text
stringlengths 0
118
|
---|
liability. Judges can contribute by being more willing to acknowledge when |
these entities act unreasonably. Lawmakers can require all the actors to be |
more transparent about their operations and how they contribute to data |
breaches.69 By focusing mainly on breached organizations, the law misses |
how many other actors are creating big security risks. |
6 |
Reducing Harm from Data Breaches |
In 2002, an identity thief began using David Lazarus’s Social Security |
Number to open nine different credit card accounts. The thief used the cards |
to rack up debts at casinos.1 |
David reached out to the police for help, but they wouldn’t help him. |
Fortunately, David was a journalist and had the skills to track down the |
thief and gather evidence. The thief was arrested and convicted in 2003 and |
was eventually deported. David thought he had won. |
He was wrong. The tainted data that the thief had generated began to |
take on a life of its own. David tried to buy a house, but he had trouble |
obtaining a loan because of the debts that the thief had racked up. He was |
told that to clear up his record, he would have to pay $4,000 of the thief’s |
casino debts. |
After a long time fighting, many phone calls, and much stress, David |
was finally able to get his loan approved. The nightmare was finally over. In |
2007, David wrote an article about how he survived this ordeal.2 |
Years passed. A decade later, David received a phone call from a debt |
collector for a hospital bill in Connecticut. He had never been to a hospital |
in Connecticut.3 This error wasn’t an innocent mistake. Nor was it a |
different identity thief—it was the same thief who was at it again. “And just |
like that, the nightmare starts again,” David wrote in a follow-up article 10 |
years after his first article. He lamented “the near-impossibility of fully |
correcting erroneous online information—which I spent many hours trying |
to do the last time I dealt with this problem.”4 |
David’s case is not unusual. Identity theft is so prevalent because the law |
makes it so easy to perpetrate. Identity thieves can get away with fraud |
because companies are often not careful enough about authenticating |
people’s identity. The thieves are hard to track down. Smart identity thieves |
know that identity theft is a great boondoggle, much better than bank |
robbery. Bank robbers get caught; identity thieves don’t. |
To make matters worse, identity theft is incredibly simple to do. Our |
data ecosystem makes it easy. To conduct an identity theft, a thief just needs |
a few pieces of personal data. The identity thief can then go on a massive |
spree of fraud. With how readily systems can be breached and with all the |
data already leaked from previous breaches, identity thieves live in a world |
abundant in riches. The Internet offers up a copious bazaar of personal data |
—some for sale and some for free. The thieves can readily obtain it and |
start using it. |
The law does little to help. Laws aimed at combating identity theft are |
mostly ineffective. Several laws actually make the problem worse by |
ratcheting up the pain and suffering for identity theft victims as well as the |
overall harm and cost of data breaches. |
THE IDENTITY THEFT EPIDEMIC |
In the United States, more than 16 million people are victimized by identity |
theft in a single year.5 Identity theft is a Kafkaesque nightmare, plunging |
victims into a bureaucratic maze that can take forever to escape from. In the |
early 2000s, grave concerns were raised about the burgeoning scourge of |
identity theft.6 According to the FBI, in 2001 identity theft was the fastest |
growing form of white collar crime.7 The problem quickly became an |
epidemic. Today, hardly anything has improved. |
Types of Identity Theft |
Identity theft is the among the most tangible and legally recognized harms |
resulting from a compromise in the confidentiality, integrity, or availability |
of personal data. To understand the full impact that data breaches have on |
people, it helps to have a sense of the many different kinds of identity theft. |
FINANCIAL IDENTITY THEFT |
Financial identity theft is the most prevalent form of identity theft. Thieves |
obtain credit cards or loans in the victim’s name, racking up big debts. |
When unsuspecting victims try to obtain a loan, a job, a license, or anything |
requiring a credit check, the victims discover that their credit is trashed and |
that they owe a massive amount of debt. People can also discover that they |
have been victimized when they start receiving a barrage of phone calls |
from debt collectors. |
CRIMINAL IDENTITY THEFT |
In criminal identity theft, identity thieves provide the victim’s information |
when they are arrested. Some identity thieves dupe the police with fake |
driver’s licenses in their victim’s name.8 After their arrest, the thieves post |
bail and disappear. Later, victims discover that they are wanted for |
committing a crime. In some cases, the thief has amassed a long rap sheet |
of crimes in the victim’s name. |
One victim was repeatedly fired from jobs and had great difficulties |
getting hired because his criminal records were riddled with felonies, |
including sex crimes involving children.9 In another case, a woman in the |
Air Force returned home from an overseas deployment to discover that she |
was wanted for injury to a child, assault, and other crimes.10 In one |
instance, an identity theft victim was arrested and held in prison for more |
than two weeks until the police discovered that the fingerprints on the |
victim’s records didn’t match. Even then, the nightmare didn’t end; it |
became even more horrific when the victim was arrested again based on |
more tainted data from the identity thief.11 |
MEDICAL IDENTITY THEFT |
Another pernicious strain of identity theft is medical identity theft. |
According to the U.S. Department of Health and Human Services (HHS): |
“Medical identity theft occurs when someone steals your personal |
information (like your name, Social Security Number, or Medicare number) |
to obtain medical care, buy drugs, or submit fake billings to Medicare in |
your name.”12 |
In one case, a person went to donate blood but was denied. A fraudster |
had used her Social Security Number to get treatment at an AIDS clinic.13 |
In another case, a victim was billed $44,000 for surgery that he hadn’t |
received. One incident involved a woman who was falsely listed on the |
birth certificate of an identity thief’s baby. The baby was born addicted to |
meth, and the identity theft victim was wrongly pursued by child-protective |
services for the identity thief’s baby.14 In many cases, identity thieves use a |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.