Preview

Operation Phish Phry Case Study

Powerful Essays
Open Document
Open Document
1498 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Operation Phish Phry Case Study
The act of phishing has been around since the mid-1990s, but it was not legally defined as a crime until the early 2000s when it became more widespread (Rekouche 2011). To help understand the implications of phishing, this essay will critically view a significant case study that happened in 2009, Operation Phish Phry’. Understanding the actions taken by the various actors involved in this case could provide an insight regarding the countermeasures proposed by relevant authorities about phishing. Additionally, I would argue that the proposed countermeasures are insufficient and that there is still room for improvements which I will cover in this essay.
Phishing is a form of online fraud and theft in which the scammer sends out fake emails made
…show more content…
Regarded as the largest ever cyber-crime bust, the 2-year long investigation saw the FBI working together with multiple different law enforcement agencies such as the Los Angeles Electronic Crimes Task Force and the Egyptian authorities. The investigation only begun when the FBI took an active approach in stemming out possible threats to the financial structure of the United States of America (USA) (Rouse 2009, McGlasson 2009). This seems to suggest that this scam could have gone unreported to the authorities or it was not taken seriously until the FBI stepped in. The end of the investigation led to the arrest of about 100 people in the United States and Egypt. Over the course of the investigation, the Egyptian authorities agreed to participate in the operation as the main offenders were out of the FBIs jurisdiction. The offenders of this scam were split into two categories, the technical aspect which were handled by the Egyptians whereas the non-technical aspect of the scam was handled by the Americans. The technical role of the Egyptians in this scam was to create the fake emails which they would send out to the masses to illegally acquire bank login credentials. This is the common technique used by would-be scammers when attempting to phish for victims (Norton 2017). There have been no reports whether the Bank of America and Wells Fargo were specifically targeted by the scammers but being the two largest customer bases in America seems to suggest that it was. Having a large customer base, increases the offender’s chances of acquiring the relevant login credentials. Upon successfully acquiring the bank account credentials, they would contact their partners in America who would then coordinate a transfer of the compromised account. The non-technical aspect to this case were managed by a small handful of Americans Kenneth Joseph

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Creating phishing emails messages, also referred as spear phishing, that will be sent to the company or even specific staff employees.…

    • 275 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The article was considerably valid as was demonstrated by credible news programs and other articles. The importance of keeping patches and antivirus signatures up to date, to help prevent these types of attacks was discussed in detail. Users selecting strong passwords was also discussed, and revealed as a key component in the ability to compromise these accounts. This article was valuable and affected a lot of people. It is clear that there are prevention methods that can be used, to secure your…

    • 605 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A phishing scam is an email or website that's designed to steal from you. Often times, a hacker will use this email or website to install malicious software onto your computer.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    mis 535

    • 2196 Words
    • 8 Pages

    Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks.…

    • 2196 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Major corporations, governments, and other organizations are hacked each week, mostly by means of phishing attacks. Describe how users and IT organizations should arm themselves against these attacks.…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Phish: A class in its own

    • 1384 Words
    • 6 Pages

    Junta, the two disc set released by Phish in 1988, offers all listeners a look into the band’s early days. Before the term “jam band” was coined, lead guitarist Trey Anastasio described the band as a prog-rock band. The bands work in the progressive music world will always be undermined by the stereotypical hippie jam band label tied to them; this is a truly a shame. Junta shows us that the band is so much more than just some noodley, mindless jam band.…

    • 1384 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Exam Cheat Sheet

    • 1283 Words
    • 6 Pages

    Phishing: Claiming to be a legitimate business in an attempt to trick people into divulging sensitive information by getting them to go to a specified website…

    • 1283 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Waves of targeted email attacks, often called phishing, are exploiting client side vulnerabilities in commonly used programs such as Adobe PDF Quick Time, Adobe Flash, and Microsoft Office. This is currently the primary initial infection vector used to compromise computers that have access to the internet and the network.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Better Essays

    There has been an increase in global technology over the past few years. The increase in technology allows us to have access to many things from almost anywhere, such as the Internet. People can find information right at their fingertips faster and easier than ever before. However, with this increase in technology comes an increase in cybercrime.…

    • 780 Words
    • 3 Pages
    Better Essays
  • Good Essays

    All people from Texas ride horses, white guys can’t dance and Asians are very good at math. Some stereotypes are humorous but others for example, one dangerous pre-notion is that African-Americans are more likely to become professional athletes then acquire a real job like a doctor or lawyer. This is an illusion portrayed by the coaches and teachers who promote athleticism over academics. Plato’s “The Allegory of the cave” shows us that “chains” and “shadows” keeps one from being enlightened, just like these young African-Americans. Henry Louis Gates Jr’s “Delusions of Grandeur” tells how this illusion “chains” down the African-American youth to a mindset of professional sports. Gates illuminates the devastating effects of the “shadows” being cast and “chains” being imposed on African-American minds keeping them in a “cave” of ignorance and keeping them unenlightened to the possibilities around them.…

    • 686 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Over the past twenty years, the Internet’s role in our lives has grown to an everyday necessity. We rely on the Internet to communicate within the scope of our employment and social lives, to conduct our banking and bill paying, we even use it to track our personal property. There is hardly one area of our lives that we can not conduct over the Internet. While the Internet is a convenience that has made our lives easier, it has also opened the door in our lives to a vulnerability that is rapidly being exploited by cyber criminals. Cyber crimes are growing at an exponential rate in the United States and we, the consumers/end users are unaware of the liabilities a simple click on the wrong button can cause. This paper will address the current cybersecurity policy issues for the protection of the Internet infrastructure and recommend new policies that will address the liability for malicious traffic traversing the Internet from the End Users.…

    • 1586 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    My doctoral study topic focuses on internet security for businesses. Internet security is a broad topic that involves a multitude of theories, beliefs, recommendations, and guidelines. My article selections detailed a synopsis of the government’s responsibility and the end users obligation to internet security. In addition, the annotated bibliographies give the reader a summarization of the article through it 's main focal points. The two articles below are for my doctoral study.…

    • 380 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Causes Of Identity Theft

    • 1108 Words
    • 5 Pages

    People often trust the internet too much when it comes to buying things or sending out their personal information. One does not take into account that there are hackers waiting to scam you for all your money and information. IN an article titled, “Information Security Breaches and the Threat to Consumers” written by Fred H. Cate, he states, “Consumers often end up unwittingly providing thieves with access to sensitive data by failing to secure their own data, by responding to fraud schemes, such as phishing and pharming, and by careless use of their personal information” (Cate 4). In other words, people tend to trust that what they put on the internet, however there are people who are trying to scam you for your money. People should be more aware and less careless about what they are sending through the internet and to who they are sending it to. While we continue to be careless with our information, we continue to see many crimes involving identity theft. Cate writes, “The vulnerability of unsecured personal data and the threat of identity-based frauds nevertheless continue to grow and evolve as perpetrators become more sophisticated in how they seek to obtain and exploit personal information” (Cate 2). It makes it easy for hackers to catch and use one’s personal information when the individual continues to be careless with their information…

    • 1108 Words
    • 5 Pages
    Good Essays