Professional Documents
Culture Documents
0 ABSTRACT
Identity theft is increasing at an alarming rate in Malaysia and globally. It has caused
millions of ringgit in losses and damage, especially to the reputation and credit health of
innocent consumers. But do you know what identity theft is? Could you possibly be the next
victim and if so how it could endanger you?
2.0 INTRODUCTION
Identity theft or identity fraud occurs when someone steals information that defines
your personal identity such as your name, identity card number, bank account numbers, and
credit card numbers to reap the benefits of posing as you. Personal data that is highly
susceptible to being stolen include credit and debit card numbers, as well as information
regarding bank accounts, insurance policies and medical records.
This personal information is misused for different purposes such as opening new
account, gain control over victims credit account, gain benefits from government and
withdraw law by using fake identity. Unfortunately identity theft methods are hidden to the
victim because usually people is aware when they denied for new loans or credit cards,
disproved employment or when debt collector asks payment for a debt that victim did not cause.
Sometimes victims spend billions of money annually to compensate the effects of identity theft
and personal data breach.
Identity theft is a cybercrime growing rapidly in the world. Proper care must be taken
by the customers to protect their identity and it is also their responsibility to take measures to
disallow any data breach. 2011 was the year of data breaches, more than 232.4 million identities
were exposed as indicated in Figure 1.
1
2.2 The Dangers of Having Your Information Stolen
Thieves often use stolen credit or debit card information to make purchases, especially
online. They can call a bank and pretend to be the owner of a credit card, then cancel the credit
card of a victim citing various reasons, request a new card to be routed to an address where the
thief can receive it, and subsequently go on shopping sprees. In more serious cases, identity
theft may be used to facilitate or fund other crimes including terrorism, illegal immigration and
phishing. With sufficient stolen information, thieves can steal tax returns, pretend to be
someone else if arrested, or exhaust the victims medical insurance coverage (medical identity
theft). Some warning signs that you may be a victim of identity theft:
Youve been expecting a new credit or debit card to arrive in the mail but its way
overdue
You notice purchases you didnt make when you check your credit card statements
Important letters, packages or mail youve been expecting has consistently gone
missing
Youve received a litigation notice or court document for something youve not done.
2
3.0 RESEARCH FINDINGS AND ARTICLES
3.1 Main Article: Identity theft a huge concern for Malaysians
Malaysians are becoming more and more vulnerable to identity theft as average income
increases and customers make more online purchases and transactions. Moreover, only one in
about four consumers check their credit reports regularly, a good practice to prevent identity
theft, according to a maiden consumer survey conducted by RAM Credit Information
(RAMCI). For the average person, checking their credit reports at least once a year is the least
they should do. Identity thieves can apply for loans or credit using the victims identity, which
will not show up on any bill until the loan is approved, paid out to the thief, and the repayment
bill is sent to the victim.
The survey found that 14% of respondents have experienced identity theft, while 26% knew
someone who had been a victim of the crime. It is important for consumers to check their credit
reports regularly to identify illegal activity, according to Dawn Lai (pictured), CEO of RAMCI.
Early detection is the key to minimising the damages fraudulent activities can have on their
credit profile.
A credit report is a record of ones borrowing history and repayment behaviour, which includes
a record of ones credit cards, loans or other credit facilities applied for and even involvement
in litigation cases. There are several steps one can take to keep an eye on their credit
transactions and ensure there is no identity theft. Checking your credit card bill for suspicious
transactions is a good practice, said Lai, as an advice to consumers. According to the survey,
while over 70% of respondents admitted to having some knowledge of credit reports, only a
small 28% of respondents make the effort to check their own. Of the small group who check
their own credit reports, 30% did so when their legitimate credit applications were rejected,
while 13% did it out of suspicion of identity theft.
By then, it may already be too late to prevent the fraudulent transaction, said Lai. The process
to resolve fraudulent transactions can take up to months if not years, which may delay victims
from making possible investments or milestone purchases such as buying a home. In cases
where there are inaccuracies or disputes regarding information found in the credit report,
consumers should contact the Credit Reporting Agency (CRA), who are duty bound by the
Credit Reporting Agency Act set in 2010, to verify and rectify the information free of charge.
Our survey shows that more than half of respondents are unaware of the CRAs responsibility
to provide accurate and updated information to its subscribers, said Lai. This survey is the
first step RAMCI is taking to ramp up educational efforts to help consumers take control of
their credit information and protect themselves against identity theft. Lai stressed again: Dont
wait till you notice suspicious activity in your credit profiles. Take the initiative to keep up to
date and monitor your credit report to avoid identity theft.
(Source: http://www.marketing-interactive.com/identity-theft-a-huge-concern-for-malaysians-says-report/)
3
3.2 Supporting Article: Beware of identity theft risks
He finally relented to his friends persuasion and checked his credit report for free with
RAMCI. It was most fortunate and timely that he checked his credit report.
He was shocked to find out there was a RM10,000 loan application under his name pending
approval. A loan that he never applied! The startled guard was advised to contact the bank and
cancel the loan before the money was disbursed to an unknown individual.
How did it happen? Someone had used Manans personal details to apply for the loan.
These were the two identity fraud cases disclosed by RAMCI to Bernama recently that
involved identity theft. Based on the agency's maiden consumer survey, 14% of respondents
had experienced identity theft first hand and 26% knew someone who had been a victim.
RAMCI CEO, Dawn Lai described the result as worrying and that the public should be alarmed.
4
Methods used to fraudulently obtain one's personal information are through stolen
MyKads or credit cards, loss of personal documents in the mail and inadvertently giving out
personal information to fraudulent phone calls and emails. Furthermore, based on those article,
we have identify that identity theft may could cause major financial loss. In some cases, in
which the loan has been disbursed, the victims have to pay for the loan while waiting for the
case to be resolved. This is to avoid their own credit record from being blemished or their name
blacklisted.
In order to guard ourselves against identity theft, she said that the widespread use of
biometric verification, particularly by banks and other main institutions has helped in
protecting their clients identity. However, there are many non-bank credit providers namely
furniture retailers and motorcycle hire purchase loan providers who have yet to implement such
safety measure. Therefore, she stressed that early detection was the key in minimising the
damage caused by identity theft.
For the average person, she strongly suggested that they check their credit reports at
least once a year. However, for a more comprehensive protection the agency offers an identity
theft protection plan namely the My Credit Watch (MCW). With a minimal annual fee, the plan
checks and monitors the credit report daily and alerts its subscribers to important changes in
their report. RAMCI, according to her, would continue to promote awareness on good credit
management and the importance of viewing one's credit profile throughout the year. Afterall,
she concludes:
"We envisage that in the future all parties and individuals will utilise the credit report,
not just those who grant credits, but also employers and landlords who can get information of
their potential employees or tenants credit background respectively from the report. Thus
will lead to better financial and credit management among the people.
5
3.3 TECHNIQUE USED AND DOCUMENTED IN IDENTITY THEFT
There are many different types of schemes identity criminals use. This can range from
non-technological to technological schemes. The following is a listing of just some of the most
common methods identity criminals have been known to use to obtain your personal
identifiable information.
Non-Technological Methods
Technological Methods
Pretexting: It occurs when a thief call someone pretending to be a bank official, survey
taker, IRS agent or other official in order to make them divulge their personal information.
Skimming: It occurs when a thief acquiring personal information by a copying a cards
magnetic strip through a fake card reader. Once the card is swiped, the information from
the magnetic strip is downloaded and can be used to create a forged card.
Phishing: It occurs when someone is receiving an email from someone claiming to be a
legitimate organization, such as a bank or credit card company, in an attempt to get the user
to surrender private information to be used for identity theft.
6
3.4 COMMON TYPES OF IDENTITY THEFT
Financial identity theft occurs when a persons credit card and bank account
information is stolen and used to purchase goods and services. Financial identity theft is the
most common form of identity fraud. When people hear the words identity theft, they often
think of credit card fraud, when thieves use stolen credit cards or card numbers to purchase
goods and services. It its not detected in time, credit card fraud can max out your accounts and
affect your credit rating. There are also other more potentially serious forms of financial
identity theft. Thieves can use stolen bank account numbers, debit card numbers or other
personal and financial information to wipe out your accounts, take out loans or get new credit
cards.
Social security number (SSN) is known as a national identification card number used
by the country of United States. In Malaysia, the citizens identity card known as MyKad card
has an embedded microchip that contains the individuals personal information including
access to bank accounts. With your MyKad card, thieves can access your taxes and work
history, bank accounts, credit cards, loans, government benefits and sometimes your medical
records. They can use your MyKad card to get a loan or a passport, file for your tax return or
claim your retirement benefits. Even if youre careful with your MyKad card and financial
documents, MyKads are one of the most valuable pieces of personal information stolen in data
breaches.
When someone takes or uses your health insurance, they are committing medical
identity theft. Thieves use the insurance themselves or sell it to someone who will pose as you
to get healthcare services. There is the danger of the thiefs medical records being merged with
your own. Doctors use your medical history to make informed decisions about treatment and
to diagnose illnesses or conditions based on your current and past medical history. Inaccurate
information can result in misdiagnosis or harmful treatment procedures. It can also use up your
medical benefits and leave you facing bills for medical treatment you didnt receive. Recovery
from medical identity theft is complicated because of healthcare privacy laws.
7
3.4.4 Drivers License Identity Theft
Criminals have many ways to use a stolen drivers license or information from a
drivers license. They may alter the picture on a drivers license and sell it to someone who fits
the description on the license or they may use the number to create a completely fake ID card.
If the imposter is caught for a traffic violation, drunk driving or drug-related charge, the crime
goes on your record. When the violator doesnt show up in court, police will be looking for
you. Drivers licenses are also shown to cash checks, pass domestic airport security, get
insurance and to provide ID for many activities, so an imposter could commit all kinds of
crimes that would be traced back to you.
It occurs when a child's identity can be stolen when criminals create what is known as
a "synthetic identity," a process by which crooks "combine a child's identification card number
with a different date of birth. Children tend to have little or no financial history, and thieves
assume that no one is checking a childs credit report. Criminals can use a childs identification
card number to falsely claim dependent children or welfare payments from the government,
and to create fake ID documents that they can use to apply for loans or even commit crimes.
As one of the most common types of identity thefts in America, criminal identity theft
affects numerous individuals. This type occurs when an individual commits a crime under
another persons name. Once a thief has your identity, they can commit crimes undercover by
using your name. When victims call the police or the criminals are cited or arrested, law
enforcement will be given your name, resulting in a warrant or a criminal record. You then
may have problems with employment background checks, face legal action or even be arrested.
Criminal identity theft is uncommon but potentially serious.
This identity theft occurs when someone uses your stolen identification card number to
file a tax return claiming a fraudulent refund. Tax identity theft manifests itself through
fraudulent tax refund claims. Criminals send these claims to the Internal Revenue Service (IRS)
using stolen personal details such as your identification card number and name. This can delay
your ability to access legitimate tax refunds, causing frustration and loss of funds.
8
3.4.8 Insurance Identity Theft
This type of identity fraud is closely related to the previously mentioned medical
identity theft and is sometimes viewed as being the same. It occurs when perpetrators steal
medical identity information to access your insurance in order to receive medical treatment.
This may have serious impact on victims as it can lead to higher insurance premiums and huge
medical bills.
In addition to medical identity theft, thieves can use stolen identities to claim other
kinds of insurance and benefit. For example, someone using a stolen identity could have an
accident (or multiple accidents) and make auto insurance claims. Insurance identity fraud can
result in higher premiums, denial of insurance or legal action if the insurance company
discovers the fraud and blames it on you.
Synthetic identity theft is one of the most sophisticated kinds of identity fraud. It occurs
when criminals use your identification card number in combination with fake information.
They may use a combination of fake credentials including addresses, names, birth dates and
other details resulting in the creating of new identities.
This enables the fraudsters to open new credit card accounts or access other financial
services. They may also use their new identities to build credit or apply for jobs. Important to
note is the fact that the main identifying source of information is the stolen Social Security
Number. Everything else is a tangled up mess of lies aimed to deceive you, lenders and law
enforcement agents.
9
3.5 EFFECTS OF IDENTITY THEFT
Unlike the theft of a watch or stereo, identity theft can result in serious consequences
that take both time and money to resolve, not to mention the emotional distress victims often
feel. Here are ways in which identity theft can affect your life and your future.
Of course, the most obvious loss is financial. If the thief has access to your checking,
savings or investment accounts, they can steal funds from your account. Victims of identity
theft can suffer many negative financial effects including, paying higher interest and insurance
rates, being denied for loans or lines of credit, and multiple bank fees, to name a few. The
following are a few things identity thieves may use your identity. Firstly, identity thieves may
call your credit card issuer to change the billing address on your credit card account. The
imposter then runs up charges on your account. Because your bills are being sent to a different
address, it may be some time before you realize there's a problem. This can result in unexpected
calls from creditors, and extensive damage to your credit rating.
Other than that, someone may open new credit card accounts in your name. When
someone else uses your credit and doesn't pay the bills, the delinquent accounts are reported
on your credit report. Moreover, a bank account could be opened in your name and bad checks
written on that account. Not only will this affect your ability to write and cash checks, if
fraudulent checks are written, you may end up with a warrant out for your arrest depending on
the degree of seriousness.
10
3.5.2 Criminal Effects of Identity Theft
Identity thieves are not always after financial gain. Often, criminals will commit crimes
under their victim's name, thereby bypassing any negative effect to their criminal record under
their true name. It may seem farfetched, but if a criminal steals your identity and uses it to
commit a crime, you could get a criminal record. A crook could obtain an identification card
with your information and when that crook is arrested for a crime, the charges go on your
record. And if the crook skips bail or doesnt appear before court, its no loss to him because
the authorities have a warrant out for you. The worse part is that you may not even know that
you have a criminal record until you are pulled over for a traffic violation and arrested or when
you apply for a job and are turned down after a background check.
Identity thieves can use a stolen identification across many states, creating a trail of
crimes and records that can sometimes be difficult to find out about. That is, until the most
inopportune time comes, and the victim finds out in the worst way possible, by being treated
as a criminal. If you become a victim of identity theft and the thief creates a criminal record
for you, it can be very difficult to clear your name and prove that you are not the one who
committed the crimes. The effects of identity theft can cost someone a job when a background
check is performed, land one in jail, and cause problems in renting housing.
11
3.5.3 Emotional Effects of Identity Theft
Identity theft is an intrusive crime and victims may seem violated as they discover what
damaging effects have occurred as well as wonder what else can happen. By not letting identity
theft overtake your like emotionally, you will have better control over the situation and be able
to handle it more effectively.
If your identity theft occurred as a result of carelessness on your part with your personal
information, you may have the feeling of guilt, and resentment. But regardless of what led to
the identity theft, you must now learn from your mistakes and move on to resolving your case
and becoming more aware of how to prevent the crime from occurring again in the future.
You may also be feeling overwhelmed, stressed, and confused about how to proceed
once you find out you have been victimized. There are several steps involved in returning your
life to "normal", and it may seem like more time, effort, or emotion than you can afford. But
there are resources to turn to for help. By turning to an expert in resolving identity theft issues,
you can become more assured that your case is being handled correctly and effectively. By
getting help with restoring your identity, you will relieve some of the stress of worrying about
what comes next, and how much time it will take away from your personal and work life.
It is not uncommon to feel you have been violated, and your privacy has been taken
away from you. It may help you to talk with a professional about your feelings and help you
regain your sense of trust and personal security. If your identity was stolen by a family member
or someone close to you, you may also feel betrayed by this person. Again, this is another
reason you may want to talk with a professional as you not only have the emotions associated
with identity theft, but ill emotions towards your family or friends.
Depression can become an emotion that takes over as you battle through financial or
worse, criminal effects of your identity theft. You can overcome the depression with help as
well as the effect you are contending with. Do not think you have to face everything alone, and
resolve your issues without assistance. You can recover from identity theft, and all of the effects
associated with if you know where to turn.
12
3.6 EXPECTED LOSS
Identity theft is a major crime in Malaysia costing millions of ringgit. Your identity
might be stolen for someone to commit financial fraud and other criminal activities involving
car and housing loans, credit card transactions, mobile phone bills, property deals and company
registrations. Many have fallen prey to fraudsters using their identities.
According to one of our local newspapers, it mentions that Malaysians have lost RM4
millions through phishing (one of identity theft method) within the first three months of the
year alone. There were 457 cases recorded in the first quarter of the year, exceeding the 353
reported for the whole of last year where the victims lost a total of RM1.2 millions. In 2009,
only 75 cases were reported with total losses of around RM215,000. Federal Commercial
Crime Investigations Department director Commissioner Datuk Syed Ismail Syed Azizan said
the number of cases reported this year had reached a record high with authorities and the
banking industry being almost powerless to curb it.
Bank Negara Malaysia (BNM) has warned of an email aimed at deceiving members of
the public into disclosing their personal banking details. A statement issued by the central bank
Thursday said the email, which claims to be from Bank Negara, urges people to update their
account details through a provided hyperlink. Intended victims receive emails purportedly
from BNM, informing them that BNM is collecting personal banking information to update its
database. They will be prompted to either click on a link or reply to the email directly. Once
the victim clicks on the link provided in the email, they are directed to a fake website requesting
disclosure of personal financial details such as credit or debit cards details including card code
verification or other personal identification numbers (PIN), the statement said.
Statistics for identity theft is on the increase annually. In 2008, identity theft affected
10 million victims most of them did not have the chance to get help to recover from their losses
nor given protection by their home country (Tom, 2009). In Malaysia, the citizens identity
card known as MyKad has an embedded microchip that contains the individuals personal
information including access to bank accounts. Previously, it was easy for Malaysians to
acquire the MyKad from the National Registration Department. However, with reported losses
of cards amounting to 2,123,611 the past seven years, the Parliamentary Secretary of the Home
Affairs Ministry, Datuk Abdul Rahman Ibrahim announced that fines will be imposed to
compel people to be more responsible with their MyKad. This year, 58,839 people lost their
13
MyKad, which means about 1,000 people lose their cards daily. These people gave various
reasons for losing their cards, like misplacing and carelessness (The Star, 2011).
With the influx of illegal immigrants to Malaysia, the need to acquire proper documents
is imminent to these foreigners to avoid being caught and deported. Consequently, the MyKad
and the Malaysian passports are indiscriminately sold in the black market. What the aliens did
not know is that the MyKad is actually secure and reliable with less invasion of privacy, forgery
and identity theft. Immigration and law enforcement officers are trained to detect fake cards
immediately. However, some isolated cases have surfaced where stolen cards have been
misused by offenders to commit financial fraud, applications of car and housing loans, credit
card and internet banking transactions, mobile phone bills, property deals and company
registration.
Some of these transactions are routine activities for Malaysians yet the risk of being an
identity theft victim is possible (New Straits Times, 2006). For instance, it was reported by the
media that an illegal immigrant, using a stolen MyKad was able to get a job as a security guard
at one of the countrys biggest security companies. He was able to enjoy the same benefits of
a true citizen but the possibility of harming the company and country is probable (New Straits
Times, 2006). On the other hand, victims of identity thefts were unable to get help as they are
unable to provide the necessary evidence to prove their innocence. In fact, the victim himself
was unaware that his personal information have been stolen and used by the offenders to
commit fraudulent activities. This is unfair to the victim because the law itself such as criminal
law does not recognize the person as the identity theft victims (Copes & Vieraitis, 2009).
14
3.7 RECOMMENDATION OF PREVENTIVE AND DETEVTIVE CONTROLS
This section describes problems faced as the result of identity theft and recommended measures
to assist in the prevention and detection of the crime.
If you havent been a victim of identity theft, here are some steps for reducing your risk of
identity theft:
Online protection
When you are surfing the web, use a comprehensive security suite, such as McAfee Total
Protection software, which not only protects you against viruses, spyware, and other
emerging threats, but also provides safe search technology to help you steer clear of fake
websites that try to collect your information.
15
Review financial statements promptly
Check your credit card and bank statements each month to make sure there are no
fraudulent charges and to confirm that you authorised all transactions.
Shred documents
The only way to keep thieves from digging up your personal information from the rubbish
is to shred sensitive documents, such as financial statements, credit card offers, and expired
identification cards.
16
3.7.2 Recommendation of Detective Control
If you discover that your identity has been compromised or stolen, take immediate steps to
address the situation.
Contact financial institutions and agencies where your accounts may be affected
Call your bank and creditors to inform them of the situation and flag any fraudulent charges
or withdrawals from your accounts and then follow up in writing. Verify that the charges
have been removed from your accounts and if necessary, close the account. Keep copies,
document conversations and maintain records related to the theft.
17
3.7.3 THE ROLE OF TECHNOLOGY IN IDENTITY THEFT
In an ever evolving technological age, lets examine the role technology plays in preventing
identity theft and tips to safeguarding information stored on computer.
Use a firewall
A firewall can be used to limit an applications access to your computer. Hackers can take
over your computer and access the sensitive information stored on it.
Use of authentication
Authentication is the method used to identify you via username and password when
accessing personal information on your PC or online.
Use of biometrics
Biometrics is a type of authentication that uses individually unique physical attributes such
as fingerprinting, iris/retina, facial structure, speech, facial thermograms, hand geometry
and written signatures.
18
4.0 RISK AND QUALITY PLANNING / DECISION MAKING
Other than that, online banking needs to be monitored on the implementation and the
security aspects as the system will not know who is on the line doing all the banking
transactions. In this electronic age, our finances can be damaged within a matter of seconds by
this crime. Therefore, a measure needs to be taken by Bank Negara Malaysia and all the banks
in Malaysia to safeguard all the interests of Malaysians from being a victim of identity theft.
As for cases in Malaysia, specific laws need to be passed in combating the presence of
identity theft. The creation of such laws can be viewed from the perspective of the Bank Negara
Malaysia, relevant Ministries, Communications and Multimedia Commission, Securities
Commission, Judiciary Department, and other relevant agencies and organizations.
19
5.0 SUMMARY / COMMENTS
In conclusion, we can conclude that identity theft may be a serious crime. Being the
victim of identity theft can be extremely devastating not only because its your money being
stolen, but your name. Identity thieves can be very skilled at finding their targets and then
exploiting their findings. For this reason, to protect yourself you need to stay alert and be more
knowledgeable. To avoid becoming a victim, diligently protect your personal information,
monitor your accounts and credit report, and respond swiftly to any signs that your identity is
being misused.
The data stolen through identity theft my include the name of the person, date of birth,
identity card number, common knowledge about the victim, credit card information, bank
account numbers and others. In fact, this crime begins to become a complicated issue to be
solved in Malaysia, and the government must ensure that there are sufficient law provisions in
Malaysia to criminalize such offences. Existing criminal and civil laws may apply only to a
certain extent and is not intended to be comprehensive, as new cybercrimes like identity theft
need suitable new laws to combat new crimes and these identity thieves. Efficient law
enforcement must be done to combat and eradicate this problem to avoid greater loss arise from
this crime in the future.
20
6.0 REFERENCES
https://www.myidcare.com/9-types-of-identity-theft
https://www.mountainalarm.com/blog/9-most-common-types-of-identity-theft/
http://www.ctoscredit.com.my/newsletter/Identitytheft.htm
http://www.nccc.org.my/v2/index.php/nccc-di-pentas-media/2006/287-new-straits-
times-id-theft-have-you-been-stolen
http://www.nccc.org.my/v2/index.php/nccc-di-pentas-media/2006/287-new-straits-
times-id-theft-have-you-been-stolen?format=pdf
21