Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.

Similar presentations


Presentation on theme: "Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved."— Presentation transcript:

1 Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.

2 Technology and Society The world has changed due to the introduction of computers and the Internet Email, text, Facebook, etc. have changed the nature of personal communication Online banking and commerce have revolutionized our access to money Technology affords multiple avenues for remote management of critical infrastructure All manner of crime and terror are now enabled in part by technology Copyright © 2015 Carolina Academic Press. All rights reserved.

3 Defining Cybercrime Cyber-trespass – Individuals cross boundaries of computer systems into areas where ownership has already been established Hackers, crackers, phreakers Cyber-Deception/Theft – Criminal acquisitions that can occur online Pirates, fraudsters, and hackers Copyright © 2015 Carolina Academic Press. All rights reserved.

4 Wall’s Typology of Cybercrime Cyberporn/Obscenity – Pedophiles, pornographers Not always criminal Sexual services Cyber-violence – Violence against individuals or groups on-line Cyber-stalking Cyber-hate Tech-talk Copyright © 2015 Carolina Academic Press. All rights reserved.

5 Defining Cyberterrorism One of the most inclusive definitions for cyberterror recognizes the utility of the Internet as a communications or attack venue – The premeditated, methodological, ideologically motivated dissemination of information, facilitation of communication, or, attack against physical targets, digital information, computer systems, and/or computer programs which is intended to cause social, financial, physical, or psychological harm to noncombatant targets and audiences for the purpose of affecting ideological, political, or social change; or any utilization of digital communication or information which facilitates such actions directly or indirectly Copyright © 2015 Carolina Academic Press. All rights reserved.

6 Policing Cyberspace The Internet is a complex environment that is policed by multiple groups – Internet users – Internet Service Providers – Corporate Security and Industry – Non-Governmental Non-Police Organizations – Governmental Non-Police Organizations – Public Policing Agencies Copyright © 2015 Carolina Academic Press. All rights reserved.

7 Local Law Enforcement Though multiple entities are responsible for managing and policing the Internet, local law enforcement serve as gatekeepers – Point of first contact for most victims – Act as first responders to most all crime scenes It is unclear how well they respond to cybercrime calls for service – Limited budgets – Limited jurisdictions – Limited Knowledge Copyright © 2015 Carolina Academic Press. All rights reserved.

8 NIJ Recommendations The National Institute of Justice presented 10 steps needed to improve the capability of state and local law enforcement agencies to handle cybercrimes – Public awareness campaigns – Better data and reporting of these crimes – Uniform training and certification to assist law enforcement and scientists – Onsite management assistance for task forces or electronic crime units – Updated federal and state laws Copyright © 2015 Carolina Academic Press. All rights reserved.

9 NIJ Recommendations The National Institute of Justice presented 10 steps needed to improve the capability of state and local law enforcement agencies to handle cybercrimes – Cooperation with the high tech industry – Special research and publications – Police management awareness and support – Investigative and forensics tools – Research on how to structure cybercrime units Copyright © 2015 Carolina Academic Press. All rights reserved.

10 The full set of PowerPoint slides is available upon adoption. Email bhall@cap-press.com for more information.


Download ppt "Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved."

Similar presentations


Ads by Google