The Effect of Fictional Media on Future Cybercrime. Presented by Jessica Eastell and Peter Lowery 15/05/2015Jessica Eastell and Peter Lowery2.

Slides:



Advertisements
Similar presentations
h Protection from cyber attacks is achieved by acting on several levels: first, at the physical and material, placing the server in a place as safe as.
Advertisements

MASS MEDIA Grupo Donos. NEWSPAPERS In Britain, most newspapers are daily (they come out / are published everyday); a few only come out on Sundays. Magazines.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Fifteen Police Technology Tracking and Surveillance.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Jim Turner, The Open University Exploring the CSI Effect: What do potential jurors think they know about forensic evidence? ICCCR ‘Constructions of Evidence’
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
McGraw-Hill/Irwin Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. Extended Learning Module H Computer Crime and Digital Forensics.
Mod H-1 Examples of Computer Crimes. Mod H-2 Stuxnet.
HACKING MEDICAL DEVICES BY JENNIFER GROSS. GROWTH OF MEDICAL TECHNOLOGIES Medical technologies and computer science continue to mesh Pacemakers Insulin.
Intrusion Detection Systems and Practices
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Security Awareness: Applying Practical Security in Your World
A Virtual Environment for Investigating Counter Measures for MITM Attacks on Home Area Networks Lionel Morgan 1, Sindhuri Juturu 2, Justin Talavera 3,
DIYTP What is Cybercrime?  Using the Internet to commit a crime.  Identity Theft  Hacking  Viruses  Facilitation of traditional criminal activity.
By Paul Capers.  A cell phone is a portable telephone that does not use a wired connection. It connects to a wireless carrier network using radio waves.
THE CSI EFFECT Is The 'CSI Effect' Influencing Courtrooms?
Department of Mathematics Computer and Information Science1 Basics of Cyber Security and Computer Forensics Christopher I. G. Lanclos.
DOCUMENTARY WORKSHOP RIKESH TAILOR BFI FILM ACADEMY.
Securing a Wireless Network
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Copyright © 2014 Pearson Education, Inc. 1 IS Security is a critical aspect of managing in the digital world Chapter 10 - Securing Information Systems.
 The media has a great influence on every area of life such as : ˜ Sports ˜ Politics ˜ Culture ˜ Consumption patterns ˜ Development.
The Impact of Physical Security on Network Security
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Cyber Crimes.
The Future of Criminal Justice Chapter 18 Frank Schmalleger Criminal Justice Today 13 th Edition.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
1 ● Plant Automation Security Review of Cyber Security Attack at Maroochy Water Services ● Bradley Yager ● National Business Development Manager – Telemetry.
Cyber crime & Security Prepared by : Rughani Zarana.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
What it is About  This poster is about The Nine Elements of Digital Citizenship.  It also has a lot of information about Cyber bullying.  There were.
Communication Technology
Moral, Social and Ethical issues associated with the Internet
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Module  Introduction Introduction  Techniques and tools used to commit computer crimes Techniques and tools used to commit computer crimes.
Cryptography and Network Security Sixth Edition by William Stallings.
Intro to Computer Security For COP3502, Intro to Computer Science Lecture 1 1.
How do the mass media represent crime and why? What effect do the media representations of crime have on society? If you see this man, don’t approach him;
Securing A Wireless Home Network. Simple home wired LAN.
Battles in Cyber Space Dr Richard E Overill Department of Informatics.
Defamation & Media Contempt of Court. Defamation Act 2013 Libel – is when the defamation is written down or broadcast. Internet s Newspaper Magazines.
Cybersecurity Test Review Introduction to Digital Technology.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Types of Cybercrime (FBI, 2000) 1.Unauthorized access by insiders (such as employees) 2.System penetration by outsiders (such as hackers) 3.Theft of proprietary.
PSYA4: Addictive Behaviours Sessions 12-13: The role of the media in addictive behaviours Sessions 12-13: The role of the media in addictive behaviours.
Information Systems Design and Development Security Precautions Computing Science.
DEPARTMENT OF COMPUTER SCIENCE INTRODUCTION TO CYBER AND SECURITY.
Cyber crimes is the most popular news we come across daily In good olden days there were no development in the usage of computers as we have now As.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
3.6 Fundamentals of cyber security
Systems Security Keywords Protecting Systems
Wireless Network Security
How SCADA Systems Work?.
Outline Introduction Characteristics of intrusion detection systems
Securing Information Systems
U.S. Department of Justice
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Media and Media Theory.
Introduction to Digital Forensics
Introduction to Cybercrime and Security
Computer Security By: Muhammed Anwar.
LO1 - Know about aspects of cyber security
Cyber Security For Civil Engineering
Presentation transcript:

The Effect of Fictional Media on Future Cybercrime. Presented by Jessica Eastell and Peter Lowery 15/05/2015Jessica Eastell and Peter Lowery2

Background What defines factual media? Types of fictional media Games TV Films 15/05/2015Jessica Eastell and Peter Lowery3

Potential influences Difficult to predict Lots of possibilities Main influences from the research 15/05/2015Jessica Eastell and Peter Lowery4

Is it real? - Games Watch_Dogs Cars Cash Machines Traffic lights 15/05/2015Jessica Eastell and Peter Lowery5

Is it real? - Games Cars Examined the Controller Area Network (CAN) Able to control: Display & Radio Body controller & Environment Engine & Breaks Wireless access through tyre pressure monitoring system 10m with a basic antenna / 40m with a low noise amplifier 15/05/2015Jessica Eastell and Peter Lowery6

Is it real? - Games Cash Machines Physical access needed Independent cash machines Tyupkin malware Machines pre-infected Activated through keypad Barnaby Jack - Jackpotting 15/05/2015Jessica Eastell and Peter Lowery7

Is it real? - Games Traffic lights Signals intercepted for about $100 Vulnerable systems have no encryption or authentication Accessed from a drone 650 feet above Possible from up to two miles away Electric road signs 15/05/2015Jessica Eastell and Peter Lowery8

Is it real? - TV Homeland Vice President is killed through pacemaker hacking Influences: In 2007 Dick Cheney had his pacemaker’s wireless capabilities disabled Barnaby Jack’s research into Implantable Medical Devices (IMDs) 15/05/2015Jessica Eastell and Peter Lowery9

Is it real? - TV Implantable Medical Devices (IMDs) Pacemakers 830-volt shock from 50 feet away Serial and model numbers No documented direct uses “could definitely result in fatalities” Insulin Pumps In 2010 an insulin pump was hacked from 100 feet away Dump The entire contents Prevent the insulin being distributed Barnaby Jack managed to improve on this 300 feet away without the pump ID 15/05/2015Jessica Eastell and Peter Lowery10

Is it real? - Films Interstellar Drone hacked in mid-air Skyfall Gas explosion targeted government building 15/05/2015Jessica Eastell and Peter Lowery11

Is it real? - Films Drone hacking The Pentagon is deploying “Electronic Armour” After downing of a U.S. RQ-170 military drone in Iran Claimed to be a cyber-attack Samy Kamkar has engineered SkyJack Control a drone with other drones 15/05/2015Jessica Eastell and Peter Lowery12

Is it real? - Films Gas explosions SCADA systems “Stuxnet” influence 15/05/2015Jessica Eastell and Peter Lowery13

15/05/2015 >>>>14 The CSI Effect

Is the effect in which an individual believes that the forensic science in crime show television programmes are completely true Coined in the year 2000 This affects criminals as well as the average layperson Should crime shows be more factual? New CSI Cyber 15/05/2015Jessica Eastell and Peter Lowery15

Crime Shows People have the appeal of working out the suspect in a crime show Because of this: Crime shows are easy to follow Easy to determine the suspect The investigation has to fit inside an episode Quick and easy 15/05/2015Jessica Eastell and Peter Lowery16

Cyber Crime in fictional television shows New CSI Cyber Cyber criminals are more dangerous than ordinary killers Nothing connected to the internet is safe from hackers First episode contained baby monitors being hacked Episodes about the Internet of Things The cyber-crime from these shows get taken out of the news “I keep thinking if I could just turn in one hacker at a time, nothing like that will ever happen again” Main Characters behavioural psychology practice got hacked and all of the records got stolen 15/05/2015Jessica Eastell and Peter Lowery17

RFC 1392: Internet Users’ Glossary Hacker “A person who delights in having an intimate understanding of the internal workings of a system, computers and computer networks in particular. The term is often misused in a pejorative context, where "cracker" would be the correct term.” Cracker “an individual who attempts to access computer systems without authorization. These individuals are often malicious, as opposed to hackers, and have many means at their disposal for breaking into a system.” 15/05/2015Jessica Eastell and Peter Lowery18

“I keep thinking if I could just turn in one hacker at a time, nothing like that will ever happen again” 15/05/2015Jessica Eastell and Peter Lowery19

The Factual Media (Media Effect) People have access to factual news throughout their daily lives The average person relies heavily on the news Can be accessed through many sources 24/7 across the globe 15/05/2015Jessica Eastell and Peter Lowery20

Hacking is used instead of cracking Become well known Has it become the correct term? The media is known for over sensationalising topics If the information is wrong Audience will get a false representation of the topic Opinions of the writers is critical 15/05/2015Jessica Eastell and Peter Lowery21

15/05/2015Jessica Eastell and Peter Lowery22

The Tech Effect Impact which advances in science and technology have on various aspects of culture Comparing the real life technology with the fictional technology Police don’t have the technologies that are available in the fictional television shows 15/05/2015Jessica Eastell and Peter Lowery23

In CSI Cyber Malware software which changes colour when malware has been identified If only it was that easy 15/05/2015Jessica Eastell and Peter Lowery24

The Inverse CSI Effect As Richard Overill rightly pointed out: Crime shows broadcast onto television screens not only effect the average layperson and jury members but also criminals 15/05/2015Jessica Eastell and Peter Lowery25

Criminals who would be frequent watchers of CSI shows Change their MO in two ways To fit the hackers on the television show To become more discreet and restrict their activities Cybercrime much harder to detect and find the suspect To stop their criminal activities Television shows depict cybercrime solving as easy and effortless 15/05/2015Jessica Eastell and Peter Lowery26

Does the CSI Effect exist? Research is conflicting No substantial evidence to suggest the CSI Effect exists CSI Effect is a small factor, which without other factors would not require attention Tech Effect Media Effect If criminals are not effected by television shows what are they effected by? 15/05/2015Jessica Eastell and Peter Lowery27

Influence on future crime How would you know? Conduct Surveys Increase in Documentaries / factual programs More factual means more people know how to “hack” Will that influence more cyber crime and cyber attacks 15/05/2015Jessica Eastell and Peter Lowery28

What can be done Education Good for the average person Bad for potential Criminals Education on Jury members Before they go into court CSI Effect in digital evidence will increase in the next 10 years Digital Forensics and cyber-crime is relatively new in the television industry Both positive and negative 15/05/2015Jessica Eastell and Peter Lowery29

Questions? Jessica – Peter – 15/05/2015Jessica Eastell and Peter Lowery30