also, no matter what the credit agencies are
or are not supposed to do, there is still some room for mistakes; as a result, it is
crucial for every individual to check the accuracy of his/her credit information
online. Such documents like monthly banking statements and bills have to be
checked for accuracy and any irregularities or suspicious activities have to be
reported to appropriate authorities. These measures can prove crucial as, despite all
the legislation’s intentions, some creditors still do not have to consider fraud alerts
or victim statements when issuing credit scores. Also, there might be some
reluctance on the creditors’ part to add more verification steps and make their credit
issuing procedures more complicated due to time availability limitations.
98
Future Research
However, in order to gain more knowledge and insight into how effective
the legislation is in a really long run, it might be a good idea to explore this topic
and what has been going on with this particular problem beyond the year of 2010.
As a result, future research might involve a more comprehensive study that would
be able to control for such potential factors as the role of the media outlets or
newly-developing technologies that make identity theft and fraud more likely than
ever and shed more light on this problem. Various media outlets may be potentially
be responsible for public outreach campaigns and raising awareness about the
dangers of the problem of identity theft, as well as letting consumers know what
resources are available. Moreover, as a result of media efforts, consumers might be
more aware of what has to be done in order to be able to keep their personal
information safe. Also, new technologies can allow criminals to take advantage of
new opportunities and that can lead to more fraud incidents as well. Therefore, the
future research could potentially explore these areas and if it is able to control these
factors, it can provide even more insight on the F.A.C.T.A. legislation.
Conclusion
There is no doubt that the F.A.C.T.A. has been a very important step in the
fight against identity theft. As the number of credit card and bank fraud incidents,
as well as the rates for these crimes, show, there has been a decline in both the raw
numbers and the corresponding crime rates since the F.A.C.T.A. got implemented
99
in 2003. Both the raw numbers and the rates started declining in 2004 for credit
card fraud, and 2005 for bank fraud. The numbers of the identity theft incidents and
fraud complaints had been on the rise. The same goes for the corresponding crime
rates. This might be the case of the legislation capturing more incidents, or more
people reporting more incidents. Nevertheless, the problem of identity theft is an
important issue and, unfortunately, it is not going away in the near future. With this
in mind, having strong legislation in place that would give consumers extra
protection would be beneficial. Additionally, the role of public education cannot be
underestimated here and the aspect of prevention of identity theft in large part does
depend on individual actions. As a result, various outreach campaigns educating
public on the nature of the crime of identity theft, as well as its dangers,
consequences and prevention measures, are important too. There is also no doubt
that more research regarding the effectiveness of this legislation is necessary. Not
only will it allow for better understanding of what such a law has done to identity
theft, but also will show if it would be rational to create similar laws in the future.
This study has looked at a ten-year timeframe that included three years
preceding the introduction of the F.A.C.T.A. legislation and a seven-year frame
that followed it. It is necessary to acknowledge that there might be additional
factors partially responsible for the results observed in this course of this study. For
example, the decreasing numbers of the incidents involving credit card fraud and
bank fraud might be due to more knowledge that the general public has been able to
100
obtain as a result of more public outreach campaigns providing information about
the problem of identity theft, thereby making consumers more aware of the
problem and pay more attention to the monitoring of their banking documents.
These public outreach campaigns might be playing an important role in the case of
identity theft incidents and fraud complaints as well. With consumers being aware
of what resources are at their disposal, more and more individuals could be
reporting any suspicious activities observed on their accounts. It is also possible
that credit agencies have changed their practices as a result of the implementation
of the F.A.C.T.A and this had led to increased numbers of identity theft incidents
and fraud complaints.
As far as this research goes, the results have created a picture that shows
that the Fair and Accurate Credit Transaction Act of 2003 does appear to have an
effect on the problem of credit card and bank fraud. Since the number and the rates
for identity theft incidents and fraud complaints had been rising, there may be more
amendments to this act, which likely will make this legislation more effective.
Moreover, with new developments in modern technology, there will be more areas
for fraud that criminals can potentially explore. Therefore, new amendments will
more likely be designed in such a way that would allow the legislation to capture
these new types of fraud. Nevertheless, this law does represent an important
resource for credit agencies, as well as for individual consumers in terms of
granting certain rights and making agencies be more responsive to their clients’
101
needs. With this in mind, it would be safe to say that the F.A.C.T.A. has been an
important piece of legislation in the fight against the problem of identity theft and
fraud. Since this issue does not appear to be going away any time soon, this law
will be a very important tool that the criminal justice system has at its disposal.
102
Appendix A
Coding Sheets
Coding Sheet 1: Total Number of Incidents and Total Number of Fraud Complaints
Year
Total Number of Incidents
Total Number of Fraud
Complaints
2000
2001
2002
2003
2004
2005
2006
103
2007
2008
2009
2010
Coding Sheet 2: Total Number of Credit Card Fraud and Bank Fraud Incidents and
Percentages of Total Incidents
2000
Credit
Card
Fraud
Bank
Fraud
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
104
Appendix B
Human Subjects Application
105
Human Subjects Protocol Application
Request for Review by the Sacramento
State Institutional Review Board (IRB)
(Revised 11/2012)
1.
2.
Describe the following:
A. What is the purpose of the study?
The research will determine the impact the Fair and Accurate Credit
Transactions Act (2003) has had on the problem of identity theft.
B. What is the main research question or study hypotheses?
The main question that this research will concentrate on will be ‘what
impact has the Fair and Accurate Credit Transactions Act (2003) been
having on the problem of Identity Theft?’ The problem of identity theft,
which is a relatively new crime, can have a huge negative impact on its
victims when their personal information gets stolen and used for criminals’
gains. However, despite the fact that a lot of research is dedicated to finding
out how the situational crime prevention framework is applied to this type
of problem and what measures are effective, some questions are still
waiting to be answered. While it has been shown that such simple steps as
careful review of monthly banking bills and statements, anti-virus computer
software or not using one’s mail box for outgoing mail, among many others,
can significantly reduce chances of becoming a victim, there are still some
measures that have not been shown to be effective.
The consensus is that it is all about target hardening and situational crime
prevention. However, there is no guarantee that even if one follows all of
the ‘how to protect oneself from identity theft’ instructions, one still will not
become a victim of identity theft. Nevertheless, if to take all necessary
precautions, the prospects to have a good protection will definitely be much
better. If there is no opportunity to commit a crime, there probably will not
be any crime. If one does not leave anything in the dumpster, mail box or on
the street that has his/her personal information, a criminal will not be able to
steal it and use it for personal gains. If to use proper computer software and
be careful when working online, there are more chances that a computer
network will not be breached. If one does not provide the identifying
information to those who do not need it, people who have no business
106
having it will never end up in possession of it. Therefore, it is less likely to
be lost or misused. Finally, if one monitors his/her bank statements and
credit score reports, that individual is more likely to notice the problem in
the very beginning. This last point leads to the fact that in order to assist
consumers in their fight against this relatively new crime, several laws and
regulations have been created and their main goal is to stop the identity theft
in its earliest stages.
In 2003, the Fair and Accurate Credit Transactions Act (FACTA) became a
federal law. The main goal here was to “amend the Fair Credit Reporting
Act (FCRA), to prevent identity theft, improve resolutions of consumer
disputes, improve the accuracy of consumer records, make improvements in
the use of, and consumer access to, credit information” (108th US Congress,
2003). This legislature was a response to the increased number of identity
theft crimes and was supposed to help alleviate the problem by granting
certain rights to consumers. Among them were the rights to obtain credit
reports free of charge, place a fraud alert on one’s credit history, as well as
some others. Nevertheless, it is still not clear how, despite all these
proposed anti-id theft measures, effective this act really is (Holtfreter and
Holtfreter, 2006). As a result, this project will fill this void and determine
how the problem of identity theft has been impacted since the
implementation of this act.
The independent variable for this research will be the presence (2003-2010)
and absence (2000-2002) of the F.A.C.T.A. (2003) legislation itself. The
research will be measuring the impact the independent variable – before and
after the law had been enacted - has had on the problem of identity theft.
The dependent variables in this research will be the total number of id theft
incidents reported, the total number of fraud complaints, and how stolen
personal information is being misused. The ‘how stolen personal
information is being misused’ variable is represented by the following
categories: credit card fraud, government documents or benefits fraud,
employment fraud, phone and utilities fraud, loan fraud, bank fraud, other
types of fraud, attempted fraud). The impact of the IV on the DVs will be
expressed in terms of changes in the number of id theft incidents reported,
the number of fraud complaints and how the personal information is being
misused. The expected relationship between the independent and the
dependent variables is a positive one; in other words, following the
enactment and of the F.A.C.T.A. (2003) legislation, the number of incidents
reported has gone up. According to existing literature, although it has not
been definitively shown, the consensus in regards to the F.A.C.T.A. (2003)
legislation is that with the implementation of such a law, the number of id
107
theft incidents and fraud complaints should be on the rise, primarily due to
credit score checking system, along with the alert features.
Another aspect that is expected to have changed is the number of fraud
complaints, as well as how the stolen information is actually being misused.
It is expected that the number of fraud complaints has gone up. The
expected trend for how the personal information is being misused is that the
number of cases where one’s information has been used for the purposes of
bank and credit fraud has been on the rise as well.
C. What is the design of the study? (i.e., explain the qualitative,
quantitative or mixed method type of design).
This research will explain how the independent variable, the
presence or absence of the F.A.C.T.A. (2003), affects the dependent
variables, which will be the total number of incident reported, the total
number of fraud complaints, and how personal information is being misused
(which will be represented by the following categories: credit card fraud,
government documents or benefits fraud, employment fraud, phone and
utilities fraud, loan fraud, bank fraud, other types of fraud, attempted fraud).
The importance of this evaluation cannot be underestimated, as it will help
to determine the effect of this particular federal legislation on the problem
and show what works and what does not from the letter of the law
perspective. It will demonstrate how such protective policies impact the
victim side of the problem and how this legislation might be improved and
what amendments might be necessary in order to make it more effective in
terms of lowering identity theft and fraud-type crime. Therefore, this project
will evaluate how the implementation of the legislature has impacted the
problem of identity theft.
Also, this study will implement the interrupted time-series design, in which
the dependent variables will be looked at before and after the introduction
of the F.A.C.T.A. (2003) legislation. In other words, the research will be
looking at the data for the period of 2000-2002, before the treatment was
introduced, which in the study will be the F.A.C.T.A. (2003), and the data
that will demonstrate what had occurred following the implementation of
this legislation and that will be the period of 2003-2010. The two periods of
time (pre- and post-treatment) are not equal in length; however, this is due
to lack of data availability on identity theft for the period of time preceding
2000. Once again, the study is interested in how the problem of identity
theft, which will be represented in changes in such characteristics as the
number of fraud complaints, the total number of incidents and how the
108
stolen personal information is being misused, has changed starting from the
aforementioned periods of time before the legislation took effect and after it
was enacted. The statistics were taken for each year separately and
comparison will be made on a year-by-year basis for the two periods of time
(before and after).
D. What are the procedures of the study? (i.e., include the sample type,
information on how the data is being collected); the data collection
method (i.e., survey, in-depth interviews, focus groups, etc.), and who
is collecting the data?
The data collection strategy for this study is through a secondary data
source, which is the database created by the Sentinel Consumer Network
and that belongs to the Federal Trade Commission.
The data have already been compiled and currently exist in the form of
several different reports and each report represents a certain calendar year
and consists of numerous sections, among which are fraud and identity theft
complaints, victim characteristics and statistics for every individual state.
Each section has several subsections in it; each of the subsections provides
more details for that particular section covering a specific side of the idtheft problem. These reports are widely available to the public and are
accessible by going to a Federal Trade Commission website
(http://www.ftc.gov/bcp/edu/microsites/idtheft/reference-desk/nationaldata.html), where one can see a series of PDF files with each report having
a proper title. Therefore, no extensive technological knowledge on part of a
reader is required to be able to access these files.
The database - the statistical portion of the reports from where the required
data will be extracted - that will be used for this study includes national
statistics for consecutive years (2000-2010). These statistics include the
number of incidents reported, fraud and identity theft complaints, crime
descriptions, victim characteristics, amounts of monetary losses, as well as
state complaint information and state and metropolitan areas ranking.
E. What is the plan for data analysis?
The independent variable for this research will be the presence or absence
of the F.A.C.T.A. (2003) legislation. The F.A.C.T.A. legislation itself is
fixed and cannot change. Therefore, it is its presence or absence (before and
after the F.A.C.T.A. was enacted) that will be evaluated with respect to how
it affects the dependent variables. The research will be measuring the
109
impact the independent variable - presence or absence of the F.A.C.T.A. has had on the problem of identity theft. The dependent variables in this
research will be the total number of id theft incidents reported, the total
number of fraud complaints, and how personal information is being
misused. This last dependent variable (‘how personal information is being
misused’) will include the following categories: credit card fraud,
government documents or benefits fraud, employment fraud, phone or
utilities fraud, loan fraud, bank fraud, attempted fraud and all other fraud.
The impact of the IV on the DVs will be expressed in terms of changes in
the number of id theft incidents reported, the number of fraud complaints,
as well as how personal information is being misused. The expected
relationship between the independent and the dependent variables is a
positive one; in other words, with the implementation of the F.A.C.T.A.
(2003) legislation, the number of id theft incidents reported has gone up.
The same relationship is expected for the total number of fraud complaints.
Another aspect that is expected to have changed is how personal
information is being misused. It is expected that the number of the cases
where personal information is being used for the purposes of credit card
fraud and bank fraud has been rising.
Comparison will be ‘before vs. after’ and will include such variables as the
total number of incidents reported, the total number of incidents reported
claiming fraud, and how personal information is being misused (credit card
fraud, government documents or benefits fraud, employment fraud, phone
and utilities fraud, loan fraud, bank fraud, other types of fraud, attempted
fraud). The study will look at the two different periods of time – the one
before the law got created and the one after, and, therefore, this research
will concentrate on the 2000-2002 and 2003-2010 periods and the
comparison will be done on a year by year basis. After having looked at the
first period of time, the overall picture will emerge and the same will be
done for the second time period. As a result, the study will compare these
two periods, as well as how the problem has been changing one year after
another. For the purpose of data analysis for this research, the Excel
spreadsheet software will be utilized.
F. What is the plan for the protection of the data obtained? (i.e., include
the security measures, data handling procedures, retention procedures,
data destruction date and who has access to the data).
110
There is no plan for the protection of the data obtained. Since the
database from which the necessary data will be taken is publicly
available, this study will not have any security measures, data handling
procedures, retention procedures, data destruction date or any other
similar aspects.
Do not attach lengthy grant proposals. Be brief but complete.
2.
Who will participate in this research as subjects (e.g., how many people,
from where will you recruit them, what are the criteria for inclusion or
exclusion)? How will you engage their participation (e.g., what
inducements, if any, will be offered)? How will you avoid any real or
perceived conflict of interest as a researcher (e.g., role, power
relationships, monetary)?
Since this research is relying on secondary data analysis, there are no
subjects that will participate in the study. Therefore, there is no plan for
recruiting people and creating criteria for inclusion or exclusion. Neither
are there any inducements for subjects’ participation.
Since I, the researcher, do not have any affiliations with the Federal Trade
Commission or any legislators and policymakers behind the Fair and
Accurate Credit Transactions Act (2003), the US Congress or any credit
reporting agency, no conflict of interest is expected. My role in this
project will be solely to research and analyze the impact of the F.A.C.T.A.
(2003) legislation. The results of this study, regardless whether or not the
main hypothesis is supported, will be recorded and reflected in the
‘analysis’ and ‘conclusion’ sections of this research.
3. How will informed consent be obtained from the subjects? Attach a copy
of the consent form you will use. If a signed written consent will not be
obtained, explain what you will do instead and why. (See Appendix C in
Guidance and Procedures for examples of consent forms, an example of
an assent form for children, and a list of consent form requirements. Also
see the section on Informed Consent in Guidance and Procedures.)
The research is going to rely on secondary data analysis and no subjects
are expected to participate in this project. As a result, there will not be a
need to create a consent form or anything similar. Since the data used for
this study are publicly available and there are no subjects that are
mentioned by name and since there are no personal identifiers
whatsoever, there is no plan to have any type of consent form.
111
4. How will the subjects’ rights to privacy and safety be protected? (See the
section on Level of Risk in Guidance and Procedures. For online surveys,
answer the checklist questions at the end of Appendix B in Guidance and
Procedures.)
The already existing database that is going to be used for this research
does not have any personal identifiers whatsoever. All the information is
publicly available and anyone can obtain a copy of the reports provided
on the Federal Trade Commission website. Therefore, this study is not
concerned with the subjects’ rights to privacy and safety, as this issue was
taken care of by the Consumer Sentinel Network, an organization
responsible for the original collection of data.
5. Describe the content of any tests, questionnaires, interviews, surveys or
other instruments utilized in the research. Attach copies of the questions.
What risk of discomfort or harm, if any, is involved in their use?
For the purpose of this research, there will be a secondary data analysis.
Therefore, this project is not going to utilize any types of tests,
questionnaires, interviews, surveys or any other similar instruments.
Instead, I, the researcher, will rely upon a series of the Consumer Sentinel
Network reports that are publicly available on the Federal Trade
Commission website.
However, this study will have two different coding sheets, which will be
attached to this application. The first coding sheet will contain the data for
these two dependent variables: the total number of incidents reported and
the total number of fraud complaints. These statistics will be represented
in numbers, and not percentages. The required data will be extracted from
the database and inserted into the appropriate table. The first coding sheet
will have three vertical columns (year, the total number of incidents
reported, the total number of fraud complaints) and twelve vertical rows
(one for each year – 2000-2010 – and one for the dependent variables).
The second coding sheet will contain the required data from the same
database and it will be created for the ‘how personal information is being
misused’ variable. It will have twelve vertical columns (one for each year
– 2000-2010 – and one for the type/way how personal information is
being misused). The numbers in this coding sheet will be representing the
number of incidents for the following types/ways of how personal
information is being misused: credit card fraud, government documents or
benefits fraud, employment fraud, phone and utilities fraud, loan fraud,
112
bank fraud, other types of fraud, attempted fraud.
The data have already been compiled and currently exist in the form of
several different reports and each report represents a certain calendar year
and consists of numerous sections, among which are fraud and identity
theft complaints, victim characteristics and statistics for every individual
state, as well as different metropolitan centers. Each section has several
subsections in it; each of the subsections provides more details for that
particular section covering a specific side of the id-theft problem. Every
report also has the list of appendices that a reader can find throughout the
document.
More specifically, the reports are located in the ‘Fighting Back against
Identity Theft’ section. Also, all of them belong to the national data
category and represent formal Federal Trade Commission complaint data.
There are eleven reports for each calendar year starting from 2000 and
ending in 2010. Each reporting year starts in January and ends in
December. The national data provided in this section also includes the
2003 and 2006 identity theft survey reports. Moreover, one of the files
provides the Federal Trade Commission overview of the ID-theft
program. All of the reports are in PDF format, but vary in their sizes.
Every report consists of numerous charts, graphs, tables and other visual
aids for representing the data. The reports have background information
on the Consumer Sentinel Network, an organization responsible for
creating the database, as well as an overview of the identity theft problem.
There is no narrative portion in these reports, but instead, the rest of them
consist of statistical data for a variety of already aforementioned
categories.
6. Describe any physical procedures in the research. What risk of
discomfort or harm, if any, is involved in their use? (The IRB will seek
review and recommendation from a qualified medical professional for any
medical procedures.)
N/A
7. Describe any equipment or instruments that will be used in the research.
What risk of discomfort or harm, if any, is involved in their use?
N/A
8. Will any devices, drugs or pharmaceuticals be used in the research? If
113
so, describe their use and any possible risk or discomfort. (If so, the IRB
will seek review and recommendation from a qualified medical
professional.)
N/A
9.
Taking all aspects of this research into consideration, what risk level
do you consider this study to be?
Taking all aspects of this research into consideration, the researcher
considers this study to have the ‘exempt’ risk level.
Check only one: Exempt X
Minimal Risk_____
Minimal Risk_____
Greater than
If you believe this project is exempt under 45 CFR 46.101(b) then you
must choose the exemption category from those listed below and
explain your reasoning by referring to the exemption decision chart:
http://www.hhs.gov/ohrp/policy/checklists/decisioncharts.html)
Does Exemption 45 CFR 46.101(b)(1) (for Educational Settings) Apply?
Does exemption 45 CFR 46.101(b)(2) or (b)(3) (for Tests, Surveys, Interviews, Public
Behavior Observation) Apply?
Does Exemption 45 CFR 46.101(b)(4) (for Existing Data, Documents, Records and
Specimens) Apply?
Does Exemption 45 CFR 46.101(b)(5) (for Public Benefit or Service Programs) Apply?
Does Exemption 45 CFR 46.101(b)(6) (for Food Taste and Acceptance Studies) Apply?
Exemption 45 CFR 46.101 (b) (4) (for existing data, documents,
records and specimens) applies to this research.
________________________________________________________
114
Explain your reasoning based on the information you have provided in this
protocol. (See the section on Level of Risk in Guidance and Procedures.) For
protocols approved as “Greater than Minimal Risk,” the researcher is required to
file semiannual reports with the committee that describe the recruiting of subjects,
progress on the research, interactions with the sponsor, and any adverse
occurrences or changes in approved procedures. In addition, the committee
reserves the right to monitor “Greater than Minimal Risk” research as it deems
appropriate. Failure to file the required progress reports may result in suspension
of approval for the research.
Exemption 45 CFR 46.101(b)(4) (for Existing Data, Documents, Records and
Specimens) applies to this research, as it involves the collection and study of existing
data and the source where these data come from is publicly available and can be found
on the Federal Trade Commission website (http://www.ftc.gov/bcp/edu/
microsites/idtheft/reference-desk/national-data.html). Moreover, the information is
recorded in such a manner that subjects cannot be identified, as there are no personal
identifiers whatsoever.
115
References
Allison, S.F.H., Schuck, A.M., & Lersch, K.M. (2005). Exploring the Crime of
Identity Theft: Prevalence, Clearance Rates, and Victim/Offender
Characteristics. Journal of Criminal Justice, 33, 19-29.
Barker, K.J., D’Amato, J., & Sheridon, P. (2008). Credit Card Fraud: Awareness
and Prevention. Journal of Financial Crime, 15(4), 398-410.
Caminer, B.F. (1985). Credit Card Fraud: the Neglected Crime The Journal of
Criminal Law and Criminology, 76(3), 746-763.
Carrns, A. (2011). Id Security in Banking. The New York Times, December 10th, p.
4.
Churyk, N.T., Lee, C.C., & Clinton, D. (2008). Can We Detect Fraud Earlier? A
Technique Called ‘Content Analysis’ Raises the Possibility. Strategic
Finance, IMA, 90(4), 51-55.
Copes, H., Kerley, K.R., Huff, R., & Kane, J. (2010). Differentiating Identity Theft:
an Exploratory Study of Victims Using a National Victimization Survey,
Journal of Criminal Justice, 38, 1045-1052.
Dadisho, Ed. (2005). Identity Theft and the Police Response. The Police Chief,
Alexandria: February, 72(2), 17.
DelGrosso, R. (2001). How to Avoid an Identity Crisis. Security Management,
December, 72-79.
Dong, F., Shatz, S.M., & Xu, H. (2009). Combating Online in-Auction Fraud:
Clues, Techniques and Challenges. Computer Science Review, 3, 245-258.
Farrington, D., Gill, M., Waples, S., & Argomaniz, J. (2007). The Effects of
Closed-Circuit Television on Crime: Meta-Analysis of an English National
Quasi-Experimental Multi-Site Evaluation. Journal of Experimental
Criminology, 3, 21-38.
116
Federal Trade Commission & U.S. Department of Justice (FTC and DoJ) (2011).
Statement of Rights for Identity Theft Victims. National Criminal Justice
Reference Service, 1-2.
Finklea, K. (2012). Identity Theft: Trends and Issues. Congressional Research
Service. CRS Report for Congress, 1-32.
Gates, T., & Jacob, K. (2009). Payments Fraud: Perception versus Reality – a
Conference Summary. Economic Perspectives, Federal Reserve Bank of
Chicago, 1st Quarter, 7-13.
Glass, G.V. (1997). Interrupted Time Series Quasi-Experiments. Complementary
Methods for Research in Education, 2nd Edition, Washington D.C.:
American Educational Research Association, 589-608.
Greene, M.N. (2009). Divided We Fall: Fighting Payments Fraud Together.
Economic Perspectives, Federal Reserve Bank of Chicago, 1 Quarter, 3742.
Holtfreter, R.E., & Holtfreter, K. (2006). Gauging the Effectiveness of US Identity
Theft Legislation. Journal of Financial Crime, 13(1), 56-64.
Holt, T. & Turner, M.G. (2012). Examining Risks and Protective Factors of Online
Identity Theft. Deviant Behavior, 33(4), 308-323.
Hunter, P. (2006). Relentless Pace of Internet Trade in Stolen Credit Card Details
Continues. Computer Fraud and Security, 2, 14-16.
Jackson, J.E. (1994). Fraud Masters: Professional Credit Card Offenders and
Crime. Criminal Justice Review, 19(1), 24-55.
Lee, B., Cho, H., Chae, M., & Shim, S. (2010). Empirical Analysis of Online
Auction Fraud: Credit Card Phantom Transactions. Expert Systems with
Applications, 37, 2991-2999.
Levi, M. (1998). Organizing Plastic Fraud: Enterprise Criminals and the SideStepping of Fraud Prevention. The Howard Journal, 37(4), 423-438.
117
Levi, M. (2008). Organized Fraud and Organizing Frauds: Unpacking Research on
Networks and Organization. Criminology and Criminal Justice, 8(4), 389419.
Lewis-Beck, M.S., Bryman, A., & Liao, T.F. (2004). The SAGE Encyclopedia of
Social Science Research Methods. Thousand Oaks, CA: Sage Publications
Inc.
Linden, R., & Chaturvedi, R. (2005). The Need for Comprehensive Crime
Prevention Planning: The Case of Motor Vehicle Theft. Canadian Journal
of Criminology and Criminal Justice, 47(2), p. 251.
McRae, S. (2003). Identity Theft on Campus. Campus Safety Journal, 11(4), 28-29.
Moon, B., McCluskey, J.D., & McCluskey, C.P. (2010). A General Theory of
Crime and Computer Crime: an Empirical Test. Journal of Criminal
Justice, 38, 767-772.
National Institute of Standards and Technology, Information Technology
Laboratory (NIoSaT). (2013). Federal Information Security Management
Act. Computer Security Division, Computer Security Resource Center, 172.
One Hundred Eighth Congress of the United States of America. (2003). Fair and
Accurate Credit Transactions Act. H.R. 2622, 1-61.
Parkhill, M.R., Abbey, A., & Jacques-Tiura, A.J. (2009). How Do Sexual Assault
Characteristics Vary As a Function of Perpetrators’ level of intoxication?
Addictive Behaviors, 34(3), 331-333.
Prabowo, H.Y. (2011). Building Our Defense against Credit Card Fraud: a
Strategic View. Journal of Money Laundering Control, 14(4), 371-386.
Pratt, T.C., Holtfreter, K., & Reisig, M.D. (2010). Routine Online Activity and
Internet Fraud Targeting: Extending the Generality of Routine Activity
Theory. Journal of Research in Crime and Delinquency, 47(3), 267-296.
118
Privacy Rights Clearinghouse (PRC). (2013). Facts on F.A.C.T.A., the Fair and
Accurate Credit Transaction Act. Privacy Rights Clearinghouse, 1.
Riem, A. (2011). Cybercrimes of the 21st Century. Crimes against the Individual.
Computer Fraud and Security, 2001(4), 12-15.
Shukla, R., & Bartgis, E. (2010). Responding to Clandestine Methamphetamine
Manufacturing: A Case Study in Situational Crime Prevention. Criminal
Justice Policy Review, Indiana: September, 21(3), 338.
Slotter, K. (1997). Plastic Payments: Trends in Credit Card Fraud. The FBI Law
Enforcement Bulletin, 66(6), 1-7.
Sullivan, R.J. (2008). Can Smart Cards Reduce Payments Fraud and Identity Theft?
Economic Review, Federal Reserve bank of Kansas City, 3rd Quarter, 35-62.
Trejos, N. (2011). Identity Theft a Big Risk on the Road; Travelers’ Use of Gadgets
Makes Them a Target. USA Today, December 13th, p. 58.
United State Census Bureau. U.S. Department of Commerce (2013). Population:
Estimates and Projections by Age, Sex, Race/Ethnicity. The 2012 Statistical
Abstract. The National Data Book.
White, M.D., & Fisher, C. (2008). Assessing our Knowledge of Identity Theft: The
Challenges to Effective Prevention and Control Efforts. Criminal Justice
Policy Review, 19(1), 3-24.