1 / 8

Edward Juarez Immigration - Cyber Crime

All the basic required information about a systematic cyber crime including the precision tactics for hotels or offices

Télécharger la présentation

Edward Juarez Immigration - Cyber Crime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. systematic CYBER CRIME By Edward Juarez Immigration Edward Juarez immigration, Edward Juarez Pagliocco, Edward Juarez immigrant

  2. Road Map • The Players • The Weapons • Precision Tactics Edward Juarez immigration, Edward Juarez Pagliocco, Edward Juarez immigrant

  3. The Players • Former Soviet Military - Military industrial complex in Soviet Russia was even more corrupt than their USA counterparts • Russian Mafia - Cybercrime elements are considered “divisions” The actual hackers themselves are kept compartmentalized • Professional Hackers - Paid per the job, usually flat rates • Spammers - They earn millions per year selling their direct mail services • Traditional Mafia - They are currently leaving most of the “work” to others • Basic Cybercrime Organizations - Fluid and change members frequently Edward Juarez immigration, Edward Juarez Pagliocco, Edward Juarez immigrant

  4. The Weapons • Botnets • Phishing • Targeted Viruses • The usual Internet attack tools Edward Juarez immigration, Edward Juarez Pagliocco, Edward Juarez immigrant

  5. Precision Tactics - Hotel • Hacking the PC in the hotel room • Known times when the target is out of the room are especially dangerous • Law enforcement regularly bugs hotel rooms at security conferences • Organized crime outfits *do* attend conferences Edward Juarez immigration, Edward Juarez Pagliocco, Edward Juarez immigrant

  6. Precision Tactics – Office • Posing as regular office personnel • Planting network-based or hardware-based sniffing devices • Conventional listening devices (bugs) are not uncommon Edward Juarez immigration, Edward Juarez Pagliocco, Edward Juarez immigrant

  7. Precision Tactics – Infiltration • Will pose as script kiddies, and “gain skills” fairly quickly, rising in status in various IRC channels • Will join and form hacking groups • Will direct attacks for the group to perform, usually directing blame toward the kiddies rather than themselves • This is not a new technique – it is in use today by some governments, most notably French Intelligence Edward Juarez immigration, Edward Juarez Pagliocco, Edward Juarez immigrant

  8. Edward Juarez immigration, Edward Juarez Pagliocco, Edward Juarez immigrant

More Related