What can organizations do to protect themselves

Assignment Help Management Theories
Reference no: EM131376657

Hacker Hunters Hacker hunters are the new breed of crime fighter. They employ the same methodology used to fight organized crime in the 1980s-informants and the cyberworld equivalent of wiretaps. Daniel Larking, a 20-year veteran who runs the FBI's Internet Crime Complaint Center, taps online service providers to help track down criminal hackers. Leads supplied by the FBI and eBay helped Romanian police round up 11 members of a gang that set up fake eBay accounts and auctioned off cell phones, laptops, and cameras they never intended to deliver. The FBI unleashed Operation Firewall, targeting the ShadowCrew, a gang whose members were schooled in identity theft, bank account pillage, and selling illegal goods on the Internet.

ShadowCrew's 4,000 gang members lived in a dozen countries and across the United States. For months, agents had been watching their every move through a clandestine gateway into their website, shadowcrew. com. One member turned informant and called a group meeting, ensuring the members would be at home on their computers during a certain time, when the Secret Service issued orders to move in on the gang. The move was synchronized around the globe to prevent gang members from warning each other via instant messages. Twenty-eight gang members in eight states and six countries were arrested, most still at their computers. Authorities seized dozens of computers and found 1.7 million credit card numbers and more than 18 million email accounts.

ShadowCrew's Operations The alleged ringleaders of ShadowCrew included Andres Mantovani, 23, a part-time community college student in Arizona, and David Appleyard, 45, a former New Jersey mortgage broker. Mantovani and Appleyard allegedly were administrators in charge of running the website and recruiting members. The site created a marketplace for more than 4,000 gang members who bought and sold hot information and merchandise. The website was open for business 24 hours a day, but since most of the members held jobs, the busiest time was from 10 p.m. to 2 a.m. on Sundays. Hundreds of gang members would meet online to trade credit card information, passports, and even equipment to make fake identity documents. Platinum credit cards cost more than gold ones, and discounts were offered for package deals.

One member known as "Scarface" sold 115,695 stolen credit card numbers in a single trade. Overall, the gang made more than $4 million in credit card purchases over two years. ShadowCrew was equivalent to an eBay for the underworld. The site even posted crime tips on how to use stolen credit cards and fake IDs at big retailers. The gang stole credit card numbers and other valuable information through clever tricks. One of the favorites was sending millions of phishing emails-messages that appeared to be from legitimate companies such as Yahoo!-designed to steal passwords and credit card numbers. The gang also hacked into corporate databases to steal account data.

According to sources familiar with the investigation, the gang cracked the networks of 12 unidentified companies that were not even aware their systems had been breached. Police Operations Brian Nagel, an assistant director at the Secret Service, coordinated the effort to track the ShadowCrew. Allies included Britain's national high-tech crimes unit, the Royal Canadian Mounted Police, and the Bulgarian Interior Ministry. Authorities turned one of the high-ranking members of the gang into a snitch and had the man help the Secret Service set up a new electronic doorway for ShadowCrew members to enter their website. The snitch spread the word that the new gateway was a more secure way to the website. It was the first-ever tap of a private computer network. "We became shadowcrew. com ," Nagel said. Mantovani and Appleyard were slated for trial. Authorities anticipated making additional arrests.

Questions

1. What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?

2. What can organizations do to protect themselves from hackers looking to steal account data?

3. Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and read people's email? Why or why not?

4. Do you think it was ethical for authorities to use one of the high-ranking officials to trap other gang members? Why or why not?

5. In a team, research the Internet and find the best ways to protect yourself from identity theft.

Reference no: EM131376657

Questions Cloud

Describe your top-three fears in competing in global market : As the CFO, describe your top-three fears in competing in the global market, and how you plan to overcome those fears. Provide support for your rationale.
Personal and organization decisions : What is economics? What role does economics play in your personal and organization's decisions?
How the article can enhance your professional decisions : Discuss how the article can enhance your professional and education decisions in the future. Additionally, explain how you will apply the information in the article to your everyday lifestyle.
Solve the dilemma using kant ethics : Create a 2-4 paragraph "dilemma" similar to the other dilemmas you have been solving throughout this term. Solve the dilemma using Kant's ethics (Categorical Imperative)
What can organizations do to protect themselves : What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?- What can organizations do to protect themselves from hackers looking to steal account data?
How many vending machines should wendy sell : Wendy sells vending machines. She can sell 9 machines if she charges $1,000 per machine; 8 if she sells them at the price of $1,100 per machine; 7 at the price of $1,200 per machine, and 6 at the price of $1300 per machine. Each vending machine co..
Explain the level of responsibility of the company : Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
Summarize a statistic reported in a popular magazine article : Briefly summarize a statistic reported in a popular magazine article or website. Describe how they inaccurately portrayed information and what else would need to be considered when looking at this statistical information
Difference between file sharing and internet radio streaming : Why is claiming a lack of copyright knowledge not a good defense against illegally sharing movies or music? If you do not have a good understanding of information laws, what can you do to ensure you are never placed in a federal lawsuit for violat..

Reviews

Write a Review

Management Theories Questions & Answers

  Learning in action

Learning contract proposal that will form the basis of your learning contract report.

  Change is the only constant

"Change is the only constant " Evaluate the different types of change that have occurred in Sony.

  How do advertisers try to use group influence

How do advertisers try to use group influence?  Will you find any specific examples and explain the relevant theory of group behavior and influence?

  Case study:saving sony

You have been appointed by Sony as a consultant on change management. Advise Sony on how they could implement the change by using the various theories of change you have learnt.

  How the stock market works

The purpose of this project is to help you to gain an understanding of how the stock market works and of the relationship between theory and practice.

  Find the optimal production quantities

Find not only the optimal production quantities, but also the optimal total cost.

  Describe the management process

Describe the management process and identify the skills required to manage business organizations.

  Case study : bert''s bonsai and aquatic sport museum

Case Study : Bert's Bonsai and Aquatic Sport Museum Prepare a knowledge management system.

  Knowledge management techniques

Demonstrate understanding of the many-sided nature of knowledge management

  Theory of transtheoretical model

Demonstrate understanding of the many-sided nature of knowledge management

  Write a paper on historical trends of management

Write a paper on Historical Trends of Management.

  Theory of reasoned action

Theory of Planned Behavior and Integrated Behaviors Model

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd