연결 가능 링크

사이버 범죄 (Cyber Crime)


CYBER CRIME

INTRODUCTION:
The internet has revolutionized the way we live. It has quite literally brought the world to our fingertips…all of it, the good and the bad.
As Naheda Zayed reports, there are many criminals waiting for their next cyber-space opportunity, and many home users who unknowingly are making it easy for them.

NARRATOR:
Every time you turn on the computer and get online, experts say, you are a potential victim of cyber crime. The internet storm center is a volunteer group that guards against criminal activity online. it is run by March
Sachs MARC SACHS:
"For the criminal world it's what we like to call a perfect storm. We have an internet that is almost completely anonymous, perfect for criminal activity. We have an internet that's largely ungoverned."

Dan Larkin heads the Internet Crime Complaint Center at the Federal Bureau of Investigation or FBI. He battles cyber crime daily, and says it is diverse and global.

DAN LARKIN:
"We have a substantial piece of cyber crime that emanates from West Africa, no surprise, eastern Europe,Russia, some in Asia and South America as well."

NARRATOR:
These rings, and cyber criminals here in the United States, are involved in schemes that run the gamut from identity theft, to intellectual piracy, to sex crimes, fraud schemes, hacking, spamming, you name it… it is
being done. But here is the surprising part: home users are usually unwitting accomplices.

MARC SACHS :
"We've got millions of users who don't keep their computer systems updated, who don't run anti virus, who go to websites, download software they don't know what they are downloading."

NARRATOR:
Experts say criminals are counting on that. When users do NOT update their systems, or use firewalls for protection, their computers can help spread viruses and worms, or invite trouble by downloading what are known as Trojans, some of which help spread chaos.

MARC SACHS:
"Overnight your home machine which is just sitting there silently consuming power, is actually sending out thousands of unsolicited e-mail messages and you don't even know it's happening."

NARRATOR:
The aim of some of the malicious e-mail or spam is to lure the user into clicking on a particular site or attachment. It's called "phishing" in the cyber world, and criminals use all kinds of schemes to reel the user
in. The purpose of these schemes is almost always to get money, or steal someone's identity.

DAN LARKIN"
"…inviting you to go to your bank, or go to your E-Bay account, or go to some other account that they hope you have and update something with regard to your personal profile 37:38 or your financial or personal
data."

NARRATOR:
Identity theft is a huge piece of cyber crime. The best-publicized cases- with potential losses in the millions of dollars - have been breaches in corporate computer networks. But home computers are also at risk.

NARRATOR:
Every time you visit a website or click on an attachment, for example, you may be downloading a Trojan capable of stealing personal information.
Called the Keylogger, it watches and records keystrokes waiting for you to access a bank site or other financial institution. March Sachs of the Internet Storm Center explains.

MARC SACHS:
"It knows that within 50 or hundred some odd key strokes, I'm likely to type in my user name my password, mothers maiden name, a credit card number a pin number other things."

DAN LARKIN:
"The goal is to capture that, store it somewhere or transmit that information to another site for use in an identity theft or account takeover."

NARRATOR:
Dan Larkin of the FBI's internet crime complaint center says Russian cyber criminals used the Keylogger to take over thousands of identifications before they were put out of business last summer. International shipping is another cyber crime scheme sweeping across the United States.

DAN LARKIN:
"We identified thousands of locations in the US that were individuals and organizations that were being recruited and being used as reshippers."

NARRATOR:
They were all connected to a Nigerian cyber crime ring that used stolen financial data to buy millions of dollars worth of goods and services to sell overseas. To avoid raising suspicion, they had the goods first
shipped to the recruited U.S. citizens they called "mules." (:15)

DAN LARKIN
"They would recruit somebody from the US to receive the package so that the shipping label and address will look domestic, the guard would drop a bit from the merchant and they would let the package be shipped. only to find next day it had been reshipped overnighted and out of country to Nigeria. "

NARRATOR:
The ring was eventually broken up, but it's one more example of the breadth and ingenuity of internet crime. Cracking down on cyber criminals is an ongoing collaborative effort among international law enforcement
officials, online retailers, and private and volunteer computer security groups.

Personal computer users can do their part, too. Experts say keep your computers protected and updated. The FBI also recommends you visit the internet crime complaint center at WWW.ICCC.gov to report suspicious
activity or learn about the latest crime in cyber space.
I'm Naheda Zayed for VOA-News.

XS
SM
MD
LG