Comparing sources draft 2

advertisement
Ayala 1
David Ayala
Kim Jaxon
English 130PI
26 March 2013
Comparing Sources: Cybercrime
“Cybercrime” is criminal activity or a crime that involves the Internet, a
computer system, or computer technology. Since the introduction of the Internet there has
been cybercrime, but in recent years it has evolved and become a popular crime all over
the world. These are organized crimes todays which are not only done to break through
secure network systems, but obtain valuable information such as bank account. I myself
have wondered, if someone can really steal my bank account or general information.
Who does this, and how does someone do this or is it just portrayed in movies. To get to
the bottom of this I did some research on cybercrime and here you will see what I found.
Unlike other articles I read, this is my favorite summing up everything in a
nutshell. According to an article titled “Cybercrime” by the Interpol, cybercrime is one of
the fastest growing areas of crime exploiting the speed, convenience that modern
technologies offer to commit a serious range of criminal activities. In past years these
cyber crimes were committed by small groups of individuals and now it has grown to
much larger groups of professionals working in an organized manner. By working
together these criminals have become very successful using their resources and expertise
towards these crimes.
Another article I discovered was written by Caitlin Fitzsimmons titled “The
New Cyber Threat.” Similar to the article of the Interpol this Arthur talks about
Ayala 2
cybercrime evolving from hackers wanting to gain fame for breaching high security
networks to now stealing money and data. The article then continues by talking about
Earthwave, a company from Australia that provides service for corporate networks.
This article states these crimes are being committed by criminals that do not
want to be seeing or caught. At the same time motives and techniques are changing. Your
traditional firewalls and antivirus programs do not work anymore because hackers have
now learned to get around these obstacles. By encrypting malware hackers can now
launch attacks with bonnets. Then it goes claiming, IT experts also claim most people do
not even know they are being attacked and can sometimes have hackers in their networks
for months at a time. I would agree with them because many of us do not even know
what an infected device is. I myself have an idea, but usually when my computers starts
acting up I blame it on the age.
According to NBCNEWS.com one of these crimes occurred in 2008 when
$70 million dollars were stolen from the payroll account of 400 Americans. According to
the article titled “University Professor help FBI crack $70 million cybercrime ring,”
written by Richard Engel. Engels article is about a professor from the University of
Alabama named Gary Warner who helped the FBI capture a group of hackers who were
using computers from the comfort of their home to send out Trojan virus. By doing so
these individual were able to obtain bank accounts through the Americans digital devices.
The article then claims Warner discovered a link between the virus that was gathering
information and he informed the FBI. Warner then traced the hackers all the way back to
the Ukraine where they and their mules were caught. This seems unreal how much
money can be stolen and what people can do with technology. I would also think the web
Ayala 3
made it easy for these hackers to commit this crime halfway across the world and may be
almost impossible to find, but Warner somehow was able track them from the comfort of
his office. In this case I am sure Warner would argue that there is no anonymity. This
leaves me thinking so what about our virus protectors and firewalls.
"There's no such thing as data protection – you can assume that you either
have been breached or will be in the near future and once you accept that, all that is left is
detection and response," says Carlo Minassian, founder of Earthwave. Since it is virtually
almost impossible to stop these hackers companies main concern now is early detection.
In extremes cases I have now learned that there has been hackers in corporate network for
as long as seven years before anyone realized something was wrong. According to
Fitzsimmons, Earthwave is dedicated to provide services to have early detection for
corporate networks reselling security tools from vendors including McAfee, Juniper,
EMC and Cisco.
This leads me to my next article titled “Navy Battles Cyber Threats: Thumb
Drives, Wireless Hacking, & China,” written on April 4 2013 by Sydney J. Freeberg Jr.
The article starts off talking of Americas Forces and how we have had some of the most
advanced technological advantages since the first Gulf War. The article then states the
Navy has started to look into the dependence of their computer networks. Part of the
reason is because technology has and is growing at a rapid pace, especially when there
are advancements that may have not been around three years ago. The issue was raised
when the Navy realized it was a horrible idea to add USB ports and serial ports to all
ships. Original these ports were added to aircraft as well, for maintenance reason, said
Rear Adm. William Leigher. Leigher’s job is to keep up with technological advances for
Ayala 4
the Navy. At the time the Navy added these ports it seemed smart, I guess they never
thought about someone getting on board or tricking someone to hook up a thumb drive
full of viruses. The main concerns now are wireless devices, which do not need to
physical hook up to a port in order to cause chaos.
Today almost all devices have Wi-Fi or Bluetooth, which transmits radio
waves back and forth. I would agree with Freeberg, at home almost everything I use has
Bluetooth or Wi-Fi. I myself have all my devices hooked up at home so I can open the
same file from any of them. Freeburger then states that every time our devices transmit,
they reveal our presents and position. They are also a gateway to for hacker. Meanwhile
military’s around the world have been detecting, disrupting and deceiving radio waves
since WWII called Radio Warfare. This means there has been enough time to perfect the
interception of these waves which are constantly being used by new devices. The fears of
having one of Navy's ships being homed in was introduced during the cold war when the
Navy spent a lot of effort on emission control (EMCON). Fortunately they stopped after
1991 even though the navy started using even more wireless signals. To reduce the
chance of a virus entering the Navy's networks they plan to change from Shipboard Wide
Area-Network (SWAN) to Consolidated Afloat Network (CANES) This would make it
much more difficult for a hacker to get in. Minassian would argue that if a group of
hackers wanted to get through they would do so.
This recurring theme of stealing information and hacking networks has
become a problem. Deb shinder of TechRepublic would differ and emphasize that some
departments do not want to enforce laws governing online crimes, because it is more
difficult to enforce than traditional laws. This is most likely why the majority of people
Ayala 5
who are attacked by hackers live on the other side of the world. According to her article
“What makes cybercrime laws so difficult to enforce.” Shider claims Computer forensics
has become far more advance, and there are tools available to investigators that allow
them to examine digital evidence without tampering with for future court cases. The
problem that gets raised is when criminals are living across the world and there is
different jurisdiction in their country.
“Examining the Forces Shaping Cybercrime Online” by Thomas J. Holt.
Holt would also argue that there is a rise of crimes on the Internet. Holts article claims
malicious software is increasing by the use of hacker and attacker through the Internet.
Through these uses, criminals are able to obtain sensitive information and compromise
various devices. Many of these attacks on our devices are from hackers living in
countries as far away as China, Russia, and Eastern Europe. These attacks of malware
include viruses, Trojan horse programs or the use of botnets where hackers are able to
establish a stable network of infected computers throughout the world. This makes it
possible for computers with these botnet to perform automated tasks without owners
knowing. It also mentions that this leads to huge loss for companies ranging anywhere
from $40,000 to $400,000 each year due to viruses and other forms of botnet infections.
The article then continues talking about hackers being able to gain personal information
and sell it online.
For not working very hard these online criminals can make a living by buying and
selling resources to enable attacks or sell information they have stolen. On the online
marketplace, the average Joe can buy stolen data, and hacking tools. The sales that are
being put up on these markets are then being bought regularly. The tools sold to
Ayala 6
individuals make it seem like they are professional at work by letting them creating more
malware. Some of the information being bought includes credit cards, pin numbers, and
general customer information from victims worldwide. Other services done are cash out
services and in return they are able to obtain funds from electronic accounts or automated
teller machines offline. At the same time seller offer the distribution of denial service.
These services are usually done on compromised networks, which means one or more
computers may be infected with botnets.
focus: repetition
am i doing it right
Works cited
Ayala 7
"Cybercrime." / / Crime Areas / Internet / Home. INTERPOL, n.d. Web. 27 Mar. 2013.
Engel, Richard. "University Professor Helps FBI Crack $70 Million Cybercrime
Ring."NBC News. NBCNEWS, 21 Mar. 2012. Web. 02 Apr. 2013.
Fitzsimmons, Caitlin. "The New Cyber Threat." BRW, 35.4 (2013): 42-44.,
Freedberg, Sydney J., Jr. "Navy Battles Cyber Threats: Thumb Drives, Wireless Hacking,
& China." AOL Defense. Intel & Security, 4 Apr. 2013. Web. 07 Apr. 2013.
Holt, Thomas. "Examining the Forces Shaping Cybercrime Markets Online." Social
Science Computer, 10 Sept. 2012. Web. 01 Apr. 2013.
Shinder, Deb. "What Makes Cybercrime Laws so Difficult to Enforce." TechRepublic.
IT-Security, 26 Jan. 2011. Web. 02 Apr. 2013.
Download