[iwar] [fc:Treasury.Dept..Unit.Notes.Rise.In.ID.Theft,.Hacking]

From: Fred Cohen (fc@all.net)
Date: 2001-10-24 10:39:16


Return-Path: <sentto-279987-3374-1003945130-fc=all.net@returns.onelist.com>
Received: from localhost (localhost.localdomain [127.0.0.1]) by red.all.net (8.11.2/8.11.2) with ESMTP id f9OHkwd12045 for <fc@localhost>; Wed, 24 Oct 2001 10:46:58 -0700
Delivered-To: fc@all.net
Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 24 Oct 2001 10:46:58 -0700 (PDT)
Received: (qmail 15104 invoked by uid 510); 24 Oct 2001 17:38:20 -0000
Received: from n35.groups.yahoo.com (216.115.96.85) by 204.181.12.215 with SMTP; 24 Oct 2001 17:38:20 -0000
X-eGroups-Return: sentto-279987-3374-1003945130-fc=all.net@returns.onelist.com
Received: from [10.1.1.220] by n35.groups.yahoo.com with NNFMP; 24 Oct 2001 17:38:53 -0000
X-Sender: fc@red.all.net
X-Apparently-To: iwar@onelist.com
Received: (EGP: mail-8_0_0_1); 24 Oct 2001 17:38:50 -0000
Received: (qmail 7751 invoked from network); 24 Oct 2001 17:38:49 -0000
Received: from unknown (10.1.10.26) by 10.1.1.220 with QMQP; 24 Oct 2001 17:38:49 -0000
Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1 with SMTP; 24 Oct 2001 17:38:49 -0000
Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9OHdGA11874 for iwar@onelist.com; Wed, 24 Oct 2001 10:39:16 -0700
Message-Id: <200110241739.f9OHdGA11874@red.all.net>
To: iwar@onelist.com (Information Warfare Mailing List)
Organization: I'm not allowed to say
X-Mailer: don't even ask
X-Mailer: ELM [version 2.5 PL3]
From: Fred Cohen <fc@all.net>
X-Yahoo-Profile: fcallnet
Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com
Delivered-To: mailing list iwar@yahoogroups.com
Precedence: bulk
List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com>
Date: Wed, 24 Oct 2001 10:39:16 -0700 (PDT)
Reply-To: iwar@yahoogroups.com
Subject: [iwar] [fc:Treasury.Dept..Unit.Notes.Rise.In.ID.Theft,.Hacking]
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

Treasury Dept. Unit Notes Rise In ID Theft, Hacking 
By Staff, Newsbytes, 10/24/2001
<a href="http://www.newsbytes.com/news/01/171424.html">http://www.newsbytes.com/news/01/171424.html>

Identity theft and computer intrusion continue to hit the nation's
financial institutions at rising levels, according to new data released
by the U.S. Treasury Department's Financial Crimes Enforcement Network
(FinCEN). 
FinCEN cited computer intrusion as its "highlighted trend" for its
latest suspicious financial activity report, though its most recent
report featured ID theft. 
The agency in its Suspicious Activity Report (SAR) review for the first
four months of the year, published Monday, showed 332 reports filed that
deal with identity theft. This compares to a total of 637 cases last
year, and 267 cases in 1999. 
The 332 cases reported for the first four months reflect a 50 percent
increase over the number of cases reported in the same time period last
year, FinCEN said. 
The identity theft case load also rose more than 100 percent between
1999 and 2000. 
FinCEN also said that 236 financial institutions have reported identity
theft instances in 43 states and Washington, D.C., and that California
and North Carolina together account for nearly a third of the cases. 
Financial institutions have reported 81 of these cases to law
enforcement authorities since December 2000, the agency added. 
FinCEN first began reporting instances of identity theft in 1996, noting
21 cases for its first period of reporting, between Apr. 1 and Dec. 31
of that year. It recorded 44 cases in all of 1997 and 81 cases in 1998. 
On the subject of computer intrusion and other hacking/cracking
activities, FinCEN said that there were 147 instances reported between
June 2000 and June 2001, the first time the agency covered the issue. 
The 147 filings came from 34 states and Puerto Rico, with about
one-third of them coming from New York, California and Illinois. About
10 percent of these cases also involved identity theft as a means to
start new bank accounts online. 
The FBI took 32 of the cases, while 55 of them went to other law
enforcement authorities. 
Many of the cases involved bank employees who aided in the computer
intrusion, while two other instances involved attempted penetration of
computer systems via worm or virus. Two other unsuccessful attempts
included the use of spam e-mail to try to overload computer servers. 
The Treasury Department has recommended several government and private
sources that handle identity theft issues, including the Federal Deposit
Insurance Corporation (http://www.fdic.gov ), 
the Federal Reserve Board
(http://www.federalreserve.gov ), the 
National Credit Union Association
(http://www.ncua.gov ), the Office of the Comptroller 
of the Currency
(http://www.occ.treas.gov ) and the Office 
of Thrift Supervision
(http://www.ots.treas.gov ). 
The Federal Trade Commission also addresses consumer identity theft
matters at http://www.consumer.gov/identitytheft 
and
<a href="http://www.consumer.gov/knowfraud">http://www.consumer.gov/knowfraud>.

------------------------ Yahoo! Groups Sponsor ---------------------~-->
Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide!
http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM
---------------------------------------------------------------------~->

------------------
http://all.net/ 

Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ 



This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:57 PST