2can

Home

CID small banner

Computer Crime Investigative Unit

CCIU Home
Director
CCIU History
CCIU Core Values
Operational Philosophies
Unit Logo
CCIU in the News
Join the CCIU Team
Report a Crime
 

The Computer Crime Investigative Unit publishes Cyber Crime Prevention Flyers and Cyber Crime Alert Notices. These products are part of the CID Cyber Lookout program, a comprehensive initiative to promote Internet safety for the collective Army family. We welcome your feedback at usarmy.cciuintel@mail.mil.

Cyber Crime Prevention Flyers
CCPFs provide recommendations to strengthen your cyber security posture and prevent computer crime before it occurs.

Title Description File Number
Apple Mobile Device Ransom Scam Apple Mobile Device Ransom Scam 0016-14-CID361-9H
I Don't Want to Plug and Play Universal Plug and Play (UPnP) vulnerabilities 0006-13-CID361-9H
Remote Hostile Takeover Smartphone security 0004-13-CID361-9H
Mobile Device Malware Avoiding mobile device malware 0023-12-CID361-9H
Home Computer Security Safe computing practices 0020-10-CID361-9H

Cyber Crime Alert Notices
2CANs are used to disseminate time-sensitive information related to computer crime threats to Department of the Army personnel.

Title Description File Number
Cyber Sexual Extortion ("Sextortion") Cyber Sexual Extortion ("Sextortion") 0025-14-CID221-9H
Unsolicited Software or Devices

Cybersecurity and Legal Concerns with Unsolicited Software/Devices

0005-14-CID361-9H
MyPay or No Pay Apps Third party DFAS apps 0029-13-CID361-9H
The Not So Thrifty Apps Unauthorized Thrift Savings Plan (TSP) mobile applications 0013-13-CID361-9H
Held for Ransom Ransomware 0016-12-CID361-9H
Phoney Tech Support Social engineering attacks based on computer tech support 0015-12-CID361-9H
Personal Computer Doomsday? DNSChanger malware 0001-12-CID361-9H
E-mails About Bin Laden Might Pack A Malicious Punch E-mails about Usama bin Laden’s death used to spread malware 0025-11-CID361-9H
Energizer® Battery Charger Software Could Leave Your PC Drained Backdoor in Energizer® DUO USB battery charger software 0008-10-CID361-9H
Pop-Up Could Leave Your PC Messed Up Pop-up window malware/ransomware 0007-10-CID361-9H
P2P Might Leave You in a Tree Data leakage from improperly-configured Peer-to-Peer applications 0028-09-CID221-9H
Stimulus Program May Leave You Less Than Stimulated Economic stimulus phishing scam 0021-09-CID221-9H
USAJOBS.GOV Data Compromised Hackers stole user IDs, passwords, email addresses, names, phone numbers and some basic demographic data 0010-09-CID221-9H
IRS Rebate Check Could Leave You Broke IRS phishing scam 0028-08-CID221-9H
Valentine Message Could Leave You With A Broken Heart (Or Hard Drive) Social engineering to obtain personal information by tricking them into installing malicious software (malware) 0005-08-CID221-9H
“MONSTER PHISH” Lure Online Job Seekers Hackers stole names, e-mail addresses, and telephone numbers of about 146,000 subscribers to USAJOBS.gov 0050-07-CID221-9H
Virtual Pickpocketing Credit card that uses RFID technology can transmit your personal information 0039-07-CID221-9H
Turning Tragedy Into Cyber Crime Fraudulent schemes to capitalize on the Virginia Tech shootings 0027-07-CID221-9H
OPSEC On The Cyber Home Front A risk management approach to how much or how little personal information to make available on the Internet 0023-07-CID221-9H
Wireless (IN)Security: Who's Snooping On Your Home Network? Wireless hackers who snoop on your activities, steal your data, and surf on your network 0011-07-CID221-9H
Cyberbullying: Virtual Taunts, Real Harm Wireless hackers who snoop on your activities, steal your data, and surf on your network 0007-07-CID221-9H
“VISHING” Is The New “PHISHING” Cyberbullying consists of sending or posting harmful material using the Internet or other digital technologies 0006-07-CID221-9H
Thrift Savings Plan Security Notice Several TSP participants were infected with keylogging software 0003-07-CID221-9H

 

Accessibility/Section 508