Digital Thievery a Lucrative Trade: Report

By

Cyber crime has seemingly become a trade so lucrative it is thought to be worth several times more than the illegal drugs racket, according to a recent report by the AFP.

As an example, “Until Eoin Blackwell arrived at his Sydney home from a Christmas party, he had no idea his bank account had been emptied from half-a-world away,” the AFP said.

Apparently, Blackwell’s personal details were stolen by a Romanian card-skimming gang and sold to criminals in Italy. While he hung out with friends in a pub, the thieves withdrew $2,900 from his account.

After the bank confirmed his cash was gone – which was withdrawn in Milan – they told Blackwell it would take six weeks to investigate. According to the AFP’s report, the bank officials even suggested he “may have participated in the fraud,” Blackwell said.

“In the end, I got the (money) back,” he said. “I’m now militant about covering the key pad on ATMs and more cautious with online banking.”

Blackwell is among the 65 percent of the world’s two billion Internet users estimated to have fallen victim to cyber crime, a trade so lucrative it is thought to be worth several times more than the illegal drugs racket.

Identity theft associated with the compromise of personal information is a growing issue for all law enforcement, according to Neil Gaughan, high-tech crime chief with the Australian Federal Police, the AFP reported.

According to Australia’s new “BLK MKT” cyber-safety campaign, an identity is stolen every three seconds and 43 million fake anti-virus programs are downloaded every year. These programs allow cyber criminals to effective log user’s every keystroke, including passwords.

“And the trade in personal details can be a lucrative enterprise. The cyber criminal can use complete identities to make fake passports, drivers’ licences and other documents,” the AFP said.

The BLK MKT program has set up a mobile shipping container fitted out as a cyber-criminal’s den to show people the inside world of identity theft. The aim is to demonstrate how an unprotected computer can be compromised in just four minutes.


Erin Harrison is Executive Editor, Strategic Initiatives, for TMC, where she oversees the company's strategic editorial initiatives, including the launch of several new print and online initiatives. She plays an active role in the print publications and TechZone360, covering IP communications, information technology and other related topics. To read more of Erin's articles, please visit her columnist page.

Edited by Tammy Wolf

Executive Editor, Strategic Initiatives

SHARE THIS ARTICLE
Related Articles

Coding and Invention Made Fun

By: Special Guest    10/12/2018

SAM is a series of kits that integrates hardware and software with the Internet. Combining wireless building blocks composed of sensors and actors con…

Read More

Facebook Marketplace Now Leverages AI

By: Paula Bernier    10/3/2018

Artificial intelligence is changing the way businesses interact with customers. Facebook's announcement this week is just another example of how this …

Read More

Oct. 17 Webinar to Address Apache Spark Benefits, Tools

By: Paula Bernier    10/2/2018

In the upcoming webinar "Apache Spark: The New Enterprise Backbone for ETL, Batch and Real-time Streaming," industry experts will offer details on clo…

Read More

It's Black and White: Cybercriminals Are Spending 10x More Than Enterprises to Control, Disrupt and Steal

By: Cynthia S. Artin    9/26/2018

In a stunning new report by Carbon Black, "Hacking, Escalating Attacks and The Role of Threat Hunting" the company revealed that 92% of UK companies s…

Read More

6 Challenges of 5G, and the 9 Pillars of Assurance Strategy

By: Special Guest    9/17/2018

To make 5G possible, everything will change. The 5G network will involve new antennas and chipsets, new architectures, new KPIs, new vendors, cloud di…

Read More