Thank you again for the opportunity. I appreciate being invited.
My name is Claudiu Popa. I own a risk management consultancy in Toronto. We're focused on security and privacy consulting.
We operate nationally across most sectors. We audit globally. We provide risk assessment services of a privacy and security nature, as well as business continuity and disaster recovery. We test the standardization of protective approaches and practices within both private sector and public sector organizations, so we have a certain privileged outlook and visibility into what organizations do. Of course, we aggregate some of that just for the purpose of having our own insight into our own industry.
All our engagements and clients are, by default, confidential. We look at what trends we can identify and conduct research. We publish white papers. We publish books. We hold seminars and educational events to share some of that information.
One of my latest books, one that's being published this year, is focused on cyberfraud and cyberfraud taxonomy, which I feel is sorely needed around the world.
From the perspective of a cyberfraud being a global concern, we are noticing massive trends making their way around the world in many cases, and in most cases before they even hit Canada, so there is a predictive element to this we try to identify in the publication.
We are seeing global trends of any number of types, but we're seeing very little in the way of shared taxonomies and shared definition, especially when it comes to law enforcement collaborating.
We do know from an identity theft perspective the issue is growing, but more importantly, we feel that it's morphing, and so our research is showing that as we track the types of breaches, I'll say, around the world, every year we are seeing a lot of innovation in a negative way, of course, as to how this type of crime is evolving.
We have all seen the kinds of studies that have been published by Intel and McAfee in their 2014 global cybercrime report, which shows that up to $575 billion in annual value is lost due to cybercrime, a lot of which—and according to the breach level index for last year, most of which—is arising from the billion-plus individual records that have been compromised, and that was just for last year.
We see the damage is certainly not limited to Canada. It's global. We're also the first ones to identify the impact on individuals, and that's who ultimately get hurt because these are innocent people. Of course in many instances their personal information was entrusted to information custodians that may or may not have the right protective controls in place.
The FEC for example, the FBI, and certainly Canadian sources have cited it takes at least six months and 200 hours, and I've seen estimates of up to 800 hours, to recover identities once they have been damaged by these kinds of breaches. In many cases it happens to people who do not have the time and resources to deal with these kinds of situations. It's a terribly unfortunate and evolving type of crime that victimizes not just the most independent people in society, but in fact, the most vulnerable.
One of the things I wanted to establish was the difference between personal data breaches, the types of information that is being lost when there is a security breach that we see in the news, the terms “identity theft” and of course “identity fraud”. I think it's important to define these things adequately or at least treat them differently.
I am not going to serve as Webster's today, but I just want to make sure that we differentiate between their uses because, as they evolve and as we see emerging trends develop, these things are taking on very specific behaviours that we can and should be tracking. In fact, for the purpose of predicting some of their evolution, it's important to do.
We're seeing an explosion in social engineering use. Certainly, phishing—and spear-phishing—is one of the practices that's most commonly used to break into organizations, gain access to personal computers, install software without authorization, and things of that nature. The reason these are particularly effective and damaging is that they are addressing victims individually using any kind of information they can get their hands on.
This targeted information has a lot to do with the click-through rate and the rate at which e-mails are being opened as the result of receiving a targeted e-mail. If I receive a targeted e-mail from CIBC, let's say, that calls me by name and tells me there is some issue with my account, I'm a lot more likely to click through, especially if I'm not well versed in proper security practices.
More importantly, there is a lack of standardization in the practices of Canadian organizations when it comes to including active website links in e-mails that they use to communicate with the public. These are organizations that should know better in many cases, and we often write about that.
We do see that part of the threat is due to the quasi-legitimacy of misleading organizations, such as, for example, organizations that pop up a window on a screen and say that there is an infection on a computer. Of course, they've gone in and infected the computer first and are claiming that there's an infection, but in addition to that, there is a price to be paid for disinfecting the computer. Now, some of that disinfection is real, but most of it is not.
The way to catch these organizations may not be to place them in the same box as criminal companies, because it will be very hard to prosecute them if in fact they are providing a legitimate service, supposedly. That's a very difficult thing to do, because we found that for a lot of these organizations, even if they do not infect the computer or use spyware or things that are eventually traced right back to normal advertising practices in some cases, in many cases these guys even have support departments, and they provide refunds without any questions asked. It's very difficult to put in place the legislation that would protect these guys from acquiring personal information, abusing it, reselling it, and participating in this cycle of cybercrime.
We know that a lot of this type of victim targeting includes individual calls, not just e-mails. It's very difficult for recipients to say no. In many cases, they are pressured, and there are repeated calls to these individuals using particular information. I've received some myself asking for social insurance numbers and driver's licences, and they are very insistent. It's very difficult for regular individuals not just to be aware that these things are happening, but to enforce a personal policy to not share some of this personal information.
The global scale is what we care about. On a global scale, we see that data theft is happening on a massive level, and personal data theft is what I mean. It participates in things as significant as human trafficking and funding terror. We are now able to track this type of thing. We're not able to quantify it precisely, just like we're not able to precisely quantify cybercrime, but we can see where the money is going.
If we had more collaboration from law enforcement, particularly the way it's done in Europe...Europol, for example, and Interpol are having tremendous success on a sector-by-sector basis.
We are also seeing the ineffective use of credit brokerage firm services as a knee-jerk reaction to breaches. Whenever there's a massive breach, immediately the organization that has fallen victim to them is offering free credit and identity monitoring to all victims, and that's it. We find this is insufficient. In many cases these organizations, in their own practices, do not conform to standard best practices for anti-phishing or identity protection. They do not even follow secure development practices for some of the tools they offer. For all intents and purposes, these are very weak controls and the standardization of these safeguards should be revisited.
We obviously need to establish rules against predatory practices. As I said, organizations should not be allowed to victimize individuals and to call them time and time again, or certainly to lure them even with services they are prepared to provide refunds for, because that's not how their business models work. Their business models work based on the personal information they steal, and the money that is exchanged is gravy for them. They actually monetize the personal information and the personal details of the victim. So that's a big deal.
We do need to create stiffer penalties for complicity within cyberfraud, but we do need to establish measures to determine mens rea, for example, for many individuals who fall prey to the promise of profits without actually being part of the organized criminal element. In many cases they see an opportunity to make money, and they think it's a regular job, and then they go to jail for it. That's seen as an issue.
I'll just wrap up. We need a standardized understanding of acceptability regarding the requirement for social insurance numbers, the collection of driver's licence numbers, and the risks associated with doing those things, and of course, we need to have real practices around not just privacy but also the use of big data. We're going to identify things like synthetic identity theft and identity fraud within the realm of what we are now calling synthetic ID by using big data analytics. We are going to require the banks and the insurance companies to collaborate so that we can identify risk trends and build models that allow us to identify these guys. Right now there are people in Canada and around the world who just walk the street day in, day out and manage dozens, if not hundreds, of identities not just for existing individuals, but for fictional individuals. That's another reason why the credit bureaus are not effective in catching these guys, and a lot of these synthetic IDs are still damaging the identities of the victims from whom they may have borrowed only one ID element to combine with those of others and create a fictional individual that they use to create an economic or financial windfall for themselves.
That's what I have to say so far. Thank you for the opportunity.