"Massachusetts man pleads guilty to selling and using TSA employees’ identities"
Tripped over this one, this morning:
http://www.databreaches.net/?p=15912 Co-conspirator White’s customers included relatives and friends of state prison inmates who sought to open telephone accounts using the TSA identities in order to, among other things, circumvent prison telephone usage rules. Derring obtained the names, dates of birth, and Social Security numbers of employees who worked for TSA at Logan Airport from a relative who worked as a contractor at TSA’s department of human resources. Humans always are the weakest link in data security... |
thats pretty solid :(
|
What do you call subjecting TSA Employees to identity theft?
A good start. |
I feel sorry for the poor schlubs who might buy these identities, unaware that by using them they'll end up being thought of as TSA employees. ;)
|
Originally Posted by FXWizard
(Post 15516850)
I feel sorry for the poor schlubs who might buy these identities, unaware that by using them they'll end up being thought of as TSA employees. ;)
Agreed. There is actually someone who wants to be considered TSA? |
Originally Posted by FXWizard
(Post 15516850)
I feel sorry for the poor schlubs who might buy these identities, unaware that by using them they'll end up being thought of as TSA employees. ;)
|
Originally Posted by tennster
(Post 15516871)
Agreed. There is actually someone who wants to be considered TSA?
The appropriate response to this leak is a complete revetting of all the employees involved and reissuing all id's and photos with a biometric version, plus full screening with the NOS of all air-side BOS TSA workers for the next 3 years. Since this is a security breach, another agency like the FBI or Boston PD should do the screening. All the TSA workers should also get free credit monitoring for the next 3 years too. (The government can attempt cost recovery for this from the perpetrator) |
Remember this as screeners demand your personal information at the checkpoint for opting-out or ending up in a "resolution" pat-down.
One more very good reasons why they should NOT collect personal information. |
Originally Posted by reft
(Post 15517054)
Al Queda?
The appropriate response to this leak is a complete revetting of all the employees involved and reissuing all id's and photos with a biometric version, plus full screening with the NOS of all air-side BOS TSA workers for the next 3 years. Since this is a security breach, another agency like the FBI or Boston PD should do the screening. All the TSA workers should also get free credit monitoring for the next 3 years too. (The government can attempt cost recovery for this from the perpetrator) |
Originally Posted by FliesWay2Much
(Post 15517326)
They have spent way too much money ... to have any budget left over to do a re-vetting and 100% rebadging of all of their employees. And, for the first time in the history of the TSA, they would be forced to respond to a real emerging threat.
|
Originally Posted by FXWizard
(Post 15516850)
I feel sorry for the poor schlubs who might buy these identities, unaware that by using them they'll end up being thought of as TSA employees. ;)
|
Originally Posted by JoeBas
(Post 15516690)
What do you call subjecting TSA Employees to identity theft?
A good start. The telephone system will be blocked and disconnected the phone in prisons. |
All times are GMT -6. The time now is 6:26 am. |
This site is owned, operated, and maintained by MH Sub I, LLC dba Internet Brands. Copyright © 2024 MH Sub I, LLC dba Internet Brands. All rights reserved. Designated trademarks are the property of their respective owners.