Halting the Hacker: A Practical Guide to Computer Security (2nd Edition)
| I l @ ve RuBoard |
| Computers are an essential component of most businesses, and criminals have also taken up computers as their tool of choice. Criminals are using computers in all sorts of ways. Illegal drug manufacturers have used computers to keep track of their inventories and their transactions with customers. Computers have been used to create fake IDs and counterfeit money. Computerized communications are used by criminals to communicate with other criminals or to manipulate their victims. Financial Fraud
The computer and the communications it provides have been used often to commit fraud. The Internet is inundated with financial scams and get-rich-quick schemes. Other schemes which use a more direct attempt to deceive people for financial gain are also abundant. There have been many cases of attempting to manipulate stocks using the Internet. Some schemes have posted false news stories, and others have faked e-mail from company executives about earnings. Below is an account of one of the most successful.
[58] "Emulex Hoaxer Indicted for Using Bogus Press Release and Internet Service to Drive Down Price of Stock," Department of Justice Press Release , 28 September 2000. Credit Card Theft
The theft of credit card information has become a major practice on the Internet and among hackers. Credit card numbers are easily acquired from e-commerce sites which have not provided adequate security. Trafficking , the transmission of the stolen numbers from the hacker who stole them to the individuals who want to use them, has grown into a large business. The high rewards, ease of handling, and low expectations of being caught have brought traditional crime organizations into this arena. Organized crime has become a major player in the trafficking of stolen credit card numbers. The ease of sending credit card numbers over the Internet to anywhere in the world has attracted international crime syndicates, who use stolen credit cards and the profits of selling these numbers to finance their other activities.
[69] "NIPC Advisory 01-003," FBI Press Office , 8 March 2001. Hundreds of thousands of credit card numbers are stolen and sold annually. Only the largest of these thefts make their way to the newspapers. Identity Theft
Identity theft is the malicious misuse of someone's identity. Someone can steal your name and social security number or gather enough of your identity information to be able to gain access to your financial resources. Incidents of these types of identity theft are on the rise. Generally , this is an attempt to use the victim's good credit history to secure a line of credit that is then run up to the limit and the perpetrator disappears. Much of the information needed to steal someone's identity is often available through electronic methods : name, social security number, driver's license number, mother's maiden name, bank information, etc.
[60] "New York Electronic Crimes Task Force Arrests Defendant for One of the Largest Identity Theft Cases in U.S. History," U.S. Department of Justice Press Release , 1 March 2001. Simple "identity theft" is generally no more than someone misrepresenting himself or herself as you in order to gain a financial return by forging a check or passing a credit card. Your identification may be stolen by physically taking your wallet or purse, or by misusing the information that comprises your identification. Most law enforcement professionals would not even consider this as identity theft, especially if the use of the identity is a one-time or very short-lived occurrence. To be classified as identity theft they would require that the theft of the identity be more in-depth or that the misrepresentation continues over a longer period of time. In any case, most cases are short-lived, thirty to ninety days, and are performed for financial gain. However, there have been a few cases where identities have been stolen and used for years . But the practice is far from uncommon. The real problem for consumers isn't monetary losses, but trying to repair a wrecked credit record. And as more information becomes available through the Internet, either for free or a low price, identity theft is expected to grow. Consumers should try to keep personal information private, but there's little one can do to ward off a determined thief ” sometimes the theft isn't detected until it complicates the life of the victim.
[61] Horne, Terry, "Erasing ID Theft Takes Time, Effort," The Indianapolis Star/News , 6 June 2002. |
| I l @ ve RuBoard |