1 / 57

Identity Theft and Congressional Response

This presentation outlines the overview of identity theft, including statistics, historical starting point, response from Congress, and its impacts. It also concludes with a Q&A discussion session.

Jims
Download Presentation

Identity Theft and Congressional Response

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Identity Theft and Congressional Response Johnny Yeh CPSC 457 Student Presentation

  2. Outline • Overview of Identity Theft • Statistics • Historical Starting Point • Response From Congress and Impacts • Conclusion • Questions / Discussion

  3. Overview of Identity Theft • What is Identity Theft (IDT)? • Theft of Documents? Money? Rights? Innocence? • The class consensus thus far • IDT requires impersonation with intent to co-opt some major part of a victim’s identity • Requires impersonation to go beyond immediate monetary benefits (i.e. cash withdrawal, credit card use, etc.)

  4. Statistics • Staggering levels of ID Theft • 1992 to 1997 there is a 16 fold increase • 1997 – 9,455 Cases

  5. Statistics • Staggering levels of ID Theft • 1992 to 1997 there is a 16 fold increase • 1997 – 9,455 Cases • 2000 – 500,000 – 700,000 Cases

  6. Statistics • Staggering levels of ID Theft • 1992 to 1997 there is a 16 fold increase • 1997 – 9,455 Cases • 2000 – 500,000 – 700,000 Cases • 2002 – 161,819 Reported Cases

  7. Statistics • Staggering levels of ID Theft • 1992 to 1997 there is a 16 fold increase • 1997 – 9,455 Cases • 2000 – 500,000 – 700,000 Cases • 2002 – 161,819 Reported Cases • 2003 – 9.91 Million Cases • Cost of $5 Billion to consumers at $500 per victim • Cost of 47.6 Billion to businesses at $4,800 per victim

  8. Statistics

  9. Statistics

  10. Statistics

  11. Statistics

  12. Historical Starting Point • Statutes regarding fraud • U.S.C. Section 1028, Title 18 • Focuses on possession and production of false documents • Standard views of identity fraud • Victim is not the person who has had her identity stolen, but the businesses defrauded • Obligations of businesses extremely limited • Law enforcement is negligible • No definition of ID theft by Federal Government • People often don’t know if it’s happened

  13. Historical Catalysts • General Accounting Office Report • May 1998: Issues report entitled “Identity Fraud: Information on Prevalence, Cost, and Internet Impact is Limited.” • Compilation of Information derived from • Public Sources: Secret Service, Social Security Administration, Post Office, etc. • Private Sources: Visa, Mastercard, Trans Union Corporation, etc. • Definition of Identity Theft • “Involves the use of personal identifying information to commit fraud.” • “Can range from unauthorized use of a credit card to comprehensive takeover of another person’s identity” • “Can result in a loss of assets or creditworthiness” • “Can claim many victims”

  14. Four Types of Laws • 1) Retributive • Detailing of crime, punishments, etc. • 2) Reconstructive • Helping victims reconstruct files, setting things right • 3) Integrative • Rallying government institutions to aid • 4) Functional • Adopting measures to help detect and prevent identity theft

  15. Identity Theft and AssumptionDeterrence Act of 1998 • Historical Details • Presented by Sen. Jon Kyl (R-AZ) on March 21, 1997 • First “real” piece of IDT Legislation • Reinforced by GAO Report • Passes Senate and goes to House where mirror this one a similar legislation is amended to • Retributive, reconstructive and integrative

  16. Provisions • Section 001. Short Title. • Act identified as “Identity Theft and Assumption Deterrence Act of 1998” • Section 002. Constitutional Authority to Enact this Legislation. • Acquires its authority from Article 1, Section 8, Clause 3 of the Constitution • “To regulate Commerce with foreign Nations, and among the several States, and with the Indian Tribes”

  17. Provisions • Section 003. Identity Theft. • Establishes the offense of identity theft • “knowingly transfers or uses, without lawful authority, a means of identification of another person, with the intent to commit, or to aid or abet, any unlawful activity that constitutes a violation of federal law, or that constitutes a felony under any applicable State or local law.” • Effect: Criminalizes identity theft and brings it to the federal level. Adopts broad definition of identity theft.

  18. Provisions • Section 003. Identity Theft. (continued) • Sets down first level punishment (15 years and a fine) • “(D) an offense under paragraph (7) of such subsection that involves the transfer or use of 1 or more means of identification if, as a result of the offense, any individual committing the offense obtains anything of value aggregating $1,000 or more during any 1-year period. • Expands types of identification that may be abused • “or transfer of an identification document or”  “, transfer, or use of a means of identification, an identification document, or a”; • Sets down second level punishment (20 years and a fine) • “(A) to facilitate a drug trafficking crime” • “(B) in connection with a crime of violence” • “(C) after a prior conviction under this section becomes final • Forfeiture of property • “Forfeiture to the United States of any personal property used or intended to be used to commit the offense”

  19. Provisions • Section 003. Identity Theft. (continued) • Definitions • “(1) the term ‘document-making implement’ means any implement, impression, electronic device, or computer hardware or software, that is specifically configured or primarily used for making an identification document, a false identification document, or another document-making implement;” • “(2) the term ‘identification document’ means a document made or issued by or under the authority of the United States Government, a State, political subdivision of a State, a foreign government, political subdivision of a foreign government, an international governmental or an international quasi-governmental organization which, when completed with information concerning a particular individual, is of a type intended or commonly accepted for the purpose of identification of individuals.”

  20. Provisions • Section 003. Identity Theft. (continued) • Definitions • Means of Identification: • “(A) name, social security number, date of birth, official State or government issued driver’s license or identification number, alien registration number, government passport number, employer or taxpayer identification number;” • “(B) Unique biometric data, such as fingerprint, voice print, retina or iris image, or other unique physical representation;” • “(C) unique electronic identification number, address, or routing code; or” • “(D) telecommunication identifying information or access device” • Effects: Makes the coverage of this act very broad and long-lasting • Attempt and Conspiracy • “Any person who attempts or conspires to commit any offense under this section shall be subject to the same penalties as those prescribed for the offense, the commission of which was the object of the attempt or conspiracy.” • Effect: Establishes a very rudimentary preventative measure

  21. Provisions • Section 004. Amendment of Federal Sentencing Guidelines for Offenses Under Section 1028 • Implies new version of “victim” • Amending federal sentencing guidelines for appropriate punishments • Takes into account: • Impact of crime, means of identification, extent of loss, range of conduct, and so forth

  22. Provisions • Section 005. Centralized Complaining and Consumer Education Service for Victims of Identity Theft. • Three duties • “(1) log and acknowledge the receipt of complaints by individuals who certify that they have a reasonable belief that 1 or more of their means of identifications… have been assumed, stolen, or otherwise unlawfully acquired in violation of section 1028 of Title 18, United States Code, as amended by this Act; • “(2) provide information materials to individuals described in paragraph (1); and” • “(3) refer complaints described in paragraph (1) to appropriate entities, which may include referral to— • “(A) the 3 major national consumer reporting agencies; and” • “(B) appropriate law enforcement agencies for potential law enforcement action.” • Effect: Creates infrastructure for combating identity theft

  23. Positive Effects • Leads to FTC hotline, database, and education campaign • Educates law enforcement and gives them a crime to pursue • Makes more clear the legal basis for identity theft law • Promotes new version of the “victim”

  24. Problems • Law enforcement will often not investigate “small thefts” even as internet helps violators target many victims • No true pro-active measures to prevent identity theft • Still difficult for people to detect identity theft • Difficulty cleaning up a victim’s record

  25. The Identity Theft Prevention Act of 2000 • Historical Details • Presented by Rep. Darlene Hooley (D-OR) in House and Sen. Dianne Feinstein (D-CA) in the Senate • Previous legislation seen as reactive, not proactive • Reconstructive and Functional

  26. Provisions • Section 1. Short Title. • Act identified as “Identity Theft Prevention Act of 2000” • Section 2. Findings. • Statistics • Arguments against social security numbers • “(6) Credit issuers, credit reporting agencies, and other organizations with access to sensitive personal data have an obligation to handle such information responsibly, and should take affirmative steps to prevent identity criminals from intercepting such information;” • Reinforces consumer as the victim and points out the inadequacy of the current system for helping them • “(9) credit reporting agencies and credit issuers should have uniform reporting requirements and effective fraud alerts to assist identity theft victims in repairing and protecting their credit” • Consumers need information about what information is collected on them

  27. Provisions • Section 3. Change of Address. • Confirmation of changes of address • “(1) In general - Not later than 10 days after receiving notification from a cardholder of a change of address, a card issuer shall send to the cardholder, both to the new address and to the former address thereof, written confirmation of that change of address • “(2) Notification of request for additional cards – If a card issuer receives a request for an additional credit card with respect to an existing credit account not later than 30 days after receiving notification of a change of address for that account, the card issuer shall notify the cardholder of the request at both the new address and the former address.” • Effect: Forces closer coordination between business and consumer • Duty of consumer reporting agencies • “Notice of potential fraud – a consumer reporting agency shall notify each user of a consumer report that is a creditor… if the agency becomes aware that an application to the card issuer to open a new credit card account bears an address for the consumer that is different from the address in the file of the consumer.” • Effect: Forces corporations to search out discrepancies

  28. Provisions • Section 3. Change of address. (Continued) • Enforcement • Grants FTC authority for enforcement • Supremacy of the Truth in Lending Act • Section 4. Fraud alerts. • Process • Consumers request fraud alerts on file • Reporting agency tells all users of this file of the existence of a fraud alert • Penalties if no compliance • Prevents issuance of credit unless issuer obtains verbal authorization from consumer at a number provided by the consumer or the issuer complies with preauthorization procedures mutually agreed upon by the consumer and the reporting agency

  29. Provisions • Section 5. Regulations on duty to investigate • “Not later than 6 months after the date of enactment of this Act, the FTC shall promulgate regulations to require each consumer reporting agency… to investigate discrepancies between personal or identifying information contained in the file maintained by the agency with respect to a consumer and in the personal and identifying supplied to the agency by the user of the consumer report. • Effect: Forces closer scrutiny on parts of corporations to root out identity theft • Section 6. Free Reports Annually. • “Free annual disclosure – Upon the request of the consumer, a consumer reporting agency shall make all disclosures pursuant to section 609 once during any 12-month period without charge to the consumer.” • Effect: Allows people to have free annual disclosures • Section 7. Identifying information. • Amends the Fair Credit Reporting Act • Ensures certain information can only be placed in a consumer report

  30. Provisions • Section 8. Individual Reference Services • Upon request, a service shall • “(1) clearly and accurately disclose to the consumer the nature, content, and substance of all information in the file maintained by the provider with respect to the consumer at the time of the request that is obtainable based upon the identifying information supplied by the consumer when making such request; and” • “(2) if the consumer has made a written request, deliver a written copy or photocopy of all information described in paragraph (1), together with a clear, simple, and plain meaning explanation of the information provided under this subsection, in a readable format and type, which shall in no case be smaller than 10 point type.” • Effect: Provides better and clearer information to consumers

  31. Provisions • Section 10. Model Forms • “In general – Six months after the date of enactment of this Act, the FTC shall develop a model form and standard procedures to be used by consumers that are victims of identity fraud in contacting and informing creditors and credit reporting agencies of such fraud, if the Commission determines, at that time, that issuers of a credit and credit reporting agencies have failed to jointly develop such a model form and standard procedures. • Effect: Standard procedure for proving that identity theft has occurred

  32. Positive Effects • Reallocates responsibility for protection onto businesses • Tries to ensure some level of consumer awareness • Early detection of identity theft • Attempts to standardize fraud reporting practices

  33. Problems • Corporate resistance • Rejects bill based on costs of reporting infrastructure • Dislikes government intervention of business practice • Present status • (House) Sitting in House Committee on Banking and Financial Services • (Senate) Sitting in Senate Committee on Banking, Housing, and Urban Affairs

  34. Internet False Identification Prevention Act of 2000 • Historical Details • Presented by Sen. Susan Collins (R-ME) and Rep. Mark Green (R-WI) • Follow-up to 1998 Act • Technological aspects are addressed • Retributive and integrative

  35. Provisions • Section 1. Short Title. • Identifies act as the “Internet False Identification Prevention Act of 2000” • Section 2. Coordinating Committee on False Identification • “(a) In general – The Attorney General and the Secretary of the Treasury shall establish a coordinating committee to ensure, thought existing interagency task forces or other means, that the creation and distribution of false identification documents is vigorously investigated and prosecuted.” • (b) “The coordinating committee shall consist of the Secret Service, the FBI, the Department of Justice, the Social Security Administration, and the Immigration and Naturalization Services” • Effect: Combines agency efforts to combat identity theft • Term – Committee will terminate after 2 years

  36. Provisions • Section 2. Coordinating Committee on False Identification (continued) • Committee will report to the Committee on the Judiciary in Congress - report will include: • “(A) the total number of indictments and informations, guilty pleas, convictions, and acquittals resulting from the investigation and prosecution of the creation and distribution of false identification documents during the preceding year.” • “(B)” Identification of the Federal judicial districts in which the indictments and informations were filed, and in which the subsequent guilty pleas, convictions, and acquittals occurred.” • “(C) specification of the Federal statutes utilized for prosecution.” • “(D)” A brief factual description of significant investigations and prosecutions; and” • “(E) Specification of the sentence imposed as result of each guilty plea and conviction.” • Effects: Gives Congress a better idea of how these laws are doing.

  37. Provisions • Section 3. False Identification. • Amends Section 1028 of Title 18 • “(7) knowingly produces or transfers a document-making implement that is designed for use in the production of a false identification document.” • “(3) the term ‘false identification document’ means an identification document of a type intended or commonly accepted for the purposes of identification of individuals that.” • “(A) is not issued by or under the authority of a government entity; and” • “(B) appears to be issued by o under the authority of the United States Government, a State, political subdivision of a State, a foreign government, political subdivision of a foreign government, an international governmental or an international quasi-governmental organization;’; and”

  38. Provisions • Section 3. False Identification. (continued) • Definition of Interactive Computer Service – “a service, system, or access software provider that-” • “(A) provides an information location tool to refer or link users to an online location, including a directory, index, or hypertext link; or” • “(B) is engaged in the transmission, storage retrieval, hosting, formatting, or translation of a communication made by another person without selection or alteration of the content of the communication, other than that done in good faith to prevent or avoid a violation of the law.” • Effects: Gives a nod to internet technology.

  39. Provisions • Section 3. False Identification. (continued) • Exceptions • “In general – Subsection (a)(7) shall not apply to an interactive computer service used by another person to produce or transfer a document making implement in violation of that subsection except- • “(A) to the extend that such service conspires with such other person to violate subsection (a)(7) • “(B) if, with respect to the particular activity at issue, such service has knowingly permitted its computer server or system to be used to engage in, or otherwise aided and abetted, activity that is prohibited by subsection (a)(7), with specific intent of an officer, director, partner, or controlling shareholder of such service that such server or system to be used for such purpose, or • “(c) if the material or activity available through such service consists primarily of material or activity that is prohibited by subsection (a)(7) • Effects: Negates responsibility

  40. Effects • Positive • Brings together Federal bodies in a more cohesive manner than before • Takes into account computer services • Problems • Doesn’t deal with novelty gifts

  41. The Identity Theft Victims Assistance Act of 2003 • Historical Details • Presented by Sen. Maria Cantwell (D-WA) on September 3, 2003. • Latest legislation to deal with IDT • Functional and integrative

  42. Provisions • Section 1. Short Title. • Identifies act as the “Identity Theft Victims Assistance Act of 2003.” • Section 2. Findings. • Similar to the Feinstein legislation • Section 3. Treatment of Identity Theft Mitigation • Definitions • Provision of records for consumers • To the victim • Any government law enforcement agency

  43. Provisions • Section 3. Treatment of Identity Theft Mitigation (continued) • If victim wishes to acquire a report, must provide at the corporation’s discretion • “(A) the presentation of a government-issued identification card;” • “(B) personally identifying information of the same type as was provided to the business entity by the unauthorized person; or” • “(C) personally identifying information that the business entity typically requests from new applicants or for new transactions at the time of the victim’s request for information;” • Effects: Even higher standards of security and closer coordination

  44. Provisions • Section 3. Treatment of Identity Theft Mitigation (continued) • If a victim wishes to prove the occurrence of identity theft, must provide – at the discretion of the business • “(A) a copy of a police report evidencing the claim of the victim of identity theft.” • “(B) a properly completed copy of a standardized affidavit of identity theft developed and made available by the FTC; or” • “(C) any properly completed affidavit of fact that is acceptable to the business entity for that purpose.”

  45. Provisions • Section 3. Treatment of Identity Theft Mitigation (continued) • Limitations on liability for corporations • Ability to reject the provision of information • No new record keeping obligations • Enforcement • Attorney General can bring civil action against businesses in violation of this Act • FTC powers

  46. Provisions • Section 3. Treatment of Identity Theft Mitigation (continued) • State civil actions – attorney general of a state can bring civil action against a business to • Enforce compliance • Obtain actual damages and punitive damages (if violation is willful) • Other “equitable” relief • Will be limited by Federal action

  47. Provisions • Section 5. Coordinating Committee Study • Extends Internet False Identification Prevention Act of 2000 Committee • Ends on December 28, 2005 • Report would contain • “(F) a comprehensive description of Federal assistance provided to State and local law enforcement agencies to address identity theft” • “(G) a comprehensive description of coordination activities between Federal, State, and local law enforcement agencies that address identity theft; and” • Recommend legislations and administrative changes

  48. Effects • Positive • Re-ignites corporate responsibility as an issue • Balances requirements with leniency • Attempts to study identity theft • Problems • Same as before

  49. Online Privacy Protection Act of 2003 • Historical details • Introduced by Rodney Frelinghuysen (R-NJ) on January 7, 2003 • Beginning to worry about flow of information in databases • Addresses internet • Ensures corporate freedoms • Functional and integrative

  50. Provisions • Section 1. Short Title. • Identifies Act as the “Online Privacy Protection Act of 2003.” • Section 2. Regulation of Unfair and Deceptive Acts… • Acts prohibited • “(1) In general – it is unlawful for an operator of a web site or online service to collect use or disclose personal information in a manner that violates the regulations prescribed under subsection (b). • But will not be held liable if disclosure is done in good faith

More Related