Transcripts For DW DocFilm 20190421 08:15:00 : vimarsana.com

Transcripts For DW DocFilm 20190421 08:15:00

He is a face that everyone knows from t. V. Hes been all over ukraine show business for the last ten years so there is. No what he does need to explain who he is and that seems to be really paying off in. President ial elections for us thank you. Youre watching news life from for a leg up next as a close up with an indepth look at cybercrime remember you can always get the latest news on our web site thats w dot com. Thanks for watching. Stan. Language courses. Video. Any time any. W. Computers can be used as weapons more and more people have become victims of cyber crime. Because it was an absolute disaster you just dont do things like that to people. In new generation of criminals is making money over the internet a lot of money. For just one month you have one hundred orders and the next one thousand. Private Sector Companies Infrastructure Systems and government institutions have all been hacked. Oh boy what a brute force. Feel the. Fear of such attacks has created a multibillion Dollar Industry but what do we know about these Cyber Security companies. Germanys Digital Technology association. Says that over the past year about half of all terminals were victims of Computer Crime often its only a few euros sometimes its a lot more. Resident oshie choi and was targeted by cyber criminals after she signed up at an internet dating portal. I know i met a guy and things seemed to be going well it was like being on a date i was really happy when he wrote back that he felt the same way about me hed ask how i was and what i had for breakfast no one does that mean real life. In the. Friendship of sorts blossomed between you she and her new suitor a man whom she only knew through phone calls and photographs here identified himself as fred Gerard Dennis a german stone dealer from berlin then then it is claimed that his daughter who was studying in the us had been robbed and could not afford to travel back to germany for christmas. Dinners didnt have the money to pay for the take it so he asked Abboushi To Transfer Funds from her bank account to his. Bin as he kept on bothering me with phone calls for up to twenty one hours a day on this story really tugged at my heartstrings cried. It preyed on my conscience it was close to christmas so i finally broke down and sent him the money to get. That constitution more than One Thousand Euros later the police also investigated her for alleged money laundering. She had been ripped off by cyber scammers. Men often from african countries prey upon Vulnerable Women they use fake photographs and other materials to pass themselves off as attractive singles from europe they use digital messages and phone calls to try to get their victims to hand over money in this case the crooks even used to shes bank account to deposit funds theyd stolen from others thats what got her into trouble with the police. She even thought about killing herself. Mari about it is a psychologist and cyber crime profiler based on Oxford University shes been doing research on why people continue to fall for these kinds of scams. They have finally found someone. They can develop a relationship with someone they can trust the offender of for months will be very good at building that kind of trust so the victims actually even if they identify that this is a scam they will never not this sorry lose their trust in. The financial losses are often compounded by Emotional Distress it may be easy for some to ridicule those who Transfer Thousands of euros from their bank account to a perfect stranger but cyber crime is by no means confined to men and women who are simply looking for companionship criminals also target businesses. Take the norm back based firm leoni for instance in august twenty sixth seen as a scam cost the company forty Million Euros a Senior Executive at one of the firms subsidiaries in romania transfer the money after she got an email from someone claiming to be one of the companys top german executives. Human factor is the weakest link however we see that. Cyber crime a crime online is becoming more sophisticated more organized criminals use Techniques Social Engineering techniques in order to persuade people to open up an email or provide personal information. So i think that blaming users is really not going to solve the problem. What are these Social Engineering Techniques and why do they work so well. A computer is only as secure as the person who operates it social engineers take advantage of this situation for example they sometimes portray themselves as i. T. Support staff and offer to help solve a Computer Problem all the user has to do is download some software but that software often contains mold where that allows the crooks to take over the computer. Criminals also use Phishing Emails for example they contact Online Banking customers and ask them to authenticate their Bank Account Details otherwise the account will be blocked those who provide this information are turning their accounts over to crooks. These scammers try to scare their victims and thats the key element of this kind of Social Engineering create conditions that frighten Computer Users and then exploit that fear. Or they can play on simple Human Curiosity for example they might drop a u. S. B. Stick thats filled with model where in a Company Parking Lot and hope that an employee will pick it up and use it about half the time it works. No Company Wants to become the victim of a Million Dollar cyber attack thats why corporations including tousen club are hiring experts who can develop and maintain an internal Cyber Defense system. People like barry in spring Twenty Sixteen he and his team suddenly found themselves trying to fight off a cyber attack they had to react quickly and effectively. As the attacks played out. We came to the conclusion that a group of individuals was behind it. And that they probably had criminal intent and. It was an industrial strength hacking operation they used professional Software Tools they developed some of the software themselves and bought some of it on the black market if. It was like being attacked by a small criminal organization climbs into a medium would not come in and. The too soon to look experts feared that the hackers were trying to steal corporate documents including we search and strategy papers and construction plans those documents would fetch a high price on the black market. Another possibility the hackers could be working directly for to some clips competitors or even foreign governments trying to secure a strategic advantage in important or sensitive industries. The experts from the too soon cloaked Computer Emergency Response team worked overtime to get the situation under control. In the end aided by some external Service Providers they managed to clear the malware from the companys Computer System but they were not able to track down the perpetrators. These complex targeted attacks known as. Advanced persistent threats or a p. T. S. Are becoming more sophisticated and more common. Alpha very is convinced that every German Company is a potential target. As we are now in a period of transition where people are willing to discuss these problems open lines. As Company Experts are exchanging detailed information on various kinds of attacks and how they can protect themselves against those and to provide an effective defense we have to have the latest information on the attackers and their methods form the some. Part of that process includes a Detailed Analysis of previous attacks because many Hacking Operations follow a pattern. These patterns include brute force attacks in which hackers try to crack a Computer Users passwords they simply track through vast quantities of Character Combinations until they find the right one thats why experts advise people to use passwords that are as complex as possible. Another method involves using a digital form to automatically infect computers that are using Outdated Software some kinds of worms contain mall where that locks up the computer and orders the user to pay money to unlock it this sort of malware is known as ransomware. Its nothing short of digital blackmail experts advice Computer Users to keep their Antivirus Software up to date to prevent such attacks. For a distributed denial of service attacks are also very popular among Computer Criminals a de dos attack is an attempt to paralyze a Computer Network by flooding it with user traffic the perpetrators often employ large numbers of computers that theyve infected with malware. Another kind of attack can involve the use of webcams and smart Home Appliances like refrigerators. These are called bot net attacks. And the motives of Computer Criminals who carry out these attacks are just as diverse as the methods they use. There are different motives behind a different actually criminal groups so there could be a monitoring game financial gain political or religious beliefs so people who want to make a statement against the government against the country there could be actually emotional reactions. Or even sexual impulses showing off my skills to my peers. One person who made a name for himself by demonstrating his Happiness Skills was an Iraqi Born British student mustafa. In twenty eleven he and several members of a group known as Lulz Security broke into the Computer Systems of several High Profile Companies and organizations but they didnt do it for money they did it to show that they knew more about Digital Security than a lot of highly paid specialists. They also wanted some corporations to become more transparent about their activities. Because each year more advanced things like hacking. Into details and the action is databases to reveal truths or wrongdoing made by corporations or companies so us three knows have like an interesting way to make a change because if if you suspect that some some corporation often is corrupt and or the most powerful thing you can do is to reveal truths because people make decisions based on facts and truths and in a world where people are being complaining about fake news. Role truths can be hard to find. Groups targets included the websites of the cia the us senate and Sony Pictures they even took over the home page of the british tabloid the sun and posted at fake news report that the papers owner Rupert Murdoch had just died of a drug overdose. This called attention to the fact that a group of technologically savvy young people could break into just about any website they wanted alba some says they wanted to demonstrate that a lot of companies dont pay enough attention to cybersecurity. The most common misconception about cybercrime is that its complicated or its like its easy in law school to do it anyone can do so and you have. This many. Cool stuff freely available breaking down or to do hacking if people want more and more about how these attacks work and i was one of the peers where generally this little fear misconception uncertainty around here again because we would use. Album sound who was just sixteen at the time was arrested and pleaded guilty to charges of Computer Misuse he was given a suspended sentence of twenty months in jail today hes working on a dock. It degree in Computer Security. And. The threat posed by cyber criminals is complex they have a wide variety of motives and methods one of the german off already is doing to crack down on them. Where in the german state it has a at the Central Office for fighting cyber crime. Public prosecutors yulia and kyle are working hard to get a grip on the situation. We deal with a wide variety of digital crime just as police do in real life for example Child Pornography or the sale of weapons on the dot net. These are crimes that you wouldnt necessarily need a computer for but today theyre taking place on the dock next time yet but as. The dark net is an unregulated and mostly anonymous part of the internet. Such a flood was one of the first germans to sell Illegal Drugs on a platform known as Silk Road Flom sold cocaine and ecstasy and didnt worry much about getting caught. It was for all of you for the going to get washed it was like a gold rush. You felt like the cops would never find you. We simply werent on your thirtys radar like sets maybe americans. To figure out what was going on pretty early but the germans didnt mights with us until may twenty thirty no self secured as it was in the us. The silk road became a road to riches and had customers from All Over The World and he provided them with high quality drugs. In fact he was one of the most popular dealers on the site as indicated by customer raping. Profits from drug deals made flom wealthy he could now afford luxury cars and caribbean vacations. Caused by humans and some is not actually evil so i was fairly close to the sources the board trees and direct reports of sort of woods i was pretty much the only person between the producers and the consumers. And for both we dont give them it its a consequence i bypassed the whole Distribution Chain as if of course i sold stuff by the gram but hundreds of grams a day just this way and this was could only have happened on the internet ultimately otherwise youd have to deal with all sorts of middlemen but i was able to sell directly to my customers just a little pissed someone for over so bring on this very evil scheme evil threesome to notify him or. But the author already swore already closing in flambe had become careless he made deliveries in person to some clients one of them was working undercover for the police flom was arrested and later sentenced to seven years in present. Believes that its much more difficult these days for criminals to operate on the dark net his unit has managed to shut down a major Child Pornography ring and to identify the seller of a weapon that was used in a mass shooting in munich in Twenty Sixteen. But office says that its usually Good Old Fashioned Police Work that bring cyber criminals to justice. And if i didnt does you know. Its simply not true that we investigators hacking into a Computer Systems i want to make that absolutely clear. That the technical options that we have been investigating a dark night crime are straightforward. We dont hack into systems and we dont hunt around there for suspects. We used traditional investigative methods including undercover operations for the. Crypt their communications and dont deliver their products in person make it difficult for investigators to track them down but perhaps an ever greater cause for concern is the fact that Digital Technology used as a weapon in acts of sabotage. In twenty ten Security Experts discovered that a malicious Computer Worm called stuxnet had infected several hundred thousand computers Around The World most of them in iran. The worm interfered with the operations of centrifuges in the Natanz Enrichment Plant in iran one thousand centrifuges were affected fifteen to thirty percent of irans Enrichment Capacity most experts suspect that the u. S. Was behind the attack although some say it may also have been israel. In december twenty fifth teen Western Ukraine was hit by a Power Failure Hundreds of thousands of people were affected in what turned out to be the First Successful Hacker Attack on a power grid the attackers managed to break into the grids Network System and then just before christmas they disconnected several substations the

© 2025 Vimarsana