Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


06:15 AM
Connect Directly

LA Street Gangs Add ID Theft to Turf

California sees surge in 'Crips,' 'Mexican Mafia,' and other gangs going into the identity theft business

It’s not just Eastern European or Asian cyber gangs -- gangs from the streets of L.A. and other cities better known for drugs and weapons violence are now turning to identity theft crimes as well, according to a published report .

Cases of identity theft reportedly involving a chapter of the ‘Crips’ from Long Beach, Calif., Armenian Power, and Mexican Mafia gangs, have demonstrated that ID theft is no longer the domain of international computer hackers, for instance. Gang-related ID theft was part of the 31 percent jump in ID theft complaints in California last year, according to a new report from Identity Theft 911.

California is a big fat target for ID theft: around 1.5 million Californians were victims of this crime last year, according to the report, and credit-card fraud is the main culprit. Next is employment fraud, including Social Security number (SSN) thefts for undocumented workers.

Experts say street gangs are finding ID theft an easy way to make a buck. In a recent case being investigated by California’s Department of Consumer Affairs, a former personnel specialist there, Rachel Dumbrique, sent names and SSNs of 5,000 people on the state’s payroll to a personal Yahoo email account on her last day at the agency. She says she didn’t know SSNs were in the file, but investigators are looking at the case closely because she’s the wife of an imprisoned gang member of Mexican Mafia.

Meanwhile, a group affiliated with the Long Beach Insane Crips gang allegedly sole nearly $90,000 from a local financial institution in a check-cashing scam.

— Kelly Jackson Higgins, Senior Editor, Dark Reading

Kelly Jackson Higgins is the Executive Editor of Dark Reading. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-05
lookupName in resolve.c in SQLite 3.30.1 omits bits from the colUsed bitmask in the case of a generated column, which allows attackers to cause a denial of service or possibly have unspecified other impact.
PUBLISHED: 2019-12-05
fpregs_state_valid in arch/x86/include/asm/fpu/internal.h in the Linux kernel before 5.4.2, when GCC 9 is used, allows context-dependent attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact because of incorrect fpu_fpregs_owner_ctx caching, as demonstr...
PUBLISHED: 2019-12-05
OpenDetex 2.8.5 has a Buffer Overflow in TexOpen in detex.l because of an incorrect sprintf.
PUBLISHED: 2019-12-05
The Lever PDF Embedder plugin 4.4 for WordPress does not block the distribution of polyglot PDF documents that are valid JAR archives.
PUBLISHED: 2019-12-05
D-Link DAP-1860 devices before v1.04b03 Beta allow arbitrary remote code execution as root without authentication via shell metacharacters within an HNAP_AUTH HTTP header.