identity theft and solutions: research for the future dr. milena head associate professor director,...

43
Identity Theft and Solutions: Research for the Future Dr. Milena Head Associate Professor Director, McMaster eBusiness Research Centre (MeRC) McMaster University

Upload: alma-sloman

Post on 14-Dec-2015

216 views

Category:

Documents


3 download

TRANSCRIPT

Identity Theft and Solutions:Research for the Future

Dr. Milena HeadAssociate Professor

Director, McMaster eBusiness Research Centre (MeRC)

McMaster University

What is Identity Theft?

Any impersonation or misappropriation of

an individual's identity

Misusing personal information to …

Open a telephone account

Lease an apartment

Open new credit cards

Obtain passports

Fill out legal documents

Take out loans

What are the implications for victims? Possible loss of money … and more importantly …

reputation False credit reports that can be difficult to correct Average cost per victim is $740 US The average time spent by victims is about 600

hours Lost opportunities False arrests Emotional impact of identity theft

has been found to parallel that of victims of violent crime

How big is the problem? 7 million Americans (3.4% of consumers)

were victims of IDT during the 12 months ending June 2003 79% increase from previous year! FTC states IDT is America’s fasting growing

crime Annual cost in the US is $53B (2003) In Canada, over 600,000 victims during

2003 (3% of consumers) Annual cost in Canada is $21.5M (2003)

How are identities stolen? 34% : obtained or forged credit card 12% : obtained improperly a paper or computer

record with personal information. 11% : stole wallet or purse. 10% : opened charge accounts in stores. 7% : opened a bank account or forged cheques. 7% : got to mail or mailbox. 5% : lost wallet or purse. 4% : went to a public record. 3% : created false IDs.

How is this happening? Dumpster diving Shoulder surfing Bribing Spyware Hacking Online searching of publicly available data Phishing and spoofing

Designed to fool recipients into divulging personal information

Example: password verification request sent by a victim’s “bank”

Example: fake listings on Monster.com

Who are the thieves? A true story … Michelle Thibodeau of Worcester, Mass. took

her 16-year old son to get his learner’s permit He already had a driver’s license! Photo on the license was his father … in jail Teen started getting notices that he was

delinquent in his child support DoR seized part of his grocery store bagger

paycheques After a year of frustration, had to apply for a

new SSN (implications for getting college loans)

Who are the thieves? Should we just be concerned about

hackers?

NO! Most identities stolen from trusted insiders

who already have easy access to private information … 70%!

Acquaintances, friends … even family … 16%!

Theory of Human Identification “Knowledge-based” identification

In possession of information which only that person would be expected to know

“Token-based” identification Recognized by possession of some item

“Biometric” identification Variety of identification techniques which are

based on some physical and difficult-to-alienate characteristics

Are we careless about our private information?

Careless disposal of private information

Careless protection of private information

In a word … YES

Careless protection of private information Passwords are a very weak form of

protection Let’s have an HONEST show of hands 80% select a common password where

possible 67% rarely or never change their passwords 49% of heavy computer users

(more than 10 passwords) write them down

Willing to compromise for a “bribe”! Not isolated to passwords

Careless disposal of private information People increasingly are learning to destroy

paper-based information that can lead to privacy and security breaches But still a major issue

Often don’t think to “shred” the data stored at various locations within the computer

Yes, we can be more careful.

Is it all our fault?

Procedures and processes are careless

Organizations are careless

In a word … NO

Careless business & government practices

Sloppy security practices Easy credit Greater access to personal information Widespread use of SIN as unique customer

identifier Increasing commercial trade in personal

consumer information

And a good policy is not enough!

Theory of Human Identification “Knowledge-based” identification

In possession of information which only that person would be expected to know

“Token-based” identification Recognized by possession of some item

“Biometric” identification Variety of identification techniques which are

based on some physical and difficult-to-alienate characteristics

The clever identity thief … Knows personal information

AND has physical items Tokens can be stolen and altered

OR manufactured

Theory of Human Identification “knowledge-based” identification

In possession of information which only that person would be expected to know

“Token-based” identification Recognized by possession of some item

“Biometric” identification Variety of identification techniques which are

based on some physical and difficult-to-alienate characteristics

The promise …… to unequivocally identify individuals

The hurdles …

… technology, infrastructure, privacy

StakeholdersIdentity

Protector

IdentityIssuer

IdentityChecker

IdentityOwner

IdentityThief

From Wang, Yuan and Archer (2004)

StakeholdersIdentity

Protector

IdentityIssuer

IdentityChecker

IdentityOwner

IdentityThief

Role Legally own and use ID

Responsibilities Safeguard ID Fast victim recovery to reduce loss Legally use ID

StakeholdersIdentity

Protector

IdentityIssuer

IdentityChecker

IdentityOwner

IdentityThief

Role Authenticate and issue ID

Responsibilities Issue secured certificates Protect ID certificate & information Protect ID owner and checker

StakeholdersIdentity

Protector

IdentityIssuer

IdentityChecker

IdentityOwner

IdentityThief

Role Authenticate ID and provide services

Responsibilities ID authentication Provide services to real ID owner Protect ID information Protect ID owner

StakeholdersIdentity

Protector

IdentityIssuer

IdentityChecker

IdentityOwner

IdentityThief

Role Protect and prosecute

Responsibilities Legislate Enforce laws Protect ID owners Educate and guide Provide technical solutions Record and track complaints and detect trends

IDT Prevention Activities

IdentityProtector

IdentityIssuer

IdentityChecker

IdentityOwner

IdentityThief

Guidance

Education

Guidance

IDT AlertIDT Alert

Self Protection

PreventionPolicies & TechPrevention

Policies & Tech.

What research is needed?

But first a bit about ….

McMaster eBusiness Research Centre (MeRC)

Established in 2000 Part of the Ontario Research Network in e-

Commerce (ORNEC) How we define eBusiness

We believe that the “e” will disappear. We are focused on business innovation in the

networked economy Our mission: focus on research, education

and outreach

Research Interdisciplinary research Research groups have developed expertise in

areas of: Identity Theft Privacy Security Trust Consumer Behaviour Mobile Commerce eHealth Portals

Online Negotiation Supply Chain

Management Interface Design eLearning Change Management Knowledge Management among others …

Education Providing graduates with the managerial and

technical knowledge demanded and necessary in the electronic marketplace Undergraduate eBusiness courses eBusiness MBA specialization PhD (currently 12 candidates engaged in eBusiness

research)

Co-op, internship, full time placements Opportunities for course projects

Outreach Providing an interface to facilitate dialogue

between academics and business leaders Distributing research papers and reports eBusiness Seminar series Industry speakers in the classroom On-site executive training programs On-line courses for SMEs Supply Chain Symposium World Congress Conference eCase Competition

Ontario Research Network for Electronic Commerce (ORNEC)

Initial Researchers

ClusterCluster NumbeNumberr

Law 12

Business 56

Technology 12

Total 80

Ontario Research and Development Fund (ORDCF)

1/3 private sector, 1/3 institutions, 1/3 ORDCF

ID Theft as a Flagship Project

Funds assigned by the ORNEC Board of IDT ….

3 Expressions of Interest developed

$1.9 Million!

Project 1: Defining and Measuring IDT Scattered and incomplete Canadian data Research questions:

What types of stats should be gathered? How? How can businesses be encouraged to report

IDT? How can technology help to gather stats? What are the various jurisdictions doing? What is the magnitude and nature of IDT? What are the real costs of IDT to consumers,

businesses, governments, and the economy?

Project 2: Management Approaches to Combating IDT Research questions:

How does IDT affect trust? What are the direct and indirect costs? What are the risks? What is the “business case” for stakeholders? Are current policies & practices effective? What are the “leak-points”? What are the costs/benefits of

countermeasures? What is the effectiveness of various multi-party

approaches? How can employee attitudes be improved?

Project 3: Technical Tools to Address IDT Some available technical solutions: digital

signatures, PKI, smartcards, biometrics Research questions:

How effective are alternative tech solutions? What is the impact on privacy and other social

values? How can security systems be designed to give

consumers informed choice in the level of security they are provided?

Who will manage biometric information? How can reputation management systems

build trustworthiness? How can user profiling effectively detect IDT?

Is there anything positive we can say about identity theft?

It’s a fruitful area for research!

And the last word by William Shakespeare …

Who steals my purse steals trash…

But he that fliches from me my good name

.... makes me poor indeed

- from Othello

Thank you

Milena [email protected]