Social Implications of a Computerized Society Lecture 4 Computer Crime Instructor: Oliver Schulte Simon Fraser University.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

How to protect yourself, your computer, and others on the internet
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
SECURITY CHECK Protecting Your System and Yourself Source:
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Slides prepared by Cyndi Chie and Sarah Frye Adapted for use in LSU course CSC-1200 “Ethics in Computing” A Gift of Fire Third edition Sara Baase Chapter.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
A Gift of Fire Third edition Sara Baase
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Computer Ethics Ms. Scales. Computer Ethics Ethics  the right thing to do Acceptable Use Policy  A set of rules and guidelines that are set up to regulate.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Bsharah Presentation Threats to Information Security Protecting Your Personal Information from Phishing Scams.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Slides prepared by Cyndi Chie and Sarah Frye A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Malicious Attacks By Chris Berg-Jones, Ethan Ungchusri, and Angela Wang.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Threats To A Computer Network
Crime CS4020.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
Scams and Schemes. Today’s Objective I can understand what identity theft is and why it is important to guard against it, I can recognize strategies that.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
BTT12OI.  Do you know someone who has been scammed? What happened?  Been tricked into sending someone else money (not who they thought they were) 
DIGITAL CITIZENSHIP 6 TH – 8 TH UNIT 1 LESSON 3 SCAMS & SCHEMES What is identity theft, and how can you protect yourself from it?
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Beware! Consumer Fraud Module 9.1.
Chapter 11 Security and Privacy: Computers and the Internet.
Protecting People and Information: Threats and Safeguards
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
BUSINESS B1 Information Security.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Reliability & Desirability of Data
IT security By Tilly Gerlack.
Computing Essentials 2014 Privacy, Security and Ethics © 2014 by McGraw-Hill Education. This proprietary material solely for authorized instructor use.
Computer Security. 2 Computer Crime and Cybercrime Computer crimes occur when intruders gain unauthorized access to computer systems Cybercrime is crime.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
BTT12OI.  Do you know someone who has been scammed online? What happened?  Been tricked into sending someone else money (not who they thought they were)
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
Copyright ©2005 CNET Networks, Inc. All rights reserved. Practice safety Learn how to protect yourself against common attacks.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Cybercrime What is it, what does it cost, & how is it regulated?
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Any criminal action perpetrated primarily through the use of a computer.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Presented By: Jennifer Thayer, SPHR, SHRM-SCP.  Identify CyberCrime and Types  Identify Steps to Take to Prevent Identity Theft  Learn Tips and Tricks.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Computer Security Keeping you and your computer safe in the digital world.
Yes, it’s the holidays... A time of joy, a time of good cheer, a time of celebration... From the Office of the Chief Human Capital Officer (CHCO ) Privacy.
Technical Implementation: Security Risks
Add video notes to lecture
Computer Security INSM 180- Belasco Bryant and Stratton Fall 2011
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
HOW DO I KEEP MY COMPUTER SAFE?
A Gift of Fire Third edition Sara Baase
Computer Security.
Social Implications of a Computerized Society Computer Crime Chapter 5
Presentation transcript:

Social Implications of a Computerized Society Lecture 4 Computer Crime Instructor: Oliver Schulte Simon Fraser University

What We Will Cover Hacking Identity Theft Crime Fighting Versus Privacy and Civil Liberties Laws That Rule the Web Security technologies

Themes in Computer Crime We’re going to review some general themes from this course as they apply to computer crime issues. –Anonymity –Security/Surveillance/Interception – Responsibility of Web Technology Providers

Anonymity and Cybercrime Some ways in which anonymity facilitates cybercrime compared to the “real” world. –Anonymity requires identification for legitimate purchases  Identity theft makes it easy to impersonate someone. –Anonymity makes it easier to get away with fraud and deception. E-bay scams. Phishing Click Fraud. –Anonymity facilitates hacking as trespassing (use other people’s computer, username).

Security/Surveillance/Int erception Much personal information is stored or transmitted on the web insecurely. “Big Hacker is watching you”. Also an issue for privacy.

Hacking as programming Hacking – currently defined as gaining illegal or unauthorized access to a file, computer, or network The term has changed over time Phase 1: early 1960s to 1970s –It was a positive term –A "hacker" was a creative programmer who wrote elegant or clever code –A "hack" was an especially clever piece of code

Hacker-programmer: Examples Reprogram the Wii to play music. Break copy protection, fast-forward protection. Reprogram Iphone to work with networks other than the “official” provider.

Hacking and entering Phase 2: 1970s to mid 1990s –Hacking took on negative connotations –Breaking into computers for which the hacker does not have authorized access –Still primarily individuals –Includes the spreading of computer worms and viruses and ‘phone phreaking’ –Companies began using hackers to analyze and improve security (“white-hat” hackers).

Hacking and entering: examples Phone phreaking: “Legion of Doom” broke into BellSouth computers. Pranks, reroute FBI numbers to phone sex lines, free long-distance calls. German hacker breaks into Pentagon computers. Ontario hackers send fake s from Ontario premier’s office.

Discussion Question Is hacking into a computer system always morally wrong? If so, why? If not, when is it wrong and when isn’t it?

Is Hacking Trespass? Rights-based argument: Can you compare hacking to walking into someone else’s home? - Physical intrusion. Or is it more like looking through a window? - gathers information, no intrusion. Maybe no old category fits---on the web observation does not require physical presence. The lack of physical presence of an observer/intruder also seems relevant to privacy/surveillance issues--- cybersurveillance doesn’t “feel” so intrusive. Utilitarian argument: monitoring and checking causes a lot of damage. E.g., Boeing had to spend a lot of money to check that no files were changed.

Hacking and the Web Phase 3: beginning with the mid 1990s –The growth of the Web changed hacking; viruses and worms could be spread rapidly –Political hacking (Hacktivism) surfaced –Denial-of-service (DoS) attacks used to shut down Web sites –Large scale theft of personal and financial information.

Internet hacking: examples The Internet Worm 1988, Robert Morris from Cornell. A worm is a program that copies itself to other computers. A virus is a malicious program hidden inside a file, program or document (e.g. Word macro). Mellisa virus (1999): mail copies of itself to 50 addresses in address book. Infected 1 mill computers. Love bug (2000): also mailing itself. Infected 80% of U.S. agencies, millions of computers, $10 billion in damages.

Internet hacking: more examples Denial of Service attack (DoS). Overload target site with 10 5 requests for web pages. 15-year old Canadian aka “mafiaboy” shut down Yahoo, eBay, Amazon etc, $1.7 billion damage. Estonian government was attacked.

Identity Theft, Spam: Phase 4 E-commerce has experienced huge growth, estimated around $200 Billion in the U.S.  many people send passwords, credit cards on-line.  Opportunities for fraud and impersonation: e-bay, Nigerian account scheme. Emergence of organized cybercrime rings: targets e- business by stealing IDs, often international. Phishing, farming, botnets, sniffers. FTC estimates 8.3 million victims of identity theft, $15.6 billion losses.

Cybercrime: examples –Phishing - fishing for personal and financial information disguised as legitimate business e- mail. Recent SFU attackRecent SFU attack –Pharming - false Web sites that fish for personal and financial information by planting false URLs in Domain Name Servers. –Zombie viruses, botnets: normal computers remotely controlled by distributor. Typically 200,000 infected machines or more. Botnet ArticleBotnet Article

The TJX case Largest ID theft case in U.S. History: 40 million card numbers stolen from Card numbers appear to have been sold to other criminals. 11 people charged, one pleaded guilty.

Discussion Question The Federal Trade Commission (U.S.) has imposed sanctions on TJX. They say that “companies that collect sensitive consumer information have a responsibility to keep it secure”. Do you agree with that? How much responsibility do users/customers have? For example, using firewalls, encryption, coded credit cards, provide ID with credit card?

Security Technologies Big business: security sales $1.2 bn in Firewalls monitor network traffic. Web browsers check websites for proper authorization. Biometrics may be a new way to identify yourself. Public-key encryption: important theoretical tool. New authentication methods? preference-based identificationpreference-based identification Fundamental trade-off: security versus convenience.

Encryption and Biometrics Public-key encryption: Encryptor makes two keys, one secret, one public. With public key, anyone can encrypt, but only encryptor can decrypt. Biometrics: fingerprint, face, Iris, Voice. Included in Toshiba Portege M800 laptop. Desired false positive/false negative rate: < 0.1%. Currently no single technology gets this, maybe we need to use combinations.

Auction Fraud FTC reports that online auction sites are one of the top sources of fraud complaints –Some sellers do not send items or send inferior products –Shill bidding is used to artificially raise prices –Sellers give themselves or friends glowing reviews to garner consumer trust Auction sites use various techniques to counter dishonest sellers.

Discussion Question Fraud on e-bay has steadily increased. Does an auction site like e-bay have an obligation to protect customers from fraud any more than a search engine has an obligation to prevent illegal downloading of copyrighted material? What about monitoring the sale of illegal goods, like brand name fakes? e-bay casee-bay case What about the obligation of Youtube to remove copyrighted material?

Responsibility of Web Providers E-bay at first: “we are like a newspaper publishing classified ads” (common carrier). No responsibility for what people do with our technology. Now: fraud departments, risk warnings, reputation scores and other systems for combatting fraud. Some responsibility for avoiding fraud. Is this an ethical obligation or just business sense? Ethical argument: E-bay is in a better position to check identities and trust-worthiness than regular customers.

Scams and Forgery Click fraud - repeated clicking on an ad to either increase a site’s revenue or to use up a competitor's advertising budget Stock fraud - most common method is to buy a stock low, send out s urging others to buy, and then sell when the price goes up, usually only for a short time Digital Forgery - new technologies (scanners and high quality printers) are used to create fake checks, passports, visas, birth certificates, etc., with little skill and investment. Canadian Case: 400 SIN numbers stolen by government employee, $7m fraud. sin casesin case

Whose Laws Rule the Web When Digital Actions Cross Borders: Laws vary from country to country. –E.g., German court said E-bay has to prevent sale of fake Rolexes. U.S. court said they don’t have to for fake Tiffany jewellery. Corporations that do business in multiple countries must comply with the laws of all the countries involved. Someone whose actions are legal in their own country may face prosecution in another country where their actions are illegal.

Whose Laws Rule the Web (Cont.) Arresting Foreign Visitors: A Russian citizen was arrested for violating the DMCA when he visited the U.S. to present a paper at a conference; his software was not illegal in Russia An executive of a British online gambling site was arrested as he transferred planes in Dallas (online sports betting is not illegal in Britain)

Whose Laws Rule the Web Discussion Questions What suggestions do you have for resolving the issues created by differences in laws between different countries? What do you think would work, and what do you think would not?