Identity Theft: The Importance of Prosecuting on Behalf of Victims
Abstract
:1. Introduction
2. Literature Review
2.1. Identity Theft and PII
Any information about an individual maintained by an agency, including (1) any information that can be used to distinguish or trace an individual‘s identity, such as name, social security number, date and place of birth, mother‘s given name, or biometric records; and (2) any other information that is linked or linkable to an individual, such as medical, educational, financial, and employment information.
Every person who willfully obtains personal identifying information, as defined in subdivision (b) of Section 530.55, of another person, and uses that information for any unlawful purpose, including to obtain, or attempt to obtain, credit, goods, services, real property, or medical information without the consent of that person.
2.2. How PII Is Acquired
- (1)
- passive physical guardianship (using anti-virus software and browsing securely);
- (2)
- active personal guardianship (proper management of passwords); and
- (3)
- avoidance of personal guardianship by reducing online activities such as online banking and shopping, and generally spending less time on the Internet (Williams 2015).
2.3. Determining the Value of PII
[A] hacker could break into someone’s bank account app with their phone number, email address, and mother’s maiden name. The email gives them a username, spoofing the phone number gives them a way to receive a verification code, and the mother’s maiden name gives them an answer to the security question.(ibid.)
2.4. Defining Surface Web (Internet) and Dark Web
2.5. Effects of PII Victimization
2.6. Resulting Harm from Identity Theft
2.6.1. Emotional and Physical
2.6.2. Financial, Non-Financial, and Criminal Record Identity Theft Fraud
2.6.3. Life-Altering Adjustments
2.6.4. Medical Information and Access to Health Services
2.6.5. Reputational
2.7. Research on Identity Theft
3. Current Study
4. Methods
All 50 U.S. states plus Washington, D.C., and three federal territories have in place data breach notification laws, and the SEC has recently adopted a final rule requiring that, from 18 December 2023, public companies report material cybersecurity incidents in a Form 8-K within four business days from the date on which the incident was determined to be material. Smaller reporting entities have until June 2024 to comply.
5. Results
5.1. Victim Interaction with Credit Bureau and/or Financial Institution
5.2. Victim Interaction with Law Enforcement
5.3. A Brief Overview of PII Legislation and Related Industry Standards
Schemes to commit identity theft or fraud may also involve violations of other statutes such as identification fraud (18 U.S.C. § 1028), credit card fraud (18 U.S.C. § 1029), computer fraud (18 U.S.C. § 1030), mail fraud (18 U.S.C. § 1341), wire fraud (18 U.S.C. § 1343), or financial institution fraud (18 U.S.C. § 1344). Each of these federal offenses are felonies that carry substantial penalties—in some cases, as high as 30 years’ imprisonment, fines, and criminal forfeiture.(DOJ 2024)
5.4. Review of Major Data Breaches and Assigned Penalties
5.5. Challenges Facing Those in CJ to Initiate Legal Actions Involving Identity Theft
6. Discussion
Policy Implications
- Reporting and trust building: encouraging victims and potential victims to report incidents of identity theft is critical. This requires a concerted effort to build trust between the public and LEA, prosecutors, judges, and governments. Many existing programs that provide valuable information about identity theft, best practices to avoid becoming a victim, and what to do if victimized (FTC 2023c; OPC 2024a). Policy changes could include creating more accessible and user-friendly reporting mechanisms, along with public awareness campaigns highlighting the importance of reporting and the supportive measures in place to protect and assist victims. This approach could mitigate the reluctance to report incidents, as shown by our analysis of the NCVS data. For instance, Van der Meulen (2006) demonstrated that public awareness campaigns in the U.S., U.K., and the Netherlands offered significant benefits. Firstly, by equipping the public with knowledge about identity theft, individuals are better positioned to prevent it, potentially decreasing the crime’s prevalence. Secondly, when identity theft does occur, public awareness initiatives provide victims with tools to seek timely assistance through the appropriate channels, facilitating their recovery process.
- Law enforcement training and resources: there is a need for specialized training for CJ personnel on the complexities of identity theft and the illicit acquisition of PII (Koziarski and Lee 2020; Maloney et al. 2022), if clearance rates for identity theft crimes are to improve (Vieraitis and Shuraydi 2015). This includes enhancing digital forensic capabilities and understanding the intricacies of the Dark Web where stolen PII is traded (Maloney et al. 2022). Policies could focus on allocating more resources towards training programs, equipment, and the recruitment of experts in cybercrimes to bolster investigative and prosecutorial capacities (Robertson 2019).
- Legal and regulatory frameworks: the research underscores the necessity for harmonized legal frameworks and standards for PII protection and the handling of digital evidence (Koziarski and Lee 2020). Policy implications might involve revising privacy laws to facilitate cross-jurisdictional cooperation and streamlining the processes for obtaining warrants for digital evidence (Newman and McNally 2005). There is also a call for policies that encourage or mandate companies to cooperate with LEA in providing historical electronic information when investigating identity theft (RCMP 2013).
- Victim support and remediation: the persistent vulnerability of identity theft victims calls for robust policies focused on long-term support and remediation. These measures should provide victims with easy access to correct inaccurate credit reports or address fraudulent financial activities. Legislative efforts must prioritize establishing streamlined mechanisms for victims to swiftly rectify such issues and recover from financial losses. Identity fraudsters, who possess ample time and technical expertise, exploit system loopholes, making post-crime support for victims essential in any identity crime prevention framework (Fazely 2020). While most victims are reimbursed by banks or commercial organizations, there are still those who do not receive such protection. The emotional distress and inconvenience caused by identity theft often surpass the financial losses. Thus, an effective support system should go beyond simple reimbursement—it must ensure immediate financial relief from pre-established funds.
- Enhancing prosecutorial practices: the difficulty in proving the acquisition and misuse of PII in court suggests a need for evolving prosecutorial strategies and legal standards (International Centre for Criminal Law Reform and Criminal Justice Policy 2011). Policy recommendations might include the development of new legal doctrines or evidentiary rules that acknowledge the unique challenges of prosecuting cybercrimes, especially those involving identity theft (Washington State Department of Commerce 2019).
- Class action facilitation: for breaches involving large volumes of compromised PII, the research suggests policies that make it easier to certify class-action lawsuits against entities that fail to protect data adequately is in need of immediate attention (Carson and Cameron 2023; Macnab 2022; Gelowitz et al. 2021). This particularly applies to organizations holding sensitive health records, credit records, or financial information. Existing Legislations need to evolve to incentivize organizations to adopt more stringent data protection measures to avoid potential class-action litigation.
7. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- ABS. 2024. Personal Fraud. Statistics About Personal Fraud, Including Card Fraud, Identity Theft, and Scams (Phishing, Romance, Computer Support, Financial Advice and More). Australian Bureau of Statistics. Available online: https://www.abs.gov.au/statistics/people/crime-and-justice/personal-fraud/latest-release (accessed on 24 August 2024).
- Acton, Brian. 2024. The Origins and History of the Dark Web. Available online: https://www.identityiq.com/digital-security/the-origins-and-history-of-the-dark-web/ (accessed on 7 June 2024).
- Akin, Jim. 2024. U.S. Fraud and Identity Theft Losses Topped $10 Billion in 2023. Experian. Available online: https://www.experian.com/blogs/ask-experian/identity-theft-statistics/ (accessed on 7 September 2024).
- Allison, Stuart F. H. 2003. “A Case Study of Identity Theft”. USF Tampa Graduate Theses and Dissertations. Available online: https://digitalcommons.usf.edu/etd/1322 (accessed on 7 June 2024).
- Allison, Stuart F. H., Arnie M. Schuck, and Kim M. Lersch. 2005. Exploring the crime of identity theft: Prevalence, clearance rates, and victim/offender characteristics. Journal of Criminal Justice 33: 19–29. [Google Scholar] [CrossRef]
- American Bar Association. 2020. Identity Theft and Fraud: How to Evaluate and Manage Risks. Available online: https://www.americanbar.org/news/abanews/publications/youraba/2020/youraba-march-2020/identity-theft-and-fraud/ (accessed on 7 June 2024).
- Anderson, Keith B. 2006. Who are the victims of identity theft? The effect of demographics. Journal of Public Policy & Marketing 25: 160–71. [Google Scholar]
- Anderson, Keith B., Erik Durbin, and Michael A. Salinger. 2008. Identity Theft. Journal of Economic Perspectives 22: 171–92. [Google Scholar] [CrossRef]
- Arnell, Paul, and Bukola Faturoti. 2023. The prosecution of cybercrime—Why transnational and extraterritorial jurisdiction should be resisted. International Review of Law, Computers and Technology 37: 29–51. [Google Scholar] [CrossRef]
- AVtest. 2023. Malware. Available online: https://www.av-test.org/en/statistics/malware/ (accessed on 7 June 2024).
- Balaji. 2018. Hackers Selling More Than 200 Million Stolen Data from Chinese Hotel Chain in Dark Web. GBHackers on Security. Available online: https://gbhackers.com/hackers-selling-stolen-data/ (accessed on 7 June 2024).
- Basheer, Randa, and Bassel Alkhatib. 2021. Threat from the Dark: A Review over Dark Web Investigation Research for Cyber Threat Intelligence. Journal of Computer Networks and Communications 2021: 1302999. [Google Scholar] [CrossRef]
- Beckman, Jeff. 2023. A Look at Key Dark Web Statistics (2023 Data Update). TechReport. Available online: https://techreport.com/statistics/dark-web-statistics/ (accessed on 7 June 2024).
- Beshiri, Arber S., and Arsim Susuri. 2019. Dark Web and its Impact on Online Anonymity and Privacy: A Critical Analysis and Review. Journal of Computer and Communications 7: 30–43. [Google Scholar] [CrossRef]
- BJS. 2022. Identity Theft and Financial Fraud. Available online: https://bjs.ojp.gov/topics/crime/identity-theft (accessed on 7 June 2024).
- BJS. 2023. Victims of Identity Theft, 2021. Available online: https://bjs.ojp.gov/document/vit21.pdf (accessed on 7 June 2024).
- Bloomberg Law. 2023. Consumer Data Privacy Laws. Everything You Need to Know About Consumer Data Privacy Laws So You Can Mitigate Risk and Stay Compliant. Available online: https://pro.bloomberglaw.com/consumer-data-privacy-laws/#:~:text=California%20led%20the%20charge%20in,went%20into%20effect%20on%20Jan (accessed on 7 June 2024).
- Burnes, David, Marguerite DeLiema, and Lynn Langton. 2020. Risk and Protective Factors of Identity Theft Victimization in the United States. Preventive Medicine Reports 17: 101058. [Google Scholar] [CrossRef] [PubMed]
- CAFC. 2024. Canadian Anti-Fraud Centre. Available online: https://antifraudcentre-centreantifraude.ca/index-eng.htm (accessed on 4 September 2024).
- California Legislative Information. 2023. California Penal Code Part 1, Title 13, Chapter 8, Section 530.5. Available online: https://leginfo.legislature.ca.gov/faces/codes_displaySection.xhtml?lawCode=PEN§ionNum=530.5#:~:text=(a)%20Every%20person%20who%20willfully,medical%20information%20without%20the%20consent (accessed on 14 October 2024).
- Carson, Robert, and Simon Cameron. 2023. Canadian Privacy Class Actions Evolve Beyond Traditional Data Breaches. Osler. Available online: https://www.osler.com/en/insights/updates/canadian-privacy-class-actions-evolve-beyond-traditional-data-breaches/ (accessed on 13 October 2024).
- Chen, George. 2023. Beyond detection: Uncovering unknown threats. Cyber Security: A Peer-Reviewed Journal 7: 6–15. [Google Scholar]
- Choi, Kyung-shick. 2011. Cyber Criminology. Exploring Internet Crimes and Criminal Behavior, 1st ed. New York: Routledge. [Google Scholar] [CrossRef]
- Cohen, Lawrence E., and Marcus Felson. 1979. Social Change and Crime Rate Trends: A Routine Activity Approach. American Sociological Review 44: 588–608. [Google Scholar] [CrossRef]
- Copes, Heith, Kent R. Kerley, Rodney Huff, and John Kane. 2010. Differentiating identity theft: An exploratory study of victims using a national victimization survey. Journal of Criminal Justice 38: 1045–52. Available online: https://www.uab.edu/cas/thecenter/images/Documents/Differentiating-identity-theft-An-exploratory-study-of-victims-using-a-national.pdf (accessed on 7 June 2024). [CrossRef]
- CPKN. 2021. Policing in a Digital World: Competencies and Training for Canadian Law Enforcement. Canadian Police Knowledge Network. Available online: https://www.cpkn.ca/en/news/competency-based-management-framework-for-digital-competencies-in-canadian-policing/ (accessed on 7 September 2024).
- DeLiema, Marguerite, David Burnes, and Lynn Langton. 2021. The Financial and Psychological Impact of Identity Theft Among Older Adults. Innovation in Aging 5: igab043. [Google Scholar] [CrossRef] [PubMed]
- DiNardi, Gaetano. 2023. 14 Dangers of Identity Theft That Can Leave You Reeling. AURA. Available online: https://www.aura.com/learn/dangers-of-identity-theft#:~:text=9.-,You%20could%20experience%20psychological%20harm%20and%20emotional%20distress,task%20of%20repairing%20the%20damage (accessed on 7 June 2024).
- Dixon, William. 2019. Fighting Cybercrime—What Happens to the Law When the Law Cannot Be Enforced. World Economic Forum. Available online: https://www.weforum.org/agenda/2019/02/fighting-cybercrime-what-happens-to-the-law-when-the-law-cannot-be-enforced/ (accessed on 22 August 2024).
- DOJ. 2023. In 2021, 1 in 10 Persons Had Been Victims of Identity Theft in the Past 12 Months. Available online: https://bjs.ojp.gov/document/vit21_pr.pdf (accessed on 25 August 2024).
- DOJ. 2024. Identity Theft. Criminal Division. Available online: https://www.justice.gov/criminal/criminal-fraud/identity-theft/identity-theft-and-identity-fraud (accessed on 4 September 2024).
- Equifax. 2024. Don’t Let Identity Theft Catch You off Guard. Available online: https://www.equifax.com/personal/identity-theft-protection/ (accessed on 1 November 2024).
- Exabeam. 2024. GDPR Fines Structure and the Biggest GDPR Fines to Date. Available online: https://www.exabeam.com/explainers/gdpr-compliance/gdpr-fines-structure-and-the-biggest-gdpr-fines-to-date/ (accessed on 25 August 2024).
- Fazely, Aida. 2020. Identity Crimes in the UK: An Examination of the Strategies Employed by Front-Line Practitioners in the Public and Private Sector to Detect, Prevent and Mitigate Against This Crime. Ph.D. dissertation, Middlesex University, London, UK. [Google Scholar]
- FBI. 2017. Darknet Takedown. Authorities Shutter Online Criminal Market AlphaBay. In FBI News; July 20. Available online: https://www.fbi.gov/news/stories/alphabay-takedown (accessed on 7 June 2024).
- FBI. 2022. Internet Crime Report. 2022. [PDF]. Available online: https://www.ic3.gov/AnnualReport/Reports/2022_IC3Report.pdf (accessed on 7 June 2024).
- FBI. n.d. History. Ross William Ulbright’s Laptop. Available online: https://www.fbi.gov/history/artifacts/ross-william-ulbrichts-laptop#:~:text=Ross%20William%20Ulbricht.-,Known%20online%20as%20Dread%20Pirate%20Roberts%2C%20Ulbricht%20ran%20a%20darknet,to%20conceal%20its%20users’%20locations (accessed on 7 June 2024).
- Finklea, Kristin. 2014. Identity Theft: Trends and Issues. Congressional Research Service. Available online: https://sgp.fas.org/crs/misc/R40599.pdf (accessed on 7 June 2024).
- Florida Office of the Attorney General. 2023. Morgan Stanley AVC Florida. Available online: https://www.myfloridalegal.com/sites/default/files/2023-11/executed-morgan-stanley-avc-florida.pdf (accessed on 7 June 2024).
- FTC. 1974. Fair Credit Billing Act. 15 U.S.C. 1666-1666j. Available online: https://www.ftc.gov/legal-library/browse/statutes/fair-credit-billing-act (accessed on 7 June 2024).
- FTC. 2004. FTC Issues Final Rules on FACTA Identity Theft Definitions, Active Duty Alert Duration, and Appropriate Proof of Identity. Available online: https://www.ftc.gov/news-events/news/press-releases/2004/10/ftc-issues-final-rules-facta-identity-theft-definitions-active-duty-alert-duration-appropriate-proof (accessed on 20 August 2024).
- FTC. 2011. Medical Identity Theft. FAQ’s for Health Care Providers and Health Plans. Available online: https://www.ftc.gov/business-guidance/resources/medical-identity-theft-faqs-health-care-providers-health-plans (accessed on 7 June 2024).
- FTC. 2013. Taking Charge. What to Do If Your Identity Theft Is Stolen? [PDF]. Available online: https://www.justice.gov/usao-wdmi/file/764151/ (accessed on 7 June 2024).
- FTC. 2023a. Consumer Sentinel Network Data Book 2022. Top Three Reported Identity Thefts by Year. Available online: https://www.ftc.gov/system/files/ftc_gov/pdf/CSN-Data-Book-2022.pdf (accessed on 7 June 2024).
- FTC. 2023b. Fair Credit Reporting Act. Available online: https://www.ftc.gov/legal-library/browse/statutes/fair-credit-reporting-act (accessed on 7 June 2024).
- FTC. 2023c. Identity Theft Awareness Week. Available online: https://consumer.ftc.gov/consumer-alerts/2023/01/identity-theft-awareness-week-events-focus-how-reduce-your-risk (accessed on 13 October 2024).
- FTC. 2024a. Deter-Detect-Defend. [PDF]. Available online: https://www.justice.gov/usao-edpa/file/763696/dl (accessed on 7 June 2024).
- FTC. 2024b. Recovering from Identity Theft. Available online: https://consumer.gov/scams-identity-theft/recovering-identity-theft#what-it-is (accessed on 7 June 2024).
- FTC. 2024c. Report Identity Theft and Get a Recovery Plan. Available online: https://www.identitytheft.gov/ (accessed on 7 September 2024).
- Gelowitz, Mark A., Robert Carson, W. David Rankin, Emily Mackinnon, Legranre Harper, and Celine Lauren. 2021. Canadian Courts Confirm Significant Limits on Privacy Class Actions. Osler. Available online: https://www.osler.com/en/insights/updates/canadian-courts-confirm-significant-limits-on-privacy-class-actions/ (accessed on 13 October 2024).
- GDPR. 2024. Complete Guide to GDPR Compliance. Available online: https://gdpr.eu/ (accessed on 7 June 2024).
- GOC. 2022. Bill C-26: An Act Respecting Cyber Security, Amending the Telecommunications Act and Making Consequential Amendments to Other Acts. Available online: https://www.justice.gc.ca/eng/csj-sjc/pl/charter-charte/c26_1.html (accessed on 6 September 2024).
- GOC. 2024a. Canadian Centre for Cyber Security. Government of Canada. Available online: https://www.cyber.gc.ca/en (accessed on 4 September 2024).
- GOC. 2024b. Criminal Code R.S.C., 1985, c. C-46. Government of Canada. Justice Laws Website. Available online: https://laws-lois.justice.gc.ca/eng/acts/c-46/section-402.2.html (accessed on 4 September 2024).
- Golladay, Katelyn, and Kristy Holtfreter. 2017. The consequences of identity theft victimization: An examination of emotional and physical health outcomes. Victims Offenders 12: 741–60. [Google Scholar] [CrossRef]
- Guccione, Darren. 2024. What Is the Dark Web? How to Access It and What You’ll Find. CSO. Available online: https://www.csoonline.com/article/564313/what-is-the-dark-web-how-to-access-it-and-what-youll-find.html (accessed on 7 June 2024).
- Guedes, Ines, Margarida Martins, and Carla S. Cardoso. 2023. Exploring the determinants of victimization and fear of online identity theft: An empirical study. Security Journal 36: 472–97. [Google Scholar] [CrossRef]
- Harnett, Cindy. 2024. Stolen London Drugs Data Posted Online in Ransomware Attack. Times Colonist. Available online: https://www.timescolonist.com/local-news/stolen-london-drugs-data-posted-online-in-cyberattack-8811654 (accessed on 7 June 2024).
- Harrell, Erika. 2019. Victims of Identity Theft, 2016; 1-29/NCJ 251147. Washington, DC: U.S. Department of Justice, Office of Justice Programs, Bureau of Justice Statistics. Available online: https://www.bjs.gov/content/pub/pdf/vit16.pdf (accessed on 7 June 2024).
- Harrell, Erika, and Alexandra Thompson. 2023a. Victims of Identity Theft, 2021. Bureau of Justice Statistics. Available online: https://bjs.ojp.gov/library/publications/victims-identity-theft-2021 (accessed on 7 June 2024).
- Harrell, Erika, and Alexandra Thompson. 2023b. Victims of Identity Theft, 2021. U.S. DOJ. BJS. Available online: https://bjs.ojp.gov/document/vit21.pdf (accessed on 11 September 2024).
- Harvard University Police Department. 2024. Identity Theft. Available online: https://www.hupd.harvard.edu/identity-theft#:~:text=Identity%20thieves%20use%20this%20information,rating%20and%20denial%20of%20credit (accessed on 7 June 2024).
- Hill, Michael, and Dan Swinhoe. 2022. The 15 Biggest Data Breaches of the 21st Century. CSO. Available online: https://www.csoonline.com/article/534628/the-biggest-data-breaches-of-the-21st-century.html (accessed on 7 June 2024).
- Hill, Michael, and Shweta Sharma. 2024. The Biggest Data Breach Fines, Penalties, and Settlements so Far. CSO. Available online: https://www.csoonline.com/article/567531/the-biggest-data-breach-fines-penalties-and-settlements-so-far.html (accessed on 7 June 2024).
- Hoar, Sean B. 2001. Identity Theft: The Crime of the New Millennium. U.S. Department of Justice. USA Bulletin. Available online: https://www.hsdl.org/?view&did=439991 (accessed on 7 June 2024).
- Humphries, Matthew. 2023. It’s Only May, but T-Mobile Has Already Been Hacked Twice This Year. PCMag. Available online: https://www.pcmag.com/news/its-only-may-but-t-mobile-has-already-been-hacked-twice (accessed on 7 June 2024).
- IBM. 2023. What Is Personally Identifiable Information (PII)? Available online: https://www.ibm.com/topics/pii (accessed on 7 June 2024).
- ICLG. 2023. Cybersecurity Laws and Regulations USA 2024. Available online: https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/usa (accessed on 6 September 2024).
- Identity Theft Resource Center (ITRC). 2023a. 2022 Consumer Impact Report. Experian. Available online: https://www.idtheftcenter.org/wp-content/uploads/2023/03/2022-Consumer-Impact-Report_V4.1_2023-Update.pdf (accessed on 7 June 2024).
- Identity Theft Resource Center (ITRC). 2023b. 2022 Data Breach Report. [PDF]. Available online: https://www.idtheftcenter.org/publication/2022-data-breach-report/ (accessed on 7 June 2024).
- Identity Theft Resouce Center (ITRC). 2024. Your Life, Your Identity. Let’s Keep It That Way. Available online: https://www.idtheftcenter.org/ (accessed on 1 November 2024).
- Identitytheft.org. 2024. 2024 Identity Theft Facts and Statistics. Available online: https://identitytheft.org/statistics/#:~:text=33%2525%2520of%2520Americans%2520Faced%2520Some,theft%2520attempt%2520in%2520their%2520lives (accessed on 11 September 2024).
- Insurance Information Institute. 2024. Fats + Statistics: Identity Theft and Cybercrime. Available online: https://www.iii.org/fact-statistic/facts-statistics-identity-theft-and-cybercrime (accessed on 24 August 2024).
- International Centre for Criminal Law Reform and Criminal Justice Policy. 2011. Responding to Victims of Identity Theft: A Manual for Law Enforcement Agents, Prosecutors and Policy Makers. Available online: https://icclr.org/wp-content/uploads/2019/06/00-Victims-of-Identity-Crime-Manual.pdf?x21689 (accessed on 13 October 2024).
- IRS. 2024. Identity Theft Central. Available online: https://www.irs.gov/identity-theft-central (accessed on 1 November 2024).
- Irvin-Erickson, Yasemin. 2024. Identity fraud victimization: A critical review of the literature of the past two decades. Crime Science 13: 2024. [Google Scholar] [CrossRef]
- ISO. 2016. ISO 27779:2016. Health Informatics—Information Security Management in Health Using ISO/IEC 27002. Available online: https://www.iso.org/standard/62777.html (accessed on 1 November 2024).
- ISO. 2019. ISO/IEC 27018:2019. Information Technology—Security Techniques—Code of Practice for Protection of Personlly Identifiable Information (PII) in Public Clouds Acting as PII Processors. Available online: https://www.iso.org/standard/76559.html (accessed on 1 November 2024).
- ISO. 2024. ISO/IEC 27040:2024(en). Information Technology—Security Techniques—Storage Security. Available online: https://www.iso.org/obp/ui/#iso:std:iso-iec:27040:ed-2:v1:en (accessed on 1 November 2024).
- Jones, Todd. 2023a. The 12 Latest Types of Social Engineering Attacks 2024. Aura. Available online: https://www.aura.com/learn/types-of-social-engineering-attacks (accessed on 5 October 2024).
- Jones, Todd. 2023b. What is Synthetic Identity Theft? (And How To Protect Yourself). AURA. Available online: https://www.aura.com/learn/synthetic-identity-theft-fraud (accessed on 7 June 2024).
- Jovanovic, Bojan. 2023. A Not-So-Common Cold: Malware Statistics in 2023. DataProt. Available online: https://dataprot.net/statistics/malware-statistics/ (accessed on 7 June 2023).
- Kastner, Erika. 2020. History of the Dark Web [Timeline]. SOS. Available online: https://www.soscanhelp.com/blog/history-of-the-dark-web (accessed on 7 June 2024).
- Kayser, Christopher S. 2020. Cybercrime Through Social Engineering—The New Global Crisis. Calgary: Cybercrime Analytics Inc. [Google Scholar]
- Kayser, Christopher S., Mary E. Mastrorilli, and Robert Cadigan. 2020. Preventing cybercrime: A framework for understanding the role of human vulnerabilities. Cyber Security: A Peer-Reviewed Journal 3: 159–74. [Google Scholar] [CrossRef]
- Kello, Lucas. 2021. Cyber legalism: Why it fails and what to do about it. Journal of Cybersecurity 7: tyab014. [Google Scholar] [CrossRef]
- Kiesel, Karl, Tom Deep, Austin Flaherty, and Suman Bhunia. 2022. Analyzing multi-vector ransomware attack on Accellion file transfer appliance server. Paper presented at the 2022 7th International Conference on Smart and Sustainable Technologies (SpliTech), Bol and Split, Croatia, July 5–8; Piscataway: IEEE, pp. 1–6. [Google Scholar]
- Koops, Bert-Jaap. 2012. Criminal law and Cyberspace as a Challenge for Legal Research. SCRIPTed 9: 354. Available online: https://script-ed.org/article/criminal-law-cyberspace-challenge-legal-research/ (accessed on 22 August 2024). [CrossRef]
- Koops, Bert-Jaap, and Ronald E. Leenes. 2006. Identity theft, identity fraud and or identity-related crime. Datenschutz und Datensicherheit—DuD 30: 553–56. [Google Scholar] [CrossRef]
- Koziarski, Jacek, and Jin R. Lee. 2020. Connecting Evidence-Based Policing and Cybercrime. Policing: An International Journal 43: 198–211. Available online: https://www.crimrxiv.com/pub/go7thxn6/release/1 (accessed on 12 October 2024). [CrossRef]
- Krebson Security. 2023. Hackers Claimed They Breached T-Mobile More Than 100 Times. Available online: https://krebsonsecurity.com/2023/02/hackers-claim-they-breached-t-mobile-more-than-100-times-in-2022/ (accessed on 7 June 2024).
- Lach, Arkadiusz. 2014. The Problems of Investigating Identity Theft in SNS. Paper presented at the International Conference on Cyber-Crime Investigation and Cyber Security, Kuala Lumpur, Malaysia, November 17–19; Available online: https://www.academia.edu/9346566/The_Problems_of_Investigation_of_Identity_Theft_in_SNS (accessed on 7 June 2024).
- Lai, Fujun, Dahui Li, and Chang-Tseh Hsieh. 2012. Fighting identity theft: The coping perspective. Decision Support Systems 52: 353–63. [Google Scholar] [CrossRef]
- Leukfeldt, Erik R., and Majid Yar. 2016. Applying Routine Activity Theory to Cybercrime: A Theoretical and Empirical Analysis. Deviant Behavior 37: 263–80. [Google Scholar] [CrossRef]
- Li, Yuan, Adel Yazdanmehr, Jingguo Wang, and H. Raghav Rao. 2019. Responding to identity theft: A victimization perspective. Decision Support Systems 121: 13–24. [Google Scholar] [CrossRef]
- Liu, Haun, Kai Li, Yan Chen, and Xin (Robert) Luo. 2023. Is personally identifiable information really more valuable? Evidence from consumers’ willingness-to-accept valuation of their privacy information. Decision Support Systems 173: 114010. Available online: https://www.sciencedirect.com/science/article/abs/pii/S0167923623000854 (accessed on 7 June 2024). [CrossRef]
- Liu, Yizhi, Fang U. Lin, Zara Ahmed-Post, Mohammedreza Ebrahimi, Ning Zhang, James L. Hu, Jingyu Xin, Weifeng Li, and Chen Hsinchun. 2021. Identifying, Collecting, and Monitoring Personally Identifiable Information: From the Dark Web to the Surface Web. Available online: https://par.nsf.gov/servlets/purl/10218332 (accessed on 7 June 2024).
- Macnab, Aidan. 2022. Privacy Class Actions 2021: More Misuse-of-Information Claims, Certification Used as a Screening Tool. Canadian Lawyer. Available online: https://www.canadianlawyermag.com/practice-areas/privacy-and-data/privacy-class-actions-2021-more-misuse-of-information-claims-certification-used-as-screening-tool/363558#:~:text=An%20uptick%20in%20misuse%2Dof,the%20internet%20and%20digital%20technology (accessed on 13 October 2024).
- Madnick, Stuart. 2024. Why Data Breaches Spiked in 2023. Harvard Business Review. Available online: https://hbr.org/2024/02/why-data-breaches-spiked-in-2023 (accessed on 7 June 2024).
- Mahle, J. D., N. Colvin, and E. S. Cyr. 2017. Government Enforcement When Private Date Information Is Breached: Guidance and Best Practices. N. Ky. L. Rev. 44: 41. Available online: https://scholar.google.com/scholar?hl=es&as_sdt=0%2C14&q=in+Government+Enforcement+When+Private+Date+Information+Is+Breached%3A+Guidance+and+Best+Practices%3B+Mahle%2C+Jacob+D.%3B+Colvin%2C+Nathan%3B+Cyr%2C+Emily+St.&btnG= (accessed on 7 June 2024).
- Maloney, Christopher J., N. Prabah Unnithan, and Weiqi Zhang. 2022. Assessing Law Enforcement’s Cybercrime Capacity and Capability. ARTICLES. Available online: https://leb.fbi.gov/articles/featured-articles/assessing-law-enforcements-cybercrime-capacity-and-capability- (accessed on 7 September 2024).
- Mandelblit, Bruce. 2001. Identity Theft: A New Security Challenge. Security. Available online: https://www.securitymagazine.com/articles/77638-identity-theft-a-new-security-challenge-1 (accessed on 7 June 2024).
- Martin, Craig. 2019. [Pulse] Lenders, You’ve Got Hurdles to Overcome on the Path Toward the Digital Mortgage. Housingwire. Available online: https://www.housingwire.com/articles/48129-pulse-lenders-youve-got-hurdles-to-overcome-on-the-path-toward-the-digital-mortgage/ (accessed on 7 June 2024).
- McCants, Cassidy, and Sean Golanka. 2024. U.S. Identity Theft Statistics 2024. Available online: https://www.consumeraffairs.com/finance/identity-theft-statistics.html (accessed on 24 August 2024).
- Moore, Michael J. 2015. Morgan Stanley Fires Worker Accused of Stealing Client Data. Bloomberg Business. Available online: https://www.bloomberg.com/news/articles/2015-01-05/morgan-stanley-fires-employee-accused-of-stealing-client-data (accessed on 7 June 2024).
- Muniz, Caitlyn N., Taylor Fisher, Katelyn Smith, Roan Ali, C. Jordan Howell, and David Maimon. 2024. Hello, You’ve been hacked: A study of victim notification preferences. Journal of Crime and Justice, 1–17. [Google Scholar] [CrossRef]
- NCVC. 2023. Victim Recovery Checklist. FINRA Investor Education Foundation. Available online: https://victimsofcrime.org/victim-recovery-checklist/ (accessed on 7 June 2024).
- New York State Office of the Attorney General. 2023. Attorney General James and Multistate Coalition Secure $6.5 Million from Morgan Stanley for Failing to Protect Customer Data. Available online: https://ag.ny.gov/press-release/2023/attorney-general-james-and-multistate-coalition-secure-65-million-morgan-stanley (accessed on 7 June 2024).
- Newman, Greame R., and Megan M. McNally. 2005. Identity Theft Literature Review. Available online: https://www.ojp.gov/pdffiles1/nij/grants/210459.pdf (accessed on 7 June 2024).
- Ng, Alfred. 2017. Buyers, Sellers and Cops on the Hunt for AlphaBay’s Successor. CNET. Available online: https://www.cnet.com/news/privacy/alphabay-hansa-silk-road-dream-market-dark-web-shuts-down/ (accessed on 7 June 2024).
- Nir, Onn. 2023. The Complete List of Data Security Standards. Reflectiz. Available online: https://www.reflectiz.com/blog/data-security-standards/ (accessed on 7 September 2024).
- NIST. 2020. NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0. Available online: https://nvlpubs.nist.gov/nistpubs/CSWP/NIST.CSWP.01162020.pdf (accessed on 4 September 2024).
- NIST. 2022. NIST Interagency Report NIST IR 8387. Digital Evidence Preservation. Considerations for Evidence Handlers. Available online: https://nvlpubs.nist.gov/nistpubs/ir/2022/NIST.IR.8387.pdf (accessed on 7 September 2024).
- Office of Justice Programs. 2011. OJP Fact Sheet. Identity Theft. Available online: https://www.ojp.gov/sites/g/files/xyckuh241/files/archives/factsheets/ojpfs_idtheft.html (accessed on 7 June 2024).
- Oliver, Gannicus. 2024. What Is the Dark Web? How to Access It Safely? PrivacySavvy. Available online: https://privacysavvy.com/security/safe-browsing/dark-web-safety (accessed on 21 August 2024).
- OPC. 2017. Identity Theft and You. Office of the Privacy Commissioner. Available online: https://www.priv.gc.ca/media/2034/guide_idt_e.pdf (accessed on 4 September 2024).
- OPC. 2019. The Privacy Act. Office of the Privacy Commissioner. Available online: https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-privacy-act/ (accessed on 4 September 2024).
- OPC. 2023. The Personal Information Protection and Electronic Documents Act (PIPEDA). Office of the Privacy Commissioner. Available online: https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-electronic-documents-act-pipeda/ (accessed on 7 June 2024).
- OPC. 2024a. Identity Theft and You. Available online: https://www.priv.gc.ca/en/privacy-topics/identities/identity-theft/guide_idt/%E2%80%AF (accessed on 13 October 2024).
- OPC. 2024b. 2023–2024 Survey of Canadian Businesses on Privacy-Related Issues. Office of the Privacy Commissioner. Available online: https://www.priv.gc.ca/en/opc-actions-and-decisions/research/explore-privacy-research/2024/por_2023-24_bus/ (accessed on 23 August 2024).
- OVC. 2010. Expanding Services to Reach Victims of Identity Theft and Financial Fraud. Victim Assistance: Lessons from the Field. Publication Date: October 2010. NCJ 230590. Available online: https://ovc.ojp.gov/sites/g/files/xyckuh226/files/pubs/ID_theft/stepsforvictims.html (accessed on 7 June 2024).
- Page, Carly. 2021. The Accellion Data Breach Continues to Get Messier. TechCrunch. Available online: https://techcrunch.com/2021/07/08/the-accellion-data-breach-continues-to-get-messier/ (accessed on 7 June 2024).
- Page, Carly. 2022. Morgan Stanley Hard Drives Data Breach. TechCrunch. Available online: https://techcrunch.com/2022/09/21/morgan-stanley-hard-drives-data-breach/?guccounter=1 (accessed on 7 June 2024).
- Page, Rosalyn. 2023. 10 Things You Should Know About Navigating the Dark Web. CSO. Available online: https://www.csoonline.com/article/566577/10-things-you-should-know-about-dark-web-websites.html (accessed on 7 June 2024).
- Perl, Michael W. 2004. It’s Not Always About the Money: Why the State Identity Theft Laws Fail to Adequately Address Criminal Record Identity Theft. The Journal of Criminal Law and Criminology 94: 169–208. [Google Scholar] [CrossRef]
- Peters, Allison, and Amy Jordon. 2019. Countering the cyber enforcement gap: Strengthening global capacity on cybercrime. Journal of National Security Law & Policy 10: 487. [Google Scholar]
- Petrosyan, Ani. 2024. Annual Number of Data Compromises and Individuals Impacted in the United States from 2005 to 2023. Statista. Available online: https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/ (accessed on 7 June 2024).
- PEW Research Center. 2019. Americans and Privacy: Concerned, Confused and Feeling Lack of Control over Their Personal Information. Available online: https://www.pewresearch.org/internet/2019/11/15/americans-and-privacy-concerned-confused-and-feeling-lack-of-control-over-their-personal-information/ (accessed on 23 August 2024).
- Picus Security. 2022. Key Threats and Cyber Risks Facing Financial Services and Banking Firms in 2022. Available online: https://www.picussecurity.com/key-threats-and-cyber-risks-facing-financial-services-and-banking-firms-in-2022 (accessed on 7 June 2024).
- Raman, Raghu, Vinith K. Nair, Prema Nedungadi, Indrakshi Ray, and Krishnashree Achuthan. 2023. Darkweb research: Past Achuthan, present, and future trends and mapping to sustainable development goals. Heliyon 9: e22269. Available online: https://www.sciencedirect.com/science/article/pii/S240584402309477X (accessed on 7 June 2024). [CrossRef]
- Randa, Ryan, and Bradford W. Reyns. 2020. The physical and emotional toll of identity theft victimization: A situational and demographic analysis of the National Crime Victimization Survey. Deviant Behavior 41: 1290–304. [Google Scholar] [CrossRef]
- Ravichandran, Hari. 2023. My Social Security Number Was Found on the Dark Web. Help! AURA. Available online: https://www.aura.com/learn/social-security-number-found-on-dark-web (accessed on 7 June 2024).
- RCMP. 2013. National Identity Theft Crime Strategy For a Stronger and Safer Canada. Available online: https://publications.gc.ca/collections/collection_2013/grc-rcmp/PS64-105-2013-eng.pdf (accessed on 13 October 2024).
- RCMP. 2024. RCMP Specialized Unit Combats Cybercrime Through Teamwork. Gazette Magazine. Available online: https://grc.ca/en/gazette/rcmp-specialized-unit-combats-cybercrime-through-teamwork (accessed on 4 September 2024).
- Reflectiz. 2024. Deep Dive into the Black Market of PII. Available online: https://www.reflectiz.com/blog/pii-black-market/ (accessed on 7 June 2024).
- Reyns, Bradford W., and Ryan Randa. 2017. Victim reporting behaviors following identity theft victimization: Results from the National Crime Victimization Survey. Crime & Delinquency 63: 814–38. [Google Scholar]
- Robertson, James. 2019. The Impact of the Digital Society on Police Recruit Training in Canada. Available online: https://dam-oclc.bac-lac.gc.ca/download?is_thesis=1&oclc_number=1344012535&id=1e56137e-1c79-4395-8099-df7b1243b479&fileName=Robertson_James_G.pdf (accessed on 12 October 2024).
- Rubenking, Neil J. 2022. 5 Ways Identity Theft Can Ruin Your Life. Available online: https://www.pcmag.com/how-to/5-ways-identity-theft-can-ruin-your-life (accessed on 7 June 2024).
- Sarkar, Gargi, and Sandeep K. Shukla. 2023. Behavioural analysis of cybercrime: Paving the way for effective policing strategies. Journal of Economic Criminology 2: 100034. [Google Scholar] [CrossRef]
- Schatz, Brian. 2022. Schatz Legislation To Help Fight Cybercrime Signed Into Law. Available online: https://www.schatz.senate.gov/news/press-releases/schatz-legislation-to-help-fight-cybercrime-signed-into-law (accessed on 20 August 2024).
- Schmitz, Cristin. 2008. Identity Theft Victim Claims Emotional Distress. Available online: https://www.law.com/almID/4dcafacd160ba0ad5700106d/?slreturn=20240009141617 (accessed on 7 June 2024).
- Seitz, Lyndon. 2024. Key Internet Statistics in 2024 (Including Mobile). Broadband Search. Available online: https://www.broadbandsearch.net/blog/internet-statistics (accessed on 7 June 2024).
- Sharp, Tracy, Andrea Shreve-Neiger, John Kane, William Fremouw, and Shawn Hutton. 2004. Exploring the psychological and somatic impact of identity theft. Journal of Forensic Sciences 49: 1–6. [Google Scholar] [CrossRef]
- Shinder, Debra L. 2011. What Makes Cybercrime Laws so Difficult to Enforce? Tech Republic. Available online: https://www.techrepublic.com/article/what-makes-cybercrime-laws-so-difficult-to-enforce/ (accessed on 22 August 2024).
- Sky News. 2024. Ticketmaster Hit by Cyber Attack—With Hackers ‘Offering to Sell Customer Data on Dark Web’. Available online: https://uk.news.yahoo.com/ticketmaster-hit-cyber-attack-hackers%20123700937.html?guccounter=1&guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&guce_referrer_sig=AQAAAMRv6FGKSzQ_knnlhm7NuUWiUvnCfCsL3oDCV3CGDxq_gCWOJ5v4BRa7D0kEQ70dWRxdPEUpqBcCzB5lxFuHgpqWUdfPduTNOLnG7qBsTXLFtOJl_Ts8mFnJ-BHLq9Zu6h0alux7j-gx7Ewk3qQ9mRe1ivtuKGenbViFZMf2JEhO (accessed on 7 June 2024).
- Snyder, Brady. 2024. Massive Data Breach Includes 26 Billion Records and 12 TB of Data. Android Headlines. Available online: https://www.androidheadlines.com/2024/01/massive-data-breach-includes-26-billion-records-and-12tb-of-data.html/amp (accessed on 7 June 2024).
- Soo, Zen. 2022. China’s Didi Global Fined $1.2 Billion for Data Violations. AP. Available online: https://apnews.com/article/technology-china-data-privacy-cheng-wei-d7c76a253e50d5b5aa8218eb1d3cebbd (accessed on 7 June 2024).
- State of California DOJ. 2024. Identity Theft Victim Checklist. Rob Bonta. Attorney General. Available online: https://oag.ca.gov/idtheft/facts/victim-checklist (accessed on 7 June 2024).
- Statista. 2023. Number of Internet and Social Media Users Worldwide as of October 2023. Available online: https://www.statista.com/statistics/617136/digital-population-worldwide/ (accessed on 7 June 2024).
- Statista. 2024. Rates of Identity Thefts in Canada from 2012 to 2013. Available online: https://www.statista.com/statistics/544904/identity-theft-rate-canada/ (accessed on 24 August 2024).
- Stein, Josh. 2023. Medical Identity Theft. North Carolina Department of Justice. Attorney General’s Office. Available online: https://ncdoj.gov/protecting-consumers/protecting-your-identity/medical-identity-theft/ (accessed on 7 June 2024).
- Stempel, Jonathan. 2022. Morgan Stanley to Pay $60 Million over Data Breaches. Yahoo Finance. Available online: https://ca.finance.yahoo.com/news/morgan-stanley-pay-60-million-165325091.html (accessed on 7 June 2024).
- The Heritage Foundation. 2015. Cyber-Attacks on U.S. Companies Since November 2014. Available online: https://www.heritage.org/cybersecurity/report/cyber-attacks-us-companies-november-2014 (accessed on 7 June 2024).
- T-Mobile. 2023. T-Mobile Delivers Record Customer Growth, Adding an Expected Industry-Best 6.4 Million Postpaid Customers and 2.0 Million Broadband Customers in 2022. Available online: https://www.t-mobile.com/news/business/t-mobile-preliminary-customer-results-2022 (accessed on 7 June 2024).
- TransUnion. 2024. What Is Identity Theft? Available online: https://www.transunion.ca/identity-theft (accessed on 1 November 2024).
- Trend Micro. 2015. The Morgan Stanley Breach: Understanding the Nature of Insider Threats. Available online: https://www.trendmicro.com/vinfo/pl/security/news/cybercrime-and-digital-threats/the-morgan-stanley-breach-nature-of-insider-threats (accessed on 7 June 2024).
- Trend Micro. 2018. Stolen Data from Chinese Hotel Chain Sold in Deep Web. Available online: https://www.trendmicro.com/en_us/research/18/i/we-uncovered-personally-identifiable-information-pii-stolen-from-a-china-based-hotel-chain-being-sold-on-a-deep-web-forum-we-were-monitoring.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Anti-MalwareBlog+%28Trendlabs+Security+Intelligence+Blog%29 (accessed on 7 June 2024).
- U.S. Securities and Exchange Commission. 2016. SEC: Morgan Stanley Failed to Safeguard Customer Data. Available online: https://www.sec.gov/news/press-release/2016-112 (accessed on 7 June 2024).
- UNCTAD. 2023. Data Protection and Privacy Legislation Worldwide. United Nations Conference on Trade and Development. Available online: https://unctad.org/page/data-protection-and-privacy-legislation-worldwide (accessed on 7 June 2024).
- US Senate. 1998. S. Rept. 105-274—The Identity Theft and Assumption Deterrence Act. congress.gov. Available online: https://www.congress.gov/congressional-report/105th-congress/senate-report/274/1 (accessed on 7 June 2024).
- US Senate. 2000. S. Hrg. 106-885—ID Theft: When BAD Things Happen to Your Good Name. GovInfo. Available online: https://www.govinfo.gov/app/details/CHRG-106shrg69821/context (accessed on 7 June 2024).
- USAGov. 2024. Identity Theft. Available online: https://www.usa.gov (accessed on 7 June 2024).
- Van der Meulen, Nicole. 2006. The Challenge of Countering Identity Theft: Recent Developments in the United States, the United Kingdom, and the European Union. Report Commissioned by the National Infrastructure Cyber Crime Program (NICC). Available online: https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=7dddefbe7a6751f11fe0e8baf66a982d69999035 (accessed on 1 November 2024).
- Veltman, Chloe. 2024. Millions of Customers’ Data Found on Dark Web in Latest AT&T Data Breach. NPR. Available online: https://www.npr.org/2024/03/30/1241863710/att-data-breach-dark-web (accessed on 7 June 2024).
- Vieraitis, Lynne M., and Amny Shuraydi. 2015. Identity Theft. In Oxford Handbook Topics in Criminology and Criminal Justice, 2012 online ed. Oxford: Oxford Academic. Available online: https://academic.oup.com/edited-volume/41333/chapter/352358022 (accessed on 12 October 2024). [CrossRef]
- Volle, Adam. 2024. Dark Web Science & Tech. Available online: https://www.britannica.com/topic/dark-web (accessed on 7 June 2024).
- Washington State Department of Commerce. 2019. Financial Fraud and Identity Theft Investigation and Prosecution Program. Progress Report on Task Force and Recommendations Pursuant to RCW 43.330.300(1)(c). Available online: https://www.commerce.wa.gov/wp-content/uploads/2020/06/2019-Financial-Fraud-Identify-Theft-Report.pdf (accessed on 13 October 2024).
- White, Michael D., and Christopher Fisher. 2008. Assessing Our Knowledge of Identity Theft: The Challenges to Effective Prevention and Control Efforts. Criminal Justice Policy Review 19: 3–24. [Google Scholar] [CrossRef]
- Whitty, Monica T., and Tom Buchanan. 2012. The online romance scam: A serious cybercrime. Cyberpsychology, Behavior, and Social Networking 15: 181–83. Available online: https://core.ac.uk/reader/74227018?utm_source=linkout (accessed on 7 June 2024). [CrossRef]
- Williams, Matthew L. 2015. Guardians Upon High: An Application of Routine Activities Theory to Online Identity Theft in Europe and the Country and Individual Level. The British Journal of Criminology 56: 21–48. [Google Scholar] [CrossRef]
- Zolton, Miklos. 2023. Dark Web Price Index 2023. Privacy Affairs. Available online: https://www.privacyaffairs.com/dark-web-price-index-2023/ (accessed on 7 June 2024).
N (Total = 133,753) | Victims | % | Mean | SD | |
---|---|---|---|---|---|
Existing bank accounts | 87,522 | 9037 | 10.3 | 1.90 | 0.30 |
Existing credit card accounts | 75,503 | 12,232 | 16.2 | 1.84 | 0.36 |
Existing email or SMS accounts | 77,244 | 4913 | 6.3 | 1.94 | 0.24 |
Variables/Items | Response | Frequency (%) |
---|---|---|
Did you contact someone at a credit card company or financial institution about misuse? | Yes | 6187 (68.3%) |
No | 2855 (31.5%) | |
Did you contact a credit bureau? | Yes | 637 (10.3%) |
No | 5531 (89.3%) | |
When you contacted a credit bureau did you: request credit report? | Yes | 376 (57.7%) |
No | 259 (39.7%) | |
When you contacted a credit bureau did you: request corrections to your credit report? | Yes | 234 (35.9%) |
No | 396 (60.7%) | |
When you contacted a credit bureau did you: place a fraud alert on your credit report? | Yes | 436 (66.9%) |
No | 160 (24.5%) | |
When you contacted a credit bureau did you: place a freeze on your credit report? | Yes | 365 (56.0%) |
No | 262 (40.2%) | |
How satisfied were you with the credit bureau’s response? | Very satisfied | 368 (56.4%) |
Somewhat satisfied | 158 (24.2%) | |
Somewhat dissatisfied | 27 (4.1%) | |
Very dissatisfied | 45 (6.9%) |
Variables/Items | Response | Frequency (%) |
---|---|---|
Did you contact any law enforcement agencies? | Yes | 596 (6.6%) |
No | 8444 (93.2%) | |
Did the law enforcement agency take a police report? | Yes | 428 (70.4%) |
No | 162 (26.6%) | |
Did you get a copy of the police report? | Yes | 224 (50.6%) |
No | 192 (43.3%) | |
How satisfied were you with the law enforcement agency’s response? | Very satisfied | 213 (35.0%) |
Somewhat satisfied | 171 (28.1%) | |
Somewhat dissatisfied | 72 (11.8%) | |
Very dissatisfied | 104 (17.1%) | |
Why were you dissatisfied: the police didn’t or couldn’t do anything? | Yes | 98 (51.3%) |
No | 78 (40.8%) | |
Why were you dissatisfied: the police only filled out a report? | Yes | 30 (15.7%) |
No | 146 (76.4%) | |
Why were you dissatisfied: the police said the crime did not fall in their jurisdiction? | Yes | 16 (8.4%) |
No | 160 (83.8%) | |
Why were you dissatisfied: the police gave me no information on what I should do about the crime? | Yes | 20 (10.5%) |
No | 156 (81.7%) | |
Why were you dissatisfied: the police never got back in contact with me/never learned outcome? | Yes | 42 (22.0%) |
No | 134 (70.2%) | |
Why were you dissatisfied: didn’t feel my concerns/complaints were taken seriously? | Yes | 41 (21.5%) |
No | 135 (70.7%) | |
Why were you dissatisfied: the police were unable to catch the offender? | Yes | 15 (7.9%) |
No | 161 (84.3%) |
Variables/Items | Response | Frequency (%) |
---|---|---|
Why did you decide not to contact a law enforcement agency: didn’t know that I could report it? | Yes | 794 (9.4%) |
No | 7632 (90.2%) | |
Why did you decide not to contact a law enforcement agency: didn’t think about reporting it? | Yes | 887 (10.5%) |
No | 7539 (89.1%) | |
Why did you decide not to contact a law enforcement agency: didn’t know what agency was responsible for identity theft crimes? | Yes | 216 (2.6%) |
No | 8210 (97.0%) | |
Why did you decide not to contact a law enforcement agency: I didn’t lose any money? | Yes | 1339 (15.8%) |
No | 7087 (83.7%) | |
Why did you decide not to contact a law enforcement agency: not important enough to report/small loss? | Yes | 930 (11.0%) |
No | 7496 (88.6%) | |
Why did you decide not to contact a law enforcement agency: took care of it myself? | Yes | 1433 (16.9%) |
No | 6993 (82.6%) | |
Why did you decide not to contact a law enforcement agency: credit card company/bank/other organization took care of problem? | Yes | 3805 (45.0%) |
No | 4621 (54.6%) | |
Why did you decide not to contact a law enforcement agency: didn’t think the police would do anything? | Yes | 920 (10.9%) |
No | 7506 (88.7%) | |
Why did you decide not to contact a law enforcement agency: didn’t want to bother the police? | Yes | 129 (1.5%) |
No | 8297 (98.0%) | |
Why did you decide not to contact a law enforcement agency: didn’t find out until long after it happened? | Yes | 22 (0.3%) |
No | 8404 (99.3%) | |
Why did you decide not to contact a law enforcement agency: couldn’t identify the offender? | Yes | 410 (4.8%) |
No | 8016 (94.7%) | |
Why did you decide not to contact a law enforcement agency: identity theft occurred in another state or outside of the U.S.? | Yes | 128 (1.5%) |
No | 8298 (98.0%) |
Violation/ | Date(s) | Data | Number of | Penalties | ||
---|---|---|---|---|---|---|
Organization | Location | Data Breach | Occurred | Compromised | Victims | ($US) |
Didi Global | China | Violation | Began 2015 | A-facial recognition data, B-records location data, C-other data | A-107M, B-167M, C-Unknown | $1.9B |
Amazon | Europe | Breach of the GDPR | 2021 | (Alleged) violation of cookie consent | 10,000 | $877M (proposed fine) |
Equifax | United States | Data Breach | 2017 | 150M | $575M | |
United States | Violation | 2022 | Data related to minors | Unknown | $403M | |
TikTok | Ireland | Violation | 2023 | Violating children’s data privacy | Unknown | $370M |
T-Mobile | United States | Data Breach | 2021 | Customer data | 77M | $350M |
Meta (Facebook) | Ireland | Violation | 2022 | Compromise of users’ PII | 500M | $277M |
Ireland | Violation | 2018–2021 | Cross-border data protection infringements | Unknown | $255M | |
Home Depot | United States | Data Breach | 2014 | A-Credit card, B-email info. | A-50M, B-53M | $200M |
Capital One | United States | Data Breach | 2019 | Various forms of PII | 100M | $190M |
Uber | United States | Data Breach | 2016 | Various forms of PII | 600K drivers, 57M user accounts | $148M |
Morgan Stanley | United States | Data Breach | 2020 | Various forms of PII of current and former clients | 15M | $120M |
Google Ireland | Ireland | Violation | 2021 | Cookie consent | Unknown | $102M |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Kayser, C.S.; Back, S.; Toro-Alvarez, M.M. Identity Theft: The Importance of Prosecuting on Behalf of Victims. Laws 2024, 13, 68. https://doi.org/10.3390/laws13060068
Kayser CS, Back S, Toro-Alvarez MM. Identity Theft: The Importance of Prosecuting on Behalf of Victims. Laws. 2024; 13(6):68. https://doi.org/10.3390/laws13060068
Chicago/Turabian StyleKayser, Christopher S., Sinchul Back, and Marlon Mike Toro-Alvarez. 2024. "Identity Theft: The Importance of Prosecuting on Behalf of Victims" Laws 13, no. 6: 68. https://doi.org/10.3390/laws13060068
APA StyleKayser, C. S., Back, S., & Toro-Alvarez, M. M. (2024). Identity Theft: The Importance of Prosecuting on Behalf of Victims. Laws, 13(6), 68. https://doi.org/10.3390/laws13060068