.|.网络世界.i. Email Related C rimes 电子邮件犯罪 广西桂林空军学院王小刚/注 Email has fast emerged as the world’S most preferred form of communication.Billions of email messages traverse the globe daily.Like any other form of communication,email is"also misused bv criminal elements.The ease,speed and relative for blind carbon copy8) anonymity of email has made it a powerful tool iv.subject of the message(a short title/ f0r criminals. description of the message) Some of the major email related crimes are: V-message 1.Email spoofing' Certain web—based email services like www. A spoofed email is olle that appea ̄to SendFakeMail.coin offer a facility wherein in orl nate from one source but has actually addition to the abeve,a sender can also enter the emerged from another source. Falsifying4 the email address of the purported sender9 of the name and/or email address of the originator email. 0f the email usually does email spoofing.Usually Consider Mr.Siddharth whose email address to send an email the sender has to enter the is siddharth@hotmail.con.His friend Colu’s emai1 following information: address is golu@yahoo.tom.Using SendFakeMail, i.email address of the receiver of the email Siddharth(Jan send emails purporting 。to be sent ii.email address(es)of the person(s)who fronl Golu’S email account.A1l he has t0 do is will receive a copy of the emai|(referred enter golu@yahoo.eom in the space provided for to as CC for carbon copy ̄) sender’S email address. Golu’S friends would iii.email address(es)of the person(s)who trust such emails,as they would presume that will receive a copy of the email(referred they have come from Golu(whom they trust). to as CC for carbon copy,but whose Siddharth can use this misplaced trust to send identities will not be known t0 the 0ther viruses,Trojans,worms,etc.to Golu’S friends, recipients of the email(known as BCC who would unwittingly”download them. Notes:1-traVel'Be['trmVas】越过,穿过2.anonymity【. no'nimati]匿名3.email poofi“g电r邮件欺骗4.fal8ify 伪造5.originat。r。f the email电子邮件发送人6.carb。n c。PY副本7.re( ipient接收人8.blind carb。n c。py 肓送副本9.purported sendcr名义发送人10.purport声称,假称I1.unwittingly不知情地 28 @⑥00@ @匡响 06s响 维普资讯 http://www.cqvip.com
.|.网络世界.1. 2.Sending malicious codesn through email Emails are often the fastest and easiest ways daily email trafifc--depending upon the mailing list.Some generate only a few messages per day, others generate hundreds.If a person bas been unknowingly subscribed to hundreds of mailing to propagate“malicious(:odes over the lnternet. rhe Love Bug virus,for instance,reached mil— lions of computers within 36 hours of its release lists,his incoming email traffic will be too large and his service provider will probably delete his from the Philippines thanks to email.Hackers often bind Trojans,viurses,WOFflS and other account. computer contaminants‘ with e-greeting cards The simplest email bomb is an ordinary and then email them to unsuspecting persons. email account.All that one has to do is compose Such contaminants can also be bound with a message,enter the email address of the victim software that appears to be an anti—virus patch . multiple times∞in the“To”field.and press the E.g.a person receives an email from informa- “Send”button many times.Writing the email tion@mcaffee.eom(this is a spoofed email but address 25 times and pressing the“Send”button the victim does not know this).The email informs just 50 times(it will take less than a minute)will him that the attachment‘ contained with the send 1 250 email messages to the victim!If a email is a security patch that must be downloaded group of 10 people do this for an hour,the result to detect a certain new virus.Most unsuspecting would be 750,000 emails! users would succumb to”such an email(if they There are several hacking tools available t【l are using a registered copy of the McAffee anti— automate the process of email bombing.These viurs software)and would download the attach・ tools send multiple emails from many different ment,which actually could be a Trojan or a viurs email servers,which makes it very dififcult for jtselfl the victim to protect himself. 3.Email bombing 4.Sending threatening emails Email bombing refers to sending a large Email is a useful tool for technology savvy amount of emails to the victim resulting in the criminals thanks to the relative anonymity offered victim’s email account(in case of an individua1) by it.It becomes fairly easy for anyone with even or serve/-s(in case of a company or an email a basic knowledge of computers to become a service provider) crashing。 A simple way of blackmailer by threatening someone via email. achieving this would be to subscribe the victim’s In a recent case.Poorva received an email email address to a large number of mailing message from someone who called him or herself lists.Mailing lists are special interest groups that ‘your friend’.The attachment with the email share and exchange information on a common contained morphed恐pornographic站photographs topic of interest with one another via email.Mail— of Poorva.The mail message said that if Poorva ing lists are very popular and can generate a lot of were not to pay Rs.斟 10,000 at a speciifed place 12。malicious[mo'lifas]code恶意代码13.propagate['pr3pogeit]传播14.contaminant污染物15.patch 补丁16.attachment附件17.succumb fso kAml to屈服于18.registemd copy注册版19.subscribe(to)订 阅,订购20.multiple times多次地21.savvy精明的22.morphed变体的23.pomographic[,p3:no grtefik1 色情的24.Rs.卢比,rupees(印度等困货币.其单数形式为rupee)l ̄./简写 @⑥00@⑨@匡响⑨06囝晌 29 维普资讯 http://www.cqvip.com
十网络世界.1. every month,the photographs would be uploaded to the Net and then a copy sent to her fianc6笛. Scared.Poorva at first complied with the wishes He also created a website in the name of the Euro Lottery Company,announced in it that he had won the Euro Lottery and uploaded it on to the Internet.He then approached the Income Tax of the blackmailer and paid the first Rs.10,000. Next month, she knew she would have to ap proach臼her parents.Then,trusting the reason— ableness of her fianc6 she told him the truth.To— authorities in India and procured∞a clearance certiicatfe from them for re(:eiving the lottery amount.In order to let people know about the lottery,he approached many newspapers and gether they approached the police Investigation turned up the culprit勰一Poorva’s supposed magazines. riend who wanted thatf Poorva and her fianc6 should break up so that she would get her chance with him. 5.Email frauds Email spoofing is very offen used to commit inancialf crimes.It becomes a simple thing not The media seeing this as a story that would interest a lot of readers hyped it up and played a vital role in spreading this misinformation.Mr. Rao then went to many banks and individuals and told them that having won such a large sum of money he was afraid for his safety.He also wanted to move inlo a better house.He whee— dled money out of these institutions and people by tell ing them that since the lottery prize money would take some time to come to him,he would like to borrow money from them.He assured just to assume someone else’s identity but also to hide one’s own.The person committing the crime understands that there is very little chance 0f his actually being identified.In a recently re— ported case. a Pune—based剪businessman re— ceived an email from the Vice President of the them that the loan amount would be returned as tery money came into his posses— Asia Development Bank(ADB)offering him a soon as the lotlucrative∞contract in return for Rs.10 1akh . sion.Lulled研into believing him(lla thanks to the The businessman veriied tfhe email address of the Vice President from the website of the ADB Income Tax clearance)most of these people loaned large amounts of money to him. It was only when he did not pay back the loan amounts to the banks that they became suspicious. A countercheck by the authorities revealed the en— and subsequently transferred the money to the bank account mentioned in the email. It latcr turned out that the emall was a spoofed one and was actually sent by an Indian based in Nigeria. tire scheme.Mr.Rao was arrested.Later,it was found that some of the money had been donated or philanthropifc causes舯and also to political In another famous case,one Mr.Rao sent himself spoofed emails,which were supposedly rom the Euro Lotftery盟Company These mails parties!图 蕾文选自www.planetindia.net下栽日期:2005一l2-24 informed him that he had won the largest lottery. 25.fianc6 m ansei]未婚夫26.comply with顺从27.approach找……商鼍,向……接洽28.culprit罪犯 29.Pune—hased位于Pune的。Pune印度 城市30.1ucrative f"lu:krativ1有利的,有油水的31.1akh[1a:k1 I-万(尤指货币)32.1ottery彩票33.procure【p暗"kjuo](努力)获{{},取得34.clearance certificate所得税结 清证明书35.hype…up大肆宣传36.wheedle哄骗37.1ull[1A1]哄骗38.countercheck复查,复核39. philanthropic fiflon'Oropik1 cause慈善事业 30 @⑥00@⑨@匡响⑨06岛0:o
因篇幅问题不能全部显示,请点此查看更多更全内容
Copyright © 2019- huatuo0.com 版权所有 湘ICP备2023021991号-1
违法及侵权请联系:TEL:199 1889 7713 E-MAIL:2724546146@qq.com
本站由北京市万商天勤律师事务所王兴未律师提供法律服务