Tag: stolen

Millions In Revenue From Selling Stolen Personal Data, Supply Chain On Darknet Markets Study Finds
TECHNOLOGY

Millions In Revenue From Selling Stolen Personal Data, Supply Chain On Darknet Markets Study Finds

It is common to hear news reports about large data breaches, but what happens once your personal data is stolen? Our research shows that, like most legal commodities, stolen data products flow through a supply chain consisting of producers, wholesalers and consumers. But this supply chain involves the interconnection of multiple criminal organizations operating in illicit underground marketplaces. The stolen data supply chain begins with producers – hackers who exploit vulnerable systems and steal sensitive information such as credit card numbers, bank account information and Social Security numbers. Next, the stolen data is advertised by wholesalers and distributors who sell the data. Finally, the data is purchased by consumers who use it to commit various forms of fraud, including fra...
From Juneteenth To Reparations: Reclaiming Our Stolen Stories
Journalism, SOCIAL JUSTICE

From Juneteenth To Reparations: Reclaiming Our Stolen Stories

Do you know the story of Juneteenth? Can you imagine it? June 19, 1865, the day that General Order No. 3 “informed all Texans that, in accordance with a Proclamation from the Executive of the United States, all slaves were free,” is the day that we know as Juneteenth today. We can imagine asking: What kind of jubilee floated into the air that day? Do you think the exaltations shook fear out of the ground? What songs gave sound to words with no language? Juneteenth (“Emancipation Day” or “Jubilee Day,” as it was called in most early accounts) is a celebration of the news that informed Black people throughout Texas that the institution of slavery had been abolished—despite the Emancipation Proclamation marking the legislative end of slavery nearly two and a half years earlier. The day...
The Stolen Digital Generation
IN OTHER NEWS, TECHNOLOGY

The Stolen Digital Generation

Abstract In the current political climate, no greater need for security has been evident with the rise of global terrorism and politically motivated violence. Increased security measures are not only costly, but are manpower exhaustive and often intrusive. Furthermore, data, in the most basic sense, has been secure in datacenters with the advent of strong security procedures, access control systems and a myriad of technological advances. Over the last three decades, various forms of metal detection have been used, in some degree, to screen datacenter workers for potential hardware that may have left the center. In some cases, it has shown progress in stopping some larger items from going undetected. The challenge for the industry though, has always been smaller hard to detect items l...
How Paper Checks Stolen By Cybercriminals From Mailboxes Are Turned Into Bitcoin
CYBERCRIME

How Paper Checks Stolen By Cybercriminals From Mailboxes Are Turned Into Bitcoin

While cybercrime gets a lot of attention from law enforcement and the media these days, I’ve been documenting a less high-tech threat emerging in recent months: a surge in stolen checks. Criminals are increasingly targeting U.S. Postal Service and personal mailboxes to pilfer filled-out checks and sell them over the internet using social media platforms. The buyers then alter the payee and amount listed on the checks to rob victims’ bank accounts of thousands of dollars. While the banks themselves typically bear the financial burden and reimburse targeted accounts, criminals can use the checks to steal victims’ identities, which can have severe consequences. I founded and now direct Georgia State University’s Evidence Based Cybersecurity Research Group, which is aimed at learning what wo...
LIFESTYLE

Dallas Man Charged with Using Stolen Credit Card Information Obtained from the Dark Web

A 38-year-old man from Dallas was charged by a federal jury last week on allegations of making fraudulent credit cards using information obtained from the dark web. Carlos M. Garza Junior would purchase the card details on the darknet then use the information to reproduce similar copies of the cards using a magnetic encoder. Garza’s arrest came on May 15 after a complaint of theft was made by an employee of a local store. The employee worked at Lubbock’s Home Depot store that dealt with electric appliances, construction tools, and services. Soon after the complaint was made, Lubbock police met the employee at the store on 50th street to investigate the case. According to the police report, the employee said that Garza had been in the store just moments before and he had purchased ...