Waving the Red Flag:

Rules for Reducing Identity Theft1

by M. E. Kabay, PhD, CISSP-ISSMP

Professor of Computer Information Systems

Norwich University, Northfield VT


Proposed Rulemaking Against ID Theft

In July 2006 a consortium of US federal agencies published a Notice of Proposed Rulemaking (NPRM) to help protect customers of banks and other financial institutions against identity (ID) theft.2

The agencies included the Board Of Governors of the Federal Reserve System


Federal Deposit Insurance Corporation, Federal Trade Commission, National Credit Union Administration, Office of the Comptroller of the Currency and Office of Thrift Supervision.


The press release described the NPRM as follows:


The regulations that the agencies are jointly proposing would require each financial institution and creditor to develop and implement an identity theft prevention program that includes policies and procedures for detecting, preventing, and mitigating identity theft in connection with account openings and existing accounts. The proposed regulations include guidelines listing patterns, practices, and specific forms of activity that should raise a "red flag" signaling a possible risk of identity theft. Under the proposed regulations, an identity theft prevention program established by a financial institution or creditor would have to include policies and procedures for detecting any "red flag" relevant to its operations and implementing a mitigation strategy appropriate for the level of risk.


The proposed regulations also would require credit and debit card issuers to develop policies and procedures to assess the validity of a request for a change of address followed closely by a request for an additional or replacement card.


Additional proposed regulations would require users of consumer reports to develop reasonable policies and procedures that they must apply when they receive a notice of address discrepancy from a consumer reporting agency.


image

1 Originally published as a series of three articles in Network World Security Strategies in 2007: image Proposed rulemaking against identity theft

< http://www.networkworld.com/newsletters/sec/2007/0319sec1.html >

image The people's flag is deepest red

< http://www.networkworld.com/newsletters/sec/2007/0319sec2.html >

image Waving a red flag < http://www.networkworld.com/newsletters/sec/2007/0326sec1.html >

2 < http://www.fdic.gov/news/news/press/2006/pr06071.html >

image

The report was published in three PDF files which, for reasons best known to the federal agencies involved, did not include any usable text – they are scanned from the original double- spaced paper NPRM.


The People’s Flag is Deepest Red

The NPRM included a list of warning signs (“red flags”) of ID theft that financial institutions should act on to prevent ID theft.


The specific red flags are listed in Appendix J (pp 111-114) of the NPRM. The 31 warning signs including the following highlights (I am summarizing):


image Information from a consumer reporting agency


These guidelines are useful not only for financial institutions: they also illustrate many principles of normal operations security (OPSEC). Being sensitive to anomalous behavior is important not only for normal security but also for resource management. Look for outliers in resource utilization, outliers in the first derivative (growth rates) of such utilization and in the second derivative (changes in slope) as well.



image


Waving a Red Flag

There have been spirited comments in response to the NPRM published on the Federal Reserve Web site.3


Some of the early comments were from individuals at small banks; in some cases, the banking staff appeared to believe that repeating emotional expressions from multiple employees of a single bank would carry weight with the regulators. These repetitive comments were along the lines of “Financial institutions are absurdly overburdened” and were devoid of any substantiating evidence or

argument. Some of the contributions were flatly unprofessional; representing expletives with punctuation marks is not a good idea for any professional at any time – and especially not when his comments will be published on a government Web site for anyone to inspect. Do people not grasp that their comments are to be made public?


In the MSIA program at Norwich University, we require students to participate in online discussions; the Student Handbook specifically warns, “Student discussion contributions are graded on the basis of research, articulation of rational arguments, and contributions to the class’s knowledge and understanding of the topics under discussion. Unsubstantiated opinions devoid of analysis or explanation are tolerated but not rewarded.”4 I wish that a similar warning were posted on all requests for comment.


Despite the agitated pawing and snorting of some of the respondents reacting to red flags, some of the comments, especially those prepared by various associations of bankers, had substantive contributions to the discussion. For example, Attorney Pat Caldwell, writing on behalf of BancorpSouth wrote a thoughtful analysis5 that emphasized the dangers of duplication and overlap of the proposed rules with existing regulations such as elements of the Gramm-Leach-Bliley Act (GLBA) and of the U.S.A.P.A.T.R.I.O.T. Act. In addition, the attorney raises the question of how to meet the need for interference with fraud while preserving adequate customer service.


The American Bankers Association wrote in their thoughtful response,


“[Although] the Agencies state that the proposed Regulation is intended to be flexible and reflect a risk-based approach, we conclude that the proposed regulatory language in many cases falls short of these stated intentions. Instead, we believe that the proposal runs a high risk of creating an artificial, stagnant, mandatory checklist regime that will not effectively advance the goals of detecting and preventing identity theft and fraud. We fear that unless these shortcomings are addressed, the result will be a diversion of resources from effective detection, investigation, and corrective action and will necessitate wasteful expenditure on burdensome, paperwork-laden compliance exercises. Bankers’ attention will be drawn into wasteful but obligatory drills to justify each judgment call made under a good faith effort to defeat identity thieves and fraudsters.”6


image

3 The comments were no longer online at the original URL at the time of editing in August 2009.

4 < http://www.mekabay.com/msia/MSIA_Student_Handbook.pdf >

5 < http://www.federalreserve.gov/SECRS/2006/September/20060919/R-1255/R-1255_25_1.pdf >

6 < http://www.federalreserve.gov/SECRS/2006/October/20061012/R-1255/R-1255_26_1.pdf >

They strongly urged changes, including particularly, “Regulate by objective, not prescription” and “Recognize that risk-based considerations work best as guidance and allow for appropriate judgment, rather than rely on fixed rules.”


The Missouri Bankers Association wrote,


“[W]e believe that the proposal runs a high risk of creating an artificial, stagnant, mandatory checklist regime that will not effectively advance the goals of detecting and preventing identity theft and fraud. We fear that unless these shortcomings are addressed, the result will be a diversion of resources from effective detection, investigation, and corrective action and will necessitate wasteful expenditure on burdensome, paperwork-laden compliance exercises. Bankers’ attention will be drawn into wasteful but obligatory drills to justify each judgment call made under a good faith effort to defeat identity thieves and fraudsters.”7


The Massachusetts Bankers Association brief included this interesting comment:


“In addition, financial institutions will incur costs to re-design identity theft and fraud programs into packages that fit into the regulatory regime examiners expect. As we’ve noted, many identity theft and fraud prevention efforts are integrated throughout the institution. An institution may be extremely adept at preventing ID theft, however if a program is not in place that has all of the required regulatory paperwork justifying each and every element contained in the regulation, the bank could come under regulatory scrutiny and criticism.

Consequently, ID theft prevention will actually become less risk-based at some institutions.”8


Frequently Asked Questions

The Federal Reserve Board published a document entitled “Frequently Asked Questions: Identity Theft Red Flags and Address Discrepencies” which was updated in June 2009 as of this writing.9 This FAQ has the following structure:


  1. General FAQs


  2. Identity Theft Red Flags (Red Flags Rules and Guidelines)


    1. Scope


    2. Definitions


    3. Establishment of an Identity Theft Prevention Program (“Program”)


    4. Elements of the Program image Detect Red Flags

      image Respond appropriately to Red Flags detected


      image

      7 < http://www.federalreserve.gov/SECRS/2006/October/20061005/R-1255/R-1255_28_1.pdf >

      8 < http://www.federalreserve.gov/SECRS/2006/October/20061012/R-1255/R-1255_33_1.pdf >

      9 < http://www.federalreserve.gov/newsevents/press/bcreg/bcreg20090611a1.pdf >

      image

    5. Administration of the Program


    6. Examples of Red Flags


  3. Duties of Card Issuers Regarding Changes of Address (Card Issuers’ Rules)


  4. Duties of Users Regarding Address Discrepancies (Address Discrepancy Rules)





image