Identify Theft
The information age has provided criminals with lots of new opportunities for crime. ID theft is where someone collects other people personal data and uses them to open bank accounts and get credit cards, loans, state benefits and documents such as passports and driving licenses in their name. Then the bill would send to the person who has had their ID stolen. Criminals can do this because they making a webpage or send the letter in post which is want the people to give them, your personal and card details.
you have lost or had stolen important documents such as your passport or driving licence
post expected from your bank has not arrived or you are receiving no post at all
you identify entries on your personal credit file from organisations you do not normally deal with
a mobile-phone contract has been set up in your name without your knowledge
financial institutions that you do not normally deal with contact you to chase an outstanding debt.
Statistic show that the latest estimate is that identity fraud costs the UK economy £1.7 billion in 2006.
Phishing
“Phishing” is a form of Internet fraud that aims to steal valuable information such as credit cards, social security numbers, user IDs and passwords. A fake website is created that is similar to that of a legitimate organisation, typically a financial institution such as a bank or insurance company. An email is sent requesting that the recipient access the fake website (which will usually be a replica of a trusted site) and it ask people to enter their personal details into it which include the security access codes. The webpage is looks genuine and same as the trust webpage (eg. bank webpage) because it wants people to give the bank account and password details to them. But the only different in the text is, the language they using in the webpage is not a proper English so the only way to prevent this is get education.
Phishing e-mails are often sent to large lists of people, because it expecting that some percentage of the recipients will actually have an account with the real organisation. The term comes from "fishing," where bait is used to catch a fish and e-mail is the bait.
The e-mail could come from someway else, because I have hear a example from teacher is his wife is receive a e-mail from other country and the manager of company is asking somebody who agree to let him using the bank account for transfer the money to other country, if it was success, he will give 10-20% of the money to the account owner. But he was asking people for the password and card number. So once he received the detail, he will transfer money out the account and not into it. So many people have losing money because they give their bank detail to phishers.
Britain is facing a growing crime wave linked to Nigeria and based largely on financial scams and immigration and identity frauds, according to a report published today.
It was sharp rise in bogus e-mails from 50 in February 2006 to 400 in April, the fraudsters are try to asking customers for information about their accounts and 70-80 per cent of that e-mail is from Nigerians.
Hacking
Hacker is someone who is enthusiastic about computer programming and all things relating to the technical workings of a computer. However, most people would understand hacker is to be what is more accurately known as a 'cracker'. Crackers are people who try to gain unauthorized access to computers. This is normally done through the use of a 'backdoor' program installed on your machine. Many crackers is try to gain access to private resources through the use of password cracking software, which is a software could tries billions of passwords to find the correct one for accessing a computer. This would spend long time for it and most computer could shut down when people tried more than 5 times and the people still enter the wrong password.
Hacker can damage people computer by depend upon what backdoor program(s) are hiding on PC, because different programs can do different amounts of damage. However, most happen is he can easily put something else onto people computer. The hackers can see everything you are doing, and can access any file on your disk. He also can create a new file, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Those are such programs could also be used to steal personal information such as passwords and credit card information. So the hacker can use other people account and transfer the money form their account.
Atm machine record the users card number and password , then the
Credit card Details stored on databases of the shops you are trading with on-line with - used to steal your Credit card number and buy things.
credit card magnetic stripe can be copied -called skimming
Crimes without victims - copyright theft - P2P
Crime Prevention
identify theft -advice on all financial web pages (destory Personal data)
Look at your credit file in detail. If you find entries relating to organisations you do not normally deal with, contact them immediately. Keep a record of all your actions, including who you spoke to and when, and copies of letters sent and received. The credit reference agencies may be able to help you with this.
Stop Phishing attempts - Software or common sense rules of using the Internet
Software to stop
Anti – phising group
They tell u how to stop it
Hacking - passwords that are secure - change every 90 days - interent access to a standalone network - RSA secureID
Number and word = strong password
Every 20 sec the password is change
CCTV - UK has the largest density of CCTV cameras anywhere in the world- take any walk in any city in the UK and you will be being watched. These images are stored and used by Police if required - currently automatic ID from CCTV footage is being worked on. - positive impacts
Help police derease the crime , but no personal freedom
DNA databases
finger print scanners for officers on the beat to check ID - Positive impacts
average speed cameras - V Speed traps (hit someone at 40, 90% possibility of death –
if the average speed hit at 30m/h, 90% possibility that they will live
10% make the survival liability
speed camera at night would help people keep the speed at low,
Phone tapping
Record the conversation at court, not work at UK