SlideShare a Scribd company logo
1 of 1
Download to read offline
Association News NZIPI




Five ways criminals
use facebook
F
           acebook went public on the 21st     an illegally obtained ID and password.
           May 2012 in one of the most         Once they are online, they have the victim’s
           anticipated IPO’s in history.       entire friend list at their disposal and a
           With more than 900 million          trusted cyber-identity. The imposter can
users, Mark Zuckerberg’s expanding social      use this identity for a variety of confidence
media empire has become a part of the          schemes, such as a popular one that has
online experience.                             become known as the London scam in
	 A by-product of its success is that          which the fraudster claims to be stranded
millions of people around the world are        overseas and in need of money to make it        Michael Campbell is the Vice Chairman of
now far more exposed to a number of            home. This scam has a far higher success        the NZIPI and he has operated his business
cybercrimes that result from criminals         rate on Facebook, and specifically of           as a self-employed Private Investigator in New
having access to this media.                   commandeered accounts, because there is         Zealand for the past 31 years.
	 The modern Private Investigator needs        a baseline of trust between the users and       www.advancedinvestigations.co.nz
to be savvy and up to date with the most       those on their friends list.
modern technology to combat this on-                                                           and buy and sell a laundry list of goods
going trend involving the cybercriminal.       3. Profile cloning                              and services. Posing as a reputable user
	 Cybercrime has been around for a long        Profile cloning is the act of using             lets the scammer capitalise on the trust
time but the presence of social media has      unprotected images and information to           that person has earned by selling fake
made many crimes easier to commit. In          create a Facebook account with the same         goods and services or promoting brands
social networks people often make ‘friends’    name and details of an existing user. The       they have been paid to advertise.
without knowing the person and make their      cloner will then send “friend” requests
personal information easily available.         to all of the victim’s contacts. These          5. Mining unprotected information
	 None of the networks present more            contacts will likely accept the cloner as       Few sites provide an easier source of basic
opportunity to criminals than Facebook         a friend since the request appears to be        information than Facebook. While it is
and its hundreds of millions of users.         from someone they’re familiar with. 	           possible to keep all personal information
	 Recent studies have identified some          Once accepted the criminal has access to        on Facebook private, users frequently reveal
of the most common ways criminals use          the targets personal information which          their emails, phone numbers, addresses,
Facebook to their advantage.                   they can then use to clone other profiles       birth dates and other pieces of private
                                               or to commit fraud. By doing this they          data. As security experts and hackers
1.	Hacking accounts                            exploit a person’s account and postulate        know, this kind of information if often
When criminals hack a Facebook account         as that person to extract information.          used as passwords or as answers to secret
they typically used one of several available   The scariest aspect of this offending           security questions. While the majority of
‘brute force’ tools, which cycle through       is its simplicity as hacking acumen is          unprotected information is mined for
a common password directory and try            unnecessary to clone the profile; the           targeted advertising, it can be a means to
commonly used names and dates, opposite        criminal simply needs a registered account.     a more devious purpose such as profile
hundreds of thousands of different                                                             cloning and ultimately, identity theft.
email ID’s. Once hacked, an account            4.	Fake Facebook                                	 These are but a few of many examples
can be commandeered and then used as           A common form of phishing is the                of computer related crimes the modern
a platform to deliver spam, or – more          fake Facebook scam. The scammer’s               investigator needs to be aware of.
commonly – sold. Clandestine hacker            direct users via some sort of clickable         	 New Zealand legislation has been
forums are crawling with ads offering          enticement, to a spurious Facebook log in       updated in recent years to prohibit
Facebook account ID’s and passwords in         page designed to look like the real thing.      behaviour when criminals access
exchange for money. In the cyber world,        When the victims enter their usernames          computers for a dishonest purpose or
information is a valuable resource.            and passwords, they are collected into          without the authority of the computer
                                               a database, which the scammer will              owner. Offenders who commit computer
2.	Commandeering accounts                      often then sell. Once scammers have             related crimes are often surprised to
A more direct form of identity theft,          purchased a user’s information they can         discover the serious consequences they
commandeering occurs when the criminal         take advantage of their assumed identity        can face upon conviction for breaches of
logs onto an existing user account using       through apps like Facebook Marketplace          sections 249-252 Crimes Act 1961.

36	    June - July 2012                                                                                                          NZ Security

More Related Content

What's hot (19)

Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Spear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishnaSpear phishing attacks-by-hari_krishna
Spear phishing attacks-by-hari_krishna
 
Spear Phishing
Spear PhishingSpear Phishing
Spear Phishing
 
Fire eye spearphishing
Fire eye spearphishingFire eye spearphishing
Fire eye spearphishing
 
What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?What is Phishing and How can you Avoid it?
What is Phishing and How can you Avoid it?
 
P H I S H I N G
P H I S H I N GP H I S H I N G
P H I S H I N G
 
Phishing
PhishingPhishing
Phishing
 
An overview study on cyber crimes in internet
An overview study on cyber crimes in internetAn overview study on cyber crimes in internet
An overview study on cyber crimes in internet
 
Phishing demo
Phishing demoPhishing demo
Phishing demo
 
Phishing ppt
Phishing pptPhishing ppt
Phishing ppt
 
Phishing techniques
Phishing techniquesPhishing techniques
Phishing techniques
 
Prevent phishing scams
Prevent phishing scamsPrevent phishing scams
Prevent phishing scams
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to phishing
Introduction to phishingIntroduction to phishing
Introduction to phishing
 
hire a hacker
hire a hackerhire a hacker
hire a hacker
 
Protect smartphone from hackers
Protect smartphone from hackersProtect smartphone from hackers
Protect smartphone from hackers
 
News Byte Session By Mukesh Pathak
News Byte Session By Mukesh PathakNews Byte Session By Mukesh Pathak
News Byte Session By Mukesh Pathak
 
A Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.comA Guide to Internet Security For Businesses- Business.com
A Guide to Internet Security For Businesses- Business.com
 
Social Media Security
Social Media SecuritySocial Media Security
Social Media Security
 

Viewers also liked

Stability testing
Stability testingStability testing
Stability testingGaurav Kr
 
Designing Stability Studies for Early Stages of Pharmaceutical Development
Designing Stability Studies for Early Stages of Pharmaceutical DevelopmentDesigning Stability Studies for Early Stages of Pharmaceutical Development
Designing Stability Studies for Early Stages of Pharmaceutical DevelopmentInstitute of Validation Technology
 
A ppt on accelerated stability studies
A ppt on accelerated stability studiesA ppt on accelerated stability studies
A ppt on accelerated stability studiesshrikanth varma Bandi
 
Stability testing and shelf life estimation
Stability testing and shelf life estimationStability testing and shelf life estimation
Stability testing and shelf life estimationManish sharma
 
Seminor on accelerated stability testing of dosage forms sahil
Seminor on accelerated stability testing of dosage forms sahilSeminor on accelerated stability testing of dosage forms sahil
Seminor on accelerated stability testing of dosage forms sahilsahilhusen
 
MODEPHARMA: Practical and Clin
MODEPHARMA: Practical and ClinMODEPHARMA: Practical and Clin
MODEPHARMA: Practical and ClinMODEPHARMA
 
Stability studies of drugs
Stability studies of drugsStability studies of drugs
Stability studies of drugsPromila Sharan
 
Ich guidelines for stability studies 1
Ich guidelines for stability studies 1Ich guidelines for stability studies 1
Ich guidelines for stability studies 1priyanka odela
 
Accelerated stability studes
Accelerated stability studesAccelerated stability studes
Accelerated stability studesSunil Boreddy Rx
 
stability tests for pharmaceutical products
stability tests for pharmaceutical productsstability tests for pharmaceutical products
stability tests for pharmaceutical productsalaaalfayez
 

Viewers also liked (11)

Stability testing
Stability testingStability testing
Stability testing
 
Designing Stability Studies for Early Stages of Pharmaceutical Development
Designing Stability Studies for Early Stages of Pharmaceutical DevelopmentDesigning Stability Studies for Early Stages of Pharmaceutical Development
Designing Stability Studies for Early Stages of Pharmaceutical Development
 
A ppt on accelerated stability studies
A ppt on accelerated stability studiesA ppt on accelerated stability studies
A ppt on accelerated stability studies
 
Stability testing and shelf life estimation
Stability testing and shelf life estimationStability testing and shelf life estimation
Stability testing and shelf life estimation
 
Seminor on accelerated stability testing of dosage forms sahil
Seminor on accelerated stability testing of dosage forms sahilSeminor on accelerated stability testing of dosage forms sahil
Seminor on accelerated stability testing of dosage forms sahil
 
MODEPHARMA: Practical and Clin
MODEPHARMA: Practical and ClinMODEPHARMA: Practical and Clin
MODEPHARMA: Practical and Clin
 
Dissolution
DissolutionDissolution
Dissolution
 
Stability studies of drugs
Stability studies of drugsStability studies of drugs
Stability studies of drugs
 
Ich guidelines for stability studies 1
Ich guidelines for stability studies 1Ich guidelines for stability studies 1
Ich guidelines for stability studies 1
 
Accelerated stability studes
Accelerated stability studesAccelerated stability studes
Accelerated stability studes
 
stability tests for pharmaceutical products
stability tests for pharmaceutical productsstability tests for pharmaceutical products
stability tests for pharmaceutical products
 

Similar to 5 ways criminals use facebook

ICT-phishing
ICT-phishingICT-phishing
ICT-phishingMH BS
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spammingKavis Pandey
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfvichu19891
 
How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scamsMr.OoPpSs Group
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxMdRuga
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)CA.Kolluru Narayanarao
 
CYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfCYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfannaielectronicsvill
 
Cybercrimes
CybercrimesCybercrimes
CybercrimesFit Tri
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper Joydeep Banerjee
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of CybercrimeRubi Orbeta
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimesrinushalu
 

Similar to 5 ways criminals use facebook (20)

ICT-phishing
ICT-phishingICT-phishing
ICT-phishing
 
Facebook
FacebookFacebook
Facebook
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
 
Phishing.pdf
Phishing.pdfPhishing.pdf
Phishing.pdf
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
How to avoid facebook scams
How to avoid facebook scamsHow to avoid facebook scams
How to avoid facebook scams
 
Social Network Crime on Rise
Social Network Crime on RiseSocial Network Crime on Rise
Social Network Crime on Rise
 
Users guide
Users guideUsers guide
Users guide
 
Copy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptxCopy of policing the internet_040555.pptx
Copy of policing the internet_040555.pptx
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
Lesson iv on fraud awareness (cyber frauds)
Lesson  iv on fraud awareness   (cyber frauds)Lesson  iv on fraud awareness   (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
 
CYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdfCYBER CRIMEThe crime which is performed through internet is called .pdf
CYBER CRIMEThe crime which is performed through internet is called .pdf
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Phish Phry- Analysis paper
Phish Phry- Analysis paper Phish Phry- Analysis paper
Phish Phry- Analysis paper
 
The Major Types of Cybercrime
The Major Types of CybercrimeThe Major Types of Cybercrime
The Major Types of Cybercrime
 
Social Engineering 2.0
Social Engineering 2.0Social Engineering 2.0
Social Engineering 2.0
 
123.pptx
123.pptx123.pptx
123.pptx
 
Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Spam identification fake profile
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
Tittl e
Tittl eTittl e
Tittl e
 

More from William Grieve

Paragon pub talk jan 12 ram
Paragon pub talk jan 12 ramParagon pub talk jan 12 ram
Paragon pub talk jan 12 ramWilliam Grieve
 
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterNZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterWilliam Grieve
 
Paragon Pub Talk October 2011
Paragon Pub Talk October 2011Paragon Pub Talk October 2011
Paragon Pub Talk October 2011William Grieve
 
Paragon pub talk issue 1
Paragon pub talk issue 1Paragon pub talk issue 1
Paragon pub talk issue 1William Grieve
 
Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1William Grieve
 
Listener Article May 2011 P1/6
Listener Article May 2011 P1/6Listener Article May 2011 P1/6
Listener Article May 2011 P1/6William Grieve
 
Paragon newsletter may 2011
Paragon newsletter may 2011Paragon newsletter may 2011
Paragon newsletter may 2011William Grieve
 
Paragon insert mercantile
Paragon insert   mercantileParagon insert   mercantile
Paragon insert mercantileWilliam Grieve
 
Paragon investigations brochure 2011 page 2 only
Paragon investigations brochure 2011   page 2 onlyParagon investigations brochure 2011   page 2 only
Paragon investigations brochure 2011 page 2 onlyWilliam Grieve
 
Paragon insert insurance fraud investigations
Paragon insert   insurance fraud investigationsParagon insert   insurance fraud investigations
Paragon insert insurance fraud investigationsWilliam Grieve
 
Paragon insert insurance assessment overview
Paragon insert   insurance assessment overviewParagon insert   insurance assessment overview
Paragon insert insurance assessment overviewWilliam Grieve
 
Paragon insert incident training
Paragon insert   incident trainingParagon insert   incident training
Paragon insert incident trainingWilliam Grieve
 
Paragon insert i.t. forensic
Paragon insert   i.t. forensicParagon insert   i.t. forensic
Paragon insert i.t. forensicWilliam Grieve
 
Paragon insert contact us
Paragon insert   contact usParagon insert   contact us
Paragon insert contact usWilliam Grieve
 
Paragon insert cctv cameras
Paragon insert   cctv camerasParagon insert   cctv cameras
Paragon insert cctv camerasWilliam Grieve
 

More from William Grieve (20)

Paragon flyer final
Paragon flyer finalParagon flyer final
Paragon flyer final
 
NZIPI Update
NZIPI UpdateNZIPI Update
NZIPI Update
 
Paragon pub talk jan 12 ram
Paragon pub talk jan 12 ramParagon pub talk jan 12 ram
Paragon pub talk jan 12 ram
 
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilterNZ Security Magazine Dec Jan 2012 Article Ron McQuilter
NZ Security Magazine Dec Jan 2012 Article Ron McQuilter
 
Paragon Pub Talk October 2011
Paragon Pub Talk October 2011Paragon Pub Talk October 2011
Paragon Pub Talk October 2011
 
Paragon pub talk issue 1
Paragon pub talk issue 1Paragon pub talk issue 1
Paragon pub talk issue 1
 
Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1Paragon pub talk version 1 vol 1
Paragon pub talk version 1 vol 1
 
Listener Article May 2011 P1/6
Listener Article May 2011 P1/6Listener Article May 2011 P1/6
Listener Article May 2011 P1/6
 
Paragon on Graffiti
Paragon on Graffiti Paragon on Graffiti
Paragon on Graffiti
 
Paragon newsletter may 2011
Paragon newsletter may 2011Paragon newsletter may 2011
Paragon newsletter may 2011
 
Paragon insert mercantile
Paragon insert   mercantileParagon insert   mercantile
Paragon insert mercantile
 
Paragon investigations brochure 2011 page 2 only
Paragon investigations brochure 2011   page 2 onlyParagon investigations brochure 2011   page 2 only
Paragon investigations brochure 2011 page 2 only
 
Paragon insert insurance fraud investigations
Paragon insert   insurance fraud investigationsParagon insert   insurance fraud investigations
Paragon insert insurance fraud investigations
 
Paragon insert insurance assessment overview
Paragon insert   insurance assessment overviewParagon insert   insurance assessment overview
Paragon insert insurance assessment overview
 
Paragon insert incident training
Paragon insert   incident trainingParagon insert   incident training
Paragon insert incident training
 
Paragon insert i.t. forensic
Paragon insert   i.t. forensicParagon insert   i.t. forensic
Paragon insert i.t. forensic
 
Paragon insert contact us
Paragon insert   contact usParagon insert   contact us
Paragon insert contact us
 
Paragon insert cctv cameras
Paragon insert   cctv camerasParagon insert   cctv cameras
Paragon insert cctv cameras
 
Lawyer talk advert
Lawyer talk advertLawyer talk advert
Lawyer talk advert
 
Nzipi update may 11
Nzipi update may 11Nzipi update may 11
Nzipi update may 11
 

5 ways criminals use facebook

  • 1. Association News NZIPI Five ways criminals use facebook F acebook went public on the 21st an illegally obtained ID and password. May 2012 in one of the most Once they are online, they have the victim’s anticipated IPO’s in history. entire friend list at their disposal and a With more than 900 million trusted cyber-identity. The imposter can users, Mark Zuckerberg’s expanding social use this identity for a variety of confidence media empire has become a part of the schemes, such as a popular one that has online experience. become known as the London scam in A by-product of its success is that which the fraudster claims to be stranded millions of people around the world are overseas and in need of money to make it Michael Campbell is the Vice Chairman of now far more exposed to a number of home. This scam has a far higher success the NZIPI and he has operated his business cybercrimes that result from criminals rate on Facebook, and specifically of as a self-employed Private Investigator in New having access to this media. commandeered accounts, because there is Zealand for the past 31 years. The modern Private Investigator needs a baseline of trust between the users and www.advancedinvestigations.co.nz to be savvy and up to date with the most those on their friends list. modern technology to combat this on- and buy and sell a laundry list of goods going trend involving the cybercriminal. 3. Profile cloning and services. Posing as a reputable user Cybercrime has been around for a long Profile cloning is the act of using lets the scammer capitalise on the trust time but the presence of social media has unprotected images and information to that person has earned by selling fake made many crimes easier to commit. In create a Facebook account with the same goods and services or promoting brands social networks people often make ‘friends’ name and details of an existing user. The they have been paid to advertise. without knowing the person and make their cloner will then send “friend” requests personal information easily available. to all of the victim’s contacts. These 5. Mining unprotected information None of the networks present more contacts will likely accept the cloner as Few sites provide an easier source of basic opportunity to criminals than Facebook a friend since the request appears to be information than Facebook. While it is and its hundreds of millions of users. from someone they’re familiar with. possible to keep all personal information Recent studies have identified some Once accepted the criminal has access to on Facebook private, users frequently reveal of the most common ways criminals use the targets personal information which their emails, phone numbers, addresses, Facebook to their advantage. they can then use to clone other profiles birth dates and other pieces of private or to commit fraud. By doing this they data. As security experts and hackers 1. Hacking accounts exploit a person’s account and postulate know, this kind of information if often When criminals hack a Facebook account as that person to extract information. used as passwords or as answers to secret they typically used one of several available The scariest aspect of this offending security questions. While the majority of ‘brute force’ tools, which cycle through is its simplicity as hacking acumen is unprotected information is mined for a common password directory and try unnecessary to clone the profile; the targeted advertising, it can be a means to commonly used names and dates, opposite criminal simply needs a registered account. a more devious purpose such as profile hundreds of thousands of different cloning and ultimately, identity theft. email ID’s. Once hacked, an account 4. Fake Facebook These are but a few of many examples can be commandeered and then used as A common form of phishing is the of computer related crimes the modern a platform to deliver spam, or – more fake Facebook scam. The scammer’s investigator needs to be aware of. commonly – sold. Clandestine hacker direct users via some sort of clickable New Zealand legislation has been forums are crawling with ads offering enticement, to a spurious Facebook log in updated in recent years to prohibit Facebook account ID’s and passwords in page designed to look like the real thing. behaviour when criminals access exchange for money. In the cyber world, When the victims enter their usernames computers for a dishonest purpose or information is a valuable resource. and passwords, they are collected into without the authority of the computer a database, which the scammer will owner. Offenders who commit computer 2. Commandeering accounts often then sell. Once scammers have related crimes are often surprised to A more direct form of identity theft, purchased a user’s information they can discover the serious consequences they commandeering occurs when the criminal take advantage of their assumed identity can face upon conviction for breaches of logs onto an existing user account using through apps like Facebook Marketplace sections 249-252 Crimes Act 1961. 36 June - July 2012 NZ Security