Identity Theft Protection

Vertical Available, Demo Only

Identity Theft Protection

Identity theft is the deliberate use of someone else’s identity, usually as a method to gain a financial advantage or obtain credit and other benefits in the other person’s name,[1][2] and perhaps to the other person’s disadvantage or loss. The person whose identity has been assumed may suffer adverse consequences if they are held responsible for the perpetrator’s actions. Identity theft occurs when someone uses another’s personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.

The term identity theft was coined in 1964.[3]

“Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained,” and identity theft is not always detectable by the individual victims, according to a report done for the FTC.[4] Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A US Government Accountability Office study determined that “most breaches have not resulted in detected incidents of identity theft”.[5]The report also warned that “the full extent is unknown”. A later unpublished study by Carnegie Mellon University noted that “Most often, the causes of identity theft is not known,” but reported that someone else concluded that “the probability of becoming a victim to identity theft as a result of a data breach is … around only 2%”.[6] More recently, an association of consumer data companies noted that one of the largest data breaches ever, accounting for over four million records, resulted in only about 1,800 instances of identity theft, according to the company whose systems were breached.[7]

An October 2010 article entitled “Cyber Crime Made Easy” explained the level to which hackers are using malicious software. As one security specialist named Gunter Ollmann said, “Interested in credit card theft? There’s an app for that.” This statement summed up the ease with which these hackers are accessing all kinds of information online. The new program for infecting users’ computers is called Zeus; and the program is so hacker friendly that even an inexperienced hacker can operate it. Although the hacking program is easy to use, that fact does not diminish the devastating effects that Zeus (or other software like Zeus) can do to a computer and the user. For example, the article stated that programs like Zeus can steal credit card information, important documents, and even documents necessary for homeland security. If the hacker were to gain this information, it would mean identity theft or even a possible terrorist attack.[8]

Individual identity protection

The acquisition of personal identifiers is made possible through serious breaches of privacy. For consumers, this is usually a result of them naively providing their personal information or login credentials to the identity thieves as a result of being duped but identity-related documents such as credit cards, bank statements, utility bills, checkbooks etc. may also be physically stolen from vehicles, homes, offices, and not the least letter boxes, or directly from victims by pickpockets and bag snatchers. Guardianship of personal identifiers by consumers is the most common intervention strategy recommended by the US Federal Trade Commission, Canadian Phone Busters and most sites that address identity theft. Such organizations offer recommendations on how individuals can prevent their information falling into the wrong hands.

Identity theft can be partially mitigated by not identifying oneself unnecessarily (a form of information security control known as risk avoidance). This implies that organizations, IT systems and procedures should not demand excessive amounts of personal information or credentials for identification and authentication. Requiring, storing and processing personal identifiers (such as Social Security number, national identification number, driver’s license number, credit card number, etc.) increases the risks of identity theft unless this valuable personal information is adequately secured at all times. Committing personal identifiers to memory is a sound practice that can reduce the risks of a would-be identity thief from obtaining these records. To help in remembering numbers such as social security numbers and credit card numbers, it is helpful to consider using mnemonic techniques or memory aids such as the mnemonic Major System.

Identity thieves sometimes impersonate dead people, using personal information obtained from death notices, gravestones and other sources to exploit delays between the death and the closure of the person’s accounts, the inattentiveness of grieving families and weaknesses in the processes for credit-checking. Such crimes may continue for some time until the deceased’s families or the authorities notice and react to anomalies.[20]

In recent years, commercial identity theft protection/insurance services have become available in many countries. These services purport to help protect the individual from identity theft or help detect that identity theft has occurred in exchange for a monthly or annual membership fee or premium.[21] The services typically work either by setting fraud alerts on the individual’s credit files with the three major credit bureaus or by setting up credit report monitoring with the credit bureaux. While identity theft protection/insurance services have been heavily marketed, their value has been called into question.[22]

Identity protection by organizations

In their May 1998 testimony before the United States Senate, the Federal Trade Commission (FTC) discussed the sale of Social Security numbers and other personal identifiers by credit-raters and data miners. The FTC agreed to the industry’s self-regulating principles restricting access to information on credit reports.[23] According to the industry, the restrictions vary according to the category of customer. Credit reporting agencies gather and disclose personal and credit information to a wide business client base.

Poor stewardship of personal data by organizations, resulting in unauthorized access to sensitive data, can expose individuals to the risk of identity theft. The Privacy Rights Clearinghouse has documented over 900 individual data breaches by US companies and government agencies since January 2005, which together have involved over 200 million total records containing sensitive personal information, many containing social security numbers.[24] Poor corporate diligence standards which can result in data breaches include:

  • failure to shred confidential information before throwing it into dumpsters
  • failure to ensure adequate network security
  • credit card numbers stolen by call center agents and people with access to call recordings
  • the theft of laptop computers or portable media being carried off-site containing vast amounts of personal information. The use of strong encryption on these devices can reduce the chance of data being misused should a criminal obtain them.
  • the brokerage of personal information to other businesses without ensuring that the purchaser maintains adequate security controls
  • Failure of governments, when registering sole proprietorships, partnerships, and corporations, to determine if the officers listed in the Articles of Incorporation are who they say they are. This potentially allows criminals access to personal information through credit rating and data mining services.

The failure of corporate or government organizations to protect consumer privacy, client confidentiality and political privacy has been criticized for facilitating the acquisition of personal identifiers by criminals.[25]

Using various types of biometric information, such as fingerprints, for identification and authentication has been cited as a way to thwart identity thieves, however there are technological limitations and privacy concerns associated with these methods as well.

Statesboro

Statesboro is the largest city and county seat of Bulloch CountyGeorgia, United States,[5] located in Southeast Georgia. A college town, Statesboro is best known as the home of Georgia Southern University, a Carnegie Doctoral-Research University.

As of 2015, the Statesboro Micropolitan Statistical Area, which consists of Bulloch County, had an estimated population of 72,651.[6] The City itself had a population of 28,422 in the 2010 census.[7] The City had an estimated 2015 population of 30,721.[8]

The city was chartered in 1803, starting as a small trading community providing the basic essentials for surrounding cotton plantations. This drove the economy through the 19th century, both before and after the American Civil War.

In 1906, Statesboro and area leaders joined together to bid for and win the First District A&M School, a land grant college that eventually developed as Georgia Southern University in 1990. In 1908, Statesboro sold more cotton bales than did Savannah, Georgia, but the boll weevil infestation of the 1930s required a shift to tobacco as a crop. Statesboro inspired the blues song “Statesboro Blues“, written by Blind Willie McTell in the 1920s, and covered in a well-known version by The Allman Brothers Band.[9]

In 1801, George Sibbald of Augusta donated a 9,301-acre (37.64 km2) tract for a centrally located county seat for the growing agricultural community of Bulloch County. The area was developed by white planters largely for cotton plantations, worked by slave labor. In December 1803, the Georgia legislature created the town of Statesborough. In 1866 the state legislature granted a permanent charter to the city, changing the spelling of its name to the present “Statesboro.”

During the Civil War and General William T. Sherman’s famous March to the Sea through Georgia, a Union officer asked a saloon proprietor for directions to Statesboro. The proprietor replied, “You are standing in the middle of town,” indicating its small size. The soldiers destroyed the courthouse, a crude log structure that doubled as a barn when court was not in session. After the Civil War, the small town began to grow, and Statesboro has developed as a major town in southeastern Georgia. Many freedmen stayed in the area, working on plantations as sharecroppers and tenant farmers.