President’s Identity Theft Task Force Strategic Plan Complete

Attorney General Alberto R. Gonzales and Federal Trade Commission Chairman Deborah Platt Majoras recently announced the completion of the President's Identity Theft Task Force strategic plan to combat identity theft.

The strategic plan is the result of an unprecedented federal effort to formulate a comprehensive and fully coordinated plan to attack this widespread and destructive crime. The plan focuses on ways to improve the effectiveness of criminal prosecutions of identity theft; enhance data protection for sensitive consumer information maintained by the public sector, private sector and consumers; provide more comprehensive and effective guidance for consumers and the business community; and improve recovery and assistance for consumers.

"Identity theft is a crime that goes far beyond the loss of money or property," Gonzales said. "It is a personal invasion, done in secret, that can rob innocent men and women of their good names. The strategic plan we are releasing today is part of a comprehensive effort to fight this crime, protect consumers, and help victims put their lives back together."

"Identity theft is a blight on America's privacy and security landscape," Majoras said. "Identity thieves steal consumers' time, money, and security, just as sure as they steal their identifying information, and they cost businesses enormous sums. The strategic plan submitted to the president provides a blueprint for increased federal prevention and protection."

Although much has been done to combat identity theft, the specific recommendations outlined in the strategic plan -- from broad policy changes to small steps -- are necessary to wage a more effective fight against identity theft and reduce its incidence and damage. Highlights of the recommendations include the following:

  • Reduce the unnecessary use of Social Security numbers by federal agencies, the most valuable commodity for an identity thief.
  • Establish national standards that require private sector entities to safeguard the personal data they compile and maintain and to provide notice to consumers when a breach occurs that poses a significant risk of identity theft.
  • Implement a broad, sustained awareness campaign by federal agencies to educate consumers, the private sector and the public sector on methods to deter, detect and defend against identity theft.
  • Create a National Identity Theft Law Enforcement Center to allow law enforcement agencies to coordinate their efforts and information more efficiently, and investigate and prosecute identity thieves more effectively.

The task force's recommendations also include several legislative proposals designed to fill the gaps in current laws criminalizing the acts of many identity thieves, and ensure that victims can recover the value of the time lost attempting to repair damage inflicted by identity theft. These proposals include the following actions:

  • Amending the identity theft and aggravated identity theft statutes to ensure that identity thieves who misappropriate information belonging to corporations and organizations can be prosecuted.
  • Adding new crimes to the list of offenses which, if committed by identity thieves in connection with the identity theft itself, will subject those criminals to a two-year mandatory sentence available under the "aggravated identity theft" statute.
  • Broadening the statute that criminalizes the theft of electronic data by eliminating the current requirement that the information must have been stolen through interstate communications.
  • Amending existing statutes to assure the ability of federal prosecutors to charge those who use malicious spyware and keyloggers.
  • Amending the cyber-extortion statute to cover additional, alternate types of cyber-extortion. The plan was released at an authentication workshop which resulted from an earlier recommendation of the Task Force.

In addition to the release of the Task Force's Strategic Plan, a Web site was launched, http://www.idtheft.gov/, which contains the full Strategic Plan, and will eventually serve as clearinghouse for educational resources for consumers, businesses, and law enforcement on ways to prevent and detect identity theft, and help victims recover.

Featured

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

  • Achieving Clear Audio

    In today’s ever-changing world of security and risk management, effective communication via an intercom and door entry communication system is a critical communication tool to keep a facility’s staff, visitors and vendors safe. Read Now

  • Beyond Apps: Access Control for Today’s Residents

    The modern resident lives in an app-saturated world. From banking to grocery delivery, fitness tracking to ridesharing, nearly every service demands another download. But when it comes to accessing the place you live, most people do not want to clutter their phone with yet another app, especially if its only purpose is to open a door. Read Now

New Products

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • HD2055 Modular Barricade

    Delta Scientific’s electric HD2055 modular shallow foundation barricade is tested to ASTM M50/P1 with negative penetration from the vehicle upon impact. With a shallow foundation of only 24 inches, the HD2055 can be installed without worrying about buried power lines and other below grade obstructions. The modular make-up of the barrier also allows you to cover wider roadways by adding additional modules to the system. The HD2055 boasts an Emergency Fast Operation of 1.5 seconds giving the guard ample time to deploy under a high threat situation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.