15.02.2015 Views

National Threat Assessment 2008. Organised Crime - Politie

National Threat Assessment 2008. Organised Crime - Politie

National Threat Assessment 2008. Organised Crime - Politie

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

customers. Customers must be on the lookout for fraudsters and must ensure<br />

that their computers are properly secured and remain that way. The level of<br />

direct and indirect losses incurred by private individuals and companies in<br />

the Netherlands is unclear.<br />

5.5.6 <strong>Crime</strong>-related factors and expectations<br />

Nowadays an increasing number of people have a PC with Internet access and<br />

a broadband connection. PCs with this type of connection are ideal for Internet<br />

criminals to include in a botnet. People in the Netherlands are shopping online<br />

and using Internet banking facilities to an increasing degree (66% and 72% of<br />

people respectively in 2007). The number of credit card payments is also still<br />

increasing. With credit cards there is the risk that criminals will obtain the card<br />

details and use them to place orders and make payments. To prevent misuse, the<br />

business community has developed initiatives such as PayPal and iDeal to make<br />

payments more secure. However, PayPal turns out to be vulnerable to phishers<br />

as well. With iDeal consumers pay directly online at their own Internet banking<br />

site using two-factor authentication. The government and the banks are running<br />

campaigns to raise the public’s awareness of the lack of security on the Internet<br />

and the need to secure their home computers.<br />

It is not only consumers who have difficulty finding out who sends or receives<br />

information, investigating agencies have similar problems. Clues often lead<br />

via various links to possible criminals in other countries, which means that<br />

investigations are time‐consuming. Internet criminals do not have to worry<br />

about communication problems, arranging the necessary authorisation and<br />

technical tools. On the contrary, they benefit from the speed and anonymity<br />

of the Internet. More attention is currently being paid to the fight against<br />

ICT-related crime. The <strong>National</strong> <strong>Crime</strong> Squad at the KLPD has set up the High<br />

Tech <strong>Crime</strong> Team. This team also carries out investigations into phishing.<br />

Technological developments are increasing the number of options for phishers.<br />

Whether the method involves WiFi, VoIP, SMS, smart phones, multiplayer online<br />

games (MMOGs) or Instant Messaging (IM), more and more routes are being<br />

created for fraudsters to use to rob people of their identity details. Spy phishing<br />

will be increasingly used in this process because it is then no longer necessary to<br />

mislead digital users into disclosing their details since the details are intercepted<br />

by malware without the user noticing anything. The classic form of phishing will<br />

occur less and less frequently, partly because Internet users are becoming<br />

increasingly aware of the existence of misleading emails. Malware will probably<br />

be designed in an increasingly advanced and specific manner. If misleading<br />

tactics are still used, the expectation is that they will also become increasingly<br />

200 <strong>National</strong> <strong>Threat</strong> <strong>Assessment</strong> 2008 – <strong>Organised</strong> crime

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!