THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE



Similar documents
CATCH ME IF YOU CAN: THE IRS IMPERSONATION SCAM AND WHAT IS BEING DONE ABOUT IT

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009

Lessons Learned and Best Practices: Identity Theft and Its Nexus to Illicit Activity Team

FINAL // FOR OFFICIAL USE ONLY. William Noonan

Cybercrime: risks, penalties and prevention

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

IRS & Partners Combat Tax-Related Identity Theft What s New for 2016

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Middle Class Economics: Cybersecurity Updated August 7, 2015

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

OIG Fraud Alert Phishing

RC284. Protect Yourself Against Identity Theft

Criminal Investigation

Deception scams drive increase in financial fraud

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Edward Lowery III. Special Agent in Charge Criminal Investigative Division, U.S. Secret Service. Prepared Testimony

Establishing a State Cyber Crimes Unit White Paper

Cyber Security Strategy

VISA International Security Summit. Dr. Colonel Tran Van Hoa Deputy Director Viet Nam Hightech Crime Police Department

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

Presidential Summit Reveals Cybersecurity Concerns, Trends

Topic 1 Lesson 1: Importance of network security

Taxpayer Guide to Identity Theft Protect yourself. By Beatriz Landa-Sanchez, EA

An Overview of Cybersecurity and Cybercrime in Taiwan

What legal aspects are needed to address specific ICT related issues?

Securing Critical Information Assets: A Business Case for Managed Security Services

National Cyber Crime Unit

Langara College PCI Awareness Training

How do we Police Cyber Crime?

Keynote. Professor Russ Davis Chairperson IC4MF & Work Shop Coordinator for Coordinator for Technology, Innovation and Exploitation.

Identity Theft. Protecting Yourself and Your Identity. Course objectives learn about:

Identity Theft Don t Be a Victim How IRS and Tax Professionals Can Prevent Identity Theft and Assist Taxpayers Who Are Victims

Privacy and Information Protection Bulletin

Don t Fall Victim to Cybercrime:

9. Information Assurance and Security, Protecting Information Resources. Janeela Maraj. Tutorial 9 21/11/2014 INFO 1500

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Cybersecurity Workshop

How to Prevent It What to Do If You Are a Victim

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA

FREE YOUR MIND Can You stop Identity Theft?

Testimony of Matthew Rhoades Director Cyberspace & Security Program Truman National Security Project & Center for National Policy

Network Security & Privacy Landscape

Identity Theft and Tax Administration

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Risk Management in Global Operating Industry

Identity Theft and Strategies for Crime Prevention

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

NEW ZEALAND S CYBER SECURITY STRATEGY

WRITTEN TESTIMONY OF

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Take our Fraud Quiz and see what you know about frauds and scams in Canada. Test yourself on

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Identity Protection Guide. The more you know, the better you can protect yourself.

10 Smart Ideas for. Keeping Data Safe. From Hackers

Online security. Defeating cybercriminals. Protecting online banking clients in a rapidly evolving online environment. The threat.

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

REPORT. Next steps in cyber security

An Introduction to Cyber Crime and Terrorism: Problems and the Challenges

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

Preventing Identity Theft National City Bank. How to protect your identity

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

Privacy and Information Protection Bulletin

CYBER SECURITY THREAT REPORT Q1

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

<DATE> <FIRST NAME> <LAST NAME> <ADDRESS LINE 1> <ADDRESS LINE 2> <CITY>, <STATE> <ZIP> Dear <FIRTST NAME> <LAST NAME>:

How To Protect Yourself From Cyber Crime

Cybersecurity. Are you prepared?

Transcription:

THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual or entity s identity to conduct illicit activity. To study identity theft, we first look at what constitutes identity: IDENTITY FOR THE IDENTITY FOR THE ORGANIZATION GOVERNMENT ISSUED ID BIOMETRICS DEVICES PROFESSIONAL ID VIRTUAL SELVES LEGALLY ESTABLISHED ID BRAND + REPUTATION EMPLOYEES CUSTOMERS MISSION With all the information being stored online, technology is making it easier for malicious actors to engage in identity theft and to steal massive amounts of identity data.

CURRENT STATE Identity Theft 2013 The following statistics illustrate the scope and cost of identity theft in 2013. Credit, debit and prepaid cards worldwide experienced gross fraud losses of $ 11.27BILLION in 2012 Identity theft accounts for an annual loss estimated at $ 21billion in the U.S. CHILD ID FRAUD IRS FRAUD MEDICAL ID FRAUD 1 in 40 households with children under 18 have experienced child ID fraud. The IRS could issue approximately $26 billion in fraudulent tax returns resulting from ID theft between 2013 and 2018. Nearly 1.8 million Americans are victims of medical ID theft every year. This is not only costly but it also threatens lives. SMALL BUSINESS Small business presents a high degree of potential exposure to identity theft via online means. More than 77% of small and medium-sized business owners believe their company is safe from cyber threats, however MOTIVES 75% of reported data breach cases are financially motivated. $ $ 83% of small businesses have no cybersecurity plan. $!

FUTURE STATE Identity Theft 2017 Identity thieves use technology to keep one step ahead of security experts and law enforcement. By 2017, identity thieves will reach into every part of our lives and into institutions and organizations from anywhere in the world. Here is a snapshot of the emerging trends in identity theft in 2017. REPUTATION Phishing attacks target institutions to access data or impersonate the organization for social/political causes. These attacks harm organizations credibility and impact their mission and are increasingly launched by anarchist or national criminal groups. CORP. PROFILE TRANSFER WIRE TRANSFERS Through hacking and social engineering, criminals create fraudulent documents impersonating real companies and transfer money. Wire transfers are worth tens or hundreds of thousands of dollars and are a growing target for criminals. PHISHING Spear phishing allows thieves to masquerade as a company or organization for financial gain. Hundreds of thousands of phishing attacks are sent each day and tens of thousands of people reply. DISRUPTION Hackers attack websites, internal information and security systems in order to disrupt or cripple organizations and businesses. Attacks become more widespread shutting down entire businesses, industries or locations for longer periods. BRAND BANK W-2 TAX REFUNDS With just a name, address and Social Security Number, organized crime groups file millions of fraudulent tax returns early to obtain refunds before individuals file their genuine returns. TERRORISM Identity theft provides hundreds of potential terrorists entry into the United States. Fake identities or fraudulent account numbers are used by terror networks to launder money or to finance their operations. LEGITCO NEWS FOUNDATION INSURANCE HOSPITAL MEDICAL FRAUD A single medical insurance card is worth 40 times more than a Social Security card on the black market. Health care cooperatives have become a prime target for identity thieves. Erroneous information increasingly shows up on medical records leading to serious health risks, even death. TARGETING VULNERABLE GROUPS Criminal groups increasingly target children, the elderly and other vulnerable groups. Online gaming sites for kids have become a prime target for identity thieves. RETIREMENT SCHOOL MOBILE PHONES BANK ATM $ $ BANK ACCOUNTS Bank account numbers remain one of the biggest targets for criminals and organized crime. Large-scale theft of millions of account numbers and online transactions become commonplace across borders where criminals can evade law enforcement. SOCIAL MEDIA ATTACKS Thieves impersonate people on social media, harming their reputation by taking over or creating false social media pages and posting pictures or other defamatory information. PROFILE MOBILE ID Mobile devices are the primary means of identification. The devices include fingerprint information, bank and payment accounts, airplane tickets, pins and passwords. The depository of information becomes an irresistible target for identity thieves. DOCUMENT THEFT Thieves use stolen documents, including passports and driver s licenses, for illegal purposes including entry into the United States. RFID chips on some passports become a target giving thieves more information on victims and more credibility in forging new documents. 18 123800 354 65 DOCUMENTS and IDENTIFICATION Thieves, especially organized gangs, steal documents, mail, account numbers and payments from individuals for fraudulent use and financial gain. Securing communications becomes urgent.

Our Recommendations EDUCATION Design and implement a public education campaign leveraging schools, online users and companies. GOVERNANCE Designate a single agency and dedicate a single database for incident reporting and measurement. INCENTIVES Increase funds for law enforcement to pursue identity theft by adding manpower, resources and training. Design and implement incentives for public and private compliance with best practices in identity security and privacy standards. SECURE YOUR IDENTITY RANKED #1 IN ID PROTECTION 4 1 ID 101 LAW ENFORCEMENT A B C 1 2 3 4 5 6 7 8 0 9 LEGAL / LEGISLATIVE Adopt strict privacy regulations to better protect people and entities in virtual and physical environments. Regularly revisit a globally-accepted legal definition of identity theft to encompass evolving perspectives. Strengthen existing legislation and increase penalties for identity theft domestically and internationally. Evaluate annually to keep pace with criminals. PROTECTION Encourage individual and institutional online identities to obfuscate the location, source or one s identification through employing multiple virtual identities and/or proxies rendering the act of identity theft increasingly difficult and complex. TECHNICAL Adopt a multifactor ID system for transactions and documents of significance.

2013 Identity Theft and Nexus to Illicit Activity Team Chris Sailer Bill & Melinda Gates Foundation chris.sailer@gatesfoundation.org Jason Kerben Office of the Director of National Intelligence jasonk@dni.gov Edward T. Lanoue HSBC Bank ed.t.lanoue@us.hsbc.com Brett Yellen Department of Homeland Security brett.yellen@hq.dhs.gov Karen Lissy RTI International klissy@rti.org John D. King Department of the Army National Ground Intelligence Center john.d.king50.civ@mail.mil Jason Thomas Thomson Reuters jason.thomas@trssllc.com Jynika Craig Federal Bureau of Investigation jynika.craig@ic.fbi.gov Kristin Schwomeyer WellPoint kristin.schwomeyer@wellpoint.com Acknowledgments We extend our grateful appreciation to the following individuals and organizations for generously sharing their expertise and opinions: Stephen Coggeshall (ID Analytics), Chuck Cohen (Indiana State Police), Marc Goodman (Singularity University), Donald Rebovich (Utica College), Jonathan Rusch (US Department of Justice), Department of Homeland Security-Homeland Security Investigations, Microsoft, Nike, Seattle Police Department, Social Security Administration-Office of the Inspector General, T-Mobile, and US Secret Service. XPLANE 2013 Published November 2013 X