SlideShare a Scribd company logo
1 of 6
Download to read offline
Our group "Amr Safwat”, "Nada Rady" and "Mohamed Zahran"
The case Brief
A Kickoff: What is Phishing?

Phishing is a technique that involves sending email messages that appear to be official
correspondence from banks or credit card vendors. In this process, bank customers are
directed to fake websites purporting to be linked to financial institutions where the
customers are asked to enter their account numbers, passwords and other personal
identification information. Because the websites seem to be legitimate – complete with
bank logos and legal disclaimers – customers do not realize that the websites do not
belong to the legitimate financial institutions.
Introduction: Phish Phry Operation:
Operation Phish Phry commenced in 2007 when FBI agents, working with United States
financial institutions, took proactive steps to identify and disrupt sophisticated criminal
enterprises targeting the financial infrastructure in the United States.
Investigators in both countries uncovered an international conspiracy allegedly operating
an elaborate scheme to steal identities through a method commonly called “phishing.”
The group is accused of conspiring to target American-based financial institutions and
victimize an unknown number of account holders by fraudulently using their personal
financial information.
The multinational investigative effort resulted in 53 defendants being named in the
federal indictment and 47 suspects being identified by Egyptian authorities. The domestic
defendants were arrested in California, Nevada, and North Carolina. In California,
defendants reside in the counties of Los Angeles, Orange, San Bernardino, Riverside, and
San Diego.
Egyptian-based hackers obtained bank account numbers and related personal
identification information from an unknown number of bank customers through phishing
Defendants were accused with conspiracy to commit wire fraud and bank fraud. Various
defendants are charged with bank fraud; aggravated identity theft; conspiracy to commit
computer fraud, specifically unauthorized access to protected computers in connection
with fraudulent bank transfers and domestic and international money laundering.
Egypt's part in the Phry:
The indictment alleges that co-conspirators in Egypt collected victims' bank account
information by using information obtained from their phishing activities. Armed with the
bank account information, members of the conspiracy hacked into accounts at two banks.
Once they accessed the accounts, the individuals operating in Egypt communicated via
text messages, telephone calls and Internet chat groups with co-conspirators in the United
States. Through these communications, members of the criminal ring coordinated the
illicit online transfer of funds from compromised accounts to newly created fraudulent
accounts.
US part in the Phry:
The United States part of the ring was through the perpetration of the defendants who
directed trusted associates to recruit “runners,” who set up bank accounts where the funds
stolen from the compromised accounts could be transferred and withdrawn. A portion of
the illegally obtained funds withdrawn were then transferred via wire services to the
individuals operating in Egypt who had originally provided the bank account information
obtained via phishing.
The corporation between the Egyptian law enforcement and the USA FBI and the rules
that ruled this cooperation



The start was information from the FBI to the Egyptian Force inform
them about a criminal group in Egypt that use internet in professional
way to hack into some American banks by the help of an American group
and that the FBI is tracking that group about 2 years and they are sure
about them



Order was given to the check about that information and to work
according to the Egyptian Law , a Form of Special Technical team was
assign



Technical cooperation was in Technical Ambush to down the proxy
server (1)



that the criminal group was use to keep all their activity away from the
Egyptian law enforcement authorities



All the action that the Egyptian Force taken with according to the
Egyptian law



The arrange between FBI and the Egyptian Force to do the arrestment
operation in the same time in Egypt and USA


The corporation was in the principle of National sovereignty to each
team, in the information side it was full corporation

(1) proxy server
is a server (a computer system or an application program) that acts as an intermediary for
requests from clients seeking resources from other servers. A client connects to the proxy server,
requesting some service, such as a file, connection, web page, or other resource, available from
a different server. The proxy server evaluates the request according to its filtering rules. For
example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the
proxy provides the resource by connecting to the relevant server and requesting the service on
behalf of the client. A proxy server may optionally alter the client's request or the server's
response, and sometimes it may serve the request without contacting the specified server. In this
case, it 'caches' responses from the remote server, and returns subsequent requests for the
same content directly.
A proxy server has many potential purposes, including:
 To keep machines behind it anonymous (mainly for security).[1]
 To speed up access to resources (using caching). Web proxies are commonly used
to cache web pages from a web server.[2]
 To apply access policy to network services or content, e.g. to block undesired sites.
 To log / audit usage, i.e. to provide company employee Internet usage reporting.
 To bypass security/ parental controls.
 To scan transmitted content for malware before delivery.
 To scan outbound content, e.g., for data leak protection.
 To circumvent regional restrictions.
The legislations in Egypt concerning that case

 Telecommunication Regulation Law
No. 10 of Year 2003
 Regulates telecommunication industry including internet services
& net workings


Established an national authority for managing the
telecommunication utility, which “National Telecommunication
Regulatory Authority NTRA”



Regulates licensing of telecoms operators i.e. internet service
providers



Regulates the import, manufacture & assemble of
telecommunications equipments



Legally recognise & define important related technical matters i.e.
operators, service providers, networks, interconnection … etc;



Set the criminal liability on different illegal actions, which
considers cyber crimes i.e.


unauthorized establishing or operating of
telecommunication networks



By – passing international phone calls over internet
(Voip);



interception & recording of telecommunications
content;



hiding, changing, altering , obstructing of any
telecommunication messages;



Disclosure - without due - of right any information
concerning telecommunication networks users, or their
incoming or out going communications;



Intentionally disturbs or harasses other party by
misusing telecommunication equipments;

 Law No. 15 of Year 2004
Regulating Electronic Signature
& Establishing the Information Technology Industry Development Agency
(ITIDA)
 Established a General Agency ( ITIDA), which is responsible of
regulating the e – signature services, & other activities related to
electronic dealings and information technology industry, as well
as, promoting ICTs industry,


Also, reservation of intellectual property rights through
depositing, recording & registering the original copies of computer
software;



Legally recognise & define important related matters i.e. e –
writing, e – document, e – signature, e – medium, digital certificate
… etc;



Legally recognise the e – signature & e – writing & documents,
with the same conclusiveness prescribed for official & private
writings & documents in Evidence laws



Criminalize all forms of relevant illegal acts, for example:

Damages or forgery of e – signature, medium or e –
document;



Uses of such faked electronic matters, while being aware of
that;



Obtaining without due right any of the above mentioned
electronic matters, or penetrating such mediums or
obstructing it, or inactivates the performance of its
function.

 Egypt’s International Judicial Cooperation
in Field of Combating Cyber Crime
 According to Article (151) of Egyptian Constitution, treaties
concluded & ratified by Egypt have the same force of national
laws;


Egypt’s exchange mutual legal assistance through several
international legal tools
References
1-Federal Bureau of investigations
http://losangeles.fbi.gov/pressrel/2009/la100709.htm
2- Conversation with one of the Police officers in Egypt
3-Information from Judge Amr Abdelmoaty, President of Primary Court, Egypt

More Related Content

What's hot

Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In PakistanTaha Mehmood
 
Cyber Law
Cyber LawCyber Law
Cyber Lawihah
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippinesian_oguis
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Jayati Tiwari
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidenceShahid Jamal Tubrazy
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportAbdul Rehman
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in Indiagsmonga
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crimeatuljaybhaye
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commercePalavesa Krishnan
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber lawsmulikaa
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in indiaArpan Shah
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanShahzaib Mahesar
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as publishedRalph Schumann
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayVinay Pancholi
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crimefiza209
 

What's hot (20)

Cyber Laws In Pakistan
Cyber Laws In PakistanCyber Laws In Pakistan
Cyber Laws In Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Law
Cyber LawCyber Law
Cyber Law
 
Cybercrime law in the philippines
Cybercrime law in the philippinesCybercrime law in the philippines
Cybercrime law in the philippines
 
Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts Cyber Crime(Hacking) - IT acts
Cyber Crime(Hacking) - IT acts
 
Present Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital EvidencePresent Cyber Laws and Discovery of Digital Evidence
Present Cyber Laws and Discovery of Digital Evidence
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Cybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 ReportCybercrime act of Pakistan 2015 Report
Cybercrime act of Pakistan 2015 Report
 
It act ppt ( 1111)
It act ppt ( 1111)It act ppt ( 1111)
It act ppt ( 1111)
 
Overview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in IndiaOverview of Computer & Internet Crimes in India
Overview of Computer & Internet Crimes in India
 
Investigation of a cyber crime
Investigation of a cyber crimeInvestigation of a cyber crime
Investigation of a cyber crime
 
security issue in e-commerce
security issue in e-commercesecurity issue in e-commerce
security issue in e-commerce
 
Indian Cyber laws
Indian Cyber lawsIndian Cyber laws
Indian Cyber laws
 
Cyber crime in india
Cyber crime in indiaCyber crime in india
Cyber crime in india
 
Cyber fraud
Cyber fraudCyber fraud
Cyber fraud
 
Cyber Crime Laws of Pakistan
Cyber Crime Laws of PakistanCyber Crime Laws of Pakistan
Cyber Crime Laws of Pakistan
 
Aba gp solo magazine schumann technology article-20160319_as published
Aba gp solo magazine   schumann technology article-20160319_as publishedAba gp solo magazine   schumann technology article-20160319_as published
Aba gp solo magazine schumann technology article-20160319_as published
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Cyber laws
Cyber lawsCyber laws
Cyber laws
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 

Similar to Phish phry operation

CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxAryamanSinghvi
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the countryUjjwal Tripathi
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000Yash Jain
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docxhyacinthshackley2629
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Actmaruhope
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimeSumedhaBhatt2
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal lawZaheer Irshad
 

Similar to Phish phry operation (20)

UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
CASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptxCASE STUDY ON CYBER CRIME and characteristics .pptx
CASE STUDY ON CYBER CRIME and characteristics .pptx
 
Cyber Laws.ppt
Cyber Laws.pptCyber Laws.ppt
Cyber Laws.ppt
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
cyber law IT Act 2000
cyber law IT Act 2000cyber law IT Act 2000
cyber law IT Act 2000
 
CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
cyber crime.pptx
cyber crime.pptxcyber crime.pptx
cyber crime.pptx
 
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
 
Information Technology Act
Information Technology ActInformation Technology Act
Information Technology Act
 
IPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptxIPR & CYBER SECURITY.pptx
IPR & CYBER SECURITY.pptx
 
cyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crimecyber crime in india and law related to cyber crime
cyber crime in india and law related to cyber crime
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Chapter 3
Chapter 3Chapter 3
Chapter 3
 
rajat_ppt
rajat_pptrajat_ppt
rajat_ppt
 
Computer misuse and criminal law
Computer misuse and criminal lawComputer misuse and criminal law
Computer misuse and criminal law
 

More from Mohamed Zahran

MohamedZahran-Certificates-564
MohamedZahran-Certificates-564MohamedZahran-Certificates-564
MohamedZahran-Certificates-564Mohamed Zahran
 
Internet Governance Capacity Building Programme
Internet Governance Capacity Building ProgrammeInternet Governance Capacity Building Programme
Internet Governance Capacity Building ProgrammeMohamed Zahran
 
عرض تقدمي - التدريب عن بعد
عرض تقدمي - التدريب عن بعدعرض تقدمي - التدريب عن بعد
عرض تقدمي - التدريب عن بعدMohamed Zahran
 
التدريب عن بعد
التدريب عن بعدالتدريب عن بعد
التدريب عن بعدMohamed Zahran
 
Search engine mathematics
Search engine mathematicsSearch engine mathematics
Search engine mathematicsMohamed Zahran
 

More from Mohamed Zahran (6)

MohamedZahran-Certificates-564
MohamedZahran-Certificates-564MohamedZahran-Certificates-564
MohamedZahran-Certificates-564
 
Coursera VDY7K7SQY24F
Coursera VDY7K7SQY24FCoursera VDY7K7SQY24F
Coursera VDY7K7SQY24F
 
Internet Governance Capacity Building Programme
Internet Governance Capacity Building ProgrammeInternet Governance Capacity Building Programme
Internet Governance Capacity Building Programme
 
عرض تقدمي - التدريب عن بعد
عرض تقدمي - التدريب عن بعدعرض تقدمي - التدريب عن بعد
عرض تقدمي - التدريب عن بعد
 
التدريب عن بعد
التدريب عن بعدالتدريب عن بعد
التدريب عن بعد
 
Search engine mathematics
Search engine mathematicsSearch engine mathematics
Search engine mathematics
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

Phish phry operation

  • 1. Our group "Amr Safwat”, "Nada Rady" and "Mohamed Zahran" The case Brief A Kickoff: What is Phishing? Phishing is a technique that involves sending email messages that appear to be official correspondence from banks or credit card vendors. In this process, bank customers are directed to fake websites purporting to be linked to financial institutions where the customers are asked to enter their account numbers, passwords and other personal identification information. Because the websites seem to be legitimate – complete with bank logos and legal disclaimers – customers do not realize that the websites do not belong to the legitimate financial institutions. Introduction: Phish Phry Operation: Operation Phish Phry commenced in 2007 when FBI agents, working with United States financial institutions, took proactive steps to identify and disrupt sophisticated criminal enterprises targeting the financial infrastructure in the United States. Investigators in both countries uncovered an international conspiracy allegedly operating an elaborate scheme to steal identities through a method commonly called “phishing.” The group is accused of conspiring to target American-based financial institutions and victimize an unknown number of account holders by fraudulently using their personal financial information. The multinational investigative effort resulted in 53 defendants being named in the federal indictment and 47 suspects being identified by Egyptian authorities. The domestic defendants were arrested in California, Nevada, and North Carolina. In California, defendants reside in the counties of Los Angeles, Orange, San Bernardino, Riverside, and San Diego. Egyptian-based hackers obtained bank account numbers and related personal identification information from an unknown number of bank customers through phishing Defendants were accused with conspiracy to commit wire fraud and bank fraud. Various defendants are charged with bank fraud; aggravated identity theft; conspiracy to commit computer fraud, specifically unauthorized access to protected computers in connection with fraudulent bank transfers and domestic and international money laundering. Egypt's part in the Phry: The indictment alleges that co-conspirators in Egypt collected victims' bank account information by using information obtained from their phishing activities. Armed with the bank account information, members of the conspiracy hacked into accounts at two banks.
  • 2. Once they accessed the accounts, the individuals operating in Egypt communicated via text messages, telephone calls and Internet chat groups with co-conspirators in the United States. Through these communications, members of the criminal ring coordinated the illicit online transfer of funds from compromised accounts to newly created fraudulent accounts. US part in the Phry: The United States part of the ring was through the perpetration of the defendants who directed trusted associates to recruit “runners,” who set up bank accounts where the funds stolen from the compromised accounts could be transferred and withdrawn. A portion of the illegally obtained funds withdrawn were then transferred via wire services to the individuals operating in Egypt who had originally provided the bank account information obtained via phishing. The corporation between the Egyptian law enforcement and the USA FBI and the rules that ruled this cooperation  The start was information from the FBI to the Egyptian Force inform them about a criminal group in Egypt that use internet in professional way to hack into some American banks by the help of an American group and that the FBI is tracking that group about 2 years and they are sure about them  Order was given to the check about that information and to work according to the Egyptian Law , a Form of Special Technical team was assign  Technical cooperation was in Technical Ambush to down the proxy server (1)  that the criminal group was use to keep all their activity away from the Egyptian law enforcement authorities  All the action that the Egyptian Force taken with according to the Egyptian law  The arrange between FBI and the Egyptian Force to do the arrestment operation in the same time in Egypt and USA
  • 3.  The corporation was in the principle of National sovereignty to each team, in the information side it was full corporation (1) proxy server is a server (a computer system or an application program) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly. A proxy server has many potential purposes, including:  To keep machines behind it anonymous (mainly for security).[1]  To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[2]  To apply access policy to network services or content, e.g. to block undesired sites.  To log / audit usage, i.e. to provide company employee Internet usage reporting.  To bypass security/ parental controls.  To scan transmitted content for malware before delivery.  To scan outbound content, e.g., for data leak protection.  To circumvent regional restrictions.
  • 4. The legislations in Egypt concerning that case  Telecommunication Regulation Law No. 10 of Year 2003  Regulates telecommunication industry including internet services & net workings  Established an national authority for managing the telecommunication utility, which “National Telecommunication Regulatory Authority NTRA”  Regulates licensing of telecoms operators i.e. internet service providers  Regulates the import, manufacture & assemble of telecommunications equipments  Legally recognise & define important related technical matters i.e. operators, service providers, networks, interconnection … etc;  Set the criminal liability on different illegal actions, which considers cyber crimes i.e.  unauthorized establishing or operating of telecommunication networks  By – passing international phone calls over internet (Voip);  interception & recording of telecommunications content;  hiding, changing, altering , obstructing of any telecommunication messages;  Disclosure - without due - of right any information concerning telecommunication networks users, or their incoming or out going communications;  Intentionally disturbs or harasses other party by misusing telecommunication equipments;  Law No. 15 of Year 2004 Regulating Electronic Signature
  • 5. & Establishing the Information Technology Industry Development Agency (ITIDA)  Established a General Agency ( ITIDA), which is responsible of regulating the e – signature services, & other activities related to electronic dealings and information technology industry, as well as, promoting ICTs industry,  Also, reservation of intellectual property rights through depositing, recording & registering the original copies of computer software;  Legally recognise & define important related matters i.e. e – writing, e – document, e – signature, e – medium, digital certificate … etc;  Legally recognise the e – signature & e – writing & documents, with the same conclusiveness prescribed for official & private writings & documents in Evidence laws  Criminalize all forms of relevant illegal acts, for example: Damages or forgery of e – signature, medium or e – document;  Uses of such faked electronic matters, while being aware of that;  Obtaining without due right any of the above mentioned electronic matters, or penetrating such mediums or obstructing it, or inactivates the performance of its function.  Egypt’s International Judicial Cooperation in Field of Combating Cyber Crime  According to Article (151) of Egyptian Constitution, treaties concluded & ratified by Egypt have the same force of national laws;  Egypt’s exchange mutual legal assistance through several international legal tools
  • 6. References 1-Federal Bureau of investigations http://losangeles.fbi.gov/pressrel/2009/la100709.htm 2- Conversation with one of the Police officers in Egypt 3-Information from Judge Amr Abdelmoaty, President of Primary Court, Egypt