[Dataloss] VISA / 1ST BANK

blitz blitz at strikenet.kicks-ass.net
Fri Oct 20 00:22:01 EDT 2006


I think what we're seeing is the affected companies being told by 
their law-vultures to release as little as possible to minimize 
exposure. This in its essence, limits as well, the ability of 
independent verification and investigation to assist others in 
prevention and bring guilty parties to justice.
This is a trend that should be stopped ASAP. I believe they as well 
as we understand the time to "walk the walk" is upon us, and some 
serious lawsuits are in the offing in lieu of actually securing our 
data. The only model they will accept is one like HIPPA where the Fox 
guards the hen house.

One more notable side effect I'm seeing is the taking on blind faith 
that a missing data set has been recovered and has not been tampered with.
Says WHO? The FBI? They're ankle deep in these cases, and in case you 
don't remember recent history, they have been less than honest in 
evidentiary cases in the past. A company like MC or Visa certainly 
has the political and monetary clout to buy the results they're seeking.
Don't make me laugh. Hasn't been accessed? Copied to another hard 
drive for eventual compromise, maybe yes, but not tampered with? The 
professional thieves have access to the same tools we do. 
Compromising even an encrypted set of data is not an IF proposition, 
but merely a WHEN one. Anyone who understands distributed computing 
knows the power of a supercomputer is well within the budget of 
almost anyone who puts their mind to it.
Does the old cops-and-robbers line "lets lay low till the heat goes 
down" ring a bell?
When data's gone, its GOT to be presumed compromised, period. Extend 
the meager protections, mail the letters, and by all means, DO NOT 
allow a weak data protection statute at the Federal level preempt 
stronger State statutes.
The bottom line is all about minimizing exposure, and the clients who 
were compromised be dammed.
We need some serious introspection of what we believe, and who we 
trust after the fact IMHO.
Marc

At 16:43 10/19/2006, you wrote:
>The way I read the notification, it didn't sound like the processor 
>was affiliated with 1st Bank:
>
>"We would also like to reassure you that the compromise of 
>information occurred at a merchant card processor's location, not 
>FirstBank and therefore your account information at FirstBank has 
>not been obtained by these unauthorized indivuduals(SIC)."
>
>Perhaps they are just notifying customers affected by another 
>company's gaff? Must be a bad day if they didn't even spell-check 
>the notification before it went out..
>
>-Dennis
>
>
>
>----------
>From: B.K. DeLong
>Sent: Thu 10/19/2006 1:21 PM
>To: Chris Walsh
>Cc: dataloss at attrition.org
>Subject: Re: [Dataloss] VISA / 1ST BANK
>
>Is it that hard to find out who did the card processing for 1st Bank?
>
>On 10/19/06, Chris Walsh 
><<mailto:cwalsh at cwalsh.org>cwalsh at cwalsh.org > wrote:
>On Thu, Oct 19, 2006 at 10:41:37AM -0400, B.K. DeLong wrote:
> > Well, whomever it was will probably get wacked with a HUGE fine for
> > violating PCI Security standards. I'm guessing it won't take long to
> > determine who falls under approved card processors for Visa.
>
>
>They might get fined, but not buy Visa.  Too much butter on that bread
>to throw it in the bin.
>
>The FTC, OTOH, may do some enforcement:
><http://www.emergentchaos.com/archives/2006/06/prediction.html>http://www.emergentchaos.com/archives/2006/06/prediction.html
>
>Visa has been zealously guarding the "privacy" of these processors since
>at least December of 2005, when the Sam's Club stuff started to hit the
>fan.  Even Gartner called MC and Visa out on it:
><http://www.emergentchaos.com/archives/2005/12/gartner_to_visa.html>http://www.emergentchaos.com/archives/2005/12/gartner_to_visa.html
>
>Chris
>
>
>
>
>--
>B.K. DeLong (K3GRN)
><mailto:bkdelong at pobox.com>bkdelong at pobox.com
>+1.617.797.8471
>
>http://www.wkdelong.org/                    Son.
><http://www.ianetsec.com/>http://www.ianetsec.com/                    Work.
><http://www.bostonredcross.org/>http://www.bostonredcross.org/ 
>Volunteer.
><http://www.carolingia.eastkingdom.org/>http://www.carolingia.eastkingdom.org/ 
>Service.
><http://bkdelong.livejournal.com/>http://bkdelong.livejournal.com/ 
>Play.
>
>
>PGP Fingerprint:
>38D4 D4D4 5819 8667 DFD5  A62D AF61 15FF 297D 67FE
>
>FOAF:
><http://foaf.brain-stream.org/>http://foaf.brain-stream.org/
>_______________________________________________
>Dataloss Mailing List (dataloss at attrition.org)
>http://attrition.org/dataloss
>Tracking more than 137 million compromised records in 430 incidents 
>over 6 years.

-- 
This message has been scanned for viruses and
dangerous content by MailScanner, and is
believed to be clean.

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://attrition.org/pipermail/dataloss/attachments/20061020/4eddc4a2/attachment.html 


More information about the Dataloss mailing list