SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
THE CHANGING FACE OF IDENTITY THEFT
THE CURRENT AND FUTURE LANDSCAPE

Identity is the unique set of characteristics that define an entity or
individual. Identity theft is the unauthorized use of an individual or
entity’s identity to conduct illicit activity. To study identity theft, we
first look at what constitutes identity:

IDENTITY FOR THE INDIVIDUAL

GOVERNMENT
ISSUED ID

BIOMETRICS

DEVICES

PROFESSIONAL
ID

IDENTITY FOR THE ORGANIZATION

VIRTUAL SELVES

LEGALLY
ESTABLISHED ID

BRAND +
REPUTATION

With all the information being stored online, technology is making
it easier for malicious actors to engage in identity theft and to steal
massive amounts of identity data.

EMPLOYEES

CUSTOMERS

MISSION
CURRENT STATE

Identity Theft 2013
The following statistics illustrate the scope
and cost of identity theft in 2013.

Credit, debit and prepaid cards
worldwide experienced
gross fraud losses of

$

11.27

BILLION in 2012

Identity theft
accounts for
an annual loss
estimated at

$

21billion

in the U.S.

CHILD ID FRAUD

IRS FRAUD

MEDICAL ID FRAUD

1 in 40 households with children
under 18 have experienced child
ID fraud.

The IRS could issue approximately
$26 billion in fraudulent tax
returns resulting from ID theft
between 2013 and 2018.

Nearly 1.8 million Americans are
victims of medical ID theft every
year. This is not only costly but it
also threatens lives.

SMALL BUSINESS
Small business presents a high degree of potential exposure
to identity theft via online means. More than 77% of small and
medium-sized business owners believe their company is safe
from cyber threats, however…

MOTIVES
75% of reported data breach
cases are financially motivated.

$

83%

of small businesses
have no cybersecurity plan.

$

$

!
FUTURE STATE

Identity thieves use technology to keep one step ahead of security experts and law
enforcement. By 2017, identity thieves will reach into every part of our lives and into
institutions and organizations from anywhere in the world. Here is a snapshot of the
emerging trends in identity theft in 2017.

ORGANIZATIONAL

Identity Theft 2017
CORP. PROFILE

REPUTATION

WIRE TRANSFERS

TRANSFER

Through hacking and social engineering, criminals create fraudulent
documents impersonating real companies and transfer money. Wire
transfers are worth tens or hundreds of thousands of dollars and are
a growing target for criminals.

PHISHING

Phishing attacks target institutions to access data or impersonate
the organization for social/political causes. These attacks harm
organizations’ credibility and impact their mission and are
increasingly launched by anarchist or national criminal groups.

MOTIVATION:

SOCIO-POLITICAL
TARGET:

ORGANIZATIONAL

Spear phishing allows thieves to masquerade
as a company or organization for financial
gain. Hundreds of thousands of phishing
attacks are sent each day and tens of
thousands of people reply.
W-2

DISRUPTION
Hackers attack websites, internal information and
security systems in order to disrupt or cripple
organizations and businesses. Attacks become more
widespread shutting down entire businesses,
industries or locations for longer periods.

BR
AN
D
NE

TERRORISM
Identity theft provides hundreds of
potential terrorists entry into the
United States. Fake identities or
fraudulent account numbers are used
by terror networks to launder money
or to finance their operations.

C
IT
EG
L

SOCIO-POLITICAL

T
RE

IR

EM

T
EN

SU

S
FO

SC

TARGETING
VULNERABLE GROUPS

K
AN
B

O

UN

DA
TI

RA

NC

HO
ON

SP

IT

AL

NK
BA

OL

$

$

MO

BI

LE

PH

ON

A single medical insurance card is worth
40 times more than a Social Security
card on the black market. Health care
cooperatives have become a prime
target for identity thieves. Erroneous
information increasingly shows up on
medical records leading to serious
health risks, even death.

Bank account numbers remain one of
the biggest targets for criminals and
organized crime. Large-scale theft of
millions of account numbers and online
transactions become commonplace
across borders where criminals can
evade law enforcement.

ES

MOBILE ID
Mobile devices are the primary means
of identification. The devices include
fingerprint information, bank and
payment accounts, airplane tickets,
pins and passwords. The depository of
information becomes an irresistible
target for identity thieves.

SOCIAL MEDIA ATTACKS

35 4

DOCUMENT THEFT
Thieves use stolen documents, including passports and
driver’s licenses, for illegal purposes including entry into
the United States. RFID chips on some passports become a
target giving thieves more information on victims and more
credibility in forging new documents.

INDIVIDUAL

INDIVIDUAL

TAX REFUNDS

BANK ACCOUNTS
M
AT

Thieves impersonate people on social media,
harming their reputation by taking over or
creating false social media pages and posting
pictures or other defamatory information.

TARGET:

ORGANIZATIONAL

MEDICAL FRAUD
E

PROFILE

SOCIO-POLITICAL

TARGET:

FINANCIAL
HO

Criminal groups increasingly target
children, the elderly and other
vulnerable groups. Online gaming
sites for kids have become a prime
target for identity thieves.

MOTIVATION:

FINANCIAL

With just a name, address and Social
Security Number, organized crime
groups file millions of fraudulent tax
returns early to obtain refunds before
individuals file their genuine returns.
IN

W

MOTIVATION:

18

65
12 3 8 0
0

DOCUMENTS
and IDENTIFICATION
Thieves, especially organized gangs, steal
documents, mail, account numbers and
payments from individuals for fraudulent
use and financial gain. Securing
communications becomes urgent.

MOTIVATION:

FINANCIAL
TARGET:

INDIVIDUAL
Our Recommendations
EDUCATION

GOVERNANCE

INCENTIVES

Design and implement a
public education campaign
leveraging schools, online
users and companies.

Designate a single agency
and dedicate a single
database for incident
reporting and measurement.

Increase funds for law
enforcement to pursue identity
theft by adding manpower,
resources and training.

Design and implement incentives
for public and private compliance
with best practices in identity
security and privacy standards.

SECURE YOUR
IDENTITY

4

RANKED #1 IN
ID PROTECTION

1

LAW ENFORCEMENT

ID 101

LEGAL /
LEGISLATIVE
Adopt strict privacy
regulations to better
protect people and entities
in virtual and physical
environments.

A

B

C
1 2 3
4 5 6
7 8 9
0

PROTECTION
Regularly revisit a
globally-accepted legal
definition of identity theft
to encompass evolving
perspectives.

Strengthen existing
legislation and increase
penalties for identity
theft domestically and
internationally. Evaluate
annually to keep pace
with criminals.

TECHNICAL

Encourage individual and
institutional online
identities to obfuscate the
location, source or one’s
identification through
employing multiple virtual
identities and/or proxies –
rendering the act of
identity theft increasingly
difficult and complex.

Adopt a multifactor ID
system for transactions and
documents of significance.
2013 Identity Theft and
Nexus to Illicit Activity Team
Chris Sailer

Jason Kerben

Edward T. Lanoue

Brett Yellen

HSBC Bank
ed.t.lanoue@us.hsbc.com

Department of Homeland Security
brett.yellen@hq.dhs.gov

Karen Lissy

John D. King

Bill & Melinda Gates Foundation
chris.sailer@gatesfoundation.org

RTI International
klissy@rti.org

Jason Thomas

Thomson Reuters
jason.thomas@trssllc.com

Office of the Director
of National Intelligence
jasonk@dni.gov

Department of the Army
National Ground Intelligence Center
john.d.king50.civ@mail.mil

Jynika Craig

Federal Bureau of Investigation
jynika.craig@ic.fbi.gov

Kristin Schwomeyer

WellPoint
kristin.schwomeyer@wellpoint.com

Acknowledgments
We extend our grateful appreciation to the following individuals and organizations for generously sharing their expertise and opinions:
Stephen Coggeshall (ID Analytics), Chuck Cohen (Indiana State Police), Marc Goodman (Singularity University), Donald Rebovich (Utica
College), Jonathan Rusch (US Department of Justice), Department of Homeland Security-Homeland Security Investigations, Microsoft,
Nike, Seattle Police Department, Social Security Administration-Office of the Inspector General, T-Mobile, and US Secret Service.

©XPLANE 2013
©X

Published November 2013

Weitere ähnliche Inhalte

Was ist angesagt?

Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBakerTillyConsulting
 
Identity theft
Identity theftIdentity theft
Identity theftSARASWATHI S
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS- Mark - Fullbright
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonSARON MESSEMBE OBIA
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingat MicroFocus Italy âť–âś”
 
Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationGreater Cleveland PC Users Group
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentationcharlesgarrett
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftExperian_US
 
Cybercriminality
CybercriminalityCybercriminality
CybercriminalityChantal Abam
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce JenVidaB
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention- Mark - Fullbright
 

Was ist angesagt? (18)

IT Sample Paper
IT Sample PaperIT Sample Paper
IT Sample Paper
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Identity theft
Identity theftIdentity theft
Identity theft
 
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERSPREVENTING IDENTITY THEFT:  A GUIDE for CONSUMERS
PREVENTING IDENTITY THEFT: A GUIDE for CONSUMERS
 
Child Identity Theft
Child Identity TheftChild Identity Theft
Child Identity Theft
 
Corporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theftCorporate role in protecting consumers from the risk of identity theft
Corporate role in protecting consumers from the risk of identity theft
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
Online Scams and Frauds
Online Scams and FraudsOnline Scams and Frauds
Online Scams and Frauds
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Ira Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft PresentationIra Wilsker's January 2014 Identity Theft Presentation
Ira Wilsker's January 2014 Identity Theft Presentation
 
Identity Theft Presentation
Identity Theft PresentationIdentity Theft Presentation
Identity Theft Presentation
 
ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS ELECTRONIC FRAUD TACTICS
ELECTRONIC FRAUD TACTICS
 
ASIS Phoenix February Presentation
ASIS Phoenix February PresentationASIS Phoenix February Presentation
ASIS Phoenix February Presentation
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
How to Protect Yourself From Identity Theft
How to Protect Yourself From Identity TheftHow to Protect Yourself From Identity Theft
How to Protect Yourself From Identity Theft
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
Chapter 17 a fraud in e commerce Jen
Chapter 17 a  fraud in e commerce JenChapter 17 a  fraud in e commerce Jen
Chapter 17 a fraud in e commerce Jen
 
Identity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime PreventionIdentity Theft and Strategies for Crime Prevention
Identity Theft and Strategies for Crime Prevention
 

Ă„hnlich wie The Changing Face of Identity Theft: Current and Future Trends

A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftMartha Brown
 
IST Presentation
IST PresentationIST Presentation
IST Presentationguest1d1ed5
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious CrimeTanzim Rizwan
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaTracy Morgan
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of HackingDaniel Ross
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pdjeelsonani003567
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are LurkingCharlie Lewis M.S.
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...ArielMcCurdy
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentDonald E. Hester
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 

Ă„hnlich wie The Changing Face of Identity Theft: Current and Future Trends (15)

A Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity TheftA Contextual Framework For Combating Identity Theft
A Contextual Framework For Combating Identity Theft
 
IST Presentation
IST PresentationIST Presentation
IST Presentation
 
Identity Theft : A Serious Crime
Identity Theft : A Serious CrimeIdentity Theft : A Serious Crime
Identity Theft : A Serious Crime
 
An Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South AfricaAn Exploratory Study On Causes Of Identity Document Theft In South Africa
An Exploratory Study On Causes Of Identity Document Theft In South Africa
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd12002040701065 SEMINAR this is ppt in pd
12002040701065 SEMINAR this is ppt in pd
 
Cybercrime blog
Cybercrime blogCybercrime blog
Cybercrime blog
 
Cybercriminals Are Lurking
Cybercriminals Are LurkingCybercriminals Are Lurking
Cybercriminals Are Lurking
 
What is cyber fraud?
What is cyber fraud?What is cyber fraud?
What is cyber fraud?
 
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 Business Fraud and Cybersecurity Best Practices in the Office or While Worki... Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
Business Fraud and Cybersecurity Best Practices in the Office or While Worki...
 
CSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local GovernmentCSMFO 2012 Data Privacy in Local Government
CSMFO 2012 Data Privacy in Local Government
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 

Mehr von - Mark - Fullbright

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report- Mark - Fullbright
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020- Mark - Fullbright
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019- Mark - Fullbright
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019- Mark - Fullbright
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...- Mark - Fullbright
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)- Mark - Fullbright
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 - Mark - Fullbright
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft- Mark - Fullbright
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017- Mark - Fullbright
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business- Mark - Fullbright
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business- Mark - Fullbright
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report- Mark - Fullbright
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016- Mark - Fullbright
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015- Mark - Fullbright
 

Mehr von - Mark - Fullbright (20)

ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
IC3 2019 Internet Crime Report
IC3 2019 Internet Crime ReportIC3 2019 Internet Crime Report
IC3 2019 Internet Crime Report
 
Police, Protesters, Press, 2020
Police, Protesters, Press, 2020Police, Protesters, Press, 2020
Police, Protesters, Press, 2020
 
2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)2020 Data Breach Investigations Report (DBIR)
2020 Data Breach Investigations Report (DBIR)
 
FCPA Guidance 2020
FCPA Guidance 2020FCPA Guidance 2020
FCPA Guidance 2020
 
Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019Consumer Sentinel Network Data Book 2019
Consumer Sentinel Network Data Book 2019
 
CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019CFPB Consumer Reporting Companies 2019
CFPB Consumer Reporting Companies 2019
 
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
Advisory to Financial Institutions on Illicit Financial Schemes and Methods R...
 
2018 IC3 Report
2018 IC3 Report2018 IC3 Report
2018 IC3 Report
 
2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)2019 Data Breach Investigations Report (DBIR)
2019 Data Breach Investigations Report (DBIR)
 
2018 Privacy & Data Security Report
2018 Privacy & Data Security Report2018 Privacy & Data Security Report
2018 Privacy & Data Security Report
 
Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018 Consumer Sentinel Network Data Book 2018
Consumer Sentinel Network Data Book 2018
 
Credit Score Explainer
Credit Score ExplainerCredit Score Explainer
Credit Score Explainer
 
The Geography of Medical Identity Theft
The Geography of Medical Identity TheftThe Geography of Medical Identity Theft
The Geography of Medical Identity Theft
 
Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017Consumer Sentinel Data Book 2017
Consumer Sentinel Data Book 2017
 
Protecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for BusinessProtecting Personal Information: A Guide for Business
Protecting Personal Information: A Guide for Business
 
Data Breach Response: A Guide for Business
Data Breach Response: A Guide for BusinessData Breach Response: A Guide for Business
Data Breach Response: A Guide for Business
 
2017 Data Breach Investigations Report
2017 Data Breach Investigations Report2017 Data Breach Investigations Report
2017 Data Breach Investigations Report
 
Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016Consumer Sentinel Network Data Book for January 2016 - December 2016
Consumer Sentinel Network Data Book for January 2016 - December 2016
 
Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015Consumer Sentinel Data Book 2015
Consumer Sentinel Data Book 2015
 

KĂĽrzlich hochgeladen

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel AraĂşjo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

KĂĽrzlich hochgeladen (20)

FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

The Changing Face of Identity Theft: Current and Future Trends

  • 1. THE CHANGING FACE OF IDENTITY THEFT THE CURRENT AND FUTURE LANDSCAPE Identity is the unique set of characteristics that define an entity or individual. Identity theft is the unauthorized use of an individual or entity’s identity to conduct illicit activity. To study identity theft, we first look at what constitutes identity: IDENTITY FOR THE INDIVIDUAL GOVERNMENT ISSUED ID BIOMETRICS DEVICES PROFESSIONAL ID IDENTITY FOR THE ORGANIZATION VIRTUAL SELVES LEGALLY ESTABLISHED ID BRAND + REPUTATION With all the information being stored online, technology is making it easier for malicious actors to engage in identity theft and to steal massive amounts of identity data. EMPLOYEES CUSTOMERS MISSION
  • 2. CURRENT STATE Identity Theft 2013 The following statistics illustrate the scope and cost of identity theft in 2013. Credit, debit and prepaid cards worldwide experienced gross fraud losses of $ 11.27 BILLION in 2012 Identity theft accounts for an annual loss estimated at $ 21billion in the U.S. CHILD ID FRAUD IRS FRAUD MEDICAL ID FRAUD 1 in 40 households with children under 18 have experienced child ID fraud. The IRS could issue approximately $26 billion in fraudulent tax returns resulting from ID theft between 2013 and 2018. Nearly 1.8 million Americans are victims of medical ID theft every year. This is not only costly but it also threatens lives. SMALL BUSINESS Small business presents a high degree of potential exposure to identity theft via online means. More than 77% of small and medium-sized business owners believe their company is safe from cyber threats, however… MOTIVES 75% of reported data breach cases are financially motivated. $ 83% of small businesses have no cybersecurity plan. $ $ !
  • 3. FUTURE STATE Identity thieves use technology to keep one step ahead of security experts and law enforcement. By 2017, identity thieves will reach into every part of our lives and into institutions and organizations from anywhere in the world. Here is a snapshot of the emerging trends in identity theft in 2017. ORGANIZATIONAL Identity Theft 2017 CORP. PROFILE REPUTATION WIRE TRANSFERS TRANSFER Through hacking and social engineering, criminals create fraudulent documents impersonating real companies and transfer money. Wire transfers are worth tens or hundreds of thousands of dollars and are a growing target for criminals. PHISHING Phishing attacks target institutions to access data or impersonate the organization for social/political causes. These attacks harm organizations’ credibility and impact their mission and are increasingly launched by anarchist or national criminal groups. MOTIVATION: SOCIO-POLITICAL TARGET: ORGANIZATIONAL Spear phishing allows thieves to masquerade as a company or organization for financial gain. Hundreds of thousands of phishing attacks are sent each day and tens of thousands of people reply. W-2 DISRUPTION Hackers attack websites, internal information and security systems in order to disrupt or cripple organizations and businesses. Attacks become more widespread shutting down entire businesses, industries or locations for longer periods. BR AN D NE TERRORISM Identity theft provides hundreds of potential terrorists entry into the United States. Fake identities or fraudulent account numbers are used by terror networks to launder money or to finance their operations. C IT EG L SOCIO-POLITICAL T RE IR EM T EN SU S FO SC TARGETING VULNERABLE GROUPS K AN B O UN DA TI RA NC HO ON SP IT AL NK BA OL $ $ MO BI LE PH ON A single medical insurance card is worth 40 times more than a Social Security card on the black market. Health care cooperatives have become a prime target for identity thieves. Erroneous information increasingly shows up on medical records leading to serious health risks, even death. Bank account numbers remain one of the biggest targets for criminals and organized crime. Large-scale theft of millions of account numbers and online transactions become commonplace across borders where criminals can evade law enforcement. ES MOBILE ID Mobile devices are the primary means of identification. The devices include fingerprint information, bank and payment accounts, airplane tickets, pins and passwords. The depository of information becomes an irresistible target for identity thieves. SOCIAL MEDIA ATTACKS 35 4 DOCUMENT THEFT Thieves use stolen documents, including passports and driver’s licenses, for illegal purposes including entry into the United States. RFID chips on some passports become a target giving thieves more information on victims and more credibility in forging new documents. INDIVIDUAL INDIVIDUAL TAX REFUNDS BANK ACCOUNTS M AT Thieves impersonate people on social media, harming their reputation by taking over or creating false social media pages and posting pictures or other defamatory information. TARGET: ORGANIZATIONAL MEDICAL FRAUD E PROFILE SOCIO-POLITICAL TARGET: FINANCIAL HO Criminal groups increasingly target children, the elderly and other vulnerable groups. Online gaming sites for kids have become a prime target for identity thieves. MOTIVATION: FINANCIAL With just a name, address and Social Security Number, organized crime groups file millions of fraudulent tax returns early to obtain refunds before individuals file their genuine returns. IN W MOTIVATION: 18 65 12 3 8 0 0 DOCUMENTS and IDENTIFICATION Thieves, especially organized gangs, steal documents, mail, account numbers and payments from individuals for fraudulent use and financial gain. Securing communications becomes urgent. MOTIVATION: FINANCIAL TARGET: INDIVIDUAL
  • 4. Our Recommendations EDUCATION GOVERNANCE INCENTIVES Design and implement a public education campaign leveraging schools, online users and companies. Designate a single agency and dedicate a single database for incident reporting and measurement. Increase funds for law enforcement to pursue identity theft by adding manpower, resources and training. Design and implement incentives for public and private compliance with best practices in identity security and privacy standards. SECURE YOUR IDENTITY 4 RANKED #1 IN ID PROTECTION 1 LAW ENFORCEMENT ID 101 LEGAL / LEGISLATIVE Adopt strict privacy regulations to better protect people and entities in virtual and physical environments. A B C 1 2 3 4 5 6 7 8 9 0 PROTECTION Regularly revisit a globally-accepted legal definition of identity theft to encompass evolving perspectives. Strengthen existing legislation and increase penalties for identity theft domestically and internationally. Evaluate annually to keep pace with criminals. TECHNICAL Encourage individual and institutional online identities to obfuscate the location, source or one’s identification through employing multiple virtual identities and/or proxies – rendering the act of identity theft increasingly difficult and complex. Adopt a multifactor ID system for transactions and documents of significance.
  • 5. 2013 Identity Theft and Nexus to Illicit Activity Team Chris Sailer Jason Kerben Edward T. Lanoue Brett Yellen HSBC Bank ed.t.lanoue@us.hsbc.com Department of Homeland Security brett.yellen@hq.dhs.gov Karen Lissy John D. King Bill & Melinda Gates Foundation chris.sailer@gatesfoundation.org RTI International klissy@rti.org Jason Thomas Thomson Reuters jason.thomas@trssllc.com Office of the Director of National Intelligence jasonk@dni.gov Department of the Army National Ground Intelligence Center john.d.king50.civ@mail.mil Jynika Craig Federal Bureau of Investigation jynika.craig@ic.fbi.gov Kristin Schwomeyer WellPoint kristin.schwomeyer@wellpoint.com Acknowledgments We extend our grateful appreciation to the following individuals and organizations for generously sharing their expertise and opinions: Stephen Coggeshall (ID Analytics), Chuck Cohen (Indiana State Police), Marc Goodman (Singularity University), Donald Rebovich (Utica College), Jonathan Rusch (US Department of Justice), Department of Homeland Security-Homeland Security Investigations, Microsoft, Nike, Seattle Police Department, Social Security Administration-Office of the Inspector General, T-Mobile, and US Secret Service. ©XPLANE 2013 ©X Published November 2013