44.493 Issues in Criminal Justice Technology & Security

home > unit 10: biometrics and identification

Identification (continued)

Arguments against National Identification Card:

My article on the benefits of a "smart" passport such as those used in Malaysia.

How would smart cards do in light of our evaluation criteria?


Identity theft

What is it?
According to the FTC, identity theft is "
when an identity thief obtains some piece of your sensitive information (your bank and credit card account numbers; your income; your Social Security number (SSN); or your name, address, and phone numbers) and uses it without your knowledge to commit fraud or theft."

What is the current extent of the problem?

How is it done?
According to the FTC, the current techniques include:

One of newest variations is "phishing," in which you are sent what appears to be a legitimate email that directs you to a website where you are asked to divulge personal information such as social security numbers or bank accounts. Phishing involves "both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials.

Another is "DNS poisoning," which takes over a computer and installs range of adware and spyware. "Very sophisticated attack." It involves: fooling domain name system servers into directing those heading to any .com site to "a malicious Web site that the attackers control. That Web site then surreptitiously installs a wide range of adware and spyware on the victim's computer. Results include:

Still another is turning home-based computers with always-on connections (and without current firewall protection, etc.) into "zombies," which are then used to spread up to 80% of all spam. One of the dangers to individuals is U.S. Code Title 18, which says that anyone whose computer contains child pornography files, "regardless of intent, has committed a felony and is subject to five years in prison. This includes zombie victims, anyone who has had a pop-up window with illegal content appear on-screen, and so forth."

What are techniques to combat it?

 

 

1 | 2 | 3 | 4 | 5