Professional Documents
Culture Documents
Cyber Crime and Digital Forensics-Unit-IV-Part-II
Cyber Crime and Digital Forensics-Unit-IV-Part-II
UNIT-IV
Part-II
Mr.V.Yuvaraj
Assistant Professor – Department of Computer Applications
Dr. N.G.P. ARTS AND SCIENCE COLLEGE
Dr. N.G.P.-KALAPATTI ROAD
COIMBATORE-641 048
Tamil Nadu, India
Mobile: +917502919891,
E-mail: yuvaraj.v@drngpasc.ac.in
Dr. NGPASC
COIMBATORE | INDIA
Computer Forensics and Cyber
Crime
CHAPTER 5
Identity Theft and
Identity Fraud
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Learning Objectives
Dr. NGPASC
COIMBATORE | INDIA
Learning Objectives
Dr. NGPASC
COIMBATORE | INDIA
Introduction
Dr. NGPASC
COIMBATORE | INDIA
Typologies of Internet Theft/Fraud
• Assumption of Identity
– Involves one person assuming all aspects of the other’s life
– Rare, because of the difficulty in accomplishing it
Dr. NGPASC
COIMBATORE | INDIA
Typologies of Internet Theft/Fraud
Dr. NGPASC
COIMBATORE | INDIA
Typologies of Internet Theft/Fraud
Dr. NGPASC
COIMBATORE | INDIA
Typologies of Internet Theft/Fraud
Dr. NGPASC
COIMBATORE | INDIA
Typologies of Internet Theft/Fraud
Dr. NGPASC
COIMBATORE | INDIA
Prevalence and Victimology
Dr. NGPASC
COIMBATORE | INDIA
Prevalence and Victimology
Dr. NGPASC
COIMBATORE | INDIA
Prevalence and Victimology
Dr. NGPASC
COIMBATORE | INDIA
Prevalence and Victimology
• Factors:
– Loss of consumer confidence
– Delay in victim awareness
– General lack of reporting
Dr. NGPASC
COIMBATORE | INDIA
Prevalence and Victimology
Dr. NGPASC
COIMBATORE | INDIA
Physical Methods of Identity Theft
Mail Theft
• Information stolen from mailboxes, including credit card offers,
government documents, like Social Security statements and passports, for
example.
• Popcorning: steal information by looking for raised flags which signal
outgoing mail
Dumpster Diving
• Searching waste receptacles for identification information
Dr. NGPASC
COIMBATORE | INDIA
Physical Methods of Identity Theft
• Theft of Computers
– Physical theft of computers, especially laptops, from
airports, hotel rooms, homes, and offices, because they
contain personal information
Dr. NGPASC
COIMBATORE | INDIA
Physical Methods of Identity Theft
• Bag Operations
– Theft of intelligence
– By governmental intelligence operatives
– Often committed in hotel rooms
– Often done by using corrupted hotel employees
– Easier to do because of portable mass storage media
Dr. NGPASC
COIMBATORE | INDIA
Physical Methods of Identity Theft
• Child Identity Theft
– Typically committed by parents
– Dramatically increasing
– Problems include delayed identification; also, not within
the purview of child welfare agencies
Dr. NGPASC
COIMBATORE | INDIA
Physical Methods of Identity Theft
• Insiders
– Since committed by employees, intentionally or
accidentally, perhaps the greatest threat
• Fraudulent/Fictitious Companies
– Very sophisticated
– Involves the creation of shell companies to gather personal
information
Dr. NGPASC
COIMBATORE | INDIA
Physical Methods of Identity Theft
• Card Skimming
– Theft of personal information encoded on the magnetic
strip of credit/debit card
• ATM Manipulation
– Includes stealing personal information, like PIN, through
use of fraudulent ATM
Dr. NGPASC
COIMBATORE | INDIA
Virtual or Internet-Facilitated Methods
Dr. NGPASC
COIMBATORE | INDIA
Virtual or Internet-Facilitated Methods
• Phishing
– Involves fraudulent e-mails seeking information, use of
fake web sites
– Difficult to identify offenders
• Variations include:
– Spoofing: Soliciting funds via false, but apparently
authentic, communications
– Pharming: Redirecting connection from legitimate IP
address to redirect to a mirror site
Dr. NGPASC
COIMBATORE | INDIA
Virtual or Internet-Facilitated Methods
– Redirector: Malware redirects traffic to undesired site
– Advance-fee/419 fraud: Strangers deceiving people into
providing financial information, often due to a promise of a
windfall
– Phishing Trojans or spyware, often to create botnets
– Floating windows, placed over address bar of a browser, to
site to steal personal info
– Botnets: Change Web site IP address without changing
domain name, to steal info and spread malware
Dr. NGPASC
COIMBATORE | INDIA
Virtual or Internet-Facilitated Methods
Dr. NGPASC
COIMBATORE | INDIA
Virtual or Internet-Facilitated Methods
• Trojans
– Can have an apparently legitimate purpose; often,
keyloggers, password-stealers, or installers of back doors
Dr. NGPASC
COIMBATORE | INDIA
Crimes Facilitated by Identity Theft/Fraud
Dr. NGPASC
COIMBATORE | INDIA
Crimes Facilitated by Identity Theft/Fraud
Dr. NGPASC
COIMBATORE | INDIA
Conclusions and Recommendations
Dr. NGPASC
COIMBATORE | INDIA
Conclusions and Recommendations
Dr. NGPASC
COIMBATORE | INDIA
Conclusions and Recommendations
Dr. NGPASC
COIMBATORE | INDIA
Dr. NGPASC
COIMBATORE | INDIA 32