Identify the technologies that exist to deter or reduce the threat of these types of computer crimes, and determine the effectiveness of these technologies to deter this specific crime.

Read the article titled: “Police Foil $420 Million Keylogger Scam” found on the Website located at
Give an example of the measures, you believe, the government or society can implement to deter these types of crimes.
Using the categories presented in chapter two (2) of the textbook, categorize the type of modern attack(s) or computer crime(s) that were committed in this case.
Identify the technologies that exist to deter or reduce the threat of these types of computer crimes, and determine the effectiveness of these technologies to deter this specific crime.
Summarize similar success stories by similar government agencies within the U.S. and include the criminals that were caught, the agencies (if any) that were involved, and the sanctions or charges the criminals faced.
Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double-spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcomes associated with this assignment are:
Compare and contrast the various types of computer crime.
Describe the different types of computer attacks.
Evaluate the ethical concerns that computer crimes raise in society and the impact of information technologies on crime, terrorism, or war.
Use technology and information resources to research issues in the investigation of computer crime.
Write clearly and concisely about computer crime investigation topics using proper writing mechanics and technical style conventions.
LONDON—The British Hi-Tech Crime Unit has foiled what would have been one of the biggest computer crimes in history, where thieves attempted to transfer $420 million from a London branch of Japanese bank Sumitomo Mitsui. The thieves are believed to have hacked into the bank’s computer systems using information gathered from keylogger programs, which allowed them access to sensitive passwords and other account information. At present, it is not clear how the keyloggers were installed. Police have been investigating the case since last October when bank security discovered that some computer systems had been compromised, and the National Hi-Tech Crimes Unit—a specialized police body that aims to combat computer crime—was called in.
Organized gangs are taking over crime on the Web. Click here to read about some of the major players, how they work and how big a threat they really are. An Israeli man, Yeron Bolondi, was arrested in connection with the case in Israel after an attempt was made to transfer $29 million into an account there. Bolondi appeared in a Tel Aviv district court Thursday charged with attempted money laundering and deception, and was remanded in custody for at least a week. It is understood that Israeli police have been working closely with the British over the case. According to Takashi Morita, head of communications at Sumitomo Mitsui in Japan, the bank did not suffer any financial loss because of the raid, but Morita declined to comment any further as “the case is still being investigated.” If the raid had succeeded, it would have been the biggest bank theft in British history, easily eclipsing the previous record of $50 million stolen from Northern Irelands Northern Bank last December—a raid believed by police to have been conducted by the IRA. The foiling of the raid is the latest in a string of successes for the National Hi-Tech Crime Unit, a group created in 2001 and staffed by police officers and computer experts from the armed forces, and Customs. A recent initiative, code-named Operation Blossom, targeted a network of computer software pirates and led to the arrests of eight people in Britain. Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at Security Center Editor Larry Seltzers Weblog.

"Get 15% discount on your first 3 orders with us"
Use the following coupon

Order Now