Financial Fraud and Internet Banking

Total Page:16

File Type:pdf, Size:1020Kb

Financial Fraud and Internet Banking Report Financial Fraud and Internet Banking: Threats and Countermeasures By François Paget, McAfee® Avert® Labs Report Financial Fraud and Internet Banking: Threats and Countermeasures Table of Contents Some Figures 3 U.S. Federal Trade Commission Statistics 3 CyberSource 4 Internet Crime Complaint Center 4 In Europe 5 The Many Faces of Fraud 6 Small- and large-scale identity theft 7 Carding and skimming 8 Phishing and pharming 8 Crimeware 9 Money laundering 10 Mules 10 Virtual casinos 11 Pump and dump 12 Nigerian advance fee fraud (419 fraud) 12 Auctions 14 Online shopping 16 Anonymous payment methods 17 Protective Measures 18 Scoring 18 Europay, MasterCard, and Visa (EMV) standard 18 PCI DSS 19 Secure sockets layer (SSL) and transport secured layer (TLS) protocols 19 SSL extended validation 20 3-D Secure technology 21 Strong authentication and one-time password devices 22 Knowledge-based authentication 23 Email authentication 23 Conclusion 24 About McAfee, Inc. 26 Report Financial Fraud and Internet Banking: Threats and Countermeasures Financial fraud has many faces. Whether it involves swindling, debit or credit card fraud, real estate fraud, drug trafficking, identity theft, deceptive telemarketing, or money laundering, the goal of cybercriminals is to make as much money as possible within a short time and to do so inconspicuously. This paper will introduce you to an array of threats facing banks and their customers. It includes some statistics and descriptions of solutions that should give readers—whether they are responsible for security in a financial organization or a customer—an overview of the current situation. Some Figures U.S. Federal Trade Commission Statistics In the United States, many observers have been trying for several years to prove that financial fraud is stabilizing or decreasing. The U.S. Federal Trade Commission (FTC) is responsible for protecting consumers and monitoring competition. Its annual reports show a leveling off in the number of complaints between 2004 and 2006.1 In 2007, however, the figures increased slightly.2 All three FTC indicators are now on the rise. 500,000 450,000 400,000 350,000 300,000 250,000 200,000 Number of Complaints 150,000 100,000 50,000 0 2000 2001 2002 2003 2004 2005 2006 2007 est. 2008 Identity Theft Complaints Internet-Related Fraud Complaints Other Fraud Complaints Figure 1: Annual consumer statistics from the U.S. Federal Trade Commission for consumers. (Source: FTC) In 2008, the FTC no longer separated Internet-related fraud complaints from the total.3 Figure 2 shows its new breakdown. For 2008, only 58 percent of all fraud complaints reported the method of initial contact. Of those complaints, 52 percent cited email, while another 11 percent started with an Internet website. Only 7 percent of consumers who provided statistics reported the telephone as the initial point of contact. 1. Consumer Fraud and Identity Theft Complaint Data: Year 2004: http://www.consumer.gov/sentinel/pubs/Top10Fraud2004.pdf Year 2005: http://www.consumer.gov/sentinel/pubs/Top10Fraud2005.pdf Year 2006: http://www.consumer.gov/sentinel/pubs/Top10Fraud2006.pdf 2. Year 2007: http://www.consumer.gov/sentinel/pubs/Top10Fraud2007.pdf 3. Consumer Fraud and Identity Theft Complaint Data: Year 2008. http://www.ftc.gov/sentinel/reports/sentinel-annual-reports/sentinel-cy2008.pdf 3 Report Financial Fraud and Internet Banking: Threats and Countermeasures CY-2006 CY-2007 CY-2008 Contact Method Complaints Percentages* Complaints Percentages* Complaints Percentages* Internet—Email 138,195 45% 152,131 50% 193,817 52% Mail 50,317 16% 42,330 14% 51,837 14% Internet—Website/Others 46,687 15% 45,447 15% 40,596 11% Phone 39,365 13% 33,733 11% 26,067 7% Other 31,722 10% 33,481 11% 57,695 16% Total Reporting 306,286 307,122 370,012 Contact Method * Percentages are based on the total number of CSN fraud complaints for each calendar year where consumers reported the company’s method of initial contact: CY-2006 = 306,286; CY-2007 = 207,122; and CY-2008 = 370,012. 58% of consumers reported this information during CY-2008. 71% and 53% for CY-2006 and CY-2007, respectively. Figure 2: Consumer Sentinel Network fraud complaints by contact method. (Source: CSN) CyberSource Fraud as a percentage of online revenue—in the United States and Canada combined—has decreased over the past few years. It stabilized at 1.4 percent three years ago, according to CyberSource, an electronic payment and security vendor. Overall revenue losses have nevertheless shown a marked increase. As the growth of online sales slowed during 2008, recorded losses are estimated at US$4 billion for the American market alone. This is an increase of 11 percent in value, after a 20 percent rise the previous year.4 Online Revenue Loss Due to Fraud % Revenue Lost to Online Fraud $4B in 2008 4.0% $4.5 3.5% $4.0 3.6% $4.0 $3.5 3.0% $3.6 3.2% $3.0 2.5% 2.9% $2.5 $3.0 2.0% $2.8 $2.6 $2.0 1.5% $2.1 1.8%% $1.5 $1.9 1.7%% $1.7 1.6%% % of Online Revenue Lost % of Online Revenue Lost 1.0% $1.5 1.6%% 1.6%% 1.6%% $1.0 0.5% $0.5 0% $0.0 2000 2001 2002 2003 2004 2005 2006 2007 2008 2000 2001 2002 2003 2004 2005 2006 2007 2008 n=132 n=220 n=343 n=333 n=348 n=404 n=353 n=294 n=399 Although the rate of revenue loss due to online payment fraud was stable in 2008, total dollars lost to fraud have increased due to online sales growth. Figure 3: Payment fraud statistics for the American market. Although the rate of revenue loss due to online payment fraud was stable in 2008, total dollars lost to fraud have increased due to online sales growth. (Source: CyberSource 10th Annual Online Fraud Report) Internet Crime Complaint Center The Internet Crime Complaint Center,5 working in partnership with the U.S. Federal Bureau of Investigation (FBI) and the National White Collar Crime Center, also collects data. In 2008, Americans filed 33.1 percent more complaints than in 2007, and the total amount of money stolen online reached a historic record. The claims center registered almost 275,000 complaints, representing a loss of US$265 million, or 10.6 percent more than in 2007. 4. CyberSource. 10th Annual, 2009 Edition, “Online Fraud Report.” http://forms.cybersource.com/forms/FraudReport2009NACYBSwww020309 5. Internet Crime Complaint Center, “2008 Internet Crime Report” http://www.nw3c.org/downloads/2008_IC3_Annual%20Report_3_27_09_small.pdf 4 Report Financial Fraud and Internet Banking: Threats and Countermeasures 2008 Yearly Dollar Loss (in millions) Referred Complaints $280 $264.59 $260 $239.09 $240 $220 $198.44 $200 $183.12 $180 $160 $140 $125.60 $120 Yearly Comparison Complaints Received via the IC3 Website $100 $80 $68.14 $60 $54.00 $40 300,000 275,284 $20 $17.80 $0 250,000 231,493 207,449 206,884 2001 2002 2003 2004 2005 2006 2007 2008 200,000 150,000 124,515 100,000 75,064 2008 Yearly Comparison Referrals 50,412 50,000 16,838 120,000 103,959 0 100,000 96,731 2000 2001 2002 2003 2004 2005 2006 2007 2008 86,279 90,008 80,000 70,553 72,940 60,000 28,252 40,000 20,000 4,810 0 2001 2002 2003 2004 2005 2006 2007 2008 Figure 4: Internet Crime Complaint Center statistics for America. (Source: IC3 2008 Internet Crime Report) Half of all cases involved a monetary loss of less than $1,000. One-third (33.7 percent) of those filing complaints reported losses between $1,000 and $5,000. Only 15 percent indicated a loss greater than $5,000. Complaint Type % of Reported Total Loss Average Loss per Complaint Reporting a Loss Check Fraud 7.8 $3,000 Confidence Fraud 14.4 $2,000 Nigerian Letter Fraud 5.2 $1,650 Computer Fraud 3.8 $1,000 Non-Delivery (Merchandise and Payment) 28.6 $800 Auction Fraud 16.3 $610 Credit/Debit Card Fraud 4.7 $223 Figure 5: Amounts lost to fraud, by type, for U.S. individuals reporting a loss. (Source: IC3 2008 Internet Crime Report) Auction fraud and the failure to deliver purchases are the most widely reported complaints. Other complaints relate to credit card fraud or even advance-fee fraud (scam). Email and web pages are the two main mechanisms for approaching victims. We find that a frequently reported scam concerns the purchase or sale of pets. The majority of complaints come from men. Nearly half are 30 to 50 years old, and one-third of them live in one of the four most populated states in the United States: California, Florida, Texas, and New York. In Europe During the same period (2004 to 2007) and consistent with the overall North American figures, the Association for Payment Clearing Services statistics also showed a decrease in online banking fraud. In Great Britain, the sharp rise in 2006 did not continue the following year. The figures for 2007 were even lower than the 2005 figures. This note of optimism is greatly tempered today by the results from the first half of 2008, which show a 185 percent increase compared to last year.6 6. APACS, “APACS announces latest fraud figures.” http://www.apacs.org.uk/APACSannounceslatestfraudfigures.htm 5 Report Financial Fraud and Internet Banking: Threats and Countermeasures January–June January–June January–June January–June January–June Increase, 2004 2005 2006 2007 2008 2007–2008 Online banking fraud losses £4 £14.5 £22.4 £7.5 £21.4 185% (in millions) Phishing 126 312 5,087 7,224 20,682 186% incidents “Mule” recruitment NA 196 468 655 873 33% offers Figure 6: Online banking fraud, phishing, and money mule advertisements in the United Kingdom.
Recommended publications
  • The Economics of Cryptocurrency Pump and Dump Schemes
    The Economics of Cryptocurrency Pump and Dump Schemes JT Hamrick, Farhang Rouhi, Arghya Mukherjee, Amir Feder, Neil Gandal, Tyler Moore, and Marie Vasek∗ Abstract The surge of interest in cryptocurrencies has been accompanied by a pro- liferation of fraud. This paper examines pump and dump schemes. The recent explosion of nearly 2,000 cryptocurrencies in an unregulated environment has expanded the scope for abuse. We quantify the scope of cryptocurrency pump and dump on Discord and Telegram, two popular group-messaging platforms. We joined all relevant Telegram and Discord groups/channels and identified nearly 5,000 different pumps. Our findings provide the first measure of the scope of pumps and suggest that this phenomenon is widespread and prices often rise significantly. We also examine which factors affect the pump's \suc- cess." 1 Introduction As mainstream finance invests in cryptocurrency assets and as some countries take steps toward legalizing bitcoin as a payment system, it is important to understand how susceptible cryptocurrency markets are to manipulation. This is especially true since cryptocurrency assets are no longer a niche market. The market capitaliza- tion of all cryptocurrencies exceeded $800 Billion at the end of 2017. Even after the huge fall in valuations, the market capitalization of these assets is currently around $140 Billion. This valuation is greater than the fifth largest U.S. commer- cial bank/commercial bank holding company in 2018, Morgan Stanley, which has a market capitalization of approximately $100 Billion.1 In this paper, we examine a particular type of price manipulation: the \pump and dump" scheme. These schemes inflate the price of an asset temporarily so a ∗Hamrick: University of Tulsa, [email protected].
    [Show full text]
  • What Every CEO Needs to Know About Cybersecurity
    What Every CEO Needs to Know About Cybersecurity Decoding the Adversary AT&T Cybersecurity Insights Volume 1 AT&T Cybersecurity Insights: Decoding the Adversary 1 Contents 03 Letter from John Donovan Senior Executive Vice President AT&T Technology and Operations 04 Executive Summary 05 Introduction 07 Outsider Threats 15 Looking Ahead: Outsider Threats 16 Best Practices: Outsiders 18 Insider Threats 24 Looking Ahead: New Potential Threats 25 Looking Ahead: Emerging Risks 26 Best Practices: Malicious Insiders 27 Best Practices: Unintentional Insiders 28 Moving Forward 32 Conclusion 33 Know the Terms For more information: Follow us on Twitter @attsecurity 35 End Notes and Sources Visit us at: Securityresourcecenter.att.com © 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T Globe logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. The information contained herein is not an offer, commitment, representation or warranty by AT&T and is subject to change. 2 ATT.com/network-security Business leader, Welcome to the inaugural issue of AT&T Cybersecurity Insights, a comprehensive look at our analysis and findings from deep inside AT&T’s network operations groups, outside research firms, and network partners. This first issue, “Decoding the Adversary,” focuses on whether or not you and your board of directors are doing enough to protect against cyber threats. Security is not simply a CIO, CSO, or IT department issue. Breaches, leaked documents, and cybersecurity attacks impact stock prices and competitive edge. It is a responsibility that must be shared amongst all employees, and CEOs and board members must proactively mitigate future challenges.
    [Show full text]
  • Clickjacking
    Security Now! Transcript of Episode #168 Page 1 of 18 Transcript of Episode #168 ClickJacking Description: Steve and Leo discuss yet another challenge to surfing safely in the web world: Known as "ClickJacking," or more formally as "UI Redressing," this class of newly popular threats tricks web users into performing web-based actions they don't intend by leading them to believe they are doing something else entirely. High quality (64 kbps) mp3 audio file URL: http://media.GRC.com/sn/SN-168.mp3 Quarter size (16 kbps) mp3 audio file URL: http://media.GRC.com/sn/sn-168-lq.mp3 INTRO: Netcasts you love, from people you trust. This is TWiT. Leo Laporte: Bandwidth for Security Now! is provided by AOL Radio at AOL.com/podcasting. This is Security Now! with Steve Gibson, Episode 168 for October 30, 2008: Clickjacking. It's time for Security Now!, the show where we cover everything you'd ever want to know about security. And we do it with a guy who is the king, really, as far as I'm concerned, the man who discovered spyware, named spyware, wrote some of the most used security utilities out there, including ShieldsUP!, Mr. Steve Gibson of GRC.com. Hi, Steve. Steve Gibson: Yes, in fact sometimes we're discussing things that you'd rather wish weren't the case. I mean... Leo: Well, lately it's been kind of bleak because it's like, there's bad stuff, and there doesn't really seem like there's any cure. Steve: Yes, that's true.
    [Show full text]
  • Complete Guide for Trading Pump and Dump Stocks
    Complete Guide for Trading Pump and Dump Stocks Pump and dump stocks make me sick and just to be clear I do not trade these setups. When I look at a stock chart I normally see bulls and bears battling to see who will come out on top. However, when I look at a pump and dump stock it just saddens me. For those of you that watched the show Spartacus, it’s like when Gladiators have to fight outside of the arena and in dark alleys. As I see the sharp incline up and subsequent collapse, I think of all the poor souls that have lost IRA accounts, college savings and down payments for their homes. Well in this article, I’m going to cover 2 ways you can profit from these setups and clues a pump and dump scenario is taking place. Before we hit the two strategies, let’s first ground ourselves on the background of pump and dump stocks. What is a Pump and Dump Stock? These are stocks that shoot up like a rocket in a short period of time, only to crash down just as quickly shortly thereafter. The stocks often come out of nowhere and then the buzz on them reaches a feverish pitch. We can break the pump and dump down into three phases. Pump and Dump Phases Phase 1 – The Markup Every phase of the pump and dump scheme are challenging, but phase one is really tricky. The ring of thieves need to come up with an entire plan of attack to drum up excitement for the security but more importantly people pulling out their own cash.
    [Show full text]
  • Exploring Stakeholder Mobilization in the Instance of Corporate Fraud and Ponzi Schemes
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by OPUS: Open Uleth Scholarship - University of Lethbridge Research Repository University of Lethbridge Research Repository OPUS http://opus.uleth.ca Theses Business, Dhillon School of 2011 Get mad, stay mad : exploring stakeholder mobilization in the instance of corporate fraud and Ponzi schemes McCormick, Cameron Anthony Lethbridge, Alta. : University of Lethbridge, Faculty of Management, c2011 http://hdl.handle.net/10133/3248 Downloaded from University of Lethbridge Research Repository, OPUS GET MAD, STAY MAD: EXPLORING STAKEHOLDER MOBILIZATION IN THE INSTANCE OF CORPORATE FRAUD AND PONZI SCHEMES Cameron Anthony McCormick Bachelor of Commerce in Cooperative Education, University of Alberta, 2003 A Thesis Submitted to the School of Graduate Studies of the University of Lethbridge in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE IN MANAGEMENT Faculty of Management University of Lethbridge LETHBRIDGE, ALBERTA, CANADA © Cameron McCormick, 2011 Dedication This thesis is the result of an off the cuff remark she made on our very first date; therefore, I dedicate this to my darling wife: Krista. Without your love, kindness and support, I never would have started this journey, let alone finish it. I love you and thank- you for believing in me when no one else did. iii Abstract Using a multi-case study, three Ponzi schemes were investigated: Road2Gold, Bernie Madoff’s empire, and the Earl Jones affair. This grounded study used an inductive bottom-up methodology to observe and describe stakeholder mobilization in reaction to corporate fraud. This research on stakeholder behaviour in Ponzi schemes articulates new theory for describing stakeholder behaviour and possible determinants for successful mobilization to action.
    [Show full text]
  • Today's Fraud Threats: Hackers, Rings, and Mobs
    Reducing Risks; What you need to know about Payment Fraud Wells Fargo Customer Training © 2016 Wells Fargo Bank, N.A. All rights reserved. For public use. Agenda . Fraud trends . Online account takeover fraud . Impostor fraud . Call to action 1 Remain vigilant in payment fraud 72% 42% 48% of organizations of them report of organizations were experienced that the number exposed to wire attempted or actual of fraud incidents fraud– a significant payments fraud increased increase from the previous survey Source: 2016 AFP Payments Fraud and Control Survey 2 Online account takeover fraud What is account takeover fraud? 3 Social engineering strategies Classic phishing Email messages sent to large populations designed to obtain confidential information Emails purport to be from trustworthy sources with which victims have established relationships Vishing and smishing Spear-phishing Vishing is where fraudsters Targeted phishing attack connect with their victims via directed at a small group phone of potential victims Smishing is when a fraudulent Emails are focused, have a text message is sent to the high degree of believability victim and a high open rate 4 Phishing successes explained Cybercriminal excellence Social media explosion Accurate logos, professionally Users are sharing an alarmingly written communications, amount of information through personalization of content increase social media platforms believability Provides criminals with the fodder Targets are more likely to click on necessary to construct the links and/or open attachments, personalized and believable which download malware messages Credulous users Users are the first line of defense, yet organizations do not have robust training programs to heighten users’ sensitivity to phishing attempts Bottom Line: Phishing attempts are becoming more challenging and more difficult to address 5 1 in 244 Email malware rate Source: Symantec Internet Security Threat Report, Volume 20, April 2015 Malware improvements Malware has evolved to where it can now: .
    [Show full text]
  • A Semi-Automated Security Advisory System to Resist Cyber-Attack in Social Networks
    A Semi-Automated Security Advisory System to Resist Cyber-attack in Social Networks Samar Muslah Albladi and George R S Weir University of Strathclyde, Glasgow G1 1XH, UK {samar.albladi; george.weir}@strath.ac.uk Abstract. Social networking sites often witness various types of social engi- neering (SE) attacks. Yet, limited research has addressed the most severe types of social engineering in social networks (SNs). The present study in- vestigates the extent to which people respond differently to different types of attack in a social network context and how we can segment users based on their vulnerability. In turn, this leads to the prospect of a personalised security advisory system. 316 participants have completed an online-ques- tionnaire that includes a scenario-based experiment. The study result re- veals that people respond to cyber-attacks differently based on their de- mographics. Furthermore, people’s competence, social network experience, and their limited connections with strangers in social networks can decrease their likelihood of falling victim to some types of attacks more than others. Keywords: Advisory System, Social Engineering, Social Networks. 1 Introduction Individuals and organisations are becoming increasingly dependent on working with computers, accessing the World Wide Web and, more importantly, sharing data through virtual communication. This makes cyber-security one of today’s greatest issues. Pro- tecting people and organisations from being targeted by cybercriminals is becoming a priority for industry and academia [1]. This is due to the huge potential damage that could be associated with losing valuable data and documents in such attacks. Previous research focuses on identifying factors that influence people’s vulnerability to cyber-attack [2] as the human has been characterised as the weakest link in infor- mation security research.
    [Show full text]
  • Is the Mafia Taking Over Cybercrime?*
    Is the Mafia Taking Over Cybercrime?* Jonathan Lusthaus Director of the Human Cybercriminal Project Department of Sociology University of Oxford * This paper is adapted from Jonathan Lusthaus, Industry of Anonymity: Inside the Business of Cybercrime (Cambridge, Mass. & London: Harvard University Press, 2018). 1. Introduction Claims abound that the Mafia is not only getting involved in cybercrime, but taking a leading role in the enterprise. One can find such arguments regularly in media articles and on blogs, with a number of broad quotes on this subject, including that: the “Mafia, which has been using the internet as a communication vehicle for some time, is using it increasingly as a resource for carrying out mass identity theft and financial fraud”.1 Others prescribe a central role to the Russian mafia in particular: “The Russian Mafia are the most prolific cybercriminals in the world”.2 Discussions and interviews with members of the information security industry suggest such views are commonly held. But strong empirical evidence is rarely provided on these points. Unfortunately, the issue is not dealt with in a much better fashion by the academic literature with a distinct lack of data.3 In some sense, the view that mafias and organised crime groups (OCGs) play an important role in cybercrime has become a relatively mainstream position. But what evidence actually exists to support such claims? Drawing on a broader 7-year study into the organisation of cybercrime, this paper evaluates whether the Mafia is in fact taking over cybercrime, or whether the structure of the cybercriminal underground is something new. It brings serious empirical rigor to a question where such evidence is often lacking.
    [Show full text]
  • Financial Fraud and Internet Banking: Threats and Countermeasures
    Report Financial Fraud and Internet Banking: Threats and Countermeasures By François Paget, McAfee® Avert® Labs Report Financial Fraud and Internet Banking: Threats and Countermeasures Table of Contents Some Figures 3 U.S. Federal Trade Commission Statistics 3 CyberSource 4 Internet Crime Complaint Center 4 In Europe 5 The Many Faces of Fraud 6 Small- and large-scale identity theft 7 Carding and skimming 8 Phishing and pharming 8 Crimeware 9 Money laundering 10 Mules 10 Virtual casinos 11 Pump and dump 12 Nigerian advance fee fraud (419 fraud) 12 Auctions 14 Online shopping 16 Anonymous payment methods 17 Protective Measures 18 Scoring 18 Europay, MasterCard, and Visa (EMV) standard 18 PCI-DSS 19 Secure Sockets Layer (SSL) and Transport Secured Layer (TLS) protocols 19 SSL extended validation 20 3-D Secure technology 21 Strong authentication and one-time password devices 22 Knowledge-based authentication 23 Email authentication 23 Conclusion 24 About McAfee, Inc. 26 Report Financial Fraud and Internet Banking: Threats and Countermeasures Financial fraud has many faces. Whether it involves swindling, debit or credit card fraud, real estate fraud, drug trafficking, identity theft, deceptive telemarketing, or money laundering, the goal of cybercriminals is to make as much money as possible within a short time and to do so inconspicuously. This paper will introduce you to an array of threats facing banks and their customers. It includes some statistics and descriptions of solutions that should give readers—whether they are responsible for security in a financial organization or a customer—an overview of the current situation. Some Figures U.S.
    [Show full text]
  • Technological Crime Advisory Board
    TECHNOLOGICAL CRIME ADVISORY BOARD CATHERINE 100 North Carson Street JAMES D.EARL CORTEZ MASTO Carson City, Nevada 89701-4717 Executive Director Attorney General Telephone (775) 684-1115 Fax (775) 684-1108 Chair E-Mail: [email protected] ADVISORY BOARD Bill: SB 267 CATHERINE Position: Support CORTEZ MASTO Attorney General, Chair Tech Crime Board Statutory Missions (2 of 7) – NRS 205A VALERIE WIENER o Recommend changes to civil and criminal statutes in light of tech change. Nevada State Senator, Vice o Assist in securing government information systems. Chair TRAY ABNEY Background: Security Issues Associated with Multi-functional Devices (MFDs) Reno / Sparks Chamber of Commerce o CBS News “Copy Machines, a Security Risk?” April 19, 2010 at http://www.cbsnews.com/video/watch/?id=6412572n&tag=mncol;lst;8 DANIEL G. BOGDEN o Board meeting on July 22, 2010: Technological background and concerns United States Attorney, District of Nevada regarding State systems (minutes attached, see pages 26 to 30). DOUGLAS C. GILLESPIE Sheriff, Clark County Risk Analysis Leads in Different Directions for Public and Private Sectors Las Vegas Metropolitan o Nevada State Standard on MFDs (draft attached) is more proscriptive than Police Department SB 267 since State agencies, generally, have IT personnel who can evaluate MIKE HALEY and limit risks associated with some functions of MFDs. Sheriff, Washoe County o Private sector users of MFDs purchase them specifically to connect to a network, which is a risk State IT personnel seek to prevent or mitigate. KEVIN FAVREAU Special Agent in Charge, o Conclusion: SB 267 mitigates the most significant risk to data stored on or Federal Bureau of copied by MFDs; State agencies are required to take additional precautions Investigation (as of finalization of standard); private sector enterprises with IT personnel DALE NORTON should consider State standards in their MFD implementations.
    [Show full text]
  • Hacks, Leaks and Disruptions | Russian Cyber Strategies
    CHAILLOT PAPER Nº 148 — October 2018 Hacks, leaks and disruptions Russian cyber strategies EDITED BY Nicu Popescu and Stanislav Secrieru WITH CONTRIBUTIONS FROM Siim Alatalu, Irina Borogan, Elena Chernenko, Sven Herpig, Oscar Jonsson, Xymena Kurowska, Jarno Limnell, Patryk Pawlak, Piret Pernik, Thomas Reinhold, Anatoly Reshetnikov, Andrei Soldatov and Jean-Baptiste Jeangène Vilmer Chaillot Papers HACKS, LEAKS AND DISRUPTIONS RUSSIAN CYBER STRATEGIES Edited by Nicu Popescu and Stanislav Secrieru CHAILLOT PAPERS October 2018 148 Disclaimer The views expressed in this Chaillot Paper are solely those of the authors and do not necessarily reflect the views of the Institute or of the European Union. European Union Institute for Security Studies Paris Director: Gustav Lindstrom © EU Institute for Security Studies, 2018. Reproduction is authorised, provided prior permission is sought from the Institute and the source is acknowledged, save where otherwise stated. Contents Executive summary 5 Introduction: Russia’s cyber prowess – where, how and what for? 9 Nicu Popescu and Stanislav Secrieru Russia’s cyber posture Russia’s approach to cyber: the best defence is a good offence 15 1 Andrei Soldatov and Irina Borogan Russia’s trolling complex at home and abroad 25 2 Xymena Kurowska and Anatoly Reshetnikov Spotting the bear: credible attribution and Russian 3 operations in cyberspace 33 Sven Herpig and Thomas Reinhold Russia’s cyber diplomacy 43 4 Elena Chernenko Case studies of Russian cyberattacks The early days of cyberattacks: 5 the cases of Estonia,
    [Show full text]
  • Gmail Hacker for Mac Free
    1 / 2 Gmail Hacker For Mac Free 11 сент. 2015 г. — First of all, personal email services weren't free if you wanted any ... Here are 10 apps that provide the best Gmail hacks on the list .... A powered-off MacBook can be compromised in less than three minutes. ... How To 10/03/2012 2:22 pm : Hack WiFi Passwords for Free Wireless Internet on Your .... 21 авг. 2020 г. — Gmail Hacker Keygen & Serial Key Full Free Download ... Secure hacking for passwords; IP and MAC Address hidden at all times .... A Simple Hack to Avail Free VPN Accounts . We try to all time … Read More online vpn hotspot ofvh. You use your Google account for Gmail, but you also might us.. For best result repeat the scan more than once, especially If your internet connection so slow *** If your internet connection so slow , feel that someone .... 8 мар. 2021 г. — Hack Gmail Account Free Mac. Hack Gmail Account 2020 – Today on SocialPositives.com, we are looking at Gmail Password Hack techniques 2018.. 12 февр. 2020 г. — Gmail Password Hacker has been rated 4.7/5 by 1991 votes! What is Gmail Password Hacker Gmail Password Hacker is a FREE account password ... Hack other players' devices and defend yours to build a reputation in the hacking world. Spyzie will allow you to hack the Gmail account password quickly. Free .... ... 2021 · Email Hacker is a free email hacking tool capable of hacking email ... of WhatsApp) Method 4: How to Hack WhatsApp via Spoofing the MAC Address.. Hack Gmail Password For Free Mac | Peatix.
    [Show full text]