Internet Anthropologist Think Tank: Going for a FORCED RIDE

  • Search our BLOG


  • HOME
    Terrorist Names SEARCH:
    Loading

    Friday, January 09, 2009

    Going for a FORCED RIDE

    Your going for a ride:
    By Gerald; Internet Anthropologist Think Tank
    Jan 9, 2009

    Excerpted from Dancho:

    ......the general public is still not ready to embrace some of the highly disturbing point'n'click identity theft services that have been operating for years. Sadly, some even question the usability and authenticity of these underground services, and therefore a change has to be triggered by starting to publish the cybercriminals' ROI out of using them in the form of the photos of users swimming in cash that they've cashed-out of the stolen credit cards. Disturbing? It's supposed to be, since it will not only prompt public outbreak, but also, have a well proven self-regulation effect on behalf of the service owner's, at least from my personal experience while profiling related services.

    This is perhaps the perfect moment to emphasize on how important threat intell sharing with law enforcement, whether directly based on personal contacts or through one-to-many communication model through private mailing lists, a cyber threats analysts case-building capabilities would not only prove valuable in the long term, but would also make it easier for someone to do their prosecuting job faster. And while important, threat intell sharing with law enforcement is not the panacea of squeezing the cybecrime ecosystem, since cybercrime should not be treated as the systematic abuse of common IT insecurities for fraudulent purposes, instead, it should be treated as a form of economic terrorism. Only then, would cybercrime receive the necessary attention instead of such comments regarding McColo or Atrivo - "Resource-wise, we can't be in the business of prevention. We have to be in the business of prosecution." Exactly. I guess that just like you cannot be a prophet in your own country, you cannot also be a prophet in your own agency, thankfully, the wisdom of the cybercrime fighting crowd is always there to take care and get zero credit at the end of the day.

    The myth that geolocating their malicious activities would always end up in an Eastern European network where developed law enforcement agencies would have little to no jurisdiction at all, proved to be acommon stereotype given that the well known cybercrime-friendly ISPs that were shut down in 2008 were and have always been U.S based operations. Therefore, the excuse of not being able to take action due to the lack of international law enforcement cooperation isn't appicable in this case.


    [promo_video.png]

    Personally, 2009 is going to be the year when personalizing cybercriminals would be taking place on a more regular basis, so stay tuned for an upcoming report summarizing "behind the curtains" cybercrime activities in 2008, underground responses to some of major busts of year including the DarkMarket operation, the fraudulent schemes allowing them to cash-out digital assets into hard cash, the basics of their social networking model, who's who in the hierarchy of a sampled business model of vendors of ATM skimming devices, the post-DarkMarket OPSEC practices introduced in order for cybecrime communities to verify the authenticity of their customers, the process of advertising and operating underground services as well as the communication methods used, in short - all the juicy details, screenshots and photos courtesy of the owners and customers of the services that haven't been communicated to the industry and the world throughout 2008.

    xxxxxxxxxxxxxxxxxxxxxxxxxxxxxx

    Ok they got your money, its not over, now you get abused by the credit card companies.
    Scammed by Banks and Credit Card cos, also See bloody details, HOW they enable the theft, even make a profit off the theft.  HERE:

    Gerald

    .

    Labels:

    1 Comments:

    Anonymous Anonymous said...

    Webroot is an antivirus program that helps the user to secure their computer and network from harmful infection which is coming from the internet. Webroot keeps your computer update to date with latest virus definition. If it will detect any unwanted program or file which can harm your computer, it will remove that directly. It also takes an update and scans your computer regularly. Webroot also provides cloud-based security which is very useful nowadays. In order to download and install webroot secureanywhere user needs to visit webroot.com/safe.
    webroot.com/safe
    webroot.com/safe

    1:37 AM  

    Post a Comment

    Subscribe to Post Comments [Atom]

    << Home