Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.
The Internet has made commerce as close and as quick as a mouse click, but it has also caused a dramatic increase in e-identity theft. Due to the passive approach taken by Federal and state authorities toward combating it, legal practitioners must use statutes designed to eliminate unlawful actives associated with e-identity theft, to eradicate the theft itself.
E-identity theft occurs most often when an identity thief uses the Internet to electronically gather personal information about a person sufficient to allow for the successful application for one or more credit cards in another's name. Such information normally includes the victim's name, birthday and Social Security Number.
The mundane activities of a typical Internet user during the course of a regular day may provide tremendous opportunities for an e-identity thief:
Any activity in which identity information is shared or made available to other Internet users creates an opportunity for e-identity theft.
How Identities Get Stolen
Generally speaking, e-identity theft occurs when unauthorized persons use personal information about another to create a sham identity for themselves in order to obtain money from a financial institution. Such was the case in United States v. Petersen, 98 F.3d 502, 504 (9th Cir. 1996), which affirmed the conviction of defendant who hacked into credit reporting services to obtain financial information that he used to order fraudulent credit cards in other individuals' names.
While the e-identity theft difficulty is not new, the Internet has severely exacerbated the problem. In particular, the Internet gives the impression of anonymity between the parties to an e-commerce transaction. Thus, many people have attempted to acquire goods and services illegally by using another individual's personal information or account numbers. Due to a lack of knowledge as to how to trace Internet transactions, sellers who fail to detect the fraud, normally also fail to track down the spurious e-buyer.
What Is Being Done?
Both Federal and state governments have taken a self-regulatory approach to e-identity theft, one deeply ingrained in laissez-faire economic attitudes. With the notable exception of the Federal Trade Commission, most Federal and state statutes employed to combat e-identity theft rely on industry self-regulation. The most important self-regulation mechanisms in the United States function through the Better Business Bureau, Direct Marketing Association and similar organizations.
Another notable exception occurred in December 2000 when the Congress passed the Internet False Identification Act of 2000, 114 Stat. 3075 (2000) which amended the False Identification Crime Control Act of 1982 ' codified as amended at 18 U.S.C. '1028 (1998) ' to include computer-aided false identity crimes. Section 1028 of Title 18 prohibits the production, transfer, or possession, in certain circumstances, of false identification documents or identification documents that were not legally issued to the possessor.
It further prohibits production, transfer, or possession of a “document making implement” with the intent to use it in the production of a false identification document. Additionally, the Amendment included making either false identification documents or the software or data used to make them available online.
The penalties for violation of the statute include both fines and the potential for loss of liberty. For example, the transfer or production of a federal identification document – birth certificate or driver's license ' or violating 18 U.S.C. '1028(a)(5) or '1028(a)(7), where the individual committing the offense obtains greater than $1000 as a result over a 1 year period, all are punished by a fine or not more than 15 years' imprisonment, or both.
While most states have laws prohibiting the theft of identity information, few address e-identity theft directly. The following is a partial list of current state laws that prohibit the theft of identity information but do not directly address e-identity theft:
Since e-identity theft is often committed to facilitate other crimes, legal practitioners normally rely on Federal and state statutes that actively address unlawful acts to combat e-identity thieves. In particular, the following statutes have been most often used to prosecute e-identity thieves:
Thus, it is not unusual to use a computer fraud statute in the case of an e-identity theft because a computer fraud may be facilitated by the theft of identity information when a stolen identity is used to obtain credit on the Internet by fraud. Similarly, computer fraud may also be the primary vehicle to obtain identity information when the offender obtains unauthorized access to another's computer or Web site to obtain such information. These acts might result in the offender being charged with both identity theft under 18 U.S.C. '1028(a)(7) and computer fraud under 18 U.S.C. '1030(a)(4).
The lack of Internet know-how and resources has hobbled law enforcement authorities' ability to prosecute successfully the wrongdoer; as has the lack of uniformity in civil and criminal laws regarding e-identity theft. Additionally, complications arise from the attempt to reach a balance in making e-commerce easy while inhibiting e-identity theft.
The investigation of e-identity theft is labor intensive and individual cases are usually considered to be too small for federal prosecution. Victims of e-identity theft often do not realize they have been victimized until weeks or months after the crime has been committed, and can provide little assistance to law enforcement.
The Internet has made commerce as close and as quick as a mouse click, but it has also caused a dramatic increase in e-identity theft. Due to the passive approach taken by Federal and state authorities toward combating it, legal practitioners must use statutes designed to eliminate unlawful actives associated with e-identity theft, to eradicate the theft itself.
E-identity theft occurs most often when an identity thief uses the Internet to electronically gather personal information about a person sufficient to allow for the successful application for one or more credit cards in another's name. Such information normally includes the victim's name, birthday and Social Security Number.
The mundane activities of a typical Internet user during the course of a regular day may provide tremendous opportunities for an e-identity thief:
Any activity in which identity information is shared or made available to other Internet users creates an opportunity for e-identity theft.
How Identities Get Stolen
Generally speaking, e-identity theft occurs when unauthorized persons use personal information about another to create a sham identity for themselves in order to obtain money from a financial institution. Such was the case in
While the e-identity theft difficulty is not new, the Internet has severely exacerbated the problem. In particular, the Internet gives the impression of anonymity between the parties to an e-commerce transaction. Thus, many people have attempted to acquire goods and services illegally by using another individual's personal information or account numbers. Due to a lack of knowledge as to how to trace Internet transactions, sellers who fail to detect the fraud, normally also fail to track down the spurious e-buyer.
What Is Being Done?
Both Federal and state governments have taken a self-regulatory approach to e-identity theft, one deeply ingrained in laissez-faire economic attitudes. With the notable exception of the Federal Trade Commission, most Federal and state statutes employed to combat e-identity theft rely on industry self-regulation. The most important self-regulation mechanisms in the United States function through the Better Business Bureau, Direct Marketing Association and similar organizations.
Another notable exception occurred in December 2000 when the Congress passed the Internet False Identification Act of 2000, 114 Stat. 3075 (2000) which amended the False Identification Crime Control Act of 1982 ' codified as amended at 18 U.S.C. '1028 (1998) ' to include computer-aided false identity crimes. Section 1028 of Title 18 prohibits the production, transfer, or possession, in certain circumstances, of false identification documents or identification documents that were not legally issued to the possessor.
It further prohibits production, transfer, or possession of a “document making implement” with the intent to use it in the production of a false identification document. Additionally, the Amendment included making either false identification documents or the software or data used to make them available online.
The penalties for violation of the statute include both fines and the potential for loss of liberty. For example, the transfer or production of a federal identification document – birth certificate or driver's license ' or violating 18 U.S.C. '1028(a)(5) or '1028(a)(7), where the individual committing the offense obtains greater than $1000 as a result over a 1 year period, all are punished by a fine or not more than 15 years' imprisonment, or both.
While most states have laws prohibiting the theft of identity information, few address e-identity theft directly. The following is a partial list of current state laws that prohibit the theft of identity information but do not directly address e-identity theft:
Since e-identity theft is often committed to facilitate other crimes, legal practitioners normally rely on Federal and state statutes that actively address unlawful acts to combat e-identity thieves. In particular, the following statutes have been most often used to prosecute e-identity thieves:
Thus, it is not unusual to use a computer fraud statute in the case of an e-identity theft because a computer fraud may be facilitated by the theft of identity information when a stolen identity is used to obtain credit on the Internet by fraud. Similarly, computer fraud may also be the primary vehicle to obtain identity information when the offender obtains unauthorized access to another's computer or Web site to obtain such information. These acts might result in the offender being charged with both identity theft under 18 U.S.C. '1028(a)(7) and computer fraud under 18 U.S.C. '1030(a)(4).
The lack of Internet know-how and resources has hobbled law enforcement authorities' ability to prosecute successfully the wrongdoer; as has the lack of uniformity in civil and criminal laws regarding e-identity theft. Additionally, complications arise from the attempt to reach a balance in making e-commerce easy while inhibiting e-identity theft.
The investigation of e-identity theft is labor intensive and individual cases are usually considered to be too small for federal prosecution. Victims of e-identity theft often do not realize they have been victimized until weeks or months after the crime has been committed, and can provide little assistance to law enforcement.
ENJOY UNLIMITED ACCESS TO THE SINGLE SOURCE OF OBJECTIVE LEGAL ANALYSIS, PRACTICAL INSIGHTS, AND NEWS IN ENTERTAINMENT LAW.
Already a have an account? Sign In Now Log In Now
For enterprise-wide or corporate acess, please contact Customer Service at [email protected] or 877-256-2473
With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
In June 2024, the First Department decided Huguenot LLC v. Megalith Capital Group Fund I, L.P., which resolved a question of liability for a group of condominium apartment buyers and in so doing, touched on a wide range of issues about how contracts can obligate purchasers of real property.
The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
Latham & Watkins helped the largest U.S. commercial real estate research company prevail in a breach-of-contract dispute in District of Columbia federal court.