Hacker, sercurity  concept, hacking bank or social media thief

Identity is a crucial element in most computer security mechanisms. Access controls depend on identifying the users or devices that are allowed to view or use resources and keeping others out. We’re asked to “prove” our identities every time we board a plane, check into a hotel, make a purchase via check or credit card, or log onto a computer or secure web site. But the standard of proof is often very low, and in the IT world, we seem to have a misconception about what identity really is – and isn’t.

Identity theft in which someone pretends to be someone else by assuming that person’s identity, usually as a method to gain access to resources or obtain credit and other benefits in that person’s name. The victim of identity theft (here meaning the person whose identity has been assumed by the identity thief) can suffer adverse consequences if they are held responsible for the perpetrator’s actions. Identity theft occurs when someone uses another’s personally identifying information, like their name, identifying number, or credit card number, without their permission, to commit fraud or other crimes.

The term identity theft was coined in 1964; however, it is not literally possible to steal an identity—less ambiguous terms are identity fraud or impersonation.

Determining the link between data breaches and identity theft is challenging, primarily because identity theft victims often do not know how their personal information was obtained,” and identity theft is not always detectable by the individual victims, according to a report done for the FTC. Identity fraud is often but not necessarily the consequence of identity theft. Someone can steal or misappropriate personal information without then committing identity theft using the information about every person, such as when a major data breach occurs. A US Government Accountability Office study determined that “most breaches have not resulted in detected incidents of identity theft”. The report also warned that “the full extent is unknown”. A later unpublished study by Carnegie Mellon University noted that “Most often, the causes of identity theft is not known,” but reported that someone else concluded that “the probability of becoming a victim to identity theft as a result of a data breach is … around only 2%”.

Techniques for obtaining and exploiting personal information for identity theft Identity thieves typically obtain and exploit personally identifiable information about individuals, or various credentials they use to authenticate themselves, in order to impersonate them. Examples include:

  1. Rummaging through rubbish for personal information (dumpster diving)
  2. Retrieving personal data from redundant IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold on without having been properly sanitized
  3. Using public records about individual citizens, published in official registers such as electoral rolls
  4. Stealing bank or credit cards, identification cards, passports, authentication tokens … typically by pickpocketing, housebreaking or mail theft
  5. Common-knowledge questioning schemes that offer account verification and compromise: “What’s your mother’s maiden name?”, “what was your first car model?”, or “What was your first pet’s name?”, etc.
  6. Skimming information from bank or credit cards using compromised or hand-held card readers, and creating clone cards
  7. Using ‘contactless’ credit card readers to acquire data wirelessly from RFID-enabled passports
  8. Observing users typing their login credentials, credit/calling card numbers etc. into IT equipment located in public places (shoulder surfing)
  9. Stealing personal information from computers using breaches in browser security or malware such as Trojan horse keystroke logging programs or other forms of spyware
  10. Hacking computer networks, systems and databases to obtain personal data, often in large quantities
  11. Exploiting breaches that result in the publication or more limited disclosure of personal information such as names, addresses, Social Security number or credit card numbers
  12. Advertising bogus job offers in order to accumulate resumes and applications typically disclosing applicants’ names, home and email addresses, telephone numbers and sometimes their banking details
  13. Exploiting insider access and abusing the rights of privileged IT users to access personal data on their employers’ systems
  14. Infiltrating organizations that store and process large amounts or particularly valuable personal information
  15. Impersonating trusted organizations in emails, SMS text messages, phone calls or other forms of communication in order to dupe victims into disclosing their personal information or login credentials, typically on a fake corporate website or data collection form (phishing)
  16. Brute-force attacking weak passwords and using inspired guesswork to compromise weak password reset questions
  17. Obtaining castings of fingers for falsifying fingerprint identification.
  18. Browsing social networking websites for personal details published by users, often using this information to appear more credible in subsequent social engineering activities
  19. Diverting victims’ email or post in order to obtain personal information and credentials such as credit cards, billing and bank/credit card statements, or to delay the discovery of new accounts and credit agreements opened by the identity thieves in the victims’ names
  20. Using false pretences to trick individuals, customer service representatives and help desk workers into disclosing personal information and login details or changing user passwords/access rights (pretexting)
  21. Stealing cheques (checks) to acquire banking information, including account numbers and bank routing numbers
  22. Guessing Social Security numbers by using information found on Internet social networks
  23. Low security/privacy protection on photos that are easily clickable and downloaded on social networking sites.
  24. Befriending strangers on social networks and taking advantage of their trust until private information are given.