I think, they are not job positions.Their research have found the vulnerable
activity
of the anomaly users.The anomaly users are categorized in to the above
list.

On Thu, Sep 23, 2010 at 5:43 PM, Srinivas Naik <[email protected]> wrote:

> Hey!!!!
>
>
> Can I apply for it??
>
> Cheers
>
>
> On Thu, Sep 23, 2010 at 12:53 PM, Amar Deep <[email protected]> wrote:
>
>> Hi All,
>>
>>  At the GovSec/FOSE Conference in Washington, D.C. last March, Chabinsky
>> outlined 10 specializations the FBI typically sees within the world of cyber
>> crime.
>>
>> They are:
>>
>>    1. *Coders or programmers:* “who write the malware, exploits, and
>>    other tools necessary to commit the crime;”
>>    2. *Distributors or vendors:* “who trade and sell stolen data, and act
>>    as vouchers of the goods provided by the other specialties;”
>>    3. *Techies:* “who maintain the criminal infrastructure, including
>>    servers, bulletproof ISPs, and encryption; and who often have knowledge of
>>    common database languages and SQL servers of course;”
>>    4. *Hackers:* “who search for and exploit application, system, and
>>    network vulnerabilities to gain administrator or payroll access;”
>>    5. *Fraudsters:* “who create and deploy social engineering schemes,
>>    including phishing, spamming, and domain squatting;”
>>    6. *Hosters*: “who provide “safe” hosting of illicit content servers
>>    and sites, often through elaborate botnet and proxy networks;”
>>    7. *Cashers:* “who control drop accounts and provide those names and
>>    accounts to other criminals for a fee, and who also typically control full
>>    rings of our eighth category, money mules;”
>>    8. *Money mules:* who complete “money transfers or wire transfers
>>    between bank accounts;”
>>    9. *Tellers:* “who help with transferring and laundering illicit
>>    proceeds through digital currency services and between different world
>>    currencies;”
>>    10. *Leaders:* “They’re the “people-people.” They choose the targets;
>>    choose the people they want to work each role; decide who does what, when,
>>    and where; and take care of personnel and payment issues.” Many according 
>> to
>>    Chabinsky don’t have any technical skills.For a more in-depth explanation 
>> of
>>    each specialization, you can read the complete text of Chabinsky’s keynote
>>    on the FBI Web site.
>>
>>  --
>> You received this message because you are subscribed to the Google Groups
>> "nforceit" group.
>> To post to this group, send an email to [email protected].
>> To unsubscribe from this group, send email to
>> [email protected]<nforceit%[email protected]>
>> .
>> For more options, visit this group at
>> http://groups.google.com/group/nforceit?hl=en-GB.
>>
>
>  --
> You received this message because you are subscribed to the Google Groups
> "nforceit" group.
> To post to this group, send an email to [email protected].
> To unsubscribe from this group, send email to
> [email protected]<nforceit%[email protected]>
> .
> For more options, visit this group at
> http://groups.google.com/group/nforceit?hl=en-GB.
>



-- 
Regards
G.Pavanbabu,

-- 
You received this message because you are subscribed to the Google Groups 
"nforceit" group.
To post to this group, send an email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/nforceit?hl=en-GB.

Reply via email to