INFORMATION

Site Map - ID issues \ Identity Theft

Identity theft

- A Michigan appeals court has ruled that a union had a special duty to protect the personal information of a member. In the case, a third party committed identity theft against union members after stealing union rolls. (Audrey Bell et al v. Michigan Council 25 of the American Federation of State, County, and Municipal Employees, Michigan Court of Appeals, No. 246684, 2005)

Identity theft

- A Maine court has ruled that a victim of identity theft can force a cable ISP to release the name of an anonymous Internet poster. The anonymous person used the victim’s name to send e-mails designed to embarrass the victim. The court ruled that the state’s identity theft law trumped a 1984 statute prohibiting cable companies from releasing the names of subscribers. (Ronald Fitch v. John or Jane Doe #1, Maine Supreme Judicial Court, No. 2005 ME 39, 2005)

DHS Eases REAL ID Implementation Requirements

- DHS may also back away from previous deadline requirements to make the plan more palatable to states.

RFID

-  A bill (S.B. 682)introduced in the California Senate would prohibit state agencies from including RFID tags in identity documents—such as driver’s licenses, student identification badges, and medical cards. The bill’s sponsor, Sen. Joe Simitian (D), indicated in the text of the bill that RFID technology would allow data to be scanned secretly or remotely and, therefore, would greatly magnify the “potential risk to individual privacy, safety, and economic well-being.”

Information security

- At a recent hearing on identity theft, data brokers argued that only limited measures were needed to protect consumers from identity theft, while consumer advocates and identity theft victims disagreed and laid out steps Congress should take. Representatives from companies such as ChoicePoint, Acxiom Corporation, and LexisNexis shared their stories of data breaches and the theft of information from their computer systems.

Can I See Some ID?

- Telling a real credential from a fake.

Risk Revolution: The Threats Facing America and Technology’s Promise for a Safer Tomorrow

- Throughout the book, Smith plays the 9-11 card too much. If only the United States had had a massive database of financial transactions, surveillance images, and other personal data, Smith writes, the terrorists might have been stopped. He does admit, however, that technology such as databases and DNA can be used only to mitigate, not eliminate, threats to society.

Identity theft.

- The U.S. Sentencing Commission has voted to adopt new sentencing guidelines for the crime of aggravated identity theft, defined as using a stolen identity to commit other crimes. The new provisions, mandated by the Identity Theft Penalty Enhancement Act of 2004, create a minimum sentence of two years in prison for aggravated identity theft and a minimum of five years in prison for aggravated identity theft with the intent to commit an act of terrorism.

Problems with the Transportation Worker Identification Credential

- Maritime industry stakeholders voiced their frustration with the new biometric ID-cards aimed at securing the nation's ports.

Numbers

- 142 ½ Number of Arizonans per 100,000 population who had their identities stolen last year, the highest rate in the United States, according to the Federal Trade Commission. The lowest rate of victimization, 23.2 per 100,000 residents, was in South Dakota.

Hijacking Cyberspace

- A report by ICANN’s Security and Stability Advisory Committee looks at the problem of domain hijacking, where a hijacker takes control of a domain name from its owner. In one case described in the paper, hackers exploited poorly enforced policies and procedures to briefly take over the domain of PANIX.com, an internet service provider,  causing the company’s customers to temporarily lose service.

ID Theft

- A document published by chiefs of police explains how to report ID theft.

Will Maritime ID Finally Set Sail?

- The long-awaited and beleaguered Transportation Worker Identification Credential (TWIC) is finally set to roll out in the Port of Wilmington, Delaware.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.