TITLE

Tracking Digital Footprints of Scareware to Thwart Cyber Hypnotism Through Cyber Vigilantism in Cyberspace

AUTHOR(S)
Neelabh
PUB. DATE
July 2012
SOURCE
BVICAM's International Journal of Information Technology;2012, Vol. 4 Issue 2, p9
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The characteristics of the Internet, which include digitization, anonymity, connectivity, mobility, and transnational nature; blur the traditional model of crime investigation / law enforcement and call for new strategies. Many simple yet popular malicious activities over internet are carried out by scammers / con artists largely through electronic mails and websites using cyber hypnotism, often in combination with distribution and propagation of malware. Such crimes of persuasion need to be managed through due diligence. Recently, an added web- based threat is recognized in the form of scareware which is making even the savviest of computer users their victim, and therefore, there is a need to focus on trying to detect such suspicious activity as quickly as possible in order to shut it down. An in-depth analysis of few scareware reveal that they have created many new and not so widely recognized online threats with inside intelligence by providing primary delivery mechanism for malware such as rogue anti-virus and anti-spyware, which are beyond the reach of many legitimate anti-virus programs currently in use. They may cause a Denial of Service (DoS) attack forcing the system to crash or even a Distributed Denial of Service (DDoS) attack. Looking at such unprecedented challenges in cyberspace, a policy of cyber vigilantism adopting an active defense rather than a reactive approach is contemplated. It is felt that in this age of mobile workforce, many of such people working as cyber analytics, or cyber-crime researcher may accomplish this work of community policing and play as proactive guardians of cyberspace.
ACCESSION #
83332475

 

Related Articles

  • THE CASE FOR A STATUTORY SUPPRESSION REMEDY TO REGULATE ILLEGAL PRIVATE PARTY SEARCHES IN CYBERSPACE. Shah, Monica R. // Columbia Law Review;Jan2005, Vol. 105 Issue 1, p259 

    With only a computer, an internet connection, and amateur hacking skills, a private citizen can assist law enforcement by performing illegal searches of computers belonging to criminal suspects. Thus far, courts have admitted the evidence acquired through these illegal private party searches....

  • Computer Intrusion Investigation Guidelines. Davis, J. Bryan // FBI Law Enforcement Bulletin;Jan2001, Vol. 70 Issue 1, p8 

    Presents condensed version of the United States Department of Defense's `Defense Criminal Investigative Service Computer Intrusion Investigation Guidelines.' Reasons for hacking computers; Investigative techniques for tracking the hacker; 12 steps involved in the initial phases of a computer...

  • Cyber Crime Doesn't Pay. Abramovitz, Melissa // Boys' Life;Dec99, Vol. 89 Issue 12, p12 

    Presents information on the way to detect computer crimes.

  • EXTRATERRITORIAL JURISDICTION IN THE SPACE AND CYBERCOMMONS. Brown, Melinda J.; Kleiman, Matthew J. // SciTech Lawyer;Winter2011, Vol. 8 Issue 3, p8 

    The article discusses the current legal regimes applicable to cyberspace and outer space. There is no uniform law for regulating cyberspace and the leading international convention on cybercrime is the Council of Europe's 2001 Convention on Cybercrime. The Convention aims to harmonize national...

  • The Internet's heart of glass. Cosh, Colby // Report / Newsmagazine (National Edition);02/19/2001, Vol. 28 Issue 4, p28 

    Reports on the capture of a teenage computer hacker responsible for denial-of-service attacks on the Internet. How the hacker, known only as Mafiaboy because his identity is protected, perpetrated what is thought to be the most expensive act of computer vandalism in history; Details of how an...

  • The Internet's heart of glass. Cosh, Colby // Report / Newsmagazine (BC Edition);02/19/2001, Vol. 28 Issue 4, p28 

    Reports on the capture of a teenage computer hacker responsible for denial-of-service attacks on the Internet. How the hacker, known only as Mafiaboy because his identity is protected, perpetrated what is thought to be the most expensive act of computer vandalism in history; Details of how an...

  • The Internet's heart of glass. Cosh, Colby // Report / Newsmagazine (Alberta Edition);02/19/2001, Vol. 28 Issue 4, p28 

    Reports on the capture of a teenage computer hacker responsible for denial-of-service attacks on the Internet. How the hacker, known only as Mafiaboy because his identity is protected, perpetrated what is thought to be the most expensive act of computer vandalism in history; Details of how an...

  • Hack attacks: Victimless crimes? Bowes, Chris // Bulletin with Newsweek;01/13/98, Vol. 116 Issue 6105, p46 

    Focuses on computer or Internet related crimes occurring in Australia. Impact of cyber-related crimes; Survey of organizations reporting unauthorized use of computers; Typical computer crimes; Use of customer databases, altered records, and unauthorized access; Surveys conducted by the...

  • Young Cyber-Sleuths. McKay, Jim // Government Technology;May2006, Vol. 19 Issue 5, p30 

    The article focuses on the CyberScience Laboratory (CSL) that offers training for state and local law enforcement agencies in the U.S. for cyber-crime investigation and technological assistance. The laboratory was established by the Office of Science and Technology of the National Institute of...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics