Risk
4/20/2012
01:32 PM
50%
50%

Many Identity Theft Protection Services Promise The Impossible

Consumer Federation of America report warns about ID theft service providers that offer vague, misleading, or incomplete assurances about their services.

Identity theft protection service subscribers: Beware trial offers, as well as refund and cancellation policies, and always seek specifics about the exact type of assistance that will be provided.

Those warnings come from a new report into identity theft services. Released by the Consumer Federation of America (CFA), which counts 280 national, state, and local consumer rights groups as members, the 48-page study analyzes the practices of 20 identity theft services (which were not named in the report), as well as complaints made on the Internet about such services. It also details a series of best practices with which the CFA believes all identity theft service providers should comply.

"We found that most of the services' websites did a fair job of complying with the best practices, but there is need for improvement," said Susan Grant, CFA's director of consumer protection, in a statement.

[ Privacy groups are attacking the proposed Cyber Intelligence Sharing and Protection Act. Is CISPA Worth Saving? ]

One problem is marketing hype, as various services promise to "stop fraud before it starts" (Identity Hawk), "stop identity theft in its tracks" (Experian), or even to "prevent identity theft" (TransUnion). Compare that language with the Federal Trade Commission's guide to avoiding identity theft, which talks about how consumers can "deter, detect, defend, [and] avoid" ID theft.

Any identity theft service provider's promise to do more than that is hollow. "They can't prevent consumers' personal information from being stolen or detect identity theft in all instances ... [and] it's not always possible to stop identity theft, especially if someone's social security number has been compromised," according to the CFA's report.

Free trials are another offering that have seen their fair share of consumer complaints. "While many identity theft services are offered for free for a limited trial period, from the complaints that CFA found online it appears that the terms aren't always made clear," according to the report.

Plus, some identity theft service providers force consumers to jump through multiple hoops to cancel their trials. "Sometimes consumers can't get through to the company to cancel," according to the report. "Some consumers are charged even though they never agreed to try the service--usually because they gave their financial account information to that company or a partner of that company for something else."

Finally, not all identity theft service providers make clear exactly which services and features they're offering to provide. In many cases, researchers had to hunt through terms of service, FAQs, "and other less obvious places" to create a clear picture of what the service offered. "Some identity theft services act on behalf of customers if they become victims to resolve their problems, but most only provide advice and counseling," according to the report. In addition, the terminology related to services offered can be slippery. "For instance, if a credit score is provided, some services don't explain that it is an educational score, which is not the same score that lenders use," according to the report.

The CFA report findings may draw "truth in advertising" scrutiny from the FTC, as many services claim to be "#1" or "top-ranked," but provide no reference to back up that claim. Likewise, many of the identity theft statistics used by companies marketing ID theft services are outdated or inaccurate.

How could deficient identity theft service providers improve? For starters, the CFA has called on all such companies to cease sharing people's financial details with their affiliates, give consumers a warning when their free trials are ending, and detail the cost--should they continue after the free trial ends--as well as how they can easily and quickly cancel the service.

Put an end to insider theft and accidental data disclosure with network and host controls--and don't forget to keep employees on their toes. Also in the new, all-digital Stop Data Leaks issue of Dark Reading: Why security must be everyone's concern, and lessons learned from the Global Payments breach. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Railroader
50%
50%
Railroader,
User Rank: Apprentice
4/22/2012 | 8:20:22 PM
re: Many Identity Theft Protection Services Promise The Impossible
We must stop using SOC numbers as identification, and get those numbers off of the very places you mentioned such as Experian, TransUnion and other credit reporting agencies, there is not such thing as a secure computer, and until we do that, there will be no such thing a no identity theft.
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2011-4403
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in Zen Cart 1.3.9h allow remote attackers to hijack the authentication of administrators for requests that (1) delete a product via a delete_product_confirm action to product.php or (2) disable a product via a setflag action to categories.ph...

CVE-2012-2930
Published: 2015-04-24
Multiple cross-site request forgery (CSRF) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to hijack the authentication of administrators for requests that (1) add a user via an adduser action to admin/index.php or (2) conduct static PHP code injection attacks in .htusers...

CVE-2012-2932
Published: 2015-04-24
Multiple cross-site scripting (XSS) vulnerabilities in TinyWebGallery (TWG) before 1.8.8 allow remote attackers to inject arbitrary web script or HTML via the (1) selitems[] parameter in a copy, (2) chmod, or (3) arch action to admin/index.php or (4) searchitem parameter in a search action to admin/...

CVE-2012-5451
Published: 2015-04-24
Multiple stack-based buffer overflows in HttpUtils.dll in TVMOBiLi before 2.1.0.3974 allow remote attackers to cause a denial of service (tvMobiliService service crash) via a long string in a (1) GET or (2) HEAD request to TCP port 30888.

CVE-2015-0297
Published: 2015-04-24
Red Hat JBoss Operations Network 3.3.1 does not properly restrict access to certain APIs, which allows remote attackers to execute arbitrary Java methos via the (1) ServerInvokerServlet or (2) SchedulerService or (3) cause a denial of service (disk consumption) via the ContentManager.

Dark Reading Radio
Archived Dark Reading Radio
Join security and risk expert John Pironti and Dark Reading Editor-in-Chief Tim Wilson for a live online discussion of the sea-changing shift in security strategy and the many ways it is affecting IT and business.