It is not uncommon for companies that do business with your personal data to go belly-up. To save money, some of those businesses rent offsite storage places for long term records managment rather than using a reputible vender like Iron Mountain. Of course, when the renter falls behind, the storage manager will usually sell the contents to the highest bidder (& usually for a terrific price for the buyer) at auction.
A few quotes from the article that might make your hairs stand up:
Nothing in Maine law prevents storage facilities from selling sensitive financial, personal or medical records to the highest bidder, when their original owners do not pay their storage bills. And that is becoming a real concern, with the failure of several dozen mortgage companies in Maine since the recession began one year ago.
In the Scarborough case, the Maine Bureau of Consumer Credit Protection obtained a court order to confiscate the records of the shuttered mortgage company, which was legally obligated to maintain the documents. The records had been generated by Ocean House Mortgage and Cape Mortgage Co. in Cape Elizabeth, which went out of business last summer.
"Current law places no burden whatsoever on the facility operator to inventory what is in the unit, identify records that might be confidential and notify regulators," said Will Lund, superintendent of Maine's Consumer Credit Protection Bureau.
Here is the link or you can copy & paste
http://pressherald.mainetoday.com/story_pf.php?id=229557&ac=PHnws
into your address field to view the full article.
Friday, December 26, 2008
Monday, December 15, 2008
Hutto, Round Rock, Cedar Park, Tyler Texas ID Theft Ring
This is an absolute classic example of one of the Identity Theft scenarios we discussed in class, why this economy may see more examples just like this and why your company should take clear steps to protect itself:
http://www.usdoj.gov/usao/txw/press_releases/2008/davis_group_austin_sent.pdf
- A [former] employee steals PII from a company
- PII used to compromise [former] clients of the company
- PII used to create new documents and facilitate "Aggravated Identity Theft"
- The ID Thieves were organized to commit this criminal activity
http://www.usdoj.gov/usao/txw/press_releases/2008/davis_group_austin_sent.pdf
Tuesday, December 9, 2008
ID Theft escalation in 2009 and Online Payments
This article goes into more detail on the Checkfree.com data breach written about earlier. It was not complicated for criminals to compromise the Checkfree domain. It was very straightforward. The implications for online banking, bill pay and other things that we discuss in my training class, are virtually unlimited.
http://voices.washingtonpost.com/securityfix/2008/12/digging_deeper_into_the_checkf.html
http://voices.washingtonpost.com/securityfix/2008/12/digging_deeper_into_the_checkf.html
Sunday, December 7, 2008
From the United States Department of Justice
Intelligence Bulletin:
Methamphetamine-Related Identity Theft
This report documents the relationship between the trafficking and distribution of methamphetamine and the crime of identity theft.http://www.usdoj.gov/ndic/pubs22/22972/index.htm
This website closed in 2012 but archives are maintained and this article may still be available as a .pdf file.
The Amphetamine Connection
"There's a close link between methamphetamine use and identity theft," says Prosecutor Vanessa Riebli, head of the Johnson County, Kansas, District Attorney's
Economic Crime Unit. "ID's are traded or sold for drugs across the country, and drug users are supporting their habit with identity theft."
How Meth is Driving the Identity Theft Pandemic
http://www.consumeraffairs.com/news04/2007/02/meth_id_theft.html"There's a close link between methamphetamine use and identity theft," says Prosecutor Vanessa Riebli, head of the Johnson County, Kansas, District Attorney's
Economic Crime Unit. "ID's are traded or sold for drugs across the country, and drug users are supporting their habit with identity theft."
The above article may now be gone from online so I'm adding this one:
The meth connection to identity theft
Drug addiction plays a part in many crime rings, cops say
http://www.msnbc.msn.com/id/4460349/The drugs and the crime fit neatly together; addicts strung out on meth can stay awake and focused for days at a time, making them expert hackers and mailbox thieves. And ID theft is easy money, the perfect income for drug addicts who have no other way to fund their habit.
40+ Million TJ Maxx customers, Ukrain, China and ID Theft
As I've said in class, ID Theft is linked to International Organized crime and particularly to Eastern Europe, Russia, and the Ukraine. Here is a source for those claims...
http://www.usdoj.gov/opa/pr/2008/August/08-ag-689.html
Retail Hacking Ring Charged for Stealing and Distributing Credit and Debit Card Numbers from Major U.S. Retailers
More Than 40 Million Credit and Debit Card Numbers Stolen
Three of the defendants are U.S. citizens, one is from Estonia, three are from Ukraine, two are from the People’s Republic of China and one is from Belarus. One individual is only known by an alias online, and his place of origin is unknown.http://www.usdoj.gov/opa/pr/2008/August/08-ag-689.html
Saturday, December 6, 2008
China's goverment is interested in your data
This is an older article that I have referred to in class.
Olympic visitors' data is at risk
Olympic visitors' data is at risk
By Peter Eisler, USA TODAY
WASHINGTON — National security agencies are warning businesses and federal officials that laptops and e-mail devices taken to the Beijing Olympics are likely to be penetrated by Chinese agents aiming to steal secrets or plant bugs to infiltrate U.S. computer networks.
http://www.usatoday.com/sports/olympics/2008-06-10-olympicspy_n.htm?loc=interstitialskip
Do you pay bills online?
Hackers Hijacked Large E-Bill Payment Site
Read this Washington Post article to see if you may be compromised:http://voices.washingtonpost.com/securityfix/2008/12/hackers_hijacked_large_e-bill.html?hpid=sec-tech
From the article, these are the companies exposed to risk:
https://mycheckfree.com/br/wps?rq=login&slpg=Y&file=authentication/login_baseline_companies&esc=93096239&sp=10001
Tuesday, December 2, 2008
Kroll Fraud Solutions
Great business and personal tips from the Premiere Risk Management company in North America
"Kroll launched Fraud Solutions in 2002 as a direct response to clients' requests. Today, over 30 million consumers and a host of leading organizations trust Kroll for their identity fraud solutions - recognizing that Kroll's resources and experience set it apart from every other company in the world."
"Kroll launched Fraud Solutions in 2002 as a direct response to clients' requests. Today, over 30 million consumers and a host of leading organizations trust Kroll for their identity fraud solutions - recognizing that Kroll's resources and experience set it apart from every other company in the world."
Understand All the Risks of ID Theft and Sensitive Personal Information Fraud
http://www.krollfraudsolutions.com/understanding-id-theft/understand-theft.aspxMonday, December 1, 2008
Compliance with Red Flag Rules by Colleges and Universities
For those who are still wondering if a College or University needs to bother with any of this here is an article by a Law Firm in North Carolina making it rather plain.
Compliance with Red Flag Rules by Colleges and Universities
10.27.2008
10.27.2008
http://www.poynerspruill.com/publications/Pages/CompliancewithRedFlagRulesbyCollegesandUniversities.aspx
"Colleges and universities are subject to administrative enforcement by the FTC"
ID Theft can cut off your Electricity
ID Theft issue shuts off power to a woman's home.
http://www.kxxv.com/Global/story.asp?S=9383191&nav=menu509_3
It's another identity theft case in Central Texas that's left Trissina Neal without electricity, wondering what she can do next.
http://www.kxxv.com/Global/story.asp?S=9383191&nav=menu509_3
It's another identity theft case in Central Texas that's left Trissina Neal without electricity, wondering what she can do next.
How Careful are Schools with your data and what do they have?
A client of mine brought this up to me in a training I did for his company earlier this year and here is an example in the news:
"...software and equipment from Houston-based Raptor Systems to scan information encoded in the magnetic strip on driver's licenses and other identification cards. The software sends each visitor's full name, birth date, license number and photo over the Internet; checks the information against Raptor's national database of registered sex offenders; and prints out a visitor's badge with his or her name and picture. School personnel can also type in a visitor's name and birth date...."
Background check systems used in growing number of Central Texas school districts.
http://www.statesman.com/news/content/news/stories/local/12/01/1201idcheck.html"...software and equipment from Houston-based Raptor Systems to scan information encoded in the magnetic strip on driver's licenses and other identification cards. The software sends each visitor's full name, birth date, license number and photo over the Internet; checks the information against Raptor's national database of registered sex offenders; and prints out a visitor's badge with his or her name and picture. School personnel can also type in a visitor's name and birth date...."
8000 Military Compromised by ID Theft Ring
For those of you concerned about protecting our servicemembers, this story from Dallas/Ft Worth.
Although technically, this is Bank Fraud, the fact that servicemembers were targeted caught my attention and they could have set this up differently had they wanted. Someone else may have already tried a broader scope of crime:
http://cbs11tv.com/local/Identity.Theft.Ring.2.863826.html
"In all, the identities of over 8,000 servicemen were compromised."
Although technically, this is Bank Fraud, the fact that servicemembers were targeted caught my attention and they could have set this up differently had they wanted. Someone else may have already tried a broader scope of crime:
http://cbs11tv.com/local/Identity.Theft.Ring.2.863826.html
"In all, the identities of over 8,000 servicemen were compromised."
In an effort to put Military items together here is a link about USAF SSGT David Hernandez who suffered 4 of the 5 primary types of ID Theft:
- Financial
- Driver's License
- Character/Criminal
- Social Security
Saturday, November 29, 2008
ID Theft 101
Extremely useful information on Identity Theft with an example of Medical Identity Theft and an example of how a company can protect its employees and itself from the fastest growing crime in America.
http://www.idtheft101.net
http://www.idtheft101.net
Thursday, November 27, 2008
Identity Theft as a Crime of Choice
This article is from FraudFacts.com
Identity Theft is Less Risky, Incredibly Easy, and Highly Profitable
http://www.fraudfacts.com/content/Identity_Theft_as_a_Crime_of_Choice.aspx
Identity Theft is Less Risky, Incredibly Easy, and Highly Profitable
http://www.fraudfacts.com/content/Identity_Theft_as_a_Crime_of_Choice.aspx
Six-Month Delay of Enforcement of 'Red Flags' Rule-FTC
BUSINESS INFO
For Release: October 22, 2008
FTC Will Grant Six-Month Delay of Enforcement of 'Red Flags' Rule Requiring Creditors and Financial Institutions to Have Identity Theft Prevention Programs
http://www.ftc.gov/opa/2008/10/redflags.shtm
For Release: October 22, 2008
FTC Will Grant Six-Month Delay of Enforcement of 'Red Flags' Rule Requiring Creditors and Financial Institutions to Have Identity Theft Prevention Programs
http://www.ftc.gov/opa/2008/10/redflags.shtm
Red Flag Rules, FTC-June 2008
BUSINESS INFO
FTC Business Alert
New ‘Red Flag’ Requirements for Financial Institutions and Creditors Will Help Fight Identity Theft
http://www.ftc.gov/bcp/edu/pubs/business/alerts/alt050.shtm
FTC Business Alert
New ‘Red Flag’ Requirements for Financial Institutions and Creditors Will Help Fight Identity Theft
http://www.ftc.gov/bcp/edu/pubs/business/alerts/alt050.shtm
Tuesday, September 16, 2008
Thank you
Thank you for visiting my online resources regarding Identity Theft and Identity Theft Restoration. I hope this information supplements what we covered in class and that it also helps you share with others what we discussed.
Subscribe to:
Posts (Atom)
Welcome
Welcome to my blog. The primary purpose of this Blog is to provide links to source material that I may have quoted in a presentation or training or researched in answer to a question I have been asked.
I hope this site helps you share this information with others and/or conduct your own research. Please contact me with any questions. Thank you for visiting.