Social Security by the numbers - East Valley Tribune: Business

Social Security by the numbers

Print
Font Size:
Default font size
Larger font size

Posted: Sunday, July 31, 2005 4:56 am | Updated: 7:56 am, Fri Oct 7, 2011.

NEW YORK - Recent disclosures of massive data leaks at information brokers, banks and retailers have prompted Congress to once again consider tightening access to Social Security numbers, which have evolved into dangerous master keys for fraud.

But Social Security numbers already have come under a hodgepodge of restrictions over the years, and many experts question whether the new proposals would truly hinder identity theft.

In fact, reducing some companies’ access to Social Security numbers could even worsen the situation.

Several identity theft watchdogs say the bills would neglect the deeper reason why financial fraud is relatively easy: Speed, not identity assurance, is the main priority of U.S. financial institutions that issue credit.

To be sure, the fact that many companies use Social Security numbers essentially as a password — not only are they the key to getting credit, they also can unlock access to an account over the phone — magnifies the problem.

That’s why Congress hopes to hide the numbers better — by reducing the ways they can be sold, for example, or by prohibiting them from being printed on benefit checks.

Even so, keeping the numbers and other personal data out of the wrong hands likely will remain tricky.

‘‘It’s too easy to get to data no matter what the key is, from insiders or hackers or mistakes,’’ said Jody Westby, head of the security and privacy practice at PricewaterhouseCoopers LLP. ‘‘What we have to do is make it harder to use the data.’’

Westby’s solution would be quite simple: Universal use of the fraud alert, which identity theft victims are allowed to put on their credit reports for seven years. Before any new credit is granted, a card issuer or loan provider is supposed to call them and double-check that they, rather than an impostor, really made the application.

Putting everyone on fraud alert status would be a simple way of bringing more personal control to the system, Westby argues, just as do-not-call lists let people decide for themselves whether to talk to telemarketers.

In contrast, the data bills pending in Congress would make a lot of changes at once. Consumer advocates like many of the provisions, such as allowing people to refuse to give businesses their Social Security numbers, requiring more encryption of financial records and demanding widespread disclosure of data breaches.

Finer points in the bills are expected to change as several measures are combined in hopes of generating one likely to pass. But a look at some of the details shows the difficulty of restricting Social Security numbers.

For example, a proposal from Sens. Arlen Specter, R-Pa., and Pat Leahy, D-Vt., would prohibit data brokers from selling a Social Security number without the consent of the subject. But there are many exceptions. The numbers could be sold for ‘‘research’’ purposes, for example, or if just the last four digits are listed.

The latter exception ‘‘almost nullifies the entire bill,’’ said Daniel Solove, a law professor at George Washington University and author of ‘‘The Digital Person.’’ That’s because the last four digits of any Social Security number are the only truly random part of the string. A savvy thief sometimes can determine the first five digits, because those are determined by where and when the number was granted.

And even if a thief doesn’t get someone’s exact number, he still might be able to obtain credit in that person’s name.

Because the system is built to grant credit in a minute, there’s a built-in tolerance for typographical errors or misprints such as transposed digits in the Social Security number.

‘‘They’re looking for accurate matches, but not exact matches, and that gray area is where fraudsters seek to perpetrate their crime,’’ said Terrence DeFranco, chief of Edentify Inc. Edentify makes software that scans credit applications for signs of fraud.

To perform that check, Edentify examines information harvested by data brokers, companies like Choice-Point Inc. or Reed Elsevier PLC’s LexisNexis, which both had breaches that led to the current scrutiny.

Consequently, DeFranco has lobbied Congress to make sure Social Security numbers could still be sold for fraudprevention services like his.

Since ChoicePoint discovered that it let identity thieves posing as legitimate customers get information on 145,000 Americans, the company has stopped printing Social Security numbers on background reports.

But James Lee, ChoicePoint’s director of marketing, argues that preventing data brokers from harvesting Social Security numbers would be ill-advised. The accuracy of background checks and other reports would suffer, he said, because the numbers remain the best way to differentiate people with similar names and to examine people’s financial histories.

‘‘You have to be very careful of the law of unintended consequences,’’ he said.

What this all points out, many people in the information business argue, is the need for a new identifier.

One solution could be a ‘‘federated identity’’ system that relies on the mathematical principles of cryptography to ensure information can be transferred only among prearranged parties.

For several years, technologists with the Liberty Alliance, an industry consortium, have been developing a way for people to log in to one network and be automatically authenticated at another.

The idea is to avoid sharing a single password among multiple parties with which you transact business — the model followed when your bank and insurance carrier both ask for your Social Security number. Instead, one site sends another an encrypted numeric token that represents the user’s identity — but only for that single Web session or transaction. The token is useless to anyone else or at another time.

The alliance’s brain trust is now exploring ways its system can be applied more broadly in online systems where most identity thefts happen.

‘‘We’re not going to go from what we’re standing in now to nirvana in a single step,’’ said George Goodman, an Intel Corp. research executive who heads the alliance’s management board. ‘‘But federated identity management is a step in the right direction. It puts a greater level of security and protection in place that currently exists.’’

  • Discuss

'EV Women in Business'

A PDF of the Tribune special section, featuring a mix of sponsored content from our loyal advertisers and newsroom coverage of the East Valley business community.

Your Az Jobs