Phishing Tales: Honestly, the problem is ‘this big’ Peter Black, Queensland University of Technology

Slides:



Advertisements
Similar presentations
Chapter 11: Computer Crime, Fraud, Ethics, and Privacy
Advertisements

The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Protect Yourself Against Phishing. The good news: The number of US adult victims of identity fraud decreased from 9.3 million in 2005, to 8.4 million.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
How It Applies In A Virtual World. Phishing Definition: n. To request confidential information over the Internet under false pretenses in order to fraudulently.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
What is identity theft, and how can you protect yourself from it?
Phishing and Pharming New Identity Theft Threats Presentation by Jason Guthrie.
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
By The Blank Mind Group Dana Fellows Jason Kohut Rick Barton Darrell Fraser Kuo-Luen Chang Darrell Fraser Kuo-Luen Chang.
Internet Phishing Not the kind of Fishing you are used to.
Phishing into the Future Starr Alexander Sugato Bose Annie Chanchaisri Philip Fort David Salley Allen Walker Thomas Witnauer.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
How It Applies In A Virtual World
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
INTRODUCTION Coined in 1996 by computer hackers. Hackers use to fish the internet hoping to hook users into supplying them the logins, passwords.
What distinguishes cyber crime from “traditional” crime? What distinguishes cyber crime from “traditional” crime? How has the Internet expanded opportunities.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Security of systems Security risks come from two areas: employees (who introduce accidental and intentional risks) and external computer crime. Unfortunately.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Phishing Pharming Spam. Phishing: Definition  A method of identity theft carried out through the creation of a website that seems to represent a legitimate.
Web Spoofing Steve Newell Mike Falcon Computer Security CIS 4360.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
Presented by : Phishing Identity Theft Supervised by : Mr M. ABDELLAOUI Afaf DAHMANI Amal ATMANI Imane ALLAL.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
CCT355H5 F Presentation: Phishing November Jennifer Li.
BY : MUHAMMAD KHUZAIMI B. ISHAK 4 ADIL PUAN MAZITA INFORMATION AND COMMUNICATION OF TECHNOLOGY.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Topic 5: Basic Security.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Cybercrime What is it, what does it cost, & how is it regulated?
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
A threat to global security and economy Koushik Mannepalli CMPE 294.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
IDENTITY THEFT Nicholas Michalak. Agenda What is Identity Theft? Background of Identity Theft Legislation Against it Different types and Examples What.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Issues for Computer Users, Electronic Devices, Computer and Safety.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Fall Phishing - attempt to acquire sensitive information, like bank account information or an account password, by posing as a legitimate entity.
Protecting Yourself from Fraud including Identity Theft
Done by… Hanoof Al-Khaldi Information Assurance
Protecting Yourself from Fraud including Identity Theft
Information Security Session October 24, 2005
Protecting Yourself from Fraud including Identity Theft
Computer Security.
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Phishing “In computing, phishing (also known as carding and spoofing) is a form of social engineering, characterized by attempts to fraudulently acquire.
Protecting Yourself from Fraud including Identity Theft
Presentation transcript:

Phishing Tales: Honestly, the problem is ‘this big’ Peter Black, Queensland University of Technology

Outline 1. Phishing explained Definition Case studies Why the ‘ph’? 2. Growth of phishing 3. Australian legislation 4. US position 5. Difficulties with a legislative response 6. Other methods of combating phishing

1. Phishing explained Phishing is the creation and use of s and websites in order to deceive internet users into disclosing their bank and financial account information or other personal data. Once this information is obtained, it then used to commit fraudulent acts.

Case study: Westpac Source: Anti-Phishing Working Group

Case study: Westpac Source: Anti-Phishing Working Group

Case study: Westpac Source: Anti-Phishing Working Group

Other targets: Internet services Source: Anti-Phishing Working Group

Other targets: Internet services Source: Anti-Phishing Working Group

Other targets: Online commerce sites Source: Anti-Phishing Working Group

Other targets: Online commerce sites Source: Anti-Phishing Working Group

Other targets: Online commerce sites Source: Anti-Phishing Working Group

Other targets: Search engines Source: millersmiles.co.uk: the web’s dedicated anti-phishing service

Charities: United Way Source: millersmiles.co.uk: the web’s dedicated anti-phishing service

Why phishing with a ‘ph’? The word ‘phishing’ is derived from the analogy that internet scammers use lures to ‘fish’ for passwords and financial information from the ‘sea’ of internet users. The term was first used in 1996 by hackers attempting to steal America On-line (AOL) accounts.

2. Growth of phishing Source: Anti-Phishing Working Group: Phishing Activity Trends Report May 2006

Phishing sites hosting countries Source: Anti-Phishing Working Group: Phishing Activity Trends Report May 2006

Economic impact of phishing The dollar damage from phishing is substantial. Estimates of the loss to the consumer and online commerce being between: $500 million a year (Ponemon Institute 2004); and $2.4 billion in 2003 (Gartner 2004). Phishing also exacts a significant toll on individual consumers. See Jennifer Lynch, ‘Identity Theft in Cyberspace: Crime Control Methods and Their Effectiveness in Combating Phishing Attacks’(2005) 20 Berkeley Technology Law Journal 259 at

3. Australian legislation Phishing could be criminally prosecuted under state legislation that deals with identity theft and fraud: Crimes Act 1958 (Vic): obtaining property by deception (s 81(1)), and obtaining financial advantage by deception (s 82); Crimes Act 1900 (NSW): obtaining money by deception (s 178BA), obtaining money by false or misleading statements (s 178BB), obtaining credit by fraud (s 178C), false pretences (s 179), and fraudulent personation (s 184); Criminal Code 1899 (Qld): misappropriation (s 408C); Criminal Code (WA): fraud (s 409(1));

Australian legislation continued … Criminal Code Act 1924 (Tas): dishonestly acquiring a financial advantage (s 252A(1)), and inserting false information on data (s 257E); Criminal Code 2002 (ACT): obtaining financial advantage by deception (s 332), and general dishonesty (s 333); Criminal Code (NT): criminal deception (s 227); Criminal Law Consolidation Act 1935 (SA): false identity (s 144B), and misuse of personal identification information (s 144C).

Criminal Code Act 1995 (Cth) Part 10.8 of the Criminal Code Act, s provides: A person is guilty of an offence if the person: a) dishonestly obtains, or deals in, personal financial information; and b) obtains, or deals in, that information without the consent of the person to whom the information relates. Penalty:Imprisonment for 5 years.

Other relevant Commonwealth legislation 1. Spam Act 2003 (Cth); 2. Trade Practices Act 1974 (Cth); 3. Privacy Act 1988 (Cth); 4. Trade Marks Act 1995 (Cth).

4. US Position Federal offences: 1. Identity theft (18 U.S.C (2000)); 2. Wire fraud (18 U.S.C (2000 & Supp. II 2002)); 3. Access device fraud (18 U.S.C (2002)); 4. Bank fraud (18 U.S.C (2000)). Internet users are also protected by the: Truth in Lending Act (15 U.S.C. 1643(a)(1) (2000)); and Gramm-Leach-Bailey Act (15 U.S.C. 6821(b) (2000)).

US Position The Identity Theft Penalty Enchancement Act, enacted in 2004, established a new crime of ‘aggravated identity theft’ – using a stolen identity to commit other crimes. Most states have criminal and consumer protection laws that deal with identity theft. Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN-SPAM Act), enacted in 2003.

Anti-Phishing Act of 2005 Anti-Phishing Act of 2005, a bill to create two new crimes that prohibit the creation or procurement of: 1. a website that represents itself to be that of a legitimate business, and that attempts to induce the victim to divulge personal information, with the intent to commit a crime of fraud or identity theft. 2. an that represents itself to be that of a legitimate business, and that attempts to induce the victim to divulge personal information, with the intent to commit a crime of fraud or identity theft.

5. Difficulties with a legislative response 1. Phishing is difficult to deter as the normal barriers to offline crime do not apply. 2. Phishers are able to appear and disappear remarkably quickly, making their identification and prosecution difficult. 3. Jurisdictional issues. 4. Phishers are often found to be judgment proof.

6. Other methods of combating phishing Information security technology solutions: 1. Strong website authentication; 2. Mail server authentication,; 3. Digital signatures and/or gateway verification. Internet users should also use spam filters on , anti-virus software and personal firewalls.

6. Other methods of combating phishing Internet users should look for signs that the they have received is a phishing deceptive addresses; s addressed to a generic name rather than a username; unsuspected requests for personal information; alarmist warnings; mistakes.

Conclusion Issue: legislation vs technology Professor Lawrence Lessig has argued that architecture or ‘code’ is better than traditional law in cyberspace because law regulates ‘through the threat of ex post sanction, while code, in constructing a social world, regulates immediately’. Lawrence Lessig, ‘The Constitution of Code: Limitations on Choice-Based Critiques of Cyberspace Regulation’, 5 CommLaw Conspectus 181, 184 (1997).

Conclusion As we wait for technological improvements, companies and consumers need to be aware of the phishing threat and use existing technology and common sense to reduce the instances of successful phishing attacks. If companies and consumers fail to respond, phishing will have caught us hook, line and sinker.

Creative Commons License This work is licensed under the Creative Commons Attribution-NonCommercial- ShareAlike 2.5 Australia License. To view a copy of this license, visit sa/2.5/au/ or send a letter to Creative Commons, 543 Howard Street, 5 th Floor, San Francisco, California, 94105, USA. sa/2.5/au/