{"id":2476,"date":"2014-12-03T05:01:43","date_gmt":"2014-12-03T05:01:43","guid":{"rendered":"http:\/\/www.lifeandnews.com\/articles\/?p=2476"},"modified":"2016-09-09T23:51:08","modified_gmt":"2016-09-09T23:51:08","slug":"after-a-data-breach-its-consumers-left-holding-the-bag","status":"publish","type":"post","link":"https:\/\/www.lifeandnews.com\/articles\/after-a-data-breach-its-consumers-left-holding-the-bag\/","title":{"rendered":"After a data breach, it&#8217;s consumers left holding the bag"},"content":{"rendered":"<p>By <a href=\"http:\/\/theconversation.com\/profiles\/diana-s-dolliver-141362\">Diana S. Dolliver<\/a><em>, University of Alabama<\/em><\/p>\n<p>Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up <a href=\"http:\/\/www.statista.com\/statistics\/243452\/holiday-sales-as-a-percentage-of-industry-sales-in-the-us\/\">almost 20%<\/a> of their annual receipts. But as you check out at a store or click \u201cpurchase\u201d on your online shopping cart, you might be setting yourself up as the victim of a crime.<\/p>\n<figure class=\"align-right\"><img src=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/65498\/width237\/image-20141125-4225-1qzu7wn.jpg\" alt=\"\" \/><\/figure>\n<p><span class=\"caption\">Good luck getting data out of here, hackers! A far cry from today\u2019s internet-connected registers.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"http:\/\/commons.wikimedia.org\/wiki\/File:Cash_register,_built_1904_in_Ohio.jpg\" rel=\"nofollow\">Kozuch<\/a>, <a class=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/\" rel=\"nofollow\">CC BY-SA<\/a><\/span><\/p>\n<p>Major data breaches at big retail companies have brought this form of cybercrime to the international stage. Between November 27 and December 15, 2013, hackers accessed Target\u2019s point of sale machines \u2013 the cash registers \u2013 that housed millions of credit and debit card numbers in addition to the names, addresses, email addresses and phone numbers of shoppers. They stole an estimated <a href=\"http:\/\/krebsonsecurity.com\/2014\/05\/the-target-breach-by-the-numbers\/\">40 million<\/a> credit and debit card numbers. In 2014, hackers stole approximately <a href=\"http:\/\/krebsonsecurity.com\/2014\/11\/home-depot-hackers-stole-53m-email-addreses\/\">56 million<\/a> customer credit and debit card numbers from Home Depot.<\/p>\n<p>These numbers are astronomical \u2013 where does all that stolen information go? And who is behind it?<\/p>\n<h2>Hidden hackers<\/h2>\n<p>The <a href=\"https:\/\/www.europol.europa.eu\/sites\/default\/files\/publications\/europol_iocta_web.pdf\">individuals or groups<\/a> of people responsible for these kinds of cybercrimes are varied. There are teenage opportunists operating alone, hackers looking for a challenge and even sophisticated organized criminal syndicates. Some criminals simply want to see if they can break through security systems as practice to hone their hacking skills. Speculation circulates that some hacking is state-sponsored; there\u2019s little published research to back it up, but it appears <a href=\"http:\/\/www.fbi.gov\/news\/news_blog\/five-chinese-military-hackers-charged-with-cyber-espionage-against-u.s\">China<\/a>, for one, engages in cyber espionage.<\/p>\n<p>Criminals seeking to profit from stolen information may open bank accounts in victims&#8217; names or access financial institutions for monetary gain. Of course, no single person is opening 40 million new credit cards. Hackers who steal identities and credit card information in the massive volumes of the Target or Home Depot breaches may break down the millions of credit and debit accounts into bulk batches \u2013 groups of 10,000, for instance \u2013 and sell them to the highest bidder via online illegal marketplaces, such as those on the Tor Network.<\/p>\n<p>Once personal data is stolen and sold, the possibilities are endless. Criminals use stolen identities to create fake state or country IDs and to purchase things like plane tickets, cars, and weapons. Email addresses become spamming targets. Credit\/debit card information is valid as long as the victim remains unaware of the theft. That\u2019s why it\u2019s so important for consumers to vigilantly check their accounts on a regular \u2013 even daily \u2013 basis.<\/p>\n<p>Some of the biggest headaches come when a criminal steals valid identity details \u2013 such as name, date of birth or social security number. It can be extremely challenging for a victim to prove he is the REAL John Doe. Bank accounts can be closed and credit\/debit card numbers changed as soon as foul play is detected, but a person\u2019s name and SSN cannot. The greater risk for holiday shoppers is that stolen financial information will be used to make unauthorized purchases, but having someone create a new identity with stolen personal information isn\u2019t outside of the realm of possibility.<\/p>\n<figure class=\"align-center zoomable\"><a href=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/65502\/area14mp\/image-20141125-4244-pph494.jpg\"><img src=\"https:\/\/62e528761d0685343e1c-f3d1b99a743ffa4142d9d7f1978d9686.ssl.cf2.rackcdn.com\/files\/65502\/width668\/image-20141125-4244-pph494.jpg\" alt=\"\" \/><\/a><\/figure>\n<p><span class=\"caption\">Hackers don\u2019t need the plastic to get full use of your credit card numbers.<\/span><br \/>\n<span class=\"attribution\"><a class=\"source\" href=\"http:\/\/www.shutterstock.com\/pic-2889311\/stock-photo-stack-of-credit-cards-on-a-white-background-with-pretty-shadow.html?src=eiG2yatkPN74ayADPVo-wA-1-61\" rel=\"nofollow\">Cards image via www.shutterstock.com.<\/a><\/span><\/p>\n<h2>(Lack of) legal response<\/h2>\n<p>In today\u2019s world, victim and offender no longer need to be in physical proximity. And because of the wide range of cybercrime perpetrators, each with different motives, law enforcement agencies have quite a challenge on their hands. The FBI\u2019s Internet Crimes Complaint Center receives over 250,000 <a href=\"http:\/\/www.ic3.gov\/media\/annualreport\/2013_IC3Report.pdf\">reports<\/a> each year from victims of cybercrimes, totaling over US$781 million per year in losses. It\u2019s <a href=\"http:\/\/www.unodc.org\/documents\/organized-crime\/UNODC_CCPCJ_EG.4_2013\/CYBERCRIME_STUDY_210213.pdf\">estimated<\/a> that many times more victimizations are never reported \u2013 the so-called \u201cdark figure\u201d of cybercrimes.<\/p>\n<p>Law enforcement agencies struggle to hire and train personnel on detecting and investigating these types of crimes. Currently, if you discover yourself to be the victim of cybercrime, your local police department is probably ill-equipped to handle the case. Instead, your financial institution will most likely work with you to investigate the issue, and you should report the incident to the FBI\u2019s Internet Crimes Complaint Center.<\/p>\n<p>The average financial loss for complaints the FBI received in 2013 (that involved any monetary loss) was $6,245. Each bank has its own policies, but for the most part they eventually remove the fraudulent charges from hacked credit cards \u2013 typically after a lot of paperwork on the part of the victimized consumer. Regaining money stolen from a debit card or checking account can be much harder.<\/p>\n<h2>Consumers as cybercrime-fighters<\/h2>\n<p>While lawmakers consider how to target cybercrime and agencies work out how to equip themselves, it falls to citizens to protect themselves.<\/p>\n<ul>\n<li>Request new debit and credit cards from your financial institutions once or twice a year. You\u2019ll receive new numbers and won\u2019t have to pay for the new cards. Change your PIN on a regular basis. Monitor your credit report annually.<\/li>\n<li>Don\u2019t over-share on social media. Protect your image and personal info.<\/li>\n<li>Never open an email or link from someone you don\u2019t know.<\/li>\n<li>Never share passwords or personal info with an untrusted source. When in doubt, call the institution to clarify the situation.<\/li>\n<li><a href=\"http:\/\/www.ic3.gov\/complaint\/default.aspx\">Report any suspicious activity<\/a> or instances of victimization to the FBI\u2019s Internet Crime Complaint Center.<\/li>\n<li>Limit the number of online payments you make.<\/li>\n<li>Only complete online payments on secured (https) websites from a password-protected computer. Using your smartphone or tablet on a wifi network gives bad guys an easy way to capture your info.<\/li>\n<li>Use security software on your devices and perform routine checks to ensure your system is bug-free.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" src=\"https:\/\/counter.theconversation.edu.au\/content\/33067\/count.gif\" alt=\"The Conversation\" width=\"1\" height=\"1\" \/><\/p>\n<p>This article was originally published on <a href=\"http:\/\/theconversation.com\">The Conversation<\/a>.<br \/>\nRead the <a href=\"http:\/\/theconversation.com\/after-a-data-breach-its-consumers-left-holding-the-bag-33067\">original article<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Diana S. Dolliver, University of Alabama Shoppers have launched into the holiday buying season and retailers are looking forward to year-end sales that make up almost 20% of their annual receipts. But as you check out at a store or click \u201cpurchase\u201d on your online shopping cart, you might be setting yourself up as [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":7960,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/2476"}],"collection":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/comments?post=2476"}],"version-history":[{"count":2,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/2476\/revisions"}],"predecessor-version":[{"id":7961,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/posts\/2476\/revisions\/7961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media\/7960"}],"wp:attachment":[{"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/media?parent=2476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/categories?post=2476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lifeandnews.com\/articles\/wp-json\/wp\/v2\/tags?post=2476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}