The Way from Data to Information

Data Mining

Subscribe to Data Mining: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Data Mining: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn


Data Mining Authors: William Schmarzo, Robin Miller, Jnan Dash, Liz McMillan, Mark Ross-Smith

Related Topics: SSL Journal, Data Mining, Security Journal, Secure Cloud Computing

Security Journal: Blog Post

Dumpster Diving vs. The Bit Bucket

There were almost 10 million identity theft victims in 2008, up 22% from 2007

Which is safer – a digital shopping cart or a metal shopping cart?  Most (or many...some?) of us take great care to keep our personal Identity information safe.  We make sure we send sensitive info over an encrypted tunnel, we use strong passwords for our various digital vaults, and other protective measures when navigating the treacherous Internet. 

But you might not have known that Stolen wallets and physical documents accounts for 43% of all identity theft (pdf) which means we also need to shred our printed materials.  Many might feel uncomfortable entering their credit card for online purchases but have no problem handing that same credit card to a stranger (who then walks away with it) to pay for a meal at a restaurant even though online methods only accounted for 11% of all Identity Theft.

There were almost 10 million Identity Theft victims in 2008, up 22% from 2007.  A little over 3% of the entire US population was affected in 2008 and if I remember correctly, roughly 7.5% overall have been hit.  The average cost per victim hovers around $500 – not counting time.   2009 is likely to top those numbers with high profile breaches like Heartland’s 130,000,000 credit/debit numbers stolen and the 5,000,000 compromised records from the single Checkfree breach.  Even though Albert Gonzales (also the TJX hacker) is in custody and some 650+ banks reissued credit cards, the damage will continue as this info was still sold to other criminal outlets71% of fraud happens within a week of the personal compromise, so you’ll probably know fairly quickly if someone is claiming to be you since the crooks jump on the new data before you have a chance to react.  The scary part is the remaining portion which might bite you 6 months later, when you least expect it.

In the past, getting your identity stolen usually only affected you and your immediate family.  Someone trying to buy something with your credit card and the hassles you must endure to resolve it.  With Social Media, a stolen identity can have ripple effects.  Stories continue to appear of ‘friends’ getting scammed.  The typical ruse occurs when one of your ‘friends’ gets their profile hacked and the impostor pleads for help, usually in the form of cash, to get them out of a sticky situation –  like stuck in a foreign country.  ‘Oh my gosh, my close friend is in a tough spot.  I trust them since they are part of my community and they recently posted that they are having a great time in a far away land.  Better help them out.’  The impostor has already changed the profile password so the real owner is unable to alert their posse that this is a scam, if they even know it’s occurring. 

By then, it’s too late.  While not directly Identity theft, digital criminals are scouring social media sites looking for their next heist.  ‘Gee, Sandy posted that she’s looking forward to their trip to the mountains this Labor day.  Looks like I’ll be spending my weekend cleaning out their house.’  While I realize it’s fun to share the fabulous vacation you’re about to embark on, but you are also telling the world that you won’t be around.  Ten years ago, we were always cautioned against saying, ‘We’re not home right now…’ on our answering machines.  Better to tell, ‘Can’t get to the phone right now’ and yet we seem to forget that old simple rule when it comes to our social media messages.

While the statistics show that most Identity Theft is due to lost or stolen items, the digital criminals are always lurking and there are some basic old-school rules we can follow to make sure they don’t follow us.

ps

Read the original blog entry...

More Stories By Peter Silva

Peter is an F5 evangelist for security, IoT, mobile and core. His background in theatre brings the slightly theatrical and fairly technical together to cover training, writing, speaking, along with overall product evangelism for F5. He's also produced over 350 videos and recorded over 50 audio whitepapers. After working in Professional Theatre for 10 years, Peter decided to change careers. Starting out with a small VAR selling Netopia routers and the Instant Internet box, he soon became one of the first six Internet Specialists for AT&T managing customers on the original ATT WorldNet network.

Now having his Telco background he moved to Verio to focus on access, IP security along with web hosting. After losing a deal to Exodus Communications (now Savvis) for technical reasons, the customer still wanted Peter as their local SE contact so Exodus made him an offer he couldn’t refuse. As only the third person hired in the Midwest, he helped Exodus grow from an executive suite to two enormous datacenters in the Chicago land area working with such customers as Ticketmaster, Rolling Stone, uBid, Orbitz, Best Buy and others.

Writer, speaker and Video Host, he's also been in such plays as The Glass Menagerie, All’s Well That Ends Well, Cinderella and others.

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.