CISB412 Ethics & IT Professional Practices Group Assignment 2 Varsity Debate On Ethics and Practices in Technology (Report)

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

CISB412

Ethics & IT Professional Practices

Group Assignment 2

Varsity Debate on Ethics and Practices


in Technology (Report)

Prepared for: Madam Ammuthavali A/P Ramasamy

Prepared by:

No Name ID
Lavanyah Prabu CS0105371
1
Wan Nurul Najeehah Binti Wan Khairul Annan SN0105359
2

Anis Nabilah Binti Mohd Yunus IS0105361


3
Muhammad Luqman Hakim Bin Mohd Zaki IS0105378
4
Dharmaruben A/L Dhanapalan SN099726
5
Kuganesh Kandasamy SN097573
6

Submission date:
19/04/2019
TABLE OF CONTENT

NO TOPIC PAGE

1 Abstract II

2 1.0 Introduction 1-3


1.1 Types of Identity Theft 4-8

3 2.0 Argument Contruction


2.1 Discussion 9 - 12
2.2 Analysis (Using workable theories) 13 - 16

4 Conclusion 17

5 References 18 - 20

I
ABSTRACT

Identity theft issues have been on the rise recently with the advancement of

technology around us, due to it being too hard to detect, prevent and prosecute properly

those who are doing this offence for their own gain. There are few kinds of identity theft

cases which involves various aspects. Identity theft actions could lead to more serious and

troubling matters if action is not being taken to recover the situation. The victim could be

facing criminal charges and lost of assets due to the works of identity theft. This report

seeks to provide a clearer understanding of the definition of identity theft, the reasons on

why criminal penalties for identity theft should be harsher and the ethical theories related to

identity theft. The main ethical theory that is being used in this case is Kantianism. We

strongly propose the motion that criminal penalties for identity theft should be harsher

because this crime can sometimes be more serious compared to regular theft. For example,

In a regular physical object theft, the thief takes the item away from the victim and the

problem often ends there where the victim has lost something of fixed value but in identity

theft, not only can the thief impersonate the victim to do thing of his/her gain, it affects the

victim simultaneously and often the victim won't even know their information has been

compromised until it is too late like credit card information, till to an extent, hard working

individuals who have collected a big amount of wealth and recognition or respect to their

name can all be destroyed silently with some cases victims tend to become suicidal because

they have lost everything in their life.

II
INTRODUCTION

With advances in technology and increases in impersonal electronic transactions,

identity theft identity theft is becoming a major problem in today’s society. One may ask

why identity theft is growing in Malaysia. The answer is simple, as a review of literature

reveals: IT is extremely hard to detect, prevent, and prosecute. There are many ways people

can protect themselves, their identities and secure their personal information; many do not

concern themselves with this knowledge, however, until they become victims of this crime,

themselves. With advances in technology, offenders are often turning to new methods to

access information and use it for financial gain or to hide their true identity. This is why it

is imperative for people to be aware of these threats and use caution when providing

personal information to anyone to protect themselves from becoming victims of identity

theft . This report seeks to provide a more clear understanding of the definition of identity

theft , the reasons on why criminal penalties for identity theft should be harsher and the

ethical theories related to identity theft.

Identity theft cases are on the rise and many Malaysians are still unaware of its

dangers. Identity theft is a type of crime where the thief uses your personal information

such as NRIC details or credit card information to purchase merchandise, get credit and

obtain services in your name. Essentially, identity thieves are imposters who pose as

someone else for their own personal gain. There are many types of identity theft but they

can be primarily categorised under true name fraud, account takeover and criminal identity

theft

1
True name fraud is when the identity thief uses your personal information to open new

accounts. For example, in 2006, NST reported a lorry driver had received a letter from a

finance company. The letter insisted that he had outstanding loan instalments to pay even

though he personally had never taken a loan. Someone had stolen his identity and taken a

loan in his name. The finance company believed that he was trying to welch out of his

debts and the poor lorry driver was blacklisted by banks. Account takeover is when the

thief gains access to your financial account and makes changes without your

knowledge/consent. Usually ID thieves change the mailing address on an account and rack

up a huge bill before you catch on. Criminal identity theft is potentially more severe. If the

thief was arrested and they provide false identification (remember, they’re posing as you),

it would appear as if you were the one with a criminal record despite never having been

charged/arrested yourself.

The Penal Code has laws against cheating by personation which may apply to identity

theft. Section 416 defines cheating by personation as:

A person is said to “cheat by personation”, if he cheats by pretending to be

some other person, or by knowingly substituting one person for another, or

representing that he or any other person is a person other than he or such

other person really is.

The explaination for the statement above is “the offence is committed whether the

individual personated is a real or imaginary person”.

2
The punishment for which is jail time which may extend to 5 years or with a

fine or both. There are also cybercrime laws which may cover this depending on the

identity theft crime such as the Computer Crime Act 1997, Communications &

Multimedia Act 1998, Digital Signature Act 1997, Electronic Transactions Act

2006 etc. etc.

Recovering from identity theft can take hundreds of dollars and many days or

years repairing damage to one’s good name and credit record. Some consumers

victimized by identity theft may lose out on job opportunities, or be denied loans for

education, housing, or cars because of negative information on their credit reports.

In rare cases, they may even be arrested for crimes they did not commit. Hence,

identity theft criminals deserve to be given severe punishments to avoid malicious

act.

3
TYPES OF IDENTITY THEFT

1. Driver's License Identity Theft

Driver's license theft is the most common form of ID theft. The person who stole your ID may try
to buy items under your name and get other forms of identification with their picture which can
lead to criminal identity theft. You may want to consider adding an initial security alert to your
credit file if your driver's license is stolen.

2. Mail Identity Theft

Mail identity theft is one of the oldest ways for a criminal to steal your personal information. If
your mail has been stolen a thief may be able to retrieve your financial account information to
make purchases or open up new credit cards. They could also change your address on your
statements or bills.

3. Debit Card Fraud or Credit Card Fraud

Credit card fraud or debit card fraud is when someone uses your credit card or credit account to
make a purchase you didn't authorize. Fraudsters can also steal your credit card account number,
PIN and security code to make unauthorized transactions, without needing your physical credit
card. Unlawful transactions like these are known as card-not-present fraud. You can visit
our fraud center if you think fraud has occurred and dispute any unauthorized or suspicious
information that appears on your credit report.

4. Online Shopping Fraud

Online shopping fraud or ecommerce fraud occurs when a criminal leverages stolen payment
information or fraudulently acquired bank or credit card accounts to attempt retail transactions
without the account owner's knowledge. The items purchased are then shipped to an address other
than victim's where the stolen items are sold or shipped overseas. Online shopping fraud
increased after the new chip credit cards were implemented in the U.S., causing fraudsters to shift
their attention online. Ecommerce fraud increased more than 30% in the first six-months of 2017,
according to Experian.

4
5. Social Security Number Identity Theft

Social security number (SSN) identity theft can usually happen from data breaches or Tax ID
theft. If you start to notice mail that lists the wrong last four digits of your SSN or the wrong
name or address this may be a sign of fraud or ID theft. Make sure to check your credit report,
Experian does list all other Social Security numbers reported as belonging to you because they
may be a sign of fraud, or hopefully just the result of a typo from someone wrongly entering
information on a loan or credit application.

6. Account Takeover Identity Theft

Account takeover fraud occurs when criminals gain or have access to your bank or credit card
accounts that usually because of a data breach, phishing scam, or malware attack and start making
charges to those accounts. Account takeover identity theft can happen with small businesses,
commercial businesses, or even corporate account takeovers. This form of identity theft has been
around for years. Watch out for unknown charges or decide if you want a credit lock as a
preventative measure.

7. Senior Identity Theft/Senior Scams

Senior identity theft or senior scams are very common as older Americans may not be checking
their accounts or financial reports often since they're typically not opening as many new accounts
or seeking new credit. The FTC reported that 37% of Americans who are 60 years or older made
fraud complaints in 2016; 20% of those complaints were for ID theft. Seniors can fall victim to
scammers if they trust the wrong person, who may develop a relationship over time by preying on
them over the phone or via email.

8. Child Identity Theft

Child identity theft may not be as common as other types of ID theft but it is very attractive to
thieves. That is because there is usually no credit history established for the children who become
victims. Scammers sometimes use children's Social Security numbers and other information to
open new accounts, apply for government benefits, take out loans, and more. The child may not

5
know their credit has been used to run up debt in their name until it's time to apply for school or
car loans.

While child identity theft accounts for a small portion of identity theft, child identity fraud or
theft will affect 25% of kids before turning 18, according to Experian data. You can add a fraud
alert for your child or consider getting a family identity protection plan.

9. Tax Identity Theft

Tax identity theft happens when fraudsters have your name and Social Security number and file a
tax return in your name before you file yours. In some cases, the fraudsters use fake income and
withholding numbers so they can get a bigger refund check sent to their address.

Tax ID theft has grown in recent years because the crime has been rather easy to commit. Make
sure you know how to report tax return ID theft, file your tax returns as soon as you can or
request a Tax ID pin number.

10. Biometric ID Theft

Biometric ID theft is when the physical or behavioral characteristics used to verify a person's
identity through a device are stolen. These characteristics are measurable, such as a fingerprint or
voice recognition "Hey, Alexa", that can be copied and recorded. These attributes are unique to
individuals but in the wrong hands can be used to manipulate devices or people.

11. Criminal Identity Theft

Criminal identity theft is when a criminal gives your information to a police officer or law
enforcement. This can happen when your ID is lost or stolen and in the possession of a criminal.
They provide your name and information if arrested, which could show up on a background
check for you or result in a warrant issued under your name. If you believe you are a victim of
criminal identity theft you may consider signing up for an identity theft protection product.

12. Synthetic Identity Theft

Synthetic identity theft is the fastest-growing type of ID fraud, representing 80-to-85% of all
current identity fraud, according to the FTC. Synthetic ID theft merges real and fake personal
consumer data to create a new identity using information such as Social Security numbers, names,
addresses, and birthdays that can be bought on the dark web.

6
If you start to receive mail or phone calls asking about new credit accounts or get mail addressed
to a different name this could be a sign of synthetic ID theft. You can scan your email with a free
Dark Web Email Scan.

13. New Account Takeover

New account takeover or new account identity theft is when a criminal creates a new account
under your name using personal information they received from stealing your data, either directly
or via a data breach. It is a combination of both synthetic identity theft and account takeover theft.

New account identity theft often has higher rewards for fraudsters, because in many cases the
victim being impersonated will have an established relationship with the credit card lender and
that may mean access to higher credit limits. Pay attention to messages that lenders send you to
confirm activity on new and existing accounts.

14. Medical Identity Theft

Medical identity theft can be harder to discover than other types of ID theft because it happens
when someone steals another person's identity to obtain medical services. As a result, no one may
notice for awhile or until the victim receives a statement for care that they never received. More
than 27% of data breaches in 2017 were medical or healthcare related. By reading your claims
received in the mail, reviewing in detail any statement of benefits, or going online to check
existing claims you can monitor all medical activity done in your name.

15. Loan Stacking Fraud

Loan stacking fraud occurs when multiple loans are taken out by borrowers who slide through
today's automated approval process. Consumers love the ease of access to these online loans and
so do fraudsters. Loopholes in online lending marketplaces can result in multiple lenders making
loans to the same (fake) borrowers, often within a short period, without the full picture of their
rising obligations and declining ability to pay. Loan stacking can affect consumers if these loans
are taken out in their name.

16. Mortgage Fraud

Mortgage fraud occurs when a borrower, broker or an appraiser lies about information on the
application for a mortgage loan. They may do this in order to get approved for a bigger loan or
just to get the loan approved. During the mortgage crisis, Experian estimated that first-party fraud

7
like loan stacking may have accounted for more than 25% of all consumer credit charge-offs in
2009. After the housing crisis, more stringent approvals were put in place.

17. Auto Lending Fraud

Auto lending fraud can be the same as mortgage fraud or loan stacking fraud and occurs when a
consumer, a dealer or auto lender submits or accepts a fraudulent consumer application for credit.
Auto dealers can be more concerned about getting customers into a vehicle versus doing a
thorough identity verification process. Those identity verifications are likely not cross-checked to
prevent synthetic ID fraud that can result in loan application losses. At the same time, the
borrower may be falsifying information on the loan application in order to get approved for the
car. If approved and the loan goes unpaid, the lender takes a loss.

18. Employment Identity Theft

Employment identity theft is when a criminal applies for a job using your Social Security number
or ID. Employers report income to the IRS under your name, and the government expects you to
pay taxes on all income earned in your name. The best way to spot this is to review your credit
report to find anything that you don't recognize.

19. Bust-Out Fraud

Bust-out fraud is first-party fraud scheme and a deliberate form of fraud or ID theft that is also
known as sleeper fraud. It occurs when a consumer applies for credit and uses their own name or
a synthetic identity with the intent of maxing out all available credit and eventually disappearing.
Lenders are left assuming all the risk as a result and bust-out fraud can happen from people using
synthetic IDs or loan stacking methods.

20. Internet of Things Identity Theft

Internet of Things (IoT) identity theft is when your smartphones or tablets are paired with
consumer products such as cars, heart monitors and household appliances that are connected to
the Internet, creating an opportunity for hackers to steal your data. Sometimes these connected
products can have security flaws, creating a point of weakness around the victim's personal data
that leads to the IoT fraud.

8
DISCUSSION

Why criminal penalties of idenity theft should be harsher? According to CyberSecurity

Malaysia,. Identity theft on the rise, where criminals steal personal details and exploit the

information, shot up by 16% from 220 in 2015 to 255 in 2016. From January to September

2017, 262 cases have already been reported to CyberSecurity Malaysia (CSM). Eventhough

our government have enforced law for cheating by impersonation which is Section 416,

“Whoever cheats shall be punished with imprisonment for a term which may extend to 5-7

years or with fine or with both. Yet the number of identity theft cases is increasing rapidly year

by year which shows lack of effectiveness in the law enforced.

One of the incidents that happened in 2016 was about an identity thief was caught living

with a stolen identity for the past 32 years was caught in Gemencheh, Negeri Sembilan. The

52 year-old suspect, who assumed the identity of a Malaysian man to become a Felda

settler and married a Malaysian woman with whom he had six children, was nabbed by the

National Registration Department (NRD) when he attempted to apply for a new MyKad.

He was charged a penalty of a maximum three years’ jail or minimum fine of RM3,000

(maximum RM20,000), or both, upon conviction. Although, government has charged him

by law yet it doesn’t cause impact or awareness among society which results to the rise of

the identity theft cases in Malaysia. Therefore, criminal penalties should be severe to

reduce the rate of crimes in Malaysia. Never take identity theft easy because it could harm

one’s live and people surrounding them.

For the past decade it has been a federal crime to “knowingly transfer, possess, or use,

without lawful authority, a means of identification of another person.” A steady stream of

9
news stories reminds us of the dangers of identity theft and identity impersonation from

credit card and social security numbers stolen, to bank accounts hacked into, to child

predators trolling social networking sites under false identities.

Our legal system and news media have sent us a clear message about identity theft: it is

criminal. It is unacceptable. It is a menace to society. You need to protect yourself,

vigilantly, against it. But in the imaginary world of popular culture, the ethics of identity

theft is, well, far less rigid. In the fictional stories we tell ourselves about identity fraud,

the act itself can actually be a justified means to a moral end. In the past year alone, three

films have been released with plots that are propelled by characters who assume false

identities, identities inhabited “knowingly” and without permission. In the sci-fi

film Source Code(2011), a soldier is transposed into the body of an everyday man who is

riding a train that will blow up in eight minutes; he is occupying the man’s body in order to

try to find the bomber on the train. In Unknown (2011), a doctor awakens after a car

accident to find that another man has assumed his identity, is married to his wife, and has

his career (the other man’s photograph even shows up when the doctor’s name is searched

on the internet). Finally, the documentary Catfish(2010) explores the world of Facebook

and the ways in which users perform their identities for people they’ve never met in real

life. As the observers, we don’t want to give too much more away from any of the three

movies, as each contains various twists and turns, but suffice it to say that identity cloning

and identity manipulation is a theme that runs through all of them.

And here’s what strikes me about this cultural content and its broader context, in each

case, the ethics of assuming someone else’s identity is not exactly black and white. In fact,

in the moral logic of Source Code, posing as another person is wholly justified if it can help

10
save the lives of others. In Unknown, it turns out that identity fraud is ultimately a

redeeming act for one of the characters. And Catfish challenges the audience to reflect on

whether questionable identity performance justifies the good works that can result in the

process. In short, if another person’s identity is assumed for reasons other than criminal

purposes and/or economic gain, then it may just be okay.

It’s not just these three movies that explore the ethical gray area of identity theft. We

can go back farther into the decade to find others. As readers of the Harry Potter series

know, the magical “polyjuice” is a potion that will transform the imbiber into another

person, at least in outward appearance. While it is used to evil purposes in one of the books,

it is also used by Harry and his friends Hermione and Ron throughout the series to obtain

valuable information and pursue dangerous missions. Their temporary acts of identity theft

are deemed morally defensible. Another example: the hero protagonist of the popular 2002

film Catch Me If You Can is a clever identity imposter based on a real life criminal whom

the audience finds itself rooting for.

Of course, the theme and plot device of false identity is not a new preoccupation of

literature and cinema. Mark Twain explored it in Pudd’nhead Wilson, Herman Melville in

“Benito Cereno,” Vladimir Nabokov in his dark novel Despair. Older movies, like Day of

the Jackal, the film version of the play Six Degrees of Separation, and the science fiction

story Gattaca all revolve around identity fraud. But in the world we live in today, where

online identity theft is a rapidly growing criminal phenomenon, we find these

contemporary iterations of the theme even more noteworthy. As the performance of our

identity becomes more fluid, unstable indeed more uncomfirmable in this online age of

social networking, it seems that our sense of the morality of identity performance has

11
become more muddied and culturally contested. The law and the news media are telling us

one story about the ethics of identity theft and manipulation; our popular culture is telling

us another; and, we daresay, what we post on our own Facebook and Twitter accounts is

telling us a third.

After sharing the ways someone could fall victim to identity theft, it is also best to

know how common people fall victim to this crime too. According to lifelock.com the

number of victims in the US since 2014-2017 have increased by 4 million with a total 16.7

million people affected in the year of 2017 alone and losing a net worth of possessions

worth 16.8 billion USD. As technology grows, this crime grows as well but there is another

reason for this growth which is how the criminals are punished as the penalties are not

harsh and is rather lenient. In the US, The Identity Theft and Assumption Deterrence Act

has been placed to punish criminals associated with identity theft with a maximum sentence

of jail time up to 15 years. However, in Malaysia, we do not have a law specific to identity

theft, rather, the crime is somehow tied to other laws after investigations for example,

Sedition Act 1948, Defamation Act 1957, basically the Penal Code, which can then be

easily manipulated and twisted until the criminal gets a lighter punishment. It is things like

this that do not frighten potential criminals from committing this crime with ease.

The Identity Theft and Assumption Deterrence Act in the US came into effect in the

year 1998 because of the severity of certain cases. I think it is time for Malaysia to bring a

new law into effect handling specifically identity theft cases no matter if the crime is

digitally or ‘old fashion’ based. One of the main reasons punishments were created is to

show potential criminals the price they would have to pay if they commited a crime and

with penalties being lenient in malaysia, there could be a dramatic growth of cases once

potential criminals are aware of the little punishments they would be facing if caught.

12
ANALYSIS (USING WORKABLE ETHICAL THEORIES)

According to Kantianism (Categorical Imperative : Second Formulation), "Always

treat humanity whether in your own person or the person of another, always as an end and

never merely as a means.". An example of this would be identity thieves propagating a

virus which scans a person's computer for personal information including: credit cards,

social security numbers, bank accounts, and tax information with the intent to steal it or sell

it. This would be using the person's property as a mere means. You can tell if one is acting

with Kantian Ethics by seeing if they are using respect.

An Australian woman, was 6-months pregnant and living in Israel when she found out

she was wanted for murder. She was listening to the radio and a news bulletin proclaimed

that three Australians were being linked to a Dubai hit squad, Mossad, that was responsible

for assassinating Hamas chief Mahmoud al-Mabhouh; her name was one of those read by

the announcer. It turns out that Nicole, along with the other two Australians, had their

identities stolen. She was still in possession of her real passport, but the thieves used her

personal information to create a new fake passport. Luckily, the fake passport did not have

her picture on it was the thief’s photo, so the theft of her identity was a bit more obvious.

From the story above using Kantianism Theory the action of the behaviour goes against the

universal moral law of good will and dustiest and obligations. The Kantianism (2nd

Formula) which the criminals action was using other person information due to gain his

self-interest. According to Kantianism (2nd formula) it is completely wrong to use another

person identify to kill someone and he used her identify for his self-use gain. The

Australian lady may face the charges of other people wrong doings.

13
According to principle of justice, Kantianism asked to treat people with equal respect,

assuming that all people have the same value or worth. An example would be if somebody

is stealing someone else's identity, they are violating one’s privacy and it’s disrespectful, so

therefore it is an injustice. Liberty Principle says each person is to have an equal right to

the most extensive basic liberty compatible with a similar liberty for others. Everyone

deserves to own their identity and keep it confidential. This implies for every individual

where we need to learn to respect one’s privacy if we expect our privacy to be respected, as

to say “practice what you preach”.

We all have a right to our own persona without impersonation or duplication,

especially for financial gains or to conceal ones true identity for the purpose of committing

a crime. No one has the right to take what is not theirs. This includes an identity itself or

the use of that stolen identity to steal money, credit, or anything else that can be acquired

by these means. We all have a right to privacy and identity theft is serious violation of this

right. The thief now has the ability to gain access to a number of the victim’s personal

information including financial and banking records.

Some of the ways thieves gain access to this information violates one’s privacy,

whether it is malicious spyware or viruses that take the information from your computer or

physically stealing of credit card, driver’s license or social security card. If your identity is

stolen it presents the possibility that you could be accused and convicted of a crime that

you did not commit because someone else used your personal information to conceal their

true identity. This is a violation of your right to justice. Many of the malicious spyware and

viruses can damage your computer and this violates your right of personal property

protection. All of these are examples of disrespect and therefore unethical according to

Kant.

14
We can also look at identity theft using the Kantianism, first formulation of the

Categorical Imperative. For instance, Grey steals a person’s account credentials to loot

his/her account for his own gain. A proposed moral rule might be, “I may steal one’s

account credentials for my own gain.” However, if everyone followed this rule, every

individual’s privacy will be violated and there will be no security for one’s assets or

belongings. Grey might use the stolen account credentials in intrusions, unauthorised use of

cheques or debit cards, or unauthorised electronic transfers from a victim’s bank account.

He can even sell the stolen personal information in underground economy or post the

personal information publicly at online forums. A worst case scenario, he might causes

damage to the victim’s name and causes the victim to be answerable to law enforcement

agencies and slapped with a criminal record. His proposed moral is self-centered. Therefore,

it is wrong for Grey to steal or misuse one’s account credential forf his own gain.

According to Social Contract Theory (Hypothetical theory) created by

John Rawls which assumes bias is non-existent, ethical discussion is facilitated, where a

consensus is not required, and that reflective equilibrium is applied. Reflective Equilibrium

means some inequalities are allowed, but they have to be to every one's advantage. In this

case, the veil ignorance are assuming everyone is equal. No one knows their social status or

power and decisions are made that any rational person would make if he/she didn't know

his/her individual characteristics, such as class, race, education, ability, or gender.

In such a position, behind such a veil, everyone is in the same situation, and everyone

is presumed to be equally rational. Since everyone adopts the same method for choosing

the basic principles for society, everyone will occupy the same standpoint: that of the

disembodied, rational, universal human. Therefore all who consider justice from the point

of view of the original position would agree upon the same principles of justice generated

15
out of such a thought experiment. Any one person would reach the same conclusion as any

other person concerning the most basic principles that must regulate a just society.

Everyone knows identity theft is a crime, thus we should follow the principle of justice and

stop identity theft.

According to James Rachel’s definition, “morality consists in the set of rules

governing how people are to treat one another, that rational people will agree to accept, for

their mutual benefit, on the condition that others follow those rules as well” it is wrong in

the eyes of the law to steal people’s information and imposing as them as it is not

applicable for everyone to do so as well.

16
CONCLUSION

Criminal penalties for identity theft should be harsher. Identity theft is a huge crime,

resulting in financial as well as emotional distress for its victims. With such lax

punishments, offenders will only be encouraged to commit such crimes. We believe that

harsher punishments for identity thieves would result in deterence and hopefully a

reduction in this crime. Today law enforcement agencies, both federal and non-federal, are

working together to develop and implement the appropriate strategies for the prosecution of

identity thieves. In addition, the law enforcement agencies should have more hasher

penalties for this kind of crimes. However, to stop identity theft, the joint actions of law

enforcement and the public should be taken. These actions should be based on cooperation

and effective communication.

Identity theft has created havoc in people's lives. Identity thieves prey especially on the

elderly. If we witnessed someone knocking down an elderly woman and stealing her purse,

we would all agree the perpetrator should be sentenced to severe punishment. Stealing this

same person's identity is a worse crime. It has the potential to drain bank accounts of

savings, destroy credit, intercept Social Security and pension payments, and cut people off

from social interaction via email and the Internet. This can cause emotional stress more

harmful than a mugging. These penalties need to be more significant. Although the US is a

bigger country with much more people, The Identity Theft and Assumption Deterrence Act

law was brought in a long time ago, which is more than 20 years, it is definitely time for

the federal constitution of Malaysia to make changes before more lives and names are

destroyed or smudged by criminals. Therefore, criminal penalties for identity theft should

be harsher.

17
REFERENCES

1. Meikeng, Y. (2017, November 02). 'Don't fall prey to identity thieves'. Retrieved April

18, 2019 from

https://www.thestar.com.my/news/nation/2017/11/02/dont-fall-prey-to-identity-thieves

-rising-cases-of-criminals-stealing-personal-details-and-exploitin/

2. Norazhar, D. (2018, April 11). One in 10 M'sians fall victim to identity theft. Retrieved

April 18, 2019, from

https://themalaysianreserve.com/2018/04/11/one-in-10-msians-fall-victim-to-identity-t

heft/

3. Syuhada, A. (2017, October 06). JagaMyID aims to combat identity theft. Retrieved

April 18, 2019, from

https://themalaysianreserve.com/2017/10/06/jagamyid-aims-combat-identity-theft/

4. BurgieLaw, BurgieLaw, Hoe, L. C., & Hoe, L. C. (2016, October 03). What The Hell Is

Identity Theft? Retrieved April 18, 2019, from

https://blog.burgielaw.com/2016/09/30/what-the-hell-is-identity-theft/

5. Cybersecurity 2019 | Laws and Regulations | Malaysia | ICLG. (n.d.). Retrieved April

18, 2019, from

https://iclg.com/practice-areas/cybersecurity-laws-and-regulations/malaysia

18
6. 20 Types of Identity Theft and Fraud. (2018, December 14). Retrieved April 18, 2019,

from

https://www.experian.com/blogs/ask-experian/20-types-of-identity-theft-and-fraud/

7. INVESTIGATING CYBERCRIMES UNDER THE MALAYSIAN CYBERLAWS ...

(n.d.). Retrieved April 18, 2019, from

http://irep.iium.edu.my/27926/1/Investigating_Cybercrimes_Under_The_Malaysia.pdf

8. The Problems of Identity Theft in Malaysia in the Light of the Personal Data Protection

(PDP) Act 2010: A Hope Rejuvenated? (2011, June 17). Retrieved April 18, 2019, from

https://sonnyzulhuda.com/2011/06/17/the-problems-of-identity-theft-in-malaysia-in-the

-light-of-the-personal-data-protection-pdp-act-2010-a-hope-rejuvenated/

9. Identity Theft: Could You Be Next? (2017, October 06). Retrieved April 18, 2019, from

https://www.ctoscredit.com.my/learn/identity-theft-next/

10. Should criminal penalties for identity theft be harshers? (n.d.). Retrieved April 18, 2019,

from

https://www.debate.org/opinions/should-criminal-penalties-for-identity-theft-be-harsher

s?_escaped_fragment_

11. Theoharis, M. (2015, July 23). The Crime of Identity Theft. Retrieved April 18, 2019,

from

https://www.criminaldefenselawyer.com/crime-penalties/federal/identity-theft.htm

19
12. What is the sentencing range for identity theft? (n.d.). Retrieved April 18, 2019, from

https://www.lawyers.com/ask-a-lawyer/criminal/what-sentencing-range-for-identity-the

ft-1565331.html

13. Identity Theft Charges: What Are the Possible Punishments? (n.d.). Retrieved April 18,

2019, from

https://blogs.findlaw.com/blotter/2014/07/identity-theft-charges-what-are-the-possible-

punishments.html

14. Astley, O. R. (2009, October 24). Rick Astley - Never Gonna Give You Up (Video).

Retrieved from https://www.youtube.com/watch?v=dQw4w9WgXcQ

20

You might also like