Computer Crime CJ 520 / CJ 600 1.0 October 27, 2010
Computer Crime “Computer crime, cybercrime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime.” --Wikipedia
Why is it important to understand computer crime? Proliferation of technology Reliance on computers Infrastructure vulnerabilities
But is it really a crime? What’s the jurisdiction? What’s the statute? 2000 - I Love You virus
Some Computer Crimes Online threats Cyber-stalking Online child pornography Online gambling Money-laundering Malware Terrorism Counterfeiting Securities fraud Intellectual property theft Hate crimes Espionage Identity theft Exploitation
A few facts Anyone with a computer can pose a threat An estimated 73% of computer crime committed by “insiders’ Computer crime tends to be unreported / under reported
Categories of Computer Crimes How computers can be used in the commission of crimes
Computer as a Target DDOS, data corruption, network intrusion, vandalism Information / Access is a target Data corruption Prevent access of data
Computer as an Instrument Credit card fraud, salami attack, harassment Assists commission of crime Processes of computer, not information
Computer is Incidental Money laundering, loan sharking Not essential for crime Ease in committing crime
Crimes involving prevalence of computers Intellectual property theft, identity theft, equipment theft New versions of old crimes
Some Terminology Mens Rea Actus Reus Prohibative Malfeasance by computer MD5 Hash
Digital Evidence Digital evidence or electronic evidence is any probative information stored or transmitted in digital form that a party to a court case may use at trial. --Wikipedia
Digital Evidence Facts Can be immense Can be encrypted, disguised, or hidden Is intangible without assistance
Digital Evidence can be: Stored Instrument Target Contraband
Where can digital evidence be found? We must be able to handle and to accurately describe digital evidence
Resources Digital Crime & Digital Terrorism - Chapter One Computer Crime Categories: How Techno-criminals Operate - http://nsi.org/Library/Compsec/crimecom.html