Download presentation
Presentation is loading. Please wait.
Published byErik Matthews Modified over 8 years ago
1
By: Chris Simpson, Julie Dunbar, and Thomas Taylor
2
Road Map Introduction Hacking Identity Theft and Credit-Card Fraud Scams and Forgery Crime Fighting vs. Privacy Laws of the Web
3
Introduction to Hacking Wide scale Negative Connotation Are all hackers bad?
4
Hacking Definition Phase 1: 1960’s to 1970’s Phase 2: 1970’s to 1990’s Phase 3: 1990’s to present
5
Hacking Phase 1 “good hack” - clever piece of code “Computer virtuosos” College and high-school students
6
Hacking Phase 2 Breaking into computers with unauthorized access Pranks, Thefts, phone phreaking Social Engineering International nature
7
Hacking Phase 3 More sophisticated attacks Criminal gangs – expanding accessible info Hacking for political motives increase Attackers younger and younger
8
Future of Hacking The more that is connected, the more is at risk Terroristic Hacking will increase
9
Hacktivism/Political Hacking What is it? Is it right or wrong? Ethical?
10
Computer Related Laws The CFAA USA PATRIOT ACT Expands CFAA Increased penalties
11
How Hackers get Caught Honey pots Wiretaps Undercover Hackers
12
Penalties of Being a Hacker Light Sentences Deterrence Method Not over punished for pranks
13
Security before 2000’s Before 2000’s Open Access No real Security Easy to Break into
14
Security early 2000’s Vast Improvement Firewalls, passwords, and encryption Jobs created just for security purposes
15
People in Charge of Security System Administrators Sellers of consumer products Individual computer owners
16
Why Security?
17
Identity Theft Identity Theft – describes various crimes in which a criminal uses the identity of an unknowing innocent person. Our Identities have become a series of numbers Credit/debit cards, ssn, driver’s license, account numbers. Everything is stored electronically
18
Types of Attacks Phishing – sending emails “fishing” for information by asking the victim for personal information. Vishing – (voice phishing) the phishing email provides a phone number to call and requests their personal information when the victim calls in. Pharming – planting a false internet address in the tables on a DNS, thus when a bank customer goes to the banks website they are redirected to the thieves false website. Trojans/ Key loggers – hiding malicious software in innocent looking programs, this software then tracks keystrokes.
19
Resumes Contain tons of personal Information Addresses, phone numbers, ssn, birth date, work history. Post on job hunting websites Pose as employers Identity thieves then have all of your information
20
Responses to Identity Theft Better Authentication Return address, link authentication. Better Software Determining geographic location of the website. Banks-two factor Authentication Customer chooses a digital image to link to their account. Later, when the customer logs into their account, the bank will display the correct image.
21
Reduce Damage of Identity Theft Congress established a law in 1998 to make it a Federal crime to use another person’s Identification with intent to commit a felony Government started to provide more assistance to Identity theft victims Fraud alert Identity theft insurance
22
Credit/Debit Card Fraud Stealing credit cards from mail Result: now you have to activate the card after you receive it in the mail. Dumpster Diving Result: stores and banks only print the last 4 digits of the account number on the receipt. Skimmers Card reading devices placed on top of the atm card scanner to record the card information.
23
Ethics of Protecting Data Businesses have an ethical need to protect data Customers themselves cannot protect their account numbers within the bank’s database. If losses are to high security is improved Authentication Credit card companies use security questions, also verify the computer being used to log in.
24
Fraud Click Fraud Advertising is charged per click on the advertisement. The host of the advertisement can click on the ad repeatedly to increase their fee. Stock Fraud Posting fake recommendations on the web or in chat rooms to increase the stock sales, then cashing out.
25
Biometrics Definition: Characteristics unique to individuals Ex. Finger Prints, Voice Prints, Face Structure
26
Uses of Biometrics Use of fingerprints Scan fingerprint to enter your house. Log onto your computer. Use your cell phone. States use face scanners Makes sure a person does not apply for more than one driver’s license or welfare benefits.
27
Problems with Biometrics Cadaver fingers, or fingers made from gelatin. Contact lenses for eye scanner Can’t change Biometrics Lose your credit card, get a new account number.
28
Scams & Forgery
29
Examples Pyramid Scams Counterfeit luxury goods Phony business investment opportunities
30
Auctions Ebay Sellers don’t send the goods Sellers send goods not matching the original description Selling illegal items ○ Prescription drugs, unauthorized copies of copyrighted material. Shill bidding ○ Bidding on one’s own goods to drive up the price.
31
Solutions to Online Auction Problems Reviews of buyers/sellers eBay allows customers to rate their buyers/sellers. Escrow Services A trusted third party holds the payment until the buyer receives the goods and approves their condition. Rules/ user agreements Prevent shill bidding and prohibit selling illegal items.
32
Digital Forgery Fake checks, currency, passports, visas etc It takes very little skill to make counterfeits due to computer software and hardware Defenses Technical tricks Education/training Change laws Microprinting paper with watermarks Adding a security thread to currency that a copy machine cannot reproduce.
33
Crime Fighting vs. Privacy and Civil Liberties
34
Search and Seizure of Computers Fourth amendment Automated Searches Ethical ?
35
Issue of Venue Where did the crime occur? Who has jurisdiction? 6 th amendment
36
Cybercrime Treaty International cooperation among law enforcement agencies Council of European’s Convention on Cybercrime Fraud, hacking, child pornography
37
Whose laws rule the web? ILOVEYOU virus National laws differ Gambling Hacking Privacy Censorship
38
Arresting Foreign Visitors United States law differ from other countries Online betting Copyright Infringement
39
Libel, Speech, Commercial law Libel- written defamation Slander- verbal defamation Jurisdiction Issues
40
Solutions International agreements Common standards or means of resolving international cases Authority to prevent entry
41
Gutnick vs. Dow Jones & Company Libel – written defamation. Barron’s magazine, owned by Dow Jones & Company, published an article suggesting that Gutnick had dealings with a money launderer and was involved in other shady deals. Australian Law – protects reputation. U.S Law – protects freedom of speech.
42
Cont… Gutnick’s positive right – right to protect his reputation under the Australian Law of protection. Dow Jones & Company negative right – right for freedom of speech and expression of opinion. Gutnick’s claim right – right to protect his reputation forbids Dow Jones & Company from publishing work against Gutnick’s reputation. Result: Trial held in Australia, Dow Jones & Company ended up settling with Gutnick to pay him a large sum of money.
43
Case Study: United States v. Aleynikov Aleynikov accused of transferring proprietary code from his employer’s high frequency trading system Took code he was working on, put it on a server then joined a start up helping with their high frequency trading system
44
Verdict District Court – Guilty Court of Appeals – Overruled basically ruling Code isn’t property- can’t be stolen
45
Stakeholders Goldman Sacks – Right protect assets made by employees (Negative Right) Aleynikov – He can use code he develops but may have restriction based upon employer (Positive Right) US Government – Enforcing rights of others – under EEA can not steal trade secrets
46
Analysis Perspective The FBI who arrested Aleynikov could argue Ideological perspective – even if you worked on project taking trade secrets always wrong Aleynikov most likely was using an Egoism perspective in it for himself seeing a huge raise in pay.
47
Case Study: United States v. David Carruthers British citizen and CEO of BetOnSPorts PLC, arrested while he changed planes on flight from England to Costa Rica. Online betting is legal in England,but in the U.S it is illegal
48
Charges He was originally charge with : violations of the Wire Wager Act, the Travel Act, the Illegal Gambling Business Act, the Racketeer Influenced Corrupt Organizations Act (RICO), tax evasion and money laundering.
49
Verdict Put on house arrest until trial last year Guilty and sentenced to 33 months in a federal prison for a racketeering conspiracy
50
Stakeholders U.S government- Right to protect U.S citizens from online gambling sites (negative right) Carruthers- Right to make money on online gambling where legal (positive right)
51
Analysis Perspective Utilitarian perspective – right act determined by the act itself (ex. Lying is always wrong) Consequentialism perspective- right act determined by consequences (ex. Lying is wrong unless you do it to save 20 peoples lives)
52
Conclusion Hacking Identity Theft and Credit-Card Fraud Scams and Forgery Crime Fighting vs. Privacy Laws of the Web
53
References http://everyday-ethics.org/2009/05/positive-and-negative-rights- what%E2%80%99s-the-difference-and-why-does-it-matter/ http://www.wired.com/images_blogs/threatlevel/2012/04/Aleynikov- Appeal-Decision.pdf http://www.wired.com/threatlevel/tag/racketeering/
54
Questions ?????
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.