Cyberheist Ch00 FM Finalv2.Indd Ii 4/12/11 7:58 AM the Biggest fi Nancial Threat Facing American Businesses Since the Meltdown of 2008

Total Page:16

File Type:pdf, Size:1020Kb

Cyberheist Ch00 FM Finalv2.Indd Ii 4/12/11 7:58 AM the Biggest fi Nancial Threat Facing American Businesses Since the Meltdown of 2008 CyberHeist_Ch00_FM_FINALv2.indd ii 4/12/11 7:58 AM The biggest fi nancial threat facing American businesses since the meltdown of 2008 Stu Sjouwerman CyberHeist_Ch00_FM_FINALv2.indd iii 4/12/11 7:58 AM Publisher/Lead Author CYBERHEIST: The biggest fi nancial threat facing American Stu Sjouwerman businesses since the meltdown of 2008 Contributing Authors Copyright © 2011 KnowBe4. Naomi Alpern Justin Korelc All rights reserved. No part of this book may be reproduced or transmitted in Kim Lindros any form or any manner, electronic or mechanical, including photocopying, Jeff T. Parker James Pyles recording or by any information storage and retrieval system, without permis- Ed Tittel sion in writing from the publisher. Michelle Zavala Trademarks Trademarked names appear throughout this book. Rather than list the names Developmental Editor Kim Lindros and entities that own the trademarks or insert a trademark symbol with each mention of the trademarked name, the publisher states that it is using the names for editorial purposes only and to the benefi t of the trademark owner, Copyeditor with no intention of infringing upon that trademark. Kitty Wilson Warning and Disclaimer Every effort has been made to make this book as complete and as accurate Technical Editor as possible, but no warranty of fi tness is implied. The information provided Darril Gibson is on an “as is” basis. The authors and the publisher shall have neither liability nor responsibility to any person or entity with respect to any loss or damages Compositor and Graphic Artist arising from the information contained in this book. Kim Eoff This book is also published in a variety of electronic formats. Some content that appears in print may not be available in electronic books. Proofreader Kim Lindros KnowBe4 601 Cleveland Street Indexer Suite 930 Liz Cunningham Clearwater, FL 33755 Toll Free: 855-KNOWBE4 (566-9234) Cover Design www.KnowBe4.com David Brier, DBD International ISBN: 978-0-9834000-0-4 Cover Art Photographer Library of Congress Control Number: 2011904807 Alan Poulson Cover and Interior Printing and Published in North America by KnowBe4 Binding 10 9 8 7 6 5 4 3 2 1 Globus Printing CyberHeist_Ch00_FM_FINALv2.indd iv 4/12/11 7:58 AM This book is dedicated to all the sleepless cybercrime fi ghters in the world. You know who you are. Thanks very much for what you do. CyberHeist_Ch00_FM_FINALv2.indd v 4/12/11 7:58 AM CyberHeist_Ch00_FM_FINALv2.indd vi 4/12/11 7:58 AM Acknowledgments This project was a true team effort. My sincere thanks to all the people who helped bring my ideas to a tangible, cohesive book. This includes the following contributors: Naomi Alpern, Justin Korelc, Kim Lindros, Jeff T. Parker, James Pyles, Ed Tittel, and Michelle Zavala. Ed Tittel also designed and reviewed this book’s entire contents. The production team included these fi ne people: Kitty Wilson, copy editor; Darril Gibson, technical editor; Kim Eoff, layout design, compositor, and artist; Liz Cun- ningham, indexer; and Kim Lindros, who wore several hats, including proofreader and project manager. David Brier, DBD International, did the cover design, and the cover art photographer was Alan Poulson. My sincere thanks to everyone who ever worked at Sunbelt Software and who helped to make us the Inc. 500 Success that we were. That was a great run! vii CyberHeist_Ch00_FM_FINALv2.indd vii 4/12/11 7:58 AM About the Author Stu Sjouwerman (pronounced “shower-man”) has been in Information Technology for 30+ years, the last 9 of which were in IT Security. As a co-founder of Inc. 500 company Sunbelt Software, he has been specializing in antispyware products since 2003. A few years later, Sunbelt developed antivirus software, integrated a fi rewall, and at the same time developed antispam software for both consumers and enterprises. In 2010, Sunbelt was sold to GFI software, a portfolio company of Insight Partners, a $3 billion Boston-based hedge fund. This is Stu’s fourth book. He has co-authored three books about Windows system admin- istration, the fi rst being Windows NT Power Toolkit. Released in October 1999, this book reached #4 on Amazon.com’s USA bestseller list the fi rst week of its release and #1 in the UK. In 2003, a new book about Windows XP was published. The second and third books also reached Amazon’s Top 10 List. Since 1996, Stu has been the Editor-in-Chief of WServerNews, an email newsletter that goes to 100,000 IT system administrators and helps them to keep their systems secure, and up and running. Stu is now serving as publisher and editor of GFI Media Services, a division of GFI that produces four major online newsletters, including WServerNews, WXPnews, Win7News, and GFISecurityNews. These newsletters are tailored to deliver up-to-date tech- nology information to both consumers and enterprises. After having been on the software side of security, and still seeing workstations getting infected by malware, Stu realized that the human element of security was being neglected. He decided to start a new company called KnowBe4 that helps organizations train their employees to stay secure on the Internet. He lives in the Tampa Bay, Florida, area with his wife Rebecca and their three cats. viii CyberHeist_Ch00_FM_FINALv2.indd viii 4/12/11 7:58 AM Table of Contents Part 1 The Business of Cybercrime 1 Chapter 1 What Drives Cybercrime? ..................................3 What Exactly Is Cybercrime? ...............................................................4 Who’s a Target for Cybercrime? ......................................................5 A Million Stories for a Million Scams .....................................................8 A Case of Criminal Culture ..................................................................9 Cybercrime Learning and Lore ......................................................10 Variations on a Scamming Theme ..................................................11 Internet, and the Money Is Easy ..........................................................12 Offshore Has Defi nite Virtues—and Vices .......................................12 Avoiding Exposure to Avoid Losses ................................................13 Chapter 2 How and Why Scams Survive, Thrive, and Succeed .................................................. 15 The More You Try to Scam, the Better the Odds of Succeeding ...............16 Persistence and Variety .................................................................16 A Successful Scam Spawns Countless Imitations ...................................17 Old Scams Finding New Victims....................................................17 Simple Technology Tricks Reap Major Results .......................................19 Trust Few, Share Little ...................................................................19 A Little Knowledge Is Indeed Very Dangerous .......................................20 Taking Advantage of Human Nature and Gullibility ..............................21 Common Traits of Fraud Victims.....................................................22 Chapter 3 Types and Methods of Attacks .........................23 The Social Side of Attacks ..................................................................23 You’ve Been Engineered … Socially, That Is! ...................................24 Social Engineering Tools and Tricks................................................25 Anatomy of a Blatant Phishing Attack ..................................................25 Examining the Source Code ..........................................................27 ix CyberHeist_Ch00_FM_FINALv2.indd Sec1:ix 4/12/11 7:58 AM x Table of Contents The Technical Side of Attacks .............................................................28 Disguise and Conquer ..................................................................29 Hidden and Malicious Payloads ....................................................29 The Mechanics of Drive-by Downloads ...........................................30 Information Harvesting ......................................................................30 Chapter 4 Phishing Explored and Explained .....................33 The Basic Laws of Phishing .................................................................34 Imitate ........................................................................................34 Motivate .....................................................................................34 Take Action Now! ........................................................................34 Attack Anatomy 2: A Well-Done Phish .................................................35 The First Surprise: Steganography .................................................35 The Second Surprise: A Malicious Attachment .................................37 Telltale Signs in a Sophisticated Attack ...........................................38 URL Shortening: The Good and Bad ....................................................39 Surefi re Ways to Avoid Phishing .........................................................40 Chapter 5 Variations on the Phishing Theme: Smishing and Vishing ...................................... 41 The Basic Mechanics of Phishing ........................................................41 What Criminals Want from Victims ................................................42 How Criminals Lure Victims ...........................................................42 How Criminals Profi t from Data Theft ..............................................42 Anatomy of a Smishing Attack ............................................................43
Recommended publications
  • Schwab's Fraud Encyclopedia
    Fraud Encyclopedia Updated June 2018 Contents Introduction . 3 Scams . 26 How to use this Fraud Encyclopedia . 3 1 . Properties . 28 2. Romance/marriage/sweetheart/catfishing . 28 Email account takeover . 4 3 . Investments/goods/services . .. 29 1 . Emotion . 7 4 . Prizes/lotteries . 29 2 . Unavailability . 7 5 . IRS . 30 3 . Fee inquiries . 8 6 . Payments . 30 4 . Attachments . 9 Other cybercrime techniques . 31 5 . International wires . 10 1 . Malware . 33 6 . Language cues . 10 2 . Wi-Fi connection interception . 34 7 . Business email compromise . 11 3 . Data breaches . 35 Client impersonation and identity theft . 12 4 . Credential replay incident (CRI) . 37 1 . Social engineering . 14 5 . Account online compromise/takeover . 37 2. Shoulder surfing . 14 6 . Distributed denial of service (DDoS) attack . 38 3. Spoofing . 15 Your fraud checklist . 39 4 . Call forwarding and porting . 16 Email scrutiny . 39 5 . New account fraud . 16 Verbally confirming client requests . 40 Identical or first-party disbursements . 17 Safe cyber practices . 41 1 . MoneyLink fraud . 19 What to do if fraud is suspected . 42 2 . Wire fraud . .. 19 Schwab Advisor Center® alerts . 43 3 . Check fraud . 20 4 . Transfer of account (TOA) fraud . 20 Phishing . 21 1 . Spear phishing . 23 2 . Whaling . .. 24 3 . Clone phishing . 24 4 . Social media phishing . 25 CONTENTS | 2 Introduction With advances in technology, we are more interconnected than ever . But we’re also more vulnerable . Criminals can exploit the connectivity of our world and use it to their advantage—acting anonymously How to use this to perpetrate fraud in a variety of ways . Fraud Encyclopedia Knowledge and awareness can help you protect your firm and clients and guard against cybercrime.
    [Show full text]
  • U.S. V. Connie Moorman Willis
    Case 5:17-mj-01008-PRL Document 1 Filed 02/07/17 Page 1 of 14 PageID 1 AO 91 (Rev. 11/11) Criminal Complaint UNITED STATES DISTRICT COURT for the Middle District of Florida United States of America ) v. ) ) CONNIE MOORMAN WILLIS Case No. ) 5: 17-mj-1008-PRL ) ) ) Defendant(s) I CRIMINAL COMPLAINT I i I, 1~he complainant in this case, state that the following is true to the best of my knowledge and belief. On or about the date(s) of Feb. 4, 2011 through Jan. 25, 2016 in the county of Marion in the I Middle District of Florida , the defendant(s) violated: ! j Code Section Offense Description 18 u.s.c. 1 sec. 656 Theft by a Bank Employee 18 U.S.C. Sec. 1341 Mail Fraud Tnis criminal complaint is based on these facts: I I See attached affidavit. I lifl Continued on the attached sheet. Charles Johnsten, U.S. Postal Inspector Printed name and title Sworn to before me and signed in my presence. Date: ~-1 - :lo Ir City and siate: Ocala, Florida Philip R. Lammens, U.S. Magistrate Judge Printed name and title I ! Case 5:17-mj-01008-PRL Document 1 Filed 02/07/17 Page 2 of 14 PageID 2 S'FATE OF FLORIDA CASE NO. 5:17-mj-1008-PRL I IOUNTY OF MARION AFFIDAVIT IN SUPPORT OF A CRIMINAL COMPLAINT I, Charles Johnsten, being duly sworn, state as follows: INTRODUCTION 1. I am a United States Postal Inspector and have been so employed since I obcember 2016.
    [Show full text]
  • Fraud, Asset Tracing & Recovery
    INSOLVENCY AS A TOOL How and when to use in asset recovery BITCOIN BATTLES Tracing and seizing cryptoassets Commercial Dispute Resolution COVID-19 FRAUD CDR Recovering assets lost in the pandemic www.cdr-news.com Spring 2021 ESSENTIAL INTELLIGENCE: Fraud, Asset Tracing & Recovery Contributing Editor: Keith Oliver Peters & Peters Solicitors LLP 4 WELCOME TABLE OF CONTENTS EXPERT ANALYSIS New threats for 2021 and beyond 06 France Andrew Mizner Commercial Dispute Resolution 90 Thomas Rouhette, Nicolas Brooke, Ela Barda & Jennifer Melo Signature Litigation Insolvency used as a tool in asset recovery 10 Andrew Stafford QC & James Chapman-Booth Guernsey Kobre & Kim 100 Simon Florance, John Greenfield & David Jones Carey Olsen Cryptocurrency fraud and asset recovery 17 Syedur Rahman Rahman Ravelli Hong Kong 110 Dorothy Siron Zhong Lun Law Firm Corruption in the pandemic and the importance of 22 asset recovery India Angela Barkhouse Quantuma Advisory Limited 124 Shreyas Jayasimha & Aakash Sherwal Aarna Law Fraud and asset tracing investigations: the role of 28 Ireland corporate intelligence - part II 132 Karyn Harty & Audrey Byrne McCann FitzGerald Alexander Davies & Peter Woglom BDO Japan International civil or criminal law tools that can be 144 42 Hiroyuki Kanae, Hidetaka Miyake & Atsushi Nishitani used to aid in asset recovery Anderson Mōri & Tomotsune Olga Bischof & Theodore Elton Brown Rudnick Confiscation proceedings and civil recovery: 152 Jersey 48 proportionality and abuse of process Marcus Pallot, Richard Holden & Daniel Johnstone Colin Wells 25 Bedford Row Carey Olsen Luxembourg 160 Max Mailliet E2M – Etude Max Mailliet COUNTRY CHAPTERS Singapore 168 Lee Bik Wei & Lee May Ling Allen & Gledhill Bermuda 56 Keith Robinson & Kyle Masters Carey Olsen Spain 178 Héctor Sbert & Maria de Mulder Lawants British Virgin Islands 63 Alex Hall Taylor QC, Richard Brown, Tim Wright & Switzerland Simon Hall Carey Olsen 188 Dr.
    [Show full text]
  • United States District Court Northern District of Alabama Southern Division
    UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ALABAMA SOUTHERN DIVISION In re HEALTHSOUTH CORPORATION ) Master File No. CV-03-BE-1500-S SECURITIES LITIGATION ) ) This Document Relates To: All Actions ) ) In re HEALTHSOUTH CORPORATION ) Consolidated Case No. CV-03-BE-1501-S STOCKHOLDER LITIGATION ) ) CLASS ACTION This Document Relates To: All Actions ) ) In re HEALTHSOUTH CORPORATION ) Consolidated Case No. CV-03-BE-1502-S BONDHOLDER LITIGATION ) ) CLASS ACTION This Document Relates To: All Actions ) ) JOINT SECOND AMENDED CONSOLIDATED CLASS ACTION COMPLAINT FOR VIOLATIONS OF THE FEDERAL SECURITIES LAWS [FACTUAL BASIS] DEMAND FOR JURY TRIAL TABLE OF CONTENTS Page INTRODUCTION ...........................................................................................................................1 The Scheme..........................................................................................................................3 Ernst & Young’s Participation in the Fraudulent Scheme...................................................5 Underwriters’ Knowing Involvement..................................................................................8 Financial Fraud ..................................................................................................................14 Medicare Fraud ..................................................................................................................15 Passage of the Balanced Budget Act and Defendants’ Sale of Stock and Notes...............16 Defendants Reinflate the Price of
    [Show full text]
  • Identity Theft What to Do If It Happens To
    Identity Theft: What to Do if It Happens to You You apply for a credit card and get turned down because of a low credit score. Yet you know that you’ve always paid your accounts on time. A debt collector calls to demand payment on a six-month overdue account for a credit card you have never had. You receive a credit card in the mail that you’ve never applied for. What’s happening? You could be a victim of identity theft, where an imposter is using your personal information. The identity thief could use your personal information for any of the following: • They may call your credit card issuer to change the billing address on your credit card account. The imposter then runs up charges on your account. Because your bills are being sent to a different address, it may be some time before you realize there’s a problem. • They may open new credit card accounts in your name. When they use the credit cards and don’t pay the bills, the delinquent accounts are reported on your credit report. • They may establish phone or wireless service in your name. • They may open a bank account in your name and write bad checks on that account. • They may counterfeit checks or credit or debit cards, or authorize electronic transfers in your name and drain your bank account. • They may file for bankruptcy under your name to avoid paying debits they’ve incurred under you name or to avoid eviction. • They may buy a car by taking out an auto loan in your name.
    [Show full text]
  • Protect Yourself. Don't Be a Victim of Fraud
    ROCIC • REGIONAL ORGANIZED CRIME INFORMATION CENTER • www.riss.net Tips to Protect Yourself ►Don’t Be A Victim! ROCIC • REGIONAL ORGANIZED CRIME INFORMATION CENTER • www.riss.net Protect Yourself • Don’t Be a Victim of Fraud 1 Table of Contents Con Artists and FlimFlams • 3 Bank Examiner • Broken Bottle Scam • Caller ID or Spoofing • C.O.D. Scam • Diversion Burglary • Door-to-Door Solicitor • Fortune Telling Fraud • Handkerchief Switch • Jury Duty Scam • Latin Lotto • Lottery Scams/Foreign Lottery • Lotteries • Pickpocket Diver- sion • Pigeon Drop • Police Follow-Up Scam • Recovery Rooms • Rock in a Box • Sweet- heart Swindle Con • Three-Card-Monte • Toner Rooms • Truck Stop Three-Card-Monte • Yellow Page Advertising Scheme Business and Investment Fraud • 17 Business Fraud • Telemarketing Fraud • Nigerian Letter or 419 Fraud • Advance Fee Schemes • Fake Check Scam • Redemption/Strawman/Bond Fraud • Letter of Credit Fraud • Prime Bank Note Fraud • Ponzi Schemes • Pyramid Schemes • Market Manipula- tion or Pump and Dump Fraud Identity Theft • 29 Fraud Against Senior Citizens • 30 Counterfeit Prescription Fraud • Funeral and Cemetery Fraud • Fraudulent Anti-Aging Products • Reverse Mortgage Fraud • Long Term Care Insurance Fraud Telemarketing Fraud • 36 Automobile Insurance Fraud • 42 Medical and Insurance Fraud • 46 Medical Equipment Fraud • Medicare Fraud • Dental • Medical Identity Scams • False Medical Claims • Discount Cards for Medical Insurance • Obamacare Scams • Medicare Scams • Workers Compensation • Stolen Premiums • Crooked Doctors and Lawyers Travel Industry Fraud • 57 Social Media Fraud • 61 Computer Fraud • 63 Internet Fraud • 65 Internet Auction Fraud • Internet Non-Delivery of Merchandise • Credit Card Fraud • Internet Investment Fraud • Preventing Online Fraud Home Improvement Fraud • 71 REGIONAL ORGANIZED CRIME INFORMATION CENTER • A RISS Center Protect Yourself • Don’t Be a Victim of Fraud 2 Sources of Information Many of the narratives for electronic or Internet fraud came from the FBI website at www.fbi.gov.
    [Show full text]
  • Fraud, Forgery and Vigilance in Banking Sector
    THAVAN IJREB Vol-1, No-2 Jan-Mar 2012 ISSN: 2277-1476 Fraud, forgery and Vigilance in Banking Sector Alekhya Reddy Student, HNLU, Raipur, [email protected] Abstract- Banks are the engines that drive the 1969 and 6 more on 15 April 1980. The Indian operations in the financial sector, which is vital banking system is indeed unique and perhaps for the economy. With the nationalization of has no parallels in the banking history of any banks in 1969, they also have emerged as country in the world.1 engines for social change and have become indispensable in a modern society. Banks play a The Indian Banking system performs a crucial critical role in economic development of a role in economic development of India through nation. The increase in banking operations is saving-investment.2Banks are the engines that now accompanied by an increase in frauds in drive the operations in the financial sector, the banking sector. In this paper the first chapter which is vital for the economy. With the deals with an introduction to banking and nationalization of banks in 1969, they also have related frauds. The second chapter focuses on emerged as engines for social change. After Fraud and Forgery, subsequently the Next Independence, the banks have passed through Chapter deal with Fraud and Forgeries in three stages. They have moved from the Banking sector with relevant legal provisions. character based lending to ideology based The fourth chapter deals with measures for lending to today competitiveness based lending prevention and detection of such discrepancies, in the context of India's economic liberalization followed by the vigilance in banking sector and policies and the process of linking with the the fifth chapter deals with Legal regime global economy.
    [Show full text]
  • United States District Court Northern District of Texas Dallas Division
    Case 3:12-cv-04641-L Document 1 Filed 11/15/12 Page 1 of 172 PageID 1 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF TEXAS DALLAS DIVISION RALPH S. JANVEY, in his capacity § as court-appointed receiver for the § Stanford receivership estate; § The OFFICIAL STANFORD § INVESTORS COMMITTEE; § SANDRA DORRELL; § SAMUEL TROICE; and § MICHOACAN TRUST; individually § and on behalf of a class of all others § similarly situated § § Plaintiffs § CIVIL ACTION NO. _________ § VS. § § GREENBERG TRAURIG, LLP; § HUNTON & WILLIAMS, LLP; and § YOLANDA SUAREZ § § Defendants § PLAINTIFFS’ ORIGINAL COMPLAINT - CLASS ACTION 1 Case 3:12-cv-04641-L Document 1 Filed 11/15/12 Page 2 of 172 PageID 2 TABLE OF CONTENTS I. PARTIES ........................................................................................................................... 2 II. OVERVIEW OF CASE .................................................................................................... 4 III. PERSONAL JURISDICTION ......................................................................................... 7 IV. SUBJECT MATTER JURISDICTION & VENUE ...................................................... 8 V. FACTUAL BACKGROUND ........................................................................................... 8 A. The Stanford Financial Group Empire .................................................................... 8 B. Stanford Financial’s Operations in the United States and Texas Base ................. 10 C. The Anatomy of the Stanford Illicit Securities Scheme .......................................
    [Show full text]
  • What Is Securities Fraud?
    BUELL IN PRINTER PROOF 11/11/2011 5:38:12 PM Duke Law Journal VOLUME 61 DECEMBER 2011 NUMBER 3 WHAT IS SECURITIES FRAUD? SAMUEL W. BUELL† ABSTRACT As Rule 10b-5 approaches the age of seventy, deep familiarity with this supremely potent and consequential provision of American administrative law has obscured its lack of clear conceptual content. The rule, as written, interpreted, and enforced, is missing a fully developed connection to—of all things—fraud. Fraud is difficult to define. Several approaches are plausible. But the law of securities fraud, and much of the commentary about that body of law, has neither attempted such a definition nor acknowledged its necessity to the coherence and effectiveness of the doctrine. Securities fraud’s lack of mooring in a fully developed concept of fraud produces at least three costs: public and private actions are not brought on behalf of clearly specified regulatory objectives; the line between civil and criminal liability has become unacceptably blurred; and the law has come to provide at best a weak means of resolving vital public questions about wrongdoing in financial markets. The agenda of this Article is threefold. First, this Article illuminates and clarifies the relationship between securities fraud and fraud and structures a discussion of legal reform that more explicitly connects Copyright © 2011 by Samuel W. Buell. † Professor of Law, Duke University School of Law. I am grateful for the helpful questions and comments of Tom Baker, Sara Sun Beale, Stuart Benjamin, Ben Depoorter, Lisa Kern Griffin, Kim Krawiec, Dan Markel, James Park, and participants in workshops at Duke University School of Law, Willamette University College of Law, Notre Dame Law School, and Florida State University College of Law.
    [Show full text]
  • Mail and Wire Fraud: an Abbreviated Overview of Federal Criminal Law
    Mail and Wire Fraud: An Abbreviated Overview of Federal Criminal Law Charles Doyle Senior Specialist in American Public Law Updated February 11, 2019 Congressional Research Service 7-.... www.crs.gov R41931 SUMMARY R41931 Mail and Wire Fraud: An Abbreviated February 11, 2019 Overview of Federal Criminal Law Charles Doyle The mail and wire fraud statutes are exceptionally broad. Their scope has occasionally given the Senior Specialist in courts pause. Nevertheless, prosecutions in their name have brought to an end schemes that have American Public Law bilked victims out of millions, and sometimes billions, of dollars. The statutes proscribe (1) [email protected] causing the use of the mail or wire communications, including email; (2) in conjunction with a scheme to intentionally defraud another of money or property; (3) by means of a material For a copy of the full report, deception. The offenses, along with attempts or conspiracies to commit them, carry a term of please call 7-.... or visit imprisonment of up to 30 years in some cases, followed by a term of supervised release. www.crs.gov. Offenders also face the prospect of fines, orders to make restitution, and forfeiture of their property. The mail and wire fraud statutes overlap with a surprising number of other federal criminal statutes. Conduct that supports a prosecution under the mail or wire fraud statutes will often support prosecution under one or more other criminal provision(s). These companion offenses include (1) those that use mail or wire fraud as an element of a separate offense, like racketeering or money laundering; (2) those that condemn fraud on some jurisdictional basis other than use of the mail or wire communications, like those that outlaw defrauding the federal government or federally insured banks; and (3) those that proscribe other deprivations of honest services (i.e., bribery and kickbacks), like the statutes that ban bribery of federal officials or in connection with federal programs.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Fighting Fraud: Senate Aging Committee Identifies Top 10 Scams Targeting Our Nation’S Seniors
    United States Senate Special Committee on Aging Fighting Fraud: Senate Aging Committee Identifies Top 10 Scams Targeting Our Nation’s Seniors Senator Susan M. Collins (R-ME), Chairman Senator Robert P. Casey, Jr. (D-PA), Ranking Member Tips from the United States Senate Special Committee on Aging for Avoiding Scams • Con artists force you to make decisions fast and may threaten you. • Con artists disguise their real numbers, using fake caller IDs. • Con artists sometimes pretend to be the government (e.g. IRS). • Con artists try to get you to provide them personal information like your Social Security number or account numbers. • Before giving out your credit card number or money, please ask a friend or family member about it. • Beware of offers of free travel! If you receive a suspicious call, hang up and please call the U.S. Senate Special Committee on Aging’s Fraud Hotline at 1-855-303-9470 Note: This document has been printed for information purposes. It does not represent either findings or recommendations formally adopted by the Committee. Protecting Older Americans Against Fraud Unitedi d SSStates Senate SiSpeciall CommitteeCi on Aging i Table of Contents Dear Friends ...........................................................................................................................................3 Top 10 Most-Reported Scams ................................................................................................................4 Abbreviations ..........................................................................................................................................6
    [Show full text]