Wednesday, November 28, 2018

Computer fraud


Introduction
            Computer fraud is using a computer to take, alter or gain unlawful use of electronic data of computers or systems. In United States jurisdiction, computer fraud is particularly prescribed by Computer Fraud and Abuse Act. This Act criminalizes all criminal computer-related acts under the federal jurisdiction. Computer fraud the suspected activities such as distributing hoax emails, unauthorized access to a computer, data mining those millions as well as malware, illegal gathering of identification information to use in accessing, use illegally obtained credit cards, stealing of Social Security numbers among others. Many hack computer systems to get large volumes of data for unlawful use. They also send viruses or worms with intent to ruin another party's computer or computer systems. In accomplishing this, criminals use social engineering, viruses, phishing well as DDos attacks as tactics to disrupt service or gain access to victim’s funds for fraud reasons.
AUG. 11, 2015: Nine Charged in the Insider Trading Case Tied to Hackers
            It was a mutual relationship that brought the cyber criminals to the dark reaches of the online world.  Living in their suburban homes in the US,  a nine-man rogue stock trader managed to send overseas hackers their shopping lists of corporate information releases they needed to guard before being made public (Hong, 2015,). The hackers who were working from Ukraine would then forward the how-to videos through email with full instructions to gain access to all pilfered income releases. In summary, the 32 traders together with their expert hackers reaped over $100 million in unlawful proceeds in a complex and brazen scam which is the greatest to match the wizardry of cyber -hacking to traditional insider trading. This was according to the court filings which was made public.  The indictment said that among those men were, Vitally Korchevsky, a hedge proceed manager and a retired Morgan Stanley staff based in one of the Philadelphia’s suburb, benefited    $17 million from illegal profits. This five-year fraud came undone when some federal prosecutors from New Jersey and  Brooklyn in collaboration with  Securities and Exchange Commission’s regulators and supportive law enforcement partners,  contacted multiple arrests,  filed indictments, and a lawsuit against the ever reigning loose business confederates’ network.
            In August 2015, the authorities managed to arrest Korchevsky at his home which is based in Glen Mills, Pa. the other four fraud master-minders were arrested in Georgia and in estates of Brooklyn. Warrants of arrest had been issued and from the arrest, three of them were kinsmen with ties in Ukraine. According to the United States attorney for New Jersey district, Mr. Paul Fishman, the hackers were relentless with a lot of patience. In a particular indictment, federal prosecutors based in New Jersey confirmed that five the hackers unlawfully gained access to companies such as Business Wire as well as PR Newswire for more than five years and defrauded them over 150,000 information releases. The publicly traded corporations were preparing these releases before releasing it to the public. Another victim company whose releases taken before being made public were the Market wired company. The United States attorney for New Jersey district never faulted the wire services as he confirmed that they had worked well in investigations. The illegally acquired news releases gave the fraudulent traders, of which four got charged in the separate indictment which was unsealed by prosecutors in Brooklyn. This was unlawfully having a huge advantage over other traders in the stock market allowing them to trade on information before getting wired. The individuals who used the unlawfully acquired information to trade in the stocks paid hackers a specific fee or a specific percentage of profits gained from fraudulent trading. The authorities confirmed that the illegal traders seeking illegal edges created shopping lists kind of to the hackers for the types of releases they desired and the firms they indented to trade on. The on-mission men got information from over 30 companies, which included, Clorox, Bank of America, Caterpillar as well as Honeywell. Being deliberate actions by traders, the law enforcement authorities asserted that they managed to trade prior the information contained in approximately 800 of the hundreds of thousands of releases they got a sneak peek at (Van Swol,  Braun & Kolb, 2015). This trend indicated a systematic and well-timed strategy to conceal their fraudulent activities. The authorities also confirmed that, in many situations, the men held many conversations through email as well as online messages, boldly discussing their activities. According to the indictment, at  a particular  scenario  in 2012, for instance, one of the accused  wrote in  The Russian language  in an online  live chat message, “I’m now  hacking into  prnewswire.com system .” In a second scenario, one accused   emailed 96 fraudulently acquired news releases to an individual with a heading, in Russian, that read “fresh, new stuff.” The email continued and said, “If he says that he does not understand what this is all about, inform him ‘quarterly report,’
            The indictment said that the authorities took an initiative to monitor some defendants for some years.  After thorough follow-ups in November 2012, the authorities seized a laptop from one of the hackers and on scrutiny; they found approximately 200 nonpublic information releases which were the private release for PR Newswire. Those charged in New Jersey indictment for breaking into t newswire networks included; Arkadiy, 51; Oleksandr, 24; Dubovoy, 28; Ivan Turchynov, 27; and Pavel Dubovoy, 28. Also, Brooklyn prosecutors also charged   Mr. Korchevsky, Khalupsky, 45; Leonid, 47; as well as Alexander 47, who are United States residents (Leukfeldt, 2014). They had personal brokerage accounts in some biggest investment banks in the United States. The banks included Merrill Lynch, JPMorgan Chase as well as Jefferies.  Among them, two were at one time registered with S.E.C., such as Mr. Korchevsky.
The authorities confirmed through court papers that that the illegal independent traders, as well as hackers based abroad, shared login as well as password details for all brokerage accounts they managed. It, therefore, made it easier to trade and at the same time transfer payments to their destined locations. In a statement made by Kelly Currie who is the federal attorney in charge of Brooklyn, that team of networks hackers and traders was an unholy alliance. In a confirmed court report, the authorities said that millions of dollars in those fraudulent trading had was recovered from all bank accounts managed by traders as well as hackers.  Like a full force fight against fraud, authorities went ahead to seize some homes, a boat as well as an apartment complex which they purchased from the proceeds of their fraudulent activities.
Charges and how they demonstrated financial fraud intend
            The charges passed against the men demonstrated many ways through which computer hackers can richly profit from illegally acquired information. Matthew Schwartz, a lawyer at Boies, Schiller & Flexner and a former prosecutor in Manhattan who worked on cases involving digital crime said the crime was motivated to become rich. He asserted that whenever people think of hackers who try to gain from their offense, they usually think of individuals who access and steal bank account details or sell sensitive identifying information.  He said that the reality had exemplified by charges against the team where the hackers managed to gain access sensitive and valuable information and profited off of it in all ways imaginable.
            In a similar case, Manhattan prosecutors filed charges against five men team where some of them played a role in the breach at the JPMorgan Chase, which leads to the loss of customer information for over 83 million accounts (Wolfe, 2015). The authorities asserted that the suspected group intended to those millions of email addresses illegally acquired for hacking to extend stock manipulation plans involving many spam emails to shoot up the prices of suspected worthless stocks. In another charge example, the scheme was as well similar what the court said it happened in 2005 where the S.E.C. charged a team of traders based in Estonia with hacking Business Wire to steal news releases for purposes of informing their intended trades. Therefore hacking or corporate news releases theft remain a computer based strategy for traders looking for illegal edges to use over years. Despite the similarity, uncovered group seemed further tactical when compared the Estonian online hackers since its scheme was broader when compared to anything that had previously been uncovered by enforcement authorities. From the critical analysis, this case is the first of different cases where hackers utilize purloined corporate information to carry out securities fraud.  In another incidence which occurred in 2015, a computer consulting firm Fire Eye confirmed uncovering of a complex team of hackers, called Fin4. The team had specialized in aiming at email networks of huge pharmaceutical as well as financial institutions to access market-sensitive details as well as deals. This revelation was also critical since it outlined in the report that Fire Eye, in California, shared with S.E.C., as well as the Federal Bureau of Investigation. The revelations helped his authorities in pursuing the case.           As a measure, the S.E.C requested companies to give information on information acquired in breaches of their computer- based networks. Further as a lesson, authorities undertook same steps with many huge public relations.  In confirming the this criminal trend, a threat intelligence manager at  Fire Eye, who worked on Fin4 report confirmed similarities as well as differences between approaches the group he had observed used and those handled up federal authorities. He asserted that the targeting overlap in both had deliberate pursue of market-moving information to benefit fiscally in the stock trade.  He also added that the only differences among such groups are the places where the information gets sourced. Therefore despite the differences, the goal in such crimes remains where hackers infiltrate networks and gain private, sensitive information to gain an edge in targeted trades.
Challenges in fighting computer fraud
            Currently, the world continues to experience complex and self-sufficient technology underground economy where data remains an illicit commodity. Stolen financial and personal data used, for instance, to gain access to bank accounts, credit cards, or fraudulently establish new credit lines has huge monetary value. This situation remains a driving force for criminal activities such as phishing, pharming, malware distribution as well as hacking corporate databases. Such crimes get supported by an infrastructure of malicious code writers; web hosts specialists as well as people with the ability to lease networks of compromised computers to commit automated crimes. Despite the value of cybercriminal economy not yet known, recent estimate in global corporate losses stands at around €750 billion each year (Katz, 2013).
            Currently, advances in the communications technologies, as well as the “informatisation" of the world, continues converged as never before. It has created to the industrialization of crime type where commodities, personal data, move so quickly to the extent that the conventional law enforcement cannot manage to keep pace. Computer fraud rates continue increasing with the adoption of Internet. Mobile access to The Internet and continuous broadband internet infrastructure deployment in the, therefore, creates vulnerability levels. Adopting these internet technologies poses potential external as well as internal threats. Additionally, increased data outsourcing data to third parties creates imminent risks to security as well as data protection (Lynn Winmill, Metcalf & Band, 2010).
Conclusion
            With the advent of computer technology, complexity in crime has also increased.  The inability of criminals to victimize from any location has given them a loophole to escape apprehension.  With technology, they manage to carry out crimes overseas and, therefore, making arrests difficult. Since the losses from computer fraud continue to increase, there is a need for authorities to come up with international policies to help address these crimes. Companies should also take precautionary measures to protect their information to avoid data theft which is critical for defrauding purposes. Technology should also innovate ways through which firms can block hackers and attackers as a preventive measure.

References
Hong, C. N. (2015, August 12). Hackers Tapped a Bonanza of Data for Traders, U.S. Says, Wall             Street             Journal (Online). p. 1
Katz, L. (2013): SYMPOSIUM ON CYBERCRIME. Journal of Criminal Law &             Criminology103(3), 663-665.
Leukfeldt, E. (2014): Cybercrime and social ties. Trends in Organized Crime17(4), 231-249.       Doi:             10.1007/s12117-014-9229-5
Lynn Winmill, J. B., Metcalf, D. L., & Band, M. E. (2010). CYBERCRIME: ISSUES AND        CHALLENGES IN THE           UNITED STATES, Digital Evidence & Electronic    Signature Law Review719-34.
Van Swol, L. M., Braun, M. T., & Kolb, M. R. (2015): Deception, Detection, Demeanor, and       Truth Bias in             Face-to-Face and Computer-Mediated Communication. Communication     Research42(8), 1116-1142. Doi: 10.1177/0093650213485785
Wolfe, N. A. (2015): Hacking the Anti-Hacking Statute: Using the Computer Fraud and Abuse   Act to Secure Public Data Exclusivity. Journal of International Human Rights13(3),       301-315.
Sherry Roberts is the author of this paper. A senior editor at MeldaResearch.Com in college research papers if you need a similar paper you can place your order for order research paper.



No comments:

Post a Comment

Buy thesis Online for Cheap

We are keen on ensuring that, any time students Buy thesis Online papers from our website, they get good grades that align with their expec...