CISB412 Ethics & IT Professional Practices Group Assignment 2 Varsity Debate On Ethics and Practices in Technology (Report)
CISB412 Ethics & IT Professional Practices Group Assignment 2 Varsity Debate On Ethics and Practices in Technology (Report)
CISB412 Ethics & IT Professional Practices Group Assignment 2 Varsity Debate On Ethics and Practices in Technology (Report)
Group Assignment 2
Prepared by:
No Name ID
Lavanyah Prabu CS0105371
1
Wan Nurul Najeehah Binti Wan Khairul Annan SN0105359
2
Submission date:
19/04/2019
TABLE OF CONTENT
NO TOPIC PAGE
1 Abstract II
4 Conclusion 17
5 References 18 - 20
I
ABSTRACT
Identity theft issues have been on the rise recently with the advancement of
technology around us, due to it being too hard to detect, prevent and prosecute properly
those who are doing this offence for their own gain. There are few kinds of identity theft
cases which involves various aspects. Identity theft actions could lead to more serious and
troubling matters if action is not being taken to recover the situation. The victim could be
facing criminal charges and lost of assets due to the works of identity theft. This report
seeks to provide a clearer understanding of the definition of identity theft, the reasons on
why criminal penalties for identity theft should be harsher and the ethical theories related to
identity theft. The main ethical theory that is being used in this case is Kantianism. We
strongly propose the motion that criminal penalties for identity theft should be harsher
because this crime can sometimes be more serious compared to regular theft. For example,
In a regular physical object theft, the thief takes the item away from the victim and the
problem often ends there where the victim has lost something of fixed value but in identity
theft, not only can the thief impersonate the victim to do thing of his/her gain, it affects the
victim simultaneously and often the victim won't even know their information has been
compromised until it is too late like credit card information, till to an extent, hard working
individuals who have collected a big amount of wealth and recognition or respect to their
name can all be destroyed silently with some cases victims tend to become suicidal because
II
INTRODUCTION
identity theft identity theft is becoming a major problem in today’s society. One may ask
why identity theft is growing in Malaysia. The answer is simple, as a review of literature
reveals: IT is extremely hard to detect, prevent, and prosecute. There are many ways people
can protect themselves, their identities and secure their personal information; many do not
concern themselves with this knowledge, however, until they become victims of this crime,
themselves. With advances in technology, offenders are often turning to new methods to
access information and use it for financial gain or to hide their true identity. This is why it
is imperative for people to be aware of these threats and use caution when providing
theft . This report seeks to provide a more clear understanding of the definition of identity
theft , the reasons on why criminal penalties for identity theft should be harsher and the
Identity theft cases are on the rise and many Malaysians are still unaware of its
dangers. Identity theft is a type of crime where the thief uses your personal information
such as NRIC details or credit card information to purchase merchandise, get credit and
obtain services in your name. Essentially, identity thieves are imposters who pose as
someone else for their own personal gain. There are many types of identity theft but they
can be primarily categorised under true name fraud, account takeover and criminal identity
theft
1
True name fraud is when the identity thief uses your personal information to open new
accounts. For example, in 2006, NST reported a lorry driver had received a letter from a
finance company. The letter insisted that he had outstanding loan instalments to pay even
though he personally had never taken a loan. Someone had stolen his identity and taken a
loan in his name. The finance company believed that he was trying to welch out of his
debts and the poor lorry driver was blacklisted by banks. Account takeover is when the
thief gains access to your financial account and makes changes without your
knowledge/consent. Usually ID thieves change the mailing address on an account and rack
up a huge bill before you catch on. Criminal identity theft is potentially more severe. If the
thief was arrested and they provide false identification (remember, they’re posing as you),
it would appear as if you were the one with a criminal record despite never having been
charged/arrested yourself.
The Penal Code has laws against cheating by personation which may apply to identity
The explaination for the statement above is “the offence is committed whether the
2
The punishment for which is jail time which may extend to 5 years or with a
fine or both. There are also cybercrime laws which may cover this depending on the
identity theft crime such as the Computer Crime Act 1997, Communications &
Multimedia Act 1998, Digital Signature Act 1997, Electronic Transactions Act
Recovering from identity theft can take hundreds of dollars and many days or
years repairing damage to one’s good name and credit record. Some consumers
victimized by identity theft may lose out on job opportunities, or be denied loans for
In rare cases, they may even be arrested for crimes they did not commit. Hence,
act.
3
TYPES OF IDENTITY THEFT
Driver's license theft is the most common form of ID theft. The person who stole your ID may try
to buy items under your name and get other forms of identification with their picture which can
lead to criminal identity theft. You may want to consider adding an initial security alert to your
credit file if your driver's license is stolen.
Mail identity theft is one of the oldest ways for a criminal to steal your personal information. If
your mail has been stolen a thief may be able to retrieve your financial account information to
make purchases or open up new credit cards. They could also change your address on your
statements or bills.
Credit card fraud or debit card fraud is when someone uses your credit card or credit account to
make a purchase you didn't authorize. Fraudsters can also steal your credit card account number,
PIN and security code to make unauthorized transactions, without needing your physical credit
card. Unlawful transactions like these are known as card-not-present fraud. You can visit
our fraud center if you think fraud has occurred and dispute any unauthorized or suspicious
information that appears on your credit report.
Online shopping fraud or ecommerce fraud occurs when a criminal leverages stolen payment
information or fraudulently acquired bank or credit card accounts to attempt retail transactions
without the account owner's knowledge. The items purchased are then shipped to an address other
than victim's where the stolen items are sold or shipped overseas. Online shopping fraud
increased after the new chip credit cards were implemented in the U.S., causing fraudsters to shift
their attention online. Ecommerce fraud increased more than 30% in the first six-months of 2017,
according to Experian.
4
5. Social Security Number Identity Theft
Social security number (SSN) identity theft can usually happen from data breaches or Tax ID
theft. If you start to notice mail that lists the wrong last four digits of your SSN or the wrong
name or address this may be a sign of fraud or ID theft. Make sure to check your credit report,
Experian does list all other Social Security numbers reported as belonging to you because they
may be a sign of fraud, or hopefully just the result of a typo from someone wrongly entering
information on a loan or credit application.
Account takeover fraud occurs when criminals gain or have access to your bank or credit card
accounts that usually because of a data breach, phishing scam, or malware attack and start making
charges to those accounts. Account takeover identity theft can happen with small businesses,
commercial businesses, or even corporate account takeovers. This form of identity theft has been
around for years. Watch out for unknown charges or decide if you want a credit lock as a
preventative measure.
Senior identity theft or senior scams are very common as older Americans may not be checking
their accounts or financial reports often since they're typically not opening as many new accounts
or seeking new credit. The FTC reported that 37% of Americans who are 60 years or older made
fraud complaints in 2016; 20% of those complaints were for ID theft. Seniors can fall victim to
scammers if they trust the wrong person, who may develop a relationship over time by preying on
them over the phone or via email.
Child identity theft may not be as common as other types of ID theft but it is very attractive to
thieves. That is because there is usually no credit history established for the children who become
victims. Scammers sometimes use children's Social Security numbers and other information to
open new accounts, apply for government benefits, take out loans, and more. The child may not
5
know their credit has been used to run up debt in their name until it's time to apply for school or
car loans.
While child identity theft accounts for a small portion of identity theft, child identity fraud or
theft will affect 25% of kids before turning 18, according to Experian data. You can add a fraud
alert for your child or consider getting a family identity protection plan.
Tax identity theft happens when fraudsters have your name and Social Security number and file a
tax return in your name before you file yours. In some cases, the fraudsters use fake income and
withholding numbers so they can get a bigger refund check sent to their address.
Tax ID theft has grown in recent years because the crime has been rather easy to commit. Make
sure you know how to report tax return ID theft, file your tax returns as soon as you can or
request a Tax ID pin number.
Biometric ID theft is when the physical or behavioral characteristics used to verify a person's
identity through a device are stolen. These characteristics are measurable, such as a fingerprint or
voice recognition "Hey, Alexa", that can be copied and recorded. These attributes are unique to
individuals but in the wrong hands can be used to manipulate devices or people.
Criminal identity theft is when a criminal gives your information to a police officer or law
enforcement. This can happen when your ID is lost or stolen and in the possession of a criminal.
They provide your name and information if arrested, which could show up on a background
check for you or result in a warrant issued under your name. If you believe you are a victim of
criminal identity theft you may consider signing up for an identity theft protection product.
Synthetic identity theft is the fastest-growing type of ID fraud, representing 80-to-85% of all
current identity fraud, according to the FTC. Synthetic ID theft merges real and fake personal
consumer data to create a new identity using information such as Social Security numbers, names,
addresses, and birthdays that can be bought on the dark web.
6
If you start to receive mail or phone calls asking about new credit accounts or get mail addressed
to a different name this could be a sign of synthetic ID theft. You can scan your email with a free
Dark Web Email Scan.
New account takeover or new account identity theft is when a criminal creates a new account
under your name using personal information they received from stealing your data, either directly
or via a data breach. It is a combination of both synthetic identity theft and account takeover theft.
New account identity theft often has higher rewards for fraudsters, because in many cases the
victim being impersonated will have an established relationship with the credit card lender and
that may mean access to higher credit limits. Pay attention to messages that lenders send you to
confirm activity on new and existing accounts.
Medical identity theft can be harder to discover than other types of ID theft because it happens
when someone steals another person's identity to obtain medical services. As a result, no one may
notice for awhile or until the victim receives a statement for care that they never received. More
than 27% of data breaches in 2017 were medical or healthcare related. By reading your claims
received in the mail, reviewing in detail any statement of benefits, or going online to check
existing claims you can monitor all medical activity done in your name.
Loan stacking fraud occurs when multiple loans are taken out by borrowers who slide through
today's automated approval process. Consumers love the ease of access to these online loans and
so do fraudsters. Loopholes in online lending marketplaces can result in multiple lenders making
loans to the same (fake) borrowers, often within a short period, without the full picture of their
rising obligations and declining ability to pay. Loan stacking can affect consumers if these loans
are taken out in their name.
Mortgage fraud occurs when a borrower, broker or an appraiser lies about information on the
application for a mortgage loan. They may do this in order to get approved for a bigger loan or
just to get the loan approved. During the mortgage crisis, Experian estimated that first-party fraud
7
like loan stacking may have accounted for more than 25% of all consumer credit charge-offs in
2009. After the housing crisis, more stringent approvals were put in place.
Auto lending fraud can be the same as mortgage fraud or loan stacking fraud and occurs when a
consumer, a dealer or auto lender submits or accepts a fraudulent consumer application for credit.
Auto dealers can be more concerned about getting customers into a vehicle versus doing a
thorough identity verification process. Those identity verifications are likely not cross-checked to
prevent synthetic ID fraud that can result in loan application losses. At the same time, the
borrower may be falsifying information on the loan application in order to get approved for the
car. If approved and the loan goes unpaid, the lender takes a loss.
Employment identity theft is when a criminal applies for a job using your Social Security number
or ID. Employers report income to the IRS under your name, and the government expects you to
pay taxes on all income earned in your name. The best way to spot this is to review your credit
report to find anything that you don't recognize.
Bust-out fraud is first-party fraud scheme and a deliberate form of fraud or ID theft that is also
known as sleeper fraud. It occurs when a consumer applies for credit and uses their own name or
a synthetic identity with the intent of maxing out all available credit and eventually disappearing.
Lenders are left assuming all the risk as a result and bust-out fraud can happen from people using
synthetic IDs or loan stacking methods.
Internet of Things (IoT) identity theft is when your smartphones or tablets are paired with
consumer products such as cars, heart monitors and household appliances that are connected to
the Internet, creating an opportunity for hackers to steal your data. Sometimes these connected
products can have security flaws, creating a point of weakness around the victim's personal data
that leads to the IoT fraud.
8
DISCUSSION
Malaysia,. Identity theft on the rise, where criminals steal personal details and exploit the
information, shot up by 16% from 220 in 2015 to 255 in 2016. From January to September
2017, 262 cases have already been reported to CyberSecurity Malaysia (CSM). Eventhough
our government have enforced law for cheating by impersonation which is Section 416,
“Whoever cheats shall be punished with imprisonment for a term which may extend to 5-7
years or with fine or with both. Yet the number of identity theft cases is increasing rapidly year
One of the incidents that happened in 2016 was about an identity thief was caught living
with a stolen identity for the past 32 years was caught in Gemencheh, Negeri Sembilan. The
52 year-old suspect, who assumed the identity of a Malaysian man to become a Felda
settler and married a Malaysian woman with whom he had six children, was nabbed by the
National Registration Department (NRD) when he attempted to apply for a new MyKad.
He was charged a penalty of a maximum three years’ jail or minimum fine of RM3,000
(maximum RM20,000), or both, upon conviction. Although, government has charged him
by law yet it doesn’t cause impact or awareness among society which results to the rise of
the identity theft cases in Malaysia. Therefore, criminal penalties should be severe to
reduce the rate of crimes in Malaysia. Never take identity theft easy because it could harm
For the past decade it has been a federal crime to “knowingly transfer, possess, or use,
9
news stories reminds us of the dangers of identity theft and identity impersonation from
credit card and social security numbers stolen, to bank accounts hacked into, to child
Our legal system and news media have sent us a clear message about identity theft: it is
vigilantly, against it. But in the imaginary world of popular culture, the ethics of identity
theft is, well, far less rigid. In the fictional stories we tell ourselves about identity fraud,
the act itself can actually be a justified means to a moral end. In the past year alone, three
films have been released with plots that are propelled by characters who assume false
film Source Code(2011), a soldier is transposed into the body of an everyday man who is
riding a train that will blow up in eight minutes; he is occupying the man’s body in order to
try to find the bomber on the train. In Unknown (2011), a doctor awakens after a car
accident to find that another man has assumed his identity, is married to his wife, and has
his career (the other man’s photograph even shows up when the doctor’s name is searched
on the internet). Finally, the documentary Catfish(2010) explores the world of Facebook
and the ways in which users perform their identities for people they’ve never met in real
life. As the observers, we don’t want to give too much more away from any of the three
movies, as each contains various twists and turns, but suffice it to say that identity cloning
And here’s what strikes me about this cultural content and its broader context, in each
case, the ethics of assuming someone else’s identity is not exactly black and white. In fact,
in the moral logic of Source Code, posing as another person is wholly justified if it can help
10
save the lives of others. In Unknown, it turns out that identity fraud is ultimately a
redeeming act for one of the characters. And Catfish challenges the audience to reflect on
whether questionable identity performance justifies the good works that can result in the
process. In short, if another person’s identity is assumed for reasons other than criminal
It’s not just these three movies that explore the ethical gray area of identity theft. We
can go back farther into the decade to find others. As readers of the Harry Potter series
know, the magical “polyjuice” is a potion that will transform the imbiber into another
person, at least in outward appearance. While it is used to evil purposes in one of the books,
it is also used by Harry and his friends Hermione and Ron throughout the series to obtain
valuable information and pursue dangerous missions. Their temporary acts of identity theft
are deemed morally defensible. Another example: the hero protagonist of the popular 2002
film Catch Me If You Can is a clever identity imposter based on a real life criminal whom
Of course, the theme and plot device of false identity is not a new preoccupation of
literature and cinema. Mark Twain explored it in Pudd’nhead Wilson, Herman Melville in
“Benito Cereno,” Vladimir Nabokov in his dark novel Despair. Older movies, like Day of
the Jackal, the film version of the play Six Degrees of Separation, and the science fiction
story Gattaca all revolve around identity fraud. But in the world we live in today, where
contemporary iterations of the theme even more noteworthy. As the performance of our
identity becomes more fluid, unstable indeed more uncomfirmable in this online age of
social networking, it seems that our sense of the morality of identity performance has
11
become more muddied and culturally contested. The law and the news media are telling us
one story about the ethics of identity theft and manipulation; our popular culture is telling
us another; and, we daresay, what we post on our own Facebook and Twitter accounts is
telling us a third.
After sharing the ways someone could fall victim to identity theft, it is also best to
know how common people fall victim to this crime too. According to lifelock.com the
number of victims in the US since 2014-2017 have increased by 4 million with a total 16.7
million people affected in the year of 2017 alone and losing a net worth of possessions
worth 16.8 billion USD. As technology grows, this crime grows as well but there is another
reason for this growth which is how the criminals are punished as the penalties are not
harsh and is rather lenient. In the US, The Identity Theft and Assumption Deterrence Act
has been placed to punish criminals associated with identity theft with a maximum sentence
of jail time up to 15 years. However, in Malaysia, we do not have a law specific to identity
theft, rather, the crime is somehow tied to other laws after investigations for example,
Sedition Act 1948, Defamation Act 1957, basically the Penal Code, which can then be
easily manipulated and twisted until the criminal gets a lighter punishment. It is things like
this that do not frighten potential criminals from committing this crime with ease.
The Identity Theft and Assumption Deterrence Act in the US came into effect in the
year 1998 because of the severity of certain cases. I think it is time for Malaysia to bring a
new law into effect handling specifically identity theft cases no matter if the crime is
digitally or ‘old fashion’ based. One of the main reasons punishments were created is to
show potential criminals the price they would have to pay if they commited a crime and
with penalties being lenient in malaysia, there could be a dramatic growth of cases once
potential criminals are aware of the little punishments they would be facing if caught.
12
ANALYSIS (USING WORKABLE ETHICAL THEORIES)
treat humanity whether in your own person or the person of another, always as an end and
virus which scans a person's computer for personal information including: credit cards,
social security numbers, bank accounts, and tax information with the intent to steal it or sell
it. This would be using the person's property as a mere means. You can tell if one is acting
An Australian woman, was 6-months pregnant and living in Israel when she found out
she was wanted for murder. She was listening to the radio and a news bulletin proclaimed
that three Australians were being linked to a Dubai hit squad, Mossad, that was responsible
for assassinating Hamas chief Mahmoud al-Mabhouh; her name was one of those read by
the announcer. It turns out that Nicole, along with the other two Australians, had their
identities stolen. She was still in possession of her real passport, but the thieves used her
personal information to create a new fake passport. Luckily, the fake passport did not have
her picture on it was the thief’s photo, so the theft of her identity was a bit more obvious.
From the story above using Kantianism Theory the action of the behaviour goes against the
universal moral law of good will and dustiest and obligations. The Kantianism (2nd
Formula) which the criminals action was using other person information due to gain his
person identify to kill someone and he used her identify for his self-use gain. The
Australian lady may face the charges of other people wrong doings.
13
According to principle of justice, Kantianism asked to treat people with equal respect,
assuming that all people have the same value or worth. An example would be if somebody
is stealing someone else's identity, they are violating one’s privacy and it’s disrespectful, so
therefore it is an injustice. Liberty Principle says each person is to have an equal right to
the most extensive basic liberty compatible with a similar liberty for others. Everyone
deserves to own their identity and keep it confidential. This implies for every individual
where we need to learn to respect one’s privacy if we expect our privacy to be respected, as
especially for financial gains or to conceal ones true identity for the purpose of committing
a crime. No one has the right to take what is not theirs. This includes an identity itself or
the use of that stolen identity to steal money, credit, or anything else that can be acquired
by these means. We all have a right to privacy and identity theft is serious violation of this
right. The thief now has the ability to gain access to a number of the victim’s personal
Some of the ways thieves gain access to this information violates one’s privacy,
whether it is malicious spyware or viruses that take the information from your computer or
physically stealing of credit card, driver’s license or social security card. If your identity is
stolen it presents the possibility that you could be accused and convicted of a crime that
you did not commit because someone else used your personal information to conceal their
true identity. This is a violation of your right to justice. Many of the malicious spyware and
viruses can damage your computer and this violates your right of personal property
protection. All of these are examples of disrespect and therefore unethical according to
Kant.
14
We can also look at identity theft using the Kantianism, first formulation of the
Categorical Imperative. For instance, Grey steals a person’s account credentials to loot
his/her account for his own gain. A proposed moral rule might be, “I may steal one’s
account credentials for my own gain.” However, if everyone followed this rule, every
individual’s privacy will be violated and there will be no security for one’s assets or
belongings. Grey might use the stolen account credentials in intrusions, unauthorised use of
cheques or debit cards, or unauthorised electronic transfers from a victim’s bank account.
He can even sell the stolen personal information in underground economy or post the
personal information publicly at online forums. A worst case scenario, he might causes
damage to the victim’s name and causes the victim to be answerable to law enforcement
agencies and slapped with a criminal record. His proposed moral is self-centered. Therefore,
it is wrong for Grey to steal or misuse one’s account credential forf his own gain.
John Rawls which assumes bias is non-existent, ethical discussion is facilitated, where a
consensus is not required, and that reflective equilibrium is applied. Reflective Equilibrium
means some inequalities are allowed, but they have to be to every one's advantage. In this
case, the veil ignorance are assuming everyone is equal. No one knows their social status or
power and decisions are made that any rational person would make if he/she didn't know
In such a position, behind such a veil, everyone is in the same situation, and everyone
is presumed to be equally rational. Since everyone adopts the same method for choosing
the basic principles for society, everyone will occupy the same standpoint: that of the
disembodied, rational, universal human. Therefore all who consider justice from the point
of view of the original position would agree upon the same principles of justice generated
15
out of such a thought experiment. Any one person would reach the same conclusion as any
other person concerning the most basic principles that must regulate a just society.
Everyone knows identity theft is a crime, thus we should follow the principle of justice and
governing how people are to treat one another, that rational people will agree to accept, for
their mutual benefit, on the condition that others follow those rules as well” it is wrong in
the eyes of the law to steal people’s information and imposing as them as it is not
16
CONCLUSION
Criminal penalties for identity theft should be harsher. Identity theft is a huge crime,
resulting in financial as well as emotional distress for its victims. With such lax
punishments, offenders will only be encouraged to commit such crimes. We believe that
harsher punishments for identity thieves would result in deterence and hopefully a
reduction in this crime. Today law enforcement agencies, both federal and non-federal, are
working together to develop and implement the appropriate strategies for the prosecution of
identity thieves. In addition, the law enforcement agencies should have more hasher
penalties for this kind of crimes. However, to stop identity theft, the joint actions of law
enforcement and the public should be taken. These actions should be based on cooperation
Identity theft has created havoc in people's lives. Identity thieves prey especially on the
elderly. If we witnessed someone knocking down an elderly woman and stealing her purse,
we would all agree the perpetrator should be sentenced to severe punishment. Stealing this
same person's identity is a worse crime. It has the potential to drain bank accounts of
savings, destroy credit, intercept Social Security and pension payments, and cut people off
from social interaction via email and the Internet. This can cause emotional stress more
harmful than a mugging. These penalties need to be more significant. Although the US is a
bigger country with much more people, The Identity Theft and Assumption Deterrence Act
law was brought in a long time ago, which is more than 20 years, it is definitely time for
the federal constitution of Malaysia to make changes before more lives and names are
destroyed or smudged by criminals. Therefore, criminal penalties for identity theft should
be harsher.
17
REFERENCES
1. Meikeng, Y. (2017, November 02). 'Don't fall prey to identity thieves'. Retrieved April
https://www.thestar.com.my/news/nation/2017/11/02/dont-fall-prey-to-identity-thieves
-rising-cases-of-criminals-stealing-personal-details-and-exploitin/
2. Norazhar, D. (2018, April 11). One in 10 M'sians fall victim to identity theft. Retrieved
https://themalaysianreserve.com/2018/04/11/one-in-10-msians-fall-victim-to-identity-t
heft/
3. Syuhada, A. (2017, October 06). JagaMyID aims to combat identity theft. Retrieved
https://themalaysianreserve.com/2017/10/06/jagamyid-aims-combat-identity-theft/
4. BurgieLaw, BurgieLaw, Hoe, L. C., & Hoe, L. C. (2016, October 03). What The Hell Is
https://blog.burgielaw.com/2016/09/30/what-the-hell-is-identity-theft/
5. Cybersecurity 2019 | Laws and Regulations | Malaysia | ICLG. (n.d.). Retrieved April
https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/malaysia
18
6. 20 Types of Identity Theft and Fraud. (2018, December 14). Retrieved April 18, 2019,
from
https://www.experian.com/blogs/ask-experian/20-types-of-identity-theft-and-fraud/
http://irep.iium.edu.my/27926/1/Investigating_Cybercrimes_Under_The_Malaysia.pdf
8. The Problems of Identity Theft in Malaysia in the Light of the Personal Data Protection
(PDP) Act 2010: A Hope Rejuvenated? (2011, June 17). Retrieved April 18, 2019, from
https://sonnyzulhuda.com/2011/06/17/the-problems-of-identity-theft-in-malaysia-in-the
-light-of-the-personal-data-protection-pdp-act-2010-a-hope-rejuvenated/
9. Identity Theft: Could You Be Next? (2017, October 06). Retrieved April 18, 2019, from
https://www.ctoscredit.com.my/learn/identity-theft-next/
10. Should criminal penalties for identity theft be harshers? (n.d.). Retrieved April 18, 2019,
from
https://www.debate.org/opinions/should-criminal-penalties-for-identity-theft-be-harsher
s?_escaped_fragment_
11. Theoharis, M. (2015, July 23). The Crime of Identity Theft. Retrieved April 18, 2019,
from
https://www.criminaldefenselawyer.com/crime-penalties/federal/identity-theft.htm
19
12. What is the sentencing range for identity theft? (n.d.). Retrieved April 18, 2019, from
https://www.lawyers.com/ask-a-lawyer/criminal/what-sentencing-range-for-identity-the
ft-1565331.html
13. Identity Theft Charges: What Are the Possible Punishments? (n.d.). Retrieved April 18,
2019, from
https://blogs.findlaw.com/blotter/2014/07/identity-theft-charges-what-are-the-possible-
punishments.html
14. Astley, O. R. (2009, October 24). Rick Astley - Never Gonna Give You Up (Video).
20