An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants.

Slides:



Advertisements
Similar presentations
Electronic Crimes on the E-Information Highway. Violent Crimes.
Advertisements

By: Jason Baltazar MIS 304 Credit Card Fraud and Prevention.
Jennifer Perry. We help victims of e-crime and other online incidents – Web based service – Providing practical, plain language advice – No-nonsense advice.
Primary Threats to Computer Security
Fact or Fake Out Education is the best defense against fraud.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1 Identity Theft and Phishing: What You Need to Know.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Legal and Ethical Issues: Privacy and Security Chapter Five.
Hacker’s tricks for online users to reveal their sensitive information such as credit card, bank account, and social security. Phishing s are designed.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Internet Security Awareness Presenter: Royce Wilkerson.
Using Economics to Quantify the Security of the Internet Jason Franklin.
Understanding Botnets: How Massive Internet Break-Ins Fuel an Underground Economy Jason Franklin and Vern Paxson.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
1 An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants Jason Franklin CMU Vern Paxson ICSI
Internet Fraud By: Noelle Woodman.
CERN - IT Department CH-1211 Genève 23 Switzerland t Update on the underground economy and making profit on the black market Wojciech Lapka.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
PART THREE E-commerce in Action Norton University E-commerce in Action.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Scams & Schemes Common Sense Media.
How To Preserve Online Privacy. 6 Major Ways To Protect Privacy  1.) Learn to Clear Browsing History  2.) Familiarize Yourself with Privacy Settings.
Internet Crimes Jennifer Hardy Meosha Johnson Joe London.
E-Rule. What is cyber crimes Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or computers. However we do not realize how fast internet is getting bigger.
Malware and Phishing By: Sydney Langley. MALWARE- includes viruses and spyware to steal your personal information PHISHING- is an internet scam sending.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
BY JESSICA SCHOLEY p1. Id Fraud Is When Someone Pretends To Be Someone Else Using There Address, Birthday And Other Information. People Also Use Id Fraud.
Cybercrime What is it, what does it cost, & how is it regulated?
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Information Security: Current Threats Marc Scarborough Information Security Officer
Cybersecurity Test Review Introduction to Digital Technology.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Internet in 21st Century. We all use web in our daily lives, from our mobiles or coputers. However we do not realize how fast is internet getting bigger.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Created by the E-PoliceSlide 122 February, 2012 Dangers of s By Michael Kuc.
 77.4% of the perpetrators are male.  50% live in one of the following states: California, New York, Florida, Texas, and Washington.  55.4% complainants.
CNP Fraud. Occurs when a fraudster falsifies an application to acquire a credit card using an individual’s personal information. (Eg: postal intercept)
Social Impacts of IT: P6 By André Sammut. Social Impacts IT impacts our life both in good ways and bad ways. Multiplayer Games Social Networks Anti-social.
Identity theft vector of the electronic age
Chapter 19.1 Cyberlaw and Cybercrime
Challenges We Face On the Internet
Chapter 11 crime and security in the networked economy
Information Security Session October 24, 2005
Ethics Tutorial Assignment#2
A Gift of Fire Third edition Sara Baase
The Current Internet: Connectivity and Processing
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Security in mobile technologies
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants

Outline I.Introduction II.Market Overview III.Market Analysis IV.Goods, Services, and Prices V.Discussion

Introduction 7 months –13 Million Messages, 2.4GBs of Information –IRC Network –Hacking for fun -> Hacking for Profit Reputation economy –Defacing web sites –Authoring viruses Cash economy –SPAM –Phishing –DDoS Extortion

Market Overview Dishonesty and Distrust in the Market –Buyers, Sellers –Participant Verification Market Activity –Advertisements Goods –Compromised Machines, Mass Lists Services –EFT, Spamming and Phishing for Hire –Sensitive Data

Market Analysis Credit Card Data –Valid Cards: 402 Unique/day *Based on Luhn Check Financial Data –Difficult to validate, trivial to fake Identity Data –SS#: 18.6 Unique/day SS# is sufficient to steal an identity On average, credit/debit fraud /card

Market Analysis 19,000 Unique Messages / Day IRC Nick –553 new/day Most last less than 40 minutes IRC Bots –!chk –!cclimit

Goods, Services, and Prices Hacking Related –Most common: Compromised Hosts account for 68.4% of sales ad’s –Hacked hosts and root accounts only account for 5.39% of sales ad’s Spam and Phishing Tools –Bulk Lists and Vulnerable Web Forms (for injection attacks)‏ Online Credentials and Sensitive Data –Fresh Credit Card Data, Account Information

Goods, Services, and Prices Services –Cashier –Confirmers –DoS Cost of Compromised Host 2$-25$

Quick Facts from 2006 Internet Crime Report In 2006, IC3 processed more than 200,481 complaints –IC3 referred 86,279 complaints of crime to federal, state, and local law enforcement agencies around the country for further consideration Internet auction fraud was by far the most reported offense, comprising 44.9% Among perpetrators, 75.2% were male Among complainants, 61.2% were male Electronic mail ( ) (73.9%) and webpages (36.0%) were the two primary mechanisms

Discussion How do you counter this market?