ID Theft Overstated? Some Think So

By O'Sullivan, Orla | ABA Banking Journal, February 2004 | Go to article overview

ID Theft Overstated? Some Think So


O'Sullivan, Orla, ABA Banking Journal


It has been dubbed "the fastest-growing crime in America," but what is it?

Achieving a consensus definition of identity theft, a term that by now is familiar to the general public, is one of the aims of an industry roundtable jointly organised by the Federal Reserve Board and Gartner, Inc. when it meets this month.

The shocking statement that almost ten million Americans a year are victims of identity theft, made by the Federal Trade Commission report last September, has provided fresh impetus to the industry's desire to get a better handle on the problem.

Some, including ABA's Senior Federal Counsel Nessa Feddis, say that identity theft is being exaggerated because all kinds of fraud are being redefined as such. "People call identity theft what they would before have called a stolen check," says Feddis.

Judging by sources consulted for this article, the FTC went out on a limb in "exposing" the problem. Avivah Litan, a research director at Gartner, criticises the FTC's methodology, notably its inclusion of all unauthorised credit card use, saying, "Nobody ever did it that way before."

Keith Anderson, an economist in the FTC's Bureau of Economics, defends the FTC's approach by noting, "The misuse of an existing credit card account is considered to be identity theft under the Identity Theft and Assumption Deterrence Act of 1998 Public Law No. 105-318, 112 Stat. 3007--the ID Theft Act.' The Act potentially considers "any name or number" as "means of identification."

Michael Gray, who lectures on identity theft at San Jose State University, adds that "a lot of states treat stolen credit cards as identity theft."

The FTC's Anderson also says that victims may perceive their identities as having been stolen in cases where others in the financial industry would not.

However, non-FTC sources shared the baseline definition of Dennis Behrman, an analyst with Financial Insights, an IDC subsidiary. He says, "Identity theft requires sensitive, personal information," such as someone's Social Security number, in effect a unique, lifelong identifier; "it can't just be a credit card number being hacked."

"The FTC numbers are not feasible," he adds. "It's outrageous to suggest there are ten million victims a year--that's 15% to 20% of the banked population."

More than 6.5 million of the 9.9 million victims identified by the FTC had their credit card accounts misused, possibly in addition to other more serious forms of identity theft. Consumers were surveyed between spring of 2002 and spring of 2003 and their responses projected into an annual number for the FTC report released last September.

The term "identity theft" may set consumers thinking of The Invasion of the Body Snatchers, but financial industry sources increasingly distinguish "account takeover/identity theft" from the far more common phenomenon of "identity fraud," where elements of a real person's identity--typically their Social Security number--are blended with made-up elements, such as a false name, to open new accounts.

There, notes Behrman, "The victim is the institution." The individual's credit history is not tarnished, so they will never know. Meanwhile, when the short-lived account is depleted, "The bank will register it as a credit loss, not a fraud loss."

Behrman disagrees with the contention that the growth in ID theft is not with new accounts, but with unauthorized credit card transactions. Behrman says fraudulent new accounts represent a growing trend that is "very scary."

Financial institutions lost $4.3 billion on identity theft last year, a figure that will likely double to $8.6 billion by 2006, Behrman estimates. He drew these conclusions by analysing data from ten of members of the ID Analytics consortium last summer (see story on pg. 8).

Behrman sees bigger banks as most vulnerable since they have the most outstandings.

The rest of this article is only available to active members of Questia

Sign up now for a free, 1-day trial and receive full access to:

  • Questia's entire collection
  • Automatic bibliography creation
  • More helpful research tools like notes, citations, and highlights
  • Ad-free environment

Already a member? Log in now.

Notes for this article

Add a new note
If you are trying to select text to create highlights or citations, remember that you must now click or tap on the first word, and then click or tap on the last word.
One moment ...
Project items

Items saved from this article

This article has been saved
Highlights (0)
Some of your highlights are legacy items.

Highlights saved before July 30, 2012 will not be displayed on their respective source pages.

You can easily re-create the highlights by opening the book page or article, selecting the text, and clicking “Highlight.”

Citations (0)
Some of your citations are legacy items.

Any citation created before July 30, 2012 will labeled as a “Cited page.” New citations will be saved as cited passages, pages or articles.

We also added the ability to view new citations from your projects or the book or article where you created them.

Notes (0)
Bookmarks (0)

You have no saved items from this article

Project items include:
  • Saved book/article
  • Highlights
  • Quotes/citations
  • Notes
  • Bookmarks
Notes
Cite this article

Cited article

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

(Einhorn, 1992, p. 25)

(Einhorn 25)

1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited article

ID Theft Overstated? Some Think So
Settings

Settings

Typeface
Text size Smaller Larger
Search within

Search within this article

Look up

Look up a word

  • Dictionary
  • Thesaurus
Please submit a word or phrase above.
Print this page

Print this page

Why can't I print more than one page at a time?

Full screen

matching results for page

Cited passage

Style
Citations are available only to our active members.
Sign up now to cite pages or passages in MLA, APA and Chicago citation styles.

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn, 1992, p. 25).

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences." (Einhorn 25)

"Portraying himself as an honest, ordinary person helped Lincoln identify with his audiences."1

1. Lois J. Einhorn, Abraham Lincoln, the Orator: Penetrating the Lincoln Legend (Westport, CT: Greenwood Press, 1992), 25, http://www.questia.com/read/27419298.

Cited passage

Welcome to the new Questia Reader

The Questia Reader has been updated to provide you with an even better online reading experience.  It is now 100% Responsive, which means you can read our books and articles on any sized device you wish.  All of your favorite tools like notes, highlights, and citations are still here, but the way you select text has been updated to be easier to use, especially on touchscreen devices.  Here's how:

1. Click or tap the first word you want to select.
2. Click or tap the last word you want to select.

OK, got it!

Thanks for trying Questia!

Please continue trying out our research tools, but please note, full functionality is available only to our active members.

Your work will be lost once you leave this Web page.

For full access in an ad-free environment, sign up now for a FREE, 1-day trial.

Already a member? Log in now.