14 Technology and Crime.

Slides:



Advertisements
Similar presentations
Cyber Crime and Technology
Advertisements

A Gift of Fire, 2edChapter 7: Computer Crime1 Computer Crime.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
Crime and Security in the Networked Economy Part 4.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education, Inc. publishing as Prentice Hall 5-1.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
Chapter 5 Computer Fraud Copyright © 2012 Pearson Education 5-1.
Chapter Extension 24 Computer Crime and Forensics © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
The Patriot Act And computing. /criminal/cybercrime/PatriotAct.htm US Department of Justice.
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Page 1 Presented Insp. Amos Sylvester Trinidad and Tobago Police Service.
Chapter 14 Crime and Justice in the New Millennium
Responding to Cybercrime in the Post-9/11 World Scott Eltringham Computer Crime and Intellectual Property Section U.S. Department of Justice (202)
© 2003 Prentice-Hall, Inc. 1 Chapter 17 The Future of Criminal Justice.
Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Forensics BACS 371
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
CYBER CRIME AND SECURITY TRENDS
Objectives Overview Define the term, digital security risks, and briefly describe the types of cybercriminals Describe various types of Internet and network.
Computer Crime and CyberCrime Why we need Computer Forensics.
1 Group-IB: Digital investigations and forensic Ilya Sachkov Group-IB
Copyright © 2008 by West Legal Studies in Business A Division of Thomson Learning Chapter 11 Cyberlaw Twomey Jennings Anderson’s Business Law and the Legal.
© 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part, except for use as permitted in a license.
Cyber Crimes.
The Future of Criminal Justice Chapter 18 Frank Schmalleger Criminal Justice Today 13 th Edition.
Cyber crime & Security Prepared by : Rughani Zarana.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Information Warfare Playgrounds to Battlegrounds.
Crime & Malpractice AS Module Heathcote Ch. 10.
1 Book Cover Here PART D THE INFLUENCE AND IMPACT OF TECHNOLOGY Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright ©
Computer Forensics Principles and Practices
Lecture 11: Law and Ethics
Computer Security Management: Assessment and Forensics Session 8.
Chapter 9 Enhancing Information/Computer Security.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
1 Policy Types l Program l Issue Specific l System l Overall l Most Generic User Policies should be publicized l Internal Operations Policies should be.
3.2 Notes Crime Scene Reconstruction, Forensic Databases.
Computer Forensics Law & Privacy © Joe Cleetus Concurrent Engineering Research Center, Lane Dept of Computer Science and Engineering, WVU.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
Cybercrime What is it, what does it cost, & how is it regulated?
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2013 CCH Incorporated. All Rights Reserved W. Peterson Ave.
Information Warfare Playgrounds to Battlegrounds.
© 2010 Pearson Education, Inc., publishing as Prentice-Hall 1 INTERNET LAW AND E-COMMERCE © 2010 Pearson Education, Inc., publishing as Prentice-Hall CHAPTER.
West Midlands Police response to Cybercrime: Local, Regional and National capabilities DCI Iain Donnelly.
Security and Ethics Safeguards and Codes of Conduct.
Regional Telecommunications Workshop on FMRANS 2015 Presentation.
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Chapter 14 Technology and Crime Frank Schmalleger PowerPoint presentation created by Ellen G. Cohn, Ph.D.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
14 Cybercrime.
Law and Ethics INFORMATION SECURITY MANAGEMENT
Securing Information Systems
Add video notes to lecture
A Project on CYBER SECURITY
Chapter 11 crime and security in the networked economy
Securing Information Systems
Forensic and Investigative Accounting
Challenges and Successes in the Zambian ICT Security Sector
Forensic and Investigative Accounting
Chapter 12 Technology and Crime: It’s a Double-Edged Sword
Presentation transcript:

14 Technology and Crime

The Advance of Technology Technology and criminology have always been closely linked Technology can be used by crime fighters and lawbreakers As technology progresses, it facilitates new forms of behavior, including new crimes

High Technology and Criminal Opportunity Routes to illegitimate access to computerized information Direct access Computer trespass Cybercrime any violation of a federal or state computer-crime statute continued on next slide

High Technology and Criminal Opportunity Types of cybercrime Internal cybercrimes Internet/telecommunications crimes Support of criminal enterprises Computer-manipulation crimes Hardware, software, and information theft Money today is information

The Extent of Cybercrime Software piracy The unauthorized and illegal copying of software programs Phishing An Internet-based scam that uses official-looking e-mail messages to steal valuable information May threaten the viability of e-commerce continued on next slide

The Extent of Cybercrime Not all cybercrime is committed for financial gain Criminal mischief creating/transmitting malicious forms of programming code

Cybercrime and the Law Communications Decency Act (1996) Reno v. ACLU No Electronic Theft Act (1997) Digital Theft Deterrence and Copyright Damages Improvement Act (1999) Cyber Security Enhancement Act (2002) continued on next slide

Cybercrime and the Law Computer-related crime Any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution continued on next slide

Cybercrime and the Law Computer abuse Any incident associated with computer technology in which a victim suffered or could have suffered loss and perpetrator intentionally gained or could have gained

The History and Nature of Hacking Computer hacking may have started in the late 1950s with the creation of the interstate phone system and direct distance dialing continued on next slide

The History and Nature of Hacking Phone phreaks Used special telecommunications access codes and other restricted technical information to avoid paying long-distance charges Modern version involves electronic theft of cell phone numbers and access codes Voice mail hacking and voice mail fraud

A Profile of Cybercriminals Cybercriminals tend to come from hacker subculture because hackers and hacker identities are a product of cyberspace continued on next slide

A Profile of Cybercriminals Average hacker Male between 16-25 who lives in the US Computer user but not programmer Hacks with software written by others Primary motivation is to gain access to Web sites and computer networks continued on next slide

A Profile of Cybercriminals Hacker typology based on psychological characteristics Pioneers Scamps Explorers Game players Vandals Addicts continued on next slide

A Profile of Cybercriminals Not all hackers are kids - some are high-tech computer operators

Cybercrime as a Form of White-Collar Crime Some see computer crime as a new form of white-collar crime. There are many similarities between the two: Both often committed through nonviolent means Access to computers or storage media often needed Involve information manipulations creating profits or losses continued on next slide

Cybercrime as a Form of White-Collar Crime Some see computer crime as a new form of white-collar crime. There are many similarities between the two: Both can be committed by individuals or organizations Both are difficult to detect Viewed them as less serious than violent crimes continued on next slide

Cybercrime as a Form of White-Collar Crime Some see computer crime as a new form of white-collar crime. There are many similarities between the two: Both cost individuals, organizations, and society large amounts of money and other resources Prevention requires a combination of legal, technical, managerial, security, and audit-monitoring controls

Technology in the Fight Against Crime Technology is a double-edged sword Provides criminals new weapons to commit crimes Provides the criminal justice system with new tools to fight crime Criminally useful or evasive technologies and law enforcement capabilities commonly leapfrog one another

DNA Technology DNA profiling The use of biological residue found at a crime scene for genetic comparisons to help identify suspects DNA evidence long-lasting Highly reliable but not infallible The greatest threat to reliable results is human error in conducting the tests continued on next slide

DNA Technology Daubert standard Test to determine whether a form of scientific evidence is reliable Key factors: It has been subjected to testing It has been subjected to peer review It has known/potential rates of error It has standards controlling application of the techniques involved continued on next slide

DNA Technology Most states and the federal government have digitized forensic DNA databases FBI’s National DNA Index System (NDIS) All states have legislation requiring convicted offenders to provide samples for DNA databases DNA Identification Act of 1994

Computers and Crime-Fighting Tools Computers used to keep records Computers help design new technology and assign resources to problem areas Computers connect people continued on next slide

Computers and Crime-Fighting Tools Expert systems Computer hardware and software system that tries to duplicate the decision-making processes used by investigators in analyzing evidence and recognizing patterns

Combating Cybercrime Threat analysis (risk analysis) a complete and thorough assessment of the kinds of perils facing an organization continued on next slide

Combating Cybercrime Once threats are identified, strategies to deal with them can be introduced An audit trail traces/records activities of computer operators and allows auditors to examine the sequence of events relating to any transaction A powerful tool for identifying instances of computer crime

Police Investigation of Computer Crime Many police departments lack personnel skilled in the investigation of computer crimes May intentionally avoid computer-crime investigations Many departments place a low priority on computer crime continued on next slide

Police Investigation of Computer Crime FBI’s National Computer Crime Squad investigates violations of federal computer crime laws DCS-3000 network “sniffer” focuses on intercepting suspect personal communications delivered via wireless services

Cybercrime and Internet Security Information is the lifeblood of the modern age – needs to be moved safely and securely Commission on Critical Infrastructure Protection National Infrastructure Protection Center (1998) Succeeded by the Office of Infrastructure Protection (part of DHS) continued on next slide

Cybercrime and Internet Security U.S. Computer Emergency Readiness Team (2003) Pres. Obama has identified cybersecurity as one of the most serious economic and national security challenges facing the U.S. continued on next slide

Cybercrime and Internet Security In 2009, announcement appoint of first White House Cybersecurity Coordinator Responsible for coordinating cybersecurity activities across the federal government Howard A. Schmidt

Policy Issues: Personal Freedoms in the Information Age First Amendment Freedom of speech Are electronic communications protected? Fourth Amendment Freedom from unreasonable searches and seizures Does this include electronic information?