E-Crime & Cybersecurity Benelux 2018

Total Page:16

File Type:pdf, Size:1020Kb

E-Crime & Cybersecurity Benelux 2018 6th December 2018 Amsterdam, The Netherlands Transparency plus transformation: the cybersecurity rubicon Welcome to e-Crime th 6 December 2018 & Cybersecurity Novotel Amsterdam City Benelux 2018 s business moves increasingly to digital 3 Security resilience in the face of evolving channels across Europe, fraud attempts and attacker tradecraft Aother cyber-enabled economic crime are rising Stories from the cyber battlefield. sharply. And recent research has shown that as well CrowdStrike as increasing volumes, there has been an evolution from short, isolated peaks of fraud attacks to more 5 Weighing your threat intelligence options sustained, high-volume attacks across a number of If your organisation is looking to make an days or even weeks. investment in threat intelligence, you’ll need to evaluate what different vendors deliver, how In addition, digital transformation is moving they align with your objectives, and the increasingly to mobile, rather than desktop online, advantage they’ll bring to your security strategy. channels. In Europe, 58% of all transactions now Recorded Future come from mobile devices and growth is accelerating. 7 To understand phishing, look at crimes of These trends pose a huge challenge for business and the past for cybersecurity professionals. Businesses need to Phishing is a modern problem but its roots go go digital and to make digital channels as seamless back hundreds of years. as possible for their customers. But they also need to Cofense keep those transactions, and their customers’ personal data, secure. Cybersecurity is therefore a 11 Voice and the future of personal identification strategic business imperative. Despite the more general upward trend of data breaches and sophisticated cross-channel attacks, It is these topics, and more, that we will be discussing businesses have mostly remained stagnant when th at our 8 annual e-Crime & Cybersecurity Benelux as approaching phone channel security. well as hearing about the latest technologies from Pindrop some of the key providers. But one of the main aims of our events is to facilitate conversation and dialogue. 13 Healthcare beware: crypto-mining, So please, enjoy your event, and take the opportunity malware, and IoT attacks to mingle with colleagues and solution providers. If The healthcare industry is increasingly being you have any questions, please do not hesitate to ask targeted by advanced cyber-attacks. any member of the team. Darktrace Simon Brady | Editor 16 Global financial firm reduces risk of third- party breach with BitSight Security Ratings A leader in commercial banking, this global financial @eCrime_Congress #ecrime18 services firm is no stranger to security risk. BitSight Technologies Editor and Publisher: Forum organiser: Booklet printed by: Simon Brady AKJ Associates Ltd Method UK Ltd e: [email protected] 27 John Street Baird House London WC1N 2BX 15–17 St Cross Street Design and Production: t: +44 (0) 20 7242 7498 London EC1N 8UN Julie Foster e: [email protected] e: [email protected] e: [email protected] © AKJ Associates Ltd 2018. All rights reserved. Reproduction in whole or part without written permission is strictly prohibited. Articles published in this magazine are not necessarily the views of AKJ Associates Ltd. The publishers and authors of this magazine do not bear any responsibility for errors contained within this publication, or for any omissions. This magazine does not purport to offer investment, legal or any other type of advice, and should not be read as if it does. Those organisations sponsoring or supporting e-Crime & Cybersecurity Benelux bear no responsibility, either singularly or collectively, for the content of this magazine. Neither can those organisations sponsoring or supporting e-Crime & Cybersecurity Benelux, either singularly or collectively, take responsibility for any use that may be made of the content contained inside the magazine. e-Crime & Cybersecurity Benelux 2018 1 CONTENTS 19 Sponsors and exhibitors 40 Harness the power of global shared Who they are and what they do. intelligence with the ThreatMetrix Digital Identity Network 24 Agenda Distinguish fraudsters from genuine customers What is happening and when. in real time, throughout the customer journey. ThreatMetrix 28 Education seminars Throughout the day a series of education seminars 42 GDPR needs you to know where your will take place as part of the main agenda. sensitive data is. Do you? Do you know where all your sensitive data is? 31 Speakers and panellists Ground Labs Names and biographies. 45 Why nothing less than complete visibility is 36 A new dawn for data loss prevention enough when the worst happens For more than 10 years, Digital Guardian The surety of knowing precisely what happened, has enabled data-rich organisations to protect how, and what was affected – and knowing it their most valuable assets with a SaaS quickly – is invaluable. deployment model or an outsourced managed Endace security programme. Digital Guardian 47 Duo has the solution The first article discusses restricting users so 38 Threat modelling: The challenge in that they can only enter into an area that is managing risk to both structural and approved & relevant to their duties. The second technical vulnerabilities focusses on Duo’s authentication solution Traditional vulnerability scanning lacks the ability characterised by its simplicity in implementation to see the bigger picture. and operation. foreseeti Duo Security 2 e-Crime & Cybersecurity Benelux 2018 Security resilience in the face of evolving attacker tradecraft Stories from the cyber battlefield. he impact left in the wake of a successful Situational analysis CrowdStrike intrusion can be massive when customer data A commercial services organisation contacted reports Tor other confidential information is stolen, CrowdStrike Services after being hit by the SamSam exposed, changed or deleted. It’s an inescapable ransomware variant, which is commonly associated certainty that where valuable digital assets exist, with xDedic, a Russian-operated darknet forum. The threat actors follow. From the global WannaCry e-crime operators of xDedic have been implicated in a ransomware attack to the destructive stealth number of nation-state attacks against public sector propagation techniques of NotPetya malware, threat organisations (you can read more about them at: actors are continuously adopting new means to https://www.crowdstrike.com/blog/education-darknet- achieve their objectives. hackers-profit-data/ ).3 To keep pace, security stakeholders from CISOs and xDedic operates a market for the selling and buying SOC managers to incident responders must evolve of crimeware and compromised credentials used for their security strategies and ensure resilience in the accessing RDP servers. After xDedic sells access to face of new attacks. Below is real-world case study these compromised RDP servers, they are then used featured in the CrowdStrike Cyber Intrusion Services in attacks against government agencies and other Casebook, 2017. This much anticipated publication commercial targets. offers detailed accounts of some of the cases the CrowdStrike Services incident response (IR) team has Although the organisation had already paid the investigated over the past year, and provides expert, ransom when they contacted CrowdStrike, they real-world analysis and practical guidance that can sought help to prevent the ransomware from further your organisation’s progress toward that goal. spreading to other systems and to determine the original point of entry by the attackers. Drawn from real-life engagements, the Casebook provides valuable insights into the evolving tactics, The CrowdStrike Services team first verified the techniques, and procedures (TTPs) used by today’s exact ransomware variant used in the attack. Notably, most sophisticated adversaries. It also describes the the variant involved automatically encrypts files on strategies the CrowdStrike Services team used to the victim’s network – a common ransomware tactic quickly investigate, identify and effectively remove – however, it doesn’t give the attacker the ability to dangerous threats from victims’ networks. access, acquire or exfiltrate data from the network. One key trend the CrowdStrike team observed is that The team observed that the adversary used Sticky the lines between nation-state sponsored attack Keys to launch brute-force attacks and gain RDP login groups and e-crime threat actors continue to blur. As credentials so they could move about the victim’s part of this trend, the increase in criminal hackers environment freely. Sticky Keys is a Windows Ease of using fileless attacks and ‘living off the land’ Access feature that enables keyboard shortcuts. techniques has been especially pronounced. This Once compromised, it can provide an adversary uptick in fileless attacks is also documented and system-level access without needing to authenticate independently verified in a recent report and provided the attackers with an effective from Ponemon Research .1 Fileless attacks include persistence mechanism. exploiting processes that are native to the Windows operating system such as PowerShell and Windows Other fileless or ‘living off the land’ TTPs tied to Management Instrumentation (WMI). ‘Living off the xDedic that the investigators found included land’ describes how adversaries move within the compromised privileged accounts and network login victim’s environment once they gain access, often brute-force
Recommended publications
  • Stages of Postmortem Decomposition
    METHODS FOR ESTIMATION OF TIME OF DEATH RATE METHODS (i.e. estimation of tree’s age by height / rate of growth) - Rate of drying or discoloration of blood pools - Rigor Mortis - Livor Mortis - Algor Mortis - Decomposition - Flora (plants) around body - Fauna (insects) around body CONCURRENCE METHODS (i.e. estimation of tree’s age by counting rings) - Bloodstain vs. tire - Time of last know meal - Stopping of watch - Depth of footprint in snow - Depth of rainwater collected EVIDENCE FOR ESTIMATION OF TIME OF DEATH 1. CORPORAL EVIDENCE - In the body 2. ENVIRONMENTAL AND ASSOCIATED EVIDENCE - In the vicinity and general surroundings 3. ANAMNESTIC EVIDENCE - Based on the decedent’s ordinary habits and daily activities Envir. and Assoc. Corporal Evidence Evidence Anamnestic Evidence - stage of decomp of organs - uncollected milk, mail, - usual activities vs. exterior newspapers - soot in airway - lights on / off - walking and sleeping patterns - medical conditions (ASCVD, pre surgery) - alarm clock set - eating habits, times, type of foods - alcohol / drug levels - food on stove / in refrig - appointment - beard, nails, hair - type of clothing day / night indoors / outdoor seasonal (remote deaths) condition of clothing (mold, leached dyes) - sales slips, receipts - animals in house Use a combination of all evidence available to you, giving weight to the more reliable / documentable. Be suspicious when some factors seem to vary considerably from the others. STAGES OF POSTMORTEM DECOMPOSITION 1. Blue-green discoloration of skin RLQ and LLQ abdomen 24 hrs Entire abdomen 36 hrs 2. Marbling (Green-black discoloration in blood vessel distribution- hemolyzed blood reacts with hydrogen sulfide. Extravasation diffusion (leads to generalized dark purple-black skin 3.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Investment Swindles and Con Schemes I. Introduction
    INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION ........................................................................................................................................... 1 II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 4 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ............................................................................................................................................................... 8 Bonds ......................................................................................................................................................................
    [Show full text]
  • Css241 Course Title: Basic Security and Security Threats
    CSS 241 BASIC SECURITY AND SECURITY THREATS NATIONAL OPEN UNIVERSITY OF NIGERIA COURSE CODE :CSS241 COURSE TITLE: BASIC SECURITY AND SECURITY THREATS 1 CSS 241 BASIC SECURITY AND SECURITY THREATS COURSE GUIDE CSS241 BASIC SECURITY AND SECURITY THREATS Course Developer/Writer Monsuru Adegboyega Kasali Non-Violence and Intercultural Communication Advocacy Initiatives, Ibadan, Nigeria Course Editor Rasidi Okunola, Ph. D Department of Sociology University of Ibadan Oyo State Course Coordinator Adeniyi T. Adegoke, Ph.D Criminology and Security Studies School of Arts and Social Sciences National Open University of Nigeria Programme Leader Prof. Abdul-Rasheed Yesufu Dean, School of Arts and Social Sciences National Open University of Nigeria 2 CSS 241 BASIC SECURITY AND SECURITY THREATS NATIONAL OPEN UNIVERSITY OF NIGERIA National Open University of Nigeria Headquarters 14/16 Ahmadu Bello Way Victoria Island Lagos Abuja Office No. 5 Dar es Salam Street Off Aminu Kano Crescent Wuse II, Abuja Nigeria e-mail: [email protected] URL: www.nou.edu.ng Published by National Open University of Nigeria Printed ISBN: All Rights Reserved CONTENTS PAGE Introduction……………………………………..………....i-ii What You Will Learn in this Course ...................................ii Course Aims…………………………………………..... ..ii-iii Course Objectives……………………………………… …iii-iv Working through this Course ...............................................iv Course Materials……………………………….………. …v 3 CSS 241 BASIC SECURITY AND SECURITY THREATS Study Units…………………………………….………. …v-vi Textbooks and References…………….……….……… ….vi-vii Assignment File ………………………………………. ….vii Assessment ………………………………….………. ……viii Tutor-Marked Assignment……………………………. …..viii Final Examination and Grading…………………..……. …viii Course Marking Scheme ………………………………. …viii Course Overview ………………………………………. …viii-ix Presentation Schedule …………………………………. …x How to Get the Most from this Course ……………………x Reading Section.....................................................................x-xi Facilitators/Tutors and Tutorials ……………………….
    [Show full text]
  • Learning Goals Contained in the POST Basic Course Performance Objective Document
    If you have issues viewing or accessing this file, please contact us at NCJRS.gov. >. j i . I . .. , BASIC COURSE UNIT GUIDE ( __9 _) , . [~ _________________C_R_I_M_E_S __ A_G_A_I_N_S_T __ P_R_O_P_E_R_T_Y __ ________________-'J This unit guide covers the following learning goals contained in the POST Basic Course performance objective document: 3.9.0 Theft Law 3.11.0 Embezzlement Law 3.12.0 Forgery/Fraud Law 3.13.0 Burglary Law r 3.14.0 Receiving Stolen Property Law 3.15.0 Malicious Mischief Law •• 3.16.0 Arson Law Revised October 1990 THE COMMISSION ,dJ ON PEACE OFfiCER STANDARDS AND TRA./INING . • • 0 • STATEOf~ALlFORNJA ., 131385 U.S. Department of Justice Netlonellnstltute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the National Institute of • Justice. Permission to reproduce this copyrighted material in mi­ crofiche only has been granted by California Commission on Peace Officer 8tanoards and Trainina to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permis· sion of the copyright owner. This unit of instruction is designed as a guideline for Performance Objective-based law enforcement basic training. This unit is part of the POST Basic Course Guidelines system developed by California law enforcement trainers and criminal justice . • educators for the California Commission on Peace Officer Standards and Training. This Guide is designed to assist the instructor in developing an appropriate lesson plan to cover the performance objectives, which are required as minimum content of the Basic Course .
    [Show full text]
  • DATCP 2015 Cyber Security Awareness Month Daily Tips
    DATCP 2015 Cyber Security Awareness Month Daily Tips Thursday, 10/1. Fresh start for the month – change your passwords frequently Cyber Security Awareness Month, Tip #1: New month…new passwords It’s the first of the month! Change your online passwords today and use a long combination of numbers, letters and special characters. For best protection, do this on a regular basis, and keep a totally different password for your email. Why? You’ll find out here tomorrow! #CyberAware Friday, 10/2. Protect your email account Cyber Security Awareness Month, Tip #2: Protect your email account Remember yesterday when we said to use a completely different password style for your email versus what you use for your other online accounts? Many websites send password update and account access emails to consumers, so getting a hold of these emails could potentially give a hacker access to all of your online accounts. Your email password should be the toughest to decode. #CyberAware Saturday, 10/3. Run a free computer security check Cyber Security Awareness Month, Tip #3: Run a free computer security check Happy Saturday! Start out CSAMonth with a clean sweep of your computer system. At the end of the month, sweep it again and make a plan to do so regularly. StaySafeOnline.org has a listing of free, trusted security check services here: https://www.staysafeonline.org/sta…/free-security-check-ups/. #CyberAware Sunday, 10/4. Backup your contacts, photos, videos, music, documents and more Cyber Security Awareness Month, Tip #4: Backup, backup, backup Halloween is scary. But do you know what's scarier? Losing all of your important files and your collection of photos, music and videos.
    [Show full text]
  • 145626NCJRS.Pdf
    If you have issues viewing or accessing this file contact us at NCJRS.gov. BASIC COURSE INSTRUCTOR UNIT GUIDE (_-.;:6::.....-) C~ C_R_I_M_E_S_A_G_A_IN_S_T_P_R_O_P_ER_TY___________ ) _________ 145626 U.S. Department of Justice National Institute of Justice This document has been reproduced exactly as received from the person or organization originating it. Points of view or opinions stated in this document are those of the authors and do not necessarily represent the official position or policies of the National Institute of Justice. Permission to reproduce this copyrighted material has been g~~~i¥ornia commission on Peace OffJ.cer standards & TraJ.nJ.ng to the National Criminal Justice Reference Service (NCJRS). Further reproduction outside of the NCJRS system requires permission of the copyright owner. • The curricula contained in this document is de$igned as a guideline for the delivery of performance-based law enforcement training, It is part of the POST Basic Course guidelines system developed by California law enforcement trainers and criminal justice educators in cooperation with the California Commission on Peace Officer Standards and Training. The training specifications referenced herein express the •• required minimum content of this domain, .,' • 1· ______ _ II UNIT GUIDE 6 • TABLE OF CONTENTS LEARNING DOMAIN 6 Crimes Against Property Page Knowledge Domain 6 (POSTRAC·tested) 3.9.1 Theft ... , . 1 3.9.2 Defrauding an Innkeeper ........................... 9 3.9.3 Appropriation of Lost Property ........................ 11 3.11.1 Embezzlement .................................. 13 3.12.1 Forgery. 15 3.12.2 Fraud ........... '. 17 3.13.1 Unauthorized Entry of Property ...................... 19 3.13.2 Burglary ....................................... 21 • 3.13.4 Possession of Burglary Tool$ .
    [Show full text]
  • White-Collar Crime White-Collar Crime the Classic Statement
    WHITE-COLLAR CRIME WHITE-COLLAR CRIME THE CLASSIC STATEMENT • White-collar crime: crime committed by those within legitimate occupations or organizations. • The concept of white-collar crime was first introduced in the social sciences by Edwin Sutherland in 1939. • He described white-collar crime as “a crime committed by a person of respectability and high social status in the course of his occupation”. • Sutherland’s investigation using records of regulatory agencies, courts, and commissions found that of the 70 largest industrial and mercantile corporations studied over a 40-year period, every one violated at least one law and had an adverse decision made against it for false advertising, patent abuse, wartime trade violations, price fixing, fraud, or the intended sale of faulty goods. WHITE-COLLAR CRIME THE CLASSIC STATEMENT • According to Sutherland (1949), while “crime in the streets” attracts headlines and police attention, the extensive and far more costly “crime in the suites” proceeds relatively unnoticed. • White-collar crimes cost several times more than other crimes put together but in most cases, they are not treated under the criminal law. • White-collar crime differs from lower-class criminality only in the implementation of criminal law that segregates white-collar criminals administratively from other criminals (Sutherland, 1949). • The status of the offender rather than the legal uniqueness of the crime is most important. WHITE-COLLAR CRIME RELATED CONCEPTS • In 1907, Ross coined the term “criminaloids” to refer to those who prospered by shameful practices which may not yet come under the ban of public opinion. • Ross viewed offenders as morally insensible and concerned with success but not with the proper means of achieving it.
    [Show full text]
  • Investment Swindles and Con Schemes
    INVESTMENT SWINDLES AND CON SCHEMES GLOBAL HEADQUARTERS • THE GREGOR BUiLDinG 716 WEST AvE • AUSTin, TX 78701-2727 • USA INVESTMENT SWINDLES AND CON SCHEMES TABLE OF CONTENTS I. INTRODUCTION II. INVESTMENT SWINDLES AND CON SCHEMES OVERVIEW Who Are the Perpetrators and Victims of These Schemes? .............................................................................. 3 Why Do the Perpetrators Commit These Con Schemes? .................................................................................. 3 Video ...................................................................................................................................................................... 4 Why Do Consumers Become Victims to These Schemes? ................................................................................ 4 What Are the Red Flags That Characterize These Con Schemes? .................................................................... 5 How Are These Con Schemes Executed? ............................................................................................................. 5 Effects on Consumers .............................................................................................................................................. 6 Review Questions ..................................................................................................................................................... 7 III. INVESTMENT SCHEMES Introduction ..............................................................................................................................................................
    [Show full text]
  • Priority Development Assistance Fund Scam
    Priority Development Assistance Fund scam From Wikipedia, the free encyclopedia The Priority Development Assistance Fund scam, also called the PDAF scam or the pork barrel scam, is a political scandal involving the alleged misuse by several members of the Congress of the Philippines of their Priority Development Assistance Fund (PDAF, popularly called "pork barrel"), a lump-sum discretionary fund granted to each member of Congress for spending on priority development projects of the Philippine government, mostly on the local level. The scam was first exposed in the Philippine Daily Inquirer on July 12, 2013,[1] with the six-part exposé of the Inquireron the scam pointing to businesswoman Janet Lim-Napoles as the scam's mastermind after Benhur K. Luy, her second cousin and former personal assistant, was rescued by agents of theNational Bureau of Investigation on March 22, 2013, four months after he was detained by Napoles at her unit at the Pacific Plaza Towers in Fort Bonifacio.[2] Initially centering on Napoles' involvement in the 2004 Fertilizer Fund scam, the government investigation on Luy's testimony has since expanded to cover Napoles' involvement in a wider scam involving the misuse of PDAF funds from 2003 to 2013. It is estimated that the Philippine government was defrauded of some ₱10 billion in the course of the scam,[1] having been diverted to Napoles, participating members of Congress and other government officials. Aside from the PDAF and the fertilizer fund maintained by the Department of Agriculture, around ₱900 million
    [Show full text]
  • Confidence Trick
    Confidence trick A confidence trick is an attempt to defraud a person or group after first gaining their trust. Confidence tricks exploit victims using their credulity, naïveté, compassion, vanity, irresponsibility, and greed. Researchers have defined confidence tricks as "a distinctive species of fraudulent conduct ... intending to further voluntary exchanges that are not mutually beneficial", as they "benefit con operators ('con men') at the expense of their victims (the 'marks')".[1] Political cartoon by JM Staniforth: Herbert Kitchener attempts to raise Contents £100,000 for a college in Sudan by calling on the name of Charles Terminology George Gordon Short and long cons Stages of the con Vulnerability factors See also In films Further reading External links References Terminology Synonyms include con, confidence game, confidence scheme, ripoff, scam, and stratagem. The perpetrator of a confidence trick (or "con trick") is often referred to as a confidence (or "con") man, con-artist, or a "grifter". Samuel Thompson (1821–1856) was the original "confidence man". Thompson was a clumsy swindler who asked his victims to express confidence in him by giving him money or their watch rather than gaining their confidence in a more nuanced way. A few people trusted Thompson with their money and watches.[2] Thompson was arrested in July 1849. Reporting about this arrest, Dr. James Houston, a reporter of the New York Herald, publicized Thompson by naming him the "Confidence Man".[2] Although Thompson was an unsuccessful scammer, he gained the reputation as a genius operator mostly because Houston's satirical tone wasn't understood as such.[2] The National Police Gazette coined the term "confidence game" a few weeks after Houston first used the name "confidence man".[2] A confidence trick is also known as a con game, a con, a scam, a grift, a hustle, a bunko (or bunco), a swindle, a flimflam, a gaffle, or a bamboozle.
    [Show full text]
  • Community Policing: Immigration
    Law Enforcement Executive FORUM Community Policing: Immigration November 2007 Law Enforcement Executive Forum Illinois Law Enforcement Training and Standards Board Executive Institute Western Illinois University 1 University Circle Macomb, IL 61455-1390 Senior Editor Thomas J. Jurkanin, PhD Editor Vladimir A. Sergevnin, PhD Associate Editors Jennifer Allen, PhD Department of Law Enforcement and Justice Administration, Western Illinois University Barry Anderson, JD Department of Law Enforcement and Justice Administration, Western Illinois University Tony Barringer, EdD Division of Justice Studies, Florida Gulf Coast University Lewis Bender, PhD Department of Public Administration and Policy Analysis, Southern Illinois University at Edwardsville Michael Bolton, PhD Chair, Department of Criminal Justice and Sociology, Marymount University Dennis Bowman, PhD Department of Law Enforcement and Justice Administration, Western Illinois University Becky K. da Cruz Criminal Justice and Law and Society, Armstrong Atlantic State University Jose de Arimateia da Cruz Political Science and Comparative Politics, Armstrong Atlantic State University Weysan Dun Special Agent-in-Charge, FBI, New York Division Kenneth Durkin, MD Department of Law Enforcement and Justice Administration, Western Illinois University Larry Hoover, PhD Director, Police Research Center, Sam Houston State University William Lewinski, PhD Director, Force Science Research Center, Minnesota State University William McCamey, PhD Department of Law Enforcement and Justice Administration, Western Illinois University John Millner State Senator of 28th District, Illinois General Assembly Stephen A. Morreale, DPA School of Public Policy and Administration/Criminal Justice, Walden University Gregory Boyce Morrison Department of Criminal Justice and Criminology, Ball State University Michael J. Palmiotto Wichita State University Law Enforcement Executive Forum • 2007 • 7(7) Associate Editors (cont.) Gene L.
    [Show full text]