Identity, Identifi Ers and Identity Fraud: January 2005
Identity, Identifi Ers and Identity Fraud: January 2005
www.cybertrust.com
2005 Cybertrust. All rights reserved. All registered trademarks, trademarks and service marks are property
of Cybertrust, unless otherwise stated. All other marks are property of their respective owners.
Table of Contents
Introduction .......................................................................................................................... 3
Identity ................................................................................................................................... 3
Identiers .............................................................................................................................. 3
Identity Fraud ....................................................................................................................... 4
Recommendations for the Individual ................................................................................ 6
Recommendations for Fiduciaries ..................................................................................... 7
Recommendations for Merchants ..................................................................................... 8
2005 Cybertrust. All rights reserved. All registered trademarks, trademarks and service marks are property
of Cybertrust, unless otherwise stated. All other marks are property of their respective owners.
Introduction
Recently, the press and the public policymakers have begun to speak of Identity Theft
as though it was a novel concept requiring severe new legislation. These laws are likely to
put signicant new burdens on business. While most identity theft problems originate via
plain old snail mail, the discussion these days is all about the Internet. The sponsors of the
legislation point to exponential growth in the problem as justication for these laws.
This paper suggests that the growth actually comes from redening traditional
fraud, not from the growth of the Internet. It begins with a discussion of the concept of
identity and ends with recommendations for individuals, duciaries and merchants to
safeguard themselves.
Identity
What do we mean when we speak of identity? One way to look at it is that we are
talking about a combination of body, mind and personality. These three things can each be
independently demonstrated and veried, but they are not separable. It seems clear that
these cannot be stolen in the sense of being converted to someone elses use.
An identity has a number of attributes including character, reputation, credit and rights.
The legal rights include civil rights, the right to own property and the right to enter
into contracts.
Individuals can work, travel, stand for ofce, and vote. They can pass their property to heirs
of their choice. They may marry and adopt. In the village, the bond between the individual
and these attributes was recorded in the collective memory. Nonetheless, to some degree or
another, the attributes are separable from the identity. For example, as recently as a hundred
years ago when public records were limited and credentials were not required for or even
available for travel, it was possible for the individual to walk away from their village and start
over with a new identity.
In the modern world, the bonds between identity and attributes are more tenuous than they
were in the village. On the other hand, they are portable; one can enjoy them while traveling
or take them when moving.These attributes can be recorded in ofcial, permanent, and other
records. They can be tokenized substituted for by a symbol. They can be collateralized
converted into a document, credential or other instrument.They can be vouched for, or even
guaranteed, by a third party. They can be monetized, that is, in cooperation with another
party converted into currency that can be used to buy goods and services.
Identiers
We use labels, i.e., names and other identiers, to refer to the individual or identity and to
record the association between the identity and its attributes. We identify ourselves by our
names and have a preference for them in most relationships. However, most names are
ambiguous: a given name may refer to tens, hundreds, or even thousands of individuals. To
reduce the ambiguity, we use the name in association with other information. For example,
name and address may be more specic as may name and date of birth (DOB). Of course,
name and address may still not distinguish between members of different generations
residing together, and there could be two or more people sharing both a name and a DOB.
However, for all practical purposes, name, date and place of birth (POB) are enough to
uniquely identify a single individual.
2005 Cybertrust. All rights reserved. All registered trademarks, trademarks and service marks are property
of Cybertrust, unless otherwise stated. All other marks are property of their respective owners.
In the world of modern information systems, with cheap random-access storage, databases,
directories, displays, and point-and-click data entry, name and address, DOB, and POB should
be adequate for most applications. However, for most of the 20th century, they were not.
Both storage and recording were so expensive that, for the sake of efciency, institutions
created alternate identiers. The most obvious and universal of these is the Social Security
number (SSN), created by the then-new Social Security Administration in the 1930s and
assigned to all workers.
The military began to assign service numbers about the same time. These substitutes for
names reduced ambiguity, keystrokes, storage requirements and errors. In modern times,
these numbers have been combined into a single number, extended to all citizens and
assigned shortly after birth. They are now used by credit bureaus, employers, credit card
companies, banks and others. In spite of all laws prohibiting their use for that purpose,
SSNs are now the identier of choice for many institutions and applications.
Identity Fraud
One Saturday morning at the barbers, I listened to the tale of woe told by the man in
the next chair. It seems that his mailbox was ried. The perpetrators took only credit card
statements and tore the remittance advice from the statement. They then turned it over and
used the form on the back to submit a change of address from my neighbors address to
an accommodation address in northern New Jersey.1 When they began to receive
statements at that address, they called the customer service number and asked the bank
to send them some drafts. When the drafts arrived, they used them to draw down my
neighbors line of credit.
The perpetrators did not change the phone number when they changed the address.
We know that because when the account became delinquent, my neighbor began to get
collection calls. At this time, the police were called in. They immediately recognized the
accommodation address the police had already placed it under surveillance but the
perpetrators had abandoned it.
Notice that it takes quite a bit of information to pull off one of these frauds. In this particular
case, all of the information necessary and, incidentally, the necessary forms, were all
included in a single mailing.
This scam is a simple but common form of identity fraud. A more sophisticated but less
common form is that in which the perpetrators use public and independent sources to learn
enough about a victim to be able to initiate transactions or apply for accounts in their name
but with the perpetrators address. Most of the information required to be able to do this is a
matter of public record; all of it is available from credit reporting agencies for a fee.
Abraham Abdullah duped credit reporting agencies including TRW, Equifax, and Experion
into providing detailed reports on his extremely rich victims (Fortune Magazines list of
the 400 richest people). He then used this information to dupe the victims duciaries into
transferring money to accounts that he controlled. He submitted the transactions by e-mail
or fax. Knowing that the duciaries would want to verify the transactions, he would include
telephone numbers where he could be reached. However, when the duciaries called those
numbers, they reached a voice mailbox answered in the victims name. Often that was
sufcient for them to complete the transaction.
For most of my professional career, I have been trying to get the banks to conrm changes of address to the old address.
Brokerage houses have always done it. I can only conclude that the banks have done an economic analysis and have
concluded that it would not pay.
2005 Cybertrust. All rights reserved. All registered trademarks, trademarks and service marks are property
of Cybertrust, unless otherwise stated. All other marks are property of their respective owners.
In at least one instance, an ofcer for a duciary used a phone number from their own les
rather than the one in the order to determine that the transaction was not authentic. The
ofcer was alerted by the form of the request (an e-mail), the amount of the transaction ($10
million), the destination (Australia), and the destination account, which had recently been
opened. Abraham Abdullah was arrested when he showed up to take delivery on contraband
equipment intended to help him counterfeit credit cards in the names of his victims.
While the popular press likes to describe these frauds as identity theft, they are really
classic frauds. While it is true that they use personal information to make the transactions
appear to be authentic, they really do not rise to the level of identity theft. The targets in
these frauds did not suffer permanent damage to their name or credit. They did not even
suffer any material nancial loss.The use of identity theft should be reserved for those cases
that really deserve it.
The popular press also likes to associate these frauds with high technology in general and
the Internet in particular. Here, they have a slightly better case, but one may also take note of
how low-tech these frauds really are. It is true that more business is being done electronically
than ever before and less on paper. More fraud is therefore electronic than ever before. To
the extent that electronic transactions are successful, they generate more business. More
business generates more crime.
However, one can make an equally good case that high technology also makes fraud more
difcult. For example, in the paper system, one could only reconcile accounts monthly.
Today, one may reconcile daily if desired. A wire room operator in a Chicago bank colluded
with several outsiders to transfer $70 million to banks in Vienna, Austria. The transfers were
charged to the accounts of three large customers. Because those customers reconciled their
accounts daily, the bank knew about the fraud within hours of close of business. Before
dawn, they had identied and arrested all of the perpetrators and had ofcers in Vienna to
assert their claims to the funds.
While the press focuses on the hazards and vulnerabilities of the networked environment,
most of the moves have been to improve control, not just service. Shortly after Reuters
reported on Abraham Abdullah, I received a call from a colleague in Bermuda. He wanted
to advise his client, a private bank, on accepting electronic payment orders from their bigbalance customers. Specically, he wanted to know about the control that requires electronic
payments be made only to preregistered accounts. It seems that the bank was trying to
accommodate customers that wanted to make large payments to arbitrary parties without
the registration delay.
Abdullah was able to do what he did in large part because duciaries are willing to take some
risk in order to accommodate the wishes and intentions of their most afuent customers. It
is important to recognize that while identity theft can be devastating to the target individual,
in most cases it is the duciary that takes the nancial loss; this is the reason that we use
them. While most of the advice on how to avoid identity theft is aimed at the individual,
it is the duciary that has most of the control. Most of the advice to the consumer is
aimed at protecting their privacy, that is, on keeping condential information that is likely
to be abused.
Consider the recommendations from the Federal Trade Commission at http://www.
consumer.gov/idtheft/risk.htm. They suggest catching identity theft early by annually
checking your credit report. On average, one will note a problem in six months. This seems
late, but it may be the only way to learn of accounts in your name opened by others.
2005 Cybertrust. All rights reserved. All registered trademarks, trademarks and service marks are property
of Cybertrust, unless otherwise stated. All other marks are property of their respective owners.
2005 Cybertrust. All rights reserved. All registered trademarks, trademarks and service marks are property
of Cybertrust, unless otherwise stated. All other marks are property of their respective owners.
2005 Cybertrust. All rights reserved. All registered trademarks, trademarks and service marks are property
of Cybertrust, unless otherwise stated. All other marks are property of their respective owners.
About Cybertrust
Cybertrust is the global information security specialist, delivering services that secure critical data,
protect identities and help customers demonstrate ongoing compliance. Cybertrust is 100 percent
focused on information security and 100 percent product and vendor neutral. We focus our more
than 15 years of expertise and deep industry intelligence to offer individual, pragmatic solutions
to our customers that align information security risk to organizational risk. Cybertrust is one of the
worlds largest providers of information security and is recognized as the global market leader in
managed security services. Headquartered in Herndon, Virginia, USA with more than 30 ofces
around the globe, Cybertrust has earned the trust of thousands of customers worldwide.
2005 Cybertrust. All rights reserved. All registered trademarks, trademarks and service marks are property
of Cybertrust, unless otherwise stated. All other marks are property of their respective owners.