Identity And Social Consequences: The Evolution Of Identity Theft

1743 Words4 Pages

A 22-year-old girl finds a new and exciting Facebook friend, and hurriedly sends the trusty friend request. To her utter excitement a 24-year-old boy who looks to be copy and pasted from a magazine, immediately accepts. Finally, a boy she can trust. As she continues to message this magazine god, a relationship is created. Desperately she wanted to meet him to confirm all their hopes and dreams of love at first click. Unfortunately, a 35-year-old man is just as desperately trying to find a way to keep this girl from finding out about his real physical appearance. Magazine god turns into average human. With the cloak of the screen he was able to create a mental and emotional relationship and betrayed the trusty online profile. Once the 22-year-old girl finds out she might be mentally and emotionally distraught, hurting the relationship that took numerous years to build up. This is a clear example of catfishing and it was all enabled by a screen and a …show more content…

Originally done by people trying to escape their previous life, there is now a social phenomenon for young adults trying to fake whole relationships behind their screen. “The history of identity theft began with murder. Today, a criminal never has to see or speak with you to steal your identity” (History of Identity Theft). The evolution of technology changed the way people can steal and use your identity. A screen disconnects you from the real world so that you can take over a new identity and be ignorant of the person you are stealing from. The first documentation of identity theft was 1964 after the creation of wider postal services and credit card industries (Computer Law and Security Review). There was more ignorance towards what information can do when given to the wrong people. Yet, the people stealing this identity can be completely oblivious from the people they are stealing from. This tends to shadow the values and more mental aspects of the human

Open Document