There are a number of ways through which identity thieves can obtain personal information that identifies an individual. The first method that they can use is phishing, which most entails attempting to obtain other people sensitive information by pretense of posing as a trustworthy entity during online communication, with a principal objective of undertaking financial fraud. It is usually a form of online theft that entails the theft of confidential information from an internet user. Most identity thieves pretend to help consumers and send fake emails posing as banks and other legitimate companies that are likely to use one’s credit card information. In this regard, consumers are likely to be fooled into submitting their information without knowing they are being fooled. The second method that identity thieves can use to obtain one’s identifying information is through an underground internet market/chat room of identity thieves where personal information is sold for as low as $ 5. In this black market chat rooms, credit card information are on offer for sale and one can easily acquire identifying information. Other methods include hacking and stealing laptop computers having personal information.
In order to test the validity of the credit card numbers issued online, the identity thieves probe the card in various ways such as making purchases, donations and transaction with the credit card before it reaches its maximum limit. From the video, it is evident that it takes a relatively small time for identity thieves to probe the card through purchases, donations and transactions in various countries. If the transactions using the credit card number is successful, then the credit card number is valid. After they are sure that the card is functional, the identity thieves commence making bigger purchases as time goes by.
Experts estimate that identity thieves costs Americans approximately $ 5 billion annually, and in most cases, they are not caught.
Jeff and Therese Ball became involved in the identity theft ring because they were posing as middlemen. Fundamentally, they were tricked by the actual identity thieves in order to redirect the delivery to them so that they could deliver the items to the actual identity thieves. In this way, the identity thieves are extremely difficult to track since the delivery does not go to them directly, but passes through a middle man, who then reships the delivery to the actual identity thief. Personally, I think that Jeff Ball is telling the truth and does not actually know that he is a pawn in the identity theft ring. The chances of Jeff being a scammer are relatively less, and his work focuses mainly on delivering the shipments and knows nothing beyond that. Perhaps, Wendy exploited the alleged romantic relationship to trick Jeff to becoming her middle man in shipping her items bought using stolen credit cards.
When tracing the package to Africa, the challenge that Chris Hansen faces relates to the mysteriousness of the identity theft. The fact that they use middle men who have no knowledge that they are part of an identity theft scheme makes it difficult to trace the identity thieves. In addition, it is extremely difficult to ascertain whether the middle men are actually pawns in the international identity theft scam or they are being scammed without knowing what is actually going. These similar challenges are replicated for the law enforcement agencies when investigating identity theft involving stolen cards. For instance, Wendy was in Australia, she ships her packages to a middle man, who then reships the packages to other locations. In such a scenario, it is extremely difficult to trace the identity thief since the packages they are not entirely involved in the process and use other people who do not have the idea that they are being scammed.
The three challenges to law enforcement when attempting to investigate identity theft crimes include: the mysteriousness of the identity thieves in the sense that they are not involved in the process entirely; the use of middle men to reship packages without knowing they are pawns. These challenges can be overcome by prevention strategies such as consumer awareness about ID theft. Consumers should be aware of the need to secure their personal identifying information in order to avoid becoming victims of identity theft.