<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: Guerrilla Identity Protection</title>
	<atom:link href="http://spiresecurity.com/?feed=rss2&#038;p=500" rel="self" type="application/rss+xml" />
	<link>http://spiresecurity.com/?p=500</link>
	<description>Risk and Cybersecurity Analysis</description>
	<lastBuildDate>Wed, 21 Aug 2013 23:28:51 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.5.1</generator>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=500&#038;cpage=1#comment-786</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Sat, 10 Dec 2005 17:07:30 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=500#comment-786</guid>
		<description><![CDATA[@Bryce -

I know they have the information. What they (possibly) have not internalized is the notion that this puts them at risk of being a suspect in some future identity fraud case.

The point is that (honest) CSR&#039;s should not want the amount of access they are given; they should welcome, even request, more stringent access control and/or auditing.

This is true in enterprises as well - think help desk reps with admin accounts or DBAs with complete access to data.

Investigators look for opportunity first, then motive.
]]></description>
		<content:encoded><![CDATA[<p>@Bryce -</p>
<p>I know they have the information. What they (possibly) have not internalized is the notion that this puts them at risk of being a suspect in some future identity fraud case.</p>
<p>The point is that (honest) CSR&#8217;s should not want the amount of access they are given; they should welcome, even request, more stringent access control and/or auditing.</p>
<p>This is true in enterprises as well &#8211; think help desk reps with admin accounts or DBAs with complete access to data.</p>
<p>Investigators look for opportunity first, then motive.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Bryce</title>
		<link>http://spiresecurity.com/?p=500&#038;cpage=1#comment-785</link>
		<dc:creator>Bryce</dc:creator>
		<pubDate>Sat, 10 Dec 2005 16:52:15 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=500#comment-785</guid>
		<description><![CDATA[The flaw in this idea is that CSRs already have access to your identify information -- you aren&#039;t telling them anything they don&#039;t already know.

CSRs use the data they request over the phone to authenticate you against on-screen data to which they already have access.  When you answer these questions (SSN, mother&#039;s maiden name, etc.), you&#039;re just confirming that you are who you say you are, based on the fact that you know these &quot;identifying details&quot; about yourself.  When a CSR calls up your account on their computer, they are looking at your SSN and mom&#039;s old name already - they just want you to confirm it for them so that they know they aren&#039;t letting some other yahoo mess with your account.

If you&#039;re that concerned about ABC Company and all of its employees having access to your identity information, then you shouldn&#039;t create an account with them in the first place.  Of course, if that&#039;s the stance you take with most companies, then good luck getting a credit card.
]]></description>
		<content:encoded><![CDATA[<p>The flaw in this idea is that CSRs already have access to your identify information &#8212; you aren&#8217;t telling them anything they don&#8217;t already know.</p>
<p>CSRs use the data they request over the phone to authenticate you against on-screen data to which they already have access.  When you answer these questions (SSN, mother&#8217;s maiden name, etc.), you&#8217;re just confirming that you are who you say you are, based on the fact that you know these &#8220;identifying details&#8221; about yourself.  When a CSR calls up your account on their computer, they are looking at your SSN and mom&#8217;s old name already &#8211; they just want you to confirm it for them so that they know they aren&#8217;t letting some other yahoo mess with your account.</p>
<p>If you&#8217;re that concerned about ABC Company and all of its employees having access to your identity information, then you shouldn&#8217;t create an account with them in the first place.  Of course, if that&#8217;s the stance you take with most companies, then good luck getting a credit card.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Pete</title>
		<link>http://spiresecurity.com/?p=500&#038;cpage=1#comment-784</link>
		<dc:creator>Pete</dc:creator>
		<pubDate>Mon, 05 Dec 2005 19:05:32 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=500#comment-784</guid>
		<description><![CDATA[@PaulM -

Thanks for the thoughtful comment. There is a big difference between credit card fraud and identity fraud. Read here for details: http://spiresecurity.typepad.com/spire_security_viewpoint/2005/06/credit_card_num.html.
]]></description>
		<content:encoded><![CDATA[<p>@PaulM -</p>
<p>Thanks for the thoughtful comment. There is a big difference between credit card fraud and identity fraud. Read here for details: <a href="http://spiresecurity.typepad.com/spire_security_viewpoint/2005/06/credit_card_num.html" rel="nofollow">http://spiresecurity.typepad.com/spire_security_viewpoint/2005/06/credit_card_num.html</a>.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: PaulM</title>
		<link>http://spiresecurity.com/?p=500&#038;cpage=1#comment-783</link>
		<dc:creator>PaulM</dc:creator>
		<pubDate>Mon, 05 Dec 2005 17:49:11 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=500#comment-783</guid>
		<description><![CDATA[Similarly, I&#039;d like to hear from people who try this speech on the next server they hand their credit card to when paying for dinner.

Was the goober in your dessert visible or did you have to search for it?




]]></description>
		<content:encoded><![CDATA[<p>Similarly, I&#8217;d like to hear from people who try this speech on the next server they hand their credit card to when paying for dinner.</p>
<p>Was the goober in your dessert visible or did you have to search for it?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Emergent Chaos</title>
		<link>http://spiresecurity.com/?p=500&#038;cpage=1#comment-787</link>
		<dc:creator>Emergent Chaos</dc:creator>
		<pubDate>Mon, 05 Dec 2005 15:15:38 +0000</pubDate>
		<guid isPermaLink="false">http://spiresecurity.com/blog/?p=500#comment-787</guid>
		<description><![CDATA[&lt;strong&gt;Guerrilla Identity Protection&lt;/strong&gt;

Next time you call customer service to manage one of your accounts and they ask you for pseudo-private information like your SSN or Mother&#039;s maiden name, ask them for their name. When they ask why (feel free to prompt...
]]></description>
		<content:encoded><![CDATA[<p><strong>Guerrilla Identity Protection</strong></p>
<p>Next time you call customer service to manage one of your accounts and they ask you for pseudo-private information like your SSN or Mother&#8217;s maiden name, ask them for their name. When they ask why (feel free to prompt&#8230;</p>
]]></content:encoded>
	</item>
</channel>
</rss>
