IS 376 Security in Cyberspace November 18, 2014 1.

Slides:



Advertisements
Similar presentations
Prepared for: Presented by: Risky Business 2012 Conference Tony La Rosa, Manager Mid-Iowa Credit Counseling Park Fair Mall 100 E. Euclid Ave., Ste. 157.
Advertisements

D ETER D ETECT D EFEND CiTiZEN. When Someone Uses Your Personally Identifying Information, Like Your Name, Social Security Number, Or Credit Card Number,
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
Identity Theft.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 14 Crime and Justice in the New Millennium
FORENSIC ACCOUNTING - BA Slide 12-1 Today’s Topics n Organizational Fraud n Consumer Fraud.
Holley Myers CSCI101 Lab Lecture Thursday 2:00 10/25/07.
Computer Crime. Intro Computers and the Internet are tools. Crimes committed with computers are harder to detect. Computer vandalism can bring business.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
October 27,  According to the Federal Trade Commission, identity theft is the fastest growing white collar crime in the United States  Increasing.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Scholarship Scams Avoiding Scholarship Scams, Phishing & Identity Theft at All Cost.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Military Sentinel Presentation November 19, 2008 John Krebs, Attorney Consumer Sentinel Network Program Manager Federal Trade Commission.
Identity Theft  IDENTITY THEFT occurs when someone wrongfully acquires and uses a consumer’s personal identification, credit, or account information.
What is Identity Theft? How is it accomplished? How might it impact the victim? What can I do to protect myself? What is phishing? By Ellen Justice.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Identity Theft.
Identity Theft Ashley Gowin Sabrina Prophet. What is Identity Theft? Identity theft is when someone uses your personal information such as your name,
Identity Theft Project Erin L. Caraway Jacob Locke.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CRIMES Used by permission. For Educational purposes only.
Cybercrime What is it, what does it cost, & how is it regulated?
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Identity Theft One of America's fastest growing crimes.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
Carroll County Advisement Program FINANCIAL LITERACY *IDENTITY THEFT *MONEY MANAGEMENT.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
IRS, CRIMINAL INVESTIGATION AND IDENTITY THEFT/DATA BREACHES
The Wolf in Sheep’s Clothing: Identity Theft Professional Development Institute Truman State University.
WHAT YOU NEED TO KNOW Chevron Federal Credit Union Great Rates. Personal Service. chevronfcu.org  
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Protecting Your Assets By Preventing Identity Theft
Done by… Hanoof Al-Khaldi Information Assurance
PowerPoint® Slides to Accompany
When you get caught for Identity Theft
Partnering to Minimize the Impact of Data Compromises
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
Protecting Yourself from Fraud including Identity Theft
Protecting Yourself from Fraud including Identity Theft
Protecting Your Credit Identity
Protecting Yourself from Fraud including Identity Theft
Identity Theft and Credit Safety
Presentation transcript:

IS 376 Security in Cyberspace November 18,

New Century, New Risks?  Development in information technologies has fundamentally changed the global environment for individual & state security:  its perception,  maintenance and the  nature of its threat.  Ontological insecurity : a profound emotional uneasiness about one’s safety and security, or even one’s existence. A term coined by R.D. Laing.  A new feeling of fear and impending catastrophe (this is amplified by echo chambers).  Security has become a central political, societal and economic issue.  There is a dialectical tension between the need for safety vs. the need for freedom : How to balance between the two?  See ACLU’s concerns See ACLU’s concerns 2

Active Fed Oversight  Federal Trade Commission  OnGuardOnline.gov provides practical tips from the federal government and the technology industry to help you be on guard against Internet fraud, secure your computer, and protect your personal information. OnGuardOnline.gov  Bureau of Consumer Protection Bureau of Consumer Protection  Office of Consumer and Business Education Office of Consumer and Business Education  Homeland Security Homeland Security  Department of Commerce Department of Commerce  Office of Justice Programs Office of Justice Programs  Securities and Exchange Commission Securities and Exchange Commission  United States Postal Inspection Service United States Postal Inspection Service 3

Tracking Computer Crimes  Tracking computer crimes requires law enforcement to recognize and respond to myriad attacks.  Computer forensics tools may include:  Undercover agents,  Honey pots (sting operations in cyberspace),  Archives of online message boards,  Tools for recovering deleted or coded information.  Computer forensics agencies and services include:  Computer Emergency Response Team (CERT),  National Infrastructure Protection Center (NIPC),  Private companies specializing in recovering deleted files and , tracking hackers via Web site and telephone logs, etc. (e.g., ESS Data Recovery in Edwardsville)ESS Data Recovery 4

Scams Alert  “Computers don’t steal - people do”  scams could include:  Phishing  Work-at-Home Scams  Weight Loss Claims  Foreign Lotteries  Cure-All Products  Check Overpayment Scams  Pay-in-Advance Credit Offers  Debt Relief  Investment Schemes 5

Scams Alert  Computers and online infrastructure are perfect venues to commit all sorts of crimes:  Shill bidding  Bidding on one’s or accomplice’s items to drive price up.  Get rich schemes, such as:  Pyramids 6

Fraud and Abuse  Small computer fraud could include:  Credit card and Identity theft  E.g. numbers stolen by store clerks or information collected from trashed documents.  In the last decade in South Africa, the cashier brings the Credit Card terminal to your table.  In the USA products such as these: SquareUpSquareUp  ATM theft  e.g., ATM surveillance by criminals, cloning cards and altering magnetic strips.  Cell Phones cloning  Altering the billing information emitted by a phone 7

Computer Fraud and Abuse Act (CFAA, 1986)  It is a crime to access, alter, damage, or destroy information on a computer without authorization.  Criminalizes computer access to info that could be used to injure the U.S.  Criminalizes illegal access to financial or credit records  Criminalizes unauthorized access to federal government computers  Penalties: Up to 5 years for a first offense; up to 10 years for a second offense  Computers protected under this law include:  Government computers,  Financial systems,  Medical systems,  Interstate commerce, and  any computer on the Internet. 8

USA Patriot Act (2001)  Amended the CFAA.  Doubles the maximum penalties of the CFAA  Considers aggregate, not just individual damages  Includes state law violations as priors  Includes investigation time in damages assessed  Specifically  Allows for recovery of losses due to responding to a hacker attack, assessing damages, and restoring systems.  Higher penalties can be levied against anyone hacking into computers belonging to criminal justice system or the military.  The government can monitor online activity without a court order. 9

International Fraud Networks  Sale of counterfeit commodities  A lot of international trade is done this way  Off-shoring  Hiding money in secure accounts in Offshore Financial Centers (OFCs)  Interpol polices money laundering activities.  Money laundering is not only related to drug monies, but to funds that are obtained from fraudulent investment victims and then laundered through other accounts to hide the funds from investigation attempts.  Interpol's definition of money laundering is “Any act or attempted act to conceal or disguise the identity of illegally obtained proceeds so that they appear to have originated from legitimate sources.” 10

International Cooperation  Computer crimes are committed across borders and result in international cooperation between governments and multilateral organizations. For example: Silk Road just got shut down or Operation OnymousSilk Road just got shut downOperation Onymous  Governments operate through several agencies such as:  Interpol (International Crime Police Organization)International Crime Police Organization  UN organizations and World Bank (Directorate of International Payment and Transfers)  Direct government-to-government interventions 11

International Denial of Service  The biggest Denial of Service happened in March 2013, sending 300 billion bits per second by a network of computers.Denial of Service  Arrests made in Spain.made in Spain  Arrests made in US.made in US. 12

 IRS Whistleblower awarded $104 million IRS Whistleblower awarded $104 million 13 IRS Whistleblower Bradley C. Birkenfeld, a former banker at UBS, recently served two and a half years in prison for conspiring with a wealthy California developer to evade United States income taxes.UBS Historical informationHistorical information (False Claims Act was enacted on March 2, 1863, at President Lincoln’s request.)