chapter 5 Flashcards

1
Q

what are the differences of chapter 4 and 5

A

chapter 4 focused on the individuals/ the developmental view of hacking

global
cyber
poor countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what did the traditional study of org crime focused on what

A

Italian mafia (LCN) (our thing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the change that happened to organized crime

A

it’s global because of internet
they are digital/cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

typical crimes with the internet

A

drugs gambling proitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does it increasingly involves

A

groups of young male computer users within developing countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

organized crime rises with what

A

a lack of legitimate economic opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what percentage of cyber crime is committed through organized criminal groups

A

80
at least 2/3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the former ussr- soviet union

A

russia (1970s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

in the 70s in Russia there were

A

refugees from soviet prison system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what did people do in the ussr with goods

A

paid to acquire goods + ship back to ussr + then re-sold by criminals on the black market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the black market

A

the sale of illegal goods on goods not available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what happens in the 90s of the ussr

A

there was a collapse and the ussr there was a transition from state own economy to private economy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F was there a growth in organized criminal groups in Russia in the 90s?

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Russia was known as the

A

hack zone - online fraud, theft and sole of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does russia speacialize in

A

soliciting hacking business from other criminal groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

common traditional types of crimes in russia

A

auto theft, drugs healthcare fraud, insurance fraud, money unldering,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are the old groups in Italy

A

mafia and lcn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Italy doesn’t do much in?

A

cyber activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

sicily

A

an island off of the mainland of Italy
1930s immigrated to the us
(Mussolini’s purge) - bad guys coming to the states
prohibitions provides opportunity for growth
decline is us in the 70s

20
Q

Middle East

A

the FBI report focuses on terrorism rather than organized crime

terrorism isn’t about money…it’s a political/social message. organized crime groups hack to steal

al-queda

found these groups do both organized crime and terrorism because they needs founds to support terrorism

21
Q

Mexico groups are called

A

drug cartels- traditional organized crime that distribute drugs

22
Q

what are the four primary drug cartels?

A

gulf cartel- Texas, Brownsville
Juarez cartel- texas, El paso
Sinaloa cartel- south west texas
Tijuana cartel- Cali San Diego

23
Q

what’s going on in Mexico

A

a civil war between the cartels and Mexican government (4,000 deaths since of 2006).

24
Q

t/f is the cartel increasing the funds for drug cartels

25
the Mexico civil war result in a what
shift of operations for the cartels to more cyber (money laundering) and prescription drug trade
26
cyber espionage
a state sponsored activity (spying) mainly to steal intellectual property
27
intellectual property
examples patents,l orginal busniess ideas, product desgins and fromula. product or idea
28
insider fraud
fraud or crime committed by someone or group inside an organization
29
sabotage
deliberate destruction of business by employee (from the inside)
30
us dept of commerce findings
they found that 95 pecent of all business failure 30 percent commercial bankruptcy
31
2 types of insider fraud
solo or with insider co-conspirators (embezzlement or other funds) -insider recruited by outside criminal organization (eg nation state or organized crime group( intellectual property)
32
# what should you know about the cert study cert study
computer emergency readiness team -insider fraud study 47 insider fraud cases -hire to start fraud - 62 months (synst) -start fraud to detection - (32months) detection to termination- 0 months ## Footnote This was a retrospectic study with techinical workers
33
deep web
one big problem on the web is anonymity unencrypted communication on web that can be easily traced by networks asministtions using device ip address
34
how man digits to ip address have
12
35
internet traffic analysis
can be used to infer who is communicating with who on internet based on ip source and destination.
36
deepweb definition
under ground marketplace ( hidden) serves to conduct illegal transactions including drugs weapons and malicious software and other illegal goos and services, human trafficking exchanging of malware uses the tor as a kind of search engine refer to as the tor network
37
tor Stands for
the onion router
38
what is the orgin of tor/ deepweb
project of the us navy (2002) propose was to protect military secrets created away for people organizations and governments to communicate anonymously over the internet the google of the deep web
39
onion routing
technique for anonymous communication on the deepweb messages are repeatedly encrypted and sent through different routers to reach the final destination big idea is to encrypt on hide ip address
40
encrypted
data are coded to hide messages
41
movie on onion routing
uses the analogy of nested envelopers to describe how to communicate anonymously on the deep web using tor. nested envelopes are hidden in layers of encryption
42
how do you buy and sell stuff on the deepweb to maintain anonymity
bitcoin - digital money - which encryption techniques are used to hide buyers and sellers
43
African groups
first documented in the 80s (pretty new) social political economic disfunction caused these groups *nigeria* Liberia and ghana
44
niegerian criminal enterprise
Started in the 90s Most dignified One of the fastest growing groups globally 1-2 billion dollars a year in revenue Drugs, human trafficking, Advanced fee fraud (419 scams)
45
triads (Chinese)
Centuries old secret society that opposed Chinese rule and classes Based in Hong Kong Gambling (mostly online now) & Drug Trade Traditional Hierarchical structure
46
Tongs (Chinese)
Immigrants that helped to build the transcontinental railroad 1840s West Coast of US (immigrants) Protection of Chinese immigrant groups San Francisco, Seattle, Portland today Traditional organized crime activities
47
yakuza (Japanese)
Established in 1603 100,000 members worldwide Traditional crimes (money laundering)