[15839] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Using crypto against Phishing, Spoofing and Spamming...

daemon@ATHENA.MIT.EDU (Bill Stewart)
Wed Jul 28 13:34:37 2004

X-Original-To: cryptography@metzdowd.com
X-Original-To: cryptography@metzdowd.com
Date: Mon, 26 Jul 2004 19:07:08 -0700
To: "Enzo Michelangeli" <em@em.no-ip.com>
From: Bill Stewart <bill.stewart@pobox.com>
Cc: <cryptography@metzdowd.com>
In-Reply-To: <026e01c46cb0$e50d1420$0200a8c0@em.noip.com>

At 03:20 AM 7/18/2004, Enzo Michelangeli wrote:
>Can someone explain me how the "phishermen" escape identification and
>prosecution? Gaining online access to someone's account allows, at most,
>to execute wire transfers to other bank accounts: but in these days
>anonymous accounts are not exactly easy to get in any country, and anyway
>any bank large enough to be part of the SWIFT network would cooperate in
>the resolution of obviously criminal cases.

At least until a few years ago, and probably still today,
it was easy to get a non-anonymous account in the US using fake ID.
The "Know Your Customer" laws and other anti-terrorism fallout
may have encouraged banks to check SSNs a bit more carefully,
but as long as the person whose identity you're stealing
doesn't have horrendously bad or good credit,
it's probably still not hard.
If it costs you $100 in fake ID to get the account set up,
and you can burn the phish for $1000, then you win.

But credit cards are probably more common and certainly easier to use.
Buy laptops or other fungible goods, and sell them on eBay.

---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@metzdowd.com

home help back first fref pref prev next nref lref last post