Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
SECURITY CHECK Protecting Your System and Yourself Source:
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Lesson 11 Using Online Banking. Key Terms Account Transfer – online transfer of money; ex. Savings to checking acct. Fraud – using trickery to convince.
BUSINESS PLUG-IN B6 Information Security.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Instructions for Weds. Jan Get your Century 21 Jr. textbook 2.Log in to the computers 3.On page 80, read the Objectives listed under “Lesson 13:
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety By Lydia Snowden.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
 More than ___% of teens have a savings account.  ___% of teens age have a checking account. ___% of those ages have one.  Likewise, ___%
Identity Theft.  What is it?  How is it perpetrated?  Can you avoid it?  What if you become a victim?
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Preventing Identity Theft in Aspen Falls Helping citizens protect themselves IdentityTheft.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Unethical use of Computers and Networks
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
Identity Theft.
Internet Fraud Complaint. Internet fraud refers to any type of frauds that take place due to the use of internet.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
You. are at risk for the fastest growing crimes crime.
Identity Theft: Prepare and Protect Yourself. What is Identity Theft? Identity theft occurs when someone uses your personal information, without your.
Digital Citizen Project By: Frances Murphey Technology and Education.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
REACTION AND ACTION RESPONDING TO FRAUD 1. THE VICTIMS THE CON IS TAILORED TO THE PROSPECTIVE VICTIMS. 2.
PROTECTING YOUR CREDIT PG NAME, TEACHER AND DATE.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Preventing Identity Theft. PREVENTING IDENTITY THEFT 2 Agenda Introduction What Is Identity Theft? Tips to Protect Yourself What to Do if You Have Been.
Cybercrime Justine Brown COSC 101. What is Cybercrime? A criminal activity using computers and the internet. A criminal activity using computers and the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Identity Theft Officer Bill Roscop Mount Prospect Police Department.
Identity Theft FBI Norfolk (757) SA Mark T. Park.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
that keeping money and personal information safe is very important That losing money or having personal information stolen can be distressing.
By: Arjun Vachhani.  What is Cybercrime  What is Cybercrime Law  Cybercrime in Our Lives  Case 1: Albert Gonzalez  Case 2:Phishers  Statistics 
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Identity Theft SS.8.FL.6.7 Evaluate social networking sites and other online activity from the perspective of making individuals vulnerable to harm caused.
Allison Gladkowski.  About privacy and why it matters  Spyware and spam vocabulary and examples  Identity theft  Unapproved access  Today's big issues.
PRESENTED BY: ASHLEY CLOUSER (CONNER) Identity Theft.
Lesson 10A: The Three D’s of Identify Theft
Protecting Your Assets By Preventing Identity Theft
Done by… Hanoof Al-Khaldi Information Assurance
Hotspot Shield Protect Your Online Identity
Digital Citizenship Middle School
Protecting What’s Yours: Your Identity
When you get caught for Identity Theft
Five Unethical Uses of Computers
Scams, Identity Theft, and Viruses Kelly & Caitlin
Information Security Session October 24, 2005
Protecting Yourself from Fraud including Identity Theft
Protecting Your Identity
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429

What are Hacker Hunters? New type of crime-fighter Job is to crack down on internet criminals Track down and business scams Protect people from crimes

Internet Crime Complaint Center A division of the FBI Takes complaints from citizens and presents them to the proper agency Most are handled by the FBI or Secret Service

Helps to Take Down Cyber Criminals ✓H✓H elped Take Down Romanian eBay scam. ✓G✓G roup set up fake accounts selling products that were never delivered

Was created in 2004 to create a joint task force to crack down on cyber crime ๏ FBI ๏ Department of Justice ๏ Secret Service ๏ Postal Inspection Service ๏ Federal Trade Commission ๏ Immigration and Customs Enforcement

Operation Firewall One of the largest international cyber crime operations Took down the cybercrime group “ShadowCrew” Reported to have over 4000 members

ShadowCrew Stole credit card information for personal use and sale. Helped create fake identification to allow people to use stolen credit cards Reported to have made over $4 million in two years Got most card information through phishing scams

Shadowcrew They were able to access over 12 companies networks and steal credit card information Most companies who were cracked never knew information was stolen One member “Scarface” sold 115,695 credit card numbers in a single transaction

How they got caught One high level member, a US citizen was caught and arrested, he turned into an informant. They set up a VPN service for the leadership to use and tracked all their information. The informant was believed to be trustworthy so many used his gateway

The arrest of ShadowCrew On a sunday night a joint operation between 8 states and 6 countries performed a raid on 28 homes arresting all the leadership of ShadowCrew. This was all timed so that the others could not give warnings over instant message for some to escape.

QUESTIONS

What types of technology could big retailers use to prevent identity thieves from purchasing merchandise? Cards with RFID and Pin Numbers (popular in the UK)

What can Organizations do to protect themselves from hackers looking to steal account data? Restrict access to only those necessary Require more difficult passwords Higher quality firewall and security systems

Authorities frequently tap online service providers to track down hackers. Do you think is it ethical for authorities to tap an online service provider and read people’s ? It is ethical and important for authorities to have access to criminal activity via or normal internet use. But it must be accessed by a warrant issued by a judge. It is unethical to access everyone’s information looking for any crime without prior suspicion.

Do you think it was ethical for authorities to use one of the high-ranking officials to trap other gang members? The use of a lighter sentence for those who cooperate with authorities is a long standing tradition. This is how cases are made and witnesses are found to take down a criminal organization.

Research the best way to protect yourself from identity theft. Monitor your credit report Keep track of your bank and credit card records Do not volunteer any private information via Shred any paperwork with personal information Never use a credit card on a nonsecure site Use a STRONG password

Current Information Most crimes being reported to the IC3 are about phishing scams. Because of social networking people are starting to lose their safety and privacy on the net. Personal questions used to recover passwords can be found on these sites and this is increasing cases of theft.

Very Current Information Military secrets regarding Marine One were stolen from a defense contractor Authorities have traced the file to Iran The file was stolen because an employee was running a P2P program on a company computer to download music