ID theft: Where you live makes a difference, study finds
N.Y., Calif and Nevada are among the riskiest for ID theft
Computerworld - Faulkton, S.D., has a population of 800 and no crime to speak of. Yet the citizens of this rural town are second only to the people in Floral Park, N.Y., when it comes to being at risk for having their identities stolen.
That's just one of the findings of a study released today by San Diego-based risk management firm ID Analytics Inc., which looked at U.S. identity fraud rates by geography.
Topping the list as the riskiest states for ID theft are New York, California, Nevada and Arizona, while the safest ones are Wyoming, Vermont, Montana and North Dakota. The riskiest 5-digit zip codes for ID theft -- after Floral Park and Faulkton -- are Old Bethpage, N.Y., New York City and Manhasset, N.Y.
The ID Analytics report is based on a study of over 1 million fraud events as indicated by fraudulent applications for credit using stolen identity data. The findings can help pinpoint specific areas where criminals may be operating in an organized fashion, said Stephen Coggeshall, CTO at ID Analytics and the author of the report. "We think it can provide valuable information for a variety of people," including financial institutions, retailers and law enforcement, he said.
The report could also tell consumers "if they live in a high identity fraud area," he said.
The ID Analytics study is so detailed that it can pinpoint specific addresses associated with a high level of identity theft risk, he said. "Whether these are victims or perpetrators of ID theft is not 100% clear," Coggeshall said. But there are "strong indicators" that a majority of these addresses are associated with perpetrators, he said.
The ID Analytics findings are consistent with other studies when it comes to highlighting risky areas, Coggeshall said. However, unlike previous research based largely on consumer victim reports, the ID Analytics study is based on an analysis of attempted fraud using compromised data.
That distinction is important because an overwhelming majority of identity fraud results from the creation of "synthetic" identities rather than "true name" identity theft, an ID Analytics white paper noted. As a result, there is often no consumer victim to report the crime.
The identity-level data elements used for the analysis came from ID Analytics' customers in the financial services, retail, health care, telecommunications and other industries. The data included names, addresses and Social Security numbers culled from account applications and other transactions monitored by ID Analytics for fraudulent activity.
Fraud rates were calculated by dividing the total number of reported identity fraud incidents by the number of applications to credit grantors during 2005 through June 2006, Coggeshall said. The approach allowed for a better comparison of fraud rates across areas with different population densities, he said.
"We do see stability across time," Coggeshall said.
States that are consistently risky tend to be West coast states such as California, Nevada, Arizona and Oregon, as well New York, Texas, Florida, Illinois, Michigan, Alaska and Hawaii. The least risky states tend to be upper Midwestern ones such as Montana, Idaho, Wyoming and South Dakota, as well as New England states such as New Hampshire, Vermont and Massachusetts.
Read more about Security in Computerworld's Security Topic Center.
- Who does NSS Labs "Recommend" for NGFW? In 2012, NSS Labs found that most available NGFW solutions "fell short in performance and security effectiveness." In 2013 NSS Labs noted "marked...
- 5 Ways Dropbox for Business Keeps Your Data Protected Protecting your data isn't a feature on a checklist, something to be tacked on as an afterthought. Download here to find out how...
- What is this "File Sync" Thing and Why Should I Care About It? All of a sudden, getting a file from your work laptop to your iPad became as simple as clicking "Save." So it's no...
- The Keys to Securing Data in a Collaborative Workplace Losing data is costly. IT professionals have spent years learning how to protect their organizations from hackers, but how do you ward off...
- Data Protection and Disaster Recovery with iSCSI and VMware Get this on demand webcast now
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different.... All Privacy White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!