Identity thefts skyrocket, but less than 1% occur online
Computerworld - The number of identity thefts in the U.S. has skyrocketed during the past 15 months, but contrary to public perception, very few of those crimes are happening online, the Federal Trade Commission (FTC) told a presidential advisory council last week.
"Identity theft is expanding and increasing every day," said Jodie Bernstein, director of the FTC's Bureau of Consumer Protection, during the first meeting of the President's Information Technology Advisory Committee. She said 2,000 calls per week poured into the FTC identity theft hotline last month alone. But less than 1% of all reported cases to date can be linked to the Internet, she said. The two most common causes are lost wallets or purses, and mail theft.
"We don't see as many Internet solicitations, but we are watching that," said Joanna Crane, program manager for the FTC's identity theft program. She added, however, that there is evidence that Internet-related thefts, particularly e-mail schemes, are increasing.
When asked by a council member if the FTC thinks Internet-related cases of identity theft are an unreported problem, Bernstein said it's possible but not likely.
"Our estimate would be very lowmaybe 20%," she said.
Hacker Incidents Probed
Council member Larry Smarr, strategic adviser at the University of California's School of Engineering in San Diego, suggested that the FTC consider a hacker incident that happened just last week as an example of the growing threat of identity theft online.
Personal information and credit card numbers belonging to high-profile political and business leaders who attended the World Economic Forum (WEF) in Davos, Switzerland, were stolen off a WEF server (see story). Microsoft Corp. Chairman Bill Gates and former president Bill Clinton were among the possible victims.
Ironically, that break-in made potential victims out of many of the business leaders who for years have defended self-regulation of industry privacy controls. Many, including Gates, Dell Computer Corp. Chairman Michael Dell and others, have urged the government not to intervene by implementing more regulations regarding privacy and protection of personal information online.
Steven Kobrin, a professor of multinational management at The Wharton School at the University of Pennsylvania in Philadelphia, has attended the last seven WEF summits and was among the victims of the latest hacker incident.
According to Kobrin, many industry executives have been outspoken opponents of regulation during past WEF summits and don't think there's a problem.
"This year, we had a panel on privacy, and people from industry said there wasn't a problem," said Kobrin. "Regulation tends to be a dirty word."
That's partly because it could affect companies' bottom lines [News, Feb. 5]. Regulation would mean that companies would have to invest more in storage technology to store information for long periods of time and security technology to prevent unauthorized access.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Privacy White Papers | Webcasts