SlideShare a Scribd company logo
1 of 55
Unearthing and Dissecting Internet Fraud
Michael Krieger ,[object Object]
“ You will  never catch up  with the new technology.”
“ I swear I wasn’t looking at smut –  I was just stealing music.”
” I loved your E-mail, but I thought you’d be older.”
We all face increasingly challenging problems, arising from . . . .
Spam ever-more-ubiquitous technology sophistication, ” Just for kicks, Leon, let’s shut down the FBI again.”
Spam to identity and privacy scams,
to overt criminality, some latent “ You know, you can do this just as easily online.”
“ Big Tony’s website – get rid of it.” …  and others well-organized.
Introductions
David J. Steele ,[object Object],[object Object],[object Object]
Bennet Kelley ,[object Object],[object Object],[object Object]
Part 1 The Problems
A Growing Problem ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lions and Tigers and   ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Phishing ,[object Object],[object Object]
Common Types of Phishing ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Dragnet Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Lobstah Paht
Spyware ,[object Object],[object Object]
The Wares ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Domain Name Fraud ,[object Object],[object Object],[object Object]
Domain Name “Tasting” ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
How Bad is the Problem? ,[object Object],[object Object],[object Object],[object Object]
Other New Domain Name Abuses ,[object Object],[object Object],[object Object]
Other Domain Name Abuses   (con’t) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Click Fraud ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Counterfeiting on the Internet ,[object Object],[object Object],[object Object],[object Object]
Protecting Your Brand   ,[object Object],[object Object],[object Object],[object Object],[object Object]
Spam
Rogue Vendors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Let’s Not Forget . . .
Nigerian 419 Schemes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scam Dates Back to 1588 ,[object Object],[object Object],[object Object]
Part 2 Prevention and Remedies
Prevention / Remedies ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Contractual Protections ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Protections for Consumers ,[object Object],[object Object],[object Object],[object Object]
Detection / Monitoring Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Action Plan ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Spyware Federal Enforcement
State & Civil Enforcement
Phishing Remedies ,[object Object],[object Object]
Click Fraud Enforcement ,[object Object],[object Object],[object Object],[object Object],[object Object]
Attacking Counterfeiting ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Domain Name Remedies ,[object Object],[object Object],[object Object],[object Object]
Jurisdictional Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],Jurisdictional Issues
Legislative Response: Spyware ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Current Spyware Legislation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Legislative Response: Domain  Tasting ,[object Object],[object Object],[object Object]
Questions?
Contact Info ,[object Object],[object Object],[object Object]

More Related Content

What's hot

Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
upsettinginfo
 
Data theft
Data theftData theft
Data theft
Laura
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
mbachnak
 

What's hot (19)

e-Fraud ppt
e-Fraud ppte-Fraud ppt
e-Fraud ppt
 
A LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUNDA LOOK INSIDE THE BRAZILIAN UNDERGROUND
A LOOK INSIDE THE BRAZILIAN UNDERGROUND
 
10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud10 Ways To Prevent Internet Fraud
10 Ways To Prevent Internet Fraud
 
Forensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in CameroonForensic Investigations and Staff Dishonesty in Cameroon
Forensic Investigations and Staff Dishonesty in Cameroon
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Ftc identity theft kit
Ftc identity theft kitFtc identity theft kit
Ftc identity theft kit
 
Data theft
Data theftData theft
Data theft
 
Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!Beware of Scam Artists - Recognize Them Before They Get You!
Beware of Scam Artists - Recognize Them Before They Get You!
 
Ict forensics and audit bb
Ict forensics and  audit bbIct forensics and  audit bb
Ict forensics and audit bb
 
10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade10 of the Top Data Breaches of the Decade
10 of the Top Data Breaches of the Decade
 
Red Flag Rules
Red Flag RulesRed Flag Rules
Red Flag Rules
 
Cybercriminality
CybercriminalityCybercriminality
Cybercriminality
 
Fraud Presentation
Fraud PresentationFraud Presentation
Fraud Presentation
 
Dealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking SphereDealing with Fraud in E-Banking Sphere
Dealing with Fraud in E-Banking Sphere
 
Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012Identity Theft and Data Compromise - TWCA Fall 2012
Identity Theft and Data Compromise - TWCA Fall 2012
 
Little book of cyber scams
Little book of cyber scamsLittle book of cyber scams
Little book of cyber scams
 
Keep your office secure
Keep your office secureKeep your office secure
Keep your office secure
 
Combating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate EspionageCombating Cyber Fraud, Data Breaches & Corporate Espionage
Combating Cyber Fraud, Data Breaches & Corporate Espionage
 

Similar to Unearthing and Dissecting Internet Fraud

Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Tech and Law Center
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
at MicroFocus Italy ❖✔
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
Abdelfatah hegazy
 

Similar to Unearthing and Dissecting Internet Fraud (20)

Awareness Against Cyber Crime
Awareness Against Cyber CrimeAwareness Against Cyber Crime
Awareness Against Cyber Crime
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime: A Quick Survey
Cyber crime: A Quick SurveyCyber crime: A Quick Survey
Cyber crime: A Quick Survey
 
ihegc012
ihegc012ihegc012
ihegc012
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
 
Cyber Crime and a Case Study
Cyber Crime and a Case StudyCyber Crime and a Case Study
Cyber Crime and a Case Study
 
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
Cybercrime, Digital Investigation and Public Private Partnership by Francesca...
 
ccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdfccs12-18022310494mghmgmyy3 (1).pdf
ccs12-18022310494mghmgmyy3 (1).pdf
 
Phishing: Swiming with the sharks
Phishing: Swiming with the sharksPhishing: Swiming with the sharks
Phishing: Swiming with the sharks
 
The Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hackingThe Business of Hacking - Business innovation meets the business of hacking
The Business of Hacking - Business innovation meets the business of hacking
 
Business of Hacking
Business of HackingBusiness of Hacking
Business of Hacking
 
Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi Hacking Presentation v2 By Raffi
Hacking Presentation v2 By Raffi
 
cyber crime technology
cyber crime technologycyber crime technology
cyber crime technology
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018Five cyber threats to be careful in 2018
Five cyber threats to be careful in 2018
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Essay On Piracy
Essay On PiracyEssay On Piracy
Essay On Piracy
 

More from Internet Law Center

More from Internet Law Center (20)

Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdfBlueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
Blueprint for an AI Bill of Rights _ OSTP _ The White House.pdf
 
Blueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdfBlueprint-for-an-AI-Bill-of-Rights.pdf
Blueprint-for-an-AI-Bill-of-Rights.pdf
 
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
FACT SHEET_ Biden-Harris Administration Secures Voluntary Commitments from Le...
 
SEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdfSEC Cybersecurity Rule.pdf
SEC Cybersecurity Rule.pdf
 
Oregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdfOregon Data Broker Law eff 2024.pdf
Oregon Data Broker Law eff 2024.pdf
 
Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer Generative Artificial Intelligence and Data Privacy: A Primer
Generative Artificial Intelligence and Data Privacy: A Primer
 
CCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdfCCPA proposed privacy regs.pdf
CCPA proposed privacy regs.pdf
 
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdfBipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
Bipartisan_Privacy_Discussion_Draft_Section_by_Section39.pdf
 
20200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc3111820200724 edpb faqoncjeuc31118
20200724 edpb faqoncjeuc31118
 
ECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II DecisionECJ Press Release in Schrems II Decision
ECJ Press Release in Schrems II Decision
 
The Road to Schrems II
The Road to Schrems IIThe Road to Schrems II
The Road to Schrems II
 
Cyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH EconomyCyber Security Basics for the WFH Economy
Cyber Security Basics for the WFH Economy
 
FIFA Indictment
FIFA IndictmentFIFA Indictment
FIFA Indictment
 
Cyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletinCyber exploitation-law-enforcement-bulletin
Cyber exploitation-law-enforcement-bulletin
 
Data Privacy Day 2020
Data Privacy Day 2020Data Privacy Day 2020
Data Privacy Day 2020
 
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy AwareData Privacy Day - Five Ways to Help Employees be Privacy Aware
Data Privacy Day - Five Ways to Help Employees be Privacy Aware
 
Cyber Report: A New Year with New Laws
Cyber Report: A New Year with New LawsCyber Report: A New Year with New Laws
Cyber Report: A New Year with New Laws
 
Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296Cal AB 5 - CHAPTER 296
Cal AB 5 - CHAPTER 296
 
FTC's Influencer Guide
FTC's Influencer GuideFTC's Influencer Guide
FTC's Influencer Guide
 
Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)Dumpson v-Ade-opinion-on-default-judgment (1)
Dumpson v-Ade-opinion-on-default-judgment (1)
 

Unearthing and Dissecting Internet Fraud