Electronic financial crimes tools
02/5/2018 12:00 am
[rtl]Was the result of the communications revolution and the development of its network
Ali Thamer Al Waeli
Modern technological methods have emerged as one of the fastest means of money laundering operations, which makes it difficult to control the source of such funds. It highlights the importance of the advanced electronic means that came as a result of the communications revolution and the evolution of its network by comparing traditional means and modern methods in the stages of money laundering. Deposits with banks and smuggling across unsecured borders are based on deposit operations, while modern means such as smart cards, computers and the Internet are used through a system of protection and curing To ensure confidentiality of deposit operations.
In terms of employment, traditional means are through remittances or through non-monetary means of payment such as checks and bills drawn on banks abroad. In modern electronic means, they are carried out through a series of complex, rapid and successive operations that can separate them from their illicit sources.
With regard to the merger phase, they are in the traditional means through fake transactions and counterfeit bills and gambling and brokering activities. In electronic means, through the purchase of physical assets and gambling by credit cards, by personal computer without the mediation of banks, Accuracy, speed and confidentiality so that it is difficult to track them and enables the clearance of the latest technological tools:
1- Electronic banking services: It can be used in the stages of coverage and integration of the stages of money laundering operations.
2 - Internet banks: used in electronic remittance operations without the possibility of accurately identifying the identity of dealers if the other bank in another country.
3 - Electronic money (electronic currency) and encryption.
4 - Electronic communications over the Internet without the need for a telephone for this type of communication.
5 - smart electronic payment cards.
Common methods used by hackers Blocking attacks is a simple, traditional process that is powerful in its impact. It relies on sending a number of requests that the server can not carry. Suppose that the capacity of a server is 1,000 information per second and the number of attackers at the same time is Five thousand attackers are concentrated attacks on the same server will not bear, which causes the slow and severe and then the fall of the server stops working until the end of the attack security holes
In this case, the hacker will examine the server in all its aspects and collect information related to it, such as the type of operating system, the open ports in the server, the programs installed on it, and other important things that help him to identify and create a gap within the system that enables him to access the server management . Spyware (malware):
The hacker implants within the target device a disguised program in the form of management software files, where the latter opens a back door that enables the hacker to infiltrate in secret through it to the server, as well as spy on the keyboard and steal passwords and other things, it became easy for a young man under the age of twenty Can cause the same losses caused by an army on the ground in a full year, and a particular organization made up of a group of infiltrators could threaten the security of a state and paralyze all sensitive sectors such as financial sectors, education and security, and government sites, making them in a state of extreme emergency. Periods of brotherhood . Get huge money online
Many hackers exploit their ability to hack into collecting valuable financial wealth from the Internet, whether in legal or illegal ways. Either in this paragraph we will address the most common ways the hacker exploits to become a millionaire through the use of their skills and in the field of protection, security and penetration.
Let us take a look at the most prominent methods and methods used today with the following examples: Phishing The hacker relies on sending millions of messages "the same message often" to millions of people as an important message from a person with authority or an important site or bank or sovereign, This message often contains a warning to the victim and then try to catch him and catch him by exploiting his weak points and lack of experience in the virtual world and the Internet, and then direct the victim to a fake page exactly like the bank of the person or according to the text. (B) through financial institutions;
The hacker can collect thousands and millions of dollars through financial institutions. The hacker relies on collecting money by breaking through a database of financial institutions and withdrawing all user data and information from "credit cards, emails and passwords." There is also a breach of bank ATM regulations or a bank employee being tricked into obtaining important information about the bank or its customers and using it against them. C - Buying security vulnerabilities There are many hackers who discover the holes in the security is very dangerous in the sites of course, these sites provide financial rewards important to detect these vulnerabilities and the hacker is added to the list of hackers ethical white hat hacker. But some sell these loopholes in specialized sites, the price of the gap starts from $ 200 to $ 10,000 or more depending on the severity of the vulnerability and its importance.
D. Online buying and selling sites
Many hackers target websites that purchase and sell products on the Internet. Most of these sites store their customer data in a database without encryption such as credit cards, passwords and bank accounts. So in recent years a group of famous sites have been known to penetrate and pull millions of information from
their database, such as eBay. And that these data are exploited by Hackers or sell them on the black market, which we will talk about in the next point. Black market:
There is so-called hidden Internet, which can not be accessed in the normal way and it is difficult for the security authorities to follow the owners of the transactions that take place inside it, whether for hackers or anything else. Many hackers turn to the Internet to view databases for sale. These rules contain thousands of credit cards, passwords and other important information, or as previously mentioned, to sell security holes, whether in well-known scripts such as wordpress or popular sites or accounts. Banking and even personal accounts at sites paid at a lower price than normal. And (f) threats and coercion
It is possible for the hacker to set a goal as a large electronic shopping site and after hacking hacker site begins to negotiate with the owner to take money from him in order to fill the gaps and not scan the database containing thousands, but millions of dollars and does not announce that he hacked this site and these works Terrorism "and very dangerous because it is an explicit threat and blackmail to manage the site, and the threat is more serious if the products of this site are not tangible and tangible, such as electronic systems and programs .... and so on, where the hacker can be leaked to the Internet or return Sell them. G - penetrating server sites
It is possible for the attacker to penetrate the sites of servers that serve as the heart of the pulse of the Web in general, many of these servers and extensions contain hundreds or even thousands of sites, the hacker benefits more than the sites of the extension to withdraw their products and sell them also in the black market that we talked about previously, Was a company for integrated web services and software. [/rtl]
[rtl][You must be registered and logged in to see this link.][/rtl]