Man charged with ID theft using data stolen from P2P networks
It's the first such case of its kind in the U.S.
Computerworld - In the first case of its kind in the U.S., federal authorities have arrested a Seattle man on charges of committing identity theft and fraudulent online transactions using personal information harvested from peer-to-peer (P2P) networks.
In a four-count indictment unsealed Thursday in the U.S. District Court for the Western District of Washington, federal officials said that Gregory Thomas Kopiloff used P2P software such as LimeWire and Soulseek to snoop for and steal identity, banking and credit information belonging to other users on file-sharing networks.
The illegal activity began around March 2005 and continued through August 2007. During this period, Kopiloff is accused of fraudulently buying at least $73,000 worth of merchandise with identities and financial information belonging to at least 83 individuals, the indictment said.
According to officials, Kopiloff used P2P tools to surreptitiously gain access to a wide range of information stored on the computers of other users on file-sharing networks. In addition to banking and other financial data, Kopiloff would specifically search for federal income tax returns, student financial aid applications and credit reports that were stored on the computers of other P2P network users.
He then would proceed to use the data to screen potential victims based on their income levels and credit histories, "in order to identify victims who were most 'credit worthy' and under whose identities he could maximize fraudulent merchant transactions," the indictment said.
The arrest highlights growing concerns about how file-sharing networks are becoming treasure troves of information for identity thieves and other types of fraudsters.
The situation is the result of personal information being leaked onto these networks by individuals who fail to take the proper precautions for securing their computers during P2P sessions. Popular P2P clients such as Kazaa, LimeWire, BearShare, Morpheus and FastTrack are designed to let users quickly download and share music and video files. Normally, such P2P clients allow users to download files to and to share items from a particular folder on their system with other users on the network. But if proper care is not taken to control the access that these P2P clients have on a system, it is easy to accidentally expose and share personal data stored on the computer with all other users on a file-sharing network.
According to security analysts, the information available on P2P networks, as a result of such accidental exposure, includes federal and state ID card data, passports, Social Security numbers, credit card information and bank account details.
A study on the dangers of inadvertent data disclosure on file-sharing networks earlier this year by Dartmouth College's Tuck School of Business showed that such information is increasingly being mined on file-sharing networks by ID thieves. The study examined data involving P2P searches and files related to the top 30 U.S. banks over a seven-week period between December 2006 and February 2007. The analysis showed that a large number of searches made on those networks were aimed at uncovering sensitive financial data from individuals.
- Why Projects Fail CIOs are expected to deliver more projects that transform business, and do so on time, on budget and with limited resources.
- The New Business Case for Video Conferencing: 7 Real-World Benefits Beyond Cost-Savings This whitepaper provides insight into the value of video conferencing in today's business environment, and how organizations are using visual collaboration to find...
- Gartner Magic Quadrant for Client Management Tools The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.
- Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence...
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Legal White Papers | Webcasts