Man charged with ID theft using data stolen from P2P networks
It's the first such case of its kind in the U.S.
Computerworld - In the first case of its kind in the U.S., federal authorities have arrested a Seattle man on charges of committing identity theft and fraudulent online transactions using personal information harvested from peer-to-peer (P2P) networks.
In a four-count indictment unsealed Thursday in the U.S. District Court for the Western District of Washington, federal officials said that Gregory Thomas Kopiloff used P2P software such as LimeWire and Soulseek to snoop for and steal identity, banking and credit information belonging to other users on file-sharing networks.
The illegal activity began around March 2005 and continued through August 2007. During this period, Kopiloff is accused of fraudulently buying at least $73,000 worth of merchandise with identities and financial information belonging to at least 83 individuals, the indictment said.
According to officials, Kopiloff used P2P tools to surreptitiously gain access to a wide range of information stored on the computers of other users on file-sharing networks. In addition to banking and other financial data, Kopiloff would specifically search for federal income tax returns, student financial aid applications and credit reports that were stored on the computers of other P2P network users.
He then would proceed to use the data to screen potential victims based on their income levels and credit histories, "in order to identify victims who were most 'credit worthy' and under whose identities he could maximize fraudulent merchant transactions," the indictment said.
The arrest highlights growing concerns about how file-sharing networks are becoming treasure troves of information for identity thieves and other types of fraudsters.
The situation is the result of personal information being leaked onto these networks by individuals who fail to take the proper precautions for securing their computers during P2P sessions. Popular P2P clients such as Kazaa, LimeWire, BearShare, Morpheus and FastTrack are designed to let users quickly download and share music and video files. Normally, such P2P clients allow users to download files to and to share items from a particular folder on their system with other users on the network. But if proper care is not taken to control the access that these P2P clients have on a system, it is easy to accidentally expose and share personal data stored on the computer with all other users on a file-sharing network.
According to security analysts, the information available on P2P networks, as a result of such accidental exposure, includes federal and state ID card data, passports, Social Security numbers, credit card information and bank account details.
A study on the dangers of inadvertent data disclosure on file-sharing networks earlier this year by Dartmouth College's Tuck School of Business showed that such information is increasingly being mined on file-sharing networks by ID thieves. The study examined data involving P2P searches and files related to the top 30 U.S. banks over a seven-week period between December 2006 and February 2007. The analysis showed that a large number of searches made on those networks were aimed at uncovering sensitive financial data from individuals.
- Best iPhone, iPad Business Apps for 2014
- 14 Tech Conventions You Should Attend in 2014
- 10 Desktop Apps to Power Your Windows PC
- How to Add New Job Skills Without Going Back to School
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
Red Hat Enterprise Linux - The Original Cloud Operating System
Linux adoption is growing against a number of measures, such as the
number of supercomputers that run Linux and the size of the contributing...
- OpenStack Hype vs. Reality: CIO Quick Pulse Open-source architecture can enable IT departments to build infrastructure-as-a-service (IaaS) clouds running on standard hardware.
- Building a Bridge to the Next Generation Data Center Selecting a widely adopted operating system is a foundational component of a standardization strategy.
- OpenStack and Red Hat: IDC White paper Most OpenStack deployments are by public cloud providers that are early adopters of technology and use OpenStack in a do-it-yourself deployment and support...
- Webinar: Building a Big Data solution that's production-ready Big data solutions are no longer just a nice-to-have.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well... All Legal White Papers | Webcasts