Tracking Digital Footprints of Scareware to Thwart Cyber Hypnotism Through Cyber Vigilantism in Cyberspace

July 2012
BVICAM's International Journal of Information Technology;2012, Vol. 4 Issue 2, p9
Academic Journal
The characteristics of the Internet, which include digitization, anonymity, connectivity, mobility, and transnational nature; blur the traditional model of crime investigation / law enforcement and call for new strategies. Many simple yet popular malicious activities over internet are carried out by scammers / con artists largely through electronic mails and websites using cyber hypnotism, often in combination with distribution and propagation of malware. Such crimes of persuasion need to be managed through due diligence. Recently, an added web- based threat is recognized in the form of scareware which is making even the savviest of computer users their victim, and therefore, there is a need to focus on trying to detect such suspicious activity as quickly as possible in order to shut it down. An in-depth analysis of few scareware reveal that they have created many new and not so widely recognized online threats with inside intelligence by providing primary delivery mechanism for malware such as rogue anti-virus and anti-spyware, which are beyond the reach of many legitimate anti-virus programs currently in use. They may cause a Denial of Service (DoS) attack forcing the system to crash or even a Distributed Denial of Service (DDoS) attack. Looking at such unprecedented challenges in cyberspace, a policy of cyber vigilantism adopting an active defense rather than a reactive approach is contemplated. It is felt that in this age of mobile workforce, many of such people working as cyber analytics, or cyber-crime researcher may accomplish this work of community policing and play as proactive guardians of cyberspace.


Related Articles

  • What's Love Got to Do with It? Exploring Online Dating Scams and Identity Fraud. Rege, Aunshul // International Journal of Cyber Criminology;Jul-Dec2009, Vol. 3 Issue 2, p494 

    Cyberspace has become an alternative medium for experiencing new and creative romantic endeavors with few spatio-temporal limits. E-love networks have proliferated since the mid-1990s and are expected to generate $1.9 billion by 2012. However, this successful global industry is a frequent venue...

  • CYBER CRIME AND SOCIAL CYBERNETICS (A SOCIO-LEGAL ANALYSIS). Kewlani, Jasleen // Government: Research Journal of Political Science;Dec2014, Vol. 3, p6 

    Change has been a law of survival since the very existence of life in the universe. But the nature of this change has consistently been a subject to the societal circumstances further infiltrated by trans-regional factors. The paper aims at analyzing the consequences of mutuality between the...

  • A Secured Multi-Party Computational Protocol to Protect Cyberspace for Defense Applications. Chandwani, Manohar; Mishra, Durgesh Kumar // Proceedings of the European Conference on Information Warfare & ;2009, p30 

    Secured multi-party computation (SMC) is a problem of information security when large organizations interact with one another for huge data sharing and data exchange. It is quite possible that during sharing and exchange, the private data also gets hacked. In order to protect and secure the...

  • CRIMINAL INVESTIGATION DIRECTORATE CONTRIBUTION TO ROMANIAN FORENSIC DURING 1973-2008. DUVAC, Constantin // Romanian Journal of Forensic Science;Feb2012, Vol. 79 Issue 1, p901 

    First, the author made a description about institutional development of the militia/police and the Department of Criminal Investigation followed by a presentation of competence, leadership, its organizational structure and workforce involved in the fight against those who violated the criminal...

  • DATA MINING PRACTICES FOR EFFECTIVE INVESTIGATION OF CRIME. Renushe, Hanmant N.; Rasal, Prasanna R.; Desai, Abhijit S. // International Journal of Computer Technology & Applications;2012, Vol. 3 Issue 3, p865 

    This research paper highlights the importance of data mining technology to design proactive services to reduce crime incidences in the police stations jurisdiction. Crime investigation has very significant role of police system in any country. Almost all police stations use the CIPA system to...

  • PAPILLÄ€RLĪNIJU RAKSTU PÄ’DU VIZUALIZÄ’Å ANAS METOŽU ANALĪZE: TEORÄ’TISKIE UN PRAKTISKIE ASPEKTI. Zīle, Aelita // Proceedings of the International Scientific Conference of Daugav;2014, Issue 55, p669 

    Prevalence of papillae pattern prints on the crime scene and their probability to be found on different surfaces play a major role in detection of crimes, especially in cases when a trace-bearing object is a human skin. Theoretically human skin is the same trace-bearing object as any other...

  • METHODOLOGICAL FUNDAMENTALS OF COMPLEX CORRELATION-SEMANTIC APPROACH TO THE DRAFTING OF SEARCH PROFILE OF AN UNKNOWN OFFENDER. Vaske, E. V.; Tolstolutskiy, V. Y. // Perm University Herald. Yuridical Sciences / Vestnik Permskogo U;2014, Issue 4, p166 

    Introduction: This article sets out the provisions of the new methodological approach to the drafting of the criminal investigative profile. Purpose: It is proposed to merge into a single system forensic and psychological symptoms. Joint system of characters is a classifier electronic database...

  • Criminal Investigation Through the Eye of the Detective: Technological Innovation and Tradition. Miranda, Diana // Surveillance & Society;2015, Vol. 13 Issue 3/4, p422 

    Technological elements and scientific knowledge are steadily transforming both the traditional image of the detective and the nature of contemporary police work. However, despite the potential utility of scientific methods and new technologies in criminal investigations, there are many barriers...

  • How much do cybershoppers spend online?  // Inter@ctive Week;10/20/97, Vol. 4 Issue 36, p74 

    Gives statistical information showing how much time cybershoppers spend online.


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics