Computer Crime By FUNG Wai-keung Hong Kong Police.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
ES 6 UNDERSTAND SALES, CONSUMER, PROPERTY, AND CYBER LAWS
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Oliver Twist by Charles Dickens Oliver is a burglar a thief a mugger a pickpocket.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
© 2004 West Legal Studies in Business A Division of Thomson Learning 1 Chapter 8 Criminal Law and Cyber Crimes Chapter 8 Criminal Law and Cyber Crimes.
NATIONAL CRIME AND SAFETY SURVEY: SUMMARY REPORT 2012.
Addressing Terrorist Use of the Internet, Cyber Crime and Other Threats: National Expert Workshop Forging a Comprehensive Approach to Cyber Security Richard.
Financial Institutions – Cyber Risk Managing Cyber Risks In An Interconnected World State Compensation Insurance Fund Audit Committee Meeting – February.
Information Warfare Theory of Information Warfare
Security, Privacy, and Ethics Online Computer Crimes.
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
CS 1308 Computer Literacy and the Internet. How do we look at Social Issues?  Financial  Moral  Ethical  Legal.
Combating cyber-crime: the context Justice Canada March 2005.
JOINT FINANCIAL INTELLIGENCE UNIT Stewart McGlynn Chief Inspector of Police Joint Financial Intelligence Unit AML Seminar to Lawyers - JFIU 3 March 2010.
Chapter 9: Criminal Law and Cyber Crimes
IDENTIFYING THREATS IN A GLOBAL MARKETPLACE Ira S. Somerson, BCFE, CPP Loss Management Consultants, Inc. Institute for Global Management Studies And Temple.
TOGOLESE CONSUMERS ASSOCIATION (ATC ) Fifth Annual African Consumer Protection Dialogue Conference (Zambie september 2013) “ Moving Cross Border.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #33 Information Warfare November 19, 2007.
SEMINAR ON CYBER CRIME PRESENTED BY: SUCHISMITA RATH 1 st sem, MCA Roll no: ITER,BBSR.
 An orderly analysis, investigation, inquiry, test, inspection, or examination along a “paper trail” in the search for fraud, embezzlement, or hidden.
Our Criminal Laws. A punishable offense against society Society (through police & prosecutors) attempts to identify, arrest, prosecute, and punish the.
CYBER CRIME.
Information Warfare Playgrounds to Battlegrounds.
Chapter 6 Criminal Law and Cyber Crimes. 2  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for.
Business Law with UCC Applications,13e Criminal Law and Cybercrimes Chapter 5 McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All.
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
© 2007 West Legal Studies in Business, A Division of Thomson Learning Chapter 6 Criminal Law and Cyber Crimes.
Information Anxiety By Meghan Randinelli. Introduction Greatest problem concerning ethical information technology (IT) is personal privacy Greatest problem.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
Chapter 19.1 Cyberlaw and Cybercrime BUSINESS LAW II.
© 2008 West Legal Studies in Business A Division of Thomson Learning 1 BUSINESS LAW TODAY Essentials 8 th Ed. Roger LeRoy Miller - Institute for University.
Chapter 5 Crimes. Offenses Against Society When a crime occurs, society, acting through such employees as police and prosecutors, attempts to identify,
Front Page Title Name Introduction Appropriate Images The Legal Issues -Personal Data -Freedom of Information -Computer Crimes Ethical Issues -
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Dr. Hilton CHAN Technology Crime Division Commercial Crime Bureau
Investigating Sophisticated Security Breaches Digital Forensics has proven tough in the age of sophisticated Intruders.
Information Warfare Playgrounds to Battlegrounds.
High-Tech Crime Countermeasures Ko IKAI High-Tech Crime Technology Division National Police Agency, JAPAN.
Information Security Legislation Moving ahead Information Security 2001 Professional Information Security Association Sin Chung Kai Legislative Councillor.
Extending the crime survey to include fraud and cyber Joseph Traynor.
WELCOME TO THE CYBER WORLD PRESENTATION ON CYBER CRIME Presented by Chandan kumar Regd no
CONTROLLING INFORMATION SYSTEMS
Workshop 4 Tutor: William Yeoh School of Computer and Information Science Secure and High Integrity System (INFT 3002)
© 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke Slide 1 Chapter Extension 24 Computer Crime and Forensics.
Chapter 5 Criminal Law.  What two elements must exist before a person can be convicted of a crime?  Can a corporation be liable for a crime?  What.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computers Are Your Future Eleventh Edition Chapter 9: Privacy, Crime, and Security Copyright © 2011 Pearson Education, Inc. Publishing as Prentice Hall1.
Issues for Computer Users, Electronic Devices, Computer and Safety.
© 2015 Cengage Learning Chapter 14 Today’s Challenges in Criminal Justice.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
Crimes By 丘丽香 519. Crimes  Britain Britain  China China   In both countries, crimes against property are the most frequently committed crimes.
© 2015 Cengage Learning Chapter 16 Today’s Challenges: Immigration, Cyber Crime, and White- Collar Crime Chapter 16 Today’s Challenges: Immigration, Cyber.
Financial Institutions – Cyber Risk
Chapter 7 Criminal Law and Cyber Crimes
Chapter 19.1 Cyberlaw and Cybercrime
高三年级 英语 Word study & reading, M10U4 授课者: 王时亮 湖南邵阳县第七中学
Chapter 8 Criminal Law and Cyber Crimes
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Understanding the Criminal Justice System
Ethical Use of Computers
Crime in the United States
Criminal Investigations
Presentation transcript:

Computer Crime By FUNG Wai-keung Hong Kong Police

Reliability of Computers Is Web banking reliable? Sample case Impact large enough to deter large corporations to migrate to e-banking\ Average bank robbery is $14,000 USD, whilst average Computer theft was more that $2M USD (Association of Certified Fraud Examiners) $ 2,000,000 Money

Profile of a cyber criminal crimes of concealment and deceit no violence required (A weakling ?) needs computer with a little skill college kids non organized no investment needed.

Traditional Enforcement Evidence used to be paper format, hard evidence - finger print, blood sample, witnesses

Present Evidence Electronic evidence inside a computer cyber-trail pursuance of crime across continents

Phenomenal with Cyber Crime Against the culture to report the crime (Rape ?) Company reputation Victims don’t know they were robbed until sometime late in time.

Implications for Law Enforcement Pacing with technology (broadband, WAP …) Collecting cyber Intelligence (Non traditional) It is anachronism to testify new technology with outdated Laws from the past, Acceptance of Electronic evidence

Serious Cyber Crimes Cyber-terrorism Information warfare Infrastructure Attack Electronic Battlefield

Cyber-Terrorism In Times of London reported several London financial institutions had paid over 400 M to fend off extortionist with logic bomb. Some of the proceeds went to Russia. No national border boundary

Information Warfare In two hackers downed a computers in a Air Force Base in Rome N.Y. for 18 days Sensitive Defense projects with sensitive files were stolen Use ROME computers to attack NASA’s Goddard Space Flight Center and other defence contractor’s computers

Information Warfare One was arrested in England All stolen data were still missing The victim estimated that their Defense systems were attacked about 250,000 times a year no secret as hackers attacked 130,000 U.S. government sites on 1.1 million hosts in 1997 (National institude of Standards and Technology)

Implications for Law Enforcement Gathering of evidence (Ethical problem - U.S. Electronic Communications Privacy Act), Transnational Time Constrain - legal issue

Implications for Law Enforcement Non standard interpretation of LAW (Gambling, terrorism - Traditional prerogatives of national sovereignty)

Common HK Cases Criminal Damage Obtaining Property by Deception Publishing Obscene Articles Cyberstalking Unauthorised Access to Computer

Case Study (March 1999)

Case Study (May 1999)

End