• onlinepersona@programming.dev
    link
    fedilink
    English
    arrow-up
    12
    ·
    7 months ago

    I keep reading “social security number”, but still don’t understand why it’s possible to steal a person’s identity with their SSN. Is that all that’s required for identification? Some number?

    • M. Orange@beehaw.org
      link
      fedilink
      arrow-up
      7
      ·
      7 months ago

      Basically. It wasn’t meant to act as an identification, but people kept using it that way (probably because every citizen gets one at birth, so it’s the easiest proof of citizenship).

      • Syn_Attck@lemmy.today
        link
        fedilink
        arrow-up
        14
        ·
        7 months ago

        State-assigned unchangeable passwords that you hand out to 20-100 companies throughout your life (every job, every loan, every credit card, every financial account, every background check, every…)

        This was 70 million people in 1 breach.

        Keep in mind there are only 340 million people in the US, many of which are under 18.

        We need a better system.

        https://en.m.wikipedia.org/wiki/Office_of_Personnel_Management_data_breach

        The Office of Personnel Management data breach was a 2015 data breach targeting Standard Form 86 (SF-86) U.S. government security clearance records retained by the United States Office of Personnel Management (OPM). One of the largest breaches of government data in U.S. history, the attack was carried out by an advanced persistent threat based in China, widely believed to be the Jiangsu State Security Department, a subsidiary of the Government of China’s Ministry of State Security spy agency.

        In June 2015, OPM announced that it had been the target of a data breach targeting personnel records.[1] Approximately 22.1 million records were affected, including records related to government employees, other people who had undergone background checks, and their friends and family.[2][3] One of the largest breaches of government data in U.S. history,[1] information that was obtained and exfiltrated in the breach[4] included personally identifiable information such as Social Security numbers,[5] as well as names, dates and places of birth, and addresses.[6] State-sponsored hackers working on behalf of the Chinese government carried out the attack.[4][7]

        The data breach consisted of two separate, but linked, attacks.[8] It is unclear when the first attack occurred but the second attack happened on May 7, 2014, when attackers posed as an employee of KeyPoint Government Solutions, a subcontracting company. The first attack was discovered March 20, 2014, but the second attack was not discovered until April 15, 2015.[8] In the aftermath of the event, Katherine Archuleta, the director of OPM, and the CIO, Donna Seymour, resigned.[9]

    • Aquila@sh.itjust.works
      link
      fedilink
      arrow-up
      4
      ·
      7 months ago

      Getting names, emails, addresses, etc is pretty available. If you can link those up + an SSN you can open accounts pretty easily