Description: The article is about lifelock login. The article talks about the identity theft. The author has found out a big thieves market online where people can buy and sell other people’s identities to make profits. The author makes many fake names to test people and see how identity theft works.
We’re on the hunt for international identity thieves. There are 175 hackers in this room,now they’re buying and selling personal identities. You’re about to get a look at something that few Americans have ever seen.
We have a credit card number,expiration and mother’s maiden name of this lady by the name of Anna. It’s an underground internet champion for thieves selling information about people like you. There is her security number,date of birth and pin,her identity is completely compromised and will be compromised for the rest of her life.
Our guide to the secret internet Underground is Dan Clemens,he is the president of card cops,it is an internet security company that monitors chat rooms where criminals can go to buy and sell your most personal information. It’s a thieves market.
We’re about to expose a black market. We’ll be careful not to reveal people’s private information,but in a matter of minutes,Dan Clements shows us how much a crook can obtain in the wide open Internet underground. There are people who are advertising that they have logins to Wachovia Bank. Those are online banks that people can go and login,they’re selling logins to bank account. Barclays,Wells Fargo,HSBC,all the large banks are here to be bought and sold.
Somebody can get this information on somebody’s account and take their money,that’s what these hackers are interested in. That’s the start. There’s somebody named Pepper Bora,he’s saying that he has something for sale which is the information on the magnetic stripe on the back of a credit card,it’s amazing. Somebody is selling the Royal Canadian Bank of Canada and Capital One’s logins, everything is available.
There are so many thieves,crooks don’t have to pay much for your personal information. You won’t believe the deal that this hacker is offering. How much is this? It’s only $5. For five bucks,a thief can buy a name and address,social security number,card number,pin number,those are enough details to completely rip you off.
Where do the thieves get all that information? Stolen computer equipment contain personal data. First,they can get it from stolen laptop computers. Next,hackers break into computers. Any computer system at any store especially a small store with weak security is vulnerable. Finally,the crooks fool consumers into helping them.
You need to reenter your passcode. There is one woman whose bank account vanished overnight,she said that she got an authentic looking email asking her to update her banking information. Did it look official? It did,only this one said please update your personal information. It’s called phishing. When you answer the fake email,the information doesn’t go to the bank,it goes to the thieves.
Li Morton doesn’t know who stole her money,neither do most victims of identity theft. The fact is that most cases are never solved,but tonight we’re going to try to find out the crooks,we’re about to follow the trail back into that mysterious Internet Underground and confront the thieves face to face. To catch an identity thief,we’ll need some bait,we get a major credit card issuer to cooperate. We make up some names and they give us real cards under those fake names.
The next step is let Dan Clements go back into the Internet underground and pretend to be a thief who stole our credit cards,he’s about to put them into the thieves market. There are 300 or 400 hackers in real time. Dan Clements and I are watching at the card cops office in California. A fraud investigator for the credit card company is standing by. Her computer will tell her every time our beat cards are used to make a fraudulent purchase.
We even have a stopwatch to measure the time second-by-second. Limits tells us that this is something that has never been done before. That’s like throwing tuna to the Sharks,we’ll see what happens,let’s do it. Clements pretends to be a thief to sell some of our bait cards. I’m going to stop the stopwatch to see how long it takes before somebody hits on,the response is almost instantaneous.
We have somebody saying something,it’s 12 seconds. At first,the thieves appear to see if we’re real. We have another one,it is 26 seconds,it doesn’t take long for the thieves to take the bait and start making purchases with our cards.
At the credit card monitoring center,the fraudulent charges are beginning to roll in,at first they do small charters to make sure the card works. They checked it for a dollar,they’re probing to see if it’ll work. They even make a small donation to the Red Cross to test the car. He spent eleven dollars in American Red Cross donation site. Once they’re sure the card works,the thieves start making bigger purchases by the minute.
There has been one authorization for 306 dollars and 28 cents,they’ve also spend it for $99.95,it’s a thousand dollar credit line,they’ve already eaten half of it up. We’re watching Internet thieves at work in real time. You can imagine that they’re using your card,how do you feel about that? They are buying from all kinds of stores. It takes solutions.
It takes less than 10 minutes. Another charge came in for 237.50,the illegal charges could go on forever but our card has a thousand dollar limit. They got declined for over-limit,that’s less than 13 minutes. If you thought that was fast,you haven’t seen anything yet.
Oscar is the name of our bait cards carriers,it is a fake name with an address in Washington DC,but in no time at all it has been used in a continent away. We have a purchase for $723.74,it takes1 minute and 3 seconds in Chile. They bought pet food,it’s a lot of pet food,it’s a well-fed dog in Chile,it’s a minute 40 seconds.
As we follow our bait cards,Chile is not the half of it. We see Islamabad and Pakistan too. We’ve even seen France,Pakistan,China. Our cards are being used to make illegal purchases all over the world within minutes of being stolen. This part of our investigation lasts less than two days but the illegal charges are astonishing.
They have bought flowers in Latin America,cell phones in Canada and airline tickets in Asia. Over the two days,we had purchases in 16 different countries,we have seen it happen in every continent except for Antarctica. The level of activity is stomach. Identity theft is a big business in America.
Experts estimate that identity theft costs Americans nearly five billion dollars a year. In most cases,the thieves get away with it. It’s clear that to catch the crooks won’t be easy,we figure our best shot at tracking them down,we are following the actual merchandise they’re buying with stolen credit cards.
The best way to do that is to go into business ourselves and set up our own online store that the thieves can place an order,we want to set up our own delivery companies so we can follow the loot to the thieves’ doorsteps. Dateline is about to set a trap for these new predators.