Return-Path: <sentto-279987-3374-1003945130-fc=all.net@returns.onelist.com> Received: from localhost (localhost.localdomain [127.0.0.1]) by red.all.net (8.11.2/8.11.2) with ESMTP id f9OHkwd12045 for <fc@localhost>; Wed, 24 Oct 2001 10:46:58 -0700 Delivered-To: fc@all.net Received: from 204.181.12.215 [204.181.12.215] by localhost with POP3 (fetchmail-5.7.4) for fc@localhost (single-drop); Wed, 24 Oct 2001 10:46:58 -0700 (PDT) Received: (qmail 15104 invoked by uid 510); 24 Oct 2001 17:38:20 -0000 Received: from n35.groups.yahoo.com (216.115.96.85) by 204.181.12.215 with SMTP; 24 Oct 2001 17:38:20 -0000 X-eGroups-Return: sentto-279987-3374-1003945130-fc=all.net@returns.onelist.com Received: from [10.1.1.220] by n35.groups.yahoo.com with NNFMP; 24 Oct 2001 17:38:53 -0000 X-Sender: fc@red.all.net X-Apparently-To: iwar@onelist.com Received: (EGP: mail-8_0_0_1); 24 Oct 2001 17:38:50 -0000 Received: (qmail 7751 invoked from network); 24 Oct 2001 17:38:49 -0000 Received: from unknown (10.1.10.26) by 10.1.1.220 with QMQP; 24 Oct 2001 17:38:49 -0000 Received: from unknown (HELO red.all.net) (65.0.156.78) by mta1 with SMTP; 24 Oct 2001 17:38:49 -0000 Received: (from fc@localhost) by red.all.net (8.11.2/8.11.2) id f9OHdGA11874 for iwar@onelist.com; Wed, 24 Oct 2001 10:39:16 -0700 Message-Id: <200110241739.f9OHdGA11874@red.all.net> To: iwar@onelist.com (Information Warfare Mailing List) Organization: I'm not allowed to say X-Mailer: don't even ask X-Mailer: ELM [version 2.5 PL3] From: Fred Cohen <fc@all.net> X-Yahoo-Profile: fcallnet Mailing-List: list iwar@yahoogroups.com; contact iwar-owner@yahoogroups.com Delivered-To: mailing list iwar@yahoogroups.com Precedence: bulk List-Unsubscribe: <mailto:iwar-unsubscribe@yahoogroups.com> Date: Wed, 24 Oct 2001 10:39:16 -0700 (PDT) Reply-To: iwar@yahoogroups.com Subject: [iwar] [fc:Treasury.Dept..Unit.Notes.Rise.In.ID.Theft,.Hacking] Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Treasury Dept. Unit Notes Rise In ID Theft, Hacking By Staff, Newsbytes, 10/24/2001 <a href="http://www.newsbytes.com/news/01/171424.html">http://www.newsbytes.com/news/01/171424.html> Identity theft and computer intrusion continue to hit the nation's financial institutions at rising levels, according to new data released by the U.S. Treasury Department's Financial Crimes Enforcement Network (FinCEN). FinCEN cited computer intrusion as its "highlighted trend" for its latest suspicious financial activity report, though its most recent report featured ID theft. The agency in its Suspicious Activity Report (SAR) review for the first four months of the year, published Monday, showed 332 reports filed that deal with identity theft. This compares to a total of 637 cases last year, and 267 cases in 1999. The 332 cases reported for the first four months reflect a 50 percent increase over the number of cases reported in the same time period last year, FinCEN said. The identity theft case load also rose more than 100 percent between 1999 and 2000. FinCEN also said that 236 financial institutions have reported identity theft instances in 43 states and Washington, D.C., and that California and North Carolina together account for nearly a third of the cases. Financial institutions have reported 81 of these cases to law enforcement authorities since December 2000, the agency added. FinCEN first began reporting instances of identity theft in 1996, noting 21 cases for its first period of reporting, between Apr. 1 and Dec. 31 of that year. It recorded 44 cases in all of 1997 and 81 cases in 1998. On the subject of computer intrusion and other hacking/cracking activities, FinCEN said that there were 147 instances reported between June 2000 and June 2001, the first time the agency covered the issue. The 147 filings came from 34 states and Puerto Rico, with about one-third of them coming from New York, California and Illinois. About 10 percent of these cases also involved identity theft as a means to start new bank accounts online. The FBI took 32 of the cases, while 55 of them went to other law enforcement authorities. Many of the cases involved bank employees who aided in the computer intrusion, while two other instances involved attempted penetration of computer systems via worm or virus. Two other unsuccessful attempts included the use of spam e-mail to try to overload computer servers. The Treasury Department has recommended several government and private sources that handle identity theft issues, including the Federal Deposit Insurance Corporation (http://www.fdic.gov ), the Federal Reserve Board (http://www.federalreserve.gov ), the National Credit Union Association (http://www.ncua.gov ), the Office of the Comptroller of the Currency (http://www.occ.treas.gov ) and the Office of Thrift Supervision (http://www.ots.treas.gov ). The Federal Trade Commission also addresses consumer identity theft matters at http://www.consumer.gov/identitytheft and <a href="http://www.consumer.gov/knowfraud">http://www.consumer.gov/knowfraud>. ------------------------ Yahoo! Groups Sponsor ---------------------~--> Pinpoint the right security solution for your company- Learn how to add 128- bit encryption and to authenticate your web site with VeriSign's FREE guide! http://us.click.yahoo.com/yQix2C/33_CAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> ------------------ http://all.net/ Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/
This archive was generated by hypermail 2.1.2 : 2001-12-31 20:59:57 PST