Identity Theft Speaker; Confickers Threat Hasn’t Waned www.IDTheftSecurity.com

Robert Siciliano Identity Theft Expert

We are not out of the woods with this one.

Conficker’s rise and fall and the passing activity of the worm on April 1st has allowed researchers and anti-virus companies to better understand the virus and its impact. While April Fools was supposed to be the day of reckoning for Conficker, it wasn’t and still isn’t a joke.

Viruses often come with a trigger date, as pointed out by CNET. And while many fail to meet the media hype, they still can and often do cause millions or billions in damage.

The media does what it does and reports on the news. While they or even I may not always get the facts straight, the impetus is still there.

In a “Conficker Postmortem,” CNET examines the media frenzy and points to a humorous spoof that Wired ran, a fake live blog from the “Conficker Worm War Room.” CNET also points out that, “The New York Times called it an ‘unthinkable disaster’ in the making. CBS’s 60Minutes said the worm could ‘disrupt the entire internet,’ and The Guardian warned that it might be a ‘deadly threat’.”

The positive result of this media hype is that it brings attention to an ongoing problem for an audience that never considered themselves vulnerable to these issues. In my world, even Facebook friends and Twitter followers who had never reacted to previous posts on a plethoraof IT and personal security issues are finally starting to ask the right questions.

“Your mom’s virus,” as we knew it, has become a part of popular culture. In a sense, this is a good thing, because it’s now water cooler talk with the same level of buzz as Britney Spears going nutty. We in the security community couldn’t ask for more and better attention, that may potentially enlist an army of security moms. Thank you, Conficker!

Still, Conficker is the most sophisticated virus to date and is still waiting to strike, which can very well lead to major data breaches and identity theft. As the virus continues to call home for the yet to be delivered update, researchers have determined an estimated 3.5 to 4 million PCs are infected on the Conficker botnet, which is the most powerful and dangerous aspect of Conficker.

Overall totals of infected computers may still be between 10 and 15 million. Many of those have a dormant virus that has the capability to wreak havoc, or that may have already been rendered impotent by anti-virus providers and IT administrators who have taken advantage of numerous solutions by McAfee and others.

What the public needs to understand is this infection is anything but over. The virus phones home every day looking for its next set of updates, which could still have catastrophic results if the virus ever reaches its full potential.

The risk here is that a virus of this kind has technology that can disable anti-virus software and that prevents access to numerous websites which provide automatic security updates, including Windows.

Today, Brian Krebs from the Washington Post points out the similarity’s to Y2K potential bug, just as I did last week. “In one sense, the response to Conficker could be compared to that of Y2K: A great deal of smart people threw a whole lot of resources and energy at a fairly complex problem and managed to turn a potentially very ugly situation into a relative non-event.”

The attention that Conficker brought upon itself has rallied security professionals to be on their highest guard, which is exactly where they should be.

See Robert Siciliano, identity theft speaker, discussing hacking for dollars.

I’m excited to work with uni-ball in 2009 in a partnership to help raise awareness about the growing threat of identity theft and provide tips for protecting yourself. Check out Uniball.com for more information.

Identity Theft Expert; Anatomy of a Hack

Robert Siciliano Identity Theft Expert

There is a battle going on round the clock, between the bad hackers and the good hackers. Most of the time, the good guys lose. Here we have an example of the bad guy actually getting caught.

At age 19, an Israeli criminal hacker named Ehud Tenebaum made news as “The Analyzer,” (a great tag for a criminal hacker) after he cracked and penetrated the Pentagon, NASA and even Hamas computer networks.

He then went silent and is believed to have embarked on a 10 year long international conspiracy to hack networks of United States and Canadian banks and other financial institutions. Losses are estimated at $10-12 million.

The Analyzer’s hacking technique is believed to be “SQL injection,” a tactic that I’ve blogged about previously, which exploits vulnerabilities in software development.

A forensic analyst who investigated breaches in both countries found a common thread in each hack. Servers in Virginia owned by HopOne, an ISP, were used as a routing point, receiving their commands from another set of servers at a Dutch hosting company.

Here’s where Big Brother is watching, and in this case, for good reason.

Last spring, US investigators working with Dutch authorities requested that all data traffic from the Dutch servers on route to Virginia be intercepted through wiretapping and provided to authorities.

During this time, criminal hackers from all over the world used the stolen data to create ATM white cards and prepaid gift cards loaded with cash. They withdrew cash from ATMs on three continents to the tune of approximately $450,000.

According to Wired, the wiretapped traffic included email discussions between numerous criminal hackers, regarding their accomplishments. One email address, Analyzer22@hotmail.com, provided investigators with their smoking gun. The Hotmail address had Ehud Tenebaum’s name and age registered along with it. Not too smart, E.T.

Ehud Tenebaum owned and operated a Canadian computer security company called Internet Labs Secure. One of the IP addresses used to access the Hotmail account was registered to Tenebaum’s business. E.T. phoned home and got caught.

This is one example of high tech organized criminals taking advantage of numerous flaws in the technology we use every day.

Be warned, there are plenty more to take E.T.’s place. Chances are, someone moved right in where he left off.

Invest in identity theft protection. Install and update Internet security software such as McAfee. Check your bank and credit card statements online bi-weekly and make sure to refute unauthorized charges within a 30 to 60 day period.

I’m excited to work with uni-ball in 2009 in a partnership to help raise awareness about the growing threat of identity theft and provide tips for protecting yourself. Check out uniball-na.com for more information.

Identity Theft Speaker Robert Siciliano discussing credit card hacks here

Identity Theft Prevention is a People Problem

Robert Siciliano Identity Theft Expert

Every week we learn of a new hack, another breach, credit cards stolen and another identity theft victim.

Many have blamed the bad guy or criminal hackers for all the problems we have in the security world. And while the bad guy is certainly a problem, they are a small part.

The people responsible for their own physical or computer security or the security of others are often the guilty.

You wonder why your credit card company sent you a new card? Because some baboon didn’t do his job and your were compromised.

Chances are we could look at 7 out of 10 data breaches and point to someone who didn’t properly flip a switch or lock a door.

Recent studies polling companies with 1000 or more employees when asked to define the most important measures for protecting confidential data, nearly half of all respondents said, “communicating and training users on confidential data security policies.”

And when asked to rate their organizations performance with regard to, “communicating and training users on confidential data security policies,” more than one-fourth of security professionals gave their organization a rating of either “fair” or “poor.”

North Americans ranked 24% as being “poor” while Europeans ranked 38%. I suspect the North Americans are just lying and are just as lax. I read the papers and see the data. Pleeeeze. I have my eye on you Focker.

Security is not entirely an IT problem. There are many “to-dos”, policies in place regarding physical security that must be observed. And if followed properly, would reduce many of the breaches we see.

One plain and simple example is dumpster diving. How prevalent are shredders? I’ve gone though 4. Besides the copy machine or your desk/laptop, a shredder should be the most used home/office appliance.

Here is an infuriating video of a dumpster diver here, also a security professional who spent 3 minutes in the dumpster of a local bank. He found a laptop, wire transfers and Social Security Numbers. That’s not an IT problem. That’s a stupid-lazy-people problem.

How is anyone supposed to feel secure and protect their identity when others are responsible for our security? The fact remains we are an open sore and idiots keep pouring salt in the wounds.

Robert Siciliano Identity Theft Speaker discussing Idiots who didn’t secure a wireless connection and exposed 45 million credit cards Here

I’m excited to work with uni-ball in 2009 in a partnership to help raise awareness about the growing threat of identity theft and provide tips for protecting yourself. Check out uniball-na.com for more information.

A Day In The Life of A Scammer

Robert Siciliano Identity Theft Expert

How can I get you to believe me? What can I say or do to convince you I’m legit? What methods should I use to pull it off?

I don’t have a job. I’m essentially unemployed. However I do have a career. And it involves figuring out ways to get others to pay me. Every day I perform tasks to bring eye balls to what I’m offering, selling or trying to get. What is this vocation? Scammer.

I work all over the world, I travel and meet interesting people. I like what I do, every day is a new and exciting opportunity.

There’s a sucker born every minute. Today I’m looking for you. And I’ll find you.

All day, every day my one goal is to get you to part with your hard earned dollars and here is ONE DAYs worth of reports of my activities:

Scammers Hawk Man’s House On Craigslist

Man who owns a rental home in Dennisport found scammers offering up his home for rental on the Web site …

Online Scammers Creating Fake Local News to Attract Your Clicks …


Transferring money for someone else

If you agree to take part, the scammer could use your account details to clean out your savings.

Great way to steal an identity. But there are ways to protect yourself.

Scammers customize news to deliver you malware
The scammers are using IP address geolocation techniques to figure out what city the recipient lives in and are localizing the fake bomb news to that …

Scammers using Twitter To Get Your Information
The SC Department of Consumer Affairs is warning twitter users to be on the lookout for scams, particularly phishing scams.

Scammers target animal lovers in classified ads
This time, the scammers lure in their victims with the offer of cute pets to tug at their heartstrings. “A lot of them get placed online,”

Officials say scammers taking advantage of people seeking jobs in …
State officials are warning about scams affecting those seeking jobs during the current economic downturn. State officials are warning about scams …

Stimulus Money Scammers Target Families
As soon as the government’s big stimulus package was approved, scammers got on the internet and started trying to get their hands on the money. …

Art Dealers Accused of Rigging Appraisal
He was the consummate con man. He created this image that he had a huge collection of wonderful paintings. The impression given, and taken, was that he was …

Scams abound, costing locals tens of thousands The …
The victim is approached by the con man holding a wallet or bag containing cash. The con man shows the money to the victim and asks if it belongs to her, a way of breaking the ice to set up the scam…

More than 1000 women conned by rogue marriage agency
ONE woman was conned into offering her life savings, while another was duped into sleeping with a man by a rogue marriage agency specializing in foreign …

Lightning rod scam zaps local elderly couple
Officials fear the lightning rod installer may be scamming other elderly couples so they’re urging

Residents Effected By Scammers Washing Checks
“They take that check thats made out to CPL has your signature on … they wash off the amount and the to thats where it becomes check washing. …

I worked hard today. Its a hard way to make an easy living. But it was fun and always funny to see you get all bent out of shape when I read about you in the news. Tomorrow is another day, and another scam.

Robert Siciliano Identity Theft Speaker discussing Scams Here

I’m excited to work with uni-ball in 2009 in a partnership to help raise awareness about the growing threat of identity theft and provide tips for protecting yourself. Check out uniball-na.com for more information

Identity Theft Crime Victims Bill of Rights

Robert Siciliano Identity Theft Expert Speaker

A consortium of a number of companies in the identity theft prevention space have banded together to create a “Bill of Rights” for victims of identity theft. A Bill of Rights would provide victims of identity theft the needed leverage in response to a breach of their information that leads to numerous forms of identity theft. The consortium has some work to do to get the attention of legislators before it becomes law. This is certainly a noble effort that if passed will provide significant relief to victims.

I speak to victims on a weekly basis and the stresses of being victimized takes its toll. When a thief is functioning in society as you, fraudulently, irresponsibly and of course illegally, they tarnish every aspect of your life. There is an overwhelming sense of helplessness for many victims due to the notion that they are guilty until proven innocent. While this will in essence “take an act of congress” to become law, a good faith implementation of the bill by industry and government would certainly provide needed relief to those affected.

The Santa Fe Group, a financial services consulting firm, and The Santa Fe Group Vendor Council, a consortium of leading service providers to the financial services industry, today released the first comprehensive Bill of Rights for victims of identity theft. The Bill of Rights calls for consistent processes for handling identity crime incidents in addition to amendments to privacy legislation and regulation so victims can more easily access and correct their personal information records.

The five basic rights address the need for legislation that enables individual victims of identity theft to access and correct personally identifiable information (PII) records. The Bill of Rights white paper, titled Victims’ Rights: Fighting Identity Crime on the Front Lines, is now available.

The Identity Crime Victims Bill of Rights advocates improved protection and support for victims and includes:
• Assessment of the nature and extent of the crime that removes the procedural “Catch-22s” when validating identity
• Full restoration of victims’ identities to pre-theft status, including the ability to expunge records
• Freedom from harassment from collection agencies, law enforcement and others
• Prosecution of offenders and accountability for businesses that fail to reasonably secure personal information
• Restitution that includes repayment for financial losses and expenses

The white paper effort was led by the Identity Management Working Group of The Santa Fe Group Vendor Council chaired by Rick Kam, President of ID Experts

“Despite new additions to the Fair and Accurate Credit Transaction Act of 2003 (FACT), such as free credit reports and the ability to place fraud alerts after identity theft, victims are still subject to inconsistent and unfair treatment from state and federal agencies, law enforcement and businesses,” said Rick Kam, President of Portland-based ID Experts, a leader in data breach prevention and remediation. “We created the Bill of Rights to empower victims by granting them the same rights as victims of other crimes.”

According to Javelin Strategy and Research, 9.9 million Americans were victimized by identity crimes in 2008, an increase of 22% from 2007, with annual costs to consumers and businesses of more than $49 billion. In their journey to recover their identities, victims face a disjointed maze of privacy laws and information sources. Law enforcement processes are not always in place, and organizations often won’t share evidence with victims. As a result, a victim’s life can be disrupted for years.

“Victim empowerment is key to thwarting identity crime,” said Catherine A. Allen, Chairman and CEO of The Santa Fe Group. “With the Identity Crime Victims Bill of Rights, we’ve launched a national call to action, laying the groundwork for meaningful and much-needed legislation while building awareness of the issue in the media and among consumers and businesses. Our intent is that victims of all types of identity crime be provided with the same rights afforded to them via the FACT Act for resolving credit issues.”

Robert Siciliano Identity Theft Expert Speaker discusses identity theft victims Here and Here

Bankers Warned; Massive Credit Card Processor Breached

Robert Siciliano Identity Theft Expert

Hackers have breached another huge payment processor. Who? As of this writing they aren’t saying. A statement issued by the Community Bankers Association of Illinois states “Visa announced that an unnamed processor recently reported that it discovered a data breach. The processors name has been withheld pending completion of the forensic investigation” The Open Security Foundation posted a notice on its website Here

CBAI report here and highlights below

According to VISA officials, the breach affected all card brands. Evidence indicates that the account number, PAN and expiration dates were stolen. No cardholder Social Security numbers, unencrypted personal identification numbers (PIN), addresses or telephone numbers or other personal information were involved in the breach.

An increase in card-not-present fraud suggests some BIN number have been targeted by criminals.

VISA officials reported that while the number of accountholders affected is undetermined, it appears to be fewer than those affected by the recent Heartland Payment Systems breach, but a significant number nonetheless. And unlike the Heartland breach, where thieves also captured Track 2 data, officials reiterated that no personal information was taken in this most recent event.

The status of the processor’s PCI compliance is unknown at this time. Bankers. MORE TO COME….”

Why not go after processors, thats where all the data is!

Visa and MasterCard are in the process of notifying affected banks about what they say is a “major compromise”. So far this is not related to the Heartland Payment Systems breach where an expected 100 million cards have been compromised. Or it may be, we don’t know.

Initial reports say the criminal hackers planted malware, or malicious software on the processors servers. Malware of this type generally has some type of remote control component that allows a criminal hacker to remotely access the server and divert data underground.

Visa reached out to all affected banks on February 12th when they conducted a conference call disclosing the severity of the issue. Apparently the compromise occurred from February of 2008 till August 2008 the past few weeks.

At this point neither Visa or MasterCard haven’t disclosed which processor has been compromised nor have they disclosed the size of the breach.

Whether the unknown processor was compliant or not has also not been revealed.

Check your credit and banking statements carefully. Scrutinize every charge and refute any unauthorized charges within 30-60 days. Call your bank/credit card company immediately if you see any fraudulent activity.

Robert Siciliano Identity Theft Speaker Expert discussing another ugly data breach Here.

CEO “Identity Theft Expert”?? ID compromised 90 times

The press has recently taken issue with CEO of an identity theft prevention company who has given his SSN out for all the world to see. His identity theft protection service is designed to protect the consumer from identity theft.

Because he used the marketing gimmick to drive sales, it has resulted in a never ending battle where identity thieves and others are using his ID to prove a point, that giving out your SSN is never a good idea.

His identity was compromised financially early on and since has been compromised REPORTED 87-90 TIMES.

It is impossible not to give your SSN in a society that needs it for most accounts, insurances etc. Plastering it on a billboard is a great idea when you dont care if your identity is stolen in order to sell a product.

However for the rest of us I’d not recommend it.

The idea is to make the SSN useless by investing in a service that keeps you in-tune, on top of, what is happening regarding your identity by wrapping a security system around your identity.

Stay tuned. Updates on this issue to come.

Identity Theft Expert and Speaker on Personal Security Offers Nine Tips to Help Holiday Travelers Reduce Their Risk of Falling Prey to Crime

(BOSTON, Mass. – Nov. 16, 2007 – IDTheftSecurity.com) A number of reports have, as in years’ past, cited the sharp spike in travel expected over the holiday season, which is set to begin next week. Robert Siciliano, a widely televised and quoted personal security and identity theft expert, offered advice for all travelers to follow, helping them to avoid falling prey to predators and other criminals while away from home.

“Criminals love it when we’re distracted,” said Robert Siciliano. “They’re best able to steal from us, or assault us, when we’re off guard, and travelers are often most likely to be so. Luckily, we can implement simple measures to reduce our risks.”

CEO of IDTheftSecurity.com and a member of the Bank Fraud & IT Security Report’s editorial board, Siciliano leads Fortune 500 companies and their clients in workshops that explore consumer education solutions for security issues. An experienced identity theft speaker and author of “The Safety Minute: 01,” he has discussed data security, consumer protection, and personal security issues such as self-defense on numerous television outlets, including CNBC, on NBC’s “Today Show,” and FOX News.

On Nov. 14, CarJunky.com published an article on safe driving tips, and on the same day, the Monticello Herald Journal quoted law enforcement officials saying the day for Thanksgiving sees the most travel of the season. Siciliano shared nine tips designed to help holiday travelers stay safe during this time of year:

1. Securing your mobile computing equipment: Reports of laptop thefts have dominate the news. Those planning to bring work with them on their holiday travels should secure their mobile computing equipment with technology that guards and retrieves the data on these machines once in the hands of thieves. Once such product, MyLaptopGPS™, allows users, from a remote location, not only to retrieve and delete data from the lost machine, but also to track the device’s whereabouts with Internet-based GPS tracking.

2. Protecting your identity: It may seem old-fashioned, but consider paying with cash whenever possible; even better, try travelers’ checks. Plastic is susceptible to fraud. For instance, unscrupulous wait staff might use a wedge-type device to illegally swipe and capture patrons’ credit card information. A traveler should remember to be careful with credit cards and, also, to exercise caution when divulging a Social Security number. To learn more about identity theft, readers may watch video of Siciliano at VideoJug.

3. Understanding the fundamentals: Body language is 55 percent of communication. Strive to appear in control of yourself and your plans. Be alert to your surroundings. At all times, know what is going on 50 feet to 100 feet around the perimeter of your body. Voice tone and pitch equal 35 percent of communication. The way you communicate physically and verbally can determine whether a predator deems you a good target, so be confident and succinct.

4. Airport awareness: Airports are havens for criminals. Pay full attention to your belongings when airport security screens you. Fully cooperate with security personnel and be patient. Beware of strangers who are distracting or watching you.

5. Preventing abductions: Returning to a parked car, scan the area around it and watch for suspicious activity. Vans are telltale signs of foul play waiting to happen. Abductors and rapist will open the side door and pull their victims inside.

6. Pickpockets and thieves: Do not fight over material items. Carry currency in small amounts and denominations. Keep it in an easily accessible pocket. If someone tries to rob you, throw the “chump change” several feet away. This will distract the robber and give you time to escape.

7. Telephone basics: Protect your calling card number. Be wary of everyone around you as you enter this number. In airports, thieves could be videotaping a “going away” couple right behind you as you punch in your digits. The person standing at the phone next to you could be relaying your number to an accomplice.

8. Rental cars and transportation: Hide rental agreements, dead giveaways that you are traveling. Keep these off the dash. Don’t store valuables in the trunk, as many rental cars use a universal key to unlock everything. If you lose the ignition key, you may very well lose everything. Should you find yourself in a minor accident, stop only in a well-lit area. Carjackers provoke such “accidents” just to get travelers to stop. Do not stop on a deserted, dark street.

9. Staying at the hotel: Be suspicious of a call from the hotel desk just after check-in. The person on the other end of the phone may request verification of your credit card number “because the imprint was unreadable.” In reality, a thief may have watched you enter the hotel room and called from the guest phone in the lobby.

“On your way to visit family, make regular calls to loved ones and let them know where you are,” Siciliano concluded. “This ensures that they’ll have the most accurate idea possible of your whereabouts should a predator get the best of you.”

###

About IDTheftSecurity.com
Identity theft affects us all. Robert Siciliano, CEO of IDTheftSecurity.com and member of the Bank Fraud & IT Security Report’s editorial board, makes it his mission to provide consumer education solutions on identity theft to Fortune 500 companies and their clients.

A leader of personal safety and security seminars nationwide, Siciliano has been featured on “The Today Show,” CNN, MSNBC, CNBC, “FOX News,” “The Suze Orman Show,” “The Montel Williams Show,” “Maury Povich,” “Sally Jesse Raphael,” “The Howard Stern Show,” and “Inside Edition.” The Privacy Learning Institute features him on its Website. Numerous magazines, print news outlets, and wire services have turned to him, as well, for expert commentary on personal security and identity theft. These include Forbes, USA Today, Entrepreneur, Woman’s Day, Good Housekeeping, The New York Times, Los Angeles Times, Washington Times, The Washington Post, Chicago Tribune, United Press International, Reuters, and others.

Visit Siciliano’s Web site, blog, and YouTube page.

The media are encouraged to get in touch with Siciliano directly:

Robert Siciliano, Personal Security Expert
CEO of IDTheftSecurity.com
PHONE: 888-SICILIANO (742-4542)
FAX: 877-2-FAX-NOW (232-9669)
Robert@IDTheftSecurity.com
www.idtheftsecurity.com

The media may also contact:

Brent W. Skinner
President & CEO of STETrevisions
PHONE: 617-875-4859
FAX: 866-663-6557
BrentSkinner@STETrevisions.biz
www.STETrevisions.biz

Identity Theft Expert and Speaker on Personal Security Points to Organized Crime and Warns that Identity Thieves Target All Demographics—Not Just the Wealthy

(BOSTON, Mass. – Aug. 21, 2007 – IDTheftSecurity.com) According to various reports, last week authorities arrested members of an identity theft ring that was targeting members of the Forbes 400 list. Robert Siciliano, a widely televised and quoted personal security and identity theft expert, said the superrich aren’t the only targets of identity theft, often the work of organized criminals.

“Organized crime rings, both international and domestic, have shown an affinity for identity theft,” said Siciliano. “This is nothing new. It’s also why a robust, flexible federal policy to counter identity theft is so important.”

CEO of IDTheftSecurity.com and a member of the Bank Fraud & IT Security Report’s editorial board, Siciliano leads Fortune 500 companies and their clients in workshops that explore consumer education solutions for security issues. A longtime identity theft speaker and author of “The Safety Minute: 01,” he has discussed data security and consumer protection on CNBC, on NBC’s “Today Show,” FOX News, and elsewhere.

On Aug. 16, Reuters and others reported that U.S. authorities had “crack[ed] an identity theft ring…whose targets included billionaires from the Forbes magazine ranking of the richest 400 Americans.” Research has established that identity thieves target not only high-income bracket earners (i.e., those whose annual earnings exceed $75,000), but also households headed by people ages 18 to 24, regardless of income. U.S. Bureau of Justice statistics from 2004 revealed that these two demographic groups were the most likely to experience identity theft.

The ringleader behind the theft of financial information from those listed on Forbes 400 reportedly gained access to the data via his Internet connection overseas. According to Siciliano, the group’s methods and hierarchy resembled organized crime’s telltale modus operandi. He further noted that Nigerian criminals were found to be behind the socially engineered breach of data at ChoicePoint Inc. over two years ago, and that reports have documented organized crime’s suspected involvement in data security breaches since.

“Anyone, at any income level, is a potential target of identity thieves,” said Siciliano, “In fact, often an identity thief or identity theft ring will steal literally thousands of people’s identifying information to fake several identities, engaging in subsequently fraudulent activities under many names, an approach that can frustrate law enforcement’s efforts and may be easier to pull off under the auspices of organized frameworks involving many criminals, not just one.”

Readers may view YouTube video below of Siciliano on MSNBC discussing an elaborate, organized crime ring that involved restaurant workers using card-skimming devices to commit systematic fraud with patrons’ credit card numbers. Readers may learn how to protect themselves against identity theft, a major concern for anyone whose electronic communication devices have been hacked, by viewing video of Siciliano at VideoJug.

###

About IDTheftSecurity.com
Identity theft affects us all. Robert Siciliano, CEO of IDTheftSecurity.com and member of the Bank Fraud & IT Security Report’s editorial board, makes it his mission to provide consumer education solutions on identity theft to Fortune 500 companies and their clients.

A leader of personal safety and security seminars nationwide, Siciliano has been featured on “The Today Show,” CNN, MSNBC, CNBC, “FOX News,” “The Suze Orman Show,” “The Montel Williams Show,” “Maury Povich,” “Sally Jesse Raphael,” “The Howard Stern Show,” and “Inside Edition.” The Privacy Learning Institute features him on its Website. Numerous magazines, print news outlets, and wire services have turned to him, as well, for expert commentary on personal security and identity theft. These include Forbes, USA Today, Entrepreneur, Woman’s Day, Good Housekeeping, The New York Times, Los Angeles Times, Washington Times, The Washington Post, Chicago Tribune, United Press International, Reuters, and others.

Visit Siciliano’s Web site, www.IDTheftSecurity.com; blog, www.realtysecurity.com/blog; and YouTube page, http://youtube.com/stungundotcom.

The media are encouraged to get in touch with Siciliano directly:

Robert Siciliano, Personal Security Expert
CEO of IDTheftSecurity.com
PHONE: 888-SICILIANO (742-4542)
FAX: 877-2-FAX-NOW (232-9669)
Robert@IDTheftSecurity.com
www.idtheftsecurity.com

The media may also contact:

Brent W. Skinner
President & CEO of STETrevisions
PHONE: 617-875-4859
FAX: 866-663-6557
BrentSkinner@STETrevisions.biz
www.STETrevisions.biz

Identity Theft Expert and Speaker on Personal Security Says the Behavior and Attributes of Security-Enhanced Credit Cards Must Be Simple for Users

(BOSTON, Mass. – Aug. 7, 2007 – IDTheftSecurity.com) Last week researchers touted the characteristics of a hypothetical high-functioning “dream credit card” that would offer consumer tools to prevent and detect credit card fraud. Robert Siciliano, a widely televised and quoted personal security and identity theft expert, commended the idea of such a card, but said simpler solutions already exist through technology that relies on credit cards’ existing attributes and relieves the consumer of the need to implement his or her own security measures.

“It’s a commendable idea to suggest the development of a highly functional credit card that dissuades fraudulent activity,” said Siciliano. “At the same time, the market continues to ignore technology already available that, if implemented en masse, would drastically reduce the incidence of credit card fraud and, by corollary, identity theft.”

CEO of IDTheftSecurity.com and a member of the Bank Fraud & IT Security Report’s editorial board, Siciliano leads Fortune 500 companies and their clients in workshops that explore consumer education solutions for security issues. A longtime identity theft speaker and author of “The Safety Minute: 01,” he has discussed data security and consumer protection on CNBC, on NBC’s “Today Show,” FOX News, and elsewhere.

A press release from Javelin Strategy & Research, dated Aug. 1, detailed the security features of what the organization termed a dream credit card. Javelin researchers claimed that a hypothetical credit card with the functionality they announced not only held the promise of putting consumers in control of security measures against identity fraud, but also presented “a golden opportunity” for card issuers “to increase loyalty and retention, and strengthen relationships and their brand reputation,” according to Javelin President James Van Dyke, quoted in the release. The credit card proposed includes options for consumers to enhance their own cards’ security levels.

“The idea that security is a marketing tool is a solid one,” said Siciliano. “This is a concept that card issuers ought to embrace. But, too often, industry places too much hope in solutions touted as panaceas to the fundamental problem of securely authenticating the card user at the point of sale. And, with too many steps or choices, security of any type becomes too confusing for the typical consumer, who, prizing ease of use above all, isn’t sufficiently adept at setting options on limits, setting up instant messaging, or tooling around with security settings.”

Siciliano advised card issuers to consider simpler technologies that rely on existing credit card attributes—and very little on consumers’ attention to their credit cards’ security features beyond the proactive step of making the decision to get a card that’s more secure.

Every credit card, for instance, has a magnetic strip on the back, composed from the slurry that comprises billions of microscopic particles. Like DNA, no two credit cards’ magnetic strips are alike; each is unique. MagnePrint®, from the company of the same name, is a technology that assigns an identity to this uniqueness, a fingerprint unlike any other, at the credit card’s point of manufacture. As Siciliano mentioned in his article for the August 2007 edition of the Bank Fraud & IT Security Report, complementing hardware known as MagTek® works in concert with MagnePrint at the point of sale (POS) to protect transactions from fraud.

“Card issuers might market their cards’ security features with great success,” Siciliano concluded. “But a game-changing, new breed of secure credit card must seem, to the consumer, exactly like the previous breed in terms of how to use it.”

Readers may view CNBC footage on YouTube, below, that features Siciliano discussing debit card and credit card scams. Readers may learn how to protect themselves against identity theft, a major concern for anyone whose electronic communication devices have been hacked, by viewing video of Siciliano at VideoJug.

###

About IDTheftSecurity.com
Identity theft affects us all. Robert Siciliano, CEO of IDTheftSecurity.com and member of the Bank Fraud & IT Security Report’s editorial board, makes it his mission to provide consumer education solutions on identity theft to Fortune 500 companies and their clients.

A leader of personal safety and security seminars nationwide, Siciliano has been featured on CNN, MSNBC, CNBC, “FOX News,” NBC’s “Today Show,” “The Suze Orman Show,” “The Montel Williams Show,” “Maury Povich,” “Sally Jesse Raphael,” “The Howard Stern Show,” and “Inside Edition.” The Privacy Learning Institute features him on its Website. Numerous magazines, print news outlets, and wire services have turned to him, as well, for expert commentary on personal security and identity theft. These include Entrepreneur, Woman’s Day, Mademoiselle, Good Housekeeping, The New York Times, Los Angeles Times, Washington Times, The Washington Post, Chicago Tribune, United Press International, Reuters, and others.

Visit Siciliano’s Web site, www.IDTheftSecurity.com; blog, www.realtysecurity.com/blog; and YouTube page, http://youtube.com/stungundotcom.

The media are encouraged to get in touch with Siciliano directly:

Robert Siciliano, Personal Security Expert
CEO of IDTheftSecurity.com
PHONE: 888-SICILIANO (742-4542)
FAX: 877-2-FAX-NOW (232-9669)
Robert@IDTheftSecurity.com
www.idtheftsecurity.com

The media may also contact:

Brent W. Skinner
President & CEO of STETrevisions
PHONE: 617-875-4859
FAX: 866-663-6557
BrentSkinner@STETrevisions.biz
www.STETrevisions.biz