What can organizations do to protect themselves

Assignment Help Management Theories
Reference no: EM131376657

Hacker Hunters Hacker hunters are the new breed of crime fighter. They employ the same methodology used to fight organized crime in the 1980s-informants and the cyberworld equivalent of wiretaps. Daniel Larking, a 20-year veteran who runs the FBI's Internet Crime Complaint Center, taps online service providers to help track down criminal hackers. Leads supplied by the FBI and eBay helped Romanian police round up 11 members of a gang that set up fake eBay accounts and auctioned off cell phones, laptops, and cameras they never intended to deliver. The FBI unleashed Operation Firewall, targeting the ShadowCrew, a gang whose members were schooled in identity theft, bank account pillage, and selling illegal goods on the Internet.

ShadowCrew's 4,000 gang members lived in a dozen countries and across the United States. For months, agents had been watching their every move through a clandestine gateway into their website, shadowcrew. com. One member turned informant and called a group meeting, ensuring the members would be at home on their computers during a certain time, when the Secret Service issued orders to move in on the gang. The move was synchronized around the globe to prevent gang members from warning each other via instant messages. Twenty-eight gang members in eight states and six countries were arrested, most still at their computers. Authorities seized dozens of computers and found 1.7 million credit card numbers and more than 18 million email accounts.

ShadowCrew's Operations The alleged ringleaders of ShadowCrew included Andres Mantovani, 23, a part-time community college student in Arizona, and David Appleyard, 45, a former New Jersey mortgage broker. Mantovani and Appleyard allegedly were administrators in charge of running the website and recruiting members. The site created a marketplace for more than 4,000 gang members who bought and sold hot information and merchandise. The website was open for business 24 hours a day, but since most of the members held jobs, the busiest time was from 10 p.m. to 2 a.m. on Sundays. Hundreds of gang members would meet online to trade credit card information, passports, and even equipment to make fake identity documents. Platinum credit cards cost more than gold ones, and discounts were offered for package deals.

One member known as "Scarface" sold 115,695 stolen credit card numbers in a single trade. Overall, the gang made more than $4 million in credit card purchases over two years. ShadowCrew was equivalent to an eBay for the underworld. The site even posted crime tips on how to use stolen credit cards and fake IDs at big retailers. The gang stole credit card numbers and other valuable information through clever tricks. One of the favorites was sending millions of phishing emails-messages that appeared to be from legitimate companies such as Yahoo!-designed to steal passwords and credit card numbers. The gang also hacked into corporate databases to steal account data.

According to sources familiar with the investigation, the gang cracked the networks of 12 unidentified companies that were not even aware their systems had been breached. Police Operations Brian Nagel, an assistant director at the Secret Service, coordinated the effort to track the ShadowCrew. Allies included Britain's national high-tech crimes unit, the Royal Canadian Mounted Police, and the Bulgarian Interior Ministry. Authorities turned one of the high-ranking members of the gang into a snitch and had the man help the Secret Service set up a new electronic doorway for ShadowCrew members to enter their website. The snitch spread the word that the new gateway was a more secure way to the website. It was the first-ever tap of a private computer network. "We became shadowcrew. com ," Nagel said. Mantovani and Appleyard were slated for trial. Authorities anticipated making additional arrests.

Questions

1. What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?

2. What can organizations do to protect themselves from hackers looking to steal account data?

3. Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and read people's email? Why or why not?

4. Do you think it was ethical for authorities to use one of the high-ranking officials to trap other gang members? Why or why not?

5. In a team, research the Internet and find the best ways to protect yourself from identity theft.

Reference no: EM131376657

Questions Cloud

Describe your top-three fears in competing in global market : As the CFO, describe your top-three fears in competing in the global market, and how you plan to overcome those fears. Provide support for your rationale.
Personal and organization decisions : What is economics? What role does economics play in your personal and organization's decisions?
How the article can enhance your professional decisions : Discuss how the article can enhance your professional and education decisions in the future. Additionally, explain how you will apply the information in the article to your everyday lifestyle.
Solve the dilemma using kant ethics : Create a 2-4 paragraph "dilemma" similar to the other dilemmas you have been solving throughout this term. Solve the dilemma using Kant's ethics (Categorical Imperative)
What can organizations do to protect themselves : What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?- What can organizations do to protect themselves from hackers looking to steal account data?
How many vending machines should wendy sell : Wendy sells vending machines. She can sell 9 machines if she charges $1,000 per machine; 8 if she sells them at the price of $1,100 per machine; 7 at the price of $1,200 per machine, and 6 at the price of $1300 per machine. Each vending machine co..
Explain the level of responsibility of the company : Based on the information you researched, evaluate the level of responsibility of the company in terms of the effectiveness of the response to the security breach. Provide support for your rationale.
Summarize a statistic reported in a popular magazine article : Briefly summarize a statistic reported in a popular magazine article or website. Describe how they inaccurately portrayed information and what else would need to be considered when looking at this statistical information
Difference between file sharing and internet radio streaming : Why is claiming a lack of copyright knowledge not a good defense against illegally sharing movies or music? If you do not have a good understanding of information laws, what can you do to ensure you are never placed in a federal lawsuit for violat..

Reviews

Write a Review

Management Theories Questions & Answers

  How does the decision in this case impact the validity

How does the decision in this case impact the validity of the Board and other provisions of the Sarbanes-Oxley Act

  Summarize the other main points

Identify the source (writer and title of essay) and state his or her most important point in your own words. Summarize the other main points and their supporting details in separate paragraphs. Discuss the (1) writer's purpose, (2) genre, (3) audienc..

  Reflect the reality of these experiences

Talk to a mother (who can be a member of your immediate family). Ask them about their expectations of pregnancy and birth before they became pregnant and decided to give birth for the first time.

  Share at least two of the steps in the total rewards

Share at least two of the steps in the total rewards planning process and state why you feel they are the most crucial to the planning and implementation process. Use at least 1 reference to support your response. You do not need to interact with a ..

  Is there any particular geographic location that they seem

For the ongoing discussion and response posts, discuss whether you think the featured restaurant will be successful for the long term and why or why not. Are theme restaurants in general successful? Is there any particular geographic location th..

  Identify and defend the pa of the cmmi model

Identify and defend the PA of the CMMI model for American Airlines. The PA, its goals, the specific practices, and the generic practices will be part of the justification. Corporate organizational chart.

  What are any potential bases for the suit

Did the EMT violate the patient's privacy or breach any patient confidentiality?

  Discuss role for business in regulation of source pollution

Is it appropriate to respond to particular environmental incidents with legislation to protect our waters? Discuss the role(s) for business in the regulation of nonpoint source pollution.

  Understanding of sport facilities management including crowd

Demonstrate a working understanding of sport facilities management including crowd, concession, and alcohol management. Assess physical aspects of a sport facility including parking, playing surface, and other facility components. Examine sources for..

  The standard deviation in the temperature

Six Sigma quality (3.4 defects per million units produced) is probably a bit much to ask of Rachel's old oven.

  Explore the elements of emotional intelligence

Suggest two to three (2-3) reasons why leaders' need emotional intelligence to manage today's workforce. Speculate on at least two (2) possible consequences should a leader not possess emotional intelligence. Explore the elements of emotional inte..

  Taking care of your cyber health

Taking Care of Your Cyber Health

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd