How to Stop Cybercriminals in Their Tracks
How to Stop Cybercriminals in Their Tracks"
- Select a language for the TTS:
- UK English Female
- UK English Male
- US English Female
- US English Male
- Australian Female
- Australian Male
- Language selected: (auto detect) - EN
Play all audios:
By Brett Johnson En español Published April 18, 2022
Just as any legitimate enterprise today requires tech expertise to keep computers and networks running, so do fraud enterprises. The difference, if you believe the movies, is that the person
in charge of tech at a criminal operation would be a young, slightly crazy computer genius, able to type 200 words a minute and penetrate the Pentagon’s most secure computers in seconds,
simply for fun.
As a former cybercriminal and current FBI consultant, I can attest that a few people like that do exist. Take Jonathan, a bright young man I got to know who actually broke into Pentagon
computers before he was old enough to vote. He got in trouble for shutting down NASA computers for three weeks. After that, he joined a crew that went hard into credit card theft. Three
years into it, he was arrested. Later he died by suicide.
But most cybercriminals aren’t tech geniuses like Jonathan was; they’re good at basic skills and willing to learn.
Kim, for example, was a middle-aged bookseller from Denver who must haveread too many crime thrillers and “how-to” computer manuals. Relying solely on what he learned from books, he became a successful cybercriminal — until the law caught up with him. He spent
four years in federal prison.Thomas had retired from a career as a mortgage officer before he decided there was easier money to be had from stealing over the web. He, too, ended up in
prison.David was a career criminal — check-kiting was his bread and butter until he discovered it was easier to steal as a cybercrook.Albert was a kid from Miami with computer skills who
became very rich before he was caught and given a 20-year prison sentence.Ray was a retired Army officer who didn’t begin his cybercrime career until he was 64.Shawn was an aspiring actor
who was a natural at identity theft.
These are just some of the people I know who got caught. Most high-tech scammers don’t. But what we can learn from them is that there is no single profile of a cybercriminal — other than
they are motivated by what they believe will be easy money.
What you can also take away from their stories is that the tech tools of criminality are relatively easy to find, buy and use. Order some computers and headsets, get top-grade internet
service, buy and install the right software, teach your workers to use it and other online tools, and your boiler room can be up and running quickly.
The dark webThis underground part of the internet began as a project developed by the U.S. Navy to allow intelligence operatives to communicate with each other anonymously. Over time, the Navy made its
Tor browser “open source,” meaning anyone could use the dark web, including you and me — and for free. That has proven to be a jackpot for criminals. Because of its ability to keep users
anonymous, tech specialists train scam artists how to use it to communicate, share information, buy stolen goods and services, and plot criminal activities.
Trending News
The chase: bradley walsh fans upset by show announcementFans of The Chase, hosted by Bradley Walsh, were told repeats would broadcast over the Bank Holiday weekend. However, vi...
New funding from uk space agency will kickstart space technology projectsNews story NEW FUNDING FROM UK SPACE AGENCY WILL KICKSTART SPACE TECHNOLOGY PROJECTS Government grants worth up to £15,0...
Fueling IgA production | Nature ImmunologyAccess through your institution Buy or subscribe Intestinal microbiota and their metabolites can regulate both local and...
Birmingham airport 'in discussions' to reintroduce direct us routesBIRMINGHAM AIRPORT BOSS NICK BARTON HAS RESPONDED TO HINTS THAT DELTA, BIRMINGHAM CITY FOOTBALL CLUB'S SPONSOR, COU...
The page you were looking for doesn't exist.You may have mistyped the address or the page may have moved.By proceeding, you agree to our Terms & Conditions and our ...
Latests News
How to Stop Cybercriminals in Their TracksBy Brett Johnson En español Published April 18, 2022Just as any legitimate enterprise today requires tech expertise to...
Brighton v Man City LIVE STREAM: How to watch Premier League title decider LIVE onlineManchester City look almost certain to be crowned Premier League champions when they visit Brighton & Hove Albion this a...
Sky has a new rival that's offering a very cheap way to watch tvThere's a new way to get TV beamed into your home and it's taking aim at Sky Q and BT TV. Air Broadband might ...
Prothoracic Gland Stimulation by Juvenile Hormone Extracts of InsectsArticle Published: 18 July 1959 Prothoracic Gland Stimulation by Juvenile Hormone Extracts of Insects LAWRENCE I. GILBER...
Association study of a dopamine transporter polymorphism and attention deficit hyperactivity disorder in UK and Turkish samples | Molecular PsychiatryOriginal Research Article Published: 09 July 2001 Association study of a dopamine transporter polymorphism and attention...