AT&T Concerned About H2K2 378
****************************************************************
AT&T Network Fraud Advisory
July 11, 2002
****************************************************************
Possible Hacker Social Engineering Attempts
Friday July 12 - Sunday July
14, 2002
===================================================
Caution:
------------
Be careful about giving information to anyone you don't know and those
making unusual information requests by claiming to be an AT&T employee or
customer.
The H2K2 (Hackers on Planet Earth 2002) Hacker Conference will take place
this weekend, Friday, July 12 to Sunday to July 14, 2001, [ed. note: 2001?] in New York
City. This conference will be a gathering of over five thousand computer
hackers, guest speakers, and computer enthusiasts. http://www.h2k2.net
In 1994, 1997 and 2000 at the previous Hope (Hackers on Planet Earth)
Conferences, live demonstrations of "social engineering" techniques were
performed in front of thousands of hackers and other attendees. The hacker
panel dialed live into AT&T offices and centers and demonstrated how to
get proprietary information by pretending to be an AT&T employee and
customer. These calls were recorded and videotaped by the hackers and are
sold as instructional material at future hacker conferences. There is a
very high likelihood that AT&T will be a target again this weekend.
The social engineering contest is scheduled for Sunday July 14th, at 4
P.M. ET, (1 PM PT). During this period hackers may be dialing into AT&T
to get information.
AT&T Network Security would like to warn our employees to be on guard this
entire weekend for any unknown person calling and claiming to be an AT&T
employee to request proprietary information or claiming to be an AT&T
customer with unusual requests.
Remember, if anyone, who is unknown to you calls for proprietary
information or make unusual requests, please follow your procedure by
requesting additional information to ensure the person is who they say
they are before giving out any information.
If the person is claiming to be an AT&T employee, please request name,
callback and HRID #. Then verify through POST or the email global address
list if the information is correct and even request to call the employee
back at their contact number.
If the person is claiming to be an AT&T customer verify this by requesting
additional info on their account like address and SS# and even request to
call the person back at their contact number listed on the account.
Please be on guard for any unusual requests. Verify the person is an AT&T
employee or a legitimate customer and if they have a need to know the
information they are asking. If you can't verify employment or number,
don't give out the information. If you are still in doubt regarding the
legitimacy of the caller, then speak to a supervisor regarding the
situation before proceeding further and inform the caller you will call
them back. If you still have questions you can call the Security Hotline
1-800-822-9009.
Remember you do not want to be the lucky guest of honor on a telephone
call from the hacker conference this weekend with thousands of hackers
listening to you and attempting to scam AT&T out of proprietary
information. Please be on guard.
- - - - - - - - - - - - - - - - - - - - - - - - -
Source: AT&T Network Security
*******************************************************************
So? (Score:4, Insightful)
Re:So? (Score:4, Insightful)
Re:So? (Score:3, Funny)
Soon we'll have people saying... "Damn Skr1p7 K1dd13z with assault riffles and bullet proof vests came into my house today andd seized all my computer equipment, allong with any other electric device (phone, paper shredder, refrigerator, disposal) for evidence."
hehe
A script kiddie has NOTHING to do with social engineering! Learn a new buzzword.
Re:So? (Score:4, Insightful)
Luckily, with humans on both sides there is much more chance for a screwup or someone being caught.
So I think the script kiddies analogy is accurate, in both cases it's someone who would not have been able to design these attacks themselves using how-to kits to comprimise systems. In this case they're carbon-based, not silicon-based, but the analogy is sound.
Steven
Re:So? (Score:3, Insightful)
True hackers write good code for fun or profit. If you're going to be pedantic, the term you're looking for is "cracker".
Hah (Score:5, Insightful)
Can't the hackers who read slashdot (probably most of them) just call this number instead now?
Furthermore, why doesn't Microsoft have a security hotline?
Re:Hah (Score:5, Funny)
Re:Hah (Score:2, Insightful)
i'd hope their "Security Hotline" would know better than to hand out information to anyone who happens to call. but you never know...
Re:Hah (Score:5, Funny)
Re:Hah (Score:2)
Yeah, but uhhh why exactly would they want to?
Re:Hah (Score:2, Insightful)
Microsoft's Security Hotline (Score:3, Interesting)
A call to this number rang about twenty times, then was picked up by a voicebot: "Your party is not picking up. Your call will now be disconnected."
Re:Hah (Score:4, Informative)
Some security! (Score:3, Insightful)
Re:Some security! (Score:2)
Re:Some security! (Score:2)
Apparently while it may be "standard practice", it isn't followed very much of the time. It's very easy to convince people you are someone else even with very little of their personal information. How often have you called somewhere and to make sure you are you, they read your address to you and ask if it is correct? Imagine if when you booted up your OS instead of login: and password: it asked for whatever personal information you had, then made a judgement call as to whether or not you are actually you, without demanding a specific username and password combination?
Re:Some security! (Score:3, Interesting)
Just a couple of days ago I received a call regarding a fax I had sent, and I was asked the usual basic information and whether I had sent the fax, and if I could verify the request I made by stating it (shortly) now on phone. After I stated my request on phone, it was OK'd, and later that day I had confirmation fax on my table.
I think that was pretty good. Of course, my request was somewhat unusual, so it might have triggered a "use the strong procedure" attitude.
Re:Some security! (Score:2, Informative)
All the megacorps do this, if nothing else, simply because the company is so damn big the person has never heard of you, your manager, or your manager's manager.
Re:Some security! (Score:2, Insightful)
Also, interesting how AT&T apparently requires a SSN to be a customer...the only people who need an SSN are the federal government and your employer.
Re:Some security! (Score:3, Informative)
As for your statement. Your employer is not allowed to require your SSN but you are required to provide a way for them to tax you. That can be a tax id or something but doesn't have to be SSN.
The difference is that if a company has a policy then they can choose to not do business with you. If you don't want to provide SSN, well, Long Distance isn't a right.
SSN = ID Number (Score:2)
Re:Some security! (Score:4, Funny)
YOUR SOCIAL SECURITY CARD
The Social Security number shown on your card is yours alone. Record your number in a safe place in case your card is lost or stolen. Protect both your card and your number to prevent their misuse.
Some private organizations use Social Security numbers for record keeping purposes. Such use is neither required nor prohibited by Federal law. The use of your Social Security number by such an organization for its own records is a private matter between you and the organization. Private organizations cannot get information from your Social Security record just because they know your number.
Any Federal, State, or local government agency that asks for your number must tell you: whether giving it is mandatory or voluntary, its authority for requesting the number, and how the number will be used.
Emphasis mine.
Re:Some security! (Score:4, Informative)
Re:Some security! (Score:2, Insightful)
How long has the industry known that the easiest way to hack most networks is through social engineering?
Despite warnings from everyone--from government to researchers--social engineering continues to work.
Posting a warning to employees will at most protect the company from the unpracticed social engineering tricks. Social engineering is nothing more than the practiced con-job that has been around since one caveman had something another caveman wanted.
It's Bayesian (Score:3, Interesting)
Let's say that AT&T has two modes: careful (C) and reckless (R). Now clearly it costs more in terms of employee time to be careful than reckless. (Say it costs C=$10 and R=$1 respectively. ) Assume Careful catches a proportion q_c of social engineering attempts while Reckless lets a proportion q_r succeed.
Now assume that at a given time there is probability p that someone on the line is trying to social engineer them. Assume also the costs of being hacked (in embarassment or whatever) are uncorrelated, and average $H. Assume the benefits of a legit phone call are $B.
We can now compute the payoff from being careful versus reckless.
V_C = B (1-p) - H p q_c - C
V_R = B (1-p) - H p q_r - R
It's clearly quite possible for either V_C or V_R to be larger depending on the coefficients.
If you could make a function giving q as a function of cost, you could solve for V=0. This would tell you exactly how careful to be, given a particular present level of riskiness p.
Re:It's Bayesian (Score:2)
Re:Some security! (Score:2)
They have to take special precautions since there's some conference? What about the rest of the year?
My thoughts exactly. This gives me the bad feeling they are enforcing their security policies only because having yet another "breach" would be really bad PR. But why aren't they enforced all the time as rigorously? Costs. It costs both time and money to go through the entire protocol, not to mention the additional cost of properly training the employees to follow these rules.
I'm actually willing to bet some beancounter added 2 and 2 and came to the conclusion that having that much bad PR would cost the company more than enforcing the security policy strictly for a few days. Anyone care to guess how many days it takes for the situation return to "normal?"
Editors, again.... (Score:2, Informative)
Should be common practice (Score:3, Informative)
Re:Should be common practice (Score:2)
Paranoia (Score:2, Interesting)
I just hope that whatever information they're looking at, it won't be mine.
On another note, if this hacker convention is so well publicized, why aren't there hordes of policemen preparing to descend upon the unsuspecting hackers? Especially with all the cracking down that the FBI/police force have been doing lately on people who uncap their cable modems, or share wifi connections....
Re:Paranoia (Score:2)
Because being interested in computer security is not (yet) a crime? The attitude may be different, but the content is really no different that what you'd get at a computer security conference.
Wish I could make it, but I've got a full weekend here.
Re:Paranoia (Score:2)
The people who attend these conferences are usually not interested in as much "black hat" hacking as you may think. It would be hard to find a reason to arrest much less convict many of the attendants.
These places are sometimes the places where new technologies are invented or destroyed (that is, if flaws are found... your new cell phone for example may provide to be a great scanner etc...).
Think of it as a conference for computer security but above all electronics engineering...
Re:Paranoia (Score:2)
this site [anonymizer.com] may let you look at it. Also if you email yourself the URL to a hotmail account [hotmail.com], hotmail will frame it, also, ask jeeves [aj.com] will frame it, if you can find it in their index. Anyhow, that may let you circumvent the block.
Re:Paranoia (Score:2)
Their other problem is they pay so low. I don't have a record, I have a MS degree in CS focusing on crypto and other security items and the best pay from the NSA would still force me to live out of my car.
What a great fuss about nothing (Score:5, Insightful)
What makes this different except the criminals involved are 'l33t and say stuff like "Mad propz".
Re:What a great fuss about nothing (Score:2, Insightful)
Re:What a great fuss about nothing (Score:3, Funny)
Re:What a great fuss about nothing (Score:5, Funny)
The Set Decoration Is Not Amused.
Re:What a great fuss about nothing (Score:3, Funny)
> The Set Decoration Is Not Amused.
make g00gly eyes at prop
>The Set Decoration is becoming agitated
moon props>The Set Decoration attacks! It hits! it Hits!
Run away
>The Set Decoration attacks! It hits!
>You have died. Your score is 3 out of a possible 666. Play again? (y/n)
Ahh, PR security (Score:2, Insightful)
Only be secure when the world might be watching, and at all other times be lax. Sounds like a fantastic policy to me.
Re:Ahh, PR security (Score:3, Insightful)
My sister and I had rented an apartment together a year ago, and there was a problem with how the electric bill was handled when it was shut off. I called up and spoke to the person and then outright asked them to check my sister's records for any correlating information. I gave him her name, and he gave me her address, phone number, and a whole crapload of other information, with no indication that we were actually related other than that we shared the same last name. Granted, she really is my sister, and I already knew the information he told me, I was quite surprised they actually gave that information out to someone other than the account holder.
Re:Ahh, PR security (Score:4, Insightful)
Re:Ahh, PR security (Score:4, Insightful)
heh, this is amusing... (Score:3, Funny)
the story outlining foxnews erronious reporting is here [thestreet.com] (Item #4).
HA! Social Engineering! (Score:5, Funny)
meta-social engineering (Score:5, Interesting)
Re:meta-social engineering (Score:3, Insightful)
Re:meta-social engineering (Score:2)
And they almost certainly record the ANI spill (essentially "super caller id" that can't be blocked) from each call.
Re:meta-social engineering (Score:3, Interesting)
I can see it now (Score:5, Interesting)
att> Hello how may i help you
hacker> Hello this is from . Hey i'm sorry to have to call you now, specialy with all this H2 stuff going on, but i need some information on
att> Umm, well sir i need to
hacker> yea i know, i also saw the memo, my HRID is and my number is . Shall i hold while you check?
att> Nah, i gues thats ok, what did you need again?
this would be the uba hack
Addendum: (Score:5, Funny)
The previous memo failed to mention another warning sign of hacker social engineering attempts. If you hear the song "Halcyon-On and On" by the music group Orbital, hang up the telephone immediately. We will be holding information sessions at all regional offices for telephone support personnel, where you will be trained to recognize this music within several seconds. DO NOT confuse this warning sign with the last five minutes of Mortal Kombat! It is better to be safe than sorry. Thank you for your cooperation, and stay Hacker-Free(tm) during this period of "l337n355".
OT: Orbital (Score:2)
Help, they are attacking me ! (Score:2, Informative)
("Security Hotline 1-800-822-9009") and
to pretend to be an alarmed AT&T employee
Or dial someone from AT&T pretending to be
from the Security Hotline.
Social Engineering attacks are so easy
Hah (Score:5, Insightful)
- the resolution procedures in case of doubt about a callers identity
- the "security hotline" phone number.
Nice going, AT&T.
Re:Hah (Score:2, Interesting)
Disrupting web sites by posting links is one thing, but posting internal phone numbers which are used to deal with critical problems is really, really bad.
Re:Hah (Score:2)
Now I bet *THAT* one has never been tried before.
Tee hee.
Be on guard THIS weekend. (Score:2)
-Restil
Re:Be on guard THIS weekend. (Score:2)
A Beautiful Thing... (Score:2)
The notice should have asked the employee's to have the caller put AT&T on their "Do not call list"!
Should they also (Score:2, Interesting)
Those hackers can also use "garbage engineering" techniques to get proprietary information.
perfect security (Score:5, Funny)
Re:perfect security (Score:5, Funny)
Re:perfect security (Score:2)
Isn't that the way every company's support is?
For example, you call the police and you get:
Please enter the abbreviation for the state you are in
TX.
Please enter the letters for the city you are in
DALLAS.
Please enter your zip code
25636
Please enter your telephone number
485-1253
Please enter your last name
SMITH.
Please enter your first name
JOHN.
Please enter your sex
MALE.
Please tell us do you jerk off with your left or right hand
LEFT.
Please tell us what you are calling about: Enter 1 for reporting a crime in progress, 2 for reporting a past crime, 3 for reporting a crime you have reason to believe will be committed, 4 for inquiring about a suspect, 5 for filing complaints, 6 for all other issues
1.
Please identify the type of crime being committed: 1 for murder, 2 for rape, 3 for child molestation, 4 for torture, 5 for assault, 6 for robbery, 7 for drinking while driving, 8 for public indecency, 9 for all other types of crimes.
2.
Please identify the gender of the offender raping the victim
MALE.
Please hold. Your call will be answered in the order that it was received. Average wait times range from 30 minutes to 1 hour
10 min: Thank you for your patience. All of our police officers are currently busy. Please hold. Your patience is appreciated.
20min: Thank you for your patience. All of our police officers are currently busy. Please hold. Your patience is appreciated.
59 minutes: We're sorry, due to circumstances beyond our control, your call has been disconnected. Please call the police number again and re-enter your complaint.
Re:perfect security (Score:4, Funny)
"Why don't you just tell me the name of the movie you want to see?"
Number is legit (Score:2, Informative)
J
Ignore the memo! (Score:5, Funny)
AT&T is so being attacked (Score:2)
Now the target is absolutely irresistable. They're going to read the notice out loud at the conference and then call AT&T just to make a point. I bet they were even planning to call a different company this year.
Of course, AT&T may be doing this to trap them --it's curious that they say h2k2 several times and clarify it instead of just saying "group of hacker terrorists". Or maybe they really are just that stupid.
Either way, it should be fun. I've got my ticket.
good thing this was posted by anon (Score:5, Informative)
Many people who do the social engineering hack make fun of companies for having clueless employees or employees that don't follow basic guidelines. So for those few who make fun of AT&T for doing this, I'd say you can't have it both ways.
We should be applauding AT&T for reminding their people of basic security precautions.
Re:good thing this was posted by anon (Score:4, Informative)
These are the standard policies that ATT uses to verify the authenticity of calls. It's nothing out the ordinary, just a reminder to people that they should be verifiying identity before they give out information.
Re:good thing this was posted by anon (Score:4, Insightful)
Furthermore, the reactions to this haven't been negative. There's nothing wrong with AT&T taking reasonable measures to insure that private customer information is kept private, and that the general security of their networks is maintained. Indeed, if they did anything else, that would be wrong and irresponsible.
Speaking as a cyber-libertarian, I can say that cyber-libertarian ideals don't include giving crackers free reign to break into confidential or private information. Indeed, if you allow such, you're destroying liberty, because you lose privacy rights. Cyber-liberties -- as Lessig has said -- can be violated not only by the government, but also by corporations, organizations, and other individuals.
Security in large companies (Score:2)
I know that these kind of security precautions exist in every big corporation (i work for a top financial corp). I also know that they NEVER work. No-one knows you by the face, only a name or a number is known, and these are easy too come by.
Besides, most system breaches are done from the inside anyway. I know that our company had more internal issues then external.
Videotaped! (Score:3, Interesting)
Now that gives an interesting movie, seeing a hacker calling an AT&T employee... You'll have more fun listening to Brain Damage [2600.com]: Public Radio rules!
Wow. (Score:4, Insightful)
I know when we tell everyone about a new virus, and yet another reminder not to run things even if they are from someone you know, some otherwise intelligent people still go out and run it, and when you ask, they say "Well I know you warned me, but MY friends would never do something like that"
So I can see it now "Well I know there was a warning out.. but he SAID it was an emergency"
This is a Dood Thing(tm) (Score:5, Insightful)
Isn't that what we all want? At least that's the reason why I support those kind of things.
It's ironic (Score:3, Insightful)
I guess that's just wishful thinking though...
Re:It's ironic (Score:3, Insightful)
Sort of like saying "The roads are icing up, drive carefully." -- it's just a heads-up to remember to follow the procedures. Or so I hope...
Yes, probably (Score:2)
Cheers,
Jim in Tokyo
Re:It's ironic (Score:4, Interesting)
Why should it take a hacker conference to get AT&T to put out such a warning?
There have been warnings about more general con-men around for years - even some of thier tricks are well known. There's always the classic movie, "The Sting". Many social engineering tricks rely on pressure and tricking the target when they're not really paying attention (conning register boys out of a five by doing an 'i need change' shell game) or using pressure tactics into forcing a bad decision.
Sometimes these warnings play right into the con men's hands! Pickpockets *love* signs that say "beware of the pickpocket", because everybody pats thier wallet to make sure it's still there. "Thanks for letting me know exactly where your wallet is, target.", thinks the pickpocket. A block away the target isn't thinking about pickpockets anymore - two blocks away and his wallet's gone.
Like, without this memo, maybe even with it, if you hacked the switchboard to the phone center and made it so 10 hackers could all call the same desk clerk at the same time, it would be easy to pull something on him. (If you know when the phones are undermanned or can dial directly to an extension, you don't even need to hack the switch.)
Have the other 9 callers put pressure on him with mundane but slightly time consuming requests. Almost everybody who works a phone these days has a lot of pressure on them to resolve each call quickly. When he's got half of the 9 on hold and is trying to get what they want, have the 10th call and play "I'm a manager and I need to know (trivial piece of information that's actually valuable to a hacker) now!" Time's ticking on the held calls. If he leaves them on hold it will show up on a report to his manager. If he doesn't help this guy he'll have another manager angry at him for different reasons.
And the 10th calling 'manager' isn't going to refuse any requests for information. No, of course not. He's just going to say, "I've got that info in my wallet - no not there, maybe in my briefcase, I'm looking.", thus stalling untill target phone rep folds like cardboard box. He breaks policy in an attempt to make everybody happy. But, hey, at least the hackers are happy. *grin*
Thinking about what's going on "Why are there 10 calls to my desk???" is near-proof against con men. They have a thousand tricks to keep you from having time to think.
Security Hotline (Score:3, Interesting)
But I did some hunting and found this in a recent newsletter. Seems outide people are _supposed_ to call that number (which looks like it is out of my building based on the exchange of the phone #)....
SECURING CRITICAL INFORMATION: AT&T is classified as a critical infrastructure company, servicing the communications needs of the government, including its armed forces around the world. Because of this relationship, and current world events, employees may receive inquiries concerning AT&T's network infrastructure security. While most requests are legitimate, some may not be. It's critical to the security of our country, as well as to our business, that these questions be answered factually, and information provided only to legitimate requestors. For these reasons, employees who receive inquiries from a local, state or federal government agency, anyone claiming to represent the media, or any concerned citizen, should refer those agencies or individuals to the AT&T Corporate Security 24x7 hotline at 1-800-822-9009 (within U.S.) or 908-658-0380 (outside U.S.). Corporate Security will ensure inquiries are verified and appropriate responses provided.
Re:Security Hotline (Score:2)
Is there any evidence other than the text in the message that this was received by a legit AT&T employee?
att # (Score:2, Interesting)
Who's engineering Whom ? (Score:3, Funny)
How can we be sure this is really what it appears and that it is not slashdot that his been socially engineered ?
Evidence that this is fake (Score:3, Informative)
http://www.defcon.org/TEXT/6/att-dc-6-alert.txt [defcon.org]
Unless AT&T has not changed its warnings in three years (unlikely) and such warnings have been leaked multiple times (more unlikely) this would seem to be a fake.
P.S. to the Memo (Score:4, Funny)
Only apply security during announced conferences? (Score:2)
Don't worry about REAL security. Just worry about embarrassing PR. As long as the hacker breakins don't occur at a time and place when the press is likely to find out about them, everything is OK...
If they had NOT sent out the email, they would have had a good opportunity to find out whether the improved procedures they instituted following embarrassments at previous HOPE conventions were effective. (They DID institute improved procedures following those previous conventions, didn't they?)
AT&T shouldn't care about this memo getting ou (Score:4, Funny)
Of course, the really great hack would be to call up Kevin Mitnick pretending to be an officer of the court, and get the information from him.
I read the title as (Score:2)
Triv
AT&T Security (Score:5, Interesting)
In about 1980, when I was in high school, I discovered an unused phone extension line in my bedroom closet and started experimenting with it. I quickly figured out the basics and built a little homemade phone. Later, I got the idea of using a thirty-foot spool of wire and a couple of alligator clips to quickly tap into someone's line outside of their house to steal long distance phone calls from the safety of my car. This is really trivial stuff, I know, but I thought I was clever.
But not clever enough. I called my cousin long-distance by connecting to what turned out to be the phone line of a little old lady who'd never made a long-distance phone call in her life. Her church was helping her pay her bills and noticed the phone call immediately. They called AT&T, and AT&T merely checked to see who else in my small New Mexico town had ever called that California number. Then they called my mom.
Once AT&T security found out that I hadn't actually done anything sophisticated or interesting, they just made my parents pay for the call and dropped the matter.
None of this, of course, shows that AT&T security was especially astute. But a few years later I was working as a radio disc-jockey, and I told this story to the station's chief broadcast engineer. He told me that he had worked for AT&T and that AT&T Security were among the best private security experts in the world. In his words: "Don't fuck with AT&T Security". That made an impression on me.
Later on, when I first read about the phone phreaking era, I felt lucky that a) I wasn't ingenious enough to get myself in any real trouble, and b) I didn't know anyone who was.
Re:How is all of this relevent to the origional po (Score:2, Funny)
Re:Editors, please.... (Score:2, Informative)
Hackers and crackers are not the same persons.... If you are a cracker and come to H2K2 then you will be blamed so hard as you can't just say you own name....
BTW: If some of them do i'm sure that they will report it.. If you not report security ugs on systems you are just a simpel Blackhat and no body respect them.....
Truti
Re:Editors, please.... (Score:2)
Dammit - gotta wake up before posting.
Re:SS#??? (Score:2)
SSN#'s are meant to be for social security....its pathetic that we have this de-facto government id number that is _so_ insecure.
(name addy and ssn ==> credi cards...loans...many a story exists of people with bad credit/delays/problems due to identity theft/minor credit hacking due to a stolen ssn)
It's a pain but you CAN keep SS#s to yourself. (Score:2)
Actually, the US does have such a law. It's just completely ignored.
Every so often someone suggests enforcing the rule, but that would require so many changes that it won't happen.
Actually, you CAN keep it to yourself in most cases. And I have for a couple decades. (I've been concerned about identity theft since long before the term was coined.)
The battle has been lost with respect to withholding it from the state governments when you go for a driver's license - congress authorized them to collect it. (They actually MANDATED it - allegedly to help track dads who skipped out on child support. So why are they collecting womens' numbers, hmm?)
Some entities are entitled to your SS number - generally those that may pay you taxable money: employers and banks. (NOT insurance companies, at least until there's a taxable payout, and most payouts are not taxable.) The rest can ask and you can refuse. They're usually stuck serving you anyhow - especially if they're already contracted to do so, as with certain employee benefits.
I'm not sure if lenders are entitled or if it's just "Well, I have to serve you anyhow. But I get to do so on my personal estimate of your credit risk, based on rules I use that are common to all applicants. I think someone who withholds their SS# from a lender has a skeleton in his financial closet and is a high risk." Either way if you want a loan you'll need to give 'em the number.
The big problem has always been hospitals and medical insurance companies. Hospitals normally assign a hospital number separately and will let you leave your SS# field blank or fill it with "withheld". They have a separate field for the insurance ID, because lots of people are on their spouses' or parents' insurance. Insurance companies generally let you use a replacement I.D. Some will assign it themselves. Some will ask you to generate one - and be responsible if it collides with someone else' number.
If you must generate one: there are several rules for numbers the US will never assign. One I remember is "any of the three fields is all zero". I think any field all-9 is also unused. Two insurance companies that assign numbers are apparently using counters, one starting at 000-00-0001, the other at 100-00-0001 (probably to avoid collisions with each other). If that's where they started they've each assigned more than a thousand before they got to me. Regardless: I have yet to encounter any billing or hospital registration software that rejects "illegal" SS# patterns.
Lately it has gotten a LOT easier to withhold the numbers. Apparently enough people have been doing so that it's no longer a "lone nut" thing. (This is possibly because identity theft has been in the news for a couple years, possibly because people like me have dealt with enough companies to bring their I.T. departments kicking and screaming into the world of privacy.) Companies have gotten the message - clear down to the clerk level - and are no longer fighting the withholding of SS#s and other personal info.
Computer Professionals for Social Responsibility has a project on keeping SS#s private and can give you some tips if you run into a company that's being obstinate.
Meanwhile, get your passport and use THAT for I.D. B-)
Re:Has anyone actually called that number? (Score:2)
Re:Has anyone actually called that number? (Score:2)
It's safe to call the number now. (:
Re:I have mixed feelings... (Score:2)
Re:I have mixed feelings... (Score:2)
If that's the case - and I would hope it isn't! - I'd rather a pimply teen from Queens did the breaking first, giving the target company a heads-up as to their poor security, rather than a terrorist bent on crippling the US phone network or Internet. Think of H2K2 and its attendees as a free security test for AT&T and other companies.
Is it really okay to expose this?
Yes, absolutely. Much more sensitive information gets published in mainstream media all the time. In fact, it's in posting things like this that Slashdot is at its best, since it provides insight into things that are normally hidden, and which perhaps could stand a bit of scrutiny (or if they can't, should be able to!)
At worst it's letting the world know that, on this particular weekend, the back door to the Best Buy on Such-and-such St. has a broken lock.
That's silly. If AT&T's procedures can be compromised so easily based on the information in that email, they better get new procedures, and they'd better hire security people who know what they're doing.
And if this did result in a real-world break-in -- if someone did use this information to steal from the Best Buy -- the person who posted this information would be arested and charged.
That may well be true, and is an example of the kind of thinking that many officials indulge in. Crack down on the hackers who expose problems, and maybe no-one will notice some of the more serious holes in our infrastructure security. In fact, one of the talks at H2K2 covers this topic:
The fact that the poster of the AT&T email might be arrested and charged is all the more reason to post it. If you allow valid and responsible actions to be circumscribed by petty intimidation, you've already lost your freedom. Of course, you might question the "valid" and "responsible" in my previous sentence, but the point is that it's possible to disagree on these things, and it's not the job of law enforcement to take a position unless an actual identifiable crime has occurred.Catch Up (Score:2)
Re:we are the über... (Score:2)
I do not like Green eggs and Spam, I do not like it, Sam I Am.
(yes, I'm tired too)