Feeds

Chinese hackers turn to identity theft

To exploit the 'faceless society' on line is glorious

  • alert
  • submit to reddit

Providing a secure and efficient Helpdesk

Organised Chinese fraud rings on the mainland and overseas are more likely to hack databases to compromise credit and identity details than ply the more traditional avenues of bribing bank employees favoured by their Nigerian counterparts, a federal investigator claims. "The Chinese gangs have moved into the electronic age where they're using hacking techniques and Internet theft," US Secret Service Special Agent Gregory Regan explained in testimony before the Senate Judiciary Subcommittee on Technology, Terrorism and Government Information Tuesday. Identity theft is an increasingly easy scam now that so much information is available on line, Regan warned. "The Internet makes it unnecessary for criminals to obtain identity documents," he said. The Net is creating a "faceless society" where it's easy for an identity fraudster, even one overseas, to open a credit account on line, sometimes with nothing but his victim's name and social security number, Regan observed. There were 1,147 cases of identity theft resulting in 644 convictions reported in the US during 1999 alone. The US Social Security Administration reports that over 81 percent of social security number misuse involves ID theft. Most incidents are part of some larger, organised criminal enterprise. Committee Chairman Jon Kyl (Republican, Arizona) sponsored the Identity Theft and Assumption Deterrence Act, which became law in 1998. He convened Tuesday's hearing to review the act's success and seek suggestions for its improvement. The act requires the Federal Trade Commission to assist ID theft victims, which it now does, in part, via a Web page here. In spite of recent efforts to address the problem, victims often find that recovering their identity is immensely more difficult than losing it. Witness Maureen Mitchell recalled a seemingly endless series of difficulties in sorting out her records after being vicitmised by fraudsters who ran up US $110,000 in bogus charges in her and her husband's name. Her suggestion for amending the bill would require merchants and credit agencies to develop a single, unified protocol for victim notification. "We had to submit handwriting samples to twenty different merchants; we had to submit notarised documents and affidavits. It's like filling out your tax return twenty times with twenty different sets of instructions," she observed dryly. Having considerable personal experience with filling out American tax returns, we can say without hesitation that the victim is being punished quite severely here, and can only offer our hope that the criminals might suffer half as much. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Apple CEO Tim Cook: TV is TERRIBLE and stuck in the 1970s
The iKing thinks telly is far too fiddly and ugly – basically, iTunes
Huawei ditches new Windows Phone mobe plans, blames poor sales
Giganto mobe firm slams door shut on Microsoft. OH DEAR
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.