CC 201-001 Week 5 Class 7
CC 201-001 Week 5 Class 7 CC 201-001
Popular in Introduction to Cyber Criminology
Popular in Cyber Criminology
This 4 page Class Notes was uploaded by Jennifer Gintovt on Thursday September 22, 2016. The Class Notes belongs to CC 201-001 at University of Alabama - Tuscaloosa taught by Adam Ghazi-Tehrani in Fall 2016. Since its upload, it has received 10 views. For similar materials see Introduction to Cyber Criminology in Cyber Criminology at University of Alabama - Tuscaloosa.
Reviews for CC 201-001 Week 5 Class 7
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 09/22/16
Victimization IBM (2016) • 1.5 million cyber attacks each year o 4,000 attacks every day o 170 attacks every hour o 3 attacks every minute • businesses are attacked an average of 16,856 times per year o 46 attacks per day o 1.7 attacks per week = successful Cost of hacking: • McAfee o Estimates annual global cost of attacks could be over $400 billion § More money less effort o Average armed bank robbery nets $6,000 • 2013 o 7% of US organizations lost $1 mil or more o 19% of US organizations report losses of $50,000 or more Individual victimization: • growing group • cybercrimes against individuals reported to the FBI in 2013 totaled losses of over $781 million o average loss of nearly $3,000 per complaint Types of crimes: • $81 mil – romance scammers o target people through online dating sites • $51 mil – auto scammers o convince targets to pay for cars that don’t exist • $18 mil – real estate rental scams o convince buyers to pay for property that doesn’t exist (ex- time shares) • $6 mil – FBI scammers –about $700 per victim o people pretending to be government officials Remote Access Tools: • Luis Mijangos o Hacker behind most famous sextortion case to date o Victims: § Spring- 2009 § College student received an instant message from someone who claimed to know her § Told her what her bedroom looked like and claimed to have nude photos of her • Sends photos to her and asks her to have “web sex” with him § Girl contacts boyfriend who had the naked photos • The two students exchange instant messages about stalker trying to figure out what happened o Not long after she gets a message from the stalker threatening her telling her he knows what her and her boyfriend had talked about and not to go to the police § Contacts campus police § Officer shows up to room and she tells him information and leaves § Stalker then threatens her boyfriend because she contacted the police o This wasn’t just happening to them though § In LA around the same time another girl named Sara (juvenile) received an instant message from someone that was impersonating her bf § She sends pictures and realizes that’s not her bf § Stalker beings to threaten Sarah with posting her nude photos § Stalker knows she’s emailing her bf, and calls her and tells her she needs to take it more seriously o “Gloria” § received an email from someone who claimed to have invaded her computer § claimed Gloria’s ex-boyfriend hired him § Gloria didn’t reply to the email, received another that contained a nude picture of her • Hacker promised to post it on the Internet if she didn’t do what he wanted o Gloria sends copies of the threats to a friend of hers o Stalker knows and proceeds to post her photos to her friends MySpace account 2 The Case: • Hacker had gone after so many people that the Glendale Calif. Police take notice and see the broader pattern • FBI investigated and on March 8, 2010 after 6 months of investigating and interviewing they are lead to a small neat home • FBI finds 32-year-old Luis “Guicho” Mijangos o Wheelchair bound o Illegal alien o Shot at 17 and was paralyzed from waist down o Admitted to FBI that he hacked people’s computers o Favorite trick was to put files on peer to peer networks that would infect people’s computers when they downloaded it (this would give him access to their machines) o Claims to have only done it 5 times o FBI originally thought that there were 3 people involved, not one o Stalker-style behavior was being “misconstrued” o Claimed that he was doing it to catch cheating boyfriends/girlfriends/spouses and was hired Charges: • FBI finds 4 laptops, a blackberry, and a bunch of USB drives in the home • Hacked a total of 129 different computers and victimized a total of 230 victims • 44 of the victims were juveniles • After arrest he admits that he supports himself through complicated financial hacks- makes around $3,000 a day • Hung around hacker forums like “CC power” and learned how to use tools like Poison Ivy and SpyNet and “crypter” software to hide who he was from other machines Sextortion: • Was calling card • Spent a significant amount of time targeting victims • If he gained access to a woman’s computer, he would search for incriminating information or access webcam to create his own • If he accessed a man’s computer, he would impersonate the man and reach out to the female partner • Once he received photos he would threaten to post them online unless they kept sending them • Constantly monitoring people’s communications 3 • Watch instant messages and email communications, phone conversations he would listen in on over the computers microphone • Omniscient effect would terrify victims Verdict: • Plea deal with government and copped to 2 felony charges • Required to no longer participate in hacks • Only sentenced to 72 months o Harsh sentence due to the fact of his “psychological warfare” and “sustained effort to terrorize victims” How to protect yourself: • Don’t take nude photos • Definitely don’t share it • Mijangos crimes would not have been possible if the pictures weren’t there o Easier said than done though... § Studies suggest that the majority of smartphone users participate in activity • Put passwords on everything o Make them different • Turn on 2 factor authentication o Securing your devices with both a password an another device • Webcam stickers • Double and triple check links you receive o Very common attack vector • Contact the police when all else fails 4
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'