{"id":409,"date":"2007-11-20T15:37:00","date_gmt":"2007-11-20T14:37:00","guid":{"rendered":"http:\/\/www.itwriting.com\/blog\/?p=409"},"modified":"2007-11-20T15:37:00","modified_gmt":"2007-11-20T14:37:00","slug":"15m-uk-bank-details-lost-but-whats-the-risk","status":"publish","type":"post","link":"https:\/\/www.itwriting.com\/blog\/409-15m-uk-bank-details-lost-but-whats-the-risk.html","title":{"rendered":"15m UK bank details lost &#8211; but what&#8217;s the risk?"},"content":{"rendered":"<p>The UK is in a panic right now because data containing 15m recipients of child benefit has been lost. It&#8217;s a serious incident and the chairman of HM Revenue and Customs has resigned.<\/p>\n<p>Even so, I&#8217;m a little confused. I watched TV news over lunch and several identity theft experts came on and warned us to scrutinize our bank statements with extra care because of what has happened.<\/p>\n<p>So what is in these records? We don&#8217;t know, yet, though the <a href=\"http:\/\/news.bbc.co.uk\/1\/hi\/uk_politics\/7103566.stm\">BBC says<\/a>:<\/p>\n<blockquote>\n<p>names, addresses, date of birth and bank accounts<\/p>\n<\/blockquote>\n<p>Now, none of these experts has explained to me how Mr Fraudster takes these details and translates them into cash extracted from my bank account. Perhaps he approaches my bank, posing as myself, and asks to withdraw money? He would have to produce some kind of additional fake identity to do so. Perhaps he embarks on a more complex fraud involving, say, a change of address and a replacement debit card? Fair enough, but it is non-trivial.<\/p>\n<p>Further, how difficult is it to obtain such details anyway? Names and addresses are easy enough to find; so are dates of birth. Nor are bank account details normally regarded as highly confidential. They are on every cheque you sign. Some companies include bank details on their invoices or on their web site for all to see.<\/p>\n<p>I&#8217;d have thought that credit card details were far more valuable to criminals, especially when they include things like expiry dates. But they won&#8217;t be part of these records, surely, and nor will passwords or PIN numbers, unless there is a lot that we have not yet been told.<\/p>\n<p>I don&#8217;t mean to diminish the seriousness of the incident. This is a huge amount of confidential information to lose. But I&#8217;d like a bit more explanation about why these details are so dangerous in the wrong hands, before I rush out and close all my accounts.<\/p>\n<p>Security expert Bruce Schneier would I think call these details &#8220;semi-secret&#8221;. His consistent message is that you should authenticate the transaction, not the person. See his (old) post on <a href=\"http:\/\/www.schneier.com\/blog\/archives\/2006\/02\/identity_theft_2.html\">Identity Theft in the UK<\/a>.<\/p>\n<h3>Update<\/h3>\n<p>Here&#8217;s the <a href=\"Whhttp:\/\/www.apacs.org.uk\/AdviceonIDtheftforchildbenefitrecipients.html\">official advice<\/a>:<\/p>\n<blockquote>\n<p><strong>What can an ID fraudster do with this data? <br \/><\/strong>No password, security details or card details have been compromised, so a fraudster cannot access your bank, building society or card account. However, HMRC is advising customers that if they use any personal data, like child\u2019s name or date of birth in their password, they may wish to consider changing their password.  <\/p>\n<p>If this data were in the hands of a fraudster \u2013 and at present there is no evidence that it is \u2013 this type of information might help them to commit account takeover fraud, although additional information would be needed. There is also a risk of a fraudster using those details to set up other credit or financial agreements, e.g. mobile phone accounts. <\/p>\n<\/blockquote>\n<h3>Further postscript<\/h3>\n<p>As it happens, I was at a meeting this evening and spoke to someone who works for a bank. He says there are several risks. A smooth-talking fraudster might persuade a cashier to release funds, though it would be a failure of policy. We also discussed direct debits. These are vulnerable, because the bank might not be involved in checking the authenticity of the instruction at all. In both cases though, these are existing weaknesses in the system. It&#8217;s possible that heightened risk of fraud could result in better procedures, so some good may come out of it.<\/p>\n<p>Another thought: surely a smart thief would have copied the data and returned the CDs to the envelope. That way, nobody would know. Put another way, how much data theft occurred without it ever coming to light? It just happens that this one is very large and very public. <\/p>\n<\/p>\n<div class=\"wlWriterSmartContent\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:bf3a8e89-9b9e-4b0a-9ffa-adfd39f879ca\" style=\"padding-right: 0px; display: inline; padding-left: 0px; padding-bottom: 0px; margin: 0px; padding-top: 0px\">Technorati tags: <a href=\"http:\/\/technorati.com\/tags\/uk%20identity%20theft\" rel=\"tag\">uk identity theft<\/a>, <a href=\"http:\/\/technorati.com\/tags\/security\" rel=\"tag\">security<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The UK is in a panic right now because data containing 15m recipients of child benefit has been lost. It&#8217;s a serious incident and the chairman of HM Revenue and Customs has resigned. Even so, I&#8217;m a little confused. I watched TV news over lunch and several identity theft experts came on and warned us &hellip; <a href=\"https:\/\/www.itwriting.com\/blog\/409-15m-uk-bank-details-lost-but-whats-the-risk.html\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">15m UK bank details lost &#8211; but what&#8217;s the risk?<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[75],"tags":[],"class_list":["post-409","post","type-post","status-publish","format-standard","hentry","category-security"],"_links":{"self":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/comments?post=409"}],"version-history":[{"count":0,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/posts\/409\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/media?parent=409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/categories?post=409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itwriting.com\/blog\/wp-json\/wp\/v2\/tags?post=409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}