Cyber Crimes: Online Ticketing Fraud By: Erin Dobbs, Blaine Skrainka, Nick Worth, Kyle Stamper, Suzy Kiska.

Slides:



Advertisements
Similar presentations
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 8 Crimes Twomey Jennings Anderson’s Business Law and the Legal.
Advertisements

McGraw-Hill/Irwin Copyright © 2012 by The McGraw-Hill Companies, Inc. All rights reserved.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 9 Information Systems Ethics, Computer Crime, and Security.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
EXAMINING CYBER/COMPUTER LAW BUSINESS LAW. EXPLAIN CYBER LAW AND THE VARIOUS TYPES OF CYBER CRIMES.
U.S criminal law’s reinforcement of technological measures protecting property: where the DMCA fits in Elliot N. Turrini Assistant U.S. Attorney Computer.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 10 White-Collar and Organized Crime. Introduction ► White-collar crimes – criminal offenses committed by people in upper socioeconomic strata.
1 Applications of Computers Lecture-3 2 E-Commerce 4 Almost all major companies have their homes on the web, mainly for advertising 4 Companies were.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
1 McGraw-Hill/Irwin Copyright © 2004, The McGraw-Hill Companies, Inc. All rights reserved. Ethical Challenges Ethics Principles of right and wrong that.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Computer Crimes and Abuses1 By: Saad Shwaileh. Computer Crimes and Abuses2 Outline Introduction. Computer crime and computer Abuse ? Types of Computer.
L o g o Types of Computer Crime Zhuravlev Alexander 326 MSLU.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Privacy and Encryption The threat of privacy due to the sale of sensitive personal information on the internet Definition of anonymity and how it is abused.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Chapter 11 Security and Privacy: Computers and the Internet.
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
Cyber Crimes.
PART THREE E-commerce in Action Norton University E-commerce in Action.
© 2005 West Legal Studies in Business, a division of Thompson Learning. All Rights Reserved.1 PowerPoint Slides to Accompany The Legal, Ethical, and International.
Mischief:  Definition – to willfully destroy or damage property or data; interfering with the lawful use of property or data; interfering with any person.
Internet Security for Small & Medium Business Week 6
Unethical use of Computers and Networks
IDENTITY THEFT. Illegally obtaining personal information such as name, social security, drivers license, or mothers maiden name, address, bank/credit.
CHAPTER THREE Criminal Law: Traditional and Cyber Crimes.
Cyber Security Action against cyber crime. What is cyber security?  Cyber security standards are security standards which enable organizations to practice.
Jeopardy: Digital Citizenship Please use presentation mode!
COPYRIGHT © 2011 South-Western/Cengage Learning. 1 Click your mouse anywhere on the screen to advance the text in each slide. After the starburst appears,
ACM 511 Introduction to Computer Networks. Computer Networks.
Electronic Commerce By: Shannon McManus. Background  The process of buying, selling, or exchanging products through a computer.  Transactions are usually.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
 Internet crime is, Any crime or illegal activity committed online or through the internet.
CRIMES Used by permission. For Educational purposes only.
1 The Broader Picture Chapter 12 Copyright 2003 Prentice-Hall.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
Revision Q1: Explain the term HACKING?
© 2004 West Legal Studies in Business A Division of Thomson Learning BUSINESS LAW Twomey Jennings 1 st Ed. Twomey & Jennings BUSINESS LAW Chapter 11 Cyberlaw.
WHAT IS E-COMMERCE? E-COMMERCE is a online service that helps the seller/buyer complete their transaction through a secure server. Throughout the past.
Computer crimes.
CONTROLLING INFORMATION SYSTEMS
Chapter 11 CYBERLAW. 2 Cyberlaw is not a new body of laws. Cyberlaw is not a new body of laws. Cyberlaw is the application of existing laws and legal.
Computer Security By Duncan Hall.
Comprehensive Volume, 18 th Edition Chapter 11: Cyberlaw.
Credit:  Cyber law refers to any laws relating to protecting the Internet and other online communication technologies.
Intellectual Property. Confidential Information Duty not to disclose confidential information about a business that would cause harm to the business or.
Protecting Yourself from Fraud including Identity Theft Personal Finance.
Chapter 10 – Crimes Against Property. Arson The willful and malicious burning of a person’s property Intentionally burning a building to defraud the insurance.
Lecture 3 Ethics in the Workplace Privacy and Social Networks.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Cybersecurity Test Review Introduction to Digital Technology.
Whats it all about?.  C omputer crime refers to any crime that involves a computer and a network. The computer may have been used in the commission of.
Cyber Law And Ethics And Ethics.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Chapter 11 crime and security in the networked economy
Section 19.1 Cyberlaw and Cybercrime. Section 19.1 Cyberlaw and Cybercrime.
Protecting Yourself from Fraud including Identity Theft
Ethical Use of Computers
Forensic and Investigative Accounting
Presentation transcript:

Cyber Crimes: Online Ticketing Fraud By: Erin Dobbs, Blaine Skrainka, Nick Worth, Kyle Stamper, Suzy Kiska

Four Indicted in $25 Million Scheme Defrauding and Hacking Ticketmaster, Tickets.com, and Other Ticket Vendors  Wiseguy Tickets made a profit of over $25 million  Illegally bought mass quantities of tickets and resold them above face value  Defendants accused of 43 counts of Wire Fraud

CAPTCHA Technology CAPTCHA technology is a challenge-response test used by online vendors to ensure that the user is an individual human being. Wiseguy developed programs to successfully bypass both visual and audio CAPTCHA tests. This allowed them to illegally buy mass quantities of tickets, sell them at a premium, and unfairly block the public from access to the tickets.

Federal Laws Impacted The four gentlemen involved in this case are charged with conspiracy to commit wire fraud and to gain unauthorized access and exceed authorized access to computer systems. The indictment also charges 42 additional counts of wire fraud; gaining unauthorized access and exceeding authorized access to computer systems; or causing damage to computers in interstate commerce. 18 U.S.C. § Fraud and Related Activity in Connection with Access Devices 18 U.S.C. § Fraud and Related Activity in Connection with Computers 18 U.S.C. § 2510 et seq. Wire and Electronic Communications Interception and Interception of Oral Communications 18 U.S.C. § 2701 et seq. Stored Wire and Electronic Communications and Transactional Records Access Specific Laws Impacted: The Indictment: l

State Laws Impacted Though the defendants are indicted on a Federal level there are New Jersey state statutes that protect the general public from cyber crime. Specific State Statutes Impacted: 2C:20-4. Theft by deception 2C:20-8. Theft of services 2C:20-25 Computer criminal activity; degree of crime; sentencing. 2C:20-31 Wrongful access, disclosure of information; degree of crime; sentencing. 2C: Definitions relative to scanning devices, reencoders; criminal use, degree of crime. statutes.pdf **Local Newark, New Jersey cyber crime laws or regulations were unavailable

Issues Enabling Problematic Behavior  Able to deploy a nationwide computer network  Opened 1000s of simultaneous Internet connections across the U.S.  Impersonated 1000s of individual ticket buyers  Defeated online ticket vendor’s security  Sold fraudulently obtained tickets to brokers

Security and Fraud Measures  All Failed  Surprisingly few  Audio and visual CAPTCHA  Distorted letters or numbers  Created fake Internet domains  Created and modified the computer networks and software

Penalties In This Case  Suspects indicted by Federal Grand jury Federal Grand jury  Charges include:  Wire fraud  Conspiracy to commit wire fraud  Unauthorized computer access  Computer hacking

Penalties In This Case  What punishments are the suspects facing?  5 years prison for conspiracy charge  20 years prison on each of the 42 counts of wire fraud  5 years prison and $250,000 fine for each of the 19 counts of unauthorized access and exceeding authorized access to computers  10 years prison for each of the six counts of damage to computers in interstate commerce  In addition, the suspects face a fine of $250,000 per count of conviction

Punishment of Past Computer Hacking Cases  What kind of punishment has computer hacking rendered in the past?  Large Fines  Can be as large as $250,000 for each charge  Prison Sentences  For Example, one case has a suspect facing 60 years of prison for hacking into the Pentagon’s computer system

How Should Computer Hacking Affect IT Management?  Essential to secure company information  Hire cyber security companies to protect a business’s vital information  Secure world wide web gateways to company’s network

How Should Computer Hacking Affect IT Management?  Get data stored in fully secure data center and monitor what is coming in and going from center  Background check and monitor employees  A big threat is from within a company  Employees that know passwords, etc.

Keys For Management to Secure Networks  Design and build with security in mind including:  Encrypted entries  Limit # of connections to Internet  Use network monitoring systems to keep track of what is going where

Questions???