15.02.2015 Views

National Threat Assessment 2008. Organised Crime - Politie

National Threat Assessment 2008. Organised Crime - Politie

National Threat Assessment 2008. Organised Crime - Politie

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Wireless networks (WiFi) have become more common in recent years.<br />

Nowadays, wireless connections to the Internet can be made in a growing<br />

number of public locations. The downside of wireless networks is their<br />

vulnerability to hacking. Many consumers do not or hardly secure their home<br />

network. The home network signal does not stop at the front door (the exact<br />

reach of the signal is unknown). Phishers in the area can therefore pick up the<br />

signal, hack into the network and install malware on computers and/or steal<br />

identity details. Phishers can also easily hack into other people’s computers<br />

via the network in public places where several people log onto the same<br />

wireless network.<br />

A new type of phishing is called ‘vishing’ or ‘voice vishing’. VoIP (Voice over IP)<br />

systems can be used to make phone calls cheaply and anonymously via the<br />

Internet. Criminals can use VoIP to imitate a professional telephone exchange,<br />

whereby login details are entered by pressing telephone keys. Criminals use this<br />

method in two ways. In the first case an email is sent to a potential victim, as in<br />

the classic form of phishing. However, rather than a fraudulent link, a service<br />

telephone number is stated which the customer has to call in order to log on<br />

to the financial institution. In the second case, criminals call potential victims and<br />

ask them to confirm their personal details, for example, because otherwise their<br />

bank account will be cancelled. In both cases the fraudsters are after personal<br />

details that can be used to commit fraud.<br />

A further development of phishing is the use of text messages (SMS). The<br />

Internet security company McAfee has coined the term ‘SmiShing’ to describe<br />

this technique. In cases of this variant, a bank customer is asked to confirm<br />

personal details by text message. Once surfing the Internet on your mobile<br />

phone has become common practice, it will also be possible to send a (mobile)<br />

Internet link in the text message that links to a counterfeit website.<br />

All phishing techniques are aimed at misusing the stolen details. Criminals can<br />

use the stolen details to carry out all kinds of financial transactions. They use<br />

an intermediary to keep their own identity secret and still be able to transfer<br />

money to their account. These often unknowing intermediaries (who are known<br />

as ‘money mules’) are recruited via spam email or website. They are offered a job<br />

at a financial institution. The task of the employee is to make his/her account<br />

available to transfer the funds on further using a cash transfer service (usually<br />

to Eastern European countries).<br />

The Internet is used by criminals to exchange experiences, advice and techniques<br />

via chat services and in forums, for example. All the instructions and tools<br />

chapter 5 – Criminal modus operandi<br />

197

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!