Monday, November 1, 2010

Identity Theft and the Increase in Technology

This article highlights a growing, almost unstoppable, problem with the advancement of technology today. It describes how the increase in technological advantages makes it more difficult to prevent the misuse of information on the internet. Identity theft was a highlighted crime in this situation as it has become easier to exploit this type of crime. “Identities are sold around the world quickly after they are stolen through online auction sites operated by organized crime or hackers, and they are used for a number of purposes -- most of which do not need a personal presence where a retina scan might be used.” This clip from the article highlights two critical problems with the current technological situation as well as revealing a potential problem with the proposed solution, which is physical identification.

The first problem is the availability of internet sources that make a profit selling and buying personal information. These sites are capable of quickly and discretely selling information such as credit card numbers, phone numbers, social security numbers and complete names to buyers across the world for a simple transfer of funds and an email. Considering the nature of this crime and its potential for easy money, it is no surprise that identity theft has become such a growing crime. Once the information has been stolen or purchased, it can be used to create false duplicate identities of a person on the internet. This can result in several false purchases of various products in another person’s name. However, it should be noted that these purchases are rarely sent to, or identified with, the person who had stole the information. It makes sense as a criminal would not want to identify themselves with the crime that they had just committed. An analogy was used that described a theft using a stolen credit card at an ATM. They would eventually be caught as many ATMs have cameras that watch and monitor the transactions. However, the internet does not have such a monitoring device which leads to the second problem.

The second problem is the lack of identity on the internet. Because a computer only recognizes a person as a series of inputs it is possible to become anyone on a computer as long as you possess the necessary inputs. If a person has the inputs necessary than they can essentially become anyone that they wish to and the computer will not have the ability to distinguish the difference. This allows hackers and identity thieves to pass as anyone they want to as long as they have the necessary information to do so. This includes bank accounts, paypals, credit companies and online businesses. And because of the lack of identity given by the internet, it becomes increasingly more difficult to trace someone back to the crime.

This has led many to suggest physical identification in the form of retina scanners and even fingerprint scanners. While this is just the tip of the suggestions offered, they seem to be the ones that are gaining ground in protection of information. However, the solution has some potential problems. By giving users a “physical” presence on the internet it infringes on the freedom offered by internet autonomy. This freedom will be lessened if everyone is given a traceable presence on the internet. This is one of the reasons that the article at hand suggests that a “physical” solution would be made impossible by the people who would reject it. Another problem is the implausibility of physical identification. While it is possible in the office places as well as in a few other places where information is publically accessible, it is not plausible on something as vast and flowing as the internet. I am at a loss as to how a system like this could be applied to any of the online business. Would they need direct access to a user’s personal computer to be able to gain access to the information needed? How much permission must outside sources be given in order for a system like this to function? Is it possible for hackers to scam a user into giving out their fingerprints and sensitive information?

While I see potential application to closed systems which are designed to function in a manner that allows physical identification, the internet has grown too far in complexity. So much so that it is often impossible to propose a single encompassing solution to fix an overall problem which leaves independent organizations to come up with their own solution. However, because these solutions often lack a physical way of identifying one person from another, they are often exposed to potential unauthorized access and possible identity theft. The article itself delves into the topic but its difficult to imagine that anyone is capable of understanding the problem to the depth that is needed in order to fix it.

http://www.physorg.com/news185121642.html

Other Sources

http://usgovinfo.about.com/cs/consumer/a/aaspoofing.html

http://www.privacyrights.org/fs/fs17-it.html

http://articles.winferno.com/computer-fraud/internet-identity-theft/

2 comments:

  1. It seems to me that dismissing this idea so readily leaves little hope for success. I agree that the complexity of the internet makes it difficult to install physical identification systems such as retina scans or fingerprint scans. I, however, believe that there are other ways that could make internet businesses more secure.

    The issue of anonymity on the internet is big, and mentioned in the post. But I believe that there is no need to be anonymity when a person is attempting to buy something. This is a case where identification is important and the fact that it is on the internet makes it no less important. Perhaps physical systems like a retina scan are difficult currently, but perhaps there are other ways to secure these things without using these methods.

    During the course we discussed the idea of 2 factor authentication. This may be a way to solve an issue. If online system required the input of credit card numbers (theoretically something you have to know the number) and other questions (something you know) the process could be more secure. Perhaps future systems will even require a system where a card must be physically read by the computer to input the number.

    This could help, but there is no way to know for sure. I do believe it is pessimistic to say that there is too large a problem to solve. It may be a cat and mouse game as hacking becomes more sophisticated, but I have confidence that there are solutions and these solutions will be found.

    ReplyDelete
  2. These issues are definitely becoming problematic especially now that a lot of people are using the internet to complete financial transactions. As stated in the article, people are unaware how dangerous it is for them to input their credit card numbers onto the internet with hackers who have the ability to obtain that information and sell it for a profit. It is amazing that the internet was available to make people's lives easier by paying bills online. Now, it seems to be causing more harm than good with the threat of having important information stolen.

    If there was some way to input ways of physical identification it would definitely be essential because that seems the best way to keep things private, unless a person is able to replicate a person's retina or fingerprints. The potential of this does leave some hope in the future that the internet can maybe one day become safe. Until then, we as users must secure our information as much as possible and watch where we input our credit card information.

    ReplyDelete