Stopping wireless ID theft

Sep 16, 2005

A New Jersey State Superior Court judge this week ordered a company that had acquired customer names from a major wireless carrier without its permission to refrain from selling those customer profiles to others and to surrender the names and transaction records.

The order in the case of Verizon Wireless vs. Source Resources Inc. is the latest round in the ongoing war centered on stopping ID theft today, experts told UPI's Wireless World.

"Accessing a person's personal telephone records without a valid court order or the customer's permission is illegal," said Steven Zipperstein, general counsel of Verizon Wireless, in Bedminster, N.J. "We will use every weapon in our legal arsenal to shut down identity theft operations."

Many other wireless and IT experts, however, said the legal approach should be the last resort, after other internal options have been exhausted to protect confidential customer data.

"Much of the data compromised has been due to hacking and poor security measures," said Robert Siciliano, a personal-security and ID-theft expert in Boston, whose clients include British Petroleum, among others. "Government intervention is making corporations liable, through a variety of new compliance and regulatory standards."

Siciliano also noted that internal networks are what are being breached today by insiders, as external hackers are being kept away by firewalls and other technology measures.

"Hacking from outside is becoming more difficult," Siciliano said. "Monitoring of internal networks through a variety of platforms is a priority to reduce employees theft. Knowing who's accessing what and why is essential."

Other experts agreed, but added technology alone is not the answer.

"Many companies do a horrible job in protecting customer's private information, actually all information," said Ted Demopoulos, an IT consultant and author of a forthcoming book from Dearborn Trade Publishing. "Technologies like strong authentication, encrypted backups, appropriate authorization, can help, but technology alone is no solution."

Rather, he said, companies need to develop a written plan, a security policy. Then they need to brief everyone in the firm on the plan -- and make sure that they follow it. The plan should specify rules to protect customer data and should categorize information into secret, confidential, restricted or public categories. These policies also restrict where customer information can be stored.

For example, it may prohibit customer data, names, addresses and Social Security numbers from being stored on laptop computers.

"Without a workable data security plan, information security for private customer data will be hit or miss," Demopoulos said.

In the Verizon case, all that is being said is that Source Resources, of Cookeville, Tenn., obtained the customer data without permission. It is not being publicized how the information was acquired. Superior Court Judge Harriet Derman this week ordered a "permanent injunction" against the company, which has agreed to return all the records to Verizon, as well as information about "how it obtained customer records."

The lawsuit was filed July 8 after Source Resources advertised on its Internet site that it had the ability to find confidential wireless phone numbers for a fee. One of Verizon's own customers reported that his private phone records allegedly had been obtained by Source Resources, and that prompted the lawsuit by Verizon, which has more than 47 million customers in the United States.

Private companies, such as Verizon or Morgan Stanley, however, are not the only ones whose data is being stolen. The Pentagon recently reportedly suffered a security breach by foreign governments.

The consulting firm Guidance Software worked with the Department of Defense to "uncover hacking incidents on the department's massive network, but detect, track and extinguish active hacks that lived on the network, which were previously unknown, and that searched for classified information and sent that information out, daily, to secret repositories," said a spokesman for the company, a cyber forensics firm, based in Pasenda, Calif.

Copyright 2005 by United Press International

Explore further: Quantenna promises 10-gigabit Wi-Fi by next year

add to favorites email to friend print save as pdf

Related Stories

Apple patent proposes battery use monitoring system

Mar 23, 2014

(Phys.org) —Smartphone users are aware by now of the fact that beyond the richest phone, text, location and imaging feature sets, waning battery performance can play a significant role in dampening customer ...

Big, fast, weird data

Apr 08, 2014

The "Big Data" research that continues to dominate IT agendas has traditionally focused on making sense of the growing volumes of computer data. Yet in recent years, the volume question has given way to the other V's of Big ...

Fixes in the works for Moon-struck Linksys routers

Feb 18, 2014

(Phys.org) —Self-replicating malware has struck some older Linksys routers and Linksys has acknowledged awareness of the malware, called "TheMoon." They plan to make firmware fixes for all affected products ...

Recommended for you

Quantenna promises 10-gigabit Wi-Fi by next year

1 hour ago

(Phys.org) —Quantenna Communications has announced that it has plans for releasing a chipset that will be capable of delivering 10Gbps WiFi to/from routers, bridges and computers by sometime next year. ...

New US-Spanish firm says targets rich mobile ad market

2 hours ago

Spanish telecoms firm Telefonica and US investment giant Blackstone launched a mobile telephone advertising venture on Wednesday, challenging internet giants such as Google and Facebook in a multi-billion-dollar ...

Environmentally compatible organic solar cells

2 hours ago

Environmentally compatible production methods for organic solar cells from novel materials are in the focus of "MatHero". The new project coordinated by Karlsruhe Institute of Technology (KIT) aims at making ...

Twitter rules out Turkey office amid tax row

2 hours ago

Social networking company Twitter on Wednesday rejected demands from the Turkish government to open an office there, following accusations of tax evasion and a two-week ban on the service.

User comments : 0

More news stories

Quantenna promises 10-gigabit Wi-Fi by next year

(Phys.org) —Quantenna Communications has announced that it has plans for releasing a chipset that will be capable of delivering 10Gbps WiFi to/from routers, bridges and computers by sometime next year. ...

Unlocking secrets of new solar material

(Phys.org) —A new solar material that has the same crystal structure as a mineral first found in the Ural Mountains in 1839 is shooting up the efficiency charts faster than almost anything researchers have ...

Floating nuclear plants could ride out tsunamis

When an earthquake and tsunami struck the Fukushima Daiichi nuclear plant complex in 2011, neither the quake nor the inundation caused the ensuing contamination. Rather, it was the aftereffects—specifically, ...

New US-Spanish firm says targets rich mobile ad market

Spanish telecoms firm Telefonica and US investment giant Blackstone launched a mobile telephone advertising venture on Wednesday, challenging internet giants such as Google and Facebook in a multi-billion-dollar ...