This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Teenager

Chapter 2 Identify theft

This essay is written by:

Louis PHD Verified writer

Finished papers: 5822

4.75

Proficient in:

Psychology, English, Economics, Sociology, Management, and Nursing

You can get writing help to write an essay on these topics
100% plagiarism-free

Hire This Writer

Chapter 2

Identify theft

Theft of personal information to commit fraud online is identity theft. This can happen through your email address, but it can also result from online transactions or other circumstances where confidential information such as your credit card details or your social security number is given.

Case 1

California couples and Wi-Fi connection case, which happened at Santa Cruz Country (Latesthackingnews, 2019). Laura Love and David Jackson were tapping internet connection from their neighbor “Neighbors from hell” wireless connection router. The wireless connection helped them access some private information. They had obtained the bank account. They never opened and received some odd items through their mails. David and Laura faced 24 years of state in state prison.

Case 2

The case of Naveen Jyothi. Mr. Jyothi, a private employee, launched a police complaint stating that his details were being used by fraudsters to avail a credit card from the State Bank of India using his name. The cheats had spent a tone of Rs 88,654 using the personal detail of Mr. Jyothi (Iamcheated, 2018). After the police did an investigation, the culprits were arrested. The fraudsters had obtained more than 3o credit cards and cheated the State Bank of India more than Rs. 3,000,000 by miss using them (Iamcheated, 2018).

Case 3

The case of Identity theft through PayPal (Latesthackingnews, 2019). A woman from Lewisville, NC, was a victim of identity theft through PayPal. The 82-year old received an email from hackers purporting to be PayPal support, which made a similar email account and asked her about her private information. The woman did not realize that she was a victim of identity theft until she received a consignment of sex toy of more than $2000 value to her doorstep. Luckily, the hacker fails to recall and adjust the delivery address.

Hacking systems for data

Case 1

The case of Adobe that happened in October 2013 (Swinhoe, 2020). An information security blogger, Brian Krebs, informed that about 3 million debit cards belonging to customers had been stolen. Besides, an undetermined number of user logins had been stolen too. Adobe later acknowledged that usernames and hashed password pairs of over 150 million users taken from Adobe. The hacker had disclosed the customer’s credit card, debit, password, name information.

Case 2

The case of eBay in May of 2014 affected more than 145 million users (Swinhoe, 2020). The corporation had reported that an attack had an uncovered list of over 140 million accounts. It was reported the hacker had used the logins password of three cooperate employees to access the network for 229 days. The time was sufficient for the hacker to manipulate the entire customer information. The corporation informed clients about changing their credentials. Customer data, such as debit and credit card, was not affected, as they were stored in different storage that was not compromised.

Case 3

LinkedIn case of the year 2012 and 2016, which affected 165 million user accounts (Swinhoe, 2020). The company announced in 2012 that an attacker had stolen about 6.5 million credentials who later posted then in a Russian hacker forum. The impact was late felt in the year 2016 when the same hacker who was selling Myspace data was found selling credentials of LinkedIn customers just for five bitcoins. The company acknowledged that it was aware of the break and reset the passwords of the affected accounts.

Cyberstalking/harassment

Case 1

The case of Robert James Murphy (Allegiant, 2017). Mr. Murphy was the first person to be charged for stalking. He had violated the federal law U.S.U.S. Code 223. The law prohibits users from threatening, abuse, annoy, harass, or telecommunicating to anyone. He was accused of sending explicit materials to her ex-girlfriend, which happened for one year. Mr. Murphy later pled guilty of cyberstalking.

Case 2

Five students in the university had been terrorized over the internet for over a year by an honorary graduate of the University of San Diego (Allegiant, 2017). The victims sent hundreds of emails, sometimes 4-5 times a day. The graduate, who thought that the women laughed at him and humiliated others, told the police that he had been involved in these crimes, and faced up to six years in prison. The victims had never met the perpetrator.

Case 3

A South Carolina man was reported to be attached to the WRAL TV station (Allegiant, 2017). He sent several emails to the anchors. These emails enclosed both sexually explicit images and cross-burning content. The South Carolina Investigation Branch examined the case.

Internet fraud

Case 1

The case of “Nigeria” 419. It is a reference number to the law in Nigeria that governs the fraud (Briannica, 2020). Although this method was being used for both fax and traditional mail, the internet brought it new life. In the scheme, a person receives an email stating that the source needs help in shifting a large amount of money from Nigeria or some distant country. This funding is usually in the form of a commodity to be sold, such as oil, or a large sum of cash that needs ‘washing’ to conceal its origin; the variations are endless and new knowledge is constantly being produced.

Case 2

The Internet Crime Complaint Center (IC3) in the U.S., which was established in 2002, revealed that many scam operations had lost greater than $50 M; that represented a triple jump overall loss of $17 M in 2001(Briannica, 2020). In subsequent years, annual losses rose, getting to over $120 M in 2003, roughly, about $200 million in 2006, the value was almost $260 M in 2008 and over $1 billion in 2015. IC3 calls “delayed payment/prepayment,” where either distribution is made of products or services but not paid or not provided, as the main source of fraud in the U.S.

Case 3

Feds take down $1 billion Medicare fraud. Recently, the U.S.U.S. Senate Committee on Aging released its annual report on widespread financial neglect to senior citizens (Primeaux, 2020). Scammers keep targeting the vulnerable population. Dozens of people were accused in a more than $.1.1 billion Medicare fraud, including physicians and owners of medical equipment firms, according to the report. Investigators found a scheme that abused disabled people and people with disabilities by loading them up with knee braces, neck, and back, which they did not need. The program was called Brace Yourself

Non-access computer crimes

Case 1

The case of Cryptolocker. This is a type of Ransomware attack where some faceless person takes hostage your computer (Norton_Team, 2020). It was released in 2013 and spread through email attachment and encrypt user documents so the owner cannot decrypt them back. Evgeniy Bogachev was taken down by Tovar, the chief of the hacker gang behind CryptoLocker, in June 2014. The FBI promised Bogachev a lucrative $3 million reward in February. The malware made a price: CryptoLocker made in 100 days over $30 million with 500,000 victims (Norton_Team, 2020).

Case 2

ILOVEYOU is one of the most known and damaging viruses ever. The virus came in an email that had a subject line saying, “I love you. Two young programmers from the Philippines, Reonel Ramones, and Onel de Guzman were named as the perps, but since there were no laws against malware writing, their charge was dismissed, and they went home. Malware cost: $15billion (Norton_Team, 2020).

Case 3

Like ILOVEYOU, MyDoom is a wide-spreading email based worm. MyDoom was an unusual one, hitting tech firms like Google, Microsoft, and SCO, and with a DDS attack. To destroy its servers, over 20% of infected hosts of the. A variant of the virus supposedly reached the SCO website with a movement jackpot. About 16-25 percent of all emails had been contaminated with MyDoom in 2004. Malware costs: $38 billion (Norton_Team, 2020).

Cyberterrorism

Case 1

The high-profile terrorist assaults on September 11, 2001, in the United States and the subsequent U.S.U.S. War on Terror led to more media scrutiny of the possible dangers of cyberterrorism in the years that followed (Salazar, 2017). Mainstream media reporting also addresses the likelihood of a significant attack utilizing computer networks to sabotage vital infrastructure and services to jeopardize human lives or cause damage, either directly or by the deterioration of the national economy

Case 2

The widely publicized purported intrusion of campaign computers by the Russians of the Democratic Party.  Capturing negative information that was subsequently fed to the Trump campaign to be used and eventually affect the results of the U.S.U.S. elections is an indication of how widespread and essential such attacks can result. The cyber-attack identified as WannaCry, as stated in the New York Times, “wrecked machines in colleges in China, auto plants in Japan hospitals in England, and rail networks in Germany” (Salazar, 2017).

Case 3

The case of a teen who targeted officials in the United States government (BBC, 2018). The teenager had tricked his way to obtain the phone numbers and email addresses. Kane Gamble, an 18 old teenager, was sentenced after he acknowledged multiple charges, has harmed the broader law enforcement community’s “effectiveness.”

 

 

 

 

References

Britannica. (2020). Cybercrime – Identity theft and invasion of privacy. Retrieved from https://www.britannica.com/topic/cybercrime/Identity-theft-and-invasion-of-privacy#ref235701

Norton_Team. (2020). The eight most famous computer viruses of all time. Retrieved from https://uk.norton.com/norton-blog/2016/02/the_8_most_famousco.html

Allegiant. (2017, May 30). Real cyber stalking cases. Retrieved from https://allegiantinvestigation.com/real-cyber-stalking-cases/

Salazar, M. (2017, July 2). Cyber terrorism. Retrieved from https://news.mb.com.ph/2017/07/02/cyber-terrorism/

BBC. (2018, April 20). Two years for teen ‘cyber terrorist’. Retrieved from https://www.bbc.com/news/uk-england-leicestershire-43840075

Iamcheated. (2018, May 7). Real life example of identity theft. Retrieved from https://iamcheated.indianmoney.com/blogs/real-life-example-of-identity-theft

Latesthackingnews. (2019, July 23). 4 real-life examples of stolen identity and how they did it. Retrieved from https://latesthackingnews.com/2019/07/23/4-real-life-examples-of-stolen-identity-and-how-they-did-it/

Primeaux, E. (2020, January). 5 most scandalous fraud cases of 2019. Retrieved from https://www.fraud-magazine.com/recap-article19.aspx?id=4295009428

Swinhoe, D. (2020, April 17). The 15 biggest data breaches of the 21st century. Retrieved from https://www.csoonline.com/article/2130877/the-biggest-data-breaches-of-the-21st-century.html

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask