WP3 *Threat assessment and economical aspects* December 2015

advertisement
WP3 “Threat assessment and economical aspects”
December 2015
Tackling identity theft with a
“Harmonized framework, allowing a
sustainable and robust identity for
European Citizens.”
D3.1: Report on ID threat for both national and industry delivered ID
Deliverable ID :
Deliverable Name :
D3.1
“Report on ID threat for both national and industry
delivered ID”
Status :
Dissemination Level :
PU
Due date of deliverable :
M18
Actual submission date :
Work Package :
WP3
Organisation
name
of
lead
IDP
contractor for this deliverable :
Author(s):
Charles de Couessin
Raul Sanchez Reillo,Judith Liu Rimenez, Raimonda
Partner(s) contributing :
Admine, Leva Jansone, Marino Di Nillo, Marek Tits,
Giogia Lodi, Sebastien Lethiec,
This project is funded as a FP7- SEC-2013.1.1-2: “Stronger Identity
for EU citizens” – Capability Project. The project has received
funding from the European Community’s Framework Programme
(FP7/2007- 2013) under the Grant Agreement n° 607049.
Copyright by the EKSISTENZ Consortium
1|P a g e
WP3 “Threat assessment and economical aspects”
December 2015
History
Version
0.1
2|P a g e
Date
04/11/15
Modification reason
Structure
Modified by
Charles de Couessin
WP3 “Threat assessment and economical aspects”
December 2015
Table of contents
HISTORY ............................................................................................................................2
TABLE OF CONTENTS ..........................................................................................................3
LIST OF FIGURES.................................................................................................................5
LIST OF ABBREVIATIONS/ACRONYMS .................................................................................6
EXECUTIVE SUMMARY .......................................................................................................7
1
SETTING THE SCENE ...................................................................................................9
1.1
PHYSICAL VS CYBER WORLD .............................................................................................. 9
1.2
PHYSICAL WORLD IDENTIFICATION ................................................................................... 10
2
DEFINITIONS ............................................................................................................ 13
2.1
THE SITUATION ............................................................................................................. 13
2.2
ORIGIN OF ID FRAUD .................................................................................................... 14
2.2.1 ID FRAUD IN THE PHYSICAL WORLD .............................................................................. 14
2.2.2 ID FRAUD IN THE CYBER WORLD .................................................................................. 15
2.2.3 PHYSICAL ID VS DIGITAL ID ........................................................................................ 17
3
TAXONOMY OF RELEVANT ID DOCUMENTS .............................................................. 18
3.1
GOVERNMENT ID DOCUMENTS ....................................................................................... 18
3.1.1 CREDENTIALS ........................................................................................................... 18
3.2
TAXONOMY OF RELEVANT GOVERNMENT ID DOCUMENTS.................................................... 19
3.2.1 NATIONAL ID CARD .................................................................................................. 19
3.2.2 THE BREEDER DOCUMENTS......................................................................................... 20
3.2.3 DRIVING LICENSES .................................................................................................... 23
3.2.4 THE PASSPORT ......................................................................................................... 23
3.2.5 FRAUD PACKAGES ..................................................................................................... 24
3.3
INDUSTRY / PRIVATE SECTOR ID DOCUMENTS .................................................................... 25
3.3.1 HEALTHCARE ID ....................................................................................................... 26
3.3.2 TELCOS ID ............................................................................................................... 28
3.3.3 BANK ID ................................................................................................................. 31
4
TAXONOMY OF ID THEFT / THREATS......................................................................... 35
4.1
GOVERNMENT ID THEFT / THREATS ................................................................................. 35
4.1.1 DELIVERY ................................................................................................................ 35
5
CONSEQUENCES OF ID THEFT ................................................................................... 37
5.1
CONSEQUENCES OF GOVERNMENT ID THEFT ..................................................................... 37
6
CYBER ID THEFT ....................................................................................................... 40
6.1
CYBER THREAT VS PHYSICAL THREAT ................................................................................. 40
6.2
CYBER THEFT AGAINST GOVERNMENT ID........................................................................... 40
6.2.1 SETTING THE SCENE .................................................................................................. 40
6.2.2 CRITICAL DATA IN THE CYBER WORLD ........................................................................... 41
6.2.3 MOST FREQUENT CYBER ATTACKS................................................................................ 42
6.2.4 CYBER WORLD ATTACKS AGAINST GOVERNMENT DOCUMENTS.......................................... 43
6.2.5 TYPOLOGY OF ATTACKS AGAINST “GOVERNMENT” DOCUMENTS ....................................... 44
7
TAXONOMY OF VICTIMS .......................................................................................... 47
7.1
INTERNET USAGE IN THE MS ........................................................................................... 47
7.2
MOBILE AS A NEW VECTOR OF INTERNET DAMAGES ............................................................ 50
8
TAXONOMY OF COUNTRIES...................................................................................... 52
8.1
TAXONOMY OF COUNTRIES FOR ID THEFT ......................................................................... 52
8.1.1 SOCIAL AND GEOPOLITICAL CONTEXT ........................................................................... 52
8.1.2 SCAM EMAILS OR PHONE CALLS AS A MEANS TO GET ACCESS TO INDIVIDUALS’ DETAILS ......... 57
9
A COUNTRY USE CASE: IDENTITY THEFT IN LATVIA .................................................... 58
3|P a g e
WP3 “Threat assessment and economical aspects”
December 2015
9.1
GENERAL SITUATION ..................................................................................................... 58
9.2
USES OF STOLEN DOCUMENTS AND RELATED CRIMES .......................................................... 58
9.3
ACTIONS OF AN IDENTITY FRAUD VICTIM ........................................................................... 59
9.4
MOST COMMON TYPES OF IDENTITY THEFT IN LATVIA ......................................................... 60
9.4.1 CRIMINAL IDENTITY THEFT ......................................................................................... 60
9.4.2 DRIVER’S LICENSE IDENTITY THEFT .............................................................................. 64
9.4.3 FINANCIAL IDENTITY THEFT ........................................................................................ 64
4|P a g e
WP3 “Threat assessment and economical aspects”
List of figures
5|P a g e
December 2015
WP3 “Threat assessment and economical aspects”
December 2015
List of abbreviations/acronyms
EU
ICAO
WP
EAC
BAC
SIM
ID
MoC
IVR
PIN
TC
EN
NIR
OCMA
6|P a g e
European Union
The International Civil Aviation Organization
Work Package
Extended Access Control
Basic Access Control
Subscriber Identity Module
Identity
Match-on-Card
Interactive Voice Response
Personal Identification Number
Technical Committee
European Standard
UK National Identity Register
Latvian Office of Citizenship and Migration Affairs
WP3 “Threat assessment and economical aspects”
December 2015
Executive summary
Citizens become more and more aware of internet risks and have changed their habits
because of security concerns, for example by not giving out personal information or not
opening e-mails from unknown sources. The percentage of “internet awareness” is increasing
in proportion to new infrastructures and services provision. As stakeholders – both
government and industry – shall implement countermeasures, it is worth recalling that there
remain considerable variations between countries, socio-demographic groups such as age
and level of education with regards to internet access, expertise and awareness of potential
threats.
An average of half of Internet users have suffered the presence of a malicious software in
their equipment; but even though the proportion of real victims of ID theft remains quite low
(average 7%), the consequences – social, financial – can be extremely severe. Same as for the
physical world, gaining access to credentials opens the doors to multiple scenarios, such as
connecting to on-line services on behalf of their victims as well as building a new identity by
the means of the various data collected via social networks and internet providers.
Many issues shall be raised with regards to ID theft in the physical world. Government
documents – Driving Licenses, ID card, passport, resident permit – get more and more secure
and take advantage of a seamless delivery procedure. But the weakest point remains the
availability of key credentials – date / place of birth of applicant and parents - from social
networks or open databases which can be accessed quite easily for illegitimate purposes.
Certain EU funded endeavors1 are assessing both how to better structure breeder documents
to avoid fraud and strengthen the link with the holder to ensure that he is its real “owner”.
But, at this stage, one shall admit that impersonating another individual is not a difficult
challenge. What will be the future of physical identity? Shall the physical ID be controlled by
the means of an IT infrastructure at any usage like hotel stay, car rental or access control to a
secure building? Do we want to live in such a world that would replace an habit of confidence
by another world where credentials would not be recognized unless cyber tools replace
human judgment?
Concerning the internet world, the authentication procedure will immediately confirm the
legitimacy of the applicant when connecting on-line. Same as for the current credit card
infrastructure, revocation tools will be implemented to counter any fraudulent attempt, once
a theft has been declared. As mentioned in the previous paragraphs, this will be the role of
technology and infrastructures to replace trust and confidence which have ruled relationships
since the beginning of human exchanges. Same as for the physical world, enrolment will
remain the weakest stage of the process as basic credentials will be more and more available
from open sources data.
Identification and authentication do not constitute the main risks when connecting on-line
compared to malicious software and spams that can attack individuals. Counterfeit websites,
unsecure providers and software updates shall be considered as the main threats today. Even
though our citizens consider themselves as aware of internet risks, fraudsters are
1 ORIGIN http://www.origins-project.eu/links/ and FIDELITY http://www.fidelity-project.eu/
7|P a g e
WP3 “Threat assessment and economical aspects”
December 2015
implementing extremely invasive tools that can generate more severe damages – access to
diary, address book, credentials – than an illegal connection to a secure website.
8|P a g e
WP3 “Threat assessment and economical aspects”
December 2015
1 Setting the scene
1.1
Physical vs cyber world
The evolution of the society, facilitated by the diffusion of the Information and
Communication Technologies (ICT), poses a number of security challenges to be no longer
ignored. The increasing use of social networks and other digital means, in order to carry out
everyday life operations, leads to wonder about the future role of physical identities, and
whether digital identities would change the ways through which every person identifies and
then authenticates to obtain a whatsoever service.
In order to understand the possible trends in the usage of digital identities in contrast to
physical ones, it is worth distinguishing between two aspects: identification and
authentication. In general, identification refers to the action of a person claiming to be
somebody. In the digital word, identification simply entails providing any sort of username.
Authentication is a step forward since it involves all the operations that allow a person to
prove (s)he is who (s)he declared to be. In the digital world, authentication comprises all
those means (e.g., password, one-time token, etc.) used to demonstrate a username is
exactly the one asserted.
From the state of the art conducted in the context of WP2 of the EKSISTENZ project, it turned
out that the European trends in using only digital identification means, in contrast to physical
ones, are extremely heterogeneous and differ from country to country. Whereas there exist
Member States that started promoting and imposing by law the usage of digital identification
means since years (e.g., Estonia), other states, such as Italy or Spain, seem still facing
difficulties in letting these means take off. This may be caused by a variety of factors: cultural
and habits limitations, lack of available online services, complex online services that are more
a digitalization of old fashion processes than renewed processes that exploit the advantages
offered by the usage of ICT.
Owing to these considerations, it is likely that physical identification of people will not be
replaced so easily in the short time: even in scenarios where most of the services, both
private and public, will be available only online, the society needs to clearly identify its
members and new digital approaches are to be accepted and used by that society. However,
with a larger number of States ready to embrace electronic identification means, physical
documents can be substituted by their electronic versions. In this sense, we claim that these
changes will be even more effective if the relative legislations in the States are capable of
promptly adapting to the evolutions we are witnessing, imposed by the increasing
pervasiveness of ICT. A confirmation of this statement comes from the new eIDAS directive
that is focussed on regulating transactions that may principally happen online, thus strongly
requiring online identification and authentication mechanisms.
eIDAS, and other national regulations, represent significant drivers to enable the construction
of a single digital market, paving the way to a larger availability of digital services and to a
higher number of interactions between enterprises, governments and citizens. Despite the
inherent advantages that a digitalized service ecosystem can bring to the society, it is also
true that it can convey new opportunities for criminal activities of various types, potentially
leading to new forms of criminal organizations. On one hand, in fact, we are observing new
criminal threats such as sophisticated and distributed financial frauds carried out online and,
on the other hand, we are witnessing traditional criminal activities that are undertaken
thanks also to the pervasiveness of ICT means.
9|P a g e
WP3 “Threat assessment and economical aspects”
December 2015
With the very recent tragic terroristic events, news about the sale at a very low price, in the
dark web, of counterfeit physical passports or other physical identification documents are
increasing. The presence of a virtual market that is capable of offering specialized products
and services is transforming the way in which cyber threats and other criminal activities are
conducted. Criminal groups are now more distributed, and “liquid”, limited in time and
formed on the basis of specific actions to be performed. They tend to use professional cybercriminal freelancers who sell them skills and tools for performing cyber attacks. In other
words, crime-as-a-service is emerging, leading to a higher specialization of both cybercriminals and criminals who do not own the necessary technological skills to carry out cyber
crimes by themselves.
In this scenario, sensitive data, such as data regarding the identities of people, will be
important targets for criminals. Cloud computing, big data and Internet of Things paradigms
as well as the massive use of social networks and smart devices by anyone are pushing
towards an increasing collection, processing and storage of data of various nature,
augmenting the points of access to the network and the probabilities of intrusions that
exploit those accesses. Typically, the infringement of these types of data is committed
through traditional frauds related to credit cards or banks credentials, phishing, other
blackmail operations or cyber-spying. By reading a social network profile, it is also possible to
obtain a vast amount of information of a possible victim that can then be exploited to commit
crimes or to create fake accounts, due also to the rather unsafe e-ID mechanisms offered by
social networks.
The United Nations Office on Drugs and Crime (UNODC) estimates that identity theft is the
most common type of consumer fraud and the most profitable form of cyber threat capable
of generating approximately 1 billion dollars per year as revenue on the global scale [1]. The
same report states that the cost of identifying theft using cyber techniques in the US was
$780 million. Understanding whether threats against identification means can be better
prevented in a digital environment rather than in the physical dimension still remains unclear;
certainly, the characteristics of rapidness and pervasiveness of the digital world may require
more sophisticated, accurate and smarter mechanisms of prevention of cyber threats against
the identities of users.
This deliverable provides an assessment of ID threats for both national and industrial IDs,
discussing, among the others, the possible taxonomies of ID threats, the victims and the
countries in which the threats are monitored.
1.2
Physical world identification
Civil registries in Europe date back from the XVII° century, but there remains a long way until
the current credential constituted of the three main tangible data – name, surname, date of
birth – is recognised as a means to authenticate an individual. The modern passport template
transposes a European vision of the world - link to father (community) name, preceded by a
prefix, so that to indicate the relationship towards the community and the effective date
when the birth occurred. But this pattern is very specific and does not at all reflect the variety
of cultural habits that affect the way individuals are (or are not) registered. For these reasons,
Europe meets considerable issues for trying to transpose foreign credentials. In many
geographic areas, family names are not fixed and stable since individuals might impersonate
animals or natural phenomenon, while what we consider as “surname” is only a part of a
10 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
longer sentence that designates an individual. Furthermore, surname and name are not
mentioned in the same order that we are used to in Europe whereas the date of birth
corresponds to a well established social framework were new born babies are registered
since the very minute if their birth.
In certain countries, due to high
mortality rates, babies are not
immediately registered in civil
records – or not at all – but later
on, when the child is considered
as stable for life. Not to mention
that in other geographical areas,
the time of conception is
recorded as more significant than
the birth date.
All the issues mentioned above
confirm the difficulties to align
the European way of registering
credentials,
considering
the
various existing schemes and the
inconsistencies generated when
transposing names and dates so
that to meet our European coding
scheme.
Figure 1 ICAO Identity fraud will replace travel document
fraud due to the sophistication of the new generation of
passports
For these reasons, the concept of
identity fraud shall be addressed
carefully so that to match the
various situations encountered by
Member States due to migration
issues. As an example, foreigners
will take advantage of the
artificial nature of the ID they are
awarded when coming to Europe
and not consider this scheme as
fixed as it does not correspond to Figure 2 Shop proposing to reproduce, print or design any kind
their cultural encoding system.
of ID document
As shown in the drawing published by ICAO (Fig.1), the manufacturing of travel documents
has gained a considerable skill to fight against fraud and counterfeits. For this reason current
frauds will address more the “Identity” itself – or access to the credentials - rather than the
supporting documents. This means that both “Breeder documents” and “Birth certificates”
will become the cornerstone of further ID production. Therefore, these shall be ruled by new
standards and delivering procedures to match the current threefold scheme (name, surname,
date of birth) which might easily be captured from the internet and social media.
Credentials have always be linked to individuals by religious, medical or cultural records and
figured out by the means of tokens (paper, plastic, polymers, etc..) to allow individuals to
authenticate themselves since there is no need to carry on a passport for many “low security”
physical controls like renting a car, accessing a building, a gym club or being delivered a
11 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
registered mail. This means that the majority of societal activities do not require a strong
authentication procedure; individuals being used to trust themselves during physical contacts
or when engaging in business relationships. As several thousands of various ID card patterns
(national, resident, driving licences, student, etc.) exist in the world, there is a strong market
of counterfeiting to provide for low authentication demands, that constitute the majority of
situations in the physical world.
In South East Asia, specialised shops are able to produce any kind of ID document, either
based on a model to be counterfeited, either by producing a “fancy” pattern which has no
chance to be recognized as there does not exists a “world” data base of ID documents
currently in use.
By
chance
passports
require
professional
skills
and
therefore shall
be
manufactured by
dedicated and
professional
printers, rather
than
street
shops as it is the
case
in
the
picture here.
Figure 3 Certified copy o fa breeder document
12 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
2 Definitions
2.1
The situation
Identity
theft
was
considered as one of the
main complaints by a
market study made in 2013
by the US Federal Trade
Commission. It represents
14% of the complaints,
ahead of many other claims
made by individuals.
As “Identity theft “might
represent multiple cases, it
is worth defining this
concept since it is often
misleading and regroups
multiple patterns for both
physical and cyber world.
Figure 4 Ranking of consumer complaints by Federal Trade Commission
The two main cases can be summarised as follows:
Identity theft: ID impersonation, ID misappropriation
As it is not literally possible to steal an identity, this concept means that an individual can
access enough information about someone’s ID (name, birth, addresses, etc..) to impersonate
him for various legitimate or illegitimate reasons. The “victim”, or complacent ID provider,
can be alive or deceased; but the ID bearer utilizes a genuine ID document.
The “victim” can accept this
situation, such as to help
someone during a war
situation. But, stealing an
individual’s identity does not,
on its own, constitute
identity fraud and this is an
important distinction as there
might be no fraudulent usage
of this ID, apart from carrying
another name than one’s
patronym.
Figure 5 Passport credentials are often available on social media
Identity fraud (an action is carried on)
Identity fraud concerns the consequences of an ID theft or the usage of a fake ID. It
corresponds to an illegal activity to obtain goods or services by deception in another person's
name, without his knowledge or consent. In the world of ID fraud, there exists different types
of supporting documents, which can be broken down as follows:
13 | P a g e
WP3 “Threat assessment and economical aspects”
Category
Forged
Stolen blank
December 2015
Description
Market value
Changes are made based on the genuine
document: modified data, pages inserted or
removed, replaced photo, false stamps, etc..;
Recognized as Fraudulently Obtained Genuine
(FOG)
Medium
High
Counterfeit
Total reproduction of the original document
High
Fantasy
Typical market for low authentication
document : national ID cards, driving licenses,
resident permit, student card that cannot be
matched against a genuine pattern.
Low
2.2
Origin of ID Fraud
In the physical world, very rough methods and habits allow to have access to one’s data. As
detailed by the table below, no sophisticated skill is required to get a minimal set of data and
impersonate an individual. For the majority of cases, amateur pickpockets skills are sufficient
to steal some pieces of ID and conduct illegal activities. Surface mail and dumpster diving are
certainly among the easiest way to get access to critical information: name, address as well as
specific account details (telcos, banks, social benefits, health records…).
It is well known that mail boxes during vacation periods might contain a wealth of
information that can be easily stolen and further exploited. Business and personal activities
constitute easy targets since, in both cases, there is no systematic procedure to destroy
critical information or protect mail boxes and dustbins2.
2.2.1 ID fraud in the physical world
It is worth considering that the majority of illegal activities aiming at stealing personal data
can be conducted by individuals rather than being performed based on business practices.
This does not exclude that these data can be later exploited by very structured criminal
networks rather than by individuals themselves. Once an ID document – or critical data – is
stolen or obtained from an illegal manner, it can be exploited by a criminal network in a real
business mode. The same credentials can be distributed to multiple individuals, along a
specific cycle which depends from its life span itself and whether it will be recorded by law
enforcement agencies. But, contrary to passports and ID cards, which can be recorded by
Interpol databases, certain “low security” credentials (driving licenses, student cards, resident
permit) will never be checked against databases for standard usages in the physical world.
2Based on a market study
For Individuals: 30% of the bins analyzed contained more than 2 documents with personal data
For Corporate activities: 42% declared that their companies do not have a global policy to protect
identities. Furthermore, there is no policy to destroy sensitive data. 27% of bins surveyed contained
sensitive data (clients or employees)
14 | P a g e
WP3 “Threat assessment and economical aspects”
Physical world
December 2015
Degree of technicality
Origin
Retail transaction
Medium
Business
Stolen purses / wallets, pickpockets
Medium
Personal
Stolen personal documents
Medium
Personal
Stolen surface mail
Low
Personal
Dumpster diving
Low
Personal
Deceased person
Medium
Personal
Shoulder surfing
Low
Personal
Dishonest employees, corruption
Medium
Business
Call centers
Medium
Business
Imposters
Medium
Personal
End of business relationship
Medium
Business
2.2.2 ID fraud in the cyber world
Attacks against ID in the cyber world require more sophisticated skills. They might be
launched by individuals or robots against series of IP addresses of emails considering that
significant percentage might fail. As the on-line world does not establish contacts between
the parties, each module in the transaction chain constitutes a point of weakness.
User :
 He is the weakest point in the chain as he might open suspicious mails without any
care or avoids installing minimal barriers (firewalls) to prevent attacks.
Equipment (Hw, sw):
 Computers, smartphones and tablets might be vulnerable to virus, Trojans, worms,
etc... Irrespective of the degree of consciousness of the user.
ISP: security breaches
 Service providers might generate severe security breaches as they constitute the
link between users and the content carried by the network. Even though they are
usually well equipped, they might constitute a target in certain countries,
considering that the concept of ISP applies both to telcos and private Wi-Fi
providers.
 Wi-fi provision in public areas (hotels, public transportation, conference centers) is
certainly a weak link in the chain as many travelers are eager to access their mails
during travels, meals or any free time without to realize that they are using a
private module, open to external attacks (or generating these attacks).
 In many companies, corporate rules forbid to use both local and Wi-Fi ISP for
security reasons. Travelers might be allowed to access Points Of Contact to a
private network, with the risk that the last piece of the connection chain might
become a target.
15 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Service providers
 These stakeholders bear a strong responsibility in the security landscape as they
store much critical information of their customers: name, physical address, IP
address, mail, billing references, etc...
Web sites
 Counterfeit websites constitute typical targets for illegal activities as users might
connect without to realise a slight URL difference whereas the layout and content
exactly counterfeits the target website.
Cyber world
Degree of technicality
Origin
Social engineering
High
Business
Hacking computer system
High
Business
Phishing campaigns
High
Business
Data base attack
High
Business
Account hijacking
High
Business
Forged social network account
Medium
Business
Stolen computer, smartphone
Medium
Business
Exploiting used IT equipment
Medium
Business
High
Business
Medium
Business
Contactless readers
Storage media , USB memory
Even though computers still represent the main percentage of connecting devices, tablet and
smartphones
will
constitute
in
the
future
a
rather
significant share of
consumers as detailed
by the market study
below; having in mind
that many individuals
use simultaneously /
successively
smartphones, tablets
and computers, each
representing a target
in the connection chain
Figure 6 Eurobarometer on Cyber Security, the growing share of
smartphones
As all equipment share
the same emails, files and storage facilities, any attack successfully performed against one of
them might be replicated to all devices.
Even though computers benefit of a large range of software tools, smartphones and tablets
constitute new and easy targets as defense capabilities are not that efficient and adapted to
the various operating systems.
16 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
2.2.3 Physical ID vs digital ID
Physical ID
Degree of technicality for getting access
Usage
Home address
Low
Government
secondary ID
and
Given name
Low
Government
secondary ID
and
Christian name
Low
Government
secondary ID
and
Medium / low
Health benefit
Low
Government
secondary ID
Social Security number
Birth Date
and
As individuals are more and more eager to communicate on their lives by the means of social
networks, their basic credentials are extremely easy to identify. Birthday dates are
communicated to their relatives or social networks and often the location of birth is indicated
to facilitate their identification. These very basic data are enough for the provision of multiple
low security ID that will be utilized in the physical world without any checks against database
for conformity.
Digital ID
Degree of technicality
Usage
IP Address
High
Access to
accounts
critical
User name / login
High
Access to
accounts
critical
Password
High
Access to
accounts
critical
PIN CODE
High
Access to
accounts
critical
Medium
Access to
accounts
critical
Account data
Social
account
network
Low
Access to network
Physical ID and credentials might be used in the real world for illegal activities once stolen,
provided that the authentication level remains low, and that there is no connections to law
enforcement databases, which is the case for the majority of controls; but they do not benefit
of the leverage effect that provides the digital world as authentication modules allow to
connect to various facilities.
17 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
3 Taxonomy of relevant ID documents
3.1
Government ID documents
3.1.1 Credentials
As stated by IMS
Research, ID Cards
constitute the main
share of government
ID credentials, Driving
Licences being second
ahead of Health Cards
and Passports, since
many people do not
travel and do not need
to bear such a secure
document which can
be securely controlled
against
law
enforcement
data
bases.
Figure 7 IMS Research: Type of government credentials in use
The majority of government credentials currently in use in the real world are not controlled
and checked for authenticity. There is no standard pattern for ID Cards, even though the
several countries have tried to regulate the provision of national credentials, as it was the
case for the European Citizen Card3.
Driving Licences follow the same rules; even though the international standard ISO/IEC
18013-1 provides a highly secure pattern to ensure the authenticity of the document as well
as confirm the link with the bearer by the means of PIN code and biometrics authentication,
the European Regulation4 only retains a few features from the ISO standard and allows the
MS for a large flexibility of implementation.
Considering that passports are over dimensioned for current usages - access control to public
buildings, staying in a hotel, domestic air travels, hiring a car, opening a bank account, etc….
– individuals use extremely low security credentials for a wide range of activities in the real
world which do not require government clearance.
The lack of authentication features – PIN code, biometrics, etc… to confirm that the bearer is
the real “owner” of the credential – in the physical world constitutes certainly one of the
main weaknesses of interpersonal relationship and it does not match the current security
context.
3
The European Citizen Card (ECC) is the standard produced by CEN TC224 WG15. Since MS have
different strategies for the provision of National ID cards, the initiative remains as a technical
specification without any obligation to be implemented. The eIDAs regulation has widened its scope by
allowing both government and industry to implement ID infrastructures with different security levels.
4 Directive 2006/126/EC of the European Parliament and of the Council of 20 December 2006 on driving
licences
(Recast)
(Text
with
EEA
relevance).
http://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=celex:32006L0126
18 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
As an example, 10 million of wrongly attributed health cards (out of 60 millions) are currently
in use in France5. Even though, there is yet a photo, its quality does not allow to perform a
quality match whereas proposals for a secure PIN Code (older and sick individuals will not be
able to authenticate) and biometrics attempts have failed since medical care to all is
considered as a fundamental right, even if provided under a false ID.
Due to illegal immigrations, many foreigners use low quality counterfeited credentials
without any possibility to control their legitimacy for standard usage. The identification rate
of these documents is extremely low6. As the law shall respect the presumption of innocence,
courts cannot sentence individuals whose real identity cannot even be proved.
Due to the new Driving License Directive, many countries are in the situation where several
patterns are currently in use7 without systematic means to control their authenticity.
Furthermore, the cost for being granted a license has increased8 together with the penalty
system for speed limit offense, have leveraged the use wrong documents9. For France only,
an assumption of 2,7 millions of wrong driving licenses currently in use is considered; 700,000
for driving activities, whereas the other 2 millions are utilized for identity purposes10.
In many African countries, driving is considered as a “right” for individuals above a certain
age, independent of their ability to successfully pass the license and they just need to pay to
get it. Due to bilateral agreements with Member States, they might be granted an official DL
at their arrival in Europe. Alternatively, there is also the possibility to show an almost “true”
DL from a Member State when they are back in their country so that to be granted an official
DL to be later exchanged against a Member State DL once returned in Europe. This modus
operandi can be done for other government cards and generate a flow of authentic
documents from wrong origin.
3.2
Taxonomy of relevant government ID documents
For the purpose of the study, it is might be worth to restrict our research to a set of
government documents that might both generate value for their holders and require
verification against their civil status.
3.2.1 National ID card
As there are many research projects and reports on ID cards in Europe, it is not the purpose
of this document to carry on a new study on how they are delivered and what are their
security features. But, apart from certain MS11 where the ID card is mandatory and its
provision is connected to a national civil registry, in most of the EU countries, either it does
not exist (UK) or its usage is optional. And in these cases, the card is delivered based on a
5 Christophe Naudin. Alias. La Table Ronde.
Paris 2005
Christophe Naudin. Alias. Paris 2005 p.72. The average identification rate of fake documents is 1/25.
Furthermore, there is only 1 sentence for 5 legal cases.
7 In France 5 different driving licenses are currently used.
8 Average cost is 2000-3000 Euros in France.
9 Average number of drivers without DL : France: 4%, UK: 3%, US : 3%. Christophe Naudin. Alias. Paris
2005 p.80.
10 The average cost of a DL is 300-500 Euros. Christophe Naudin. Alias. Paris 2005 p.80.
11 A list of MS shall be provided
6
19 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
breeder document or the provision of key credentials contained in the breeder document
(date /location of applicant’s birth and his parents).
As there is no direct link between the applicant and his breeder document, the national ID is
certainly a weak module in the identity chain. Even though certain MS are considering how to
include biometrics in a chip, the lack of strong link with the “birth records” will remain an
issue. All attempts to include authentication and signature certificates will ascertain the
connection between the card holder and his physical being rather that the individual with his
birth records.
 Even though ID Cards are currently accepted for standard usages in the
physical world, it is worth recalling that it can be obtained based on basic
credentials (date/ place birth) that are yet widespread on social networks. As
the principle of biometrics matching has not been retained by many countries,
it cannot be considered as a high authentication means.
3.2.2 The breeder documents
A very loose definition of a “Breeder Document” would simply be: a document that allows
you to obtain other documents. This generic term comprises different categories of
documents such as the various types of birth certificates and the family booklet. But we shall
recall that the concept of birth it is not equally shared by all countries, certain civilizations
considering that the only date to be recoded is the child’s conception whereas other
countries wait a significant period after the birth, due to high children mortality.
Having being granted a mandate from the UN to define a standard for travel documents,
ICAO has launched their TRIP – Travel Identification Program – initiative which considers that
identity is the cornerstone of the various travel phases.
Under the banner of EOI - Evidence Of Identity – member states have initiated various
activities addressing breeder document issues12.
In particular ICAO has defined a set of guidelines for governments called TDIA (Travel
Document Issuing Authority) issuance process which provide recommendations with regards
to documents, civil registry records, databases, and other media that are used to validate an
applicant’s identity with the following objectives:





12
Evidence that the claimed identity is valid
Identity exists and that the owner of that identity is still alive;
Evidence that the presenter links to the claimed identity
Evidence that the presenter uses the claimed identity
Claimant is operating under this identity within the community.
Status: Draft 4. Date: 1 March 2013. Part of the TRIP programme Transfer from TAG/MRTD to the
ICBWG Implementation and Capacity Building Working Group
20 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Since many countries do not own civil registries or central birth data bases, TDIA shall:
 Ask for documents that show that the identity exists, such as a birth or citizenship
certificate.
 Documents should ideally be validated against source data to combat the risk of
forged breeder documents.
 Check against the death records to guard against fraudulent applicants using the
identity of a deceased person.
 There may be multiple valid versions of breeder documents available for use
Considering that the concept of “Breeder document” itself is an European vision of the birth
status, ICAO opens further the debate by accepting to recognize various procedures as a
means to ascertain the identity of an individual. For this purpose, the EOI working group
considers that an Identity might be the combination of three elements:
 Attributed identity: it consists of the components of a person's identity that are
given at birth, their full name, date and place of birth, and parents' names.
 Biometric identity: it consists of attributes that are unique to an individual, e.g.
fingerprints, voice, iris pattern, hand geometry.
 Biographical identity: it consists of a person’s social footprint, builds up over time.
o Life events and how a person interacts with society
o Details of education/qualifications, electoral register entries, employment
history, and interactions with organizations such as banks, utilities, and public
authorities.
Figure 8 The ICAO EOI, Evidence Of Identity program
21 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Due to a lack of civil registries, ICAO is currently considering how various documents might
demonstrate that the applicant uses his identity in the community as a social footprint. This
approach is certainly more reliable than birth certificates due to the number and variety of
documents that might confirm the identity of an individual. Therefore, the social footprint
supports the claims that the applicant links to a particular identity, especially where there is
no other evidence available
Foundational documents represent the multitude of evidentiary documents issued to record
a person’s birth, death or their point of immigration or naturalization. They are usually issued
by authorities to establish an identity and confirm the citizenship. Used in combination with
other supporting documents, they provide a part of the evidential process required to
provide confidence that an individual is the true ‘owner’ of their claimed identity.
The fundaments of ICAO’s Protocols for acceptance of citizenship’s documentation are the
following:





Accept only original documents or copies certified by issuing authority
Verify documents against electronic / centrally-held records
Preferably accept only documents that are currently valid
Accept only full birth certificates
Full birth certificates list gender and parental details, as well as name, date, place
and country of birth.
 Require documented evidence of any name change
One shall not forget that an ID is a living identity from birth to death and shall include all
social events of the individual’s life. Therefore, a civil registration is a system by which
governments record the vital events of their citizens and residents: birth, death, marriage,
divorce, adoption. Furthermore, a ddecentralized approach is always preferred so that to
avoid putting the privacy of their citizens at risk.
It is worth mentioning how international organizations like ICAO are currently addressing the
issue of breeder documents by considering that a certifying procedure or a combination of
document might be substituted to the provision of a government delivered document.
Many activities are currently carried on to provide guidelines, recommended practices and
standardization activities for the provision of a standard breeder document that would be
accepted worldwide and contribute to the delivery of more advance documents like
passports and ID cards.
But there will still remain a lack of strong “physical” link between individuals and their
breeder documents. Society might contribute to establishing a “social footprint” whereas an
individual my take advantage of various documents and combine them to be granted a fake
identity.
The breeder document is certainly the basis of ID provision, but it is also its weakest link at it
might be able to constitute the cornerstone of more “operational” documents, that will be
utilized for physical life activities. Certain countries (eg. France) have cancelled the usage of
breeder documents, considering that they can be obtained in an illegal manner. They only
require – for the provision of government documents – the credentials (date / location of
22 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
birth of applicant and his parents), many information that can yet be available from social
networks!
 Considering the lack of strong link between individuals and their breeder
document, it is worth considering that this kind of credential does not match
the level of security required by the modern world. We consider that it shall
not be used “alone” but should be supported by another ID if used to prove
one’s identity.
3.2.3 Driving licenses
In many countries, a driving license can be used for identification purposes. US is certainly the
best example, considering that only a minority of citizens are travelling and would require a
passport. The paradox is that a DL can be purchased on the internet or bought from an illegal
agency although it will become in the future a true identity document or become a piece for
the provision of a more ambitious credential like a passport.
Even though ISO has contributed to the provision of a detailed standard referenced IEC
18013, it mainly addresses the issues of the delivery procedure, layout and security features.
In many countries lacking the provision of a secure birth registry (Eg. South Africa), the DL
becomes a recognized credential, since driving is considered as a right. In many African
countries, individuals purchase their DL as they are unable to pass the government exam and
the document constitutes further their proof of identity.
Even though the Driving License has been considered an ID, it is worth raising the issue of its
legitimacy, even for low security authentication. It looks like it is limited to national usages
and that individuals willing to travel – even within a “domestic area” like the Schengen zone
will need a higher security document to prove their ID even for standard usages: booking an
hotel room, travelling by air or proceeding to bank activities.
 Considering that the credentials of the Driving License can be obtained from
social networks, it cannot be considered as a highly secure ID document.
However, national usages can be considered in certain Member States, as
many citizens use them on behalf of national ID cards.
3.2.4 The passport
The European passport is certainly the most secure ID document as it allows a match
between individuals and their biometrics contained in the chip13. However, the lack of strong
link between individuals and their breeder documents constitutes certainly the weak module
in the provision process. As it is detailed in the previous paragraphs addressing national ID
issues, a passport is delivered based on the provision of basic credentials (date/ place of
birth) which are available from social networks. Additionally, many countries do not control
the likelihood of passport “duplicates”. As the passport delivery is not constituted as a
criminal case, government agencies do not proceed to a previous research to avoid that the
13 Council Regulation (EC) 2252/2004 of 13 December 2004.
23 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
applicant is registered under another name. As mentioned by ICAO, since the delivery process
and its security features have gained a high level of security, the fraud against passports
themselves has considerably decreased compared to the fraud against ID.
A major issue to the usage of passport for authentication remains to the chip access. Actually,
only government authorities can control the biometrics by the means of the various security
protocols (passive authentication, BAC, EAC). This means that, even though passports shall be
positioned at the highest level of the authentication procedure, current usages do not allow
taking advantage of the chip capabilities.
 Even though passports are the only ID documents to bear a secure link with
their holders, this security feature is not available for the physical world
standard usage. However, it shall be considered as the more secure document
currently in usage.
3.2.5 Fraud packages
As Data Protection bodies do not allow consolidating databases from different origins, illegal
migrants or even unemployed are offered typical “Fraud packages” that might include enough
data for being granted social benefits: electricity bills, national ID cards, health cards as well
as salary sheets for a cost of 1500-2000 Euros14. Even though the quality might not be
excellent, it might be sufficient to get some social advantages.
The fraud market has grown in an exponential manner, due to the lack of authentication
means in the physical world. The cost of a document depends of various factors: duration and
content/ state. A blank stolen passport, coming from a government agency has a considerable
value, whereas a similar low quality counterfeit document will not be that attractive since
border police and qualified staff will quite easily detect the fraud. Any stolen document has a
significant price – but lower than a blank stolen credential – since it requires a certain skill to
replace the photograph and modify critical data. Criminal networks take advantage of the low
knowledge of illegal residents to get rid of bad quality documents. In case of being identified,
the fraudster will become again a victim of this underground market and purchase a new (or
better quality) credential in exchange of illegal activities, such as smuggling goods, drugs or
human trafficking activities.
Type of document
Duration
State
Value
National ID card / passport
10 years
Stolen
Medium
National ID card / passport
10 years
Counterfeit
Low
National ID card / passport
10 years
Empty
High
Resident permit
5 years
Stolen
Medium
Resident permit
5 years
Counterfeit
Low
Resident permit
5 years
Empty
High
14 Christophe Naudin. Alias. Paris 2005 p.82.
24 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Short term and temporary resident permits are not that valued as they are assimilated to
precarious situations. In parallel to authentic government credentials, fraudster also provide a
multitude of fantasy documents – World ID, European Refugee, Atlantic Driving License,
Monaco resident – which can be used for extremely low controls, due to their lack of
legitimacy. Christophe Naudin15, in his quite documented report on ID fraud, details the
market price of the most demanded government documents.




Blank stolen passport : 4000-5000 Euros
Blank stolen license: 3000 Euros
Blank stolen license: 1500 Euros
Diplomatic passport: 15000 Euros
Not only credentials have a significant prize, but many other “official” documents are
currently valued due their capability to generate social or professional benefits. In all cases,
they shall be supported by an ID, which might be legitimate or not. As an example, university
diplomas represent a means to access certain business activities, whereas pregnancy
certificates will allow the benefit of social allowances.
3.3
Industry / private sector ID documents
This section aims at setting up a taxonomy
of certain sectors’ ID documents.
Considering the need of industry, many
secondary IDs can be found. The
idiosyncrasy of how to perform individuals’
identification is huge, and therefore, the
types of documents is considerable due to
applications, scenarios of use, etc. When
considering identification purposes in the
private sector, it is worth to consider that
the features of the secondary ID document
are designed to meet losses or theft issues.
The theft or loss of a library card implies the
impossibility of borrowing books, but there
is no consequence to the us er ID and its integrity. Figure 9 A SIM card can become an ID card
However, in case of a credit card, the consequences are stronger for the various parties
involved in a transaction: bank, shop and, of course, the customer himself. Of course, the
efforts done in perfomirng a secure identification has lead to different strategies. Since too
many use cases might be considered, we have restricted our analysis to the following
domains:
 Healthcare
 Telcos
 Banks
The reasons for choosing these are the following:
15 Christophe Naudin mentions that on Feb 3rd 2004, a van was stolen; as it contained
several thousands of empty documents, it market value can estimated in the range of 55
million Euros.
25 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
 Healthcare is a major target for ID frauds, leading to important economic losses,
modification of medical records, etc. Additionally, healthcare identification usually
is based on a face to face process,
 In some way, ID theft in Telcos is an opposite situation: the losses are just
economical; there are no direct damages on the impersonated user.
 Banks are one of the main domains suffering from ID theft. Both real and cyber
world constitute targets from domestic and remote attacks. Face to face and online transactions are performed, each one being subject to specific weaknesses.
3.3.1
Healthcare ID
Healthcare is a typical sector which needs to securely authenticate users so that specific
attention can be paid to individuals: access to services, get an appointment, a suitable
treatment, visit a doctor based on medical policies.
In Europe, both public and private healthcare coexist. Public healthcare is part of a statutory
social security scheme. Different options can be met such as to use a national ID card or a
dedicated device, depending on whether separate activities would need different access
control for both efficiency and privacy issues.
National ID to access healthcare services
The use of a primary ID provides the following advantages:
 Security inherited from a government document, including counter measures to
meet frauds and attacks issues.
 Provision of PKI infrastructure: digital signature, authentication certificates.
 Cost reduction by taking advantage of an existing infrastructure.
On the other hand, there are also some disadvantages:
 Strong security features so that to access different services, taking into account
that only a subset of data might be required for healthcare services.
 Specific identifiers for each on-line service
Separate device to access healthcare services
Several cards and options can be found:
-
Plastic cards without magnetic stripe
o
-
Plastic cards with magnetic stripe:
o
-
Identification is done by presenting the card; this can be complemented by
matching the credentials with the primary ID. Security features may be
implemented (printing techniques or optical). The owners’ photograph is usually
included for face to face identification purposes.
The stripe allows including a set of data such as drugs prescription. As the stripe
can easily be read, physical countermeasure might be added.
Plastic cards with chip:
o
The chip allows implementing security controls (PIN, biometrics) so that to
protect data that might be stored within the card or access on-line services.
Fig.1 shows several examples of European healthcare cards: the two stages of the French
“Carte Vitale”; both include secure chips for data storage, but the most recent sample
displays a photograph for identification. Spanish healthcare cards are issued at the county
level, with specific layout and technical features (Extremadura includes a chip, whereas
Madrid shows only a magnetic stripe). In Spain, several attempts have been done to merge
26 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
the healthcare with the national ID; however, but no political agreement has been achieved
and each county continues to issue its card.
Figure 10: Healthcare cards examples
Figure 11 Healthcare cards in Europe
It is worth recalling the initiative of a European Health Insurance Card (EHIC). This document
is issued by several countries having a statutory social security scheme. It allows the bearer to
get medical treatments while visiting other EU country (not while residing in other European
country). The layout is similar for all Member States; it is a plastic card only, displaying basic
credentials such as name, identification number, nationality, expiration date, etc. It does not
provide any countermeasure and additional security features.
Figure 12 European Healthcare Insurance Card (EHIC)
27 | P a g e
WP3 “Threat assessment and economical aspects”
3.3.2
December 2015
Telcos ID
Mobile ID is becoming a new challenge for both government and telcos operators. As SIM
cards are able to include high security features and store various categories of data, specific
apps have been developed for both physical and remote access control purposes.
Furthermore, recent advances in biometrics allow securely authenticating smartphones
owners by the means of face, finger or iris recognition. Selfies16, minutiae or iris patterns
might be stored in the chip and be called by a government app to authenticate individuals17
when accessing a restricted area or crossing a border.
Mobile biometrics authentication will constitute a very significant market in the coming years
as it will provide an alternative means of securing and processing mobile transactions. This
increased level of security will be driven by the rise of identity theft and fraud and the device
inherent capability to authenticate the user and secure his transactions. As an example, the
US Federal Bureau of Investigation (FBI’s) Criminal Justice Information Services (CJIS) recently
launched an RFQ for the development of a mobile application able to capture biometrics on
android-based devices. The proposed app should be able “to collect fingerprints and facial
16
Branddocs
partners
with
BioID
on
e-signing
with
selfies
Cloud biometrics firm BioID and digital transaction management solutions company Branddocs
have announced a partnership to integrate BioID's mobile multimodal biometric authentication
into Branddocs' eIDAS Cloud Solutions platform. The partnership would see BioID's face and voice
recognition solution integrated with Branddocs tailored platform for authentication, signature and
secure custody of digital documents.
"As digital signing becomes increasingly common, particularly in legal or financial matters trusted user
identity has become a critical issue. Innovative tools such as those from Branddocs make it easier to do
business, without sacrificing security or trust," said Ho Chang, CEO of BioID. "We are glad to help
Branddocs develop the next generation of trusted digital signing solutions."
Saioa Echebarria, CEO of Branddocs, echoed these views on the potential of the project.
"Digital signing relies heavily on trust. When dealing with contracts and other electronic transactions, it
is critical to be able to count on the identity of the sender and signer," noted Echebarria.
"Using BioID's intuitive face recognition with liveness detection we can offer our customers strong,
fraud-resistant identity proofing that is as natural and reliable as signing face-to-face."
- See more at: http://www.planetbiometrics.com/article-details/i/3550/#sthash.fTfnrOzs.dpuf
17 Mobile facial recognition solution launched in Europe07 August 2015 12:36 GMT
Middlesex-based biometrics and identification tech firm Allevate has announced that it is bringing a
cloud-based facial recognition server system designed for government and law enforcement agencies to
Europe.Allevate says that by using Tygart’s MXMOBILE FaceID System for smart mobile devices,
European government and law enforcement agencies can access an MXSERVER system to identify
suspects of interest on the move. “MXMOBILE represents a huge technological leap forward for agents
in the field, providing them with the capability to identify individuals using facial recognition in virtually
real-time,” says John F Waugaman, president of Tygart Technology. Agents can now transmit photos or
videos captured on their smartphone through the MXMOBILE application, to be processed by
MXSERVER using automated face detection and recognition technologies.
The faces in the photos or videos are then matched by MXSERVER against watch lists to offer a short,
rank-ordered list of options that best match these faces, along with any other relevant information such
as biographical information, known aliases and previous comments regarding the individual.In addition
to field use for the identification of persons of interest (POI), law enforcement agencies can make
MXMOBILE available as a citizen policing tool, providing citizens the ability to upload videos and
photographs of suspicious behaviour. “Allevate has been working to make the power of MXSERVER,
already utilised by defense and law enforcement agencies in the USA, available to European agencies”,
says Carl Gohringer, founder of Allevate Limited. “We are pleased to be able to offer MXMOBILE to put
this capability directly into the hands of law enforcement officers on the move.”
- See more at: http://www.planetbiometrics.com/article-details/i/3363/#sthash.kAjKbHV6.dpuf
28 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
photographs for submission and receipt of a response, via an android-based application from
any domestic location with cellular service, the FBI writes in contract documents released this
week”18.,
Different use case can be met:
 A government issues a SIM card as a substitute or replica of its own ID card
 A telco issues a SIM card that will include both authentication and signature
certificates
Government SIM cards
Estonia is certainly the most advanced country for providing ID based SIM cards. The mobile
phone is mainly used to securely access remote services by the means of a PIN code. The
smartphone duplicates the national ID card by containing its basic credentials: date/ place of
birth, delivery date, identification number.
The Mobile operator association GSMA is quite active to take advantage of the Electronicidentification and trust service (eIDAS) Regulation to provide pioneering services based on
telecoms infrastructures. GSMA considers that the European Union is the first region in the
world to benefit a workable and balanced legal framework for cross-border use of electronic
identification (eID) and trust services19. The association precises20 that, by the means of
eIDAS, “citizens and businesses will benefit from higher security and more convenient access
for a wealth of online services, such as submitting tax declarations, enrolling in a foreign
university, remotely opening a bank account, setting up a business in another Member State,
authenticating internet payments and bidding for an online call for tender, among others.”.
GSMA is very active in supporting needs for authentication and through the GSMA’s Mobile
Connect solution which offers facilitated authentication services consisting of secure and
convenient access to online services from a mobile phone, desktop or tablet21.
18 FBI seeks vendors for mobile biometric app 05 August 2015 13:56 GMT
The Federal Bureau of Investigation (FBI’s) Criminal Justice Information Services (CJIS) is seeking
vendors for the development of a mobile application that can capture biometrics on android-based
devices. The app should be able to collect fingerprints and facial photographs for submission and
receipt of a response, via an android-based application from any domestic location with cellular service,
the FBI writes in contract documents released this week. The RFQ is a follow up to the Request for
Information (RFI) that was released in the summer of 2014 which described the mobile biometric
collection effort by the FBI to offer a Mobile Biometric Application (MBA) that will operate on the FBI
Android based phone and tablet, currently the Samsung Galaxy S5 and Samsung Galaxy Tab 4. The
software needs to be compatible with these devices and Integrated Biometrics’ Watson-Mini fingerprint
scanner, notes the document. It also needs to utilize Wavelet Scalar Quantization algorithm for
compression of fingerprint images captured at 500 pixels or greater. Meanwhile, it also has to have the
capability to collect thumb slap/rolled impression fingerprints separately, to collect plain/rolled
impression fingerprints and to collect fingerprints in a predefined order, among other requirements.
19 “The GSMA appreciates the work of the Commission and strongly supports the eIDAS regulation,
which will help boost economic growth in Europe and the promotion and deployment of eID schemes
across Member States,” said Afke Schaart, Vice President Europe, GSMA.
20 “The GSMA urges national governments and regulatory bodies to engage with the GSMA’s Mobile
Connect initiative to help ensure that the unique strengths of mobile for identification and
authentication are made available as widely as possible. Mobile identity services will play a key role in
unlocking the potential of Europe’s digital and personal data economy and drive trust and confidence in
the adoption and use of innovative digital content and services as we progress towards the Digital
Single Market.” http://www.securitydocumentworld.com/article-details/i/12319/
21 “The value of the GSMA’s Mobile Connect service for governments lies in its ability to drive an uptake
in e-government services. Mobile Connect will provide increased convenience and accessibility for
citizens, strong security and enhanced privacy, and lower implementation costs.”
29 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
A typical government app is the border clearance, as proposed by the TSA for providing in
advance flight details. The EC is considering how a similar application could be implemented
at the eastern borders of Europe to securely automate control procedures of commuters in
the context of a Registered Traveller program. Biometrics authentication and secure access to
a government database will constitute the basic infrastructure.
The concept of Mobile Passport Control (MPC) is currently implemented in several US airports
for arriving passengers. A dedicated Customs and Border Protection (CBP) MPC app allows
passengers to submit their customs declaration via their mobile device. Then, they receive an
encrypted QR code to present along with their passport to a CBP officer, who can complete
the customs and immigration process. This is a typical service that aims to reduce queuing
times by forwarding secure identification credentials. TSA is currently investigating how to
implement biometrics so that to ensure that the forwarded credentials belong to the mobile’s
owner22.
Telcos SIM cards
Telcos SIM cards constitute a typical example of secondary identity as operators are required
by law to control the ID of their customers23. In certain countries, telcos might provide
complementary services such as payment or wallet24. However, there is not always a direct
link between the SIM and the user, as it is the case for prepaid cards.
Regarding online services, users can be authenticated by various means, depending of the
security level of the on-line service - login/password might be enough in many cases, prior a
signature certificate is used for contractual issues. As said before, biometrics will become a
considerable market to ensure that online transactions are secured and initiated by the
device’s owner.
22
Mobile Passport Control is now available at five US airports, with San Francisco International Airport
the latest to introduce the service.
Mobile Passport Control (MPC) is now available to passengers arriving at San Francisco International Airport. The
airport becomes the fifth to offer the service, joining Seattle-Tacoma, Chicago O’Hare, Hartsfield-Jackson Atlanta
and Miami international airports.
The FTE Award-winning U.S. Customs and Border Protection (CBP) MPC app allows passengers to submit their
customs declaration via their mobile device. They then receive an encrypted QR code to present along with their
passport to a CBP officer, who can complete the customs and immigration process.
The service, which helps to reduce queuing times, can be used by US citizens with a valid US passport and Canadian
citizens with a valid Canadian passport and B1 or B2 visa status.
San Francisco International Airport Director John L. Martin said: “As international traffic grows at SFO, we continue
to seek innovative ways to expedite the arrival process for our international travellers. With the expansion of
Mobile Passport Control to SFO, our customers now have an efficient new option that allows them to bypass a
traditional queue.”
Assistant Commissioner for Office of Field Operations Todd C. Owen added: “With the continued expansion of MPC,
CBP is following through with our commitment to improving the international arrivals experience for travellers. CBP
remains committed to making a traveller’s entry into the United States as secure, paperless, and efficient as
possible.”
23
In Spain, a control of the ID became mandatory after the use of a SIM card for detonation in 2004
Madrid bombings
24 http://www.vodafone.es/particulares/es/descubre-vodafone/sacale-partido-a-tu-movil/wallet/
30 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Access control by mobile
Considering the high level of security provided by mobile infrastructures, companies are
considering how to merge security and convenience by transforming smartphones into
trusted, easy-to-use digital credentials to replace keys and smart cards for access control
issues. The objective is to open doors in restricted areas by the means of mobile devices
taking into account the possibility of sending and revoking mobile identities in almost real
time. Therefore, mobile access control presents the opportunity to alter how we interact with
our environment. Technologies such as NFC, Bluetooth, iBeam and iBeacon constitute the
typical infrastructure to communicate with databases and monitor the access. Emulating a
credential by the means of mobile devices requires building up an ecosystem in the form of
Trusted Service Managers (TSM) to secure the access of restricted zones.
3.3.3 Bank ID
In some northern countries (Norway, Sweden…), eID solutions have been deployed for
citizens’ identification purposes (see WP2 for description of BankID in Sweden and Norway),
and banks shall be considered as major actors for the provision of new infrastructures and
solutions:
 In Sweden, banks have taken the role of eID issuers (primary ID): citizens can be
enrolled in agencies to get either a single eID, or a dual eID including a bank ID. By
the means of this bank ID, end-users can log-in to banks or administrative websites
as well as sign documents online.
 In Norway, banks are issuing bank ID which can be used for online authentication
and signature purposes.
It shall be pointed out that, in Europe (and even worldwide), there is no example of
interoperable credit/debit cards with eID credentials (There are no dual cards with both
credit/debit and eID functions). To ensure the interoperability of authentication
infrastructures between the financial sector and administrations, technology and processes
shall rely on standard protocols:
 Software mechanisms used to identify and authenticate online customers
(certificates, tokens…)
 Hardware infrastructure to monitor the customer relationships all over the
banking channels (branch…)
The most common mechanism for identification and authentication purposes is a centralized
PKI (Public Key Infrastructure, to verify the eID certificates). This infrastructure can be
provided by both public and private Certification Service Providers (CSP). The use of
governmental e-ID for the banking sector requires:
 A technical integration between the bank infrastructure and the Certification
Service Providers (or recognition of bank institutions as Certification Service
Providers)
 Provision of e-ID readers to allow different means of connection.
o In bank branch if eID is used for customer authentication.
o At customers’ premises for online connection purposes. This deployment can
be mutualized with other providers of eID program.
The European Commission, in cooperation with the EEMA (association for identity and
security) has already pioneered several initiatives to analyze the business case of banking
31 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
eID25 issuance. The objective is to identify the levers to remove the barriers and contribute to
the implementation of such eID schemes. Following a set of conferences gathering
representatives from banks, payment companies and banking associations, the following
arguments have highlighted the role of eID:
 First step and key enabler of the Digital Single Market (DSM) by contributing to
cross border business perspectives for the banking sector.
 Leverage the provision of banking online services by streamlining the customer
experience.
 Facilitate customers’ relationships, by optimizing AML and KYC requirements, and
accelerate the transition to paperless processes.
 Reduce the risk of customer onboarding, especially for credit activities.
To promote the exchange of experiences and perspectives among the banking sector, both
European Commission and EEMA continue to organize conferences and meeting with
appropriate stakeholders. The business perspectives for the banking sector could also be
analyzed from several points of view:
 Either the banking sector is considered as a user of eID infrastructures provided by
governmental services,
 The banking service becomes part of identification and authentication
mechanisms as a recognized service provider (taking into account that this sector
has already developed this kind of infrastructure).
Over the last decade, banks have implemented new services over digital channels and gained
a valuable experience in online relationship management. Especially, they have reached a
suitable balance between security of identification and authentication mechanisms on one
side and customer facilitation on the other side. Ensuring a convenient customer experience
has become a key issue for the banks as mobile apps considerably facilitate regular access
(more than once per week) far more often than to administration (2 times per year).
The ease of use is one of the reasons why - even in countries where interoperability with eID
exists, such as in Spain - banks often propose several ways of identification or authentication
for both customer onboarding and access to financial services. Typically, individuals prefer
not to use their eID to access financial services and rely on the banks own credentials.
Banks have already deployed secure identification and authentication mechanisms, especially
for their own needs, such as to meet the most up-to-date fraud cases and attacks. Indeed,
over the last years, financial institutions have become the main targets of criminal
organizations, especially for digital channels (web and mobile). Security could thus be an issue
for interoperability:
 Any interoperable e-ID mechanism shall be able to provide a high level of security
and evolve continuously in order to meet up-to-date in fraud threats and trends.
 In case of interoperable e-ID mechanism, a Service Level Agreement and
associated responsibilities in case of fraud should be defined.
The evolution of the banking sector regulation is also modifying the way European financial
institutions are managing the security of their customers for digital channels. Indeed, a set of
25See:
http://ec.europa.eu/digital-agenda/en/news/eid-business-case-banking-and-financecommunity
32 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
regulations is under analysis or deployment with the objective to provide the European retail
banking with enhanced protection. Two initiatives shall be highlighted here: the European
Banking Authority (EBA) security guidelines and the Payment Service Directive.
EBA guidelines.
New recommendations have been published by the European Forum on the Security of Retail
Payments (SecuRe Pay), namely the Final guidelines on the security of internet payments
(December 2014) which promotes strong authentication features for internet payments.
Payment Service Directive
The first Payment Service Directive (PSD 1, 2009) aimed at providing legal foundation for the
creation of a European payment single market. A new release (PSD2, 2014) recommended
new roles and responsibilities for payment, in particular:
 The possibility for new actors to have access to European customers accounts
operated by financial institution (access for information and payment initiation)
 The implementation of strong authentication mechanism for all electronic remote
transactions (including consultations).
As a consequence, interoperability issues between primary ID and banking sector credentials
should take into account the upcoming regulation, in particular:
 New actors and related eco-systems.
 Authentication schemes between payment actors (financial institutions, account
aggregators…)
Interoperability schemes within the financial sector should address the various banking
processes, from customer onboarding to on-line services provision. Nevertheless, the main
interoperability issue is related to the process of opening a bank account for a EU citizen in a
Member State which is not his place of residence. In 2012, a Special Eurobarometer (Retail
Financial Services, European Commission, February 2012) indicated that in the EU, only
around 3% of consumers have opened a payment account in another Member State.
The Directive 2014/92/EU on transparency and comparability of payment account fees,
payment account switching and access to a basic payment account was adopted in July 2014.
This Directive is a step towards a single market for retail financial services, since it provide all
EU consumers, even those that are not resident of the country where the bank is located and
irrespective of their financial situation, with a right to open a bank account. For instance, in
article 11 of this directive, an obligation is given to former financial institutions of the citizen
to provide assistance to the consumer who requests to open a bank account in another
member state. At this stage, the two main constraints address the basis for opening of a bank
account in another country:
 Identity proof: since primary IDs are heterogeneous in all Member states, financial
institutions often require that citizens provide resident credentials. These are the
only one to be able to comply with KYC regulations. Based on Directive
2014/92/EU, resident credentials may not be necessary any more, but financial
institutions do not have any other ways to identify their customers.
 Evidence of financial resources. This constraint should disappear with the
2014/92/EU regulation.
33 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Within EU member states, where no eID scheme exists, several minor initiatives have been
launched to allow the private sector to propose alternative options. This is the case in
Switzerland, UK and other countries where industry has implemented on-line authentication
procedures. The current low level of interoperability is due to several factors:
 Technical interoperability: there is no standard at this stage to allow a seamless
authentication interoperability between several private actors
 Business perspective: there is no clear business perspective for banks, telcos,
insurance companies, etc.. to provide an authentication service that will benefit
other stakeholders of the private sector.
 Risk and responsibilities issues : there is no regulation today precisely defining
both roles and responsibilities of identity service providers
An alternative might arise from major software players; a kind of electronic authentication
interoperability is growing, based on the initiatives of GAFAs. Indeed, Google (with Google
Connect), Amazon (Login with Amazon) and Facebook (Facebook Connect), but also Paypal,
Twitter and Microsoft are providing login services which might become major players in the
future. Based on Oauth 2.0 and OpenID standards, these services can be used by end-users to
log-in on retailers or service providers websites. The level of security associated to these
mechanisms is not that sure at his stage. Moreover, identity theft of social networks
credentials shall be considered as quite easy and widespread. For these reasons, the provision
of GAFA’s authentication services remains quite limited at this stage and banks will remain
more reliable stakeholders for the provision of on-line services and initiate interoperability
schemes with other providers.
34 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
4 Taxonomy of ID Theft / threats
4.1
Government ID Theft / threats
4.1.1 Delivery
As detailed in the previous pages, the main threats arise more from frauds against ID
credentials themselves rather than against government documents which become more and
more secure. A blank stolen document (quite difficult to obtain!) has as a very high value
whereas a counterfeit or stolen passport might be detected by police forces. Threats again
passports can be summarized as follows:
Type of threat
Severity
Prevention
Access
to
basic
credentials (date/ place
of birth)
High
Recommend individuals not to disclose sensitive data
on social networks
Duplicates
High
Ensure a biometric check prior delivery.
Applicant presents himself during the delivery
Blank stolen document
Counterfeit
High
Medium
Transport procedure should be secure
manufacturer to government agency.
from
Educate police forces and staff in charge of document
authentication.
Authenticate documents by the means of dedicated
readers.
Stolen
Medium
Utilise Interpol STLD database.
Access to basic credentials constitutes one of the main threats as exchanges in the physical
world have always been built on thrust. Individuals are not used to suspect each other. For
this reason, they really give up part of their identity during day to day private or business
relationships such as (not exhaustive):
Type of action
Type of threat
Prevention
Retail transaction
Copy or reference to ID Ensure the legitimacy of both
documents.
Name, stakeholders
address, bank
Stolen purses / wallets, “Physical”
document Surveillance of belongings
pickpockets
becomes available
Stolen
documents
personal Name,
data
address,
critical Surveillance of belongings
Stolen surface mail
Name,
data
address,
critical Secure letter box and mail
delivery
Dumpster diving
Name,
data
address,
critical Destroy documents
Deceased person
“Impersonation” by means Secure belongings after death
35 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
of stolen credentials
Shoulder surfing
Dishonest
corruption
Critical data
employees, Name, address, (bank, Employees recruitment
data/ place birth…)
Call centers
Name,
data
Imposters
Critical data
End
of
relationships
Public places not suitable to
consult sensitive information.
address,
critical Employees recruitment
Ensure the legitimacy of partners
business Name, address, (bank, Ensure the legitimacy of business
data/ place birth…)
partners
Although the list of cases detailed above is not exhaustive, it shows that the likelihood of
threats against ID in the physical world is extremely wide. As most of the social and business
relationships have been built on thrust, individuals are used to abandon sets of critical data
during their day to day activity: name,
address, date of birth, banking information,
Type of data
Importance
etc… which can be further consolidated and
help
building
an
identity
and Home address
Medium
“impersonating” someone without his
Given name
High
consent or even the knowledge that his ID
has been stolen. Most of the “prevention” Christian name
High
rules shall be considered as basic
“guidelines” but, in many cases, they cannot Social Security number Medium
prevent an illicit action if the fraudster is Birth Date
High
determined to attain this objective.
It is worth recalling
that ID controls
remain
quite
infrequent
in
Europe,
even
though the security
context has been
heightened.
Citizens are not
required
to
systematically
authenticate
themselves
as
confirmed by the
IBS (Institute of
Baltic Studies).
As an example, the
French citizens use
Figure 13 Institute of Baltic Studies, Survey on ID issues
their “government
issued document” less than once a year to prove their ID, be it in government or private
buildings. This survey confirms that frauds occur more based on attacks, deliberate intents or
negligence rather than during controls.
36 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
5 Consequences of ID theft
Stealing an individual’s identity does not, on its own, constitute a fraud and this is an
important distinction. The “victim” can accept this situation, as an example to help someone,
by passing a university exam on his behalf. And “strict sensu”, one cannot steal the ID of a
living person or even a deceased individual. On the contrary, Identity fraud describes what
action might be carried on as a consequence of ID theft or a fake ID. In this case, an individual
will engage in a criminal activity by the means of a fraudulent ID to obtain goods or services
by deception.
5.1
Consequences of government ID theft
Depending on the type of «captured document, the consequences of ID theft can be multiple.
As an example, a passport is ranked at the highest level as it opens a wide range of activities
from physical world practices to government related activities. Most of the time, the illegal
ownership of a passport conducts to criminal activities:
Government related consequences to ID theft
Type
of Type
stolen
activity
document
Passport /
ID card
of
Severity
Prevention
Illegal
immigration
Medium
Interpol
database
STLD
Contraband /
smuggling
Medium
Interpol
database
STLD
Flight
justice
High
Interpol
wanted
individuals
Escape a sentence
High
Interpol
database.
Impersonation of an unsuspected
individual to conduct illegal
activities against government,
people and civil infrastructures.
from
International
terrorism
Action performed
Cross borders
Obtain status (refugees, migrant)
in destination country.
STLD
Interpol
wanted
individuals
Illegal trade on narcotics,
weapons as well as human
trafficking under another name.
INTERPOL’s Stolen and Lost Travel Documents (SLTD) database enables National Central
Bureaus (NCBs) and other authorized law enforcement entities (such as immigration and
border control officers) to ascertain the validity of a travel document in seconds. The SLTD
database was created in 2002, following the 11 September 2001 terrorist attacks in the USA,
in order to help member countries to secure their borders and protect their citizens from
terrorists and other dangerous criminals using fraudulent travel documents26.
The STLD Database is not at all the panacea as its connection is not mandatory, even for
border control purposes. The recently implemented Checkit system constitutes an easy
interface for ensuring the legitimacy of a passport. Organized criminal groups and terrorists
use stolen travel documents to conceal their identities and cross borders undetected. Given
this threat, and faced with increasing volumes of international passengers, countries urgently
26
http://www.interpol.int/fr/INTERPOL-expertise/Border-management/SLTD-Database
37 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
need to heighten their border control and identity management measures. I-Checkit is an
innovative solution that complements and enhances national border security systems by
allowing the law enforcement community and trusted partners to conduct advanced
passenger checks in real time.
In
November
2015,
INTERPOL’s
member
countries endorsed the ICheckit Airlines solution as a
key component of the
Organization’s global border
management strategy.
This decision followed a 16month pilot project with
AirAsia which demonstrated
the value of I-Checkit in
mitigating the criminal risks
that are behind identity fraud
and
gathering
police
intelligence, especially in
countries
without
fully
integrated border solutions27.
Type
of Type
stolen
activity
document
Resident
permit
Figure 14 Typical "fake" passport that need trained border control
to be identified
of
Severity
Prevention
Action performed
Social benefits
Medium
Biometrics
authentication
Take advantage of various social
services: health, financial support
Working
permit
Medium
N/A
Working activities under a false
identity
Type
of Type
stolen
activity
document
of
Severity
Prevention
Action performed
Breeder
document
of
Medium
Definition of a
recognised
international
standard.
Biometrics sample
within a chip.
Obtain a passport or ID card by
impersonating a wrong identity/
Provision
national
credential
27 http://www.interpol.int/fr/Expertise/I-Checkit
38 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Social consequences of ID theft
Category
of
consequence
Type of activity
Severity
Action performed
Industry
Employment
Medium
Being employed under a wrong identity
Industry
Hostile
intelligence
Medium
Illegal access to confidential information, as
would be the case for the proper owner of
the stolen credential. Might conduct to
considerable economic loss for victims in a
business context
Industry
Economic crimes
Medium
Carrying on a wide range of financial
activities
without
to
bear
their
responsibility: opening a bank account,
then being granted a credit card, etc…
Social
Get
again
Medium
Being married under a wrong identity to
avoid bearing the social responsibility of a
previous family situation.
married
Identity Fraud represents a holistic process starting with stolen credentials which allows an
imposter to build up an entire new life. Either there will be a profit based on fraudulent data,
or the theft scenario conducts to human trafficking or terrorist activities. Western European
countries constitute typical targets as social benefits become a “right” for ID holders and due
to privacy protection; there is no consolidation of databases to prevent the misusage of
fraudulent acquired credentials.
Figure 15 Typical Identity theft Scenario
39 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
6 Cyber ID Theft
6.1
Cyber threat vs physical threat
As more and more procedures can be
conducted on the internet, the cyber world
constitutes a new challenge where both
personal and business relationships shall be
structured.
Since only a few Member States28 have
delivered secure eID cards containing
authentication and signature certificates,
the internet world represents a new and
profitable target for illicit activities.
Even in MS where secure government cards
have been distributed, citizens remain
extremely slow to change their habits and
use on-line tools to engage in contractual
relationships.
The Eurobarometer, published by the
Figure 16 Downloading or updating software
Commission contains very useful figures to
constitutes a new risk as it might contain malicious
evaluate how our fellow citizens are gaining
SPAMs
in confidence when connecting online. One
notices a growing interest in on-line activities, a better awareness of the risks incurred while
an extreme cautiousness modify the habits gained in the physical world.
6.2
Cyber theft against government ID
6.2.1 Setting the scene
Due to the lack of secure national ID cards in Europe, many business exchanges yet mix both
physical world and internet practices: critical documents are yet scanned and forwarded by
mail (ID Cards, driving licenses, passports, electricity bills, bank/ telcos records...).
On the other hand, individuals are requested to fill in forms on-line containing basic
credentials and critical data (address, credit card numbers, etc… ) .
By definition, on-line world does not offer a face-to-face contact with the party in presence,
be it a social relationship or a potential new client. This means that each stakeholder of the
exchange process becomes a point of weakness.
Stakeholder Type of weakness
Prevention
28 See EKSISTENZ D2.1 “Draft inventory of citizen ID processes and constraints in EU”
40 | P a g e
WP3 “Threat assessment and economical aspects”
User
Equipment
December 2015
Communication of sensitive data.
Identify receiving
communication.
party
Usage of shared IT equipment
Shared IT equipment shall never be
used to communicate critical
information (credentials)
Connection to unsecured sites
Identify receiving
communication.
Poor authentication procedures
Select Login/ pw that cannot be
guessed from illicit parties.
Connection via public WI-FI
Shall not be used for secure
transactions
party
prior
prior
Lack of basic security features Provision of basic hw/sw protection
(antivirus / spam / trojans, firewall)
Unsecure telcos connection
Select reliable provider
ISP
Security breaches
Ensure reliability before subscribing
and basic security features
Service
provider
Unreliable
Ascertain the legitimacy of partners
prior exchanges on the internet
Not used before
Avoid too critical data being sent to
new business partners
Fake service provision
Ascertain the legitimacy of partners
prior exchanges on the internet
Counterfeit service provider
Ascertain the legitimacy (eg. URL) of
partners prior exchanges on the
internet
As detailed above, each module in the exchange process can become a target for illicit
activities. Critical credentials exchanged on the internet might be hacked at any stage of the
process, each module offering vulnerabilities and weaknesses. For these reasons, many
defense companies do not allow their employees to communicate when on the move,
whatever the security of their IT equipment and the likelihood to access private networks.
On the internet, both business information and critical credentials can be accessed. Even
though industry exchanges have their specific concerns, hacking credentials has the same
value as it is the case in the physical world for dumpster diving or stealing surface mail.
6.2.2 Critical data in the cyber world
As both cyber and physical world coexist, exchanges on the internet constitute a huge
opportunity for fraudsters to illegally take advantage of basic credentials. User name / pw,
PIN Codes as well as social networks leverage their likelihood to get access later on to basic
credentials that will be used in the physical world for social, business or criminal activities.
41 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Credentials in cyber world
Usage
Prevention
User name / login
Access individual’s account
Avoid easy login scheme
Password
Access individual’s account
Avoid “guessable” pw
PIN CODE
Access individual’s secure Avoid “guessable” PIN
account
Social network account
Access private information, Secure access
relationships etc.. for further networks
illegal activities
to
social
6.2.3 Most frequent cyber attacks
As EKSITENZ focuses on ID threats and consequences in both physical and cyber worlds, it is
not our purposes to detail the various categories of attacks that can be launched on the
internet29. We are here more interested in how ID and various credentials might become a
target for illegal activities, as a consequence of cyber exchanges. The following list of frequent
attacks is not exhaustive; but it aims at showing how cyber exchanges can be used as a means
to take hold of basic credentials which will be used for building wrong identities. Therefore,
the cyberworld constitutes a wide repository that will cross fertilize with physical world fraud
attempts by allowing taking advantage of basic credentials currently used for the delivery of
government documents.
Type of attack
Usage
Hacking computer system
Getting access to computer Install basic hw/ sw security
and personal information
features
Phishing campaigns
Invite individuals to connect Ascertain the legitimacy and
to
websites
to
steal address (URL) of service
credentials, financial records providers.
Account hijacking
Getting access to critical Secure access to accounts.
information
Avoid
“guessable”
connection procedure.
Forged
account
social
Stolen
smartphone
Exploiting
equipment
network Impersonate individual to Get informed “in time” to
take advantage of relatives prevent damages
and business relationships
computer, Get access to personal Secure
“physically”
information, contacts details, equipment
used
Contactless readers
Storage media
memory
Get access to credentials
,
IT
IT Get access to personal Suppress hard disk before
information, contacts details getting rid of IT equipment
Implement access control
features to read credentials
USB Get access to personal Secure
“physically”
IT
information, contacts details, equipment and storage
etc…
facilities.
29 This is the typical scope of the eCRIME project.
42 | P a g e
Prevention
WP3 “Threat assessment and economical aspects”
December 2015
Even though it is not the purpose of EKSISTENZ to assess the various threats that can occur in
the cyber world, it is worth recalling how “phishing” proceeds for getting hold of both
credentials and financials sensitive data; but in the framework of this report, we will
concentrate only on credentials issue.
The phishing scenario is quite straightforward: a deceptive email message sent from a so
called “ legitimate” source to verify individual’s account information. The website can be
similar in appearance to a legitimate site, even though a thorough exam of the address might
indicate a suspicious URL. Upon the user’s acceptation, malicious software will be
downloaded automatically to record basic credentials to access target services. Messages
from false charities request direct donations in cash or credit card data. Fake social networks
contain a link to compromised websites (social phishing). Phone calls might ask to dial a
phone number and enter credentials and authentication codes.
Figure 17 The phishing scenario
6.2.4 Cyber world attacks against government documents
As detailed in the previous paragraphs, threats and damages against government credentials
are not that significant in the cyber world, since eID cards are not that common among MS.
Most of the illegal activities concern the exchanges on the internet with the view to get hold
of basic credentials rather than attacking the documents themselves.
On shall regret that MS are that poor in terms of electronic ID although considerable efforts
have been done to promote the concept of a European ID card – as well as driving license and
resident permit - that will hold authentication and signature certificates to connect to
government websites and engage in contractual relationships.
Concerning the attacks against national eID cards usages in the cyber world, they will take
advantage of the weaknesses of the exchange architecture security procedure. Contrary to
current Login/ pw standard connections, certificates contained in the card are used for
authentication purposes. This requires that an end-to-end procedure has been put in place
from enrolment to the end of the card life cycle.
43 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Action
Threat
Prevention
Enrolment
Impersonation of an individual
Applicant shall present himself for
delivery
Fake identity
Control of basic credentials (date/
location of birth)
Access control to card features
Provide strong authentication means
based on PIN by login/pw or
biometrics
Authentication Illegitimate usage
Illegitimate use
revocated cards
Signature
of
stolen
Illegitimate usage
Illegitimate use
revocated cards
End of cycle
Authentication certificate activated
by PIN code or biometrics
Misusage
/ Monitoring of
Revocation Lists
CRL,
Control
of
Authentication certificate activated
by PIN code or biometrics
of
stolen
/ Monitoring of
Revocation Lists
CRL,
Control
of
Control
of
Revocation procedure
Monitoring of
Revocation Lists
CRL,
6.2.5 Typology of attacks against “government” documents
As detailed in the previous paragraphs, it is too early to set up a typology of attacks and
threats against government documents in the cyber world as their usage remains quite
limited, even in the countries benefitting of electronic credentials.
As detailed by the slide
realized by our partner
IBS (Institute of Baltic
Studies),
Spanish
citizens remain quite
reluctant to use eID to
authenticate
themselves
in
the
cyberworld.
Indeed, the “daily”
usage represents only a
few % whereas “never”
corresponds 40-60% of
the responses.
Concerning the usage of
electronic signatures, the
Institute of Baltic Studies
44 | P a g e
Figure 18 Institute of Baltic Studies, survey on ID. The usage of
eSignatures
WP3 “Threat assessment and economical aspects”
December 2015
indicates that only a few
citizens are yet prepared
to change their habits
(Average 10%).
In most of the surveyed
countries,
eSignature
constitutes an exception.
A part Italy, a high
majority of individuals
“Stongly disagree or
disagree” with this new
way
to engage
in
contractual relationships
on-line.
Figure 19 Conclusion of the IBS study concerning ID theft
For these reasons, IBS
concludes their survey by
stating that “ID theft
involving
government
issued identity documents
is relatively rare”.
However, it is worth
mentioning
that
EU
citizens are much in favor of an “Electronic Card and secret PIN code” to authenticate
themselves for secure
Figure 20 Institute of Baltic Studies, survey on ID. Conclusion
internet
services
(government and banks).
In most of the surveyed
countries, a secure eID card
is ranked #1, slightly ahead
to passports. An opinion
which confirms the global
confidence of citizens in
their
governments’
documents.
Depending of the country,
then come “fingerprint
checked with a special
device” and mobile phone
authentication systems.
Figure 21 Institute of Baltic Studies, survey on various ID
authentication schemes
This last slide clearly indicates that our fellow citizens are accepting to authenticate
themselves online by the means of a secure ID. But the signature remains linked to the hand
45 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
and a physical presence of the parties. This statement is quite contradictory since the
Directive on electronic signatures already dates back from 1999 30 whereas the eIDAS
regulation which clearly addresses authentication means is quite recent.
This various statements clearly demonstrates that – for the time being – the main threats
again government eIDs still arise from the physical world rather than from the cyber world.
Type of threat
Context
ID document Theft
Physical world
Low
High
ID document counterfeit
Physical world
Medium
Medium
Blank stolen document
Physical world
Low
High
Negligence on credential
Physical world
High
High
On-line signature theft
Cyber world
Rare
High
authentication Cyber world
Rare
Medium
Medium
High
On-line
theft
Negligence on credential
Cyber world
Risk
Consequences
As stated above, cyberworld does not constitute yet a considerable risk for ID and eSignature
issues, as their usage remains quite limited in the Member States. The main threats arise
more from low security exchanges on the web where either credentials can be intercepted
and help building an ID or conduct to severe financial damages by the means of stolen critical
data (bank account number, credit card number, etc…)
It is anticipated that threats against government credentials in the cyberwolrd will certainly
growth in the future, if national eID become a rule or if more service providers propose offers
on the web, where authentication and signature will be considered as a standard. The recent
trends coming from migration issues and towards more security in Europe, as a consequence
of the extreme travel flexibility within the Schengen zone, might conduct to more MS
initiating national ID programs for better authenticating their citizens and facilitating on-line
services.
30
Directive 1999/93/EC of the European Parliament and of the Council of 13 December 1999 on a
Community
framework
for
electronic
signatures.
http://eur-lex.europa.eu/legalcontent/EN/TXT/?uri=celex%3A31999L0093
46 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
7 Taxonomy of victims
7.1
Internet usage in the MS
Citizens are not equal vis à vis
fraudsters. Becoming a victim
depends from various factors
ranging from country, age,
internet education, etc…
Many surveys help better
understand the strategy of
fraudsters and how implement
security services that might be
able to counter the threats.
Two surveys dated 2005 and
2013 clearly demonstrate that
young individuals (18-39), the
more involved in life and
business activities, are the main
victims of ID thefts.
Figure 22 Survey on ID fraud by age. 2005
As people get older, certainly
because they become more
cautious and stable in their
business and social activities,
they are less prone to become a
victim.
In 2008, Experian conducted an
analysis into some of the
10,000+ victims of identity
fraud. It found that the typical
victim of identity fraud was the
following individual:
Figure 23 Survey on ID fraud by age. 2013
 26-45 years old
 Working in a
professional
occupation
 Owner/occupier (usually in a
detached house)
 Earning over £50,000 (these are 3
times more likely to be victims)
 Directors of companies.
This means that the “profile “of the
typical target is a young professional
individual, educated, internet skilled
with substantial revenues.
47 | P a g e
Figure 24 US Federal Trade Commission. Survey on
consumers complaints 2013
WP3 “Threat assessment and economical aspects”
December 2015
Based on these figures; fraudsters tend to target – for obvious reasons – those individuals
likely to have significant credit ratings, where their chances of both rewards and success are
greater. Even though it depends of the country, a rough estimate of 14% corresponds to an
average of people having suffered an ID theft during a calendar year. This case can be ranked
#1, ahead to debt collections, scams and other complaints.
The Eurobarometer on cybersecurity is a survey Conducted by TNS Opinion & Social, in a
response to a request by the European Commission, Directorate-General for Home Affairs
and co-ordinated by Directorate-General for Communication31.
This survey addresses security issues in the 28 MS, considering that cybercrime becomes a
borderless problem, consisting of criminal acts that can be conducted across countries and
take benefit of national weaknesses.
The scale of the problem becomes a threat to law enforcement response capability bearing in
mind that more than 150,000 viruses and malicious code circulate with the consequences of
attaining a million people victims every day. This survey aims to understand EU citizens’
experiences of cyber security issues so that both regulation and technical measures can be
implemented in the future.
At first, the survey indicates that a substantial minority of EU citizens (24%) responded that
they do not access the Internet at all; this includes 18% who never access the Internet and 6%
who say they do not have any Internet access. However, among the people who use the
Internet, the habits can considerably differ, by age, social and business activity. Therefore,
63% of EU citizens use the Internet every day (or almost every day), while a smaller
proportion (13%) uses the Internet less often32.
The highest levels of Internet usage can be seen in the northern countries: Sweden (96%), the
Netherlands, (95%) and Denmark (94%). A high proportion of respondents in these countries
access the Internet every day, whereas very few say that they never use the Internet or do
not have Internet access (4% in Sweden, 5% in the Netherlands and 6% in Denmark).
It is not surprising that eastern and certain southern European countries - who do not yet
benefit of high speed infrastructures – are the lowest internet users: Romania (54%), Portugal
(56%), Greece (58%) and Bulgaria (60%). Respondents in these countries are also least likely
to access the web on a daily basis (36% in Romania, 47% in Bulgaria, 47% in Greece and 48%
in Portugal)33.
31 http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf
32 More than half of EU citizens (60%) use the Internet at home every
day or almost every day. A further
14% of respondents use the Internet at home less frequently (two or three times a week, about once a
week, two or three times a month, or less often), while around one in four (26%) say that they do not
access the Internet at home at all; this includes 17% who never use the Internet at home and 9% who
say they do not have any Internet access at home.
http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf p.9
33 A similar pattern can be seen for Internet use at work. Respondents in Sweden (67%), the
Netherlands (65%) and Denmark (64%) are most likely to use the Internet at their place of work, while
the lowest proportions can be seen in Romania (22%), Greece (23%), Portugal (25%), Bulgaria (27%),
Spain (27%) and Hungary (29%).http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf
p.10
48 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
The age itself is certainly a factor of internet maturity as detailed by the EU survey, people
over 55 are much less likely than younger groups to access the Internet (only 47% of those
aged 55 or over ever use the Internet), while the youngest age group (15 -24 year olds) is
most likely to connect every day (92%). A statement which confirms that internet damages
will growth in the future, as the young generation will never give up their habit to regularly
surf on-line.
The main “internet population” is constituted of those who need to access the web for both
social and business activities; students and white collar workers are also more likely to
regularly surf on the web. For example, 95% of students, 91% of managers and 85% of other
white - collar workers indicated that they connect every day34. A very high ratio indeed that
shall anticipate that more stringent measures should be put in place, should the web continue
to offer a sound means of exchange between individuals.
Let us also recall that gender also impact the habit of users, internet usage being higher
among men than women (67% of men access the Internet every day, compared with 59% of
women).
Figure 25 Eurobarometer survey by age, occupation and gender
34 The
highest use of the Internet at other locations (such as at school, university or at a cyber-café) can
also be observed in Denmark (63%), the Netherlands (60%) and Sweden (59%). Respondents in Romania
(22%), Hungary (22%), Bulgaria (23%), Greece (24%), Portugal (25%), Slovakia (25%) and Lithuania
(25%)
are
least
likely
to
use
the
Internet
in
other
locations.
http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf p.10
49 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
The table above clearly indicates differences in the way our fellows connect to the internet,
depending of their age, gender, social or business situation. Theft and damages are not
always linked to the web usage as frequent users are also quite educated and conscious
about dangers and benefit of tools and security shields that they share with fellows with
similar concerns.
7.2 Mobile as a new
vector of internet
damages
Although computers remain
the most common means to
connect on-line, over half of
the
respondents
(61%)
indicated that they access
Internet
through
a
smartphone. A substantial
increase compared to the
previous year.
As mobile users take
advantage of public Wi-Fi and
telcos networks, this increase
shall be considered as a new
threat in the future as users
will certainly less benefit of
secure IT protections.
As the usage of mobile
equipment to connect on
Figure 26 Eurobarometer usage of computers vs other connection
the internet has almost
means for internet access
doubled in one year (20132014), protecting the smartphones and individuals on the move will become a challenge in
the coming years35.
Since the majority of individuals use alternatively their computers or mobile equipment for
similar purposes, but depending of their current situation (office, home, transport, on the
move), very similar activities will be operated with equipment benefitting of different
protection means. This means that internet service offers shall provide extremely secure
authentication means (certificates, PIN or biometrics authentication) to allow both secure
and mobile usage.
35
The main socio-demographic differences in means of accessing the Internet are by age. The use of a
smartphone for Internet access is much higher among younger people, ranging from 85% among 15-24
year olds to 30% of those aged 55 or over. Use of a tablet is also lower among those aged 55 or over
compared with younger age groups (22% compared with at least 31% in other age groups). The use of
all of the various devices is higher among those leaving education at a later stage. The differences are
most pronounced for use of a smartphone and for a touchscreen tablet.
http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf p.19
50 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Indeed, mobile internet considerably depends of the telco infrastructure. It is extremely
developed in northern hi-tec countries - Latvia (98%), Netherlands (98%). The proportion that
accesses the Internet via a smartphone varies considerably by country.
The highest proportions can be seen in Spain (85%), Sweden (79%), Denmark (74%), the
Netherlands (73%) and Austria (72%). It is not surprising that the lowest proportions can be
found in countries where telcos infrastructures are not that mature: Bulgaria (35%), Slovakia
(38%), Portugal (38%) and Poland (40%)36.
Figure 27 Eurobarometer: Internet culture and security varies considerably among MS
36 http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf
51 | P a g e
p.16
WP3 “Threat assessment and economical aspects”
December 2015
8 Taxonomy of countries
8.1
Taxonomy of countries for ID theft
8.1.1 Social and geopolitical context
Based on the Eurobarometer, just under half of EU citizens (47%) say that they feel well
informed about the risks of cybercrime; specifically, 10% feel very well informed and 37% feel
fairly
well
informed.
However, 29% do not feel
very well informed and
21% say they do not feel
informed at all about the
risks of cybercrime37. The
IT
culture
of
the
respondents
greatly
influences their awareness
of danger when surfing on
the web.
ID theft and damages
greatly depend on the hitec education of our fellow
citizens. In this perspective,
the
Eurobarometer
provides some significant
information.
Almost
47%
of
the
respondent have declared
to be “Very/ Fairly well
informed of the risks of
Figure 28 Eurobarometer Awareness of internet risks
cybercrime, with a slight
increase (3%) since the 2013 survey.
This is rather encouraging, but shall not hide the fact that more than half of the users are not
informed and will become a target of attacks in the future.
As detailed in the previous paragraphs, there are considerable variations between the
countries, corresponding to the infrastructure provision and the education of the users. In
northern countries, where the internet usage and the connection frequency is the most
developed, citizens are well informed of the risks38 they incur when surfing on-line.
37 http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf p.44
38
There is some variation by country in the extent to which respondents feel well informed about
cybercrime. Respondents in Denmark (67%), the Netherlands (67%), Sweden (66%) and the UK (65%)
are most likely to feel very or fairly well informed. The highest proportions that say they feel ‘very’ well
informed can be found in Denmark (23%) and the UK (22%), as well as Ireland (21%).
http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf p.45
52 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
It is not surprising that the countries starting their internet activities are less aware of the
risks. Therefore, people are least likely to feel well informed in Romania (31%) and Bulgaria
(34%), and respondents in these two countries are also most likely to say that they do not feel
informed at all (35% and 36% respectively). To a large extent, these differences reflect overall
levels of Internet use.
Figure 29 Awareness about the risks of cybercrime per country
The table above clearly reflects how the country IT maturity might reflect an awareness of
risks to be incurred on the internet.
Denmark, Netherland, Sweden, UK, Ireland
and Finland are the best prepared to
attacks. However, it is quite surprising that
countries like Belgium, Spain and Italy
appear amongst the less aware of the
dangers!
The same applies to age classes, gender and
business category. But compared to the
previous tables, the most frequent internet
users (young, students, white collars, etc..)
are also the best prepared to meet internet
risks.
15-39 years old citizens who regularly surf
on the internet are the best prepared to
meet the risks and are aware of the
dangers. This statement is quite reassuring
as we expect a new population of frequent
web users to emerge in the coming
decades; and it is of prime importance that
they are aware of the risks incurred and
that sufficient security shields are installed
to meet potential attacks.
53 | P a g e
Figure 30 Awareness about the risks of cybercrime
per social category
WP3 “Threat assessment and economical aspects”
December 2015
Furthermore, a clear majority of Internet users agree that they avoid to disclose personal
information online (89%, including 54% who totally agree), while 85% agree that the risk of
becoming a victim of cybercrime is increasing. Only small proportions of respondents disagree
with these statements (10% and 12% respectively). A majority is quite concerned that their
online personal information might not be kept secure by websites (73%). Most respondents
are also concerned that this information is not kept secure by public authorities (67%), with
30% disagreeing with this statement39. Comparisons with the 2013 survey indicate that
respondents have become slightly more concerned about cybercrime and access web services
accordingly.
This last statement confirms the danger of “phishing” attempts; although internet users are
aware of the dangers, certain sites counterfeit so perfectly the genuine service provider that
they disclose sensitive data without care. A detailed analysis of the current surveys carried on
internet risks confirms that secure authentication providers do not constitute themselves the
main danger whereas counterfeit services and direct attacks on computers generate the main
threats. Despite these concerns, around three in four Internet users (74%) agree that they are
able to protect themselves sufficiently against cybercrime, a statement which confirms the
danger of cyber attacks since threats succeed to hide malicious software behind genuine
service provision (i.e. update a standard desktop tool ).
The highest proportion of risk awareness can be found in northern Europe, where individuals
connect
the
most frequently
on the internet Finland (94%),
Sweden (92%) The lowest levels
of
agreement
can be seen in
eastern Europe Hungary (70%),
Slovakia (70%),
Czech Republic
(71%) – but also
in
Baltic
countries where
on-line services
are
extremely
secure
and,
therefore, risks
are quite low.
Figure 31 Awareness of internet risk by age and connection habits
The following table provides an optimistic view on how risks can be mitigated in the future,
considering the growing awareness of internet users of the risks incurred when they connect
on-line: minimal data forwarded, consciousness of the risks, choice of secure websites, self
protection against internet threats, etc….
39 http://ec.europa.eu/public_opinion/archives/ebs/ebs_423_en.pdf p.48
54 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Based on this statement, a major threat would arise from a non-conscious communication of
personal data, the connection to a counterfeit website or an attack from malicious software
that will steal sensitive information from the user, even though he would be informed of the
dangers and benefit of enough security protection.
Based on the table below, a majority of respondents have confirmed their concerns about
experiencing or being a victim of different types of cybercrime, in particular identify theft
(68%), a bit ahead of those discovering malicious software on their device (66%), being the
victim of bank card or online banking fraud (63%) or even about their social media or email
account being hacked (60%).
The large percentage concerning ID threat issues confirms the awareness of EU citizens of the
new risks incurred when connecting on-line and how their ID might constitute a target if
security barriers are not implemented.
Figure 32 Identity theft ranked 1st risk by EU citizens
The highest levels of concern about ID theft can be observed in France (80%) and Spain (79%).
Two large countries with different context, since France has not succeeded to implement its
eID program; whereas Spain proposes many on-line services although citizens remain quite
conservative and prefer paper based procedures rather than proceed with pioneering digital
services. Respondents in Estonia and the Netherlands (48%) are least likely to be concerned
about identity theft; a more detailed analysis should be able to explain these figures: small
country on one side, with highly secured services; larger country on the other side with quite
skilled and experienced users. It shall be highlighted that EU citizens are more concerned
about identity theft than they were in 2013. Across Member States, there has been an
increase of 16% of very or fairly concerned individuals against internet risks.
Even though our citizens are quite aware of identity theft risks, real victims represent 7% of
the respondents, quite less than malicious software attempts (47%), email hacked (12%),
bank card fraud (8%). This figure is quite significant because the consequences might far more
severe than computer attacks. The percentage is quite similar in most EU countries, although
respondents in Hungary and Romania (11%) are more likely to say they have experienced
identify theft. The lowest levels (3%) can be found in Bulgaria (low development of internet
infrastructures) and the Netherlands (quite skilled users, small country, secure
55 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
infrastructures). The largest increases since 2013 can be found in Romania (up 6 %, poor
infrastructures) and France (up 5 %, lack of strong eID program).
Figure 33 Identify theft represents 7% of the attacks
As detailed by the table below, both Romania and Hungary show the highest scores of ID
theft (10%). Not much ahead certain large countries like UK (10%), Portugal (9%), France (9%)
and Italy (8%) who do not have implemented strong eID programs. Many of these figures
could be considered in the perspective of whether governments or industry have
implemented secure ID solutions; which is not the case for these countries.
Figure 34 Romania, Hungary, UK, Portugal, France ranked first for ID theft
56 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
8.1.2 Scam emails or phone calls as a means to get access to individuals’
details
As said in the previous pages, the most dangerous attacks against credentials do not arise
during the connection to on-line services but rather from being victims or malicious emails.
The Eurobarometer indicates a strong level of concern about such threats that might ask for
computer access or other details. The percentage depends considerably from the country (IT
infrastructure) and the internet culture of the respondents. Not surprisingly, quite low figures
can be found where both internet providers are secure and customers quite aware of
potential threats when surfing on-line40.
As emails often allow access to secure sites and/or contain sensitive data (telephone,
address, company name), on average, 60% of Internet users across the EU say that they are
very or fairly concerned about having their social media or email account hacked. The highest
percentage can be found in Spain (74%), Portugal (72%), Malta (71%) and Croatia (70%),
certainly due to previous attacks or poor protection from service providers. As usual,
northern countries benefitting of secure infrastructures and skilled users are the less
concerned: Sweden (37%), Estonia (44%) Netherlands (46%).
Even though the awareness of internet risks might be very high, real victims represent only an
average 12% of Internet users who admit that they have had experience of their social media
or email account being hacked. This rather limited amount shall be put in perspective with
the social and financial consequences that will affect these victims. Social media and emails
are the entry points for fraudsters to access on-line services on behalf of targeted individuals.
The financial consequences can be extremely severe; but this issue will be detailed in the
context of the EKSISTENZ Deliverable D3.2.
40 By far the
lowest figure can be found in Sweden (just 29% are concerned), while relatively low figures
can also be seen in Estonia (38%), Finland (40%) and the Netherlands (43%).
57 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
9 A country use case: Identity Theft in Latvia
9.1
General situation
As this study aims at highlighting the main trends on ID document in member States, it is
worth addressing the context of a particular country, since there are many similarities, even
though each government has implemented specific means to combat fraud. The wide
coverage of the EKSISTENZ consortium does not allow addressing all the countries
represented; for this reason, it was decided to provide more information on how the Latvian
government responds to threats and attacks and what are the services and tools at the
disposal of victims.
Identity theft in Latvia constitutes a large problem. It is hard to produce reliable statistical
data on this issue, since most of crimes end up by being classified under a different name,
such as “signature forgery” or “falsification of document” and there are also several
institutions responsible for the forensic examination of such cases, making the collection of
cumulative data difficult. According to data from the Latvian Forensic Service Department, in
2013, 401 forensic examinations of signatures were performed, of which 147 were classified
as forged.
9.2
Uses of stolen documents and related crimes
There are various uses for stolen identity documents, depending on the imagination and
intents of criminals. In many cases, they can be used to impersonate someone with the intent
of leaving the country, to fraudulently register companies (e.g. the company is registered in
the name of a fabricated identity but in reality is run by other people), to buy various
expensive goods like mobile phones, computers etc., to apply for loans, to shift criminal
blame on someone else (e.g. a vehicle is stolen and at the crime scene an identity document
of an innocent person is found, presumably left behind by the actual perpetrator in order to
misdirect the investigation and gain time).
In regard to falsification of documents, the main desired purpose is to receive additional
money as benefits from the Latvian state and acquire discounts for the use of public transport
or other public services. Such documents are disability certificates, orphan certificates etc.
Perpetrators tend to change the photos in order to receive benefits.
Falsification of security and other certificates enables offenders to pretend that they possess
certain skills without having gone through or having paid for the necessary courses and for
the certificate itself. The situation is similar with falsified Sanitary Books for retail sellers,
which help to prove that they don’t carry dangerous diseases.
Falsification of primary documents (passports and national eID’s) is also common although it
is not as easy and the use of certain technologies is required to do so. Usually those types of
documents are stolen and used for various purposes (some of them were mentioned in the
previous sections).
Secondary identity documents – bank cards and driver licenses – are also frequently falsified.
As bank cards are harder to falsify, criminals tend to steal data that will help them to use
already stolen bank cards, otherwise avoid using bank cards at all. Identity data can in many
cases be gathered online, not just by stealing someone’s wallet or going through their trash.
58 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
The falsification of driver’s licenses is very common. There have been especially weird cases,
where Latvian citizens were caught bearing Paraguayan driving licenses. To illustrate some
numbers and extent of such cases as well as main sectors in which they are used, the Forensic
Service Department has collected the statistical data of falsified handwritings/signatures used
in above mentioned cases over a number of years.
.
Year
2008
2009
2010
2011
2012
2013
2014
33
28
29
24
17
37
60
Telecommunications
contracts
92
57
75
31
43
33
34
Loan
agreements
(mainly - fast credit
applications)
66
63
67
27
51
20
48
Other financial documents
(rental contracts, etc.)
35
43
46
49
44
28
26
Cases of
Register
Enterprise
Figure 35 Falsified signatures in various business sectors (Latvia)
It should be noted that the table shows just numbers of cases where falsification of
documents were found. The actual number of falsified documents varies significantly from
case to case and could be from a couple documents per case to several hundreds of
documents per case. The statistical data on identity documents’ falsifications is presented
below.
9.3
Actions of an identity fraud victim
There are no clear guidelines as to what victims of identity fraud should do. Usually people
discover that something is wrong when they receive a large bill for something they have
never bought.
Usually, they first of all go to the police and make a statement regarding the incident, but
they don’t get much help because they need to provide evidence. At minimum, they need to
provide a contract or any other document (agreement), which could be checked for signature
forgery or be provided as evidence. If signature forgery is proven by the Forensic Service
Department, the victim can write an application and hand it in at the police department. After
that, the case becomes a criminal case and investigation can proceed. Unfortunately, victims
have to cover the expenses of forensic analysis themselves.
Camera records can also be used as evidence, in order to prove that a particular person
(meaning, the victim), wasn’t visiting the particular shop where a crime took place. Of course,
the actual criminal can be smart enough to cover his face or a camera’s picture quality may be
too poor to positively identify or disqualify someone as the perpetrator of a crime. Usually,
when any suspect is arrested, his DNA sample and fingerprints are taken and checked, which
helps to detect his real identity even if that person possesses fake identity documents. This
also helps avoid situations where a person is arrested for a crime they never committed.
In regard to the situation where a person realizes that his identity documents have been
stolen or they simply can’t find them, they have to call a corresponding phone number. For
59 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
example, if an ID card, which contains a certificate, is missing, he must contact a trusted
certification service provider (LVRTC - Latvian State Radio and Television Centre) by calling
67018989. To verify the caller’s identity, the operator will ask a secret question, which was
decided when the citizen had filled in the application for issuing his identity card.
Similar actions are expected if a person has suspicions that someone else is using his identity
card without his knowledge. To renew blocked/cancelled certificates, a citizen must attend
the Office of Citizenship and Migration Affairs (OCMA) or a Latvian diplomatic mission, if
abroad. This also applies in order to report the loss of identity cards and hand in applications
to get new ones.
Currently lost/stolen documents are stored in an “invalid documents” register, which shares
information with the Interpol and Schengen information systems as well as other registers
within the country such as the vehicles and drivers national registry, the company register,
the unified event register and the passport system.
The main institutions that provide information for the invalid document register are the State
Police, the State Border Guard, the Office of Citizenship and Migration Affairs, the Consular
Department of the Ministry of Foreign Affairs, the Road Traffic Safety Directorate, the Latvian
Maritime Administration and other organizations deemed reliable by the State.
9.4
Most common types of identity theft in Latvia
Below are described several of the most common types of identity theft in Latvia.
9.4.1 Criminal Identity Theft
Until recently, most of the falsified passports detected in Latvia or at its borders, which are at
the same time borders of the Schengen Zone, were forgeries. In most cases, the photograph
and/or personal data had been changed. In 2014 a new type of forgery was detected– a
counterfeit Latvian e-passport data page in which the chip and antenna had been imitated.
Summarizing statistical data on registered criminal cases in the Republic of Latvia, the
following statistics have been acquired over the past years.
Year
Number of
criminal cases
2009
91 cases
2010
63 cases
2011
47 cases
2012
28 cases
2013
36 cases
2014
16 cases
Figure 36 Cases of Criminal Law, Section 275 “Forgery of a Document, Seal and Stamp and Use
and Sale of a Forged Document, Seal and Stamp”, 2009 – 2014 (Latvia)
60 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
Year
Number of
criminal cases
2009
4 cases
2010
0 cases
2011
2 cases
2012
0 cases
2013
2 cases
2014
4 cases
Figure 37 Cases of Criminal Law, Section 281 “Concealing Personal Identity”, 2009 - 2014 (Latvia)
In these criminal cases, the following forged documents have been identified:
a) The most frequently counterfeited documents (in terms of number and ignificance):
 passports
 identification cards
 driving licenses
 vehicle registration certificates.
b) Other documents:
 disability certificates
 orphan certificates
 politically repressed person’s identity card
 sanitary books
 licenses for transportation of dangerous goods
 state police officer certificates
 military police certificates
 security certificates of the Interior Ministry’s Security Guard commission
 graduate diplomas
 certificates of high school education
 veterinary service certificates
 other documents.
Statistics of the Latvian Forensic Service Department’s findings on falsification of document
types over the years are given in the table below.
Type of document
Yea
r
200
8
Country
Latvia/ LVA
Lithuania/LTU
Ukraine/UKR
Great
Britain/GBR
Poland/POL
61 | P a g e
Passpor
ts
ID
Cards
36
1
1
Type of falsification
Driving
licenses
Tot
al
Counterfe
it
Falsificati
on
28
11
10
10
12
10
54
64
12
10
2
2
2
2
1
3
2
WP3 “Threat assessment and economical aspects”
Type of document
Yea
r
Country
Russia/RUS
Ireland/IRL
Israel/IRL
Switzerland/CHE
Moldova/MDA
Total:
200
9
201
0
201
1
December 2015
Passpor
ts
37
Latvia/ LVA
Lithuania/LTU
Ukraine/UKR
Poland/POL
Russia/RUS
Ireland/IRL
Israel/IRL
Belarus/BLR
Czech
Republic/CZE
Denmark/DNK
Norway/NOR
Switzerland/CHE
United
States/USA
Estonia/EST
Sweden/SWE
Brazil/BRA
Total:
15
Latvia/ LVA
Lithuania/LTU
Ukraine/UKR
Great
Britain/GBR
Russia/RUS
Israel/IRL
Paraguay/PRV
United
States/USA
Pakistan/PAK
Total:
7
1
Latvia/ LVA
Lithuania/LTU
Poland/POL
2
62 | P a g e
ID
Cards
1
Type of falsification
Driving
licenses
Falsificati
on
5
2
1
2
1
64
Counterfe
it
5
2
1
2
1
47
26
12
4
2
7
6
4
2
10
12
4
2
6
5
4
2
31
1
1
8
0
1
5
2
1
2
1
102
41
12
4
2
7
6
4
2
2
2
6
2
1
2
6
2
1
1
1
1
69
1
1
1
1
59
1
2
1
1
94
11
1
4
8
1
4
1
2
2
1
1
2
2
1
6
8
1
1
1
2*
17
55
Tot
al
1
1
24
1
20
15
3
1
13
4
1
1
35
10
1
18
2
4
1
2
2
1
1
12
4
1
1
32
17
4
1
WP3 “Threat assessment and economical aspects”
Type of document
Yea
r
Country
Ireland/IRL
Denmark/DNK
Estonia/EST
Pakistan/PAK
Georgia/GEO
Total:
201
2
201
3
201
4
December 2015
Passpor
ts
ID
Cards
Type of falsification
Driving
licenses
Falsificati
on
2
1
25
Counterfe
it
1
6
2
2
1
30
12
2
1
2
2
1
1
1
9
2
1
2
1
1
2
1
29
1
2
4*
2
2
Latvia/ LVA
Lithuania/LTU
Ukraine/UKR
Poland/POL
Russia/RUS
Ireland/IRL
Estonia/EST
Germany/DEU
Afghanistan/AFG
Total:
26
Latvia/ LVA
Lithuania/LTU
Ukraine/UKR
Russia/RUS
Great
Britain/GBR
Czech
Republic/CZE
Sweden/SWE
Rumania/ROU
Total:
5
1
Latvia/ LVA
Lithuania/LTU
Ukraine/UKR
Russia/RUS
Great
Britain/GBR
Czech
Republic/CZE
Total:
3
7
1
1
27
1
1
6
3
1
0
4
1
1
31
1
6
2
2
1
34
38
2
1
2
2
1
2
1
1
50
22
19
6
1
1
4
3
1
1
3
1
1
1
1
1
1
16
1
2
1
13
1
2
1
23
8
2
1
1
7
2
1
1
5
5
5
1
18
1
17
1
21
8
1
1
10
4
4
Figure 38 Types/ origin of documents and falsifications 2008 – 2014 (Latvia)
63 | P a g e
Tot
al
11
2
1
4
11
2
1
1
WP3 “Threat assessment and economical aspects”
December 2015
An interesting case came from Denmark, where the falsified document was presented as an
ID card, however, this state does not issue such documents (Denmark does not have ID
cards). These fraudulent documents are forwarded for forensic examination purposes by the
State Police. Statistics also include the documents that are sent from the consular authorities
of the Republic of Latvia abroad. In all the cases specified in this table, a criminal case process
has been initiated. But these statistical figures do not include the data from the State Border
Guard.
9.4.2 Driver’s License Identity Theft
This case may be considered as the easiest form of ID theft to commit and it is widespread
both in Latvia as well as elsewhere. Somebody’s purse or wallet gets stolen, and that person’s
driver’s license is sold to someone. It then becomes easy for the buyer of the document to
issue other forms of IDs in the name of the rightful owner of the driver’s license. This type of
ID theft usually spreads to others, especially criminal identity theft. Statistics of the Latvian
Forensic Service Department’s findings on falsification of driver’s license over the years are
summarized in the table above. It is worth detailing several Identity theft cases of driving
licenses as this scenario might be replicated in other countries:
Case No 1 “twin / close relative case”
There are several cases discovered last year (2014) during the driving license issuance
procedure. An individual who already owns a driving license pass the exams of the road traffic
safety directorate on behalf of a relative. Once he is awarded the license, he hands over it to
the applicant who might even be unable to drive a car.
Case No 2 ”stolen passport or id card case”
A person being banned from driving gets a new license from the Road traffic safety
directorate by submitting another’s person passport or ID card with a quite similar face and
claiming a theft. By this means, the applicant gets a new driving license under another name.
9.4.3 Financial Identity Theft
Latvia is not immune from credit card fraud; however, concentrated efforts by law
enforcement have helped to reduce the number of incidents. Authorities have cracked down
on notorious crime establishments dealing with financial identity theft and, as a result,
incidents of scams and fraud in these areas have decreased over the years. However, it is
worth detailing certain cases as they might be considered as generic and countermeasures
shall be implemented to meet them. In Latvia, on-line authentication of persons, by the
means of banking access details, is a relatively unique case in European countries, besides
traditional means of identification such as a passport and ID card. Such procedures have been
launched by commercial banks and this solution is very actively used in the country. Such a
situation arose purely historically, when government bodies clearly demonstrated that they
were not able to create a personal identification tool in the electronic environment for a long
time.
This explains that this niche has been occupied by the private sector which has created an
appropriate tool for internet banking. The usage of the Internet banking (e-banking, Online
Banking) is very popular in Latvia and person’s identification tools quickly gained acceptance
and widespread among clientele. Since commercial banks have implemented strict
authentication procedures, customers have begun to rely on the service: the electronic
identification of persons. As a result, in parallel to the personal identification tools issued by
64 | P a g e
WP3 “Threat assessment and economical aspects”
December 2015
the Latvian State such as passports, ID cards and electronic signatures, industry generated
identification tools have been widely used for both private sector and public institutions
concerns. Same as for identity theft case studies, there is no accurate statistics in this area.
Law enforcement agencies, in charge of identity theft, usually take into consideration the way
in which the loss occurred. Namely, an identity theft might be qualified as a simple theft or
fraud. Most of the municipalities or government authorities, most often classify simply as
fraud cases/offences where identity theft is engaged.
Most of the banks do not communicate much on the subject as they are very keen to ensure
the financial security of their customers. There are no comprehensive statistics here as cases
that are reported to the law enforcement authorities in the final are re-classified as simple
theft or fraud. In order to preserve the anonymity of their customers: dates, places and
names of persons involved are not mentioned.
Case no.1. Attempt to open a bank account on behalf of brother
A person arrived at the Bank in order to apply for an online banking service and to deposit
some money in the account. The bank clerk considered that the passport’s photograph did
not match the individual’s appearance, although the Lost&Stolen database of the Ministry of
Interior (NDR) turned it out as valid. An additional check such as the address was confirmed,
but the telephone details did not match against the bank's system files. After further queries,
the applicant admitted that would open an account on behalf of his brother who was unable
to present himself. For this reason, the online banking was denied.
Case no.2. Identity impersonation between relatives
This case corresponds to an impersonation between relatives. A female customer closed their
account when leaving the country. But her sister opened an account based on her passport to
benefit of credit facilities. Only small amounts have been granted before being identified.
Case no.3. Stolen bag allows thief to take advantage of the victims account
A bank customer is victim of a thief in a bus. His bag with documents were stolen, including a
bank card, online banking code card, access details and telephone. As he had been very busy
at work, he did not report the loss to the bank. For this reason, the thief presented himself at
the bank branch and asked to unlock the online service, on presentation of a passport and
signature, both checked as valid and started to withdraw cash and apply for credits. The fraud
was discovered when the genuine customer presented himself at the bank.
Case no.4. Impersonation of a customer with a similar face
This is the typical case where a customer reported the opening of a bank account following
the theft of his passport. The fraudster took advantage of a tight similarity between him and
his victim. He succeeded to claim credits before the fraud was identified and the issue solved.
Case no.5. The client's son organizes the fraud
This is a typical case were bank details are known from family relatives. Several on-line
withdrawals are performed; access details are changed after presentation of the customer’s
passport at the Bank branch until It became clear that the client's son organized the fraud.
The customer has written an application to the police.
Case no. 6. Hotel staff takes advantage of a customers’ passport
This is the typical case of a customer behaving negligently and leaving access to his passport
during a hotel stay. A staff took advantage of the document, opened a new bank account and
succeeded to withdraw cash and be granted several credit until the fraud was discovered.
65 | P a g e
Download