Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Daily Archives: February 23, 2005

A Three Step Plan to Confront Phishing

Killing Phish.

  • See also the continually updated reports on phishing and pharming available from The Anti-Phishing Working Group and the definitions from their site as follows:
    Phishing attacks use ‘spoofed’ e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. Pharming uses the same kind of spoofed sites, but uses malware/spyware to redirect users from real websites to the fraudulent sites (typically DNS hijacking). By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince recipients to respond to them.”
  • Call for Hearings on Info Broker Data Scam

    Press release: Leahy Calls For Hearings On Information Brokers That Are Emerging As Private Intelligence Agencies Tuesday, February 22, 2005: “The ranking member of the Senate Judiciary Committee, a longtime champion of the public’s privacy rights, says ChoicePoint’s sale of personal and financial records of thousands of Americans to con artists is a tripwire that… Continue Reading

    GAO Calls for Increased Protection of Children’s Social Security Numbers

    Social Security Administration: Actions Needed to Strengthen Processes for Issuing Social Security Numbers to Children GAO-05-115, January 31, 2005, Highlights. “In fiscal year 2004, the Social Security Administration (SSA) issued about 4.2 million original Social Security numbers (SSN) and 2 million SSN replacement cards to U.S.-born children. Despite its narrowly intended purpose, today, young children… Continue Reading