I think, they are not job positions.Their research have found the vulnerable activity of the anomaly users.The anomaly users are categorized in to the above list.
On Thu, Sep 23, 2010 at 5:43 PM, Srinivas Naik <[email protected]> wrote: > Hey!!!! > > > Can I apply for it?? > > Cheers > > > On Thu, Sep 23, 2010 at 12:53 PM, Amar Deep <[email protected]> wrote: > >> Hi All, >> >> At the GovSec/FOSE Conference in Washington, D.C. last March, Chabinsky >> outlined 10 specializations the FBI typically sees within the world of cyber >> crime. >> >> They are: >> >> 1. *Coders or programmers:* “who write the malware, exploits, and >> other tools necessary to commit the crime;” >> 2. *Distributors or vendors:* “who trade and sell stolen data, and act >> as vouchers of the goods provided by the other specialties;” >> 3. *Techies:* “who maintain the criminal infrastructure, including >> servers, bulletproof ISPs, and encryption; and who often have knowledge of >> common database languages and SQL servers of course;” >> 4. *Hackers:* “who search for and exploit application, system, and >> network vulnerabilities to gain administrator or payroll access;” >> 5. *Fraudsters:* “who create and deploy social engineering schemes, >> including phishing, spamming, and domain squatting;” >> 6. *Hosters*: “who provide “safe” hosting of illicit content servers >> and sites, often through elaborate botnet and proxy networks;” >> 7. *Cashers:* “who control drop accounts and provide those names and >> accounts to other criminals for a fee, and who also typically control full >> rings of our eighth category, money mules;” >> 8. *Money mules:* who complete “money transfers or wire transfers >> between bank accounts;” >> 9. *Tellers:* “who help with transferring and laundering illicit >> proceeds through digital currency services and between different world >> currencies;” >> 10. *Leaders:* “They’re the “people-people.” They choose the targets; >> choose the people they want to work each role; decide who does what, when, >> and where; and take care of personnel and payment issues.” Many according >> to >> Chabinsky don’t have any technical skills.For a more in-depth explanation >> of >> each specialization, you can read the complete text of Chabinsky’s keynote >> on the FBI Web site. >> >> -- >> You received this message because you are subscribed to the Google Groups >> "nforceit" group. >> To post to this group, send an email to [email protected]. >> To unsubscribe from this group, send email to >> [email protected]<nforceit%[email protected]> >> . >> For more options, visit this group at >> http://groups.google.com/group/nforceit?hl=en-GB. >> > > -- > You received this message because you are subscribed to the Google Groups > "nforceit" group. > To post to this group, send an email to [email protected]. > To unsubscribe from this group, send email to > [email protected]<nforceit%[email protected]> > . > For more options, visit this group at > http://groups.google.com/group/nforceit?hl=en-GB. > -- Regards G.Pavanbabu, -- You received this message because you are subscribed to the Google Groups "nforceit" group. To post to this group, send an email to [email protected]. To unsubscribe from this group, send email to [email protected]. For more options, visit this group at http://groups.google.com/group/nforceit?hl=en-GB.
