Presentation

Cyber Investigations firm.

février 2007 - Cybercrime and Computer Forensics

Aller au contenu | Aller au menu | Aller à la recherche

samedi 24 février 2007

個人情報漏洩

出典: フリー百科事典『ウィキペディア(Wikipedia)』 移動: ナビゲーション, 検索

個人情報漏洩 (こじんじょうほうろうえい)とは、個人情報を保有する者および個人情報に該当する者の意図に反して、第三者へ情報が渡ることをいう。従来、各種の名簿を通じた漏洩が主だったが、近年では個人情報を電子データとして扱うことが多くなり、外部記憶媒体の大容量化とあいまって、大規模な個人情報の流出が頻繁に起きている。

また、ソフトバンクBBの事件をきっかけに、各企業が個人情報の管理体制の確認を行った結果、新たに情報漏洩が発覚したというケースが増えている。また、発生件数が増えているのは最近の風潮により、企業の不祥事の発覚を隠蔽せずに公開しているためではないかとも言われる。

Lire la suite

Identiteitsfraude

is het gebruik van frauduleus verkregen persoonlijke informatie om in andermans naam toegang te krijgen tot vooral computersystemen, vormen van elektronische dienstverlening en betaal- en creditcardrekeningen.

Lire la suite

Identitätsdiebstahl

(auch Identitätsbetrug, Identitätsklau; engl. Identity Theft), wird die missbräuchliche Nutzung personenbezogener Daten (der Identität) einer natürlichen Person durch Dritte bezeichnet.

Das Ziel eines Identitätsdiebstahls ist es i. d. R., einen betrügerischen Vermögensvorteil zu erreichen, Daten der betroffenen Person an interessierte Kreise zu verkaufen (illegale Auskunfteien) oder den rechtmäßigen Inhaber der Identitätsdaten in Misskredit zu bringen (Rufschädigung).

Lire la suite

Techniques for obtaining information

Source : Wikipedia

Lire la suite

What Can I Do About Identity Theft And Fraud?

To victims of identity theft and fraud, the task of correcting incorrect information about their financial or personal status, and trying to restore their good names and reputations, may seem as daunting as trying to solve a puzzle in which some of the pieces are missing and other pieces no longer fit as they once did. Unfortunately, the damage that criminals do in stealing another person's identity and using it to commit fraud often takes far longer to undo than it took the criminal to commit the crimes.

Lire la suite

What Are The Most Common Ways To Commit Identity Theft Or Fraud?

Many people do not realize how easily criminals can obtain our personal data without having to break into our homes. In public places, for example, criminals may engage in "shoulder surfing" ­ watching you from a nearby location as you punch in your telephone calling card number or credit card number ­ or listen in on your conversation if you give your credit-card number over the telephone to a hotel or rental car company.

Lire la suite

FTC Testifies on Identity Theft and the Impact on Seniors

The Federal Trade Commission today told the U.S. Senate Special Committee on Aging that about 10 percent of consumers who called the agency to report that they are victims of identity theft are age 60 or older. J. Howard Beales III, Director of the FTC's Bureau of Consumer Protection, told the panel that although there are some differences in what senior identity theft victims are reporting to the agency, overall, their experiences are similar to the experiences of other consumers.

Lire la suite

DEFIÉNDASE CONTRA EL ROBO DE IDENTIDAD

FORMAS COMUNES EN QUE OCURRE EL ROBO DE IDENTIDAD: Los ladrones de identidad usan varios métodos para robarle su información personal. Los métodos más comunes son:

Lire la suite

Cada año, millones de personas son víctimas del robo de identidad

Cada año, millones de personas son víctimas del robo de identidad. La Comisión Federal de Comercio (Federal Trade Commission, FTC), la agencia nacional de protección de los consumidores, quiere que usted tenga la información necesaria para defenderse contra el robo de identidad. Si bien no existe una manera infalible de evitar el robo de identidad, es importante que usted sepa cómo:

DETENER a los ladrones de identidad protegiendo su información.

DETECTAR actividad sospechosa monitoreando regularmente sus cuentas financieras.

DEFENDERSE contra el robo de identidad en cuanto lo sospeche.

Estos enlaces incluyen toda la información que necesitara para educar a su comunidad a detener, detectar y defenderse contra el robo de identidad. Todos estos materiales están disponibles en el Kit de Educación para Consumidores sobre el Robo de Identidad en español y en inglés.

Lire la suite

Conspiracy Involving Counterfeit Software and Money Laundering

Web of Companies Sold up to $20 million of Microsoft Software with Altered Licenses

SCOTT LANEY, 35, formerly of Battle Ground, Washington, was sentenced today to five years in prison, three years of supervised release and $9.4 million in restitution for Conspiracy to Traffic in Counterfeit Labels and Computer Program Documentation, and Conspiracy to Engage in Money Laundering. U.S. District Judge Franklin D. Burgess sentenced LANEY today following his guilty plea to both charges on February 23, 2006. LANEY now lives in Ogden, Utah.

Lire la suite

Hollywood Movie Pirate Sentenced to 7 Years in Prison for Copyright Infringement and Escape

A former Hollywood resident convicted last year of copyright infringement and other federal crimes related to his use of a video camcorder to secretly record motion pictures at private screenings was sentenced today to 84 months in federal prison.

Lire la suite

Vermilion, Ohio Man Charged with Wire Fraud

Gregory A. White, United States Attorney for the Northern District of Ohio, announced today that an information was filed today charging Terrance J. Holmes, age 39, of 330 Yorktown Place, Vermilion, Ohio, with one count of Wire Fraud.

Lire la suite

Utah Man Sentenced to 24 Months in Prison for Bringing Down Wireless Internet Services

WASHINGTON - A man skilled in the operation of commercial wireless Internet networks was sentenced today for intentionally bringing down wireless Internet services across the region of Vernal, Utah, the Justice Department announced today.

Ryan Fisher, 24, of Vernal, was sentenced to 24 months in prison to be followed by 36 months of supervised release for intentionally damaging a protected computer. U.S. District Judge Paul G. Cassell also ordered the defendant to pay $65,000 in restitution.

Lire la suite

Two Men Plead Guilty to Stealing Trade Secrets

Two Men Plead Guilty to Stealing Trade Secrets from Silicon Valley Companies to Benefit China First Conviction in the Country for Foreign Economic Espionage

Lire la suite

Former Chinese National Charged with Stealing Military Application Trade Secrets

Former Chinese National Charged with Stealing Military Application Trade Secrets from Silicon Valley Firm to Benefit Governments of Thailand, Malaysia, and China Third Foreign Economic Espionage Indictment in the United States Since the Enactment of Economic Espionage Act of 1996; Source Code Used for Military Combat Simulation and Banned for Export Without License

Lire la suite

Two Michigan Residents Plead Guilty to Criminal Copyright Infringement

Two Michigan men have pleaded guilty in related federal cases to selling counterfeit computer software over the Internet that was valued at over $1,000,000, in violation of the criminal copyright infringement laws, United States Attorney Stephen J. Murphy announced today.

Lire la suite

Defendant Sentenced in Online Piracy Crackdown

United States Attorney Mary Beth Buchanan announced today, December 19, 2006, that Scott R. McCausland, a resident of Erie, Pennsylvania, has been sentenced in federal court in Erie to five months in jail, to be followed by five months of home confinement, on his conviction of conspiracy to commit copyright infringement and copyright infringement.

Lire la suite

Anderson Man Charged with Criminal Copyright Infringement

Susan W. Brooks, United States Attorney for the Southern District of Indiana announced that COURTNEY SMITH, 36 of Anderson, Indiana, was charged in an Information filed by the U.S. Attorney’s Office with one count of criminal copyright infringement. SMITH’S charge was the result of an investigation by the Federal Bureau of Investigation.

Lire la suite

Software Piracy Ringleader Extradited from Australia

WASHINGTON - In one of the first ever extraditions for an intellectual property offense, the leader of one of the oldest and most renowned Internet software piracy groups was arraigned today in U.S. District Court, Assistant Attorney General Alice S. Fisher of the Criminal Division and U.S. Attorney Chuck Rosenberg for the Eastern District of Virginia announced today.

Lire la suite

Tips for Avoiding Computer Crime

These suggestions are a companion to my separate essay on computer crime in the USA. These suggestions are like installing high-security deadbolt locks on doors of an office or home. There is no warranty that following these suggestions will prevent one from being a victim of computer crime, but at least one can make it a little harder for a criminal, and maybe the criminal will find an easier target.

This essay contains only my personal opinions on the general problem of computer security, and is not intended as advice on your specific problem. You should hire a competent expert in computer security to review your situation and then advise you.

Lire la suite

Computer Crime

There are no precise, reliable statistics on the amount of computer crime and the economic loss to victims, partly because many of these crimes are apparently not detected by victims, many of these crimes are never reported to authorities, and partly because the losses are often difficult to calculate. Nevertheless, there is a consensus among both law enforcement personnel and computer scientists who specialize in security that both the number of computer crime incidents and the sophistication of computer criminals is increasing rapidly.

Lire la suite

dimanche 11 février 2007

Children and Internet

Is it okay for children to use the internet? How can we keep them safe? Produced by askvampirebear. Brought to you by Safety.TV Library

The video

Crimeware

From Wikipedia, the free encyclopedia

Crimeware is a class of computer program designed specifically to automate financial crime. The term was coined by Peter Cassidy, Secretary General of the Anti-Phishing Working Group to distinguish it from other kinds of malevolent programs.

Lire la suite

FBI on fighting cyber crime

FBI special agent talks about the organisation's crime fighting efforts and argues that it requires a digital "Enron" to force legislation and reform that can effectively fight cyber crime

Lire la suite