Cyberspace Crime Can Happen To You If You Are Not Careful-isobuster

News-and-Society Cyberspace Crime is Closer To You Than You Think The world is a dangerous place. Muggers are poised to jump you if you walk down the wrong darkened alley, con artists are scheming to relieve you of your retirement fund, and co-workers are out to ruin your career. Organized crime syndicates are spreading corruption, drugs, and fear with the efficiency of Fortune 500 .panies. There are crazed terrorists, nutty dictators, and uncontrollable remnants of former superpowers with more firepower than sense. And if you believe the newspapers at your supermarkets checkout counter, there are monsters in the wilderness, creepy hands from beyond the grave, and evil space aliens carrying Elviss babies. Sometimes its amazing that weve survived this long, let alone built a society stable enough to have these discussions. The world is also a safe place. While the dangers in the industrialized world are real, they are the exceptions. This can sometimes be hard to remember in our sensationalist age newspapers sell better with the headline Three Shot Dead in Random Act of Violence than Two Hundred and Seventy Million Indians have Uneventful Day but it is true. Almost everyone walks the streets every day without getting mugged. Almost no one dies by random gunfire, gets swindled by flimflam men, or returns home to crazed marauders. Most businesses are not the victims of armed robbery, rogue bank managers, or workplace violence. Less than one percent of online transactionsunmediated long- distance deals between strangersresult in any sort of .plaint. People are, on the whole, honest; they generally adhere to an implicit social contract. The general lawfulness in our society is high; thats why it works so well. (I realize that the previous paragraph is a gross oversimplification of a .plex world. I am writing this in India in the year 2012. I am not writing it in Kabul, Karachi, or Baghdad. I have no experiences that can speak to what it is like to live in such a place. My personal expectations of safety .e from living in a stable democracy. This book is about the security from the point of view of the industrialized world, not the world torn apart by war, suppressed by secret police, or controlled by terrorist organisations and criminal syndicates. This book is about the relatively minor threats in a society where the major threats have been dealt with.) Attacks, whether criminal or not, are exceptions. Theyre events that take people by surprise, that are news in its real definition. Theyre disruptions in the societys social contract, and they disrupt the lives of the victims. THE UNCHANGING NATURE OF ATTACKS If you strip away the technological buzzwords and graphical user interfaces, cyberspace isnt all that different from its flesh-and-blood, bricks and-mortar, atoms-not-bits, real-world counterpart. Like the physical world, people populate it. These people interact with others, form .plex social and business relationships, live and die. Cyberspace has .munities, large and small. Cyberspace is filled with .merce. There are agreements and contracts, disagreements and torts. And the threats in the digital world mirror the threats in the physical world. If embezzlement is a threat, then digital embezzlement is also a threat. If physical banks are robbed, then digital banks will be robbed. Invasion of privacy is the same problem whether the invasion takes the form of a photographer with a telephoto lens or a hacker who can eavesdrop on private chat sessions. Cyberspace crime includes everything youd expect from the physical world: theft, racketeering, vandalism, voyeurism, exploitation, extortion, con games, fraud. There is even the threat of physical harm: cyberstalking, attacks against the air traffic control system, etc. To a first approximation, online society is the same as offline society. And to the same first approximation, attacks against digital systems will be the same as attacks against their analog analogues. This means we can look in the past to see what the future will hold. The attacks will look differentthe burglar will manipulate digital connections and database entries instead of lockpicks and crowbars, the terrorist will target information systems instead of airplanesbut the motivation and psychology will be the same. It also means we dont need a .pletely different legal system to deal with the future. If the future is like the pastexcept with cooler special effectsthen a legal system that worked in the past is likely to work in the future. In olden days robbers robbed banks because that was where the money was and they still do. Today, though the real money isnt in banks; its zipping around .puter networks. Every day, the worlds banks transfer billions of dollars among themselves by simply modifying numbers in .puterized databases. Meanwhile, the average physical bank robbery grosses a little over fifteen hundred dollars. And cyberspace will get even more enticing; the dollar value of electronic .merce gets larger every year. Where Theres money, There Are Criminals. Walking into a bank or a liquor store wearing a ski mask and brandishing a .45 isnt .pletely pass, but its not the preferred method of criminals drug-free enough to sit down and think about the problem. Organized crime prefers to attack large-scale systems to make a large-scale profit. Fraud against credit cards and check systems has gotten more sophisticated over the years, as defenses have gotten more sophisticated. Automatic teller machine (ATM) fraud has followed the same pattern. If we havent seen widespread fraud against Internet payment systems yet, its because there isnt a lot of money to be made there yet. When there is, criminals will be there trying. And if history is any guide, they will succeed. Privacy violations are nothing new, either. An amazing array of legal paperwork is public record: real estate transactions, boat sales, civil and criminal trials and judgments, bankruptcies. Want to know who owns that boat and how much he paid for it? Its a matter of public record. Even more personal information is held in the 20,000 or so (in the United States) personal databases held by corporations: financial details, medical information, lifestyle habits. Investigators (private and police) have long used this and other data to track down people. Even supposedly confidential data gets used in this fashion. No private investigator has survived half a season with out a friend in the local police force willing to look up a name or a license plate or a criminal record in the police files. Police routinely use industry databases. And every few years, some bored IRS operator gets caught looking up the tax returns of famous people. Marketers have long used whatever data they could get their hands on to target particular people and demographics. Mostly personal data do not belong to the person whom the data are about, they belong to the organization that collected it. Your financial information isnt your property, its your banks. Your medical information isnt yours, its your doctors. Doctors swear oaths to protect your privacy, but insurance providers and HMOs do not. Do you really want everyone to know about your heart defect or your familys history of glau.a? How about your bout with alcoholism, or that embarrassing brush with venereal disease two decades ago? Privacy violations can easily lead to fraud. In the novel Paper Moon, Joe David Brown wrote about the Depression-era trick of selling bibles and other merchandise to the relatives of the recently deceased. Other scams targeted the mothers and widows of overseas war dead for only pennies a day well care for his graveand people who won sweepstakes. In many areas in the country, public utilities are installing telephone-based systems to read meters: water, electricity, and the like. Its a great idea, until some enterprising criminal uses the data to track when people go away on vacation. Or when they use alarm monitoring systems that give up-to-the-minute details on building occupancy. Wherever data can be exploited, someone will try it, .puters or no .puters. Nothing in cyberspace is new. Child pornography: old hat. Money laundering: seen it. Bizarre cults offering everlasting life in exchange for your personal check: how dclass. The underworld is no better than business people at figuring out what the Net is good for; theyre just repackaging their old tricks for the new medium, taking advantage of the subtle differences and exploiting the Nets reach and scalability. Sounds Scary doesnt it? But this is something that the individual in the modern world will gradually have to learn to start to live with. If you are on Facebook you are willingly sharing details about your life with the world and there is no way that you can protest later that where you are, what you do and where you go to work and play is confidential information. The world is now not only yours but everybodys playground. Just use your .mon sense and keep your mind on high alert all the time in the online world and do not be silly enough to give out confidential information about your finances, passwords, etc. And if ever you are in doubt that you may have unknowingly given away confidential information or you sense that there is something amiss do not hesitate to instantly call upon trusted friends and family or contact trusted private detectives and investigators to track the issue before it gets too late. Note: Feel free to republish this article on your own blog or website but please copy paste the below Author Credits and include it at the bottom of your post or page. Thank you. About the Author: 相关的主题文章: