What can organizations do to protect themselves

Assignment Help Management Theories
Reference no: EM131376657

Hacker Hunters Hacker hunters are the new breed of crime fighter. They employ the same methodology used to fight organized crime in the 1980s-informants and the cyberworld equivalent of wiretaps. Daniel Larking, a 20-year veteran who runs the FBI's Internet Crime Complaint Center, taps online service providers to help track down criminal hackers. Leads supplied by the FBI and eBay helped Romanian police round up 11 members of a gang that set up fake eBay accounts and auctioned off cell phones, laptops, and cameras they never intended to deliver. The FBI unleashed Operation Firewall, targeting the ShadowCrew, a gang whose members were schooled in identity theft, bank account pillage, and selling illegal goods on the Internet.

ShadowCrew's 4,000 gang members lived in a dozen countries and across the United States. For months, agents had been watching their every move through a clandestine gateway into their website, shadowcrew. com. One member turned informant and called a group meeting, ensuring the members would be at home on their computers during a certain time, when the Secret Service issued orders to move in on the gang. The move was synchronized around the globe to prevent gang members from warning each other via instant messages. Twenty-eight gang members in eight states and six countries were arrested, most still at their computers. Authorities seized dozens of computers and found 1.7 million credit card numbers and more than 18 million email accounts.

ShadowCrew's Operations The alleged ringleaders of ShadowCrew included Andres Mantovani, 23, a part-time community college student in Arizona, and David Appleyard, 45, a former New Jersey mortgage broker. Mantovani and Appleyard allegedly were administrators in charge of running the website and recruiting members. The site created a marketplace for more than 4,000 gang members who bought and sold hot information and merchandise. The website was open for business 24 hours a day, but since most of the members held jobs, the busiest time was from 10 p.m. to 2 a.m. on Sundays. Hundreds of gang members would meet online to trade credit card information, passports, and even equipment to make fake identity documents. Platinum credit cards cost more than gold ones, and discounts were offered for package deals.

One member known as "Scarface" sold 115,695 stolen credit card numbers in a single trade. Overall, the gang made more than $4 million in credit card purchases over two years. ShadowCrew was equivalent to an eBay for the underworld. The site even posted crime tips on how to use stolen credit cards and fake IDs at big retailers. The gang stole credit card numbers and other valuable information through clever tricks. One of the favorites was sending millions of phishing emails-messages that appeared to be from legitimate companies such as Yahoo!-designed to steal passwords and credit card numbers. The gang also hacked into corporate databases to steal account data.

According to sources familiar with the investigation, the gang cracked the networks of 12 unidentified companies that were not even aware their systems had been breached. Police Operations Brian Nagel, an assistant director at the Secret Service, coordinated the effort to track the ShadowCrew. Allies included Britain's national high-tech crimes unit, the Royal Canadian Mounted Police, and the Bulgarian Interior Ministry. Authorities turned one of the high-ranking members of the gang into a snitch and had the man help the Secret Service set up a new electronic doorway for ShadowCrew members to enter their website. The snitch spread the word that the new gateway was a more secure way to the website. It was the first-ever tap of a private computer network. "We became shadowcrew. com ," Nagel said. Mantovani and Appleyard were slated for trial. Authorities anticipated making additional arrests.

Questions

1. What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?

2. What can organizations do to protect themselves from hackers looking to steal account data?

3. Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and read people's email? Why or why not?

4. Do you think it was ethical for authorities to use one of the high-ranking officials to trap other gang members? Why or why not?

5. In a team, research the Internet and find the best ways to protect yourself from identity theft.

Reference no: EM131376657

Questions Cloud

Describe your top-three fears in competing in global market : As the CFO, describe your top-three fears in competing in the global market, and how you plan to overcome those fears. Provide support for your rationale.
Personal and organization decisions : What is economics? What role does economics play in your personal and organization's decisions?
How the article can enhance your professional decisions : Discuss how the article can enhance your professional and education decisions in the future. Additionally, explain how you will apply the information in the article to your everyday lifestyle.
Solve the dilemma using kant ethics : Create a 2-4 paragraph "dilemma" similar to the other dilemmas you have been solving throughout this term. Solve the dilemma using Kant's ethics (Categorical Imperative)
What can organizations do to protect themselves : What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?- What can organizations do to protect themselves from hackers looking to steal account data?
How many vending machines should wendy sell : Wendy sells vending machines. She can sell 9 machines if she charges $1,000 per machine; 8 if she sells them at the price of $1,100 per machine; 7 at the price of $1,200 per machine, and 6 at the price of $1300 per machine. Each vending machine co..
Explain the level of responsibility of the company : Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
Summarize a statistic reported in a popular magazine article : Briefly summarize a statistic reported in a popular magazine article or website. Describe how they inaccurately portrayed information and what else would need to be considered when looking at this statistical information
Difference between file sharing and internet radio streaming : Why is claiming a lack of copyright knowledge not a good defense against illegally sharing movies or music? If you do not have a good understanding of information laws, what can you do to ensure you are never placed in a federal lawsuit for violat..

Reviews

Write a Review

 

Management Theories Questions & Answers

  Define macrosegmentation

Define macrosegmentation and describe the variables used to create a macrosegmentation of an organizational market.

  Discuss several specific actions the hr generalist

Discuss several specific actions the HR generalist could recommend or facilitate to support the managers in improving the value of the performance appraisal system.* Please list all references

  Some of the most important risk factors

List and discuss at least seven of the primary strategic considerations involved during the project initiation and planning processes. Explain why they are important and how they might be resolved when needed. Importance of Project Initiation

  An environmental health hazard

Which of the following is not an example of an environmental health hazard?

  A current issue affecting hrd practitioners

Conduct an Internet search for a current issue affecting HRD practitioners. This can come from trade journals or newspaper articles in the field, as opposed to academic articles used for the literature review paper. You may investigate the same issue..

  Describe key decisions you are responsible

Describe key decisions you are responsible

  Read the following codes of conduct

For your Key Concept Exercise, write a paper that provides an evaluation of the importance of ethics in purchasing based upon the two codes of conduct. Explain how these standards impact buyer-seller relationships.

  The president of the student government association at unc

The President of the Student Government Association at UNC

  Compare and contrast the ways that state and local

Compare and contrast the ways that state and local governments can work with health care organizations to foster integration between primary care and public health.  Additionally, discuss the importance of linking primary care and public health and s..

  Packed apples from a producer at hood river

Anita, a New York dealer, purchased twenty-five barrels of specially graded and packed apples from a producer at Hood River, Oregon. She then resold the apples to Benji under a contract that specified an agreed price on delivery at Benji's place o..

  Beneficial treatment could be simply gender based or racial

Many times corporations face issues from employees claiming others are being treated more beneficial given the same experience. That this beneficial treatment could be simply gender based or racial.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd