PogoWasRight.org

Menu
  • About
  • Privacy
Menu

Bombshell study: SSN relatively easy to predict

Posted on July 6, 2009July 3, 2025 by Dissent

In a study that challenges current initiatives to reduce identity theft, researchers Alessandro Acquisti and Ralph Gross of Carnegie Mellon University have released the results of a study showing how easily all nine digits of an individual’s Social Security Numbers can be accurately predicted from information that is readily available in numerous public databases.

Based on observation of issuance patterns of Social Security numbers in the “Death Master File” (a public database that contains SSNs of people who have died), the investigators were able to use information about an individual’s date and state of birth to predict narrow ranges of values likely to contain that individual’s SSN. The accuracy of their ability to predict an individual’s SSN increased for people born after 1988 and for people born in states with lower population numbers.

Discussing the implications of their data, Acquisti and Gross state that

SSNs, in their current form, are highly insecure passwords and should not be used for authentication. If one can successfully identify all nine digits of an SSN in fewer than 10, 100, or even 1,000 attempts, that Social Security number is no more secure than a three-digit PIN.

The investigators make several recommendations, including:

  • randomizing the entire SSN number assignment process;
  • reconsidering current policy initiatives with respect to SSN and ID theft. The investigators argue that because SSNs are predictable from  publicly available data, they cannot be kept confidential even if they are removed from databases and as a result, current initiatives may be futile and ineffective.;
  • because SSNs can be predicted and are therefore, in some sense, semi-public information, consumers should not be required by private sector entities to use SSNs as passwords or for authentication.

The study, “Predicting Social Security numbers from public data,” will be presented at Black Hat on July 29.  A copy of the study can be downloaded from the Proceedings of the National Academy of Sciences web site. The investigators note that they have omitted sensitive details about the prediction strategy from the published article. There is also an FAQ about the study to help the public understand what the investigators found and its implications.

Prior to releasing the study, the investigators shared their results with government government agencies.

Photo credit: BigStockPhoto.com

No related posts.

Category: BreachesFeatured NewsGovtU.S.

Post navigation

← Parents of dead teen sue for invasion of privacy
Can your boss fire you for smoking at home? →

Now more than ever

Search

Contact Me

Email: info@pogowasright.org

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

Categories

Recent Posts

  • Congress tries to outlaw AI that jacks up prices based on what it knows about you
  • Microsoft’s controversial Recall feature is now blocked by Brave and AdGuard
  • Trump Administration Issues AI Action Plan and Series of AI Executive Orders
  • Indonesia asked to reassess data privacy terms in new U.S. trade deal
  • Meta Denies Tracking Menstrual Data in Flo Health Privacy Trial
  • Wikipedia seeks to shield contributors from UK law targeting online anonymity
  • British government reportedlu set to back down on secret iCloud backdoor after US pressure

RSS Recent Posts on DataBreaches.net

  • Scattered Spider Hijacks VMware ESXi to Deploy Ransomware on Critical U.S. Infrastructure
  • Hacker group “Silent Crow” claims responsibility for cyberattack on Russia’s Aeroflot
  • AIIMS ORBO Portal Vulnerability Exposing Sensitive Organ Donor Data Discovered by Researcher
  • Two Data Breaches in Three Years: McKenzie Health
  • Scattered Spider is running a VMware ESXi hacking spree
©2025 PogoWasRight.org. All rights reserved.
Menu
  • About
  • Privacy