Close
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Congress, Vendors Put Phishing Under the Gun

    By
    Dennis Fisher
    -
    June 28, 2004
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Faced with an explosion in identity theft and phishing, lawmakers and vendors are taking action to increase penalties for the crimes and offer technological solutions to help stop the scams at their sources.

      VeriSign Inc. this week will unveil a service that officials said will help protect enterprises from phishing attacks and, in the bargain, help law enforcement agencies track down the perpetrators. The service allows VeriSign to monitor the Internet for signs of new phishing schemes, such as phony looking e-mail messages and new malicious Web sites that play off a customers brand. VeriSign will then work with ISPs to have those sites removed, and it can help with the forensic investigations.

      “Because we have long relationships with ISPs, they arent afraid to let us on their servers to help them,” said Mark Griffiths, vice president of security services at VeriSign, in Mountain View, Calif.

      Data about phishing attacks can be vital for law enforcement looking to track down perpetrators of online fraud, most of whom attempt to hide their tracks. The goal of phishing scams is to steal personal information, including bank account and credit card information.

      /zimages/6/28571.gifPhishing scams are getting slicker and harder to defend against. Click here to read more.

      VeriSigns plans mesh with efforts by the House of Representatives, which last week passed the Identity Theft Penalty Enhancement Act, authored by Rep. John Carter, R-Texas. The bill increases the sentences for ID theft and creates a new crime of aggravated ID theft, defined as using a stolen ID to commit certain crimes.

      “When you steal somebodys identity, you usually do it for purposes of doing something illegal,” Carter, a former district judge in Texas, told eWEEK upon passage of the bill in the House. Carter said the measure will serve as an increased deterrent against the growing problem.

      Although prosecutions for phishing have been rare so far, under Carters new legislation, conviction for aggravated ID theft would come with a mandatory sentence enhancement of two years, and aggravated ID theft committed for the purpose of terrorism would come with an additional mandatory five-year penalty.

      As a large percentage of ID thefts are committed by insiders—notably at health care and financial institutions—the bill also directs the U.S. Sentencing Commission to revise guidelines for punishing individuals who abuse their positions to commit ID theft.

      The Senate counterpart to the bill, which was approved in March 2003, does not include an insider theft provision, but Carter said he does not anticipate significant opposition to it.

      The bill does not address the responsibility of organizations to protect the personal data that they collect and store—something that many security specialists consider vital to data privacy and integrity. Initiatives to legislate security practices in the private sector have found little support.

      “I would be willing to look at that,” said Carter, about increasing institutions responsibility to protect personal data. “Lets see what this [legislation] does first.”

      While praising lawmakers for addressing the problem of ID theft, some experts on the topic say that Congress is taking the wrong approach.

      “The legislation theyre proposing is strictly reactive. We need [harsher penalties], but theres nothing in there that would help prevent identity theft,” said Judith Collins, associate professor in the School of Criminal Justice at Michigan State University, in East Lansing. Collins has done extensive research on the causes and consequences of ID theft.

      “Legislators do not understand this problem,” Collins said. “They dont understand the crime and dont know the perpetrators.”

      /zimages/6/28571.gifCheck out eWEEK.coms Security Center at http://security.eweek.com for the latest security news, reviews and analysis.

      /zimages/6/77042.gif

      Be sure to add our eWEEK.com developer and Web services news feed to your RSS newsreader or My Yahoo page

      Dennis Fisher
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.
      Get the Free Newsletter!
      Subscribe to Daily Tech Insider for top news, trends & analysis
      This email address is invalid.

      MOST POPULAR ARTICLES

      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Applications

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Kyndryl’s Nicolas Sekkaki on Handling AI and...

      James Maguire - November 9, 2022 0
      I spoke with Nicolas Sekkaki, Group Practice Leader for Applications, Data and AI at Kyndryl, about how companies can boost both their AI and...
      Read more
      IT Management

      Intuit’s Nhung Ho on AI for the...

      James Maguire - May 13, 2022 0
      I spoke with Nhung Ho, Vice President of AI at Intuit, about adoption of AI in the small and medium-sized business market, and how...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×