You are on page 1of 9

CHAPTER 1

INTRODUCTION

In our modern days, personal information is capture, processed, and disseminated in a


bewildering variety of ways, and through increasingly sophisticated, miniaturized, and distributed
technologies: identity cards, biometrics, video surveillance, the use of cookies and spyware by
websites, data mining and profiling, and many others. In which it makes identity theft a popular
criminal act in the Philippines and to different parts of the world. But he that filches from me my
good name. Robs me of that which enriches him. And makes me poor indeed. Shakespeare,
Othello, act iii. Sc. 3. Identity theft is a term used to refer to all types of crime in which someone
wrongfully obtains and uses another persons personal data in some way that involves fraud or
deception, typically for economic gain (US-Department of Justice, 2016).
The Philippines is the sixth largest social network media user in the world (hreflibrarian, 2012)
and online identity theft is a very common crime in our country. According to a press release from
the Philippine National Police Anti-Cybercrime Group (PNP ACG) there are 127 Online Identity
Theft complaints as of 2013-2015. There are 44 million Internet users in the Philippines as of
2014, said the PNG ACG, citing digital discovery engine Fact browser. The users spend an
average of 18.6 hours per week (around 2.6 hours per day) online (gmanetwork, 2015). Social
media is a pretty nifty tool for keeping in touch. Platforms including Facebook, Twitter, Instagram
and LinkedIn offer us a thousand different ways in which we can remain plugged in at all times.
The endless capacity for sharing, swiping, liking and retweeting has some negative ramifications,
not the least of which is that it opens us up as targets for identity theft. Here in the Philippines,
there are lot of complains about Identity theft were Businessman, Teacher, Models and etc. are
allegedly victims. Most of the complaints was made in social media nor Cyber Community.
Computers and mobiles are some of the channels. A public school teacher may be a victim of
identity theft as he owes three banks P800, 000 for loans he did not apply for (Consulta, 2016).

It is much easier nowadays for others to obtain our identity and use it for criminal purposes,
then, is Online Identity theft criminal act preventable? The content of this paper answers: first,
what has happened and why should we be concerned in the Philippine situation regarding Identity
Theft crime? And the cause and effect of identity theft crime? And second what are the possible
solutions or preventions for the said crime, and lastly about whether people in the online world
are aware of the identity theft risk and precautions for becoming a victim, with the intention of
informing people, giving them awareness and giving earlier precautions before they could
become one of the victim.
In some ways, being aware and being keen of the new possible ways an identity theft can
obtain your personal information and harm you and get to know about ways to avoid them from
targeting you can prevent you from being a victim, without the need to deactivating yourself from
the cyber world.

CHAPTER 2
BACKGROUND OF THE STUDY

Identity theft isnt a new criminal activity; in fact, its been around for years. Whats new is the
method criminal are using to part people from their sensitive information. The first recorded act of
identity theft dates back to biblical times. In the book of Genesis, Jacob posed as his brother
Esau. Jacob hoped to trick his dying father into believing that he was the older son of and rightful
recipient of his fathers estate. Jacobs attempt at identity theft was successful, and his father
mistakenly left his inheritance with Jacob instead of Esau. Around 1800s, during the Wild West
era, outflows were known to murder people to acquire a new name and life story. This deceitful
persona helped the outlaws stay one step ahead the law. Around 1919s, Womens suffrage and
other voting rights increased the need for advance identity theft protection. Identities were being
stolen for the sake of ballot stuffing at the polls. Around 1920s, In the early century, bootlegging
mobster, who were constantly at odds with the law, created their own version of the witness
protection program. They committed murder to obtain legal documents and ultimately establish
new identity. Around 1930s, when prohibition came to a close, individual states had the right to
set their own legal drinking age. States with more restricted access of alcohol saw an immediate
increase in identity theft. Young drinkers spawned the widespread needs for fake IDs. Credit
cards first gained popularity in the 1960s as people embraced the ability to buy on credit.
However, this innovative buying option introduced new incentives for criminals to commit identity
theft. Frank Abagnale, whose life story inspired Steven Spielbergs 2002 movie Catch Me if You
Can, was a professional identity theft. He netted $6 Million by forging personal checks and
impersonating a Pan Am pilot before being arrested in 1969. Around 1998s in USA, Congress
enacted legislation (Identity theft Assumption Deterrence Act) naming identity theft as a federal
crime with a fine $250,000 and up 15 years in prison. At the turn of millennium, search engines

like Google were first emerging. The new reliance on computers and the internet turned identity
theft in to a mainstream societal issue. With advanced technology, people were left vulnerable to
thieves with unlimited access to personal information. In 2015 in USA, Identity theft was leading
consumer complaint made to the federal Trade Commission, accounting 18% of all reported
issues (Chargeback911, 2014).

There are also identity theft cases in the Philippines which causes some losses and trouble to
the victims. Mark Joseph Lontok said he received notifications from three banks saying that he
borrowed a total of P800,000 in salary loans. He denied applying for the loans. However, Lontok
remembered posting a photo of his Proffessional Regulation Commission (PRC) ID online after
he passed the LET (Licensure Examination for Teachers). Over P9,000 have been abducted
from his payroll account every month, which surprised him because he did not sign any document
authorizing the bank to deduct the amount. Another bank is also yet to deduct P10, 000 from his
account. With this incident, the National Bureau of Investigation (NBI) reminded the public to be
discerning in posting personal information online. Twenty-one year old model, entrepreneur, and
blogger Kryz Uy was one of the many victims of identity theft. An anonymous user set up a fake
Kryz Uy account to sell clothes, purportedly from her; up to P8, 000 was stolen from one of Uys
followers. Everyone thought that I was scamming these people so I had to clear my name. But
then no matter how I tried to report it on Facebook, wala pa rin. said Uy. She went as far as
reporting the incident to authorities, but to no avail. In 2010, Gilbert Climaco, a program director
and news anchor of the Radio Mindanao Network, was a victim of identity theft after a fake
Facebook account under his name was used to extort money. Climaco, who back then did not yet
have an account in any social networking site said that the fake account created a lot of mess in
my life. One bank depositor, who refused to reveal his identity, lost P87, 000 when an unknown
cyber thief succeeded in transferring money from his account to an untraceable account (Cupin,
2011). A female college student was arrested by members of the Philippine National Police (PNP)
Anti-Cybercrime Group (ACG) after alternately posing as celebrity Maricel Laxa-Pangilinan and her
children to extort money from the celebritys friends and relatives. In a press conference on
Wednesday, PNP ACG Director PSSupt Guillermo Lorenzo Eleazar said that the suspect, identified

as Myca Acobo Aranda, was arrested on Tuesday after she withdrew the P5,000 sent by LaxaPangilinans friend. Anthony Pangilinan, Maricels husband, said that Aranda was able to convince a
Facebook user named Suzette to send P5,000 to her using a fake account. Aranda reportedly told
Suzette that the money will be used for the outreach program of her daughters in the Cordilleras.
The money was sent through LBC. Eleazar said that Aranda also solicited money from the friends
and relatives of the celebrity couple. The arrest was made with the cooperation of the victims, Smart
Padala agents and other police units. The PNP ACG director said that Aranda, an Information
Technology student at the Kings College of the Philippines, was able to hide digital evidence on her
gadgets and her identity.

Identity theft is becoming a growing concern all around the world and especially in other
developed countries. Online fraud is one of the most widespread forms of cybercrime, with the
Internet used increasingly to steal the identities and financial information of unsuspecting surfers.
Criminals use unsolicited email messages, as well as websites, chat rooms, message boards and
social networks in order to get access to peoples details. Internet fraudsters are so dangerous
because the tactics they employ are changing all the time however, there are definite patterns
to watch out for, and armed with technical advice and common sense its possible to prevent
online fraud. As more and more people use their data-rich handsets for banking and online
shopping, they become more attractive to cybercriminals. The world of protecting all of your
Internet-accessible devices is growing trickier almost every day. As the security holes are
plugged, cybercriminals look for new ones with craftier ways to get you to invite malware onto
your devices. Phishing scams is a popular ploy from Internet con-artists, which frequently takes
the form of email messages designed to steal information from the unwary. Usually disguised as
emails from reputable companies such as banks, or more recently from social networks like
Facebook and Twitter, phishing scams instruct the victim to enter personal details on a malicious
website, or to respond directly to the email. Pharming scams, though similar to phishing in that
unsuspecting users are directed to malicious websites, pharming is more difficult to detect as it
doesnt require a click. Visitors are redirected automatically, even if they have typed in the correct
web address (Norton, 2012). Spamming has become a common thing for anyone who uses the

internet. Emails of confirmation that talk of winning the lottery to obtain the personal information of
the account holder when he replies or responds to the email has become a regular nuisance
(Richards, 2010).

Anyone can become a victim of identity theft, and the effects are often long lasting. Emotional
and behavioural consequences of identity theft can continue for years after the crime has taken
place and leave victims feeling vulnerable and desperate. The Identity Theft Resource Centers
survey Identity Theft: The Afthermath 2013 revealed that almost 70 percent felt afraid about their
financial security, and half of them reported feeling helpless, betrayed, angry, ashamed,
embarrassed and overwhelmingly sad. Some felt suicidal (TechnologyOrg, 2015). Another effect
of this criminal act is financial loss. For starters, the thief can gain access to your bank account
and take money from you directly. This individual can also open up a credit card in your name,
which can put you into debt without you even spending any of the money. Another item that many
identity theft articles consider is investments, as these thieves can withdraw money that you have
put away for the future. As a result, becoming an identity theft victim can affect your retirement or
your childrens education. Another devastating aspect of becoming an identity theft victim is the
loss of benefits. If someone takes control of your social security number, that individual can
sometimes use your medical benefits. In these situations, the thief is able to receive medical
treatment using your name, which quickly uses up your available benefits. This often occurs if this
individual obtains a social security card with your name on it and received a job while
impersonating you. If this happens, you could be denied the medical treatment that you need if
your annual benefits are exceeded by someone else. In the end, becoming an identity theft victim
could be a life threatening experience if you are unable to obtain medical attention when you
need it. Although this aspect is less common, identity theft can lead to legal problems for the
victim. If the thief is able to secure identification in your name and is arrested for a crime, you
become much more than an identity theft victim. If the thief is arrested for a crime and gives your
identification to the police, you become the criminal. In these situations, the police will start
looking for you if the criminal does not show up for a court appearance or is suspected in further
crimes. Despite the fact that you will eventually be vindicated as an identity theft victim, it can still

be a scary experience. You could lose job opportunities if you do are unable to clear your name,
since some information might appear when an employer completes a criminal record check. The
worst thing about being an identity theft victim is the cost. It takes such a long time to realize that
you have become a victim that multiple things can go wrong before you have a chance to correct
them. For example, an identity theft victim might have a lowered credit score, criminal charges
and a maxed out credit card to deal with before he or she even know that someone else is using
his or her identification. It takes hours to deal with each of these issues and it damages your
reputation along the way. In the end, becoming an identity theft victim is a major hassle and is
something that all identity theft articles agree takes years from which to recover fully.

To prevent yourself for becoming an online identity theft victim one should be precautious.
Protect your computer and smartphone with strong, up-to-date security software. If your computer
or phone is infected with malicious software, other safeguards are of little help because youve
given the criminals the key to all your online actions. Also be sure that any operating system
updates are installed. Learn to spot spam and scams. Though some phishing scams are easy to
identify, other phishing attempts in email, IM, on social networking sites, or websites can look very
legitimate. The only way to never fall for phishing scam is to never click on a link that has been
sent to you. Use strong passwords. Weak passwords are an identity thiefs dream - especially if
you use the same password everywhere. Once the thief knows your password, they can log on
any of your accounts and wreak havoc. You need passwords that are long (over 10 characters),
strong (use upper and lower case letters, numbers and symbols), and that have nothing to do
with your personal information (like name, age, birthdate, pet). Also do not post sensitive
information online. Think hard before you post something and dont announce to everyone all
single information in your life. Monitor your credit scores. Stay alert. Watch for common signs of
identity theft. Consistently applying these steps will reduce the risks of having your identity stolen,
and alert you instantly if such a problem arises (Criddle, 2016).

Republic Act No.10173 also known as Data Privacy Act of 2012, an act protecting individual
personal information in information and communication system in the government and the private

sector, creating for this purpose a national privacy commission, and for other purposes. This
policy of the State to protect the fundamental human right of privacy, of communication while
ensuring free flow of information to promote innovation and growth. The State recognizes the vital
role of information and communications technology in nation-building and its inherent obligation to
ensure that personal information in information and communication systems in the government
and in the government and in the private sector is secured and protected.

In this study, we will be picking up 20 random respondents who are using social media and are
very active online and give out questionnaire with 20 questions about identity theft risk. In this
survey, we will be expecting results about whether people in social media are aware of identity
thieves occurring online and their tactics. We also have to know if some of them have
experienced being a victim and if they suffered losses or harm, and how sensitive are they when
giving out information to the public. We will have to find out if they were aware of the precautions
to take in order to prevent themselves from becoming an identity theft victim. And well be
expecting in the end of this study answers such as whether Identity Theft preventable or not.
Below is the questionnaire we will be using for the survey.

This is a survey questionnaire about identity theft risk. Identity theft is a crime in which an
imposter obtains key pieces of personal information, in order to impersonate someone else.
Name: ___________________________
1. What gender are you? Male or female?
2. What age are you?
a. 16-17
b. 18-19
c. 20 above
3. Which of the following social networking site do you use the most?
a. Facebook
b. Twitter
c. Instagram
4. How often do you post something on the social networking site that you use?
a. Always. I post everything about my life
b. Only 5 times a day
c. Once a day
d. Sometimes only
5. Do you use different passwords for different websites or accounts? Yes?No
6. Have you been a victim of identity theft before? Yes?No

7. How concerned are you about your Facebook account being taken over?
a. Very concerned
b. Somewhat concerned
c. A little concerned
8. Have you suffered any of the following from having your identity stolen on Facebook?
a. Financial loss or loss of a financial opportunity
b. Embarrassment or damage to my reputation among my friends
c. Embarrassment or damage to my reputation among my co-workers or clients
d. Loss of job or job offer
e. Loss of an educational opportunity, like an admissions offer or scholarship
f. Have not suffered any loss
9. Have you used the Internet to purchase anything online? Yes/No
10. If yes, do you use a credit card, debit card, or both for online purchases?
a. Credit Card
b. Debit Card
c. Both
11. Has someone without your permission, used or attempted to use your accounts to
purchase something online? Yes?No
If you answered no in no. 6 proceed to no. 17
12. How many times were you a victim of identity theft in the past 12 months?
13. Do you have any idea of how your identity was obtained, even if you are not completely
certain? Yes?No
14. If yes, how do you think your identity was obtained?
a. It was stolen during and online purchase/transaction
b. Someone hacked into my facebook , twitter or instagram account
c. I responded to any scam ads on any websites
d. Someone stalked me on facebook, twitter or instagram
e. Others, specify___________________________________
15. Do you have any idea about these people who used your identity?Yes/No
16. If yes, how did you found out?
17. What can you say about social media as a primary surveillance of your identity?
18. This is an optional question, can you give a scenario of about identity theft?
19. Do you believe that Name Challenge or any other app in social media can enable a
person to use you identity? Yes/No
20. Lastly, are you aware that social media can be a toll for other people or any organization
to easily track you or copy your identity?

You might also like