- Introduction
- The Impersonation Intrusion Scenario
- The Security Breach
- Corrective Actions
- Don't Be an Unwitting Collaborator
Don't Be an Unwitting Collaborator
As the government strengthens its immigration policies, fine-tunes its terrorist watch list, and closes down terrorists' funding sources, terrorists will attempt to gain new forged identities for access to sensitive places and information. If you work for a government agency; NGO; or a supplier of documents, plans, and services to government entities, your organization can be a target for cyberterrorists wanting to gain entry to your information network through identity theft or impersonation.
A terrorist who knows an employee's Social Security number, bank account information, or other personal details can temporarily "become" that employee in order to gain access to unauthorized information and physical areas. Or, armed with those details, perpetrators can open credit card accounts, make purchases, take out loans, or make counterfeit checks and ATM cards in their own names.