Site Map - ID issues \ Identity Theft

ID cards

- The United Kingdom’s House of Commons has approved a bill to establish a national ID card system. The Identity Cards Bill sets out a system under which each citizen would have a compulsory ID card embedded with a computer chip by 2012. The chip will hold personal information such as names and addresses as well as a biometric identifier such as a facial scan or iris scan. All of this information will also be stored in a national database. The bill had little problem passing in the House of Commons with a vote of 224 to 64. However, it faces a greater challenge in the House of Lords, according to public comments from its sponsor, Secretary of State for the Home Department Charles Clark.@ The full text of the bill is available at Security Management Online.

Identity theft

- A Michigan appeals court has ruled that a union had a special duty to protect the personal information of a member. In the case, a third party committed identity theft against union members after stealing union rolls. (Audrey Bell et al v. Michigan Council 25 of the American Federation of State, County, and Municipal Employees, Michigan Court of Appeals, No. 246684, 2005)

Identity theft

- A Maine court has ruled that a victim of identity theft can force a cable ISP to release the name of an anonymous Internet poster. The anonymous person used the victim’s name to send e-mails designed to embarrass the victim. The court ruled that the state’s identity theft law trumped a 1984 statute prohibiting cable companies from releasing the names of subscribers. (Ronald Fitch v. John or Jane Doe #1, Maine Supreme Judicial Court, No. 2005 ME 39, 2005)

DHS Eases REAL ID Implementation Requirements

- DHS may also back away from previous deadline requirements to make the plan more palatable to states.


-  A bill (S.B. 682)introduced in the California Senate would prohibit state agencies from including RFID tags in identity documents—such as driver’s licenses, student identification badges, and medical cards. The bill’s sponsor, Sen. Joe Simitian (D), indicated in the text of the bill that RFID technology would allow data to be scanned secretly or remotely and, therefore, would greatly magnify the “potential risk to individual privacy, safety, and economic well-being.”

Information security

- At a recent hearing on identity theft, data brokers argued that only limited measures were needed to protect consumers from identity theft, while consumer advocates and identity theft victims disagreed and laid out steps Congress should take. Representatives from companies such as ChoicePoint, Acxiom Corporation, and LexisNexis shared their stories of data breaches and the theft of information from their computer systems.

Can I See Some ID?

- Telling a real credential from a fake.

Risk Revolution: The Threats Facing America and Technology’s Promise for a Safer Tomorrow

- Throughout the book, Smith plays the 9-11 card too much. If only the United States had had a massive database of financial transactions, surveillance images, and other personal data, Smith writes, the terrorists might have been stopped. He does admit, however, that technology such as databases and DNA can be used only to mitigate, not eliminate, threats to society.

Identity theft.

- The U.S. Sentencing Commission has voted to adopt new sentencing guidelines for the crime of aggravated identity theft, defined as using a stolen identity to commit other crimes. The new provisions, mandated by the Identity Theft Penalty Enhancement Act of 2004, create a minimum sentence of two years in prison for aggravated identity theft and a minimum of five years in prison for aggravated identity theft with the intent to commit an act of terrorism.

Problems with the Transportation Worker Identification Credential

- Maritime industry stakeholders voiced their frustration with the new biometric ID-cards aimed at securing the nation's ports.


- 142 ½ Number of Arizonans per 100,000 population who had their identities stolen last year, the highest rate in the United States, according to the Federal Trade Commission. The lowest rate of victimization, 23.2 per 100,000 residents, was in South Dakota.

Hijacking Cyberspace

- A report by ICANN’s Security and Stability Advisory Committee looks at the problem of domain hijacking, where a hijacker takes control of a domain name from its owner. In one case described in the paper, hackers exploited poorly enforced policies and procedures to briefly take over the domain of, an internet service provider,  causing the company’s customers to temporarily lose service.

ID Theft

- A document published by chiefs of police explains how to report ID theft.

Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.