Presentation is loading. Please wait.

Presentation is loading. Please wait.

Crime Rob Haberstroh, Matt Kuehn & Adam Foust. Roadmap Chapter Introduction Chapter Introduction Hacking Hacking Anonymous Case Study Anonymous Case Study.

Similar presentations


Presentation on theme: "Crime Rob Haberstroh, Matt Kuehn & Adam Foust. Roadmap Chapter Introduction Chapter Introduction Hacking Hacking Anonymous Case Study Anonymous Case Study."— Presentation transcript:

1 Crime Rob Haberstroh, Matt Kuehn & Adam Foust

2 Roadmap Chapter Introduction Chapter Introduction Hacking Hacking Anonymous Case Study Anonymous Case Study Identity Theft & Credit Card Fraud Identity Theft & Credit Card Fraud Key-logger Demo Key-logger Demo Whose Laws Rule the Web? Whose Laws Rule the Web? Online Gambling Online Gambling Class Discussion Class Discussion Conclusion Conclusion

3 Chapter Introduction Computer technology and the internet provide new environments for fraud, stock manipulation, theft, forgery, industrial espionage, and many new and old scams Computer technology and the internet provide new environments for fraud, stock manipulation, theft, forgery, industrial espionage, and many new and old scams Computer crimes includes a wide range of activities from minor pranks to huge thefts and even shutdowns of services on which lives and livelihoods depend Computer crimes includes a wide range of activities from minor pranks to huge thefts and even shutdowns of services on which lives and livelihoods depend Crimes committed with computing technology are more devastating and harder to detect than similar crimes committed without it Crimes committed with computing technology are more devastating and harder to detect than similar crimes committed without it

4 Hacking An expert at programming and solving problems with a computer An expert at programming and solving problems with a computer A person who illegally gains access to and sometimes tampers with information in a computer system A person who illegally gains access to and sometimes tampers with information in a computer system 3 Phases 3 Phases 1960s - 1970s 1960s - 1970s 1970s - mid 1990s 1970s - mid 1990s mid 1990s - present mid 1990s - present

5 Phase Characteristics Phase 1 Phase 1 Hacker was a computer virtuoso who created many of the first computer games and operating systems Hacker was a computer virtuoso who created many of the first computer games and operating systems Hackers sought knowledge and intellectual challenges Hackers sought knowledge and intellectual challenges Phase 2 Phase 2 Hacking took on its derogatory definition Hacking took on its derogatory definition Hacking activities included spreading viruses, pranks, thefts, and business espionage Hacking activities included spreading viruses, pranks, thefts, and business espionage Phase 3 Phase 3 New viruses and DDoS New viruses and DDoS Revenge and social network attacks Revenge and social network attacks Hacktivism Hacktivism

6 Hacktivism The use of hacking to promote a political issue The use of hacking to promote a political issue Some argue hacktivism is ethical - modern form of protest, activism, and civil disobedience Some argue hacktivism is ethical - modern form of protest, activism, and civil disobedience Others view it as theft, vandalism, even cyberterrorism Others view it as theft, vandalism, even cyberterrorism Is there ethical justification for such hacking? Varying degrees? Is there ethical justification for such hacking? Varying degrees?

7 Anonymous Case Study Loosely associated hacktivist group that originated in 2003 Loosely associated hacktivist group that originated in 2003 Strongly opposes internet censorship and surveillance, Scientology, and government corruption Strongly opposes internet censorship and surveillance, Scientology, and government corruption In 2008 they became increasingly associated with collaborative, international hacktivism In 2008 they became increasingly associated with collaborative, international hacktivism In 2012, Time, name Anonymous as one of the most influential groups in the world In 2012, Time, name Anonymous as one of the most influential groups in the world On January 7th 2013, Anonymous filed a petition to acknowledge DDoS as a legal form of protest similar to the Occupy protests. On January 7th 2013, Anonymous filed a petition to acknowledge DDoS as a legal form of protest similar to the Occupy protests.

8 Anonymous - Megaupload Protest Jan 19, 2012 Megaupload was shut down by the US Dept. of Justice and the FBI Jan 19, 2012 Megaupload was shut down by the US Dept. of Justice and the FBI DOJ charged seven people allegedly affiliated with the site with running an organized criminal enterprise responsible for worldwide online piracy of copyrighted content DOJ charged seven people allegedly affiliated with the site with running an organized criminal enterprise responsible for worldwide online piracy of copyrighted content Hours later, nearly 6000 Anonymous "members" took down the sites of the DOJ, FBI, MPAA, RIAA, and BMI with DDoS attacks Hours later, nearly 6000 Anonymous "members" took down the sites of the DOJ, FBI, MPAA, RIAA, and BMI with DDoS attacks This happened the day after the internet blackout in protest of SOPA This happened the day after the internet blackout in protest of SOPA

9 Megaupload Protest (continued) Stakeholders Stakeholders Government Government Enforce Laws - SOPA Enforce Laws - SOPA Entertainment Industry Entertainment Industry Stop piracy of material Stop piracy of material Anonymous Anonymous Stop internet censorship & kill SOPA Stop internet censorship & kill SOPA US Citizens US Citizens Media consumption Media consumption Consequentialism vs. Deontology Consequentialism vs. Deontology

10 Megaupload Protest (continued) ACM Code ACM Code 1.1: Contribute to society and human well-being 1.1: Contribute to society and human well-being 1.5: Honor property rights including copyright and patent 1.5: Honor property rights including copyright and patent Result Result DOJ worked with authorities in New Zealand, who arrested four of the seven people charged DOJ worked with authorities in New Zealand, who arrested four of the seven people charged SOPA did pass through Congress SOPA did pass through Congress Megaupload still shut down Megaupload still shut down Are DDoS attacks acceptable/ethical forms of protest/civil disobedience? Are DDoS attacks acceptable/ethical forms of protest/civil disobedience?

11 Identity Theft & Credit Card Fraud

12 What is identity theft? What is identity theft? Criminal uses identity of an unknowing person Criminal uses identity of an unknowing person If thief steals credit card numbers If thief steals credit card numbers Buy expensive items Buy expensive items Sell information to other criminals Sell information to other criminals If thief steals SSN If thief steals SSN Open fake bank accounts Open fake bank accounts Take out loans Take out loans

13 Phishing Millions of emails fishing for information Millions of emails fishing for information Often seemingly sent from large companies Often seemingly sent from large companies Be careful of unsolicited email Be careful of unsolicited email Bad grammar and broken English Bad grammar and broken English

14

15 Pharming Lure people to fake websites Lure people to fake websites Collect personal data Collect personal data Involves altering DNS tables that redirect the web browser to the false site Involves altering DNS tables that redirect the web browser to the false site Less common, difficult to do Less common, difficult to do

16 Resumes Contain lots of information Contain lots of information Use job-hunting sites Use job-hunting sites Pose as employers Pose as employers Post fake job ads Post fake job ads

17 How would you protect yourself from falling victim to a false job posting and resume scam?

18 Possible Solutions Omit sensitive data from a posted resume Omit sensitive data from a posted resume Do not provide sensitive data until an actual, in person interview Do not provide sensitive data until an actual, in person interview If phone interview, confirm that number interviewer called from is a company line If phone interview, confirm that number interviewer called from is a company line

19 Malicious Software Keylogger Keylogger Records keystrokes of affected user Records keystrokes of affected user Can take periodic screen shots Can take periodic screen shots Can automatically email the recorded findings Can automatically email the recorded findings Demo Demo

20 Response to Identity Theft Better Authentication Better Authentication Return address and link authentication Return address and link authentication Better Software Better Software Determining geographic location of the website Determining geographic location of the website Banks-two factor Authentication Banks-two factor Authentication Customer chooses a digital image to link to their account, image displays at login Customer chooses a digital image to link to their account, image displays at login

21 Minimize Damage Law established in 1988; made it a Federal crime to use another person’s identification with intent to commit a felony Law established in 1988; made it a Federal crime to use another person’s identification with intent to commit a felony Government started to provide more assistance to identity theft victims Government started to provide more assistance to identity theft victims Fraud alert Fraud alert Identity theft insurance Identity theft insurance

22 Credit and Debit Card Fraud Started with steal, use, or sell the physical card Started with steal, use, or sell the physical card Added verification to protect from mail theft Added verification to protect from mail theft Call in and provide identifying info Call in and provide identifying info Since evolved to the use of skimmers Since evolved to the use of skimmers Device attached to a card reader Device attached to a card reader Saves user information to memory Saves user information to memory Thief retrieves device and has record of all used cards Thief retrieves device and has record of all used cards

23 Do you think you could spot these?

24 How about these?

25 What are some ways that you protect yourself from credit/debit card fraud?

26 Whose Laws Rule the Web?

27 Web content has no borders Web content has no borders Whose laws do we follow? Whose laws do we follow? The host nation The host nation Where the content is viewed Where the content is viewed The spreading of viruses The spreading of viruses Principle of “responsibility to prevent access” Principle of “responsibility to prevent access”

28 Differences in National Law Content control or censorship Content control or censorship Politics, religion, criminal investigations and trials Politics, religion, criminal investigations and trials Intellectual Property Intellectual Property Gambling Gambling Hacking and viruses Hacking and viruses Libel Libel Privacy Privacy

29 Arresting Foreign Visitors BetOnSports PLC BetOnSports PLC British gambling site British gambling site British Citizen and CEO of BetOnSports, David Carruthers was arrested while changing planes in Dallas British Citizen and CEO of BetOnSports, David Carruthers was arrested while changing planes in Dallas Several other executive of BetOnSports were also arrested by the U.S. government Several other executive of BetOnSports were also arrested by the U.S. government

30 Online Gambling Online betting is legal in England Online betting is legal in England London’s stock exchange lists Internet gambling companies London’s stock exchange lists Internet gambling companies The arrest caused the gambling companies stock to drop by $1.5 billion The arrest caused the gambling companies stock to drop by $1.5 billion

31 Online Gambling (cont.) The United States argument for the arrest s The United States argument for the arrest s Most of the gambling companies’ customers were in the United States Most of the gambling companies’ customers were in the United States Online gambling is illegal in the U.S. Online gambling is illegal in the U.S. The United States said the sites should have blocked access by U.S. citizens The United States said the sites should have blocked access by U.S. citizens Carruthers plead guilty to lower his possible 20 year prison sentence Carruthers plead guilty to lower his possible 20 year prison sentence

32 Online Gambling – Results Online gambling thrives with U.S. customers Online gambling thrives with U.S. customers “You just don’t travel to the U.S. anymore if your in that business” – London business analyst “You just don’t travel to the U.S. anymore if your in that business” – London business analyst Unlawful Internet Gambling Enforcement Act Unlawful Internet Gambling Enforcement Act Prohibits credit card and online-payment companies from processing transactions on gambling sites Prohibits credit card and online-payment companies from processing transactions on gambling sites

33 Online Gambling (Cont.) Did the British Companies have the responsibility to block U.S. citizens from their site? Did the British Companies have the responsibility to block U.S. citizens from their site? Stakeholders Stakeholders Executives of Internet Gambling sites Executives of Internet Gambling sites American Citizens American Citizens British Citizens British Citizens Foreign stockholders Foreign stockholders

34 Online Gambling – Stakeholders Stakeholders Stakeholders Executives of Internet Gambling sites Executives of Internet Gambling sites Negative right of running a gambling business Negative right of running a gambling business Positive right of providing the service to British citizens Positive right of providing the service to British citizens American Government American Government Negative right in enforcing its gambling laws Negative right in enforcing its gambling laws Has the positive right of making sure citizens follow U.S law Has the positive right of making sure citizens follow U.S law British Citizens British Citizens Have a contractual right to being able to gamble Online Have a contractual right to being able to gamble Online Foreign stockholders Foreign stockholders Have a positive right to invest in Internet Gambling Have a positive right to invest in Internet Gambling

35 Online Gambling – Implications Doesn’t break any SE code or AMC code of ethics Doesn’t break any SE code or AMC code of ethics More of an moral issue More of an moral issue U.S. Laws negatively impact other countries U.S. Laws negatively impact other countries

36 Potential Solutions International agreements International agreements Treaties like those in the WTO Treaties like those in the WTO Doesn’t help where there are variances in the laws Doesn’t help where there are variances in the laws The creation of an world-wide governing entity The creation of an world-wide governing entity Authority to prevent entry principle Authority to prevent entry principle A Country can act within itself to prohibit illegal material, but it may not apply its laws in another country where it is legal. A Country can act within itself to prohibit illegal material, but it may not apply its laws in another country where it is legal. Utilitarian approach Utilitarian approach

37 Thoughts on Whose Laws Rule The Web?

38 Conclusion Introduction to crime Introduction to crime Hacking Hacking Anonymous Case Study Anonymous Case Study Identity Theft & Credit Card Fraud Identity Theft & Credit Card Fraud Key-logger Demo Key-logger Demo Whose Laws Rule the Web? Whose Laws Rule the Web? Online Gambling Online Gambling

39 Refrences "Anonymous (group)." Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc. Web. 23 April 2013. "Anonymous (group)." Wikipedia: The Free Encyclopedia. Wikimedia Foundation, Inc. Web. 23 April 2013. Baase, Sara. A Gift of Fire: Social, Legal, and Ethical Issues for Computing Technology. 4th ed. Upper Saddle River, NJ: Pearson, 2013. Print. Gohring, Nancy. "Anonymous Retaliates for Megaupload Shutdown, Attacks DOJ, Others." PCWorld. Web. 23 April 2013..


Download ppt "Crime Rob Haberstroh, Matt Kuehn & Adam Foust. Roadmap Chapter Introduction Chapter Introduction Hacking Hacking Anonymous Case Study Anonymous Case Study."

Similar presentations


Ads by Google