John Sileo Identity Theft Social Media Identity Fraud Analysis

Superior Essays
Wade Hodges
English 101
Kirk Greenwood
May 1st 2016
Who’s Asking?
I am writing as a small business owner that is speaking to entrepreneurs that range from the ages of college students to parents with children in seventh or eighth grade. This is my audience because these people pose as having the highest risk of identity theft. Another group that could benefit even though they do not know it, is small business owners and entrepreneurs.
As long as they are being used for the right purposes, cyber identities can actually be a very useful tool in the advancement of technology today. However, even the most advanced things can be manipulated into something dangerous and cyber identities is one of these things.. If you have a cyber identity,
…show more content…
John was a business owner that fell victim to identity theft and is now an informational speaker on how to spot and protect you from thieves. In one of the pieces of the video towards the end, John speaks to a woman asking her very normal questions. He asks her name, asks her to hold his camera for a second, and poses for a picture with her for the cameraman on the side of the stage. He then reveals all the information he has gotten from her without her realizing. He has her photo, her name, and even her fingerprints off the screen of the camera. It seemed like a very normal conversation, but if he had been an identity thief, John would have a lot of information about this woman that he could use against her and it took only seconds to get it. With all the information he acquired in the short period of time John could go online and look this woman up and get all the rest of the information he might need by looking up if she has social media site accounts or other forms of information out online. But is it just adults that can be targeted by this? The answer is most certainly …show more content…
In this article there is a statistic that is truly terrifying. “A recent study based on identity scans of over 40,000 children in the U.S. conducted by Richard Power, Distinguished Fellow at Carnegie Melon CyLab, found 10.2 percent of the children in the report had someone else using their Social Security number. That figure is 51 times higher than the 0.2 percentrate for adults in the same population. Prior to the Internet age, child identity theft occurred most often at the hands of a relative who was using the minor’s Social Security number to circumvent bad credit.” (Elizabeth Alterman) Thieves are no longer just looking to circumvent bad credit, they are now looking to follow these children on social media sites to create a cyber identity that mimics the victims so that they can steal from them when the grow up. If one of the children became the owner of a small business in the future, the thief that has been following them would now have more than enough information to cause irreversible damage to the victim. And what is even worse, it would be difficult to prove that someone else was the one who did all of this because they would have had

Related Documents

  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Repercussions Of Crimes

    • 1460 Words
    • 6 Pages

    I online shop out of preference, I can not afford to not use Wi-Fi when possible, and I often use public computers and networks on campus. As a university student I apply for jobs a lot, and supply my social security number regularly, I also make many credit card purchases and carry no cash. I may not a favored target but it would still be a possibility. Identity theft is a completely terrifying, even more so now after reading that “8.6 million households " have experienced identity theft. Identify theft goes beyond the simple definition of “illegally obtaining another information for economic gain, it is the complete theft of an individual 's life that can forever alter their choices.…

    • 1460 Words
    • 6 Pages
    Improved Essays
  • Superior Essays

    Because of how easy it is to fake an identity online, there is immense potential for harm. Even though connecting with people is a must, you never know who you are connecting with. Child predators and paedophiles have the freedom online to fake their identities and lure people into harmful situations. The internet and how people use it make being safe online nearly impossible. People are able to pursue immoral ideas such as trapping children, luring unsuspecting people, and scamming millions of dollars.…

    • 1172 Words
    • 5 Pages
    Superior Essays
  • Decent Essays

    Dr. Wallace introduces the speaker, the director of the core text reader, states that it is used to enhance what were learning in class. Dr. Brad Busbee starts off by saying that we can learn a lot from a pre-modern case of identity theft. The big questions we wrestle with is “who are we” and “how do we know who we are”. People today know know who they are and what they look like because we have mirrors and pictures.…

    • 376 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hackers/Crooks have put hard working people in hardship by ruining their credit causing them to be unable to buy a home or even getting hired on at a job. They have been known to steal credit card numbers from websites, breaking into homes or digging into the trash to retrieve personal information, and an employee you work with that takes a look at your personal file(Federal Trade, National and State, Consumer Sentinel, 2013).Though the internet is one of the main ways identities are stolen, they will pick-pocket you, steal your mail right out of the box, your tax information, and even obtaining medical services(Cassim, 2015).…

    • 105 Words
    • 1 Pages
    Improved Essays
  • Decent Essays

    Identity Theft Case

    • 663 Words
    • 3 Pages

    INTRODUCTION: This case involves the suspects accessing the victim’s bank account, by unknown means and stealing US currency in violation of PC 530.5(a)-Identity Theft. LOCATION DESCRIPTION: This incident occurred at the Bank of America, located at 880 E. Colorado Boulevard. LOSS:…

    • 663 Words
    • 3 Pages
    Decent Essays
  • Improved Essays

    Now-a-days it seems like more and more people are starting to emulate a false identity online. People are doing this so much that you cant trust anybody that you meet online and I mean anybody. For example, theres a show on MTV called Catfish, where this guy and his friend help people meet there online girlfriend/boyfriend. These people fall in love with other people via social media that they have never met before, all they 've seen are pictures.…

    • 1364 Words
    • 6 Pages
    Improved Essays
  • Decent Essays

    The word security has changed over time in different ways including what it means, context, and what it really stands for. Security in today’s age means the state of being in good protection from danger. However, looking back the definition was more so related to social status and economic security meaning you were making steady income. Both still mean protection from danger, as in now we think of it as protection for life but back then it was protection from what people thought you were, homeless or poor. Let's look at the text 1, Declaration of Independence, which talks about its contextual meanings.…

    • 457 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    There are so many mentally disturbed people in the world who use the internet just like everyone else. These people can use the information you put online to potentially find you. There have been many cases about such tragedies as these. For example there is a movie “Megan is missing”, that is based on a true story, about two fourteen year old girls, Megan, and her best friend Amy, who venture online and meets a seventeen year old guy named Josh in a chatroom. As the plot thickens, Megan meets Josh face-to- face and he turns out to be someone completely different and then he proceeds to kidnap and kill Megan.…

    • 1081 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    This Generation of society has no boundary on privacy, with social media and connecting through technology more, It is much easier for private/personal information to get out and into the wrong hands. According to Boonsri Dickinson, a researcher for ZDNet states that “The popular social media feed Facebook, got three clever criminals in New Hampshire a lot of loot. They checked on Facebook to when people weren't home, and being the holiday season leaving their incoming gifts vulnerable. Just after 18 homes they accumulate $100,000-$200,000 dollars in stolen goods”(Dickinson) . All because people allowed themselves to be vulnerable!…

    • 1159 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Critical Review #2: Identity crime and misuse in Australia: Results of the 2013 online survey Behind the article: Koubaridis (2014, n.p.), a crime news reporter for News Limited, states that ‘1 in 5 Australians have been victims of identity crime [due to] computer hacking, [and] online banking and shopping [are] to blame’. Koubaridis (2014) based the article’s research on a study conducted by the Australian Institute of Criminology. Russell G. Smith and Alice Hutchings from the Australian Institute of Criminology conducted this study in September 2013 (Smith and Hutchings 2014). Research data embedded within the article: Within the media article, there were five components that directly related back to the published research.…

    • 1370 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    tremendously serious ways, they may lose the ability to access their financial identity, the ability to cask checks, obtain credit or buy a home, or they may even be arrested for a crime committed by identity thieves (Swecker2). In 2003 survey has shown that 4.6 percent of the United States population ages eighteen and older were victims of identity theft, 9.91 million of people lost over 52.6 billion dollar from only new account frauds (Swecker2). In another case “survey by the Bureau of Justice Statistic, victims reported losing over 24.7 billion dollar in direct and indirect costs because of identity theft in 2012” (Morton2). According to Swecker, identity theft has emerged as one of the most dominant white collar crime problem in the…

    • 348 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Sneakerhead Essay Example

    • 2036 Words
    • 9 Pages

    Joel Hartman WRT 150 Professor Lentz November 3rd 2017 Essay 3 It’s an early morning on June 23rd, 2017, a Saturday. I wake up startled, thinking I slept in too late, it's 8:00 AM I take a deep breath in a way to relax, I had an hour. Therefore I begin rushing around to log onto my computer and getting all my tabs ready and have my auto check out ready and filled out so I don't have to hassle with filling out basic information. As well as called my bank the previous night to make sure they would accept any payments on my card.…

    • 2036 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    In a society where everyone is expected to project their personalities on social media for all to see, it’s often hard to know what someone is truly like, and if the part of them we see on one platform is an accurate representation of their identity. Outside sources affect various different parts of your identity, which come together to make a complex whole you. These sources, such as the media and society, law enforcement, and more and more importantly, the Internet, have a lot of power over our personal identities and which parts of ourselves we present to them, which has positive and negative effects. Being a person of color in America is not easy. Because of how beauty is presented in the media, the larger society holds uniform standards…

    • 1001 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    It gives us a new platform where we can be whoever we want. Now ask yourself. Who are you in digital identity? What are your similarities and differences? Knowing or unknowing we change ourself.…

    • 971 Words
    • 4 Pages
    Improved Essays