Free Essay

Data Theft

In:

Submitted By gslone
Words 2318
Pages 10
Data Theft Paper

Data Theft Paper
Data theft is when information is unlawfully copied or taken from a business or individual. This information is user information such as passwords, social security numbers, credit card information, other personal information, and confidential corporate information. Within this paper several examples will be giving as, I explore how data theft has affected individuals and organizations. What can organizations and individuals do to protect them from becoming victims of this type of fraud. When stolen data happens such as people’s identities or an organization’s information the potential harm is huge with major economic and legal implications. The worst thing about the data theft is that it can remain undetected. It is devastating when you find out as a boss that an ex-employee has stolen the company information for personal gain, profit, or to ruining the company completely. A survey released by Information Week (informationweek.com) and Accenture in July 2007 showed that 89 percent of 1,010 U.S. companies still felt vulnerable to data theft (McNurlin, Sprague, & Bui, 2009). For example the Boeing Company had an ex-employee who illegally downloaded thousands of pages of significant business documents to his computer. It was anticipated if any of those documents had gotten into the wrong hands of Boeing’s competitors it could have cost them $5 to $14 billion dollars (McNurlin, Sprague, & Bui, 2009). In 2008, a data theft survey was done and more than 60 percent of U.S. workers who left their employers took some data with them. According to a February 24 article in The Economist. In the recession, many laid-off employees who feel like they have nothing to lose by walking off with data they no longer have any rights to use (Crews & Wiseman, 2009). Nearly all healthcare organizations responding to a survey -- 96% -- reported that patient or related information has been lost, stolen, or otherwise compromised within the last two years. The number of data breaches involving protected health information rose by 32% from 2010, according to interview data published online by the independent privacy and data protection group the Ponemon Institute. Three out of 10 respondents (29%) said a data breach resulted in medical identity theft -- up 26%. And two out of five respondents (41%) blamed data breaches on employee negligence -- not following data-handling procedures, sloppy mistakes, and using unsecure electronic devices -- and 49% reported lost or stolen devices. Third-party errors were responsible for 46% of breaches (Medpagetoday, 2010). The issues of insider attackers are becoming quite a test. According to Greenemeier, criminals inside the organization are not the most common security problem (McNurlin, Sprague, & Bui, 2009). Attacks by insiders of a company can be expensive and tremendously damaging to the company’s reputation. Some examples of possible criminal acts from inside a company: * An employee illegally accesses employees’ emails to steal information that could be used for malicious intent. * An employee who is angry about the low bonus he received and tries to ruin the entire company’s computer system by deleting delegate data records. * A system administrator is not happy with his life and decides to change the code of legacy systems, creating bad data. * A marketing salesperson steals sensitive data and sells them to a competitor (McNurlin, Sprague, & Bui, 2009).
Inside criminals may have certain warning signs an organization should be aware of like mental health disorders, personalities that conflicts with authority, history of behavioral violations in the workplace, or personal financial problems.
Personal individuals’ data theft has gotten outrageous. In recent weeks the news reported two big data collectors companies that collect people’s personal information and has sold detailed personal information on nearly 500,000 people to buyers who have absolutely no business getting it. As early as 2003, the U.S. Census Bureau reported that two-thirds of American households have at least one computer, with about one-third of adults using computers to manage household finances and make online purchases [U.S. Census Bureau2005]. These statistics suggest that many computers store data on personal finances and online transactions, not to mention other confidential data such as tax records, passwords for bank accounts, and email. We can estimate that these figures have risen dramatically since the 2003 survey. Sensitive information stored in an insecure manner is vulnerable to theft. According to the most recent CSI Computer Crime and Security Survey [Richardson 2007], 50 percent of the respondents have been victims of laptop and mobile theft in the last 12 months (Diesburg & Wang, 2010). In October 2009, FBI arrested 33 people in “Operation Phish Phry” an international investigation of suspects’ who allegedly stole around 2 million from bank accounts in the United States over a two year period. The suspect allegedly use sham websites with Bank of America and Wells Fargo logos to trick customers of those banks into entering their usernames and passwords (Calman & Feigelson, 2010). According to Javelin Strategies( Identity-theft), a research firm that reports on identity theft, incidences of the crime increased by 11% from 2008 to 2009 changing the lives of 11 million Americans(2010). 1 in every 20 Americans are victim to this crime. The odds go up if you are a young adult or a small business owner. This is because people in these groups tend to engage in riskier activities that can lead to them being victimized. Especially young adults who are away in college that uses library computers or share computers in their dorm rooms with roommates and others who they do not know well. Small business owners, who tend to complete a large amount of financial transactions by mail or over the Internet, will sometimes use their personal accounts and home address to aid in processing these transactions. The Federal Trade (FTC), which is responsible for taking complaints from victims and sharing them with law enforcement agencies, has noted that identity theft is a major problem. Millions of Americans are being affected each year, and victims may face substantial costs and time to repair the damage to their good name and credit record. It is estimated that the record of 3.3 million people from the guarantor of US student loans have been victims. The information that the victims’ loss was names, addresses, social security numbers and dates of birth, this data was confirmed by the Educational Credit Management Corporation (ECMC), which stated data theft from their headquarters in Minnesota.
Some of the biggest data theft in the last five years:
2007-
1. T.J. Maxx - In a carefully planned and long drawn out operation, Albert Gonzalez stole sensitive information belonging to more than 100 million customers of T.J. Maxx, an American departmental stores chain. The hack was carried out over a period of 18 months, ending in 2007. As many as 45.6 million credit and debit card numbers were stolen. Unlike other entries in this list, this wasn’t an entirely remote operation. Instead, poorly secured in-store computer kiosks were exploited to gain access to company’s networks.

2008- 2. Hannaford Bros. Supermarket chain - In March 2007, another supermarket chain was compromised. Hannaford lost credit and debit card numbers, expiration dates and PIN numbers of 4.2 million customers. The leak has led to over 1,800 reported incidents of fraud. The culprit was once again Albert Gonzalez. This time around he broke in by using SQL-injection attack.
2009-
3. Check Free Corporation - Check Free, an online bill payment service, fell victim to a DNS hijacking scheme in December, 2008. However, the incident didn’t come to light until January 2009. The company’s website was redirected to a Ukrainian website that hosted Trojan horses that were designed to steal data from customers. Since, Check Free lost control of its website, the exact extent of the damage couldn’t be calculated. However, an estimated 5 million consumers might have been affected.
2010-
4. Gawker – In December 2010, Gawker Media blogs were hacked by a group called Gnosis. Not only did this group go on to give interviews to competitors of Gawker Media, but it also uploaded the entire database of 1.3 million registered users (with usernames and hashed passwords), and confidential staff conversations to a torrent website. The breach prompted many other web services (like Twitter and LinkedIn) to carry out forced password resets for affected members.
2011-
5. Epsilon - Epsilon is a leading email marketing service provider that has dozens of tier-1 companies as its client. On March 30, a hacker succeeded in gaining access to a subset of Epsilon clients’ customer data. Data stolen included names and email addresses. Epsilon maintains that only 2% of its customers were affected, and hasn’t disclosed exactly how many records were breached. However, given that the affected clients include big names like CitiGroup, Best Buy, and JPMorgan Chase, this breach might turn out to be the biggest ever ( Techie-buzz, 2011).. Different ways organizations can provide data security, so they will not be affected by insiders are, IT security staff needs to work closely with other organizational departments like the HR department, promoting the use of encryption, and enforcing the most rigorous audit policy for mission-critical data. Personnel security should have a policy in place that identify who has authorization to enter a physical room and access data. Application security needs to be provided for software, hardware, and firmware applications to be secured from unauthorized access. Operating system security for IT staff to make available to all users a security guide for every operating system used in the organization. Network security need to add communication devices like network bridges which will serve as a gateway to the organization’s platform to restricted hackers. Middleware and Web Services security, IT security should review the middleware blueprints and define a cohesive view of security across diverse middleware systems, and provide a starting point to spread out the policy for middleware security. Facility security there would be a physical room where the information systems are installed should be fully protected with entry locks, security guards and cameras. Egress security should be enforced for a policy to be in place to take out vulnerable documents which should be given to personnel. Any vulnerable documents printed on paper should be stored in a secure place, unused documents should be shredded. Different ways to protect individuals from identity theft are to think like a thief. Before you throw anything away, look to see whether it has any valuable identifying information that could be used by someone to steal your identity.
Shred it- Think twice before you let bills, receipts, statements and solicitations leave your house in one piece. Shred financial and medical statements, pre-approved credit card offers and other solicitations, preferably with a cross-cut shredder.
Stash it- Rather than throw away receipts and other documents at the airport, shopping center or at work, bring them home and shred them.
Lock it up- To avoid thieves who steal credit card offers from your mailbox or, worse, take bills waiting for the postal carrier and then doctor the checks, get a locking mailbox. If you're home a lot, you can instead get a device lets you know when your mailbox has been opened.
Financial diligence- Protecting your credit and your banking and brokerage accounts is particularly important and worthy of special effort. Among other things, keep your checkbook out of sight and keep blank checks in a secure place.
Checkups- You needs to monitor all your financial accounts on a regular basis, looking for any unusual transactions. You need to report any improper charges or withdrawals to your bank account immediately. In addition, sign up for email alerts for your bank and credit card accounts, so that you'll get a text message or email if large or unusual transfers are made or your balance is unusually low (Smart money, 2011).

Conclusion For organizations it can be very difficult to deal with insiders’ threats especially when it can cost them millions of dollars. While as identity theft is becoming the fastest growing crime in the United States, with over a million victims each year. I have given you examples of both an organization and individual data theft. How miserable ex-employees have taking their employer’s data for personal gain. How hackers and ordinary day-by-day people are stealing other individual personal information making them victims of identity theft. I have given you ways to how an organization can secure their data from being stolen and saving the organization millions of dollars from these discontent people. I have given you ways for individuals to protect them from becoming victims of identity theft. It is becoming a big issue for data theft and the best ways to avoid becoming a victim is to make sure all your Is’ are dotted and all your Ts’ are crossed in the organization’s IT security and as an individual making sure you protect your personal information.

Reference
Crew, A. & Wiseman, D.D. (2009, October). To catch a data thief. Hrmagazine, 54(11), 1-70. Retrieve from EBSCOhost.
Diesburg, S.M, & Wang, A. (2010, November 3). A survey of confidential data storage and deletion methods, ACM computing surveys, 43(1) 2-37. Retrieved from EBSCOhost.
Feigelson, J., & Calman, C. (2010, April 1). Liability for the costs of phishing and information theft. Journal of Internet law, 13(10), 1-26. Retrieved from EBSCOhost.
How to protect yourself from identity theft. (2011, August). Retrieved by http://www.smartmoney.com .
McNurlin, B., Sprague, R. & Bui, T. (2009). Information systems management in practice (8th, ed.), Upper Saddle River, New Jersey: Prentice Hall
Petrochko, C., (2011, December). Ponemon Institute. Retrieved by http://medpagetoday.com
The biggest data theft in the past five years. (2011, November). Retrieved by http://techie-buzz.com .

Similar Documents

Premium Essay

Sentencing

...Report/National Incident-Based Reporting System and the National Victimization Survey. Data from the two sources, although collected differently, show an array of crime data in the United States and is a method to monitor criminal activity. They both have positive and negative attributes that have influenced different aspects of society. It is important to remember that statistical aggregates of reporting crime, whatever the source, does not reveal the lost lives, human suffering, lessened productivity, and reduces quality of life that crime causes (Schmallager, 2011). The Uniform Crime Reporting (UCR) Program is the crime statistics of more than 16,000 law enforcement agencies (Schmallager, 2011). Congress created this program in 1930 and designated the FBI to implement the program (Schmallager, 2011). The programs primary objective is to generate a reliable set of criminal statistics for use in law enforcement administration, operation, and management; however, its data have over the years become on of the country’s leading social indicators (national atlas, 2003). Citizens use these reports to see fluctuations in crime levels and law enforcement uses it for planning and crime prevention programs. Eight Part I offenses are included in the UCR Reports, also known as the Crime Index. The violent crimes are murder, forcible rape, robbery, aggravates assault, burglary, larceny-theft, motor vehicle theft, and arson. Clearance rates are also included in the report. Clearance rates are...

Words: 1067 - Pages: 5

Premium Essay

Intellectual Property in Automobile Industry

...Intellectual Property Theft in the Automotive Industry Scope, Trends, and Mitigating Strategies Table of Contents Introduction………………………………………………………………………………..3 Scope of Intellectual Property Theft………………………………………………………3 Intellectual Property Theft and China……………………………………………………..4 Intellectual Property Theft in the Automotive Industry…………………………………...5 The Subtle Pick-Off……………………………………………………………….5 Piracy and China’s Global Emergence…………..………………………………………..6 Consequences of IP Theft…………………………………………………………………7 Mitigating Strategies………………………………………………………………………7 The Autoweb Intellectual Property Exchange…………………………………………….8 Fusion-DX………………………...………………………………………………9 GlobalSource………………………………………………………………….…..9 Data Integration Services……………………………………………………….…9 GlobalSource...………………………………………………………………….…9 Integrated Translations…………………………………………………………….9 Autoweb Company Overview……………………………………………………10 Bibliography………………………………………………………..……………………11 www.autoweb.net 2 Introduction I ntellectual Property protection in the manufactured goods sector is not a new idea. Laws prohibiting manufactured goods counterfeiting and piracy activities existed as far back as the Middle Ages when bakers, artisans, and craftsmen used distinctive marks to distinguish their products and work from would-be counterfeiters. The general problems associated with modern day counterfeiting and intellectual property piracy have long been recognized, yet today’s high-tech economy has magnified the problem of...

Words: 3125 - Pages: 13

Free Essay

Argumentative Essay

...Associate Level Material Critical Analysis Forms Fill out one form for each source. |Source 1 Title and Citation: Identity Theft Is a Serious Problem | |Swecker, C. (2009). Identity Theft Is a Problem (Cyber Crime ed.) Louise I. Gerdes. Detroit: Greenhaven Press. | | | | | |1 |Identify the principal issue presented by the |Identity theft has emerged as one of the dominant white collar crime | | |source. |problems of the twenty-first century | | | | | |2 |Identify any examples of bias presented by the |This particular article seemed bias free to me. The author did a good job of| | |author. If none exist, explain how you |producing statistics backing his claims. The author gives detailed | | |determined this. |information about the FBI internet crime numbers along with information | | | |regarding the Internet Crime Complain Center. I never felt that the author | | | |was...

Words: 1132 - Pages: 5

Free Essay

Decision Analysis

...workplace: * The Larceny theft data from Federal Bureau of Investigation’s official website for the years 2011, 2012 and 2013; * 25th and 26th Annual Retail Theft Surveys by Hayes International for the years 2011, 2012 and 2013; * National Conference of State Legislatures website for Labor and employment data for the years 2011, 2012 and 2013. ‘Shoplifting’ is undoubtedly a psychological issue for most of the people. Shoplifting for most individuals is rarely about greed or poverty. It’s about people struggling with their own personal conflicts and needs. There are approximately 27 million shoplifters (or 1 in 11 people) in the USA today. More than 10 million people have been caught shoplifting in the last five years. The pleasure produced from “getting away with it” yields a chemical reaction causing in what shoplifters describe as an incredible “rush” or “high” feeling. Many shoplifters have committed to the fact that this high is their “true reward,” rather than the stolen product itself. It is assumed in this project that all the shoplifting instances in different states of the USA have been performed by the front-end Retail Salesperson. This might not be 100% true as the members of the Retail Store management of a company may also get themselves involved in such heinous crime, but this possibility has been disregarded. Data from the three aforementioned sources were compiled according to the respective states, years and concrete data-sets were formulated. MS...

Words: 3519 - Pages: 15

Free Essay

Categories of Computer Crimes

... Abstract Computer crime is any crime that has to do with a computer and a network. Computer crimes are criminal activities which involve the use of information technology to get illegal or unauthorized access to a a computer system with the mind set of damaging, deleting, and altering computer data. Computer crimes are include but are not limited to electronic frauds, misuse of devices, identity theft and data. Computer crimes do not necessarily have to involve damage to physical property. The computer could have participated in the crime or may have been the target. There are for common types of computer crimes computer as the target, the computer as an instrument of a crime, the computer as incidental to a crime, and crimes associated with the prevalence of computers. Categories of Computer Crime There are four common types of computer crimes. Computers can be used as an target. Crimes were the computer is the can include offenses like theft of intellectual property, theft of marketing information or blackmail based on information gained from computerized files. Crimes of this nature can sabotage intellectual property, marketing, pricing, or personnel data or can even sabotage of operating systems and programs with the thought of creating chaos in a business operations. There are many ways computers can be targeted unlawful access to criminal justice and other government records is another crime that targets the computer directly. This type of crime...

Words: 802 - Pages: 4

Premium Essay

Are Closed Digital Training Networks Vulnerable to Hackers?

...essentially anyone who has access to the systems. Thinking like a hacker, how would one infiltrate closed digital training network? Well, sometimes one not even need to be a hacker to stumble upon unauthorized or restricted documents. Usually the weaknesses of a closed network are going to lie with access and account rights. Granting proper account rights consists of the administrator weighing what kind of access is appropriate to give to the type of user. In a larger environment where an administrator is in charge of hundreds of systems this task might be very difficult. As stated by Einwechter in his explanation of the finesse it takes to grant access and account rights, “Give a person too much access, and they may gain access to data and other resources that are not required for their job . . . [access rights that are too] restrictive and he or she may be unable to do their job” (2002). A written policy or memo which informs users of the different accounts...

Words: 2338 - Pages: 10

Premium Essay

Computer Science

...perpetrators. Cyber-crime is relatively new, however, has been in existence since the implementation of computers in mainstream society. This could be a general explanation as to why and how unprepared society and the world are towards fighting these types of crimes [ (Joseph, 2006) ]. There are numerous crimes of this nature being committed on a daily basis. Examples of cyber-crime where the computer itself is the target include things like data alteration, denial of network access, theft of information, denial of service, and vandalism. The next category that the author would like to point out is the computer as an instrument of a crime. What this means is that the computer is used to profit with some other criminal activity in mind. Some examples of this are general theft, theft of service, fraud, and threats and/or harassment [ (Taylor, Fritsch, Liederbach, & Holt, 2011) ]. The implementation of computers as a criminal tool or device to obtain information to be used in a criminal manner increases yearly. Criminals use computers to store data relating to drug deals, money laundering, embezzlement, mail fraud, extortion, and a myriad of other crimes. In addition to the simple storage of records, criminals also...

Words: 1361 - Pages: 6

Premium Essay

Computer

...Computer Crimes Computer Crimes Computer Crimes Advances in telecommunications and in computer technology have brought us to the information revolution. The rapid advancement of the telephone, cable, satellite and computer networks, combined with the help of technological breakthroughs in computer processing speed, and information storage, has lead us to the latest revolution, and also the newest style of crime, "computer crime". The following information will provide you with evidence that without reasonable doubt, computer crime is on the increase in the following areas: hackers, hardware theft, software piracy and the information highway. This information is gathered from expert sources such as researchers, journalists, and others involved in the field. Computer crimes are often heard a lot about in the news. When you ask someone why he/she robbed banks, they world replied, "Because that's where the money is." Today's criminals have learned where the money is. Instead of settling for a few thousand dollars in a bank robbery, those with enough computer knowledge can walk away from a computer crime with many millions. The National Computer Crimes Squad estimates that between 85 and 97 percent of computer crimes are not even detected. Fewer than 10 percent of all computer crimes are reported this is mainly because organizations fear that their employees, clients, and stockholders will lose faith in them if they admit that their computers have been attacked. And...

Words: 1814 - Pages: 8

Free Essay

Conducting Surveys

...Descriptive research is concerned with finding out who, what, where, when, or how much. We chose not to use exploratory research because it is more appropriate for the total study in topic areas where the developed data are limited. We also chose not to use causal research because it focuses on the effect that a variable(s) has on another (or others) or why certain outcomes are obtained. Our study’s method of data collection is communication and the researcher control of variables is the ex post facto design. Longitudinal studies are the time dimension, statistical study for the topical scope, and field conditions for the research environment are most appropriate for our organizational problem. What data collection instrument(s) will be used? Survey? Interview? There are two methods of research in which we are preparing to use. One method of research is the observation method and the other is the focus group method. Both methods are an excellent choice when trying to take control of the losses of a business do to theft. The observation method which is sometime referred to as the field method will give Bloomingdale’s loss prevention team the ability to observer and gather first hand information from the loss prevention team on the behaviors of its employees’ theft problems and issues as well as the consumers. The biggest advantage of this method is that is gives the loss prevention teams an opportunity to participate in the survey. It also gives a greater validation to the information...

Words: 552 - Pages: 3

Free Essay

Crime

...methods, and focus on somewhat different aspects of crime, the information they produce together provides a more comprehensive panorama of the Nation’s crime problem than either could produce alone. The International Association of Chiefs of Police (IACP) began publishing information for the UCR Program in 1929, just two years after the IACP had established a committee to research the uniform reporting of crime statistics. Since September 1930, the FBI has administered the program and currently collects information on the following crimes: murder and non-negligent manslaughter, forcible rape, robbery, aggravated assault, burglary, larceny-theft, motor vehicle theft, and arson. Law enforcement agencies report arrest data for 21 additional crime categories. The UCR Program compiles data from monthly law enforcement reports or individual crime incident records transmitted directly to the FBI or to centralized state agencies that then report to the FBI. The program thoroughly examines each report it receives for reasonableness, accuracy, and deviations that may indicate errors. Large variations in crime levels may indicate modified records procedures, incomplete reporting, or changes in a jurisdiction’s boundaries. To identify any unusual fluctuations in an agency’s crime counts, the program compares monthly reports to previous submissions of the agency and with those for similar agencies. The UCR Program presents crime counts...

Words: 417 - Pages: 2

Free Essay

Crme

...computer as a target, the computer as Instrument of the crime, the computer as incidental to crime and crimes associated with the prevalence of computer. This computer crime used the computer as the target by accesses the operating program as the system’s manager, then deny the legitimate user or owner of the system access to his or her date or computer. When committing this crime we have four sub categories that the hacker may fall under, a network intruder who target the server and may cause harm to the network owners or the operation of their business, date alteration that directly targets the computer by attacking the useful information stored or processed by computer, malicious network intruders who primary focus is to alter critical data, are a ways a computer can be used as the target. One of the earliest cases of the computer being target took place when Robert Morris Jr, a computer science student who wrote a self-replicating, self-propagating program that infected an estimated 6,000 computer systems, that later became known as “The Morris Worm.” Computers can be...

Words: 1491 - Pages: 6

Premium Essay

Property and Computer Crimes Paper

...Property and Computer Crimes Paper John Samaniego, CJA354 May 22, 2011 Property and Computer Crimes Paper In today’s society because of the economic stress and high unemployment rate many crimes exist. The criminal justice system has become overwhelmed with various crimes. Summarizing and defining these crimes society will have a better understanding of these crimes as well as the effect these crimes may have on the community in a negative manner. Not only do these crimes effect society these crimes put a major strain on the criminal justice system as well as the professionals within this system. Kidnapping is the act of removing an individual(s) through intimidation, threat(s) fraud or force from the place for which he or she is found. Kidnapping invades one`s privacy as well as disrupts his or her freedom. Kidnapping also considered a form of aggravated false imprisonment because of the moving and hiding an individual(s). Early common law says that abduction by force and transporting of individual(s) out of his or her country created an act of kidnapping. In today`s judicial system kidnapping cases look more upon the degree of movement in regard to the distance that the abductor(s) forcefully moved an individual(s) Movement must involve substantial amount of distance. For example, forcing an individual out of one`s way or even moving an individual across the street is not looked upon as kidnapping in the criminal justice system (Schmalleger, 2010). False imprisonment...

Words: 1179 - Pages: 5

Premium Essay

Computer Crimes

...The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. The computer is used to connect to networks so the criminal can do such crimes as fraud, theft of service, theft, threats and even harassment. Another method involves converting legitimate computer processes for illegitimate purposes. Crimes in this category include fraudulent use of automated teller machine (ATM) cards and accounts; theft of money from accrual, conversion, or transfer accounts; credit card fraud; fraud from computer transactions (stock transfers, sales, or billings); and telecommunications fraud. Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information (e.g., customer lists, pricing data, or marketing plans), or blackmail based on information gained from computerized files (e.g., medical information, personal history, or sexual preference). These crimes also could entail sabotage of intellectual property, marketing, pricing, or personnel data or sabotage of operating systems and programs with the intent to impede a business or create chaos in a business' operations. Unlawful access to criminal justice and other government records is another crime that targets the computer directly. This...

Words: 803 - Pages: 4

Premium Essay

Operation High Roller

...Operation High Roller CSIA 301 November 23, 2014 New forms of cyber crime continue to come up all the time. Technology has aided the theft of money from bank accounts from banks from all over the world and one such cyber attack was Operation High Roller a cyber attack that targeted corporate bank accounts. According to The Wall Street Journal, these attacks which began in Europe spread to Latin America and even the United States (Booker 2012). The attackers did fraudulent transfer of money from accounts belonging to financial institutions. For instance, in the United States, the victims of the attack were companies whose commercial accounts had a minimum of several million dollars. The attackers sent SpyEye and Zeus software to hack computers that were infected with malware. This cyber attack has an extensive network and automation which interacts with serves that are used by their target victims. But much of the transactions are carried out in the servers used by the criminals. Two security firms, McAFee and Gurdian Analytic (Business Insider) were behind this discovery and they realized that there was no human participation required in the transactions. All the criminals needed were insider understanding of the goings on in the banking industry transaction systems. They then developed commercial and custom codes which they maliciously used to siphon millions of dollars into their virtual accounts. About sixty serves were identified as the ones used in making attempted...

Words: 1415 - Pages: 6

Premium Essay

Computer Crimes

...The first category, the computer as an instrument of crime is basically using the computer to facilitate the crime. The criminal introduces a program to manipulate the computer's analytical processes, thereby facilitating the crime. The computer is used to connect to networks so the criminal can do such crimes as fraud, theft of service, theft, threats and even harassment. Another method involves converting legitimate computer processes for illegitimate purposes. Crimes in this category include fraudulent use of automated teller machine (ATM) cards and accounts; theft of money from accrual, conversion, or transfer accounts; credit card fraud; fraud from computer transactions (stock transfers, sales, or billings); and telecommunications fraud. Crimes in which the computer is the target include such offenses as theft of intellectual property, theft of marketing information (e.g., customer lists, pricing data, or marketing plans), or blackmail based on information gained from computerized files (e.g., medical information, personal history, or sexual preference). These crimes also could entail sabotage of intellectual property, marketing, pricing, or personnel data or sabotage of operating systems and programs with the intent to impede a business or create chaos in a business' operations. Unlawful access to criminal justice and other government records is another crime that targets the computer directly. This...

Words: 803 - Pages: 4