Credit: Illus_man/Shutterstock The Mercer County, New Jersey prosecutor’s office said it ended a seven-month identity theft investigation by charging four defendants in identity-theft related activities. According to the prosecutor, each defendant used their insider access to obtain the information they purportedly sold. The investigation began, according to this statement, seven months ago following the Mercer County Prosecutor’s Economic Crime Unit (ECU) receiving information relating to a state government employee’s involvement in identity theft activities. “Further investigation uncovered that two employees of the New Jersey Motor Vehicle Commission (MVC) were providing the names, addresses, dates of birth and Social Security numbers of unsuspecting residents that they obtained through their employment,” according to the statement. Investigators say suspects charged as little as $200 for each identity. According to county prosecutors, Sherilyn Rivera and Johnny Semmon were both arrested and charged last week with official misconduct, bribery and identity theft. Both worked at MVC offices located in Trenton, NJ. If convicted, each defendant could face up to 10 years in state prison. Others charged include Lee Daniel Roberts and Abdulah Sumo. Each were charged with identity theft and trafficking in personal identifying information pertaining to another person. Both Roberts and Sumo also face up to 10 years in prison if convicted. Roberts and Sumo, prosecutors allege, were selling the names, addresses, dates of birth, Social Security numbers and credit history reports of victims obtained through their respective jobs. Roberts is a tax preparer and Sumo was employed by a reality company at the time of arrest. When Sumo was arrested in June 2011, authorities claim to have found documentation containing the personal identifying information of more than 60 individuals in his car. Such insider abuse of systems is a long-standing concern among IT professionals. According to a recent survey, Risk of Insider Fraud, conducted by the Ponemon Institute and sponsored by Attachmate Corp., more organizations are paying attention to the risks posed by insiders. The survey of more than 700 organizations found that 75 percent of the respondents indicated that privileged users within their own institutions had or were likely to turn off or alter application controls to change sensitive information and then reset the controls to cover their tracks. Eighty-one percent replied that individuals at their institutions either had used or were likely to use someone else’s credentials to gain elevated rights or bypass separation of duty controls. With a lack of controls like that, it’s no surprise that survey respondents reported that their organization experienced more than one incident of employee-related fraud per week — about 53 annually to be more precise. And 24 percent of respondents indicated that their organizations had more than 100 incidents in the past year. Consider the recent case of Chinese national and a former resident of Carmel, Ind., Kexue Huang. Last month, Huang pleaded guilty to one count of economic espionage to benefit a component of the Chinese government and one count of theft of trade secrets. According to the U.S. Dept. of Justice, Huang admitted that during his employment at Dow and later Cargill that he misappropriated trade secrets and stole trade secrets. Huang’s case is likely an outliner. Not because such crimes are so unusual but because so many go unnoticed. According to the Ponemon Risk of Insider Fraud survey, once an incident has occurred, it takes an average of 89 days for that incident to be uncovered and an additional 96 days to spot the root cause of the breach. Also, about two-thirds of internal fraud investigations do not result in gathering any actionable evidence against those who committed the fraud. Related content opinion Preparing for the post-quantum cryptography environment today It’s a mistake to put off the creation of precautions against quantum threats, no matter how far in the future you might think quantum computing will become a reality. By Christopher Burgess Sep 26, 2023 5 mins CSO and CISO Encryption Threat and Vulnerability Management feature What is WorldCoin's proof-of-personhood system? What does the blockchain, AI, and custom hardware system featuring a shiny, eye-scanning orb mean for the future of identity access management? By Matthew Tyson Sep 26, 2023 12 mins Cryptocurrency Cryptocurrency Cryptocurrency news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Government Incident Response news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe