Man charged with ID theft using data stolen from P2P networks
It's the first such case of its kind in the U.S.
Computerworld - In the first case of its kind in the U.S., federal authorities have arrested a Seattle man on charges of committing identity theft and fraudulent online transactions using personal information harvested from peer-to-peer (P2P) networks.
In a four-count indictment unsealed Thursday in the U.S. District Court for the Western District of Washington, federal officials said that Gregory Thomas Kopiloff used P2P software such as LimeWire and Soulseek to snoop for and steal identity, banking and credit information belonging to other users on file-sharing networks.
The illegal activity began around March 2005 and continued through August 2007. During this period, Kopiloff is accused of fraudulently buying at least $73,000 worth of merchandise with identities and financial information belonging to at least 83 individuals, the indictment said.
According to officials, Kopiloff used P2P tools to surreptitiously gain access to a wide range of information stored on the computers of other users on file-sharing networks. In addition to banking and other financial data, Kopiloff would specifically search for federal income tax returns, student financial aid applications and credit reports that were stored on the computers of other P2P network users.
He then would proceed to use the data to screen potential victims based on their income levels and credit histories, "in order to identify victims who were most 'credit worthy' and under whose identities he could maximize fraudulent merchant transactions," the indictment said.
The arrest highlights growing concerns about how file-sharing networks are becoming treasure troves of information for identity thieves and other types of fraudsters.
The situation is the result of personal information being leaked onto these networks by individuals who fail to take the proper precautions for securing their computers during P2P sessions. Popular P2P clients such as Kazaa, LimeWire, BearShare, Morpheus and FastTrack are designed to let users quickly download and share music and video files. Normally, such P2P clients allow users to download files to and to share items from a particular folder on their system with other users on the network. But if proper care is not taken to control the access that these P2P clients have on a system, it is easy to accidentally expose and share personal data stored on the computer with all other users on a file-sharing network.
According to security analysts, the information available on P2P networks, as a result of such accidental exposure, includes federal and state ID card data, passports, Social Security numbers, credit card information and bank account details.
A study on the dangers of inadvertent data disclosure on file-sharing networks earlier this year by Dartmouth College's Tuck School of Business showed that such information is increasingly being mined on file-sharing networks by ID thieves. The study examined data involving P2P searches and files related to the top 30 U.S. banks over a seven-week period between December 2006 and February 2007. The analysis showed that a large number of searches made on those networks were aimed at uncovering sensitive financial data from individuals.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All Legal White Papers | Webcasts