12:21 PM

111 Arrested In Identity Theft Probe

One of the biggest identity theft and credit card fraud cases in history has generated millions of dollars in losses to date, prosecutors said.

10 Massive Security Breaches
(click image for larger view)
Slideshow: 10 Massive Security Breaches
Authorities on Friday announced the arrest of 111 people in what they're calling the biggest identity theft bust in U.S. history.

"This is by far the largest--and certainly among the most sophisticated--identity theft/credit card fraud cases that law enforcement has come across," said Richard A. Brown, the district attorney of Queens, N.Y., in a statement announcing the arrests.

"Many of the defendants ... are accused of going on nationwide shopping sprees, staying at five-star hotels, renting luxury automobiles and private jets, and purchasing tens of thousands of dollars worth of high-end electronics and expensive handbags and jewelry with forged credit cards that contained the account information of unsuspecting consumers," said Brown.

[The smart money treats data breaches as a 'when' not an 'if,' proposition Is your data breach response ready for primetime?]

Authorities said that the investigation--dubbed "Operation Swiper"--began in 2009, and grew to involve not just physical surveillance, but also "court-authorized electronic eavesdropping on dozens of different telephones in which thousands of conversations were intercepted--many of which required translation from Russian, Mandarin, and Arabic to English."

Prosecutors said the arrests involved five different identity theft and credit-card-forgery rings, operating for a year and a half out of Queens County, in New York City, but with ties to Europe, Asia, Africa, and the Middle East. So far, more than 90 of the defendants have been charged with corruption under New York's Organized Crime Control Act. Other charges included identity theft and robbery. Notably, five people were charged with stealing cargo worth $95,000 from Kennedy Airport, and seven were accused of stealing computer equipment worth at least $850,000 from the Citigroup Building in Long Island City.

According to the indictments, the criminal rings fraudulently obtained credit card numbers, then used them to manufacture fake credit cards and identification. From there, teams were deployed as mules on shopping expeditions to purchase such goods as high-end electronics, handbags, and jewelry--often based on the ease with which the goods could later be fenced--and then sending it back to ringleaders via Federal Express and UPS. Authorities also accused the mules of using the fake credit cards to stay in high-end private villas and luxury hotels, to rent Lamborghinis and Porsches, and in one case, even renting a private jet to make a run from New York to Florida.

As part of the investigation, last week court-authorized search warrants were executed at 15 New York City and Long Island locations, several of which served as "mills" for generating fraudulent documents, said authorities. The raids recovered about $650,000 in cash, seven handguns, a box truck--filled with electronics, jewelry, and shoes--as well as credit card skimmers, fake identification, and blank credit cards.

According to the indictments, U.S. and European consumers, retail businesses, as well as financial institutions--including American Express, American Express, MasterCard, and Visa--collectively suffered $13 million in losses as a result of the gangs' activities. But the amount of losses may continue to mount. "Even after the culprits are caught and prosecuted, their victims are still faced with the difficult task of having to repair their credit ratings and financial reputations. In some cases, that process can take years," said Brown.

"These weren't holdups at gunpoint, but the impact on victims was the same. They were robbed," said Raymond W. Kelly, police commissioner of New York City, in a statement. "We assigned detectives to financial crimes because of the potential victimization is so great, especially as the use of credits cards and their vulnerability to identity theft have grown along with the Internet."

According to the indictments, the crime rings were run by Imran Khan, Ali Khweiss, Anthony Martin, Sanjay (aka Rocky) Deowsarran, and Amar Singh. The indictments said that they sourced their skimming equipment, including blank credit cards, primarily from China, Lebanon, Libya, and Russia. Authorities also alleged that attorney Susan Persaud assisted Khan by advising his gang on techniques for evading law enforcement operations, and that she received stolen items--including designer shoes--as payment.

The indictments also accuse Fnu Gustawian, Kah Sheng Poh, and Allen Lam (aka Benny Ahoo) of selling--fencing--the stolen goods, alleging that Gustawain tended to handle the Apple products and electronics, while Ahdoot handled jewelry, including Rolex and Breitling watches.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
10/11/2011 | 11:47:31 AM
re: 111 Arrested In Identity Theft Probe
Electric chair.
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-12-28
CRLF injection vulnerability in the LightProcess protocol implementation in hphp/util/light-process.cpp in Facebook HipHop Virtual Machine (HHVM) before 2.4.2 allows remote attackers to execute arbitrary commands by entering a \n (newline) character before the end of a string.

Published: 2014-12-28
Facebook HipHop Virtual Machine (HHVM) before 3.1.0 does not drop supplemental group memberships within hphp/util/capability.cpp and hphp/util/light-process.cpp, which allows remote attackers to bypass intended access restrictions by leveraging group permissions for a file or directory.

Published: 2014-12-28
The mcrypt_create_iv function in hphp/runtime/ext/mcrypt/ext_mcrypt.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 does not seed the random number generator, which makes it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging the use of a single initial...

Published: 2014-12-28
Integer overflow in the string_chunk_split function in hphp/runtime/base/zend-string.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted arguments to the chunk_split ...

Published: 2014-12-28
The HashContext class in hphp/runtime/ext/ext_hash.cpp in Facebook HipHop Virtual Machine (HHVM) before 3.3.0 incorrectly expects that a certain key string uses '\0' for termination, which allows remote attackers to obtain sensitive information by leveraging read access beyond the end of the string,...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.