Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

How to protect yourself, your computer, and others on the internet
Introduction and Overview of Digital Crime and Digital Terrorism
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
INTERNET SAFETY.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
Security, Privacy, and Ethics Online Computer Crimes.
How Secure Are You When You Use the Internet?. Overview What is the Internet? And what it is commonly used for? o Parents vs. Teens/Kids Use Ways of accessing.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
October is National Cyber Security Month OIT and IT providers are launching an awareness campaign to provide tips and resources to help you stay safe online.
IDENTITY THEFT BY: Victoria Jeffcoat CSCI 101 Lecture Tuesday 2pm.
Computer Related Issue
Cybercrime, aka computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography.
Cyber Bullying Welcome to our Parent Power night. I hope you will find the evening helpful and informative. Mrs. Fleming is very proactive and very much.
Quiz 2 - Review. Identity Theft and Fraud Identity theft and fraud are: – Characterized by criminal use of the victim's personal information such as a.
Felicia Cervantes. Using someone's personal identifying data for unlawful purpose. (This is a SERIOUS crime.) More than 8 million American Adults fell.
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Internet Safety Dr. Steve Broskoske Misericordia University.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Cyber Crimes.
INTERNET SAFETY. What Is The Internet?? Formerly referred to as ARPANET (Advanced Research Projects Agency Network), the internet was created in 1969.
Unethical use of Computers and Networks
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Computers, Cell Phones & the Internet JOSE CANO AND SAMIE GIDDENS.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
October 21, 2008 Jennifer Q.; Loriane M., Michelle E., Charles H. Internet Safety.
Issues and Problems Concerning the Internet Copyright ◦ Users pass off as others work and post it as their own work without giving credit to the source.
By: Logan Kuehl & Kyle Hartwig. Think of “To Catch a Predator”
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. Netcrime refers, more precisely, to criminal exploitation of.
Identity Fraud TODAY YOU WILL... TAKE STEPS TO PROTECT YOURSELF AGAINST FRAUD 1 (C)2012 National Endowment for Financial Education | Lesson 2-5 Identity.
Internet Safety Internet Safety LPM
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
Computer crimes.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
INTRODUCTION & QUESTIONS.
Computer Crime: Identity Theft, Misuse of Personal Information, and How to Protect Yourself (Tawny Walsh, Irina Lohina, Renair Jackson, Jahmele Betterson,
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
 Cyber crime encompasses any criminal act dealing with computers and networks (called hacking). Additionally, cyber crime also includes traditional crimes.
An Introduction to Computer Crimes.  Computer crime refers to any crime that involves a computer and a network. The computer may have been used in the.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Technology can help us: Communicate with others Gather information Share ideas Be entertained Technology has improved our quality of life!
 Did YOU Know?!?  Tennessee is bordered by 8 states: Alabama, Arkansas, Georgia, Kentucky, Mississippi, Missouri, North Carolina and Virginia - more.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Scott Hervoyavich December 6 th, 2011 CYBERCRIME.
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
A Project on CYBER SECURITY
Appropriate Use of Technology
Five Unethical Uses of Computers
Top Five Computer Related Crimes
Identity Theft Samuel H. Slater.
Presentation transcript:

Computer Crimes Justin A. Sarvey

Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics on computer crime Statistics on computer crime How to Protect Yourself How to Protect Yourself What can be done to stop computer crime What can be done to stop computer crime Conclusion Conclusion

Computer Crime Committed when a computer is the target of a crime, or the means to commit a crime Committed when a computer is the target of a crime, or the means to commit a crime Most of these crimes are not new except for the tools used Most of these crimes are not new except for the tools used Criminals use new methods, such as the Internet, to commit fraud, forgery, blackmail and embezzlement Criminals use new methods, such as the Internet, to commit fraud, forgery, blackmail and embezzlement

Computer Crime There are three major classifications of computer crime: There are three major classifications of computer crime: 1. Unauthorized use of a Computer 1. Unauthorized use of a Computer 2. Creating or releasing a malicious computer program 2. Creating or releasing a malicious computer program 3. Cyber stalking and harassment 3. Cyber stalking and harassment

Types of Computer Crime Fraud Fraud Piracy Piracy Harassment Harassment Cyber Terrorism Cyber Terrorism Child Pornography Child Pornography Identity Theft Identity Theft Theft of Company Secrets Theft of Company Secrets

Fraud Any dishonest misrepresentation of fact intended to induce another to do or refrain from doing something which causes loss Any dishonest misrepresentation of fact intended to induce another to do or refrain from doing something which causes loss Most notorious example of fraud is the unauthorized use of credit cards Most notorious example of fraud is the unauthorized use of credit cards

Piracy Deals with copying copyrighted material and either possessing or selling that material Deals with copying copyrighted material and either possessing or selling that material Examples Examples Burning DVD’s and then selling them Burning DVD’s and then selling them Downloading music off of the Internet Downloading music off of the Internet The Copyright and Related Rights Regulations of 2003 The Copyright and Related Rights Regulations of 2003 Designed to deal with protecting information online Designed to deal with protecting information online

Harassment Directs obscenities and derogatory comments at specific individuals focusing on gender, race, religion, nationality and sexual orientation Directs obscenities and derogatory comments at specific individuals focusing on gender, race, religion, nationality and sexual orientation Often occurs in chat rooms, newsgroups and sending hate s Often occurs in chat rooms, newsgroups and sending hate s People using the Internet to defame others People using the Internet to defame others New laws state: If a reasonable person in possession of the same information would think the course of conduct amounted to harassment of the other, the knowledge will be imputed to the defendant New laws state: If a reasonable person in possession of the same information would think the course of conduct amounted to harassment of the other, the knowledge will be imputed to the defendant

Cyber Terrorism Cyber Terrorism – an act of terrorism committed through the use or cyber space or computer resources Cyber Terrorism – an act of terrorism committed through the use or cyber space or computer resources Cyber terrorist – someone who intimidates or coerces a government or organization to advance his or her political or social objectives Cyber terrorist – someone who intimidates or coerces a government or organization to advance his or her political or social objectives Done by launching computer based attack against computers, network, and the information stored on them Done by launching computer based attack against computers, network, and the information stored on them Government officials have seen a significant increase in Internet probes and server scans since 2001 Government officials have seen a significant increase in Internet probes and server scans since 2001 Officials concerned that terrorists will take advantage of vulnerabilities in critical systems Officials concerned that terrorists will take advantage of vulnerabilities in critical systems

Cyber Terrorism National Infrastructure Protection Center National Infrastructure Protection Center Founded in February 1998 Founded in February 1998 Designed to combat cyber terrorism Designed to combat cyber terrorism Became part of Homeland Security after 2001 Became part of Homeland Security after 2001 Serves as focal point for threat assessment, warning, investigation, and response for threats or attacks against our countries critical infrastructure Serves as focal point for threat assessment, warning, investigation, and response for threats or attacks against our countries critical infrastructure Includes: banks, energy, telecommunications, water systems, government organizations, and emergency services Includes: banks, energy, telecommunications, water systems, government organizations, and emergency services If an attack was to occur on one of these systems it could be disastrous If an attack was to occur on one of these systems it could be disastrous

Child Pornography Visual depiction of minors engaged in a sex act as well as lascivious depictions of the genitals Visual depiction of minors engaged in a sex act as well as lascivious depictions of the genitals Prohibited under both federal and state laws Prohibited under both federal and state laws Texts which depicts sexual acts of minors are not considered child pornography Texts which depicts sexual acts of minors are not considered child pornography

Child Pornography & Child Predators Sting operations Sting operations District Attorney Offices District Attorney Offices Dateline NBC “To Catch a Predator” Dateline NBC “To Catch a Predator” Police, FBI and ICE Police, FBI and ICE Child pornography has become a key issue Child pornography has become a key issue Many police organizations are trying to help put a stop to it Many police organizations are trying to help put a stop to it

Child Pornography & Child Predators Problems: Problems: Many of the individuals caught by Dateline have not been prosecuted Many of the individuals caught by Dateline have not been prosecuted The people luring the offender were not legal law officers The people luring the offender were not legal law officers As a result in the new episodes the people luring the offenders are made honorary deputies As a result in the new episodes the people luring the offenders are made honorary deputies

Child Pornography & Child Predators It is argued that the police officers are entrapping the offenders. It is argued that the police officers are entrapping the offenders. The officer enticed the individual to talk to the minor The officer enticed the individual to talk to the minor The person isn’t really a minor The person isn’t really a minor How competent are the officers working on these cases? How competent are the officers working on these cases? Are the counts of pornography accurate? Are the counts of pornography accurate?

Theft of Company Secrets Big concern for companies Big concern for companies Easy access because it’s done by someone from the inside Easy access because it’s done by someone from the inside Easy to do with today’s technology Easy to do with today’s technology Thumb drive Thumb drive Palm pilot Palm pilot Personal Computers Personal Computers

Theft of Company Secrets What can be done to stop it? What can be done to stop it? Tough computer use policies Tough computer use policies Surprise inspections of the computer Surprise inspections of the computer Limit the number of employees that are allowed laptops Limit the number of employees that are allowed laptops Monitor the use of and network Monitor the use of and network

Identity Theft Occurs when someone wrongfully acquires or uses another person’s personal data, typically for their own financial gain Occurs when someone wrongfully acquires or uses another person’s personal data, typically for their own financial gain A growing concern for consumers in the United States A growing concern for consumers in the United States Costs Americans millions of dollars a year and takes hours of work to clear your credit Costs Americans millions of dollars a year and takes hours of work to clear your credit

Identity Theft Usually obtained by: Usually obtained by: Rummaging through the trash Rummaging through the trash Eavesdropping on public telecommunications Eavesdropping on public telecommunications Infiltration of organizations that store personal data Infiltration of organizations that store personal data Impersonating a trusted organization in an electronic communication Impersonating a trusted organization in an electronic communication Spam – responding to contests Spam – responding to contests

Examples of Identity Theft Social Security Number is stolen Social Security Number is stolen Credit card or bank card is stolen Credit card or bank card is stolen Account number is stolen Account number is stolen Address or phone number is stolen Address or phone number is stolen

Identity Theft Thieves can use your social security number to impersonate you Thieves can use your social security number to impersonate you Thieves can steal your bank card and/or credit card number to rack up charges on your account Thieves can steal your bank card and/or credit card number to rack up charges on your account Thieves can use your address and phone number to open up accounts in your name Thieves can use your address and phone number to open up accounts in your name

Ways to Protect Yourself From Identity Theft Never reveal personal information to a company over the phone Never reveal personal information to a company over the phone If someone does call and ask for information ask them to tell you when the last time was that you made a payment, the amount, and your mother’s maiden name If someone does call and ask for information ask them to tell you when the last time was that you made a payment, the amount, and your mother’s maiden name Don’t be fooled and respond to s stating you’ve won 1 million dollars Don’t be fooled and respond to s stating you’ve won 1 million dollars Install a firewall and privacy software Install a firewall and privacy software Shred all important documents Shred all important documents

Statistics In 2005 cost business 67.2 billion dollars In 2005 cost business 67.2 billion dollars In the past two years U.S. consumers lost more than 8 billion dollars to viruses, spyware, and online fraud schemes In the past two years U.S. consumers lost more than 8 billion dollars to viruses, spyware, and online fraud schemes In million Americans were affected by identity theft In million Americans were affected by identity theft 3 in 10 households experience some form of identity theft 3 in 10 households experience some form of identity theft 2/3 of individuals who experienced identity theft reported some sort of financial loss 2/3 of individuals who experienced identity theft reported some sort of financial loss Individuals in the age range are most likely to become a victim Individuals in the age range are most likely to become a victim

Statistics The child pornography industry generates over 20 billion dollars a year in revenue The child pornography industry generates over 20 billion dollars a year in revenue Since 1988 the number of Internet child pornography pictures grew by 1300 percent Since 1988 the number of Internet child pornography pictures grew by 1300 percent Over 3.5 million child pornography images have been identified by U.S. law enforcement Over 3.5 million child pornography images have been identified by U.S. law enforcement

Statistics on Cyber Stalking 443 cases for calendar year cases for calendar year cases for calendar year cases for calendar year cases for calendar year cases for calendar year percent of individuals knew their offender 50 percent of individuals knew their offender 48 percent of individuals did not know their offender 48 percent of individuals did not know their offender

Statistics on Cyber Stalking

Stopping Computer Crimes Create larger budgets for law enforcement Create larger budgets for law enforcement Train law enforcement agencies about computer crimes Train law enforcement agencies about computer crimes Hire more officers to work in the computer crime department Hire more officers to work in the computer crime department Train the general public about computer crimes and the risks associated with it Train the general public about computer crimes and the risks associated with it

Conclusion Computer Crime - Committed when a computer is the target of a crime, or the means to commit a crime Computer Crime - Committed when a computer is the target of a crime, or the means to commit a crime Types of Computer Crime Types of Computer Crime Fraud Fraud Piracy Piracy Harassment Harassment Cyber Terrorism Cyber Terrorism Child Pornography Child Pornography Identity Theft Identity Theft Problems with prosecuting child pornography Problems with prosecuting child pornography Individuals in the age range are the most susceptible to identity theft Individuals in the age range are the most susceptible to identity theft

Sources html html html html