Copyright 2005 - 2009: Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Sixteen Police Technology Hi-Tech Crime.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
Introduction and Overview of Digital Crime and Digital Terrorism
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Breaking Trust On The Internet
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Prepared by: Nahed Al-Salah
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Forensics BACS 371
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
CYBER CRIME AND SECURITY TRENDS
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
Internet Safety CSA September 21, Internet Threats Malware (viruses) Spyware Spam Hackers Cyber-criminals.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
Cyber Crime & Security Raghunath M D BSNL Mobile Services,
Chapter 18-Internet Law www World Wide Web-Wild,Wild West? New Global Community has caused many ethical dilemmas Unequal Access increasing wealth gap.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
Cyber crime & Security Prepared by : Rughani Zarana.
Mrs. Jefferson Business Information Management I.
C HAPTER 5 General Computer Topics. 5.1 Computer Crimes Computer crime refers to any crime that involves a computer and a network. Net crime refers to.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CYBER CRIME.
ED 505 Educational Technology By James Moore.  What is the definition of Netiquette and how does it apply to social media sites? ◦ Netiquette is the.
Crime & Malpractice AS Module Heathcote Ch. 10.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
The way to avoid being trap into cyber crime. What is cyber crime? The Department of Justice categorizes computer crime in three ways: 1. The computer.
Chapter 16 Computer Crime. Three Key Characteristics of Computer Crime Computer Crimes are relatively easy to commit and difficult to detect. Most computer.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Crime committed using a computer and the internet to steal a person’s identity or illegal imports or malicious programs cybercrime is nothing but where.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Cybercrime What is it, what does it cost, & how is it regulated?
Computer Skills and Applications Computer Security.
Pacific Northwest Digital Government Summit Security – How Much is Enough? June 20, 2006 SA Kenneth A. Schmutz.
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
Computer crimes.
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
W elcome to our Presentation. Presentation Topic Virus.
Computer Systems Networking. What is a Network A network can be described as a number of computers that are interconnected, allowing the sharing of data.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Technical Implementation: Security Risks
IT Security  .
A Project on CYBER SECURITY
Crimes against Property
Chapter 11 crime and security in the networked economy
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
COMPUTER CRIME.
Internet Safety Vocabulary
Top Five Computer Related Crimes
Presentation transcript:

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Sixteen Police Technology Hi-Tech Crime

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Learning Objectives The difference between computer crime, computer related crime and technology crime. The difference between computer crime, computer related crime and technology crime.computer crimecomputer crime Why Hi-Tech crime may be under-reported. Why Hi-Tech crime may be under-reported. How the Internet changed traditional crime. How the Internet changed traditional crime. Explore system attack, theft of services and software piracy. Explore system attack, theft of services and software piracy. Explore the Independent Component Doctrine. Explore the Independent Component Doctrine.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Hi Tech Crime Technology has changed the nature of crime – to prevent, deter and arrest you must understand the nature of the crime. Was the computer the target? Was the technology inside the computer the target? Did the computer facilitate the crime? Or, has the technology morphed the nature of a traditional crime?

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Crime Computer Crime The computer is the object of the attack; however, the attack is not physical, it is virtual – The computer is the object of the attack; however, the attack is not physical, it is virtual – Virus Virus Hacking Hacking Theft of services Theft of services

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Related Crime These types of crimes occur when the offender uses a computer to: These types of crimes occur when the offender uses a computer to: Commit a traditional crime Commit a traditional crime The computer is used to commit the crime. The computer is used to commit the crime. Stores evidence of a crime Stores evidence of a crime The computer is used to facilitate the crime. The computer is used to facilitate the crime. Software Piracy Software Piracy

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Technology Crime A crime directed at a technology, other than a computer A crime directed at a technology, other than a computer Theft of services – cellular telephones, cable television Theft of services – cellular telephones, cable television Theft of computer components Theft of computer components

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Hi Tech Crime ClassificationUnique FeatureTypes of crime ComputerComputer system or capability is the object of the crime. Viruses, theft of system capabilities Computer Related Computer facilitates crime or keeps records of crime. Some are traditional crimes, others are crime created as a result of computer age. Traditional: Child pornography, Narcotics Trafficking Non-Traditional: Software Piracy, Internet Fraud. Technology Crime Technology is stolen, or other technology services are stolen Computer Hardware theft, theft of cellular telephone service, theft of cable television services

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Crime Viruses A malicious software program which attempts to replicate itself and spread. A malicious software program which attempts to replicate itself and spread. Most commonly spread by attachment, file download or infected disc Most commonly spread by attachment, file download or infected disc Attaches to executable program Attaches to executable program Sometimes to use host computer to infect others via list. Sometimes to use host computer to infect others via list. Causes disruption, including complete failure Causes disruption, including complete failure

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Crime Viruses Viruses can spread rapidly, in some instances a computer virus can circumnavigate the globe in under an hour – infecting millions of computers Screen Capture – Panda Software

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Crime Hacking, Cracking and Whacking Hacking refers to the non-malicious virtual entry into a software program. Hacking refers to the non-malicious virtual entry into a software program. May still be illegal May still be illegal A non-illegal aspect might be purchasing a computer game and hacking it to ease your play A non-illegal aspect might be purchasing a computer game and hacking it to ease your play Cracking refers to the illegal and often malicious virtual entry into a software program, system or network. Cracking refers to the illegal and often malicious virtual entry into a software program, system or network.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Crime Hacking, Cracking and Whacking Whacking is the illegal and often malicious virtual entry into a software program, system or network via wireless connection.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Crime Virtual Street Names Coders – Semi-professional software engineers who write code and experiment in virtual zoos. Their codes are sometimes used by the cyber-punks. Coders – Semi-professional software engineers who write code and experiment in virtual zoos. Their codes are sometimes used by the cyber-punks. Cyber-punks – anti-social, angry; they write and use code for malicious purposes. Cyber-punks – anti-social, angry; they write and use code for malicious purposes. Old Guard Hackers – Generally, no malicious intent. However, their software is often used by cyber-punks. Old Guard Hackers – Generally, no malicious intent. However, their software is often used by cyber-punks.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Crime Virtual Street Names Cyber-terrorists – Professional criminals who sell their computer skills. Often used in corporate espionage. Cyber-terrorists – Professional criminals who sell their computer skills. Often used in corporate espionage. Old-School Hackers – Belief that Internet is open source. No criminal intent. Old-School Hackers – Belief that Internet is open source. No criminal intent. Script kiddies – juvenile cyber-punks. Script kiddies – juvenile cyber-punks. Phreaker – uses technology to steal telephone system capabilities Phreaker – uses technology to steal telephone system capabilities

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Related Crime The Internet affords a wider net of victims. The Internet affords a wider net of victims. The Internet affords greater anonymity The Internet affords greater anonymity The Internet can connect offenders together The Internet can connect offenders together The Internet makes jurisdiction issues difficult. The Internet makes jurisdiction issues difficult. The Internet is new to law enforcement. The Internet is new to law enforcement.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Related Crime Crimes Against Children Use of Internet Relay Chat (IRC) to contact children. Use of Internet Relay Chat (IRC) to contact children. Arrange meetings. Arrange meetings. Engage in sexual talk, exchange of images. Engage in sexual talk, exchange of images. Use of the Internet to exchange ideas on committing crimes against children. Use of the Internet to exchange ideas on committing crimes against children. Use of the Internet to exchange images of children. Use of the Internet to exchange images of children.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Related Crime New Information Steganography – from the greek “steganos” meaning hidden and “graphy” meaning writing. Steganography – from the greek “steganos” meaning hidden and “graphy” meaning writing. The process of hiding messages or images inside of the coding of images. The process of hiding messages or images inside of the coding of images. It is considered the newest challenge to law enforcement’s prosecution of pedophiles. It is considered the newest challenge to law enforcement’s prosecution of pedophiles. It may have been used by international terrorist to transmit messages to remote cells. It may have been used by international terrorist to transmit messages to remote cells.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Related Crime Fraud The “box of rocks” becomes auction fraud. The “box of rocks” becomes auction fraud. On the street – offender uses a sealed package to entice victim. On the Internet – photographs and descriptions are used. On the street – offender uses a sealed package to entice victim. On the Internet – photographs and descriptions are used. The Pigeon Drop becomes the Nigerian 419 scam. The Pigeon Drop becomes the Nigerian 419 scam. On the street found money entices the victim. On the Internet – is used to describe inheritances, overages, etc. On the street found money entices the victim. On the Internet – is used to describe inheritances, overages, etc.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Related Crime Fraud In most fraud were the victim is an active participant the street and the Internet share a common theme – The victim’s thought they were getting something for nothing!

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Related Crime Software Piracy A very broad category that involves the theft of any intellectual property using computer, primarily the internet. A very broad category that involves the theft of any intellectual property using computer, primarily the internet. Illegal music downloads. Illegal music downloads. Copy Right infringement Copy Right infringement Trademark infringement Trademark infringement Illegal downloads of music. Illegal downloads of music. Copying any work, including software, music, written work and providing it to a third person. Copying any work, including software, music, written work and providing it to a third person.

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Related Crime Fraud Credit card fraud and theft used to “Phish.” An looks like it comes from a legitimate source. Asks for personal information which is then to steal the victim’s identity or using the victim’s credit. Personal information is hacked from a legitimate source

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Computer Related Crime Fraud Pump and Dump s and websites used to drive up or down the price of an equity. The offender then sells/buys accordingly Touting Employee of legitimate publication publishes false or exaggerated news

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Technology Crime Theft of components. Theft of components. Shoplifting Shoplifting Burglary Burglary Hijacking Hijacking Theft of cellular telephone services. Theft of cellular telephone services. Theft of telephone service Theft of telephone service Theft of cable television Theft of cable television

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Legal Aspects of Computer Crime Computer CrimeComputer Crime Approximately half of the states modeled their computer crime related statutes after the 1977 and 1979 versions of the Federal Computer Systems Protection Act. computer crime

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Independent Component Doctrine The Search and Seizure of computer equipment is protected by the Fourth Amendment. The Search and Seizure of computer equipment is protected by the Fourth Amendment. Generally, a desk top computer consists of a computer, monitor, printer and other peripheral devices. Generally, a desk top computer consists of a computer, monitor, printer and other peripheral devices. Investigators should consider listing each component separately on the search warrant Investigators should consider listing each component separately on the search warrant

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Jurisdiction One of the most difficult issues. Greatly benefits the offender. Offender can live in one state (or country) and victim in another. Different laws. Poor interagency cooperation

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Under-Reported Federal Bureau of Investigation recently updated the Uniform Crime Reporting to include certain technology related crimes. Federal Bureau of Investigation recently updated the Uniform Crime Reporting to include certain technology related crimes. Victims don’t know they are victims Victims don’t know they are victims Companies stand to loose customer confidence if breach is reported. Companies stand to loose customer confidence if breach is reported. Law enforcement is often weak in its response Law enforcement is often weak in its response

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Task Forces Combine investigative and computer expertise. Combine investigative and computer expertise. Share costs. Share costs. Help solve jurisdictional problems. Help solve jurisdictional problems. Help the exchange of information and trend identification Help the exchange of information and trend identification

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Protection - Theft The recording of serial numbers and periodic audits can detect theft. Some companies have installed software that if a laptop is stolen, it will report its location when it connects to the Internet Screen capture provided by Absolute Software Corp

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Protection Software and hardware is being used to detect intrusions in real-time. Software and hardware is being used to detect intrusions in real-time. Software and hardware is used to prevent SPAM and attachments that might contain viruses. Software and hardware is used to prevent SPAM and attachments that might contain viruses. Education programs reduce hapless victimization Education programs reduce hapless victimization

Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Explore Police Books written by Police BooksPolice Books law enforcement officials at law enforcement officials atwww.police-writers.com