Little Green Identity Theft Eng

download Little Green Identity Theft Eng

of 24

Transcript of Little Green Identity Theft Eng

  • 8/14/2019 Little Green Identity Theft Eng

    1/24

    THE LITTLE GREEN BOOKon identity theft

    The little

    green book

    on identity theft

  • 8/14/2019 Little Green Identity Theft Eng

    2/24

    THE LITTLE GREEN BOOK on identity theft

    Now the serpent was more crafty than any of

    the wild animals the Lord God had made. He

    said to the woman, Did God really say, You

    must not eat from any tree in the garden?

    The woman said to the serpent, We may eat

    fruit from the trees in the garden, but God did

    say, You must not eat fruit from the tree that is

    in the middle of the garden, and you must not

    touch it, or you will die.

    You will not surely die, the serpent said to thewoman. For God knows that when you eat of

    it your eyes will be opened, and you will be like

    God, knowing good and evil.

    Genesis 3, 1-4

    This text from the very beginning of the Bible is probably the first exam-

    ple of identity theft: The Devil, masquerading as a serpent, tricks Eve to

    eat the fruit from the tree of knowledge of good and evil the Devil has

    stolen the serpents identity.

    Thus, identity theft is not a new phenomenon it has been there from thebeginning of time.

  • 8/14/2019 Little Green Identity Theft Eng

    3/24

    THE LITTLE GREEN BOOKon identity theft

    Norman ASA is not liable for any form of loss or damage arising from use of thedocumentation or from errors or deficiencies therein, including but not limited to lossof earnings.

    The information in this document is subject to change without notice. No part of thisdocumentation may be reproduced or transmitted in any form or by any means, elec-tronic or mechanical, including photocopying, recording or information storage andretrieval systems, for any purpose other than the purchasers personal use, without theexplicit written permission of Norman ASA.

    The Norman logo is a registered trademark of Norman ASA.Names of products mentioned in this documentation are either trademarks or reg-istered trademarks of their respective owners. They are mentioned for identificationpurposes only.

    Copyright 2006 Norman ASA.All rights reserved.

    Content

    The different roles as a potential victim ................... 6

    The intent of the identity thief .................................. 9

    Techniques used for identity theft ...........................11

    The Internet a plethora of information ................ 16

    Social engineering THE most important tool to obtain information ... 17

    How to protect yourself from identity theft ............. 18

    Closing words ........................................................ 22

  • 8/14/2019 Little Green Identity Theft Eng

    4/24

    THE LITTLE GREEN BOOK on identity theft

    Introduction and

    definition

    This small book will discussidentity theft with particularemphasis on the extended pos-sibilities that the Internet and

    computing offer.

    One should note that identitytheft assumes many formsfrom the playful to the ex-tremely dangerous.

    Consider these two scenarios:

    1. By careful collection ofinformation, interceptionof mail and theft of Carlsoriginal proofs of identity,

    Frank is able to become

    Carl in all matters that

    count. Only those whoknow Carl from before thetheft took place can knowthat Carl is Carl. In all othercontexts Frank is Carl.

    2. Linda sends a postcard to

    Yvonnes aunt from Spain,congratulating her withher birthday, and signs itYvonne. The aunt is amazedthat Yvonne remembers herbirthday while in Spain, and

    tells herself that Yvonne is areally considerate niece.

    Both are examples of identitytheft. Obviously the first ispotentially quite severe forCarl, while the latter may be to

  • 8/14/2019 Little Green Identity Theft Eng

    5/24

    THE LITTLE GREEN BOOKon identity theft

    A general definition of

    identity theft as the act ofpretending to be another

    person in communica-

    tion with a third person or

    persons.

    Yvonnes advantage (e.g. in her

    aunts last will).Thus, we cannot say that allkinds of identity theft arenecessarily bad, as one canborrow another personsidentity with good intent andoutcome as the second exam-

    ple above shows.

    We can therefore come upwith a general definition of

    identity theft as the act of

    pretending to be another

    person in communica-tion with a third person or

    persons.

    However, identity theft is nor-mally seen as something bad,which will also be the main

    theme in this book. We will

    therefore hereafter restrict thegeneral definition and refer

    to identity theft as the act of

    pretending with malicious

    intent to be another person

    in communication with a

    third person or persons.

    This operative definitionstated above does not definewhether this malicious intentis directed against:1. The person that has his/her

    identity stolen2. A third party that may suf-

    fer from dealing with per-son x, while led to believethat it is person y that he isdealing with.

    3. Both of the above men-tioned.

    It is important to be awareof the fact that all these areidentity thefts. The party thatmight be hurt however will

    differ. Although the situationmentioned in item 1 above isthe most focused in the pressand other media, item 2 maybe as important and as crucialto defend against.

  • 8/14/2019 Little Green Identity Theft Eng

    6/24

    THE LITTLE GREEN BOOK on identity theft

    This book will discuss various

    examples of identity theft andtechniques used, as well asoutlining how you can defendyourself against being victim-ized.

    Although Internet-based tech-

    niques for identity theft (l ikephishing) are almost exclu-sively in focus presently, as weshall see, other old-fashionedtechniques may be just aseffective, often even more.

    No matter how sophisticatedmalicious software that is cre-ated, no matter which sneakyhardware devices that is set up the human being (wetware)is still the main security risk.

    Nevertheless, this book willfocus in particular on theuse on Internet as means forIdentity theft.

    Throughout this book we will,

    when relevant, refer to the vic-tim of identity theft as a hewhile the identity thief will bea female. This is of course forsimplification reasons only.

    The different roles

    as a potential victim

    Defining roles

    When discussing the meansand techniques of identitytheft, it is often useful to con-

    sider the different roles a per-son has in order to considerwhich types of identity theftthat you should beware of inthe different roles.

    Key words in the differentroles are: Who you are What you know

    Your role as a privateperson

    As a private person youridentity may be interesting fora number of totally differentreasons, and the motivationfor stealing your identity maybe equally diversified.

    If you for some reason haveangered a person and this per-son wants to take revenge, shehas a plethora of means liter-

  • 8/14/2019 Little Green Identity Theft Eng

    7/24

    THE LITTLE GREEN BOOKon identity theft

    ally available on her fingertips.

    All of which involve stealingyour identity for a short while.A couple of examples are: She can use any phone and

    order subscriptions of lotsof different magazines inyour name.

    She can write a letter,signed in your name,cancelling your newspapersubscription with immedi-ate effect.

    Common for these examplesof such ad-hoc identity theft isthat the thief is impersonating

    you towards people who have

    no (practical) means to checkif she is really you.

    One may of course view theabove mentioned as merenuisances, which they to someextent also are. However,

    it can be quite tedious andtime-consuming to cancelmagazine subscriptions all thetime. And the person that hasbecome your enemy for somereason can of course escalate

    her harassment with evenmore annoying and severe acts(shutting off your electric-

    She can use any phone and order subscriptions of lots of

    different magazines in your name.

  • 8/14/2019 Little Green Identity Theft Eng

    8/24

    THE LITTLE GREEN BOOK on identity theft

    ity because in her mail to the

    supplier - signed by you she states that she (you) isgoing away on a long journeyabroad).

    Your role as a person in a

    corporationOn the other hand you shouldconsider your role as e.g. anemployee.

    A more popular scenariois when someone attempts tosteal your identity as a meanto steal something, like moneyfrom your bank account.Whether you are a tempting

    target will of course dependon how much money you haveas well as how easy it is to stealyour identity. This scenariowill be discussed further in alater chapter.

    Suffice it to say in this contextthat identity theft directed asthe private person you are, ismotivated by your character-istics as this person (rich, un-popular, popular, famous etc.).

    The identity thief will haveyou as her ultimate target.

    In this case it is not you whoare the target, but the corpora-tion in which you are em-ployed. Stealing your identityis only a means to be ableto access/obtain something

    from your employer this isusually some kind of industrialespionage.

    Again, some examples illus-trate this:

    You work as a janitor and arecurrently deployed to cleanthe premises of a big com-pany. One of this companyscompetitors hires a personto steal your identity as a tool

    to be able to go through thecompanys dustbins hoping to

  • 8/14/2019 Little Green Identity Theft Eng

    9/24

    THE LITTLE GREEN BOOKon identity theft

    find information of interest,

    or adding a little black box atthe rear end of your computerthat monitors all key strokesfrom the keyboard. Imper-

    Later in this book we will go

    into more detail regardingthe implementation of thesekinds of identity theft. Thepoint we want to make here

    By social engineering techniques she can trick a person to reveal

    his user name and password to a company server.

    sonating you (stealing youridentity) could be done easilyby showing up at another timeof the day than you usually do(who would notice in a largecorporation?).

    Another scenario is if you areemployed in the companysIT department. The thief ofyour identity could then callsomeone in the companypretending to be you, and bysocial engineering techniquesshe tricks that person to revealhis user name and password toa company server. Again it ispossible to obtain informationthat the company does not

    want to fall into the hands ofthe competitor.

    is merely that it is your role asa corporate person that is theintermediate target here. Themain target is not you.

    The intent of theidentity thief

    Keeping the theft secretor not

    The previous chapters exam-ples show that the time frameof the identity theft will differ,depending on the intent of theidentity thief.

    In most of the cases the iden-tity thief only needed to steal

    a persons identity for a veryshort time in order to accom-

  • 8/14/2019 Little Green Identity Theft Eng

    10/24

    0 THE LITTLE GREEN BOOK on identity theft

    plish a particular task. Often

    it does not even matter if theperson who had his identitystolen notices this after thetheft took place.

    In the example where youwere the victim of harassment

    it is actually a point in itselfthat you are aware of the factthat someone is harassingyou. On the other hand, theexample of industrial espio-nage would probably be more

    successful if it was not re-vealed that secret informationwas in the hand of the wrongpersons. If your bank accountis emptied, the identity thiefhas accomplished what shewanted; that particular theft

    would probably not succeeda second and third time withyou and your bank account.

    She becomes you

    As a special case we should

    consider when someone takesover your complete identity tobecome you. If this is conduct-ed in the most sophisticatedmanner it actually does notmatter if the scam is known ornot. As several horror storieshave shown, you may then

    have a major problem proving

    to lots of different public andcorporate parties, that youactually is you.

    An interesting exercise foreach and every one of us is toconsider is this:

    How do you proceed ifsomeone has managed to geta drivers license, a passportand several credit cards inyour name. She then takes

    control of your bank account,asks for and is granted a loan(in your name of course) andthe monthly instalments arenot met. The credit cards areheavily used and you get hugebills from credit card compa-

    nies you never had plans to dobusiness with.What do you do?

    Industrial espionage

    would probably be more

    successful if it was not

    revealed that secret infor-

    mation was in the hand of

    the wrong persons.

  • 8/14/2019 Little Green Identity Theft Eng

    11/24

    THE LITTLE GREEN BOOKon identity theft

    Techniques used for

    identity theft

    General

    In a previous chapter a fewexamples of identity theft werebriefly discussed. We will in

    this chapter discuss in moredetail some of the differenttechniques that may be usedfor information gathering. Inparticular we will emphasizethe use of tools available on

    the Internet for such informa-tion gathering.

    In general there are twoapproaches to informationgathering with the attempt tosteal someones identity:

    Collecting as much infor-mation as possible aboutone or a very few individu-als

    Attempting to harvest

    information from a hugenumber of individualshoping that someone iswilling to offer the desiredinformation.

    Specialized information

    gathering

    When the identity thief knowsa person and a few poten-tial persons whose identityshe needs to steal, there is aneed to gather some kind of

    information about that personto facil itate this identity take-over.

    There are different techniquesthat an identity thief may useto gather information aboutthe person she wants to be. Inmany cases she already knowssomething about the person

  • 8/14/2019 Little Green Identity Theft Eng

    12/24

    THE LITTLE GREEN BOOK on identity theft

    (name, gender, address etc.)

    but this is not always the case.

    Scenario 1 the victimis a particular identifiedperson

    When some information (e.g.name) is known about the per-

    stealing the victims bank

    account statements) Purchasing credit informa-

    tion on the victim Hacking the victims com-

    puter Social engineering tech-

    niques by using the

    When the identity thief has the information she needs, she

    can set the theft itself into action.son our identity thief wants to

    target, she can use some of thefollowing techniques to gathermore information: Telephone directories for

    obtaining telephone num-bers and address

    Internet search engines forany information about theperson that is available onthe World Wide Web. Thisinformation can be any-thing from the extremelyuseful (for the thief) to the

    trivial. Trash bin investigation (e.g.

    telephone or email to obtain

    particular information.

    When the identity thief hasthe information she needs,she can set the theft itself intoaction by impersonating thevictim as needed.

    Scenario 2 the victimis not identified, but hisrole is

    This would be the case whenan organization is the ultimate

    target. The identity thief willattempt to target the organiza-

  • 8/14/2019 Little Green Identity Theft Eng

    13/24

    THE LITTLE GREEN BOOKon identity theft

    tion by stealing the identity

    of one of its employees. Sheis not interested in a randomemployee, but preferably onewho has particular accessrights and/or one from themanagement.

    Internet sites host such infor-

    mation, e.g.http://www.whois.org/,http://www.allwhois.com/etc.

    After a few seconds she hasgathered information that

    A good start would be to

    identify the organizationsmanagement and technicalstaff in the IT department.The obvious starting point isthe corporations web site! It ismore normal than not that theweb site has information aboutmanagement, other contactpersons, telephone numbers,email addresses etc.She may add and cross checkthis information by check-ing the persons who are the

    contacts on the corporationsdomain registration. Several

    enables her to target more

    systematically one or a few keypersons using the techniquesthat is mentioned in Scenario1 above.

    Bulk information gathering

    A totally different approachis used if the identity thiefwants to obtain some kind ofspecial information regardlessof whether it is obtained fromone individual or another, aslong as the type of informa-

    tion is the same.

  • 8/14/2019 Little Green Identity Theft Eng

    14/24

    THE LITTLE GREEN BOOK on identity theft

    Typically this may be

    password(s) to access aspecial resource (e.g. bankaccounts)

    valid credit card numbers

    This can be carried out by em-ploying a different set of tools.

    However, use of the Internet isunrivalled as the tool to use inthese cases, as it facilitates: a certain degree of anonym-

    ity on the identity thiefsside

    malicious programs thatcan be installed on userscomputers to reveal confi-dential information to theidentity thief

    possibilities to send a hugenumber of emails to poten-

    tial victims setting up fake web sites

    tailored to the identitythiefs needs

    The use of the Internet togather information with theattempt to commit fraudis called phishing (derivedfrom fishing). This will bediscussed in more detail in aseparate chapter below.

    Phishing a specialcase of bulk informationgathering

    Phishing is an increasinglypopular way to obtain infor-

    mation from users infor-mation that may be used tocommit crime. New phishingattempts are set up daily.

    A typical phishing schemewould be carried out in thismanner:

    1. The identity thief purchasesor harvests electronically in

  • 8/14/2019 Little Green Identity Theft Eng

    15/24

    THE LITTLE GREEN BOOKon identity theft

    some manner a large set of

    email addresses.2. She sends an email to these

    addresses with a spoofedsender (e.g. a bank)

    3. In the email she claims thatsomething wrong happenedwith the users account and

    requesting a confirmationof the password.

    Quite a lot of such emails havea spoofed link to a web sitethat looks (almost) identical to

    the institutions real one. How-ever, it is of course a fake sitethat attempts to obtain secretuser information with theintent to commit fraud.

    An identity thief may also use

    special malicious programs tocollect information. Detailsregarding the techniquesused to insert such malicious

    programs (malware) on a com-

    puter are beyond this book.Suffice it to mention thatdistributing malware throughemails, network spreaders,utilization of vulnerabilitiesin operating systems andapplications, are all popular

    and widely used techniques todistribute malware.Keyloggers, trojans and back-doors are typical malware usedby the identity thief.

    Although these tools aremainly used in a bulk informa-tion gathering scheme, it isobviously likely that malicioussoftware may be targetedon a particular person/or-ganization exclusively. Then

    it would be quite difficult todetect, as most antivirus andantispyware products maynot uncover it unless detectedby SandBox-like techniquessimilar to the one integrated in

    Normans antivirus products.

    Online questionnaires are alsoefficient tools to gather infor-mation about you informa-tion that you normally wouldnot offer to anyone, but which

    you may be tricked into giving

    The use of the Internet to

    gather information with the

    attempt to commit fraud is

    called phishing.

  • 8/14/2019 Little Green Identity Theft Eng

    16/24

    THE LITTLE GREEN BOOK on identity theft

    because the questions appears

    on an official looking (thoughfake) web site.

    Norman has previously pub-lished Normans little greenbook of phishing, which cov-ers this topic in more detail.

    Please refer to this book formore in-depth information.

    Internet may be so danger-

    ous with respect to identitytheft is that its electronic formenables automatic processingand systematization. As moreand more personal informa-tion (hospital records, bankinformation, insurance data

    etc.) are accessible through theInternet, it is of utmost impor-

    The Internet has made the

    task for the identity thief mucheasier.

    The Internet a plethora ofinformation

    Although identity theft hasbeen possible and carriedout for ages, the Internet hasmade the task for the identitythief much easier. We havediscussed some of these issuesabove.

    One of the main reasonswhy the information on the

    tance that this information isstored in a way that ensuresthat it cannot be accessed bysomeone who is not legitimate.Unfortunately we often seeexamples that this is not the

    case.

    Securing digital informa-tion is becoming increasinglyimportant as our lives areevolving more and more into anetworked society.

  • 8/14/2019 Little Green Identity Theft Eng

    17/24

    THE LITTLE GREEN BOOKon identity theft

    Social engineering

    THE most impor-tant tool to obtaininformation

    Regardless of the fact that theInternet has made the identity

    thiefs task easier, the by farmost important tool for her isgood old social engineeringtechniques.

    The most famous hacker ofour time Kevin David Mit-nick is (in)famous for break-ing into high-profile computersystems. He was eventuallyarrested (in 1995) and spentsome years in prison. Thefact, however, is that Mitnicks

    attacks were mainly based onsocial engineering techniques.It is maintained that he wasvery convincing and persua-sive in his attempts to trickpeople to disclose informationthat he needed.

    The reason why socialengineering techniques are soeffective is that most humansare eager to please. Whensomeone asks you for assist-

    ance your initial reaction is tohelp that person.

    If you work in a large organi-

    zation and someone calls youon your phone, saying that sheis from your organizations ITdepartment and asks for yourpassword because she has toupdate your account (for what-ever reason), most persons

    would be inclined to give thepassword rather than chal-lenge the callers identity.

    Another trick it to count onyour vanity. Like it or not,

    most of us are susceptible toflattery, and a skilled personcan utilize this to persuadeyou into giving her informa-tion that you should not partwith.

    The set of conventional socialengineering tools availablefor the identity thief is onlylimited by her imagination.

    When discussing social engi-

    neering however, the socialengineering aspect involvedin identity theft by use of theInternet as a channel cannotbe ignored. Most phishingattempts will rely on social en-gineering. The more elegantly

    performed the more likely to

  • 8/14/2019 Little Green Identity Theft Eng

    18/24

    THE LITTLE GREEN BOOK on identity theft

    succeed. An email written in

    English attempting to phishfor secret user informationfrom users of a Norwegianbank is not likely to succeed(real life example!)

    Social engineering works over

    and over again because unfor-tunately users are gullible!

    How to protectyourself fromidentity theft

    General

    It is presumably possible tobe totally protected againstany kind of danger. The dis-advantage is that if you are,it will either be extremelyexpensive or, conducting yournormal tasks will be extremelycumbersome or even impos-sible.

    The correct general approachto risk is therefore not elimi-nation, but rather finding thecorrect balance between therisk you expose yourself to andthe price you pay if you arebeing hit by an incident that

    is not avoided (for whateverreason).

    This view should also be taken

    when protection from identitytheft is the issue.

    Different protectiondepending on the thiefsapproach

    Obviously there are differ-ent approaches that shouldbe applied to the differentkinds of identity theft that arediscussed in previous chapters.We will go through some use-ful guidelines here.

    It is presumably possible

    to be totally protected

    against any kind of

    danger.

    Two general guidelines to keepin mind:1. Everything is not necessar-

    ily what is seems like2. There are some people that

    may not have your welfareas their top priority

  • 8/14/2019 Little Green Identity Theft Eng

    19/24

    THE LITTLE GREEN BOOKon identity theft

    Protection against

    conventional socialengineering

    Social engineering is probablythe most difficult to resist.One approach that may workquite well is to switch into a

    permanent paranoid mode:

    Assume that anyone who

    contacts you for whatever

    reason is not the one she

    claims to be, and that her

    intensions are nasty.

    activity, not to mention that

    you will loose all your friendsin quite a short time.

    A better operational ap-

    proach is use intelligent

    scepticism.

    Try asking yourself whetheran initiated contact and herreason for contacting you isprobable. Would a personfrom the IT department re-ally need your password? Is it

    This may be a temptingapproach to shield againstconventional social engineer-ing, but will probably not beapplicable in real life. It will be

    too cumbersome to conductnormal social and professional

    likely that the person from thecredit card company doesntknow and cannot find yourcredit cards number andexpiry date? Why would your

    bank representative need yourpin code?

  • 8/14/2019 Little Green Identity Theft Eng

    20/24

    0 THE LITTLE GREEN BOOK on identity theft

    By asking yourself such com-

    mon sense questions insteadof supplying the requestedinformation just to be helpful,you will be better prepared

    what information you disclose,

    in which environment, and towhom.

    It may be wise to destroy your

    It may be wise to destroy your credit card statementsbefore throwing them in the dust bin. It is not particularlysmart to leave your cash dispenser withdrawals receipt inthe open beside the bank

    and protected from becomingthe victim of social engineer-ing techniques.

    Protection against

    conventional espionageEspionage with the intent ofidentity theft would use a lotof the same techniques as seenin spy movies: dustbin harvesting

    telephone tapping monitoring conversationsbehind closed doors

    impersonation information gathering and

    systematization

    The general rule to observeis that you should beware of

    credit card statements beforethrowing them in the dustbin. It is not particularly smartto leave your cash dispenserwithdrawals receipt in the

    open beside the bank. Themost secret company infor-mation drafts should not bedisposed of in an off-handmanner.

    Protection against Internetbased social engineering

    Much of the same approachis sufficient when protectingyourself from Internet basedsocial engineering techniques

    as for conventional socialengineering. Again:

  • 8/14/2019 Little Green Identity Theft Eng

    21/24

    THE LITTLE GREEN BOOKon identity theft

    Use intelligent scepticism.

    Is it likely that your local bankis sending emails in English?Why would your Internet shop

    You will also remember to

    update your operating systemand applications with the latestprogram patches, as you knowthat authors of malware are

    ask for your password canyou think of anything crediblethat explains such a request?

    Protection against Inter-net based espionage

    If you follow the generalguideline about intelligentscepticism you will also tosome extent be protectedagainst Internet based espio-nage. You will of course notopen the attachment in theemail (allegedly) from yourfavorite female movie star whofor some weird reason hasdecided to email you her nude

    photographs.

    effective in util izing newlydiscovered program deficien-cies. And of course you updateyour antivirus and antispam

    programs often, and you use afirewall.

    In spite of all these precau-tions someone may write amalicious piece of softwarethat is placed on your PC

    without your knowledge. Anadditional level of protectionwould then be to encrypt theinformation that is availableon your hard drive or network.

  • 8/14/2019 Little Green Identity Theft Eng

    22/24

    THE LITTLE GREEN BOOK on identity theft

    Closing words

    This book has brieflydiscussed some aspects ofidentity theft. Much moreinformation is freely avail-able in interesting articles on

    the Internet and as printedbooks. Although as shownat the very start of this book identity theft is not a newphenomenon. The Internetand gathering of electronicinformation about each and

    every one of us in huge data-bases (that may in some casesbe cross-referenced) make

    stealing a persons identity

    easier and much more difficultto reclaim. The presence of In-ternet accessible databases thathold electronic informationabout each and every one ofus makes identity theft easier.And more difficult to reclaim

    your identity if stolen.

    There are strong indicationsthat identity theft will prevailfor a long time in some formor another. To end this book

    on a similar note as it started this time from the end ofthe Bible, where the identitythief is imprisoned:

    And I saw an angel coming down out of heaven,

    having the key to the Abyss and holding in his

    hand a great chain. He seized the dragon, that

    ancient serpent, who is the devil, or Satan, and

    bound him for a thousand years. He threw him

    into the Abyss, and locked and sealed it over

    him, to keep him from deceiving the nations

    anymore until the thousand years were ended.

    After that, he must be set free for a short time.Revelation 20, 1-4

  • 8/14/2019 Little Green Identity Theft Eng

    23/24

    THE LITTLE GREEN BOOKon identity theft

    NorwayNorman ASA

    Strandvn. 37, Postboks 431324 Lysaker, Norway

    Tel: +47 67 10 97 00email: [email protected]

    www.norman.no

    DenmarkNorman Data Defense Systems A/S

    Blangstedgrdsvej 15220 Odense S, Denmark

    Tel: +45 63 11 05 08email: [email protected]/dk

    SwedenNorman Data Defense Systems ABProNova Science Park, Korsgata 2

    602 33 Norrkping, SwedenTel: +46 011-230 330

    email: [email protected]/se

    UKNorman Data Defense Systems (UK) Ltd

    15 Linford Forum, Rockingham DriveLinford WoodMilton KeynesMK14 6LY, UK

    Tel: +44-1908 678496email: [email protected]

    www.normanuk.com

    GermanyNorman Data Defense Systems GmbH

    Gladbecker Strasse 340472 Dsseldorf, Germany

    Tel: +49-211 / 5 86 99-0email: [email protected]

    www.norman.de

    Germany

    Norman Data Defense Systems GmbHNiederlassung MnchenLudwigstr. 47

    85399 Hallbergmoos, GermanyTel: +49-811 / 5 41 84-0email: [email protected]

    www.norman.de

    SwitzerlandNorman Data Defense Systems AG

    Mnchensteinerstrasse 434052 Basel, SwitzerlandTel: +41-61 317 25 25email: [email protected]

    The Netherlands and Luxemburg

    Norman/SHARK BVPostbus 1592130 AD Hoofddorp, The Netherlands

    Tel.: +31-23-7890222email: [email protected]

    Belgium

    Norman/SHARK BVGrote Baan 119/23511 Kuringen (Hasselt), BelgiumTel: +32 89 24 37 04email: [email protected]

    FranceNorman France8 rue de Berri75008 Paris, FranceTel : + 33 1 42 99 94 14email: [email protected]

    Spain

    Norman Data Defense Systems

    Camino Cerro de los Gamos 1, Edif.128224 Pozuelo de Alarcn MADRID, SpainTel: +34 (0)91 790 11 31email: [email protected]

    Italy

    Norman Data Defense SystemsCentro Direzionale LombardoVia Roma, 108

    20060 Cassina dePecchi (MI), ItalyTel: +39 02 951 58 952email: [email protected]

    USANorman Data Defense Systems Inc9302 Lee Highway, Suite 950AFairfax, VA 22031, USATel: +1-703 267 6109email: [email protected]

    www.norman.com

  • 8/14/2019 Little Green Identity Theft Eng

    24/24

    THE LITTLE GREEN BOOK on identity theft