Cybersecurity : Infrastructure Protection and Cybersecurity News, Information, and Analysis
Updated: 4/11/2003; 3:54:51 PM.

 


















 
 

Friday, February 28, 2003

News just released by the Utah Attorney General's Office:

IDENTITY THEFT RING BUSTED

Authorities hope that a well-organized identity theft ring that victimized banks, businesses and individuals has been dismantled. Today federal, state and local law enforcement officers arrested 9 people suspected of forgery, distributing methamphetamine and illegally possessing a weapon. Two others have also been charged in connection with the undercover investigation.

The eleven defendants are charged with 45 felony counts. The investigation is ongoing and more arrests and charges could be forthcoming.

"These suspects took stolen Drivers Licenses, checks and bank cards and turned them into fake ID's and checks. Then they used the cash to buy meth and guns," said Jade Pusey, Director of Law Enforcement at the Attorney General's Office.

Jeni Armbrust was one of the victims. Investigators discovered her credit cards and check book during the investigation. "It was devastating," said Armbrust. "It's absolutely scary that someone has your identity and is pretending to be you all over town and passing your checks."

The following people have been charged and arrested:

* Christopher Owen Young, 35, One 1st Degree Felony, Controlled Substance

* Messalina Dejongh, 27, Two 1st Degree Felonies, Controlled Substance

* Rachel Sutton, 41, Three 3rd Degree Felonies, Forgery & Possession of a Writing Device

* Mark Allen Leake, 35, Fourteen 3rd Degree Felonies, Unlawful Possession of Card & One 1st Degree Felony, Controlled Substance

* Jody Lee Turnbow, 36, One 1st Degree Felony, Controlled Substance

* Troy K. Miller, 39, Five 3rd Degree Felonies, Possession of a Forged Writing

* Shayne Grover, 36, Two 3rd Degree Felonies, Possession of a Writing Device & Possession of a Handgun by a Restricted Person

* Anthony (Tony) Vinucci, 38, Four 3rd Degree Felonies, Forgery

* Manuel Pacheco, 39, Five 3rd Degree Felonies, Forgery & Possession of a Forged Writing

The following people have been charged and have not yet been arrested:

* Seth Plexico, 31, Four 3rd Degree Felonies, Forgery & Possession of a Writing Device

* David Ray Hymas, 30, Two 3rd Degree Felonies, Forgery & Possession of a Forged writing

The multi-state investigation included law enforcement officers from the Attorney General's Office; FBI; Joint Terrorism Task Force; Joint Criminal Apprehension Team; Department of Corrections STG/Gang Investigation Unit and their SERT team; United States Secret Service; United States Customs Department; Utah Department of Public Safety; State Computer Crime Lab and their Special Bureau of Investigations; Utah Highway Patrol; Salt Lake County Sheriff's Office Metro Gang Unit and their SWAT team; Midvale Police Department; West Valley Police Department; Grand County Sheriff's Office. Representatives from Key Bank, Wells Fargo Bank, and Zions Bank and the Utah Bankers Association also helped in the successful undercover operation.

The Utah Attorney General's Office started investigating identity theft last July to help deal with the increasing incidents of violence associated with the crime.

"Everyone involved in this investigation should be congratulated for protecting more people from facing the misery that comes with having your identity stolen," said Attorney General Mark Shurtleff.

Consumers can find out more about identity theft and ways to reduce their risk at http://www.attorneygeneral.utah.gov/CA/IdFraudMain.htm.


3:52:51 PM    comment []

As a public service, the National Security Agency provides a series of security recommendation guides online.  It's a good place to get started when developing network security policies.  The Router Security Configuration Guide was updated earlier this month and contains these recommendations:

  •  Router security policy written, approved, distributed.
  •  Router IOS version checked and up to date.
  •  Router configuration kept off-line, backed up, access to it limited.
  •  Router configuration is well-documented, commented.
  •  Router users and passwords configured and maintained.
  •  Password encryption in use, enable secret in use.
  •  Enable secret difficult to guess, knowledge of it strictly limited.
  • if not, change the enable secret immediately)
  •  Access restrictions imposed on Console, Aux, VTYs.
  •  Unneeded network servers and facilities disabled.
  •  Necessary network services configured correctly (e.g. DNS)
  •  Unused interfaces and VTYs shut down or disabled.
  •  Risky interface services disabled.
  •  Port and protocol needs of the network identified and checked.
  •  Access lists limit traffic to identified ports and protocols.
  •  Access lists block reserved and inappropriate addresses.
  •  Static routes configured where necessary.
  •  Routing protocols configured to use integrity mechanisms.
  •  Logging enabled and log recipient hosts identified and configured.
  •  Router’s time of day set accurately, maintained with NTP.
  •  Logging set to include consistent time information.
  •  Logs checked, reviewed, archived in accordance with local policy.
  •  SNMP disabled or enabled with good community strings and ACLs.

I suppose that the agency has changed quite a bit from where it was in the seventies and early eighties during the Cold War and when Bamford's The Puzzle Palace was required reading.   NSA is still looking for good SIGINT analysts.

 

The Center for Contemporary Conflict is new to me even though I spent two years in Monterey near the Naval Postgraduate School where the Center is located.  Their strategic insights series is a source of perspectives on US involvement around the world.  We used to spend time down at El Estero lake and Dennis the Menace park just down the road from NPS.


8:23:53 AM    comment []


© Copyright 2003 David Fletcher.



Click here to visit the Radio UserLand website.

 


February 2003
Sun Mon Tue Wed Thu Fri Sat
            1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28  
Jan   Mar

Listed on BlogShares