Identify This! Creating a system that stops identity theft and

advertisement
Identify This!
Creating a system that stops identity theft and increases privacy
Charles Baakel
5/13/2007
CS199r Final Paper
Identify This! – C. Baakel
The growth of the Internet and computer technology has led to a growth of new
opportunities, both good and bad. Identity theft, in particular, has become America’s fastest
growing crime.1 For example, Sean Hoar, the Assistant United States Attorney calls identity theft
“The crime of the new millennium.”2 While the methods of identity theft have grown rapidly, the
methods of prevention and recovery have not. Today, once one’s identity is stolen it is a very
long and public path to recovery. Every business and agency that one has had contact with has to
be notified that one’s identity has been stolen, so that no new fraudulent actions are made. This is
a very humiliating and public process. The question I plan to address in this paper is: Why are
the current identity theft recovery measures so slow and poor at maintaining one’s privacy, and
what new systems could be developed, where recovery is more rapid and private? I contend that
there is a solution that can fix the problem of identity theft recovery and privacy.
The Identity Theft Resource Center defines identity theft as “a crime in which an
imposter obtains key pieces of personal identifying information (PII) such as Social Security
numbers and driver’s license numbers and uses them for their own personal gain.3 The crime is
very difficult to manage under our current system because one’s PII can be obtained in a number
of different ways, and exploited for gain in more.
There are two main reasons why identity theft research data is difficult to obtain. First,
many victims of identity theft are not aware of the problem until months after their information
has been stolen and exploited. Second, during the process of recovery, it is not clearly known
whether or not one has completely recovered from identity theft until fraudulent accounts and
charges have stopped. Insurance agencies, banks and other organizations have completed studies
on identity theft, but the data is not the most reliable, and the sample groups are not always the
most representative.
Nationwide Mutual Insurance Co. conducted a survey on identity theft victims and found
some rather disheartening results. 28% of the victims could not reconstruct their identities within
one year. It took an average of 5.5 months for a victim to realize their identity has been
compromised. The average victim lost nearly $4,000 due to fraudulent charges, and 16% were
still forced to pay for them. Meanwhile, only 17% were notified by their financial institution or
creditor that suspicious activity was occurring on their accounts.4
Currently, the process of recovering requires a great deal of persistence by the victim.
The Nationwide study notes that victims spent an average of 81 hours attempting to recover,
though some never do. The Federal Trade Commission recommends these steps when one is
aware that his/her identity has been stolen:
1) Place a fraud alert on your credit reports and review your credit reports
2) Close the accounts that you know or believe, have been tampered with or opened
fraudulently
3) File a complaint with the Federal Trade Commission
4) File a report with your local police or the police in the community where the identity
theft took place5
1
“Identity Theft” http://www.usps.com/postalinspectors/idthft_ncpw.htm. Accessed 5/10/2007.
Hoar, S., “Identity Theft: The Crime of the New Millennium” United States Attorneys’ USA Bulletin
March 2001 Vol. 49, No.2.
3
“Identity Theft Resource Center: A Nonprofit Organization” http://www.idtheftcenter.org/ Accessed 5/9/2007.
4
TechWeb Technology News, “One in Four Identity Theft Victims Never Fully Recover”
http://www.techweb.com/wire/security/166402606. Created 7/26/2005. Accessed 5/1/2007
5
“DEFEND: Recover from Identity Theft” http://www.ftc.gov/bcp/edu/microsites/idtheft/consumers/defend.html.
Accessed 4/25/2007.
2
2
Identify This! – C. Baakel
Let’s evaluate these measures more closely. The four steps require the victim to contact
at least 6 entities: the 3 credit bureaus, the account that has fraudulent activity, the FTC, and the
police. The list does not include ChoicePoint, a private entity that is also used to obtain identity
information about individuals. Contacting the 3 credit bureaus includes placing an extended
fraud alert on one’s credit report, which will be visible to anyone who checks your report. It is
debatable as to whether or not this is a good thing. Maybe a person is careless if they had their
identity stolen. But very few, if any other victims of crimes have a visible record of the offense
on something like a credit report.
By contacting the FTC and the local police one obtains an FTC ID Theft Complaint and
an Identity Theft Report, respectively. These documents allow a victim to place a seven year
fraud alert on one’s credit report. This part of the process is not as easy as it may seem. The
Nationwide study finds that 40 percent of victims list “the police, their financial institution, or
their credit card issuer as the most difficult to work with when trying to solve the problem.” In
addition, a survey respondent is quoted as saying that “The institution we do all of our banking
with made us feel like we were the ones trying to pull something.”6 In extreme cases the Social
Security Administration will give a victim a new Social Security number, but this is usually only
after all options have been tried and fraudulent accounts have continued to be made for years.
It is clear that the process for recovering from identity theft is neither quick nor private,
but why is this so? A simple diagram can explain the current system of identification (Figure 1).
If a credit card issuer, an employer or any other entity wants to know if John Doe exists, and who
he is, they can contact the three credit bureaus, or ChoicePoint. These agencies create a profile of
Mr. Doe based on his interactions with other agencies, which then share this information. In the
end, there is You, a Social Security number and a date of birth. Those two numbers are the most
reliable because they are the only identifiers that do not change, as name, address, and even
gender can be modified. Date of birth is not a reliable identifier, since birthdays are celebrated
and often publicized. This leaves the Social Security number as the best identifier under our
current system.
The Social Security number was first distributed in 1936 for the purpose of giving out
government benefits. Over time, other federal and state governmental uses have been applied,
including the Internal Revenue Service in the 1960’s and for driver’s license registration in 1976.
In addition, the military also gained access to use the number, as well as employers who needed
the number for employee benefits. Currently, a variety of entities use the SSN as their “secure”
identifier, including hospitals, financial institutions, and universities.7 What can be seen from this
is that a number that was originally developed for one agency for the purpose of benefit
allocation has now developed into the universal citizen identifier of the United States.
Organizations had other options that could have been pursued, like creating a number for their
specific industry, or seeking out the government to provide an alternate solution, but now so
many systems use the identifier that it is not only a part of one’s existence, it is one’s existence.
There are approximately 250 million social security numbers active today. It is now
commonplace for an SSN to be assigned at birth, leading one to assume that every U.S. citizen’s
SSN the one identifier that is unique.8 This is not the case, as there are duplicate SSNs that have
6
TechWeb Technology News, 2005.
Kouri, J. “Social Security Cards: De Facto National Identification” American Chronicle, 11/29/2005
8
Hammond, W. E. “The Use of the Social Security Number as the Basis for a National Citizen Identifier” National
Information Infrastructure White Papers
7
3
Identify This! – C. Baakel
been distributed, as well as errors in the distribution of the number leading some to believe their
SSN was one listed in the promotional material.
Despite all these problems with the use and development of the SSN, the number still
could be used as a UCI, though clearly this is not the intention of the number. The number is
fixed, and not made to be something very anonymous, as there are predetermined values as a part
of the number. The first three digits of the SSN are based on location, and the next two are given
in alternative but known serial order. The variance occurs during the last four digits, but some
entities place only that part on documentation.9 A bad usage of the SSN is that many universities
use the SSN as the student ID number, leaving open the possibility that the student can be
handing over her SSN every time she logs into her campus portal. A possible good use of the
SSN is for medical records.
Solution
The system I propose will aid significantly in helping to: decrease identity theft, improve
identity theft recovery time, and increase the control of privacy on the behalf of the individual.
These changes will leverage existing infrastructure and work to expand capabilities in others.
The resulting system will require adjustments, but can satisfy the goals described much better
than the current system. For the purpose of this paper the system will be called WISE.
The primary tenets of WISE are:
1) The individual controls his/her data.
2) The individual is responsible for his/her data.
3) The individual cares about his/her data.
WISE functions as an organizational firewall to individual information. In the initial
model, entities in the “cloud”, the outermost region, went to other businesses in the second ring
to know about YOU. This required individuals to keep track of at least four different databases,
with little control over how the information is collected and used.
In WISE, there is one entity and the user always controls how the data is spread. In the
current system, access to one’s account information is similar to an opt-out process. Once a
credit card issuer receives an application, they check the credit report and proceed onward.
Under WISE, the credit card issuer will receive the application, but will not be able to check
records until there is a confirmation made.
It would be assumed that this process would be very cumbersome, expensive, and would
slow the process, but there is a solution for this: PreConfirm. PreConfirm would be the process
by which an individual can grant access to one’s financial data before the inquiry arrives. This
could be completed through a secure web page form or a telephone interview. The web form, in
particular, would be automatic and require less manpower. The phone system would require an
extensive list of answers to questions that WISE and the individual know, similar to the sign up
process for ChoicePoint. If a third party makes an inquiry, PreConfirm is not used, and the
individual wants her data released, there will be a very significant fee. Otherwise, the user
declines at no charge. This assumes that the individual will have up to date contact information
available. This responsibility is placed on the individual. When an individual changes her
address, by law one has to notify the Department of Motor Vehicles for their state. The same
policy would be used under WISE.
Because of the use of the WISE system, there will be little need for and individual to
provide their SSN to any entities. For example, the credit card issuer will only need a name and
9
“The SSN Numbering Scheme” http://www.ssa.gov/history/ssn/geocard.html. Accessed 5/5/2007
4
Identify This! – C. Baakel
address to send an inquiry to WISE, it is highly unlikely that anyone will have two of the same
name at a given address. WISE can track individuals internally by SSN or an internal code.
The concept of identity theft is different under WISE. While the ability to steal credit
card information is unchanged, the ability to create new accounts will be significantly hindered.
For an individual to have their identity stolen under WISE, one of two things have to happen: An
individual’s web login information and security questions (at lest 3 each login, should have about
8 on file) have to be compromised, or an individual’s phone PIN, and security questions have
been compromised. Phishing is still a legitimate threat, but this is an area where educating WISE
usage comes in.10 Web browsers and search engines like Google are helping in the fight against
phishing, and for the time being WISE will rely on their aid.11
Under this more secure system, when one’s identity is stolen there it is much more
severe, because a great deal of personal information must be known. The security questions will
be more diverse than “Mother’s Maiden Name”, and the individual should also create some of
the questions. Recovery would require two entities to be contacted: WISE and the police. The
FTC will play a role in WISE, and therefore will not need to be contacted by the individual. The
individual will be required to come into their local Social Security Administration office, and
then provide at least 6 point documentation similar to New Jersey’s driver’s license procedures.12
The individual’s contact information will be updated, and all new security questions will have to
be created. After this visit, the individual will again be able to take advantage of opportunities
where financial/credit information is required, much faster than the current system.
There are still areas of concern in the WISE system; for example, there is an assumption
that the major credit bureaus and other entities like ChoicePoint can be pushed out of the second
circle in the Identity Verification Model. This could be done by competitive pricing and/or
government intervention. The effect this will have on these international organizations will be
great, and will force a change in the industry. But this will not be the first time technology and
governmental influence has changed the shape of a market.13
The data on identity theft leads one to believe that technology is spawning a crime that is
unstoppable. Our current system allows for identity theft to occur too easily, and gives little
control to the individual over her information. In addition, the current method of recovery is too
passive. However, by changing our approach to data usage and distribution it is possible to stop a
significant amount of fraudulent activity. In addition, personally identifiable information control
becomes a primary focus, increasing individual privacy. In the end, the expansion of a WISE
system addresses our current needs, and is technically feasible.
10
I could not help adding the pun. It will strike again.
bbc.co.uk, “Google searches web’s dark side” http://news.bbc.co.uk/1/hi/technology/6645895.stm. 5/11/2007
12
“6 Point ID verification” http://www.state.nj.us/mvc/Licenses/6PointID.htm. Last Updated 3/22/2007, Accessed
5/1/2007.
13
Charny, B. “Net phone 911 may hit nomads the hardest”.
http://news.com.com/Net+phone+911+mandate+may+hit+nomads+hardest/2100-1034_35714421.html?part=dtx&tag=nhl&tag=nl.e433. Published 5/19/2005. Accessed 5/11/2007.
11
5
Identify This! – C. Baakel
Credit Cards
Etc.
Employers
YOU
Banks
Loan/Lenders
Government
Figure 1: The Current Identity Verification Model
6
Identify This! – C. Baakel
Credit Bureaus
Credit Cards
Employers
WISE
Etc.
YOU
Banks
Loan/Lenders
Government
ChoicePoint
Figure 2: The Wall between YOU and other entities created by WISE
7
Download