Risk

2/11/2010
09:57 AM
50%
50%

Consumers Fighting Back Against Identity Fraud, Study Says

Better detection, reporting results in more arrests and prosecution, Javelin reports

Consumers are more aware of identity theft than ever, and they aren't taking it lying down, according to a new study.

According to Javelin Strategy & Research's "2010 Identity Fraud Survey Report," the number of identity fraud victims in the United States increased 12 percent to 11.1 million adults in 2009, while the total annual fraud amount increased by 12.5 percent to $54 billion.

Yet while fraud is up, consumers are fighting back, the study says. Nearly half of all victims now file police reports, resulting in double the reported arrests, triple the prosecutions, and double the percentage of convictions in 2009, according to the data.

"People are becoming frustrated with [the identity fraud] situation, and they want to do something about it," says James Van Dyke, Javelin's president and founder. "They're taking action. They're getting more educated."

The numbers are encouraging, but they aren't necessarily a sign that identity fraud is getting under control, according to Michael Stanfield, chairman and CEO of identity theft service provider Intersections, which co-sponsored the study.

"The numbers show that more fires are being put out quicker, but I'm not sure that's a good thing," Stanfield says. "What we really need is fewer fires."

The increase in arrests and prosecutions is a reflection of the increased incidence of identity theft, Stanfield observes. "The criminals are at an advantage," he says. "Malware is increasing by an order of magnitude. I don't see that police resources are increasing at a rate that justifies the massive leap in prosecutions that's indicated in this report. We're not winning this battle yet."

The study shows there is more work to be done, Van Dyke says. "Roughly half of all identity fraud victims don't know how their data was accessed in the first place," he states. "The majority of victims don't know the perpetrator. It's really an education problem."

Criminals are evolving in their online attacks, the study says. While previous attacks focused on grabbing existing credit cards, for example, one of the most popular attacks today is using keyloggers to grab data that enables the bad guys to fraudulently create new accounts.

The number of fraudulent new credit card accounts increased to 39 percent of all identity fraud victims, up from 33 percent in 2008, the study says. New online accounts opened fraudulently more than doubled compared to the previous year, and the number of new email payment accounts increased 12 percent. Twenty-nine percent of victims reported new mobile phone accounts were fraudulently opened.

Small-business owners experience identity fraud at a rate one-and-a-half times greater than average adults, Stanfield notes. "One of the big mistakes that small businesses make is to use their personal accounts for the business," he warns. "That can create problems for both the individual and the business."

Despite the increasing incidence of attacks, average fraud resolution time actually dropped 30 percent last year, to 21 hours. "Institutions are doing a better job of communicating with the consumer, and consumers are acting faster," Stanfield says. "The consumer is getting money back into his account, and the appropriate authorities are notified faster."

"Faster detection translates into lower costs for consumers, and faster resolution means less stress and anxiety for victims," says Anne Wallace, president of the Identity Theft Assistance Center, which also co-sponsored the study. "We're encouraged by these findings."

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why CISOs Need a Security Reality Check
Joel Fulton, Chief Information Security Officer for Splunk,  6/13/2018
Cisco Talos Summit: Network Defenders Not Serious Enough About Attacks
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-8030
PUBLISHED: 2018-06-20
A Denial of Service vulnerability was found in Apache Qpid Broker-J versions 7.0.0-7.0.4 when AMQP protocols 0-8, 0-9 or 0-91 are used to publish messages with size greater than allowed maximum message size limit (100MB by default). The broker crashes due to the defect. AMQP protocols 0-10 and 1.0 a...
CVE-2018-1117
PUBLISHED: 2018-06-20
ovirt-ansible-roles before version 1.0.6 has a vulnerability due to a missing no_log directive, resulting in the 'Add oVirt Provider to ManageIQ/CloudForms' playbook inadvertently disclosing admin passwords in the provisioning log. In an environment where logs are shared with other parties, this cou...
CVE-2018-11701
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x005cb509, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
CVE-2018-11702
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x00578cb3, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.
CVE-2018-11703
PUBLISHED: 2018-06-20
FastStone Image Viewer 6.2 has a User Mode Write AV at 0x00402d6a, triggered when the user opens a malformed JPEG file that is mishandled by FSViewer.exe. Attackers could exploit this issue for DoS (Access Violation) or possibly unspecified other impact.