Arizona Public Radio | Your Source for NPR News
Play Live Radio
Next Up:
0:00
0:00
0:00 0:00
Available On Air Stations
SERVICE ALERT:

Our 88.7 transmitter site sustained a fire of unknown origin. We have installed a bypass that has returned us to full power, though repairs are still ongoing. Our HD service remains inoperable. We apologize for the inconvenience and appreciate your patience as we continue to work on the transmitter. Online streaming remains unaffected.

Your E-Mail May Be Touched by 'Identity Angel'

MELISSA BLOCK, host:

There is a computer program out there right now looking for you on the Internet. It's searching for key information that could make you vulnerable to identity theft. Your name and address, date of birth and Social Security number. That computer program, called Identity Angel, today began e-mailing potential victims that it had found that information.

Latanya Sweeney is head of the Identity Angel project at Carnegie Mellon University's Data Privacy Lab, and Dr. Sweeney, what would this e-mail say if it landed in my inbox?

Ms. LATANYA SWEENEY (Carnegie Mellon University's Data Privacy Lab): It would say that you're a likely victim of identity theft, that we had found sufficient information about you on the Internet that someone could fraudulently get a credit card in your name. And then we would identify the source. We are recommending that you have it removed as soon as possible, and then telling you a little more information about why this puts you at risk to identity theft.

BLOCK: So it gives some tips on how to try to prevent this from happening, then?

Ms. SWEENEY: Right, exactly. The number one thing that we're spotting that people can correct quite easily is resumes. A person or an institution puts a resume out there that includes the fields that you mention. So simply removing or modifying the information, and we give you guidelines about what to do, that is, don't have a Social Security number at all. You don't really need to put your date of birth, and advice like that about what you might want to do to change it, and also where we found the resume.

BLOCK: And that's what the bulk of them are coming from, is these job-search boards with resumes on them?

Ms. SWEENEY: Yeah, and not even just job searches, sometimes just personal information that people are putting on their resume that they put on their own web page, or places where people have gone to conferences and workshops and so forth who also list their resumes.

BLOCK: How many hits or matches have you found so far where you've able to find all this information about people?

Ms. SWEENEY: We started on Monday, and we have a little more than 5,000. We had to stop because we have to be able to control the volume of e-mail that goes out so that we can be very responsive to those people who have inquiries.

BLOCK: When you created this computer program to search for this data, what were the kinks you had to work out? How tricky was it?

Ms. SWEENEY: At first, it's both difficult and easy. What was very easy is that if you were mischievous, how easy it is to find information about individuals that included Social Security numbers. What made it very difficult, though, was how could you automate the process and alert the person so that they could take corrective action? Finding them automatically, peeling out the information, trying to find the e-mail address that goes with that person and then contacting them turned out to be kind of a laborious task in order to get a computer to do that reliably in an automated way.

BLOCK: You know, there are so many e-mails that come in that seem to be one thing and are actually something else. I suppose you'd also be up against the hurdle of people getting something from you which you mean to be well-intentioned, and people would think maybe there is some ulterior motive here. I'm going to ignore it.

Ms. SWEENEY: Well, we did a couple of experiments before we got to this point of being able to do this automatically, and in the earliest experiments, that's exactly what would happen. We would send an e-mail to the person and about half of them would start ranting and raving at us as if we were trying to make them a victim of identity theft.

So in subsequent experiments, two things happened. One is we improved the wording on our e-mail message to make it a lot clearer to people what exactly we were attempting to do. And the second thing that changed is people have become far more sensitive to identity-theft issues. By the time we did the second experiment, the response was dramatically different. We got a lot of thank yous and we're really glad to know that and we're glad you're doing this kind of thing.

BLOCK: Latanya Sweeney, thanks very much.

Ms. SWEENEY: Okay, great. Thank you.

BLOCK: Latanya Sweeny heads the Identity Angel program at Carnegie Mellon University's Data Privacy Lab in Pittsburgh. Transcript provided by NPR, Copyright NPR.

As special correspondent and guest host of NPR's news programs, Melissa Block brings her signature combination of warmth and incisive reporting. Her work over the decades has earned her journalism's highest honors, and has made her one of NPR's most familiar and beloved voices.