Corante

About this Author
Dana Dana Blankenhorn has been a business journalist for over 25 years and has covered the online world professionally since 1985. He founded the "Interactive Age Daily" for CMP Media, and has written for the Chicago Tribune, Advertising Age, and dozens of other publications over the years.
About this Site
Moore’s Law defines the history of technology. It held that the number of circuits etched on a given piece of silicon could double every 18 months as far as its author, Intel co-founder Gordon Moore, could see. Moore’s Law has spawned constant revolutions since then, not just in computing but in communications, in science, in a host of areas. Moore’s Law applies to radios, and to optical fiber, but there are some areas where it doesn’t apply. In this blog we’ll take a daily look at new implications of Moore’s Law in real time, as it rolls forward to create our future.
Media Bloggers
In the Pipeline: Don't miss Derek Lowe's excellent commentary on drug discovery and the pharma industry in general at In the Pipeline

Moore's Lore

« Content Fetish | Main | Give Me Hotzones or Give Me Death »

November 15, 2005

Phishing and Terrorism

Email This Entry

Posted by Dana Blankenhorn

john%20robb.JPGJohn Robb, at his Global Guerillas site, today has one of his most fascinating posts yet, a comparison between terrorism networks and phishing networks.

He starts with an analysis of the phishing business from Chris Abad of Cloudmark, which found that its vertical integration is very loose. Instead it consists of specialists in various horizontal skills -- mass e-mail, templates, chat rooms, fences - which individual gangs then put together. Then he notes this is just the way the IED market is run in Iraq.

The result is intense competition at each stage of the supply chain, and incredibly low prices for phishers and terrorists. A terrorist can get an IED to blow up an American convoy for just $50.

The bazaar for such transactions is the key. It's virtual.

And yes, the skills cross over, as Robb notes with the example of Russian gangs attacking Chechen Web sites. But there must be a connection to the real world, which Robb labels the Temporary Autonomous Zones (TAZ), areas of lawlessness that can't be policed.

Robb identifies the Internet as among these zones, but that's not entirely true. It's the areas of lawlessness, where authority is questionable or non-existant, that we should focus on.

Comments (0) + TrackBacks (1) | Category: Digital Divide | Internet | Politics | Security | law | spam | war


TRACKBACKS

TrackBack URL:
http://www.corante.com/cgi-bin/mt/backtar.cgi/14963

Listed below are links to weblogs that reference Phishing and Terrorism:

Phishing und Terrorismus from spampolitik.de
Dana Blankenhorn verdanken ich den Hinweis auf einen Interessanten Zusammenhang zwischen der Organisation von Phishing und Terrrorismus. Gemeinsam haben beide Phänomene, dass ihnen ein virtueller Mark (Bazar) zugrund liegt, auf denen die “Dienst... [Read More]

Tracked on December 4, 2005 08:24 AM

POST A COMMENT




Remember Me?



EMAIL THIS ENTRY TO A FRIEND

Email this entry to:

Your email address:

Message (optional):




RELATED ENTRIES
The Legend of Dennis Hayes
Evolution Changes Its Mind (Again)
Welcome to 1966
What Must Craigslist Do?
No Such Thing as Free WiFi
The Internet As A Political Issue
Google Images Ruled Illegal
Fall of Radio Shack