Professional Documents
Culture Documents
“CIA Director John Brennan is planning on updating the agency's approaches, amid an
exploding use of smartphones, social media and other technologies. His plans call for an
increased use of cyber capabilities in operations ranging from identifying foreign officials to
recruit as informants, to confirming the identities of drone strike targets. Several officials
have said that Brennan has even considered creating a new cyber-directorate. The
expanded emphasis on cyber is part of a broader restructuring envisioned by Brennan.
The plans are expected to further raise worries among privacy and human rights
advocates.”
REFRENCES: https://www.youtube.com/watch?v=IxUHuYMlLzs
Another example of cyber spying is Blackgear espionage campaign, who used ELIRKS
and Ymair (malwares) as command and control (C&C) servers allowing the attackers
to keep the actual C&C server hidden and easily change the server that is in use.
REFERENCES
IDENTITY THEFT
Recent research reveals that identity theft affects millions of people a year, costing
victims countless hours and money in identity recovery and repair.(Kent.lewis.”how
social media networks facilitate identity theft and fraud”,[ONLINE]. AVAILABLE:
https://www.eonetwork.org/octane-magazine/special-features/social-media-networ
ks-facilitate-identity-theft-fraud)
3.TRADE OF ILLEGAL PRODUCTS: This particular crime involves buying and selling
products and services that are either illegal or banned in a certain locality. It usually
consists of buying drugs, alcohol, etc. For example, according to(R. Byrne Reilly,
"Buying a gun on Facebook takes 15 minutes," February 2014. [Online]. Available:
https://venturebeat.com/2014/02/26/exclusive-buying-agun-on-facebook-takes-15-
minutes/) a 15-year old student was arrested in Kentucky on accounts of carrying
an unlicensed and loaded gun on school premises. Upon interrogation, he confessed
that he had bought the gun on Facebook.
4.PHISHING: Phishing refers to a kind of fraud in which the criminal tries to gain
access to personal information,such as account information or login credentials by
impersonating as a trusted entity. This usually performed by two methods. First
sending links of fake Websites that capture your login and password credentials and
second by becoming friends with the person by sending false acquaintance messages,
which the person unknowingly accepts (P. Hoelscher, 2017. [Online]. Available:
http://resources.infosecinstitute.com/category/enterprise/phi
shing/the-phishing-landscape/phishing-attacks-bydemographic/social-networks/#gr
ef). On social networking sites, this is accomplished by sending requests to play a
Quiz, complete a survey or share something for a free giveaway(Experian, "Facebook
Fraud: Identity Theft through Social Networking," 2010. [Online]. Available:
https://www.protectmyid.com/images/education_center/pdf/
050TypesofFraud/7_types%20of%20fraud_social%20netw orking.pdf.)
5.HACKING: A very common and easy method for criminals is to steal identities
nowadays through social media accounts. This is mostly due to everyone’s habit of
using the same password for almost all accounts. Once the hacker gets access to
your social accounts, they can easily get hold of your bank account data, online
shopping details, and credit card details or even use your social accounts to perform
criminal activities (N. Farhoud, August 2016. [Online]. Available:
http://www.mirror.co.uk/news/uk-news/how-hackers-cansteal-your-857665)