Join my exclusive Dead Drop Digest with the most popular spy stories, tips, & tricks.

Breaking news

A Russia-linked cyber-espionage group has hacked into the controls of more What is metadata, how is it used and why is it important? When we interact over more Mass surveillance is the subjection of a population or significant component of more There’s a good chance you were affected by the Equifax hack of 143 million more Facebook has the ability to spy on users in their homes and offices because more

Virtual and Cyber Crime: Security Threats

Technology represents a new area of security threats. The danger of identity theft, cyber crime, and other forms of electronic and virtual security threats constitute a very real and pressing danger for many people and governments. Ultius publishes regular security bulletins to help clients protect their information.

An examination of the greatest security threats

At this point in society, technology has reached the point where it is now used by just about everyone. As such, there are now a large number of criminals who have permeated the world of technology and now pose serious security threats to the rest of the technology-using population. Although the number of cyber security threats is numerous, there is a small handful that is more widespread, and more dangerous, than others.

Identity theft and the largest cybercrime threat to consumers

The first of these and most infamous of all is identity theft (sometimes referred to as “phishing”). Identity theft, quite simply, is the process of a hacker acquiring, or attempting to acquire confidential documents, then using these documents to gain access to sensitive information of the user, such as bank accounts and government websites. There are many causes for identity theft, the most common being a simple financial gain.

It can also be done as a simple malicious attack against someone for whom the hacker holds a personal grudge. The best way to combat identity theft is to first understand exactly how hackers manage to steal information. An article by Markus Jakobsson and Steven Myers (2007) explains that identity theft is a multi-stage process.

The lure

First, the hackers use what Jakobsson and Myers call “the lure.” This is where the hackers send out a mass number of email messages that appear to be from legitimate sources, such as a bank or cell phone service provider.

The hook

The next step is called “the hook.” Here, the hackers must encourage the user to go to a specified website and enter sensitive and identifying information (such as passwords, bank account information, or answers to security questions).

The catch

The final step, “the catch,” is where the hacker uses this information to actually hack a user’s account by using information gained in the previous two steps to impersonate them. Oftentimes, if a hacker has already reached step three, it is too late to do anything about it save for changing passwords.

Preventing the crime of identity theft

However, this does not mean there is nothing to be done about identity theft. The An article by Neil Chou, Robert Ledesma, Yuka Teraguchi, and John C. Mitchell (2004) explains a few common solutions that can help the average consumer identify phishing attempts and prevent the most infamous cybercrime in America. The most obvious line of defense is simple observation. Examining the URL of a web page can expose phishing attempts easily, as explained in the article.

“An @ in a URL causes the string to the left to be disregarded, with the string on the right treated as the actual URL for retrieving the page.” (p.4)”

This means that it is possible to identify phishing attempts simply by looking for an @ symbol in the URL bar. If it does, it may be necessary to take other preventative measures to determine if a URL is a phishing attempt.

This step, according to Chou et al. involves using a program called SpoofGuard, which is a plug-in that can scan pictures in potential phishing emails to determine if those same pictures have been reported in other identity theft cases. The last resort for a victim of identity theft is to quickly notify all credit and banking agencies of the identity theft in order to minimize the financial damage done.

Because of these measures were taken, identity theft is becoming less and less of a problem, and, thus, no real sweeping change is necessary to deal with it. It will, however, require constant vigilance on the part of technology users, but that much was established already.

Cyberbullying used to torment online teenagers

The second cyber-threat is what is known as cyber bullying. Cyberbullying is a serious threat in the world of technology because, while it is not a physical form of bullying, it can have effects equal to or even greater than “normal” bullying, and it is no longer limited to just children and teenagers, either, terrorist organizations now use cyber bullying as a coercion tactic regularly. Cyberbullying is the act of someone using the internet to perform traditional bullying tactics such as extortion, threats, or simple humiliation.

Cyberbullying statistics show it is more of an issue than people think, especially in this day and age. Studies show:

  • About 20% of teenagers aged 11-18 reported being cyberbullied at least once
  • Although that number could be as high as 40%

The research also shows an increased suicide rate among cyberbullying victims. Of those who reported being bullied and with suicidal thoughts:

  • 19.7% female
  • 20.9% male

About 19% reported attempting suicide:

  • 17.9% females
  • 20.2% males

(Hinduja and Patchin, 2011).

Solving the threat cyberbullying causes

In terms of solutions to cyberbullying, there are a few, but they mainly rely on prevention, rather than taking any sort of action after the fact. The best way to prevent cyberbullying is simply to never visit websites where cyberbullying takes place. If one observes cyberbulling taking place to themselves or others, the best strategy is to simply cease using the site.

However, in more serious cases of cyberbullying, it is possible for law enforcement to pinpoint where a particularly troublesome cyber bully is operating from and take him or her into custody, although these measures are taken in only the most extreme cases of cyberbullying (Hinduja and Patchin, 2011). Once again, enacting any sort of legislation to prevent cyberbullying would be difficult, and largely ineffective, since the very nature of the crime means that it is fluid and difficult to contain.


Cyber threats have evolved a great deal in the last few decades, but so too have the methods used to combat it. The unity that the internet has brought the world is also its biggest weakness, as cybercrime is only becoming more and more widespread as the internet continues to increase in prevalence across the world. Both these hackers and law enforcement must be constantly updating ways to subvert each other’s defenses in the never-ending war on cybercrime. There are always ways to combat it, though, such as by being vigilant with anti-virus software, and keeping abreast of change.


Tags: ,

Story Page