Internet Fraud the Slashing Term Paper

Pages: 12 (4362 words)  ·  Bibliography Sources: ≈ 11  ·  File: .docx  ·  Level: College Senior  ·  Topic: Education - Computers


[. . .] The "identity theft" literally refers to the resulting crimes by acquiring illegally others personal data like, name, date of birth, driving license number, financial identity, and using of the same wrongfully for their own goals. The personal data cannot be compared with the unique fingerprints that cannot be easily given to or stolen by some one else for their own use. The data what the Internet requires for personal identifications if fallen into wrong hands allows the criminals to profit at the victim's expense. Examples of identity theft causing devastating consequences to the victims are numerous. It may effect the bank accounts, credit records, jobs, loans, and instances of getting arrested for the crimes not committed is also seen as a result of identity theft. (Fraud over the Internet: The Same Old Story, Different Medium)

Buy full Download Microsoft Word File paper
for $19.77
Most of the internet frauds stems from Spam mails which includes unsolicited "junk" e-mails, Unsolicited Commercial Emails (UCE), Scam mails-i.e. fake-commercial mails that uses phishing and spoofing techniques and also non-commercial chain letters with malicious and hidden attachments. The criminals use many methods for identity theft, the most common being e-mails. Assistant Director of FBI's Cyber Division, Jana Monroe in a press release has announce, "Bogus e-mails that try to trick customers into giving out personal information are hottest and most troubling, new scam on the internet." The techniques being used by the internet crooks for stealing the personal data are "phishing" and "spoofing." The most fundamental requirement of crooks to apply these methods is to make the users believe that they are securely connected to a trusted website and receiving e-mails from trusted sources. By the method of "phishing" the hackers imitating the address of the sites of legitimate companies persuade people to share their passwords and credit card numbers. By purchasing the domain names similar to that of trusted companies the hackers sends out numerous e-mails asking consumers to verify account information. (Identity Theft)

Term Paper on Internet Fraud the Slashing of Assignment

While most of the consumers ignore the bait of the schemers so thrown out, at least some are tempted into hitting. The consumers having no accounts just ignore that presuming the same to be a "junk mail." However, the customers of the legitimate company that the schemer has imitated sometimes belief the mail assuming it to have come from the real company often respond. Generally, the phishers hits the phish through e-mails in three ways. First, the response of the victim by return mail to the fraudulent request of phisher for account verification or account update supply the required personal information to the criminals. When the victim fills out an e-mail form in response to the fraudulent e-mail messages of the crooks the personal information of the victim are automatic inputs to the websites of criminals. (Identity Theft)

Finally, in confusion when the victims are made to click on a website link of the e-mail sent by the crooks, lands him at the phisher's website instead of the legitimate site. The phishers send e-mails to the victims with fraudulent requests like "click here to update account information." Clicking the same directs the victims to a website that is similar to the legitimate site like online store, ISP, auction site to which they are a customer. It has been made so carefully that it is not only similar in all respects to the legitimate sites but also difficult to differentiate by the common innocent users to which they execute unsuspectingly assuming it to be a legitimate routine transaction. The victims to these phishing expeditions are exemplified by the recent look alike site names such as, "," "" and" to phish the customers of

Besides the fake URL starting with "" is being used to scam the customers. Many of the reputed companies like, AOL, MSN, Earthlink, Yahoo, PayPal, e-Bay, Best Buy, Discover Card, Bank of America, Providian, etc. are victimized by the process of phishing. The crooks also use Spoofing as a means to convince the e-mail users to provide the personal data. By this method the header of an e-mail has been spoofed so as to appear to have originated from a place other than its actual origin. In 2003 it was noticed that the crooks spoofed the mails to use FBI site address, and sending under the title "Mass theft of debit cards" with an encouragement to the users to provide their personal information to ensure "any fraud operations with the Account" not be made. (Identity Theft)

With the use of phishing techniques the ultimate destination of return mail is hidden and using the clickable technique the personal information of the victims lands at the websites of the spoofer instantaneously. In order to avoid of being victimized to phishing and spoofing the warning is not to send sensitive personal information by e-mail. It is also judicious to suspect the legitimacy of the company when it is prompted to enter a password or financial information in an e-mail form. The spam mails are so large in magnitude that it has been rightly predicted at least half of all the e-mails will be spam/UCE. The diagram shows an estimate of the daily spam e-mail messages in North America. It is very difficult to identify the spammers after receiving the Spam mails. Some times the spammers install hidden software that allow remote access, mostly in the computers having broadband connections that is always on, and used to send their spam mails from that computer avoiding their own identity. (Identity Theft)

Fighting of the frauds through e-mail is not always possible due to jurisdictional limitations. It is only the awareness and conscious use of common sense of the user that guards of being victimized. To get ride of the spam messages it is always advisable not to ever open it. It is always wiser to just delete it unread. Even opening of the message makes the spammer confirm about existence of a live working e-mail address. It is always wiser to operate two e-mail addresses the primary being used for most trusted uses and the secondary for all other purposes with an assumption that it is susceptible to spam.

Signing up of free e-mail accounts also increases the spam/UCE load. It is therefore, worthy of checking the privacy policy before signing up these accounts. While signing up for online services it is always required to choose "NO" for sharing of the e-mail addresses. Utmost care should be taken while posting the e-mail address over the net and web pages. The spammers collect the e-mail addresses by using the web crawlers. Using tricks such as making the e-mail addresses as image files and putting spaces in between each of the letters of the address and making the e-mail address not clickable mailto link the addresses can be made only human readable and immune to crawlers. (Internet Scams-High-Tech confidence Games)

The Nigerian 419 Scam" is another example of Spam e-mail Fraud that is going on in inboxes presently. It is also known as Advance Fee Fraud and in line with the Nigerian Penal Code indicated internationally as the 419. The perpetrator of the scheme claims him to be Ben Keme, a person in the Nigeria, the Director in charge of the Auditing and Accounting Section of the Continental Bank of Benin Republic. Through e-mails he is persuading people to acquire $3 million by helping him to claim $7.5 million that belongs to a plane crash victim, Patrick Muller that lies dormant in the bank account. Being lured by the scheme of getting millions of dollars overnight many are prey to the scheme.

The Kolkata-based victim Piyush Kankaria was the first Indian "Officially registered" victim of the scheme. After a response to the mail he was asked to send a Motorola V60i Mobile set costing Rs. 13,000/- to one Ludwid Ekezie, an accountant of the said bank. He found nothing after sending set and bearing the loss along with a courier charge of Rs. 4000/-. Since these gangs have been using banking at Hong Kong, the U.S.A.'s Federal Investigation and intelligence Bureau, could do little to recover the money lost by victims. (Pandya, Kiran. Nigerian e-mail fraud claims Indian)

There is a rising trend of the e-mail scams wherein the victims are chosen clients of the financial institutions. The scammers cleverly acquires the passwords of internet banking, PIN numbers of ATM as an effort of their ID theft and to use them at the expense of the victims. It is even difficult to trace the fraudsters because they operate through different computers all over the world. Even when it is sometimes possible to trace the computer it is very difficult to trace the person who was sitting at the keyboard when the fraudsters operate from cyber cafes. It is always therefore wiser to avoid the mails asking for private information and better to contact the institution personally or communicate verbally. (E-mail fraud on the upswing)

There also several other internet Frauds. The companies promising to grant scholarships lured the students to… [END OF PREVIEW] . . . READ MORE

Two Ordering Options:

Which Option Should I Choose?
1.  Buy full paper (12 pages)Download Microsoft Word File

Download the perfectly formatted MS Word file!

- or -

2.  Write a NEW paper for me!✍🏻

We'll follow your exact instructions!
Chat with the writer 24/7.

Internet Abuse in Universities Case Study

Internet as Social Media: Connectivity and Immediacy A-Level Coursework

Internet Profiling and Privacy Term Paper

Internet Vulnerability in Today's Fast Paced Term Paper

Internet Changes Lives Research Paper

View 200+ other related papers  >>

How to Cite "Internet Fraud the Slashing" Term Paper in a Bibliography:

APA Style

Internet Fraud the Slashing.  (2004, April 15).  Retrieved February 23, 2020, from

MLA Format

"Internet Fraud the Slashing."  15 April 2004.  Web.  23 February 2020. <>.

Chicago Style

"Internet Fraud the Slashing."  April 15, 2004.  Accessed February 23, 2020.