Your textbook lists 10 roles that can be assumed by cybercriminals. Name and describe four of these.
What will be an ideal response?
Answers can include any of the following:
Coders or programmers write the malware, exploits, and other tools necessary to commit the crime. Contrary to popular belief, coders are not protected by the First Amendment when they knowingly take part in a criminal enterprise-they go to jail just like the rest of the enterprise.
Distributors or vendors trade and sell stolen data, and act as vouchers of the goods provided by the other specialties.
Techies maintain the criminal infrastructure, including servers, bulletproof Internet Service Providers (ISPs), and encryption, and often have knowledge of common database languages and SQL servers.
Hackers search for and exploit application, system, and network vulnerabilities to gain administrator or payroll access.
Fraudsters create and deploy social engineering schemes, including phishing, spamming, and domain squatting.
Hosters provide "safe" hosting of illicit content servers and sites, often through elaborate botnet and proxy networks.
Cashers control drop accounts and provide those names and accounts to other criminals for a fee, and also typically control full rings of money mules.
Money mules are divided into three types. First are "one and done mules"-people who get tricked by social engineering schemes to send money. Second are "career money mules," who make a living, or at least a substantial amount of fun money, by completing money transfers or wire transfers between bank accounts. Third are "premier mules," who are the top of the money mule world. These individuals are actually sent to the United States, often on work or student visas, with the purpose of moving money for criminals.
Tellers help with transferring and laundering illicit proceeds through digital currency services and between different world currencies.
Leaders include many of whom don't have any technical skills at all. They are the "people-people." They choose the targets; choose the people they want to work each role; decide who does what, when, and where. They take care of personnel and payment issues.
You might also like to view...
Which of the following is part of the search incident to arrest exceptionto the Fourth Amendment's warrant requirement that allowsofficers to search not only the suspect incident to arrest,but also his or her "grabbing area"?
a. Consent search b. Seizure c. Search of a person d. Armspan rule
The Canadian Victims Bill of Rights was established in which year?
A. 1990 B. 2003 C. 2014 D. 2017
Which sentence would be automatically appealed?
a. probation b. a civil fine c. incarceration d. the death penalty
Personal frauds cost American tax payers an estimated $40 billion annually.
Answer the following statement true (T) or false (F)