Feeds

US Secret Service busts 28 ID fraudsters

International undercover op

  • alert
  • submit to reddit

Reducing security risks from open source software

Updated A US-led operation targeting ID fraud crooks has led to the arrest of 28 people across seven countries this week.

The arrests follow an undercover operation headed by US Secret Service agents that successful infiltrated gangs that traded sensitive personal information and tips on ID fraud and forgery through online groups called Shadowcrew, Carderplanet and Darkprofits. The organisations were described by the US Justice Department as running a "one-stop marketplace for identity theft".

Operation Firewall identified a group of suspects investigators reckon collectively stole over 1.7 million credit card numbers as well as forging driving licenses, birth certificates and passports. Losses to banks through credit card fraud because of the gang's activities are estimated at $4.3m. The suspects face identity theft, computer fraud, credit card fraud and conspiracy charges.

"These suspects targeted the sensitive and private information of ordinary citizens as well as the confidential and proprietary information of companies," said Secret Service director W Ralph Basham. He added that the early arrest of the suspects prevented losses that could have run into hundreds of millions of dollars.

Operation Firewall began in July 2003 as an investigation in access device fraud before expanding into an investigation of global credit card fraud and identity theft fraud. The US Secret Service singled out the UK's National Hi-Tech Crime Unit, the Royal Canadian Mounted Police and Europol for praise in supporting the investigation.

In a statement (PDF) the US Secret Service said Operation Firewall had led to the arrest of suspects in "eight states and six foreign countries" this week. Among those arrested was a 19 year-old from Camberley, Surrey, who was picked up on Wednesday (27 October). The Secret Service hasn't said which other countries are involved. But since US authorities worked with their counterparts in the UK, Canada, Bulgaria, Belarus, Poland, Sweden, Ukraine and the Netherlands we can deduce that the suspects came from one or other of those countries or the US. ®

Related stories

6m South Koreans exposed in slam and spam scam
ID thieves target enterprises
Invasion of the identity snatchers
World's largest ID theft felon faces 14 years' jail
150+ cuffed in US-led cybercrime crackdown

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
L33t haxxors compete to p0wn popular home routers
EFF-endorsed SOHOpelessly Broken challenge will air routers' dirty zero day laundry
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.