Identity Theft and Legitimately - Minted Fraudulent Credentials

advertisement
DIMACS Workshop on Theft in E-Commerce
DIMACS Center, Rutgers, Piscataway, NJ
Identity Theft and
Legitimately-Minted
Fraudulent Credentials
Paul C. Van Oorschot
Carleton University, Ottawa, Canada
April 14, 2005
1
“Identity-theft case costs taxpayers $540,400”
The Globe and Mail, April 12 2004
• 89-year-old owns $1 million Calgary property
• “buyer”, “seller” in a lawyer’s office use false DL, SIN
• property transfer is registered
• “new owner” gets $500K mortgage
• money moves through several accounts . . . disappears
2
The Telus Cell Phone
• “but we don’t have a Telus cell phone”
3
Identity Theft – Variations on a Theme
•
unauthorized exploitation of another’s ID-corroborating info
– name, addr, phone#, SSN, DL, CC, bank info
A. borrow privileges (parallel account access)
B. expropriate privileges (take over existing accounts)
C. fraudulently obtain new privileges***
– falsely use existing credentials to get new ones
D. full impersonation (may include A, B and C)
– less attractive to attacker? (scalability)
4
Leveraging Stolen Credentials
... to get new ones from credential issuers:
better than forging – e.g. consider case of credit cards:
•
new credentials are “authentic” (created by legit issuer)
•
and “owned” by the thief (never otherwise possessed)
•
harder for legitimate party to track down
5
Identity Theft – Fundamental Enablers
credentials:
(digital, physical) “things” verifiers corroborate ID with
Fundamental underlying problems:
1. ease of duplicating personal data and credentials
2. difficulty of detecting when a copy of a credential
or credential info is made, or exists
3. if existing credential info mis-used to get new creds,
no info typically flows back to legitimate owner quickly
Implies ID theft cannot be solved by any single credentialgranting organization in isolation
6
Identity Theft – More Enabling Factors
•
availability of personal data on Internet (e.g. at servers)
•
lack of relying party due diligence (earlier examples)
•
poor custodianship (regardless of diligence by individual)
– ChoicePoint: 145,000 consumer records `bought’ (2005)
–B
of A: 1.2million records on stolen backup tapes (2005)
– CIBC faxes: 3+ years mis-faxing of personal data (2004)
– LexisNexis (WSJ, Apr.13, 2005)
- unauthorized access to 310,000 customer records
- 59 security breaches over 2 years (SSN, DL)
Note: data brokers are currently unregulated (U.S.)
7
Who “owns” the ID theft problem?
• system-level problem, no real “owner”
– unclear whose responsibility to solve
– unclear how it can be solved
• individual citizens poorly positioned to protect themselves
– although primary victims (2003: avg 60 hrs to resolve)
Identity theft vs. phishing
• phishing: ranges from access to one account,
to open-ended social engineering
• suppose all phishing stopped; ID theft still a big problem!
• assume: info theft will occur; can we stop ID theft?
8
Consumer Credit Reporting Agencies
Best positioned to address ID theft: national credit bureaus?
• do their business models motivate them to address it?
– do some prevention measures hurt their business?
• can post alerts on individuals’ credit files
• credit-check freeze solution (many U.S. states)
– individual can put ‘fraud alert’ on their own report
– blocks access to it by others for fixed period,
or until individual contacts with pre-agreed info
• bureaus themselves are a target: (Feb.2004)
1,400 Equifax Canada credit records criminally accessed
9
Banks and CC companies [current mechanisms]
• CC activity profiling (anomaly detection in CC usage)
– addresses stolen / fraud card use, but not “ID theft”
• e.g. stolen CC could be leveraged for new credentials
• U.S. major banks: when one “alerts” on a name,
common clearinghouse shares warning with all others
– limited notice (sector / within sector)
10
Proposal:
Credential Minting involves Minting-Bit Check
Credential Issuer
Customer Record DB
Before minting
do ID-based lookup
Check minting_bit
on customer record
Return minting_bit (T/F)
or require explicit customer action/OK
Mint credential if allowed
11
Proposal: “Centralized Minting Bits”
• could be new offering by national credit bureaus (CB)
- complements freezing access to credit records
• requires co-ordination (of CBs or similar parties),
or centralized / unified system
• some such proposal needed to fully address ID theft
• why might credential-minting orgs join in on this check:
- voluntary, to show leadership?
- reduce liability?
- regulations?
- consumers might demand use of such scheme (opt-in?)
12
Players and their Motives
Players in the Identity Theft Game
•
private citizens (subjects)
•
credential minters (CA’s!)
•
credential verifiers (“relying” parties)
•
authorized data holders (e.g. employers, banks, gov’t)
•
credit bureaus (semi-authorized?)
•
data brokers (quasi-authorized?)
•
attackers
Primary (secondary) motives of each player are subset of:
1. to protect and use data
2. to share/sell data
3. to provide score using data 4. to properly verify credentials
13
Concluding Remarks
• phishing is a small part of identity theft
• still in the initial stages of growth of ID theft
• Q: What technical solutions to ID theft are possible?
(for broad definition of ID theft)
14
Are there two of you?
http://findaperson.canada411.ca/
What is answer to query “P. Van Oorschot”?
P Van Oorschot
2343 Orchard Ave
Sidney, BC V8L 1T8
(250) 656-2505
15
Thank you
Paul C. Van Oorschot
Digital Security Group
School of Computer Science
Carleton University, Ottawa, Canada
16
Download