Feeds

T-Mobile and AT&T stung in $22m handset scam

Eight indicted in elaborate dealer fraud

3 Big data security analytics techniques

Eight people have been indicted by a Brooklyn court for running a scam that involved dealers using customer details to order handsets, in a fraud worth $22m.

The charges allege that two of the defendants, who ran cellular dealerships in New York and Florida, picked up customer details from the network's databases, then used the details to impersonate those customers and order additional handsets, as well as making insurance claims for broken handsets. Deliveries were then either redirected en route, or simply sent to the defendants' addresses.

Got Wireless operated out of Brooklyn and was authorised with AT&T as well as T-Mobile, while KP Wireless was based in West Palm Beach, Florida, and only had access to T-Mobile's customer database. But the owners of both companies are accused of lifting customer details and then posing as those customers to buy additional handsets or make insurance claims for replacements.

The group apparently then bribed delivery drivers subcontracted by FedEx and DHL to intercept the packages, while other confederates scanned the boxes as having been successfully delivered.

UPS deliveries obviously presented more of a problem as they were sent directly to addresses connected to the defendants.

When customers called up to complain about the devices appearing on their bills, the operators just wrote off the amounts, which totalled (including shipping) $22m.

Catching the miscreants took a while, and apparently is "an example of the strategic partnerships between the Secret Service, the New York State Police, and our private sector partners", according to the Special Agent-in-Charge.

Dealer fraud is a big deal for mobile operators, though all the networks have been cracking down over the last few years, and steps such as the international database of stolen handsets help a lot.

The problem here is that dealers, by necessity, have access to exactly the information needed to impersonate the customer. Therefore the customer, and the network, are both required to trust the mobile-phone shop: which might worry anyone who has visited one. ®

3 Big data security analytics techniques

More from The Register

next story
Virgin Media so, so SORRY for turning spam fire-hose on its punters
Hundreds of emails flood inboxes thanks to gaffe
AT&T dangles gigabit broadband plans over 100 US cities
So soon after a mulled Google Fiber expansion, fancy that
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE & Vodafone will let you BONK on the TUBE – with Boris' blessing
Transport for London: You can pay, but don't touch
NBN Co plans fibre-to-the-basement blitz to beat cherry-pickers
Heading off at the pass operation given same priority as blackspot fixing
NBN Co in 'broadband kit we tested worked' STUNNER
Announcement of VDSL trial is not proof of concept for fibre-to-the-node
Google eyes business service in latest Fiber trials
Lucky Kansas City buggers to host yet another pilot program
Huawei exec: 'Word of mouth' will beat Apple and Samsung in Europe
World Mobile Telephone Factory No.3 won't fling the big bucks around just yet
Brazilian president signs internet civil rights law
Marco Civil bill enshines 'net neutrality', 'privacy' as law
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.