chapter 5 Flashcards

1
Q

what are the differences of chapter 4 and 5

A

chapter 4 focused on the individuals/ the developmental view of hacking

global
cyber
poor countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what did the traditional study of org crime focused on what

A

Italian mafia (LCN) (our thing)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what is the change that happened to organized crime

A

it’s global because of internet
they are digital/cyber

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

typical crimes with the internet

A

drugs gambling proitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

what does it increasingly involves

A

groups of young male computer users within developing countries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

organized crime rises with what

A

a lack of legitimate economic opportunity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what percentage of cyber crime is committed through organized criminal groups

A

80
at least 2/3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

what is the former ussr- soviet union

A

russia (1970s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

in the 70s in Russia there were

A

refugees from soviet prison system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

what did people do in the ussr with goods

A

paid to acquire goods + ship back to ussr + then re-sold by criminals on the black market

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

what is the black market

A

the sale of illegal goods on goods not available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

what happens in the 90s of the ussr

A

there was a collapse and the ussr there was a transition from state own economy to private economy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

T/F was there a growth in organized criminal groups in Russia in the 90s?

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Russia was known as the

A

hack zone - online fraud, theft and sole of malware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

what does russia speacialize in

A

soliciting hacking business from other criminal groups

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

common traditional types of crimes in russia

A

auto theft, drugs healthcare fraud, insurance fraud, money unldering,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what are the old groups in Italy

A

mafia and lcn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Italy doesn’t do much in?

A

cyber activity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

sicily

A

an island off of the mainland of Italy
1930s immigrated to the us
(Mussolini’s purge) - bad guys coming to the states
prohibitions provides opportunity for growth
decline is us in the 70s

20
Q

Middle East

A

the FBI report focuses on terrorism rather than organized crime

terrorism isn’t about money…it’s a political/social message. organized crime groups hack to steal

al-queda

found these groups do both organized crime and terrorism because they needs founds to support terrorism

21
Q

Mexico groups are called

A

drug cartels- traditional organized crime that distribute drugs

22
Q

what are the four primary drug cartels?

A

gulf cartel- Texas, Brownsville
Juarez cartel- texas, El paso
Sinaloa cartel- south west texas
Tijuana cartel- Cali San Diego

23
Q

what’s going on in Mexico

A

a civil war between the cartels and Mexican government (4,000 deaths since of 2006).

24
Q

t/f is the cartel increasing the funds for drug cartels

A

true

25
Q

the Mexico civil war result in a what

A

shift of operations for the cartels to more cyber (money laundering) and prescription drug trade

26
Q

cyber espionage

A

a state sponsored activity (spying) mainly to steal intellectual property

27
Q

intellectual property

A

examples patents,l orginal busniess ideas, product desgins and fromula.
product or idea

28
Q

insider fraud

A

fraud or crime committed by someone or group inside an organization

29
Q

sabotage

A

deliberate destruction of business by employee (from the inside)

30
Q

us dept of commerce findings

A

they found that 95 pecent of all business failure
30 percent commercial bankruptcy

31
Q

2 types of insider fraud

A

solo or with insider co-conspirators (embezzlement or other funds)
-insider recruited by outside criminal organization (eg nation state or organized crime group( intellectual property)

32
Q

what should you know about the cert study

cert study

A

computer emergency readiness team
-insider fraud study
47 insider fraud cases
-hire to start fraud - 62 months (synst)
-start fraud to detection - (32months)
detection to termination- 0 months

This was a retrospectic study with techinical workers

33
Q

deep web

A

one big problem on the web is anonymity
unencrypted communication on web that can be easily traced by networks asministtions using device ip address

34
Q

how man digits to ip address have

A

12

35
Q

internet traffic analysis

A

can be used to infer who is communicating with who on internet based on ip source and destination.

36
Q

deepweb definition

A

under ground marketplace ( hidden) serves to conduct illegal transactions including drugs weapons and malicious software and other illegal goos and services, human trafficking exchanging of malware

uses the tor as a kind of search engine
refer to as the tor network

37
Q

tor Stands for

A

the onion router

38
Q

what is the orgin of tor/ deepweb

A

project of the us navy (2002)
propose was to protect military secrets
created away for people organizations and governments to communicate anonymously over the internet
the google of the deep web

39
Q

onion routing

A

technique for anonymous communication on the deepweb
messages are repeatedly encrypted and sent through different routers to reach the final destination
big idea is to encrypt on hide ip address

40
Q

encrypted

A

data are coded to hide messages

41
Q

movie on onion routing

A

uses the analogy of nested envelopers to describe how to communicate anonymously on the deep web using tor.

nested envelopes are hidden in layers of encryption

42
Q

how do you buy and sell stuff on the deepweb to maintain anonymity

A

bitcoin - digital money - which encryption techniques are used to hide buyers and sellers

43
Q

African groups

A

first documented in the 80s (pretty new)
social political economic disfunction caused these groups
nigeria Liberia and ghana

44
Q

niegerian criminal enterprise

A

Started in the 90s
Most dignified
One of the fastest growing groups globally
1-2 billion dollars a year in revenue
Drugs, human trafficking, Advanced fee fraud (419 scams)

45
Q

triads (Chinese)

A

Centuries old secret society that opposed Chinese rule and classes
Based in Hong Kong
Gambling (mostly online now) & Drug Trade
Traditional Hierarchical structure

46
Q

Tongs (Chinese)

A

Immigrants that helped to build the transcontinental railroad
1840s
West Coast of US (immigrants)
Protection of Chinese immigrant groups
San Francisco, Seattle, Portland today
Traditional organized crime activities

47
Q

yakuza (Japanese)

A

Established in 1603
100,000 members worldwide
Traditional crimes (money laundering)