Read the Brian Krebs posting today on the shady bankers who clear credit card transactions from cyber criminals and who operate under the tacit approval of the Russian government. Mr. Krebs characterizes Russian government involvement and that of complicit banks, even U.S. banks, in his concluding paragraph:
As the academic paper and my reporting make clear, the traditional methods of exposing these programs — “outing” the merchant banks and shining a spotlight on the main actors — has little effect when the organizers live in countries that willingly turn a blind eye to this activity. I’ve been eager to write more about this treatise since it was first featured in a New York Times story last month. In a future blog post, I will discuss the potential impact of the main policy alternative outlined in that paper: Convincing a handful of card-issuing banks here in the United States to stop processing payments for a handful of merchant accounts known to be tied to illicit online pharmacies.How do you convince "…a handful of card-issuing banks here in the United States…" to clean up their acts? You loot them and then make public the "parley discussions" they invoke under the Cyber Privateer Code of Conduct. Ditto for the online parley invoked by the Russian government.
If they had a government-issued Letter of Marque and Reprisal (LoMaR) and the go-ahead from a bonding authority, I'll bet a cyber privateering organization could easily net a billion dollars on this one.
No comments:
Post a Comment
Implementation suggestions for THE MORGAN DOCTRINE are most welcome. What are the "Got'chas!"? What questions would some future Cyber Privateering Czar have to answer about this in a Senate confirmation hearing?