2can

Home

CID small banner

Computer Crime Investigative Unit

CCIU Home
Director
CCIU History
CCIU Core Values
Operational Philosophies
Unit Logo
CCIU in the News
Join the CCIU Team
Report a Crime
 

The Computer Crime Investigative Unit publishes Cyber Crime Prevention Flyers and Cyber Crime Alert Notices. These products are part of the CID Cyber Lookout program, a comprehensive initiative to promote Internet safety for the collective Army family. We welcome your feedback at cybercrimintel.cciu@us.army.mil.

Cyber Crime Prevention Flyers
CCPFs provide recommendations to strengthen your cyber security posture and prevent computer crime before it occurs.

Title Description File Number
I Don't Want to Plug and Play Universal Plug and Play (UPnP) vulnerabilities 0006-13-CID361-9H
Remote Hostile Takeover Smartphone security 0004-13-CID361-9H
Mobile Device Malware Avoiding mobile device malware 0023-12-CID361-9H
Home Computer Security Safe computing practices 0020-10-CID361-9H

Cyber Crime Alert Notices
2CANs are used to disseminate time-sensitive information related to computer crime threats to Department of the Army personnel.

Title Description File Number
Unsolicited Software or Devices

Cybersecurity and Legal Concerns with Unsolicited Software/Devices

0005-14-CID361-9H
MyPay or No Pay Apps Third party DFAS apps 0029-13-CID361-9H
The Not So Thrifty Apps Unauthorized Thrift Savings Plan (TSP) mobile applications 0013-13-CID361-9H
Held for Ransom Ransomware 0016-12-CID361-9H
Phoney Tech Support Social engineering attacks based on computer tech support 0015-12-CID361-9H
Personal Computer Doomsday? DNSChanger malware 0001-12-CID361-9H
E-mails About Bin Laden Might Pack A Malicious Punch E-mails about Usama bin Laden’s death used to spread malware 0025-11-CID361-9H
Energizer® Battery Charger Software Could Leave Your PC Drained Backdoor in Energizer® DUO USB battery charger software 0008-10-CID361-9H
Pop-Up Could Leave Your PC Messed Up Pop-up window malware/ransomware 0007-10-CID361-9H
P2P Might Leave You in a Tree Data leakage from improperly-configured Peer-to-Peer applications 0028-09-CID221-9H
Stimulus Program May Leave You Less Than Stimulated Economic stimulus phishing scam 0021-09-CID221-9H
USAJOBS.GOV Data Compromised Hackers stole user IDs, passwords, email addresses, names, phone numbers and some basic demographic data 0010-09-CID221-9H
IRS Rebate Check Could Leave You Broke IRS phishing scam 0028-08-CID221-9H
Valentine Message Could Leave You With A Broken Heart (Or Hard Drive) Social engineering to obtain personal information by tricking them into installing malicious software (malware) 0005-08-CID221-9H
“MONSTER PHISH” Lure Online Job Seekers Hackers stole names, e-mail addresses, and telephone numbers of about 146,000 subscribers to USAJOBS.gov 0050-07-CID221-9H
Virtual Pickpocketing Credit card that uses RFID technology can transmit your personal information 0039-07-CID221-9H
Turning Tragedy Into Cyber Crime Fraudulent schemes to capitalize on the Virginia Tech shootings 0027-07-CID221-9H
OPSEC On The Cyber Home Front A risk management approach to how much or how little personal information to make available on the Internet 0023-07-CID221-9H
Wireless (IN)Security: Who's Snooping On Your Home Network? Wireless hackers who snoop on your activities, steal your data, and surf on your network 0011-07-CID221-9H
Cyberbullying: Virtual Taunts, Real Harm Wireless hackers who snoop on your activities, steal your data, and surf on your network 0007-07-CID221-9H
“VISHING” Is The New “PHISHING” Cyberbullying consists of sending or posting harmful material using the Internet or other digital technologies 0006-07-CID221-9H
Thrift Savings Plan Security Notice Several TSP participants were infected with keylogging software 0003-07-CID221-9H

 

Accessibility/Section 508