{"id":342,"date":"2005-06-21T22:54:38","date_gmt":"2005-06-22T02:54:38","guid":{"rendered":"http:\/\/blogs.law.harvard.edu\/dbnews\/2005\/06\/21\/you-can-be-anyone-anyone-can-be-you\/"},"modified":"2005-06-21T22:54:38","modified_gmt":"2005-06-22T02:54:38","slug":"you-can-be-anyone-anyone-can-be-you","status":"publish","type":"post","link":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/2005\/06\/21\/you-can-be-anyone-anyone-can-be-you\/","title":{"rendered":"You Can Be Anyone-Anyone Can Be You"},"content":{"rendered":"<p><a name='a5317'><\/a><\/p>\n<table width=\"537\" border=\"0\">\n<tr>\n<td>\n<p align=\"justify\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/cyber.law.harvard.edu\/blogs\/static\/dowbrigade\/cardssto.jpg\" width=\"300\" height=\"180\" hspace=\"10\" align=\"left\"><em>An<br \/>\n          absolutely terrifying article in the <a href=\"http:\/\/www.nytimes.com\/2005\/06\/21\/technology\/21data.html?ex=1277006400&amp;en=c06809aa240685f8&amp;ei=5088&amp;partner=rssnyt&amp;emc=rss\">New York Times <\/a>exposes the felonious<br \/>\n          details of what happens to that stolen credit card and personal financial<br \/>\n          information we&#8217;ve been hearing so much about.&nbsp;It is a whole world<br \/>\n          of wanton and open criminal activity, protected by the anonymity of<br \/>\n          the internet and the difficulty of serving paper on servers in the<br \/>\n          lawless<br \/>\n          frontier of the former Soviet Union.<\/em><\/p>\n<p align=\"justify\">&quot;<br \/>\n        Want<br \/>\n        drive fast cars?&quot; asks an advertisement,<br \/>\n        in broken English, atop the Web site iaaca.com. &quot;Want live in premium<br \/>\n        hotels? Want own beautiful girls? It&#8217;s possible with dumps from Zo0mer.&quot; A &quot;dump,&quot; in<br \/>\n        the blunt vernacular of a relentlessly flourishing online black market,<br \/>\n        is a credit card number. And what Zo0mer is peddling is stolen account<br \/>\n        information &#8211; name, billing address, phone &#8211; for Gold Visa cards and<br \/>\n      MasterCards at $100 apiece.<\/p>\n<p>It is not clear whether any data stolen from CardSystems Solutions, the payment processor reported on Friday to have exposed 40 million credit card accounts to possible theft, has entered this black market. But law enforcement officials and security experts say it is a safe bet that the data will eventually be peddled at sites like iaaca.com &#8211; its very name a swaggering shorthand for International Association for the Advancement of Criminal Activity.<\/p>\n<p align=\"justify\">from the <a href=\"http:\/\/www.nytimes.com\/2005\/06\/21\/technology\/21data.html?ex=1277006400&amp;en=c06809aa240685f8&amp;ei=5088&amp;partner=rssnyt&amp;emc=rss\">New<br \/>\n          York Times<\/a><\/p>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>An absolutely terrifying article in the New York Times exposes the felonious details of what happens to that stolen credit card and personal financial information we&#8217;ve been hearing so much about.&nbsp;It is a whole world of wanton and open criminal &hellip; <a href=\"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/2005\/06\/21\/you-can-be-anyone-anyone-can-be-you\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":299,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[142],"tags":[],"class_list":["post-342","post","type-post","status-publish","format-standard","hentry","category-technology"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/posts\/342","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/users\/299"}],"replies":[{"embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/comments?post=342"}],"version-history":[{"count":0,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/posts\/342\/revisions"}],"wp:attachment":[{"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/media?parent=342"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/categories?post=342"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/archive.blogs.harvard.edu\/dowbrigade\/wp-json\/wp\/v2\/tags?post=342"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}