Feeds

Councils give identity fraudsters a helping hand

Con-servatory application

High performance access to file storage

Local planning authorities are giving identity criminals "all they need" by posting applicants' personal details online, according to the UK's fraud prevention service Cifas

The organisation said planning authorities were publishing applicants' personal details, including names addresses, telephone and signatures, on the web as part of their planning consultations.

Householders are particularly vulnerable to identity fraud as larger schemes are more likely to publish details of an agent.

Cifas chief executive Peter Hurst said: "This is Christmas come early for identity fraudsters. Local authorities are giving them all they need to adopt their (applicants') identities."

Identity fraud in the UK rose by 17 per cent in the first quarter of 2006. Last year there were 137,000 cases of identity fraud in the UK, up from just 20,000 in 1999.

Cifas said the government and local authority associations have indicated they are addressing the problem.

Changes include: making planning applicants more aware that their applications will be published online; encouraging applicants to only submit personal information they are happy will be made available on the internet; and confirmation that there is "no necessity for authorities to publish signatures".

"Local authorities have a role to play in combating this crime by striking the right balance between publishing details as part of a public consultation process and ensuring the security of the personal details entrusted to them," said Hurst.

Kablenet's GC weekly is a free email newsletter covering the latest news and analysis of public sector technology. To register click here.

This article was originally published at Kablenet.

High performance access to file storage

More from The Register

next story
Obama allows NSA to exploit 0-days: report
If the spooks say they need it, they get it
Web data BLEEDOUT: Users to feel the pain as Heartbleed bug revealed
Vendors and ISPs have work to do updating firmware - if it's possible to fix this
OpenSSL Heartbleed: Bloody nose for open-source bleeding hearts
Bloke behind the cockup says not enough people are helping crucial crypto project
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Call of Duty 'fragged using OpenSSL's Heartbleed exploit'
So it begins ... or maybe not, says one analyst
Heartbleed exploit, inoculation, both released
File under 'this is going to hurt you more than it hurts me'
Bad PUPPY: Undead Windows XP deposits fresh scamware on lawn
Installing random interwebs shiz will bork your zombie box
Experian subsidiary faces MEGA-PROBE for 'selling consumer data to fraudster'
US attorneys general roll up sleeves, snap on gloves
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.