ipl-logo

Death Master File

1108 Words5 Pages

In the article, “Tighter Access To ‘Death Master File’ Has Researchers Worried,” Brian Naylor addresses how identity theft by obtaining personal documentation may lead to fraud. The Social Security Administration (SSA) possesses a record of over 50 million names of deceased Americans which is known as the “Death Master File” (Naylor 2). Families and services relating to a person’s death inform the SSA about the deceased’s “...Social Security number, name and dates of birth and death” (Naylor 3). Once the SSA receives the person’s data, the organization ensures “...checks don 't go out to the deceased, while survivors get the benefits they are entitled to” (Naylor 3). Since 1980, the death master file has been free to public use. As a result, …show more content…

Essentially, anyone can accumulate knowledge regarding “...everything from where your [dead] great-grandfather was born to what diseases you might be at risk for because of your DNA” (Naylor 12). Mark Twain’s novel, The Adventures of Huckleberry Finn, shares an aspect of identity theft similar to the fraud the article discusses. As Huckleberry and Jim drift down the Mississippi River, the days are full of peace and harmony. One day, Huckleberry walks ashore to gather some berries when two men suddenly come into view. At the moment, a mob seems to be pursuing the pair of men. Graciously, Huckleberry helps the men escape the mob by giving them directions to the raft and Jim. Shortly after the men come aboard the raft, the younger of the two men reveals the truth of his identity as the Duke of Bridgewater. While the duke tells his sad tale of being snubbed, Huckleberry’s and Jim’s hearts fill with sympathy. Hoping to console the duke, Huck and Jim decide to answer the duke’s every wish. Later on, the older of the two strange men claims he is the true King of France. Once again, Huck and Jim feel the obligation to serve the dismal king. In the …show more content…

Throughout the duke’s and the king’s plot to steal Peter Wilks’ legacy, the two men pretend to the deceased man’s two brothers. Due to a passerby sharing details of the late Peter Wilks, the duke and the king are able to use this intelligence deceive the Wilks family with ease (Twain 158-160). Similarly, the article mentions identity thieves accessing the “Death Master File,” the database which stores the names and once intimate information of deceased people (Naylor 2-4, 12). The possession of a person’s background information could enable someone to assume the identity of another and then retrieve financial assets or “...fraudulent tax refunds” (Naylor 6, 9). In either case, the manipulation of personal information generates the opportunity to illicitly take an identity for the sake of personal

Open Document