Chapter 14 Technology and Crime Frank Schmalleger PowerPoint presentation created by Ellen G. Cohn, Ph.D.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
2 Language of Computer Crime Investigation
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Class 11: Information Systems Ethics and Crime MIS 2101: Management Information Systems Based on material from Information Systems Today: Managing in the.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Forensic and Investigative Accounting Chapter 16 Cybercrime Loss Valuations © 2011 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
© 2003 Prentice-Hall, Inc. 1 Chapter 17 The Future of Criminal Justice.
Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.
14 Technology and Crime.
Copyright © 2015 McGraw-Hill Education. All rights reserved. No reproduction or distribution without the prior written consent of McGraw-Hill Education.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Forensics BACS 371
Riverside Community School District
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Information Technology for the Health Professions, 2/e By Lillian Burke and Barbara Weill ©2005 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle.
GROUP 7 RAHUL JIMMY RONEY GEORGE SHABNAM EKKA SHEETHAL JOSEPH Cyber Laws in India- IT Act, 2000; 2004.
CJ © 2011 Cengage Learning Chapter 17 Cyber Crime and The Future of Criminal Justice.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
COMPUTER CRIME AND TYPES OF CRIME Prepared by: NURUL FATIHAH BT ANAS.
Chapter 11 Security and Privacy: Computers and the Internet.
Computer Crime and CyberCrime Why we need Computer Forensics.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Computer Crime and Information Technology Security
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
The Future of Criminal Justice Chapter 18 Frank Schmalleger Criminal Justice Today 13 th Edition.
 Computer Hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.  the act.
Cyber crime & Security Prepared by : Rughani Zarana.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Unethical use of Computers and Networks
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Crime & Malpractice AS Module Heathcote Ch. 10.
Chapter 9 Enhancing Information/Computer Security.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
Topic 5: Basic Security.
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Securing Information Systems
Add video notes to lecture
A Project on CYBER SECURITY
Crimes against Property
Chapter 11 crime and security in the networked economy
Securing Information Systems
Five Unethical Uses of Computers
Forensic and Investigative Accounting
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

Chapter 14 Technology and Crime Frank Schmalleger PowerPoint presentation created by Ellen G. Cohn, Ph.D.

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 2 The Advance of Technology Technology and criminology have always been closely linked Technology can be used by crime fighters and lawbreakers As technology progresses, it facilitates new forms of behavior, including new crimes

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 3 High Technology and Criminal Opportunity High-tech criminals have several routes to obtain illegitimate access to computerized information Direct access Computer trespass EMF decoders

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 4 High Technology and Criminal Opportunity Hacker: A person who uses computers for exploration and exploitation May seek to destroy or alter data without otherwise accessing or copying the information Computer virus: A set of computer instructions that propagates copies or versions of itself into computer programs or data when it is executed

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 5 High Technology and Criminal Opportunity The greatest threat to computers and data comes from inside the company The person most likely to invade a computer is an employee currently on the payroll

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 6 High Technology and Criminal Opportunity Computer crime: Any violation of a federal or state computer crime statute

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 7 High Technology and Criminal Opportunity David L. Carter’s typology of computer crime Crimes in which computers serve as targets Crimes in which computers serve as the instrumentality of the crime Crimes in which the computer is incidental to other crimes Crimes associated with the prevalence of computers

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 8 High Technology and Criminal Opportunity FBI typology of computer crime Internal computer crimes (viruses) Internet and telecommunications crimes Support of criminal enterprises Computer-manipulation crimes Hardware, software, and information theft

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 9 High Technology and Criminal Opportunity Software piracy: The unauthorized and illegal copying of software programs Softlifting Hard disk loading Internet piracy Renting Software counterfeiting Original equipment manufacturer unbundling

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 10 High Technology and Criminal Opportunity Cybercrime: Crime committed with the use of computers or via the manipulation of digital forms of data Phone phreaks: Use switched, dialed-access telephone services for exploration and exploitation One of the earliest forms of cybercrime Phishing An internet-based scam that uses official-looking messages to steal valuable information

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 11 Technology and Criminal Mischief Some computer crime is not committed for financial gain but is classified as “criminal mischief” Creating and transmitting malicious forms of programming code (malware) Typically associated with young, technologically sophisticated male offenders

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 12 Technology and Criminal Mischief Computer virus: Computer program designed to secretly invade computer systems to modify the way they operate or to alter the information they store Polymorphic viruses Use advanced encryption techniques to assemble varied but fully operational clones of itself

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 13 Computer Crime and the Law Cyber Security Enhancement Act (2002) Digital Theft Deterrence and Copyright Damages Improvement Act (1999) No Electronic Theft Act (1997) Communications Decency Act Reno v. ACLU (1997)

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 14 Computer Crime and the Law Computer Fraud and Abuse Act (1984) Electronic Communications Privacy Act (1986) National Stolen Property Act Federal Wiretap Act (1968)

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 15 Computer Crime and the Law Computer-related crime: Any illegal act for which knowledge of computer technology is involved for its perpetration, investigation, or prosecution Computer abuse: Any unlawful incident associated with computer technology in which a victim suffered or could have suffered loss or in which a perpetrator by intention made or could have made gain

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 16 A Profile of Computer Criminals Cyberspace: The computer-created matrix of virtual possibilities, including online services, wherein human beings interact with one another and with the technology itself Cyberpunk: Literature that glorifies cyberspace and the people who inhabit it May be the counterculture movement of the future

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 17 A Profile of Computer Criminals The average hacker is: Male, aged 16-25, lives in the U.S. Computer user, not a programmer Hacks with software written by others Primary motivation is to gain access to Web sites and computer networks, not to profit financially

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 18 A Classification of Hackers Pioneers Scamps Explorers Game players Vandals Addicts

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 19 The History and Nature of Hacking Not all hackers are kids Some hackers are high-tech computer operators Not all high-tech crimes are committed using computer technology Some use the fruits of high technology to further crime

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 20 Computer Crime as a Form of White-Collar Crime Some see computer crime as a new form of white-collar crime The “ultimate expression of white-collar crime”

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 21 Computer Crime as a Form of White-Collar Crime Both types of crime are often committed through nonviolent means Access to computers or computer storage media, through employment-related knowledge or technical skills, is often needed

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 22 Computer Crime as a Form of White-Collar Crime Both involve information manipulations that either directly or indirectly create profits or losses Both can be committed by one or more individuals or by organizations, with victims ranging from individual clients, customers, employees, or other organizations

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 23 Computer Crime as a Form of White-Collar Crime Both are difficult to detect – discovery is often by accident or customer complaint The general public views many of these acts as less serious than violent crimes

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 24 Computer Crime as a Form of White-Collar Crime These crimes cost individuals, organizations, and society large amounts of money and other resources Prevention of these crimes requires a combination of legal, technical, managerial, security, and audit-monitoring controls

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 25 Identity Theft Identity theft: The misuse of another individual’s personal information to commit fraud A special kind of larceny Has the “feel” of a personal crime

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 26 Identity Theft Existing account fraud: Thieves obtain account information involving accounts that are already open Less costly, more prevalent New account fraud: Thieves use personal information to open accounts in the victim’s name, make charges, and then disappear Less common, imposes greater costs and hardships on victims

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 27 Identity Theft Direct costs of identity theft Out-of-pocket costs to victims and businesses Cost to repair identity Indirect costs Businesses pay for fraud prevention and mitigation of harm Victims may incur costs such as those involved in civil litigation initiated by creditors and in overcoming obstacles in obtaining or retaining credit

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 28 Identity Theft Incidence BJS definition of identity theft Unauthorized use or attempted use of existing credit cards Unauthorized use or attempted use of other existing accounts Misuse of personal information to obtain new accounts or loans, or to commit other crimes

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 29 The Identity Theft Life Cycle First stage: the identity thief attempts to acquire a victim’s personal information Second stage: the thief attempts to misuse the personal information s/he has acquired Third stage: thief has completed the crime and is enjoying the benefits while the victim is realizing the harm

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 30 Identity Thieves: Who They Are Hard to classify identity thieves – most victims do not know who stole or misused their information Thieves often have no prior criminal background – may have preexisting relationship with the victim Steady increase in involvement of groups and organizations of career criminals in identity theft Increased involvement of foreign organized criminal groups

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 31 What Can Be Done? Public awareness campaigns Victim assistance Partnership and collaboration Legislation Information protection Training

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 32 Technology in the Fight Against Crime Technology helps criminals and criminal justice personnel Provides criminals new weapons to commit crimes Provides the criminal justice system with new tools to fight crime

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 33 Technology in the Fight Against Crime Key law enforcement technology: Traffic radar Computer databases of known offenders Machine-based expert systems Cellular communications Electronic eavesdropping DNA analysis Less-than-lethal weapons Computer-aided dispatch systems

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 34 DNA Technology DNA profiling The use of biological residue found at a crime scene for genetic comparisons aiding in the identification of criminal suspects Has resulted in the release of a number of unjustly convicted people and, in some cases, the discovery of the true offender A highly reliable forensic tool but not infallible

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 35 DNA Technology Daubert standard: Test of scientific acceptability applicable to the gathering of evidence in criminal cases Factors used to determine if scientific evidence is reliable: Whether it was subjected to testing Whether it was subjected to peer review Known/potential rates of error Existence of standards controlling application of the techniques involved

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 36 DNA Technology Several states and the federal government are building digitized forensic DNA databases FBI’s National DNA Index System DNA Identification Act of 1994 Genetic profiling The use of biotechnology to identify the unique characteristics of an individual’s DNA

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 37 Computers as Crime-Fighting Tools Specialized Web sites to connect people Automated fingerprint identification systems (AFIS) Online criminal information and database services

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 38 Computers as Crime-Fighting Tools PC radios Expert systems Specialized software programs to assist police artists

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 39 Combating Computer Crime Threat analysis (risk analysis): A complete and thorough assessment of the kinds of perils facing an organization Once threats are identified, strategies to deal with them can be introduced An audit trail traces and records the activities of computer operators and allows auditors to examine the sequence of events relating to any transaction A powerful tool for identifying instances of computer crime

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 40 Police Investigation of Computer Crime Few police departments have the time or the qualified personnel to investigate computer crimes effectively Many departments place a low priority on computer crime May intentionally avoid computer-crime investigations

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 41 Police Investigation of Computer Crime FBI’s National Computer Crime Squad investigates violations of federal computer crime laws The U.S. DOJ’s Computer Crime and Intellectual Property Section focuses on computer and intellectual property crime DCS-1000 – FBI’s network “sniffer”

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 42 Dealing with Computer Criminals Sanctions that may deter high-tech offenders include: Confiscating equipment used to commit a computer crime Limiting the offender’s use of computers Restricting the offender’s freedom to accept jobs involving computers Can supplement with a short jail term

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 43 Securing the Internet The Internet: The world’s largest computer network Consists of tens of thousands of computers around the world that are linked together Commission on Critical Infrastructure Protection – created by Pres. Clinton, 1996 Assessed threats to the nation’s computer networks and recommended policies to protect them Led to 1998 creation of the National Infrastructure Protection Center (NIPC) Succeed by the Information Analysis and Infrastructure Protection Directorate (part of DHS)

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 44 Securing the Internet U.S. Computer Emergency Readiness Team (US-CERT) – established in 2003 Partnership between DHS and public and private sectors Created to protect U.S. Internet infrastructure and coordinate defenses against cyberattacks US-CERT is also in charge of the National Cyber Alert System

Criminology Today, 5th ed Frank Schmalleger © 2009 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 45 Policy Issues: Personal Freedoms in the Information Age First Amendment Freedom of speech Are electronic communications protected? Fourth Amendment Freedom from unreasonable searches and seizures Does this include electronic information?