home bbs files messages ]

Forums before death by AOL, social media and spammers... "We can't have nice things"

   alt.privacy      Discussing privacy, laws, tinfoil hats      112,125 messages   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]

   Message 110,392 of 112,125   
   Leroy N. Soetoro to All   
   What's worse than thieves hacking into y   
   20 Jul 24 01:29:04   
   
   XPost: talk.politics.guns, alt.crime, alt.politics.democrats   
   XPost: alt.fan.rush-limbaugh, sac.politics   
   From: democrat-criminals@mail.house.gov   
      
   https://apnews.com/article/fraud-identity-theft-fcc-wireless-providers-   
   8df930f2983d589c4822bba53eedfc1b   
      
   WASHINGTON (AP) — One Monday morning in May, I woke up and grabbed my cell   
   phone to read the news and scroll through memes. But it was out of cell   
   service. I couldn’t make calls or texts.   
      
   That, though, turned out to be the least of my problems.   
      
   Using my home Wi-Fi connection, I checked my email and discovered a   
   notification that $20,000 was being transferred from my credit card to an   
   unfamiliar Discover Bank account.   
      
   I thwarted that transfer and reported the cell phone issues, but my   
   nightmare was just starting. Days later, someone managed to transfer   
   $19,000 from my credit card to the same strange bank account.   
      
   I was the victim of a type of fraud known as port-out hijacking, also   
   called SIM-swapping. It’s a less-common form of identity theft. New   
   federal regulations aimed at preventing port-out hijacking are under   
   review, but it’s not clear how far they will go in stopping the crime.   
      
   Port-out hijacking goes a step beyond hacking into a store, bank or credit   
   card account. In this case, the thieves take over your phone number. Any   
   calls or texts go to them, not to you.   
      
   When your own phone access is lost to a criminal, the very steps you once   
   took to protect your accounts, such as two-factor authentication, can be   
   used against you. It doesn’t help to have a bank send a text to verify a   
   transaction when the phone receiving the text is in the hands of the very   
   person trying to break into your account.   
      
   Even if you’re a relatively tech-savvy individual who follows every   
   recommendation on how to protect your tech and identity, it can still   
   happen to you.   
      
   Experts say these scams will only increase and become more sophisticated,   
   and the data show they are on the rise.   
      
   I am not the most tech savvy person, but I am a law-school educated   
   journalist who specializes in finance reporting. Due to the very online   
   nature of my job, I was taught all the methods of staying safe online:   
   constantly changing my passwords with multi-factor authentication, signing   
   out of apps that I don’t use regularly and keeping my personal information   
   off the internet.   
      
   Still, despite being safe, I was vulnerable to criminals. And it took a   
   lot of time and legwork before I got my money and phone number back.   
      
   The FBI Internet Crime Complaint Center reports SIM-swapping complaints   
   have increased more than 400% from 2018 to 2021, having received 1,611 SIM   
   swapping complaints with personal losses of more than $68 million.   
      
   Complaints to the FCC about the crime have doubled, from 275 complaints in   
   2020 to 550 reports in 2023.   
      
   Rachel Tobac, CEO of SocialProof Security, an online security company,   
   says the rate of the crime is likely much higher since most identity   
   thefts are not reported.   
      
   She also says two-factor authentication is an outdated way of keeping   
   consumers safe, since it’s possible to find anyone’s phone number,   
   birthday and social security number through any number of public or   
   private databases on the web.   
      
   The ability of thieves to obtain your personal information was again made   
   clear Friday when AT&T said the data of nearly all of its customers was   
   downloaded to a third-party platform in a security breach two years ago.   
   Although AT&T claims no personal information was leaked, cybersecurity   
   experts have warned breaches involving telephone companies leave customers   
   vulnerable to SIM swapping.   
      
   As of now, switching numbers from one phone to another is easy and can be   
   done online or over the phone. The process takes less than a few hours so   
   long as a criminal has your personal information on hand.   
      
   While consumers need to be smart about having a variety of different   
   passwords and protections, consumers need to “put pressure on companies   
   where its their job to protect our data,” Tobac said.   
      
   “We need them to update consumer protection protocols,” she said, since   
   two-factor authentication is not enough.   
      
   FCC rules have recently changed to force companies to do more to protect   
   consumers from this type of scam.   
      
   In 2023, the FCC introduced rulemaking that require wireless providers to   
   “adopt secure methods of authenticating a customer before redirecting a   
   customer’s phone number to a new device or provider” among other new   
   rules. Companies could require more information when a customer tries to   
   port over a phone number to another phone — from requiring government   
   identification, voice verification or additional security questions.   
      
   The rules were scheduled to take effect on July 8, but the FCC on July 5   
   granted phone companies a waiver that delays implementation until the   
   White House Office of Management conducts a further review.   
      
   The wireless industry had sought the delay, stating among other reasons   
   that companies need more time to comply. CTIA, which lobbies on behalf of   
   the companies, said the new rules will require major changes in technology   
   and procedures both within the wireless companies and in their   
   interactions with phone manufacturers.   
      
   But if the FCC rules had been in place, my phone number might have been   
   harder to steal, experts say.   
      
   Ohio State University Professor Amy Schmitz says the new FCC rules make it   
   easier for consumers to protect themselves, but it is still reliant on   
   action and awareness of the consumers.   
      
   “I still question whether consumers will be aware of this, and will take   
   action to protect themselves,” she said.   
      
   It took ten days to get my number back from Cricket Wireless — and that   
   wasn’t until I told company representatives that I was writing a story   
   about my experience.   
      
   In that period of time the scammer was able to access my bank account   
   three times and eventually successfully transferred $19,000 from my credit   
   card— even though I removed my number from the bank account, froze my   
   credit, changed all my passwords, among other measures.   
      
   Bank of America worked to reverse the $19,000 wire after I visited a   
   branch near the AP bureau in Washington.   
      
   Cricket apologized for the error and said in an email that its   
   “expectation is to deliver a much better customer experience.”   
      
   “Fraudulent port-outs are a form of theft committed by sophisticated   
   criminals,” reads a company statement that was emailed to me. “We have   
   measures in place to help defeat them, and we work closely with law   
   enforcement, our industry and consumers to help prevent this type of   
   crime.”   
      
   An AT&T representative told me in an email that “all providers are working   
   to implement the FCC’s new rules on port-outs and SIM swaps.”   
      
   I’m still unsure of how this person got access to my accounts, whether   
   through my social security number, phone number or date of birth, or   
      
   [continued in next message]   
      
   --- SoupGate-Win32 v1.05   
    * Origin: you cannot sedate... all the things you hate (1:229/2)   

[   << oldest   |   < older   |   list   |   newer >   |   newest >>   ]


(c) 1994,  bbs@darkrealms.ca