Verizon Wireless Wins Injunction Against Data Thieves
The injunction is against a Tennessee 'private investigation' company that reportedly uses a number of techniques to obtain private subscriber information.
Verizon Wireless said Thursday that it has received a court order preventing a Tennessee company continuing what Verizon calls the theft of subscriber information.
The wireless operator received an injunction against Source Resources of Cookeville, Tennessee. The permanent injunction prevents Source Resources from acquiring, possessing or selling customer account information without either a court order or the subscriber's permission.
"They call themselves private investigators," Verizon Wireless spokesman Jeffrey Nelson said in an interview. "They are common identity theft crooks."
In its initial court filing in July, Verizon Wireless claimed that Source Resources used "deceit, trickery and dishonesty" to obtain customer records. Specifically, the wireless operator claimed that Source Resources "is engaged in wrongfully obtaining confidential customer information (such as the customer's calling records) … by posing as a customer of Verizon Wireless seeking information about his or her own account."
The Source Resources "investigators" provided Verizon Wireless customer service agents with security information, such as the victim's social security number of mother's maiden name. That information was, according to Verizon's brief, "wrongfully obtained."
The request for the injunction cited Dan Ealey as the principal of the company and also cited 10 anonymous "John Does" who actually worked to obtain the information. The legal brief said that Source Resources advertised its services over the Internet.
Nelson said that Verizon Wireless customers weren't the other victims but claimed that Verizon Wireless has taken the lead in preventing this type of fraud.
"This may be going on with other wireless companies and telecom companies," Nelson said. "But Verizon Wireless will absolutely go to the mat to protect our customer's rights."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.