Mitigating identity theft

March 2006 Products

Identity theft is the new crime of the information age. A criminal collects enough personal data on someone to impersonate a victim to banks, credit card companies, and other financial institutions. Then he racks up debt in the person's name, collects the cash, and disappears. The victim is left holding the bag. While some of the losses are absorbed by financial institutions - credit card companies in particular - the credit-rating damage is borne by the victim. It can take years for the victim to clear his name.

Unfortunately, the solutions being proposed in Congress will not help. To see why, we need to start with the basics. The very term `identity theft' is an oxymoron. Identity is not a possession that can be acquired or lost; it is not a thing at all. Someone's identity is the one thing about a person that cannot be stolen.

The real crime here is fraud; more specifically, impersonation leading to fraud. Impersonation is an ancient crime, but the rise of information-based credentials gives it a modern spin. A criminal impersonates a victim online and steals money from his account. He impersonates a victim in order to deceive financial institutions into granting credit to the criminal in the victim's name. He impersonates a victim to the Post Office and gets the victim's address changed. He impersonates a victim in order to fool the police into arresting the wrong man. No-one's identity is stolen; identity information is being misused to commit fraud.

The crime involves two very separate issues. The first is the privacy of personal data. Personal privacy is important for many reasons, one of which is impersonation and fraud. As more information about us is collected, correlated, and sold, it becomes easier for criminals to get their hands on the data they need to commit fraud. But data privacy is more than just fraud. Whether it is the books we take out of the library, the websites we visit, or the contents of our text messages, most of us have personal data on third-party computers that we do not want made public. The posting of Paris Hilton's phone book on the Internet is a celebrity example of this.

The second issue is the ease with which a criminal can use personal data to commit fraud. It does not take much personal information to apply for a credit card in someone else's name. It does not take much to submit fraudulent bank transactions in someone else's name. It is surprisingly easy to get an identification card in someone else's name. Our current culture, where identity is verified simply and sloppily, makes it easier for a criminal to impersonate his victim.

Proposed fixes tend to concentrate on the first issue - making personal data harder to steal - whereas the real problem is the second. If we are ever going to manage the risks and effects of electronic impersonation, we must concentrate on preventing and detecting fraudulent transactions.

Fraudulent transactions have nothing to do with the legitimate account holders. Criminals impersonate legitimate users to financial institutions. That means that any solution cannot involve the account holders. That leaves only one reasonable answer: financial institutions need to be liable for fraudulent transactions. They need to be liable for sending erroneous information to credit bureaux based on fraudulent transactions.

They cannot claim that the user must keep his password secure or his machine virus free. They cannot require the user to monitor his accounts for fraudulent activity, or his credit reports for fraudulently obtained credit cards. Those are not reasonable requirements for most users. The bank must be made responsible, regardless of what the user does.

If you think this will not work, look at credit cards. In the US, credit card companies are liable for all but the first $50 of fraudulent transactions. They are not hurting for business; and they are not drowning in fraud, either. They have developed and fielded an array of security technologies designed to detect and prevent fraudulent transactions. They have pushed most of the actual costs onto the merchants. And almost no security focuses on trying to authenticate the cardholder.

That is an important lesson. Identity theft solutions focus much too much on authenticating the person. Whether it is two-factor authentication, ID cards, biometrics, or whatever, there is a widespread myth that authenticating the person is the way to prevent these crimes. But once you understand that the problem is fraudulent transactions, you quickly realise that authenticating the person is not the way to proceed.

Again, think about credit cards. Store clerks barely verify signatures when people use cards. People can use credit cards to buy things by mail, phone, or Internet, where no one verifies the signature or even that you have possession of the card. Even worse, no credit card company mandates secure storage requirements for credit cards. They do not demand that cardholders secure their wallets in any particular way. Credit card companies simply do not worry about verifying the cardholder or putting requirements on what he does. They concentrate on verifying the transaction.

This same sort of thinking needs to be applied to other areas where criminals use impersonation to commit fraud. I do not know what the final solutions will look like, but I do know that once financial institutions are liable for losses due to these types of fraud, they will find solutions. Maybe there will be a daily withdrawal limit, like there is on ATMs. Maybe large transactions will be delayed for a period of time, or will require a call-back from the bank or brokerage company. Maybe people will no longer be able to open a credit card account by simply filling out a bunch of information on a form. Likely the solution will be a combination of solutions that reduces fraudulent transactions to a manageable level, but we will never know until the financial institutions have the financial incentive to put them in place.

Right now, the economic incentives result in financial institutions that are so eager to allow transactions - new credit cards, cash transfers, whatever - that they are not paying enough attention to fraudulent transactions. They have pushed the costs for fraud onto the merchants. But if they are liable for losses and damages to legitimate users, they will pay more attention. And they will mitigate the risks. Security can do all sorts of things, once the economic incentives to apply them are there.

By focusing on the fraudulent use of personal data, I do not mean to minimise the harm caused by third-party data and violations of privacy. I believe that the US would be well-served by a comprehensive Data Protection Act like the European Union. However, I do not believe that a law of this type would significantly reduce the risk of fraudulent impersonation. To mitigate that risk, we need to concentrate on detecting and preventing fraudulent transactions. We need to make the entity that is in the best position to mitigate the risk to be responsible for that risk. And that means making the financial institutions liable for fraudulent transactions.

Doing anything less simply will not work.

Bruce Schneier is the founder and CTO of Counterpane Internet Security. He can be contacted at schneier@counterpane.com. To subscribe to a free monthly newsletter providing summaries, analyses, insights and commentaries on security: computer and otherwise, visit http://www.schneier.com/crypto-gram.html





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The era of smart surveillance
September 2019, Forbatt SA , CCTV, Surveillance & Remote Monitoring, Products
Professionals in the surveillance industry know CCTV is not what it used to be. Smart functions on cameras are no longer nice to haves, they have become a necessity.

Read more...
Arteco launches new management platform
September 2019, Arteco Global, Technews Publishing , CCTV, Surveillance & Remote Monitoring, Products
Arteco has released its latest management platform, Omnia, designed to be faster and more responsive to operators? needs.

Read more...
TruVision licence plate cameras
September 2019, UTC Fire & Security SSA , Products, CCTV, Surveillance & Remote Monitoring
TruVision ANPR cameras offer functionality for applications where vehicle access management is required based on licence plate.

Read more...
Edwards Public Address & Voice Alarm System
October 2019 , Security Services & Risk Management, Products
Carrier has added the Public Address & Voice Alarm (PAVA) range to its fire product offerings.

Read more...
Your business needs synchronised security
September 2019 , Cyber Security, Products
This complete security portfolio from Sophos offers endpoint, servers, firewall, Wi-Fi, mobile, email and encryption that is fully scalable to grow as your business does.

Read more...
Sarix Professional Series 3 IP cameras
September 2019, Pelco by Schneider Electric , CCTV, Surveillance & Remote Monitoring, Products
Offered in mini-dome, bullet, box, and wedge configurations, the Sarix Professional (Pro) Series 3 Fixed IP cameras deliver a set of features and performance at affordable price points.

Read more...
The future of connectivity in South Africa
September 2019 , IT infrastructure, Products
Next-generation technologies will drive real transformation in companies. Organisations across all industries must prepare to enter the next phase of the digital future, says Matthew Hall, product director at Rectron.

Read more...
Uniview LPR camera
September 2019 , Products, CCTV, Surveillance & Remote Monitoring
Uniview has released a new LPR (licence plate recognition) camera in South Africa with high capture and recognition rates.

Read more...
Improving access in mines
October 2019, Astra Fasteners , Mining (Industry), Access Control & Identity Management, Products
The VP1 controller provides full access control and remote monitoring of intelligent locks without having to wire into a network or install, manage and maintain software.

Read more...
Fire Beam Xtra covers up to 160 metres
October 2019, Technoswitch , Products, Fire & Safety
The Fire Beam overcomes traditional beam detection challenges where building movement and accessibility made beam detection unreliable and laborious to commission and maintain.

Read more...