Computer Crime. Intro Computers and the Internet are tools. Crimes committed with computers are harder to detect. Computer vandalism can bring business.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Crimes Against Property. Arson  Willful and malicious burning of another person’s property.  It’s a crime to burn a building, even by the owner.
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
IS 376 Security in Cyberspace November 18,
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Slides prepared by Cyndi Chie and Sarah Frye Adapted for use in LSU course CSC-1200 “Ethics in Computing” A Gift of Fire Third edition Sara Baase Chapter.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
A Gift of Fire, 2edChapter 7: Computer Crime1 A Gift of Fire Computer Crime Introduction Hacking Online Scams Fraud, Embezzlement, Sabotage, Information.
A Gift of Fire Third edition Sara Baase
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Hacker Hunters Plug-In B6 p.341 Matt Spindler CIS 429.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Computer Crime The Internet has opened the door to new kinds of crime and new ways of carrying out traditional crimes. Computer crime is any act that violates.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Chapter 14 Crime and Justice in the New Millennium
Computer and Internet Crimes By: Tracey Ross & Tommy Brown.
Security, Privacy, and Ethics Online Computer Crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 Hossein BIDGOLI Phishing that bites Paying for Privacy Pirates.
A Gift of Fire, 2edChapter 7: Computer Crime1 Social, Legal, and Ethical Issues for Computers and the Internet By: Ramon Hernandez Eugene Flock Zhonghui.
Chapter 1 Introduction to Security
Crime CS4020.
Presentation By Timothy Mangas. Why should we worry? Crimes committed using the computer or Internet can be more costly (money wise) than other crimes.
MIS PERSONAL, LEGAL, ETHICAL, AND ORGANIZATIONAL ISSUES OF INFORMATION SYSTEMS CHAPTER 4 LO1 Describe information technologies that could be used in computer.
Criminal Investigation Internal Revenue Service Internal Revenue Service Criminal Investigation (Accountants with Guns) Andrew T. Hromoko, Jr. Special.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
General Awareness Training
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Chapter 10.  Two groups of crimes against property.  Crimes in which property is destroyed Arson, vandalism  Crimes in which property is taken against.
Computer crime University of Palestine University of Palestine Eng. Wisam Zaqoot Eng. Wisam Zaqoot March 2011 March 2011 ITSS 4201 Internet Insurance and.
CSE/ISE 312 Chapter 5: Computer Crime. Outline  Hacking  Identity Theft and Credit Card Fraud  Laws that Rule the Web.
Unethical use of Computers and Networks
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Computer Security Management: Assessment and Forensics Session 8.
By: Lukas Touder Cortney Warrick Jennifer Wehner Zachary Westpy Nicholas Whelan Cybercrime.
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 5: Crime.
Cybercrime What is it, what does it cost, & how is it regulated?
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Shaun McGorry Executive Briefing July 30, 2009 Identity Theft.
INTRODUCTION & QUESTIONS.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Cyberlaw. “The moving finger writes; and, having writ Moves on: nor all thy piety nor wit Shall lure it back to cancel half a line. Nor all thy tears.
Computer Crime Second Part of Chapter 7 A gift of Fire – Sara Baase.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
By: Chris Simpson, Julie Dunbar, and Thomas Taylor.
WHAT IS IDENTITY THEFT?  Identity thieves take your personal information and use it to harm you in various ways, including these:  User names, passwords,
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
PowerPoint® Slides to Accompany
Five Unethical Uses of Computers
PowerPoint® Slides to Accompany
Computer Crime and Security Measures
A Gift of Fire Third edition Sara Baase
A Gift of Fire Third edition Sara Baase
PowerPoint® Slides to Accompany
A Gift of Fire Third edition Sara Baase
Laws Against Computer Hacking
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

Computer Crime

Intro Computers and the Internet are tools. Crimes committed with computers are harder to detect. Computer vandalism can bring business operations to a halt. –2005 FBI Computer Crime Survey

2005 FBI Computer Crime Survey (Source: Survey of over 2,000 organizations across four U.S. states. 64 percent suffered a financial loss. National cost estimate. Average lost of $62.2 billion per year.

Hacking What is Hacking? Three phases of hacking: –Phase 1: (1960s and 1970s) When hacking was a positive term. –Phase 2: (1970s to the 1990s) When hacking took on its more negative meanings. –Phase 3: (mid-1990s) The Web Era.

Phase 1: The early years A hacker was a creative programmer who wrote clever code. The first operating system and games were written by hackers. The term hacking was a positive term.

Phase 2: Hacking takes on a more negative meaning The word “hacking” took on its most common meaning today. Early computer crimes were launched against business and government computers. Adult criminals began using computers to commit their crimes.

Phase 3: The Web Era The increased use of the internet for school, work, business transactions, and recreation made it attractive to criminals with basic computer skills. Examples of crimes ranging from pranks to serious disruptions. –Hackers modified or defaced Web pages. –Hackers obtain information that can threaten other people’s financial assets. –The Melissa virus. –The “ILOVEYOU” virus. –Denial-of-service attacks.

Hactivism Hactivism is the use of hacking to promote a political cause. Evaluating political hacking. Some people believe hactivism denies others their freedom of speech and violates property rights.

The Law Computer Fraud and Abuse Act (CFAA, 1986) It is a crime to access, alter, damage, or destroy information on a computer without authorization. Computers protected under this law include: –Government computers. –Financial systems. –Medical systems. –Interstate commerce. –Any computer on the internet.

The Law (cont’d) USA Patriot Act (USAPA, 2001) Amends the CFAA. Allows for recovery of losses due to responding to a hacker attack, assessing damages, and restoring systems. Increased penalties for hacking government computers. The government to monitor online activity without court order.

Catching the Hackers How are Hackers caught? Computer-forensics tools –Undercover agents. –Archives of online message boards. –Honey pots. Computer forensics agencies include: –Computer Emergency Response Team (CERT). –National Infrastructure Protection Center (NIPC). Penalties Appropriate to the Crime.

Security Security weaknesses can be found in the computer systems used by: –Businesses –Government –Personal computers Why is security weak? Improving Security. Criminalize Virus Writing and Hacker Tools?

Online Scams Auctions Selling and buying goods online has become popular. Problems: –Sellers don’t send goods. –Sellers send inferior goods. –Price is driving up by shill bidding. –Illegal goods sold Solutions: –Read seller “reviews”. –Use third party escrow. –Credit-card required.

EVIL! –Credit Card Fraud Losses estimated in the several billions of dollars per year. –Several types of credit card fraud Stolen by clerks or through the trash Northwest Airlines stole credit cards on there way to their owners Stolen over the web –Trade offs are made by credit card issuers between security and customer convenience

You’re Not You; I Am Identity Theft: Where a criminal assumes the identity of the victim and runs large credit-card charges or cashes bad checks, is becoming a bigger problem. Identities have become nothing but a series of numbers. Reversing identity theft is a tough job.

Identity Theft, A Crime? In 1998, Congress made it a federal crime to knowingly use another person’s identification with the intent to commit a felony. –Government bodies finally decided to help. ATM Fraud –A group of people created their own ATM to trick customers.

Defending Against Fraud There’s a leap-frogging of security techniques and techniques used by thieves. Several changes have been made for security. –ATMs have been redesigned. –Cash withdrawal limit. –Credit card activation.

Getting Back At Employers Embezzlement is the “fraudulent appropriation of property by a person to whom it has been entrusted.” “Trusted” employees steal from their employers. Mo’ technology, mo’ problems. Lack of violence doesn’t make embezzlement seem like a big crime.

Defending Against Employees Several ways to defend against large frauds. –Rotate responsibilities –Provide sign-ons and passwords. Economic Espionage –Attack of businesses by competitors

Swindling the Customer Blaise Pascal invented calculating machine in 1640s. –Not trusted by many people. Suspicious that it would be rigged to give incorrect results. Are you being taken advantage of right now?? Computers don’t steal – people do.

Digital Forgery Is that real?

The Problem Widely available technology allows crooks to make fakes with relative ease. –Checks –Currency –Passports Group of people made off with $750,000 from one counterfeit check.

Defenses Anti-fraud techniques such as watermarks have been employed in the past. U.S. government redesigned currency to make it harder for counterfeiters to forge. Responsibility is now on businesses whose checks are copied. More incentive for better security.

It’s Photoshopped It’s so easy for digital images to be modified nowadays, and therefore this raises more ethical and social issues, that may not be related to crime. Not a new issue; it has been around before all current technology existed.

Crime Fighting vs. Privacy ROUND 1 vs.

Scanning For Scams Fraud investigators at the Federal Trade Commission (FTC) and the Securities and Exchange Commission (SEC) surf the web looking for potentially illegal scams. In 2000, SEC announced they will use automated software to search chat rooms for suspicious activity.

Biometrics Biometrics are biological characteristics that are unique to each individual. –Finger prints –Voice patterns –Face and hand geometry –Retina scans –DNA Biometric applications provide convenience.

Search and Seizure of Computers Seizures of computers present new problems for law enforcement. –Hard drives may contain more than just the illegal date. Business records, other peoples’ files, etc. –Serious threat to freedom of speech and privacy –It’s not easy to seize “part of a computer.”

Cybercrime Treaty The U.S. and European governments participated in drafting the Council of Europe’s Treaty on Cybercrime. –Attempt to assist law-enforcement and foster international cooperation in fighting copyright violations, child pornography and other online crime. –This treaty generated much controversy and opposition from civil liberties organizations, ISPs and online businesses.

Discussion Should hackers who do not intend to do damage or harm be punished differently than those with criminal intentions? Court decisions have been made that allowed AOL and eBay to ban spam and information-collecting software from their sites. Should they have the right to ban government surveillance software too? Should the government need a search warrant, before running its automated surveillance software on a site? How far can someone modify an image before it becomes illegal? Is it ok if it’s just for artistic purposes?