44.493 Issues in Criminal Justice Technology & Security

home > Unit 11: cybercrime

Identity theft

How is it done? (continued)
One of newest variations is "phishing," in which you are sent what appears to be a legitimate email that directs you to a website where you are asked to divulge personal information such as social security numbers or bank accounts. Phishing involves "both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials.

Another is "DNS poisoning," which takes over a computer and installs range of adware and spyware. "Very sophisticated attack." It involves: fooling domain name system servers into directing those heading to any .com site to "a malicious Web site that the attackers control. That Web site then surreptitiously installs a wide range of adware and spyware on the victim's computer. Results include:

Still another is turning home-based computers with always-on connections (and without current firewall protection, etc.) into "zombies," which are then used to spread up to 80% of all spam. One of the dangers to individuals is U.S. Code Title 18, which says that anyone whose computer contains child pornography files, "regardless of intent, has committed a felony and is subject to five years in prison. This includes zombie victims, anyone who has had a pop-up window with illegal content appear on-screen, and so forth."

What are techniques to combat it?

1 | 2 | 3 | 4 | 5 | 6