Combat Tech - Netflix

Mankind's greatest engineering feats are often its most powerful weapons. Helicopters, stealth technology, guns, bombs, planes are among the tools of war, and they often provide the key advantage that secures victory on the battlefield.

Combat Tech - Netflix

Type: Documentary

Languages: English

Status: Ended

Runtime: 60 minutes

Premier: 2012-03-21

Combat Tech - Technical support scam - Netflix

A technical support scam refers to a class of telephone fraud activities, in which a scammer claims to offer a legitimate technical support service, often via cold calls to unsuspecting users. Such cold calls are mostly targeted at Microsoft Windows users, with the caller often claiming to represent a Microsoft technical support department. In English-speaking countries such as the United States, Canada, United Kingdom, Ireland, Australia and New Zealand, such cold call scams have occurred as early as 2008 and primarily originate from call centers in India. The scammer will typically attempt to get the victim to allow remote access to their computer. After remote access is gained, the scammer relies on confidence tricks typically involving utilities built into Windows and other software in order to gain the victim's trust to pay for the supposed “support” services, when the scammer actually steals the victim's credit card account information, or to persuade the victim to login to Internet banking—lying that a secure server is connected and that they cannot see the details—to receive a promised refund.

Combat Tech - Confidence tricks - Netflix

After gaining access, the scammer attempts to convince the victim that their computer is suffering from problems that must be repaired. A number of common methods are used during many technical support scams—most of which involve misrepresenting the content and output of various Windows tools and system directories as evidence of malicious activity, such as viruses and other malware. Normally the elderly and the vulnerable will be targeted for technical support scams, or for people who aren't familiar with computers. The scammer may direct users to Windows' Event Viewer, which displays a log of various events for use by system administrators and expert users to troubleshoot problems. Although many of the log entries are relatively harmless notifications, the scammer may fraudulently claim that log entries labelled as warnings and errors are evidence of malware activity or that the computer is becoming corrupted, and that the errors must be “fixed”. The scammer may present system folders that contain unusually named files, such as Windows' Prefetch and Temp folders, and claim that the files are evidence of malware on the system. Furthermore, the scammer may open some of these files (especially files in Prefetch folder) in Notepad, which shows up as “gibberish” characters. The scammer claims that malware has “corrupted” these files. In reality, most of the files in Prefetch are binary files (which can not be displayed properly using Notepad) which speed up certain operations. The scammer may misuse Command Prompt tools to generate suspicious-looking output, for instance, the tree or dir /s command, which displays a listing of files and directories. The scammer may claim the innocuous program to be a malware scanner, and manually enter text purporting to be an error message (such as “security breach ... trojans found”) after the conclusion of the output. The scammer may misrepresent values and keys stored in the Windows Registry as being malicious, such as innocuous keys whose values are listed as not being set. The “Send To” function on Windows is associated with a globally unique identifier. The output of the command assoc, which lists all file associations on the system, displays this association with the line ZFSendToTarget=CLSID{888DCA60-FC0A-11CF-8F0F-00C04FD7D062}; this GUID is the same on all versions of Windows. The scammer may claim that this is a unique ID used to identify the user's computer, or claim that the “CLSID” listed is actually a “Computer Licence Security ID” that must be renewed. The scammer may also claim that the system's “problems” are a result of “expired” warranties on its hardware or software, for example, Windows Product Keys and coax the victim into paying for a “renewal”. The scammer may run the obscure Syskey utility and configure a startup password known only to them, thereby locking the victim out of their own system after the computer is rebooted. The scammer may delete Windows critical files and folders such as System32, making the computer unusable until the operating system has been reinstalled. The scammer may run the Netstat command in a terminal/command window, which shows the victim's foreign IP address. He/she then tells the victim that these addresses belong to hackers that have intruded the computer.

Combat Tech - References - Netflix