Identity Theft and Data Management Public Records Are Not the Problem



Similar documents
Cyber Security. Securing Your Mobile and Online Banking Transactions

PROTECTING YOURSELF FROM IDENTITY THEFT. The Office of the Attorney General of Maryland Identity Theft Unit

SAFEGUARDING YOUR CHILD S FUTURE. Child Identity Theft. Protecting Your Child s Identity

How to Prevent It What to Do If You Are a Victim

Research Topics in the National Cyber Security Research Agenda

TYPES, PREVALENCE, AND PREVENTION OF CYBERCRIME. Haya Fetais & Mohammed Shabana. Saint Leo University COM- 510

Identity Theft. The Identity Theft Conundrum

Your Credit Report. Trade lines. The bulk of a credit report is dedicated to your history of handling credit. It includes:

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

Medical Information Breaches: Are Your Records Safe?

Scams and Schemes. objectives. Essential Question: What is identity theft, and how can you protect yourself from it? Learning Overview and Objectives

Holiday Safe Shopping

2003 Changes to the Fair Credit Reporting Act: Important Steps Forward at a High Cost

Malware & Botnets. Botnets

Network Security & Privacy Landscape

OCIE Technology Controls Program

Identity Theft: An Introduction to the Scope of the Crime, and Its Prevention, Detection and Remediation

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

National Cyber Security Month 2015: Daily Security Awareness Tips

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Citi Identity Theft Solutions

Identity Theft Victims Universal Complaint Form (FTC)

How To File An Identity Theft Complaint And Affidavit

Identity Verification Program Guide

Duncanville Police Department Identity Theft Information

Fighting Identity Theft with the Red Flags Rule: A How-To Guide for Business

Identity fraud demands constantly evolving prevention strategies to thwart ever-shifting criminals.

Identity Theft. Officer Rob Romey IPD Crime Prevention Officer.

AB 60: SECONDARY & APPLICATION REVIEW Frequently Asked Questions

THINGS YOU SHOULD KNOW ABOUT IDENTITY THEFT

Cybercrime: risks, penalties and prevention

Identity Fraud: Presented by: MOHD ZABRI ADIL TALIB Head, Digital Forensics CyberSecurity Malaysia

Integrity We are above reproach in everything we do.

Identity Theft Information

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.

資 通 安 全 產 品 研 發 與 驗 證 (I) ICT Security Overview. Prof.. Albert B. Jeng ( 鄭 博 仁 教 授 ) 景 文 科 技 大 學 資 訊 工 程 系

2012 NORTON CYBERCRIME REPORT

Privacy Rights Clearing House

City of Geneva. Draft Under Review Approved Obsolete. Policy Number: 1.0. April 27, Effective Date: Last Revised Date: Responsible Office:

What are the common online dangers?

Project 2020: Preparing Your Organization for Future Cyber Threats Today

Identity Theft Assistance Kit A self-help guide to protecting yourself and your identity

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

1 Billion Individual records that were hacked in

WISCONSIN IDENTITY THEFT RANKING BY STATE: Rank 15, Complaints Per 100,000 Population, 9852 Complaints (2007) Updated January 16, 2009


CONNECTICUT IDENTITY THEFT RANKING BY STATE: Rank 19, 68.8 Complaints Per 100,000 Population, 2409 Complaints (2007) Updated November 28, 2008

Protection. Identity. What should I do if I m. Common ID Theft TACTICS. a criminal obtains your personal information and uses it for his/her own gain.

Standard: Information Security Incident Management

Identity Theft Victim Guide

Identity Theft: A Growing Problem. presented by Melissa Elson Agency Liaison Office of Privacy Protection - Bureau of Consumer Protection

Tax Fraud and Identity Theft Frequently Asked Questions [Updated February 10, 2015] 4. WHAT CAN I DO TO PROTECT MYSELF FROM TAX FRAUD IN THE FUTURE?

MIT s Information Security Program for Protecting Personal Information Requiring Notification. (Revision date: 2/26/10)

Cyber Security Awareness. Internet Safety Intro.

Frequently Asked Questions (FAQ)

Red Flag Policy and Procedures for Alexander Orthopaedic Associates

RC284. Protect Yourself Against Identity Theft

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

INTRODUCTION. Identity Theft Crime Victim Assistance Kit

Prepared by Sgt. Gibbs, Thomas B

The Future of Data Breach Risk Management Response and Recovery. The Cybersecurity Forum April 14, 2016

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

Identity Theft Victim s Complaint and Affidavit

CYBERCRIME AND THE HEALTHCARE INDUSTRY

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

SAFE ONLINE BANKING. Online Banking, Data Security You. Your Partnership for Safe Online Banking

Are Credit Monitoring Systems a Reliable Score Measurement When Preparing to Buy a Home Using Your VA Home Loan Benefit?

Driving License. National Insurance Number

Scams and Schemes LESSON PLAN UNIT 1. Essential Question What is identity theft, and how can you protect yourself from it?

INFORMATION SECURITY FOR YOUR AGENCY

Protecting What Matters Most. Terry Ray Chief Product Strategist Trending Technologies Session 11

Authorization. First Middle ( none) Last. current from Mo/Yr to Mo/Yr Street City, State & Zip. from Mo/Yr to Mo/Yr Street City, State & Zip

Cybersecurity Protecting Yourself, Your Business, Your Clients

The SMB Cyber Security Survival Guide

Questions You Should be Asking NOW to Protect Your Business!

PREPARED TESTIMONY OF THE NATIONAL CYBER SECURITY ALLIANCE MICHAEL KAISER, EXECUTIVE DIRECTOR ON THE STATE OF CYBERSECURITY AND SMALL BUSINESS

MASSACHUSETTS IDENTITY THEFT RANKING BY STATE: Rank 23, 66.5 Complaints Per 100,000 Population, 4292 Complaints (2006) Updated January 17, 2009

Datacenter Hosting - The Best Form of Protection

PROTECT YOURSELF AND YOUR IDENTITY. Chase Identity Theft Tool Kit

IDENTITY THEFT AND MUNICIPAL UTILITIES

THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK

IDENTITY THEFT RESOURCE KIT

Tax Preparers and Identity Theft

Expanding Your Services to Assist and Protect Victims of Identity Theft

Instructions. STOP: This form is NOT to be used for Credit/or Debit card

Christos Douligeris cdoulig at unipi dot gr. Department of Informatics University of Piraeus

Do s & Don ts Reference website.

MISSOURI IDENTITY THEFT RANKING BY STATE: Rank 21, 67.4 Complaints Per 100,000 Population, 3962 Complaints (2007) Updated January 11, 2009

DHHS POLICIES AND PROCEDURES

Are You A Sitting Duck?

The Information Security Problem

DATA SECURITY: EVERYTHING YOU NEED TO KNOW

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

Identity Theft Assistance: Information for Recovering Your Good Name

Is There Such a Thing as Internet Privacy?

HOW ARE BANKS FIGHTING THE WAR ON FRAUD? To answer that question, Neustar asked the industry.

IDENTITY THEFT FRAUD

How To Create An Insight Analysis For Cyber Security

IDENTITY PROTECTION MEMBER. Protect Your Identity. Security of Personal Information is Our Top Priority

Florida's Identity Theft Victim Kit

Transcription:

Identity Theft and Data Management Public Records Are Not the Problem Richard J. H. Varn Coalition for Sensible Public Records Access (CSPRA) 1

Overview of Key Points Un-validated, single factor authentication and a highly evolved and unchallenged cybercrime industry are the primary causes of identity theft, fraud, and crime, not personal data availability and access in public records Weak, single factor authentication allows fraudulent access to many rights, benefits, and privileges Information alone is used to allow transactions It is as if just knowing your street address gave anyone the key to enter your house 2

Overview of Key Points We need to attack the cybercrime industry and the way they monetize data theft, not the information industry and open government Numerous jurisdictions are attacking the problem in this way and San Antonio is proposing a Fusion Center that would specialize in Identity Theft and Organized Retail Crime By redacting public records and limiting access, we are in danger of fighting the last war against cyber criminals who already have the data and tools they need to commit crimes 3

Overview of Key Points We compound this problem by not sharing or not being able to share data about behaviors in a patchwork of government systems The private sector has addressed this problem with many services on which Iowa residents, Iowa businesses, Iowa governments, and our Iowa economy depend There are massive administrative, cost, and feasibility issues with trying to hide a few numbers and letters and there are equally massive unintended consequences of doing so 4

Overview of Key Points Names are not unique while numbers, paired with a name, can be unique Without the ability to uniquely identify the subject of a record, the very people we all want to protect will be those who are most harmed by false positive and false negative findings derived from incomplete and inaccurate public records Try it yourself: how would you verify a person s identity or tell two people apart with only names? People we know and credit card fraud, not identity theft, are still the more common sources of danger 5

We Require Accuracy in Identity and Data For Example: Protecting vulnerable populations Enforcing laws Complying with laws Risk management Lending and credit Fairness 6

Laws, Rules, Rights, and Processes Requiring ID/Data Management State public records laws Court records Law enforcement Entrance and exit from the system FCRA Hiring, immigration, and background checks HIPAA Real ID Act DPPA Age restricted products State privacy laws Personnel records Taxpayer privacy Employment discrimination Sexual harassment Workplace rules Management of and access to data facilities and personal data Administration of laws Transportation laws Patriot Act requirements 7

Public Records are Critical to Compliance Court records, financial filings, criminal history, and professional licenses Birth and immigration documents Death Name change Marriage Aliases and businesses Driver s License 8

Authentication Three pillars of proper authentication Something you know Something you own Something you are (biometrics) 9

Authentication Using the proper number, kind, and mix of factors to authorize a person or attribute behaviors is the critical step we are missing Our choice of factors must be tied to the risk inherent in the transaction or attribution New Red Flag rules are a start 10

Consequences How many identities should a person have? Should a person be able to avoid the consequences of their actions by pretending to be someone else or by having duplicate or incomplete records? How can we enforce our laws and society s rules without access to true information and identity security? 11

Cybercriminals Adopt and Adapt Phishing, Malware, Botnets, and Cybercrime As A Service They are faster at adopting tools of attack than we are at adapting our defenses and going on the offensive We desperately need more cybercops and intergovernmental cooperation 12

Machines Loosely Directed by Crooks Criminal money is backing the same kind of investments and services that the legitimate economy backs and it works 70 Million compromised machines (Trend Micro) 100 to 150 Million compromised machines (VintCerf) Over 10,000 botnets become active each day (Symantec) 8 to 9 million compromised machines become active each month (Trend Micro) 13

The Faster Road to Cybertheft Steal account access, not identity Cyber protection rackets and blackmail Hack and attack the source of the money and goods and just steal it from them directly Wholesale crime, not retail 14

Tracking the Cybercrime Market 15

Economic Recovery Re-starting and reforming the credit markets in a responsible fashion cannot occur without accurate and complete public records to guide decisions We all are suffering from bad lending and investment decisions made using current public records, we cannot solve that by using inaccurate public records to make more bad decisions 16

Iowans Depend On the Information Industry Whatever action is taken, your constituents rely on services from the information industry Some accommodation must be found to maintain the flow of accurate public records and hence, the flow of these services 17

Questions? Richard J. H. Varn Coalition for Sensible Public Records Access http://www.cspra.org 18