THIEVES INITIATE NEW IDENTITY THEFT SCAMS IN TIME FOR TAX SEASON

uni-ball® teams with Identity Theft Resource Center and Identity Theft Expert Robert Siciliano to Warn Consumers of Latest Scams and Offer Anti-Theft Solutions 

Oak Brook, Ill. – March 4, 2009 – Tax time scams are at an all-time high, according to Robert Siciliano, well-known identity and security theft expert and author of the book “The Safety Minute: How to Take Control of Personal Security and Prevent Fraud.”  As economic pressures continue to increase, Siciliano says criminal activities such as sophisticated, organized theft, including the number of new scams intended to trick consumers this tax season, are expected to rise as well. 

“More than 155 million tax forms were filed last year,” said Siciliano, “the majority of them without incident.1  But people need to understand that thieves are inventing new ways to steal identities each and every day.  And since tax time is a key period when we see a spike in identity theft, it’s crucial that we get the word out now and educate people about the latest scams.”  

As part of the its ongoing campaign to elevate awareness about the growing threat of identity theft, uni-ball®, a leading brand of pens, many of which contain specially formulated ink that helps prevent check fraud, is working with the Identity Theft Resource Center (ITRC) and Siciliano to help stop identity thieves in their tracks.   As CEO of IDTheftSecurity.com, Siciliano has seen first-hand the brute blow identity theft delivers to its victims, and has helped scores of them dig out from the financial and emotional turmoil of being scammed.  

Together, the ITRC, Siciliano and uni-ball are issuing the following warnings, asking consumers to be on high alert during tax time for these identity theft scams and more:

·         Professional Thieves and Targeted Attacks.  The ITRC anticipates an increase in more sophisticated ways to “mine” information, sometimes by organized crime groups. Cybercrime, which includes transporting or selling large amounts of personal information from one group both nationally and internationally, will continue and expand. Part of this trend includes “skimming” (duplicate scanning of credit cards or debit cards), and the use of fake fronts on payment scanners and ATM machines. 

uni-ball® teams with Siciliano to promote simple anti-theft solutions during tax season – Add One

·         Tax Preparer Scams.  Most recently, there are reports of tax preparers telling clients they must pay back their 2008 stimulus payments and then pocketing the money.  Not all professional tax preparers have your best interest at heart, according to the ITRC.  Make sure you do research and choose your tax preparer wisely.

·         Check Fraud. As it becomes more difficult to get new lines of credit, identity thieves may be increasingly drawn to commit check fraud. These crimes may take the form of stolen checks, using checks thrown into the trash by unknowing consumers, or a type of identity theft known as “check washing.” Check washing occurs when checks or other tax-related documents are stolen from the mail or by other means and the ink is erased using common household chemicals, allowing thieves to endorse checks to themselves.   This is where something as simple and inexpensive as a uni-ball pen can help.  Select Uni-ball pens contain specially formulated gel ink (trademarked Uni-Super Ink™) that is absorbed into the paper’s fibers and can never be washed out. 

·         Late Payment Scam.  As people fall behind on their utilities or taxes, lists are created and available either internally or as public record. These lists can fall into the wrong hands and thieves call unassuming people to collect.

  • Text Messaging Scams: Phexting.  Criminal hackers have access to everything these days, including the technology that generates cell phone numbers, as well as access to mass text messaging services. Once the data is secured, they are able to send text messages that install keyloggers (a method of capturing and recording user keystrokes) or direct you to Web sites that steal personal data.

·         Internet Scams: Phishing.  Phony e-mails that try to trick customers into giving out personal information are the hottest, and most disturbing, new scam on the Internet. “Phishing” frauds attempt to make Internet users believe they are receiving email from a specific, trusted source, or that they are securely connected to a trusted Web site, when that is not the case.  This scam is generally used as a means to convince individuals to provide personal or financial information that enables the perpetrators to commit credit card, bank fraud or other forms of identity theft.

“Identity theft is a giant octopus,” said Siciliano.  “Educate yourself on the many facets of the problem and learn your options to defend yourself from each leg of this monster.  Doing something as simple as paying attention to the pen you use could save you thousands of dollars and endless hours of headaches.  Personally, I never write checks or sign important documents without using a uni-ball gel pen with specially formulated Uni-Super Ink.”  

“Uni-ball pens with Uni-Super Ink help prevent identity theft,” said Steve Gradman, senior brand manager of uni-ball.  “Our goal is to help ease the minds of individuals when writing sensitive materials – from legal and medical documents to checks and tax forms.  It’s a simple, inexpensive pen, but it packs a lot of punch when it comes to identity theft prevention.

uni-ball®teams with Siciliano to promote simple anti-theft solutions during tax season – Add Two 

Many uni-ball pens, including the uni-ball 207 gel pen, the Jetstream, Jetstream RT and Vision Elite roller ball pens, use specially formulated inks that contain tiny color pigments.  This exclusive “Super Ink™” helps prevent document and check fraud by absorbing into the paper fibers. When an individual tries to wash or lift the inked information written on the document, the ink remains “trapped” within the fibers of the paper, thereby discouraging the efforts of identity thieves.

Identity theft rose 22 percent in 2008, and Siciliano predicts it will go up again in 2009.   “Now is the time to become educated in order to prevent this offensive crime,” he said.

 For more information on how to protect yourself this tax season, visit www.uniball-na.com

### 

1 http://www.irs.gov/newsroom/article/0,,id=188359,00.html 

About uni-ball®

uni-ball® is a world leader in providing an optimal writing experience, offering writing instruments with superior functionality and affordability.  From the JetStream® pen’s smooth write to the intense color and superior performance of the uni-ball 207 gel pen, the brand allows one to enjoy the ultimate in writing performance coupled with a distinctive, contemporary style.  Newell Rubbermaid Office Products, marketer and distributor of uni-ball® pens in North America, is a worldwide leader in the manufacturing and marketing of writing instruments, art products and office organization and technology products, including such well known brands as Paper Mate®, Sharpie®, DYMO® Parker®, Waterman®, EXPO®, uni-ball®, and Rolodex®, among others. Visit www.uniball-na.com for more information.

About Robert Siciliano

Robert Siciliano “The Lifesaver” is an expert on personal security and identity theft. He has 25 years of experience in self-defense, security work, martial arts and white collar crimes.  An author, sought after media personality and identity theft speaker, Robert has been seen on the Today Show, CBS Early Show, CNN, MSNBC, FOX, CNBC, USA Today, Forbes, Good Housekeeping, Readers Digest, Consumer Digest, Boston Globe, Washington Post, Chicago Tribune, ABC News.com, TechRepublic, Search Security, AP, UPI, Reuters, and Entrepreneur. Robert recently released his third book, “The Safety Minute: How to Take Control of Personal Security and Prevent Fraud”.

About the ITRC

The San Diego-based Identity Theft Resource Center (ITRC) is a non-profit (501(c) 3) organization established in December 1999, to support victims of identity theft in resolving their cases, and to broaden public education and awareness in the understanding of identity theft. It is the on-going mission of the ITRC to assist victims, educate consumers, research identity theft and increase public and corporate awareness about this problem.  

Are You a Hacker or Hackee?

Robert Siciliano Identity Theft Expert Speaker

In the past decade there have been hundreds of data breaches resulting in millions of compromised records. The motivation behind these hacks? Identity Theft. As a results dozens of new laws and government intervention to protect citizen data.

Black, White or Grey, over the past decade the media has given the term “hacker” a negative connotation. Or is it hackers that gave the term a negative connotation? Just asking!? Either way, whenever I’m talking bad guy hacker I’m careful to precede the word hacker with “criminal” so I don’t piss off anyone who considers themselves a good guy hacker.

Thomas Edison, Benjamin Franklin and Alexander Graham Bell were all hackers. Good ones too.

Hackers in general take pride in their skills, as they should. They are often a head above the rest, on top of what is new and ahead of whats next in technology. Many are self taught and many hone their skills with additional formal training.

In the past the word “Cracker” has been tossed around and never quite stuck when referring to criminal hackers. And of course “scriptkddie”, referring to bad hackers that are just trying to make a name for themselves. We don’t hear that term much anymore due to the fact that most mischievous hackers are generally criminal because they are breaking the law.

What many are beginning to realize is there is a battle going on 24/7/365 between the whitehats and the blackhats. President Obama has chimed in with a directive to review the nations cyber security as it relates to security and our critical infrastructures. You are either a (criminal) hacker or a hackee. Predator or prey.

The US Federal Aviation Administration, the bureau that would have been in the best position to stop 9/11, recently disclosed a breach in a server that was hacked.

Very recently reports came in from a Romanian based blog bragging about scriptkiddie type accomplishments that the criminal hackers had compromised sites owned by Kaspersky Security, F-Secure and BitDefender. To what degree they were compromised and if was considered a real threat is unknown. They all reported data was not stolen. Initial reports include hacks known as SQL injections and cross-site scripting, which affects applications and can steal data.

All this means the criminal hackers are not messing around. While this all may be over the heads of most hackees, it’s a real problem that everyone should and, unfortunately, will continue to become more familiar with. As a citizen who uses various technologies, you need to make a concerted effort to understand what you are up against and put systems in place to protect yourself.

Robert Siciliano Identity Theft Speaker Expert discussing criminal hackers busted Here

Identity Theft Speaker Expert on National Television 2/24/09 M&J Show

Robert is in NYC Tues AM on the Morning Show with Mike and Juliet “M&J Investigates” work at home scams. http://www.mandjshow.com/about-the-show.

Here are past shows:
Holiday Scams http://www.youtube.com/watch?v=Q22ifUbTbiY

Cyber Monday Scams http://www.youtube.com/watch?v=Ixn26vVTfns

More here: http://www.youtube.com/user/stungundotcom

Show times and listings http://www.mandjshow.com/about-the-show/

Homepage www.IDTheftsecurity.com

LinkedIn http://www.linkedin.com/in/robertsiciliano
Twitter https://twitter.com/RobertSiciliano
FriendFeed http://friendfeed.com/identitytheft
Blog http://robertsiciliano.com/blog/
YouTube http://www.youtube.com/stungundotcom
Finextra http://www.finextra.com/community/profile.aspx?id=44396
BankInnovation http://bankinnovation.net/profile/IdentityTheftSpeaker
Facebook http://www.facebook.com/people/Robert-Siciliano/534933030
IMDB http://www.imdb.com/name/nm2892079/resume
Wiki http://en.wikipedia.org/wiki/Robert_Siciliano

Preventing Inside Jobs, Keeping Inside Hackers – Out

Robert Siciliano Identity Theft Speaker and Expert

Are you familiar with a “Logic Bomb”? This is a brilliant piece of code, a virus, designed for destruction. The goal of a logic bomb is to disable existing systems that may monitor data, protect it, back it up or access it. A logic bomb is designed to multiply like any virus and spread throughout a network multiplying its effects.

In a Wall Street Journal story an example provided, depicts an employee at Fannie Mae, knowing he is about to be fired commits an act of workplace violence by installing a logic bomb set to detonate almost 3 months after his departure. The detonation would have taken the organization off line for almost a week and cost millions and millions of dollars.

In this true crime story, an observant programmer, still employed noticed the code and disabled it before the damage could be done.

Think for a moment about your home/flat/apartment and how you would break in if you lost your keys. And if a burglar knew what you knew about where you hide and store your stuff. How much damage could he do, knowing what you know? Insiders pose the same problem. They know the ins and outs of all systems in place and can wreak havoc on your operation while they are employed and sometimes after they are let go.

The problems begin when we put people in a trusted place. They are granted access because that’s their job to perform certain duties and they are granted carte blanche access. Ultimately this is a people problem and needs to be addressed that way.

1. Limited Sources; only grant access to a few trusted sources. Minimize the amount of staff that has access to whatever systems in place.

2. Due Diligence; in the information age, our lives are an open book. Background checks from information brokers are very necessary. Not doing a background check increases your liability. A person previously convicted of a crime just might do it again.

3. Limit Access; even a good apple eventually can go bad. By restricting the access to even those who are in a trusted position, in the event they turn sour, they can only do limited damage.

4. Defense in Depth; audit, audit, audit. This is all about checks and balances. Separation of powers. Multiple layers of authorization. We’ve all watched the movie where in order to launch the missile there were 2 keys held by 2 people, who pressed 2 buttons in order for the missile to launch. Put systems in place that facilitate someone always watching over someone’s shoulder. This way the bad apple can’t hide or execute their malicious intent.

5. Prosecute the Guilty; in the event of a breach of trust, make an example of the person that others won’t forget. Public hangings set a strong deterrent.

It is human nature to trust each other. We are raised to be civil towards one another and to respect those in authoritative positions. It takes a significant amount of trust in your fellow human being to drive down the street while cars are heading toward you only separated by a thin painted line. Without trust we wouldn’t get out of bed in the morning.

This explains why we are completely beside ourselves when someone who we have bestowed our faith and trust in deceives us. A week doesn’t go by where we read of the local girls team soccor coach was preying upon his underage team members. And we are still shocked.

Throughout our lives, and especially lately, we have observed government officials, CEOs from major corporations down to front line staff and many others who have been put in positions of trust, who ultimately deceived. Putting someone in a trusted position, without checks and balances can lead to utter destruction, and is liable and irresponsible.

Robert Siciliano Identity Theft Speaker and Expert; video discussing background checks

Unlucky in Love? Feb. 13th is Your Lucky Day!

Unlucky in Love? Feb. 13th is Your Lucky Day!

Hi,
Lisa Daily, friend and colleage wrote a great book “How to Date Like a Grown-Up: Everything You Need to Know to Get Out There, Get Lucky, or Even Get Married in Your 40s, 50s and Beyond” and featured me and my tips on safe dating both online and off.

Buy it!

If you’ve been unlucky in love (or just not lucky enough). Friday, February 13th will be your lucky day.

Why? If you buy How to Date Like a Grown-Up: Everything You Need to Know to Get Out There, Get Lucky, or Even Get Married in Your 40s, 50s and Beyond (written by my friend, bestselling author Lisa Daily) today at Amazon.com, you’ll get more than $800 worth of free bonus gifts.

How’s that for a Valentine’s Day present?

How to Date Like a Grown-Up offers realistic, counterintuitive advice that will help you finally find the relationship you deserve, including: where and how to meet better men, 5 easy tips to chat up any stranger, what you may be doing to make yourself a magnet for losers, little-known secrets to dramatically improve your dating odds, and the one simple thing you can do in the bedroom to make a man speed up his marriage proposal. (It’s not what you think!)

For today only, you can get an online goodie bag worth $800 when you purchase How To Date Like a Grown-Up: Everything You Need To Know To Get Out There, Get Lucky, or Even Get Married in Your 40s, 50s and Beyond. (It’s about $12 at www.Amazon.com)

For details and a complete listing of all the goodie bag items, which includes a free T-Tapp exercise video download (lose 2 sizes in 30 days!), free dating site membership, a collection of fantastic audio downloads, sneak peek chapters of not-yet-released books from bestselling authors, and lots of other goodies, check out www.lisadaily.com/swagbag

Here are some of the bonuses you’ll receive if you purchase HOW TO DATE LIKE A GROWN-UP today!

Purchase HOW TO DATE LIKE A GROWN-UP today and you’ll receive:

* $5 OFF (20%!) THE FABULOUS MAN-MAGNET PARFUME GLACé (www.HerbanAvenues.com)

* Free exclusive T-Tapp exercise video download from Teresa Tapp (Lose 2 sizes in 4 weeks!)

* Two months FREE membership at Cupid.com, the premier online dating site. (www.cupid.com)

* 7 THINGS EVERY WOMAN MUST KNOW TO PROTECT HERSELF ONLINE EXCLUSIVE AUDIO DOWNLOAD
Lisa Daily interviews Robert Siciliano of www.IDTheftSecurity.com about the key things every woman must know to protect herself from online predators.

* Two Free Chapters From FOCUS ON THE GOOD STUFF Bestselling Author Mike Robbins (www.focusonthegoodstuff.com )

* A collection of 5 hilarious essays and 5 audio downloads from humor writer Lisa Earle McLeod, author of Forget Perfect and Finding Grace When You Can’t Even Find Clean Underwear (www.forgetperfect.com)

* Free audio and video access to the Wealthy Girl Summit (www.beawealthygirl.com)

*Free Excerpt and audio programs of Aging Backwards: Secrets to Staying Young

* Your 2009 Shoe Personality Predictions from Donna Sozio

* Free copy of Letters From Friends e-book –by Emily McKay

* Sneak peek of UNPREDICTABLE by the hilarious Eileen Cook (www.eileencook.com)

* Sneak preview of SWEET LIFE by bestselling author Mia King (www.miaking.com)

*Excerpt of SLEEPING WITH WARD CLEAVER by bestselling author Jenny Gardiner (www.jennygardiner.net)

* FREE The Daughter-in-Law Rules eBook (www.thedilrules.com)

* $500 OFF YOUR TUITION TO THE DREAMGIRL ACADEMY WEEKEND SEMINAR

To get your free bonuses worth more than $800, purchase How to Date Like a Grown-Up before 12 midnight PST TODAY at Amazon.com (where it’s currently bargain-priced under $12) and email your receipt to swagbag@lisadaily.com.

The reviews so far:

“Witty and smart, this is a must-read for any woman ready to find Mr. Right. Or at least Mr. Right Now.”
–Christopher Hopkins, Oprah’s Makeover Guy and author of Staging Your Comeback: A Complete Beauty Revival for Women Over 45

“This is for every women who’s come to the realization, “This is a different world, I’m a different person, and I’m not doing things the same old way.”
–Lisa McLeod, Buffalo News, author of Finding Grace When You Can’t Even Find Clean Underwear

“Not only is Lisa Daily absolutely hilarious, but she gives the best advice! Read, laugh, enjoy, but do what she suggests because her advice is spot on!”
-Jennifer Muscato, E! News
##

Tech Executives Are The New Sexy

Robert Siciliano Identity Theft Expert – Speaker

Not to long ago the CIO was a pocket protected, sugared up, soda pop drinking, potato chip eating, caffeinated, non sociable…..well….geek. Not anymore. But you knew that. Serious, Geek is getting even more sexy, stripper pole sexy. A familiar story, a colleague of mine built a tech startup, it has gone from $4 million to $175 million in 3 years. He tells me behemoth tech companies literally send scantily clad hotties to his office weekly, making numerous offers he has to refuse. Hes married, and, he has a board of directors that won’t sell.

Companies not so flush with cash and armed with solutions that actually work, are holding back and not selling out because they are undervalued due to the economic crisis. What compounds their pain is retailers and others who need their technology aren’t buying. It astonishes me that with the amount of data beaches over the past year alone, companies aren’t making the necessary investments.

I see struggling companies offering technologies including identity theft protection, data security that prevents data breaches, defending against criminal hackers from the inside and out, biometric solutions and credit card fraud prevention using multi-factor authentication, all solutions yet to be widely implemented. Solutions that work!

This kind of cost cutting has put the attention on the CIO. Budget cuts have put the CIO front and center.

CIO’s are benefiting big time from the current climate. Sure, many have a much bigger workload, but the chief information officer has become an attractive and strategic financial asset.

The CIO is now very in demand. High tech jobs are some of the most recession proof. While tech is their “job”, they have become go-to-gurus for security, and now for corporate strategy and long term company objectives.

Cost cutting often spurs innovation. Who better to turn to than the CIO who knows what works, and, deals with whiny co-workers when stuff doesn’t work. These are people that generally know what goes on in every nook, cranny and crawl space of the facility and know what is a waste and what streamlines productivity.

If you’re not already, tap your CIO for strategic initiatives and they may have something sexy to say.

Great article by Jon Fortt Here

Completely unrelated distraction of a video of credit card skimming Here

The Five Biggest Security Threats Facing Businesses Today

Robert Siciliano 2/12/2

Millennials, the next generation of technology savvy workers are coming to a cubicle near you. They are a generation of technogeeks that dont know they are techno or geeks. I had a rattle. They had a PS2.

This generation knows enough to fix it and enough to break it. They are the best thing and the worst thing to happen to IT administrators. They are armed with netbooks, iphones and their own routers they plug into your network. They access Facebook, Myspace, Bebo and countless other sites that should not be accessible from a corporate network.

Yes, you can control what they do on-site. But it gets more complicated when they are commuting virtually. Using their PCs to log into your network becomes a battle of the techies (your IT guy vs them) to see who wins. They dont want restrictions, they want speed and will do their best to defeat whatever technology IT has in place.

Poison Pharms; is the redirect of your domain of your companies website, it’s the equivalent of someone rerouting your phone lines to a boiler room operation across the street and posing as your business.

Storm Clouds; as many forgo software and adopt software as a service, the potential for data lost or stolen in the cloud rises. The information is virtual, its overseas, it goes through another router you dont control.

Credit Crunch; recent studies show on average companies will allocate ONE more full percentage point of their annual budget into IT security. ONE! Criminals are spending lots more and they are investing whatever they need to get into your networks and they are using your data and turning it into money to do it.

Offshoring; countries in the game only a short time have exploded with growth in their IT sectors. While most have invested heavily in their infrastructures and in security, the pace of growth for some has outpaced security.

Brilliant article by Nick Heath Here

Video of hackers caught Here

Robert Siciliano Identity Theft Expert and Speaker

Malicious insider attacks to rise. McAfee has a warning

Robert Siciliano Identity Theft Expert www.IDTheftSecurity.com

The world’s biggest software maker has warned companies to expect an increase in “insider” security attacks by disgruntled, laid-off workers.

With millions losing their jobs their are a plethora of opportunities for insiders to plug in an iPod, thumdrive or other external source and steal client data, or other proprietary information.
Its been said before, company networks are like candy bars, hard on the outside and soft and chewy on the inside. Insiders fearing the inevitable layoff begin to look for ways to profit from what is immediately within their grasps.

Stealing office supplies only takes them so far. But hundreds, even millions of records or company secrets is worth something to someone. Those on the inside usually know what its worth to who.

Verizon determined insider attacks equate to up to 18% of all breaches. McAfee further disclosed fraud equates to a trillion dollar price tag.

Maggie Shiels Technology reporter, BBC News does a great job Here

Robert Siciliano is and Identity Theft Expert and CEO of IDTheftSecurity.com he is a business builder, strategic marketer, security analyst, published author, television news correspondent. Delivers presentations on identity theft protection and personal security. Works with Fortune 1000, IT and startups. Launching, branding, messaging, representation, m&a facilitator, SEO and media. Current private equity projects include dynamic biometrics, credit card platform multi-factor authentication, security investigations and telemarketing fraud mitigation. Connect with him on LinkedIn

Robert on Fox discussing ID Theft

Data scams have kicked into high gear, Mr. Ming Yang Has 31,000 Viruses

Robert Siciliano Identity Theft Speaker 2/11/09

“I am Mr. Ming Yang, I have an obscured business suggestion for you. Your services will be paid for. Contact mr_mingyang_desk45@hotmail.com”

Mr Yang sent me an email just now. He wants…my services…? Or something. He’s not my type. My type doesn’t have a filthy virus. Plus he is a dude.

Care for a dalliance? He’s all yours.

Great article here: Data scams have kicked into high gear as markets tumble

As the markets tank, criminals are releasing a barrage of scams. email scams of every kind, infecting peripherals, drive-by viruses and more. In September 2009 there were a record 31,000 viruses released daily. That’s EVERY DAY! Criminal hackers are taking full advantage of the down economy and the overall panic and confusion of the millions of people whose lifetime investments are tanking and others who’ve lost their jobs.

Organized criminals in the form of webmobs are well funded and out for blood. They are breaching your home PC when your kid installs a malicious program to play a game, they are going after mom and pop small businesses all the way up to major enterprise networks.

5 years ago criminal hackers would compromise your machine and wreak havoc. They’d delete your files or crash your machine. Not any more. They want your machine running smooth and efficient.

Your computer network is an asset to organized criminals. They utilize your computing power as a “botnet”, which is a robot network of computers connected to the internet sitting in your home or office. All computers connected to a botnet share something in common, usually a virus that allows for a remote control component and someone or a group of crackers controlling it. They use your PC to do the dirty work sending out more spam, offers and phish emails.

Often your PC would be used as a server to host spoofed websites designed to extract data from the not so savvy who become victimized.

Many of today’s problems stem from applications we use every day that are vulnerable to attack. In criminal hacker forums, viruses are bought and sold that will infect a web based banner advertisement that may incorporate Adobe Flash player. Once the ad is clicked, or not, all you have to do is launch the page in some cases, a piece of code, or malware infects your PC and you become a zombie PC.

Running anti-virus, keeping your operating systems critical security patches updated, firewalls, updating your applications and not being stupid can prevent most attacks.

Here is an appearance discussing an attack on peripherals on Fox News

Robert Siciliano is and Identity Theft Expert and CEO of IDTheftSecurity.com he is a business builder, strategic marketer, security analyst, published author, television news correspondent. Delivers presentations on identity theft protection and personal security. Works with Fortune 1000, IT and startups. Launching, branding, messaging, representation, m&a facilitator, SEO and media. Current private equity projects include dynamic biometrics, credit card platform multi-factor authentication, security investigations and telemarketing fraud mitigation. Connect with him on LinkedIn

Identity Theft Rising; Hits Record 10M Americans in 2008

Robert Siciliano Identity Theft Speaker 2/9/09

Number of fraud victims rises in 2008, but average loss per theft falls, according to a recent study. Article Here It should come as no surprise that identity theft incidents are climbing. Over the past year we have seen hundreds of data breaches resulting in millions and millions of records ripped out of small business to large enterprise networks. Many companies breached were simply irresponsible with the information they were entrusted with. Others were found to be compliant under various standards.

Still, the bleeding continues and as I have said numerous times, it will continue to get worse, it won’t get better and change wont take place until consumer credit is frozen across the board and citizens are properly identified.

A “fulz” is a term used in the underground, defined as an asset of information obtained by a “carder” or criminal hacker, which includes name, address, social security number (US primary identifier), and in some cases account and credit card numbers. A fulz is usually traded online in internet relay chatrooms by criminal hackers who become information brokers. They used to sell a fulz for a few hundred dollars per record, now they are as low as 20 dollars. Why? Supply. There are millions of records for sale. It would take identity thieves multiple lifetimes to get through all the information and turn it into cash.

In 2008 the number of victims rose 22% to a record 9.9 million in 2008 from 8.1 million a year earlier, with about one in 23 U.S. adults becoming victims. Contributing to the problem is the global economy. Desperate people are resorting to desperate acts. Familiar identity theft is when family, friends or coworkers steal IDs from those closest to them. A father and son who share a same name are perfect examples. A son could easily adopt his father’s social security number and open various accounts under his dad’s name. What makes this so easy is the son already has IDs with dad’s name, which he shares.

The study further shows that losses to the victims have dropped. Don’t get too excited, its not what I wound consider significant. It’s enough to acknowledge that consumers are recognizing their identity compromised quicker. Which means a bit of due diligence for the consumer. Good for them. However most are still ripe for the picking due to the fact they don’t take many active steps to lock down their information. That’s where tools such as fraud alert for free, but you have to renew every 90 days or pay a company to do it for you and its on-going hands off. Another option is a credit freeze which locks down your credit preventing even you from getting new credit until its thawed or unlocked.

The study further shows people who made more than $75,000 were more likely to be fraud victims. And the fraud rate was highest among people 35 to 44 years old, which makes sense. For most people, these are prime earning years.

It is important to point out the study was commissioned by 2 companies that benefit from the results. That said, I still believe in the results. I say this because I’m in the same space, and I receive calls and emails daily from victims. These are people that have been caned and waterboarded by identity thieves. Their lives have been abruptly invaded and they have an ongoing barrage of bill collectors and even law enforcement pursuing them because of the crimes of an impostor.

Here is an appearance discussing the same on Fox News

Robert Siciliano is CEO of IDTheftSecurity.com he is a business builder, strategic marketer, security analyst, published author, television news correspondent. Delivers presentations on identity theft protection and personal security. Works with Fortune 1000, IT and startups. Launching, branding, messaging, representation, m&a facilitator, SEO and media. Current private equity projects include dynamic biometrics, credit card platform multi-factor authentication, identity theft security AAS, laptop tracking, security investigations and telemarketing fraud mitigation. Connect with him on LinkedIn