Ask Management Theories Expert

Hacker Hunters Hacker hunters are the new breed of crime fighter. They employ the same methodology used to fight organized crime in the 1980s-informants and the cyberworld equivalent of wiretaps. Daniel Larking, a 20-year veteran who runs the FBI's Internet Crime Complaint Center, taps online service providers to help track down criminal hackers. Leads supplied by the FBI and eBay helped Romanian police round up 11 members of a gang that set up fake eBay accounts and auctioned off cell phones, laptops, and cameras they never intended to deliver. The FBI unleashed Operation Firewall, targeting the ShadowCrew, a gang whose members were schooled in identity theft, bank account pillage, and selling illegal goods on the Internet.

ShadowCrew's 4,000 gang members lived in a dozen countries and across the United States. For months, agents had been watching their every move through a clandestine gateway into their website, shadowcrew. com. One member turned informant and called a group meeting, ensuring the members would be at home on their computers during a certain time, when the Secret Service issued orders to move in on the gang. The move was synchronized around the globe to prevent gang members from warning each other via instant messages. Twenty-eight gang members in eight states and six countries were arrested, most still at their computers. Authorities seized dozens of computers and found 1.7 million credit card numbers and more than 18 million email accounts.

ShadowCrew's Operations The alleged ringleaders of ShadowCrew included Andres Mantovani, 23, a part-time community college student in Arizona, and David Appleyard, 45, a former New Jersey mortgage broker. Mantovani and Appleyard allegedly were administrators in charge of running the website and recruiting members. The site created a marketplace for more than 4,000 gang members who bought and sold hot information and merchandise. The website was open for business 24 hours a day, but since most of the members held jobs, the busiest time was from 10 p.m. to 2 a.m. on Sundays. Hundreds of gang members would meet online to trade credit card information, passports, and even equipment to make fake identity documents. Platinum credit cards cost more than gold ones, and discounts were offered for package deals.

One member known as "Scarface" sold 115,695 stolen credit card numbers in a single trade. Overall, the gang made more than $4 million in credit card purchases over two years. ShadowCrew was equivalent to an eBay for the underworld. The site even posted crime tips on how to use stolen credit cards and fake IDs at big retailers. The gang stole credit card numbers and other valuable information through clever tricks. One of the favorites was sending millions of phishing emails-messages that appeared to be from legitimate companies such as Yahoo!-designed to steal passwords and credit card numbers. The gang also hacked into corporate databases to steal account data.

According to sources familiar with the investigation, the gang cracked the networks of 12 unidentified companies that were not even aware their systems had been breached. Police Operations Brian Nagel, an assistant director at the Secret Service, coordinated the effort to track the ShadowCrew. Allies included Britain's national high-tech crimes unit, the Royal Canadian Mounted Police, and the Bulgarian Interior Ministry. Authorities turned one of the high-ranking members of the gang into a snitch and had the man help the Secret Service set up a new electronic doorway for ShadowCrew members to enter their website. The snitch spread the word that the new gateway was a more secure way to the website. It was the first-ever tap of a private computer network. "We became shadowcrew. com ," Nagel said. Mantovani and Appleyard were slated for trial. Authorities anticipated making additional arrests.

Questions

1. What types of technology could big retailers use to prevent identity thieves from purchasing merchandise?

2. What can organizations do to protect themselves from hackers looking to steal account data?

3. Authorities frequently tap online service providers to track down hackers. Do you think it is ethical for authorities to tap an online service provider and read people's email? Why or why not?

4. Do you think it was ethical for authorities to use one of the high-ranking officials to trap other gang members? Why or why not?

5. In a team, research the Internet and find the best ways to protect yourself from identity theft.

Management Theories, Management Studies

  • Category:- Management Theories
  • Reference No.:- M92186485

Have any Question?


Related Questions in Management Theories

Assignment -for this assignment analyze and discuss your

Assignment - For this assignment, analyze and discuss your personal leadership style. Based on your experiences, current readings, work experience, education, and use of self-assessment instruments describe what you thin ...

Assignment -personal reflection 1 -instructions - watch

Assignment - Personal Reflection 1 - Instructions - Watch Milgram's obedience video: Milgram Experiment Proves We Blindly Obey Authority. Consider the following. Christ called his disciples to follow him (Mark 1:17). He ...

Assignment -instructions - please follow instructions for

Assignment - Instructions - Please follow instructions for all for Personal Learning Journal. And each personal learning journal should be of 300words. Each student will keep a personal journal to reflect and record thei ...

Healthcare information technology overview the current

Healthcare Information Technology Overview: The current healthcare industry utilizes a plethora of healthcare information technology (HIT) systems. HIT systems are designed to enhance quality outcomes, prevent adverse ev ...

Archetypes in actionsenge ross smith roberts amp kleiner

Archetypes in Action Senge, Ross, Smith, Roberts, & Kleiner (1994) noted: At its broadest level, systems thinking encompasses a large and fairly amorphous body of methods, tools, and principles, all oriented to looking a ...

Assessment descriptionyou are required to read the

Assessment Description You are required to read the following journal article article: 1. How Risky is Your Company? HBR. May-June 1999 You are also required to read a fictional case study based on a company that will be ...

Discussion - this discussion deals with the important topic

Discussion - This Discussion deals with the important topic of whether money is a motivator for increased job performance and satisfaction. Look at your own history of how you have been compensated, what problems you saw ...

Question - choose a product or technology interview five

Question - Choose a product or technology. Interview five consumers who buy that product and ask them what major problems they have with the product (or what major things they dislike about it). Then ask them to describe ...

Questions -1 choose an industry and then use the library or

Questions - 1. "Choose an industry and then use the library or the Internet to find data from secondary sources that will be highly useful in developing a marketing plan." Start thinking of the industry that relates to t ...

Developing leaders and organisations assessment - report on

Developing, Leaders and Organisations Assessment - Report on Promoting Individual Informal Workplace Learning Brief - You are the newly-appointed Human Resource Advisor in a medium-sized business that employs approximate ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As