Crime Chapter 5. Hacking – some definitions Hacker Trophy hacking Phone phreaking Cracker White-hat hackers & black-hat hackers Script kiddies Sniffers.

Slides:



Advertisements
Similar presentations
Chapter 7: Planned Borrowing. Objectives Discuss the elements of the planned use of credit. Establish your own debt limit. Understand the language of.
Advertisements

1 If You Are Me, Then Who Am I? Tips on Identity Theft Prevention California Office of Privacy Protection.
Fighting Back Against Identity Theft A Presentation for CSM564 – Dr. Price By Matt Poole.
I.D. Theft Alaska’s New Protection of Personal Information Act Ed Sniffen Senior Assistant Attorney General Alaska Department of Law.
Presented By Drexel and FMFCU.
Security and Trust in E- Commerce. The E-commerce Security Environment: The Scope of the Problem  Overall size of cybercrime unclear; amount of losses.
Identity Theft. Identity Theft – Some Basics affects million people per year keeps increasing each year most common items exposed during a data.
1. What is Identity Theft? 2. How Do Thieves Steal An Identity? 3. What Do Thieves Do with Stolen Identities? 4. What Can I Do To Avoid Becoming a Victim?
Preventing Identity Theft Beware the Trails You Leave Behind Use limitations: These materials may be used only for nonprofit, noncommercial educational.
IDENTITY THEFT AND FRAUD CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Deter, Detect, Defend: The FTC’s Program on Identity Theft.
1 Identity Theft and Phishing: What You Need to Know.
National Association of Student Financial Aid Administrators The following is a presentation prepared for NASFAA’s 2007 Conference in Washington, DC July.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
BEWARE! IDENTITY THEFT CARL JOHNSON FINANCIAL LITERACY JENKS HIGH CSHOOL.
Identity Theft Someone steals your personal information for his/her own gain It’s a crime!
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Identity Theft.
Identity Theft By: Tory Childs, Lucas Doyle, Kaitlyn Davidson, Trevor Godwin and Chad Sponseller.
1.3.1.G1 © Family Economics & Financial Education – Revised October 2004 – Consumer Protection Unit – Identity Theft Funded by a grant from Take Charge.
Section 6.3 Protecting Your Credit. Billing Errors and Disputes Notify your creditor in writing Notify your creditor in writing Pay the portion of the.
CONSUMER CREDIT LEGISLATION Carl Johnson Financial Literacy Jenks High School.
Chapter 9-Section 3 Consumer Protection Laws. Consumer Credit  Credit Denial  If denied credit there could be something in your credit file preventing.
1 Identity Theft: What You Need to Know. 2 Identity Theft Identity theft is a crime of stealing key pieces of someone’s identifying information, such.
8 Mistakes That Expose You to Online Fraud to Online Fraud.
Security, Privacy, and Ethics Online Computer Crimes.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
Credit Card Fraud PRESENTED BY THE VIRGINIA OFFICE OF THE ATTORNEY GENERAL June 2013.
Identity-Theft is the fastest growing crime in America; 9.9 MILLION victims were reported last year, according to a Federal Trade Commission survey!
Dealing the Cards of Credit Credit cards No set time to be paid back May pay in full, part, or minimum payment No finance charge if bill paid in full.
Lesson 9-3 Consumer Protection Laws LEARNING GOALS -LIST AND EXPLAIN CONSUMER PROTECTION LAWS THAT ARE RELATED TO CREDIT -DISCUSS THE PROCESSES OF USING.
OCPA NEIGHBORHOOD WATCH PROGRAM THE OHIO CRIME PREVENTION ASSOCIATION IDENTITY THEFT.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
CONSUMER PROTECTION AND LITIGATION: CONSUMER PROTECTION AND LITIGATION: Ryan Mehm Attorney Bureau of Consumer Protection Federal Trade Commission The views.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
April 25, 2014 Entry task: What does APR stand for? What does it mean? Target: Select a credit card based on terms and conditions.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
CreditUnitReview JEOPARDY Consumer credit The use of credit for personal or individual needs.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Consumer Credit Laws. Fair Credit Reporting ACT o Provides rules for accessing/correcting credit reports o Requires lenders to tell you why you were denied.
Building: Knowledge, Security, Confidence Charge It Right FDIC Money Smart for Young Adults.
Protecting Yourself Against Identity Theft By Sierra Monif Next.
CJ230 Unit 9 Seminar. Expectations for the Week Read Chapter 13 in Contemporary Criminal Law Read Chapter 13 in Contemporary Criminal Law Respond to the.
Chapter 9-Section 1 Resolving Credit Problems. Disputing Charges—Credit Card Statement  Disputing Charges—the process of informing a credit card company.
PRIVACY IN COMPUTING BY: Engin and Will. WHY IS PRIVACY IMPORTANT? They can use your computer to attack others (money, revenge) They can use your computer.
© Oklahoma State Department of Education. All rights reserved. 1 Beware! Consumer Fraud Standard 9. 1 Fraud and Identity Theft.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Chapter 5 Crime.
By: Asfa Khan and Huda Mukhtar
Chapter 15 Credit. Factors to Consider Before Using Credit Chapter 15 Consumer Credit What should you know before using credit? Do you have the cash you.
Jeff loses his identity! Lesson 8: Identity Theft.
© 2013 BALANCE / REV0513 Identity Theft Identity theft can be one of the most shocking and upsetting events to ever happen to you. Fortunately, there are.
Identity Theft What is it, is identity theft really a problem, how can I protect myself, what do I do if my Identity is stolen.
November 20, 2015 Entry task: List two do’s and two don’ts for credit card use. Target: Identify how to use credit cards properly to establish good credit.
Protecting Your Assets By Preventing Identity Theft 1.
Identity Theft PD Identity Theft Identity theft is a serious crime which can: Cost you time and money Destroy your.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Protecting Yourself from Fraud including Identity Theft Advanced Level.
Unit Five Your Money – Keeping It Safe and Secure Identity Theft Part II Resource: NEFE High School Financial Planning Program.
Identity Theft The fastest growing type of fraud..
Credit and debt management. Student Learning Objective Compare and contrast the financial benefits of different products and services offered by a variety.
SCAMS and FRAUDS How to Recognize Them and Ways You Can Protect Yourself Presented by the Criminal Investigations Division, Morganton Department of Public.
Jeff loses his identity! Lesson 5: Identity Theft.
Analyzing Credit and Debt  When you use credit responsibly it can be very convenient because you can use it to buy things now and pay for them later by.
Identity Theft It’s a crime!
Add video notes to lecture
IT Security  .
When you get caught for Identity Theft
Protecting Your Credit
Presentation transcript:

Crime Chapter 5

Hacking – some definitions Hacker Trophy hacking Phone phreaking Cracker White-hat hackers & black-hat hackers Script kiddies Sniffers Social engineering

Hacking Cases 1970s – John Draper (“Captain Crunch”) Kevin Mitnick April 27, 1987 – “Captain Midnight” Good Evening HBO from Captain Midnight. $12.95 a month? No way! (Show- time/Movie Channel, Beware!) Late 1980s – “Fry Guy” Russian man & Citicorp 1991 – “Michelangelo” virus Viruses, time bombs, logic bombs Gambling web site Air traffic controllers in England 1999 – “Melissa” virus 2000 – The “Love Bug” or “ILOVEYOU” virus

Whose Laws Rule the Web? ILOVEYOU virus infected millions of computers worldwide, destroying files, collecting passwords, and shutting down computer systems at major corporations and government agencies this was the one written by a student from the Phillippines – charges were dropped because they had no laws against releasing a virus at the time … what should happen to him if he were to travel to the U.S., Canada, France, Germany, or any other country where the virus did damage? Other cases in the book… pages

Hacking Cases 2000 – Mafiaboy Denial of service attack (DoS); distributed denial of service attack (DDoS); Trojan Horses PCWorld article: a_hacker_seeks_redemption.html a_hacker_seeks_redemption.html 2001 – Hacktivism 2001 – “Code Red” worm worm 2003 – “Sapphire” worm or “Slammer” 2003 – “Blaster” worm 2004 – “Sasser” worm 2001 – “Choke” & “Hello” worms 2008 – Sarah Palin’s hacked – credit cards breached cards/3-charged-for-card-breach.aspxhttp:// cards/3-charged-for-card-breach.aspx

Firewalls Windows Firewall – Start, Control Panel, Security MacOS – System Preferences, Personal Security 3 rd Party Firewalls Zone Alarm (free version – PC Magazine page with more info: Top 5:

First Amendment Software is a form of speech. The First Amendment does not protect some kinds of speech, such as inciting a riot. Should virus software on the Web be protected under the First Amendment or should it be considered in the same class as that of inciting a riot?

Virus Code Online The families of two hospital patients that died as the result of a virus in a hospital computer are suing each of the people listed below and urging the government to bring criminal charges for negligence against each of them: 1. A student in a course on computer security at a small college who posted a copy of the virus program on the class Web site, with a discussion of how it works. 2. The student who activated the virus and released it onto the Internet. 3. The president of the college. 4. The president of the college’s ISP. 5. The director of the hospital whose computer system the virus infected, causing the patient medical records to be unavailable for a full day, resulting in the deaths of the two patients.

Identity Theft Stolen credit/debit card numbers to purchase things with or to sell SSN numbers used to open new accounts Take out loans in someone else’s name Raid the victim’s bank account Pass bad checks

Methods of Identity Theft Phishing Vishing Pharming Whaling Resumes online SSNs Dumpster diving Mailbox theft Pretexting Shoulder surfing

Methods of Identity Theft Social networking sites Filesharing and peer-to-peer software Bogus job offers Fake sweepstakes or lotteries Hacking Lost or stolen property Workers in your home Changing your address Copying information from a transaction Credit reports RFID readers

How the Victim is Affected May result in monetary losses Anguish, disruption of his or her life Legal fees Loss of a good credit rating Be prevented from borrowing money or cashing checks Lose a job Unable to rent an apartment Sued by creditors to whom the criminal owes money And… the authorities are slow to act on your behalf

How To Protect Yourself Don’t carry checkbook, SSN card, or all your credit cards with you all the time Keep your SSN private Shred your credit card offers, etc. Use updated anti-spyware/anti-theft software on your computer Never give out personal info over the phone Monitor your credit reports Be careful of using your credit cards in restaurants

If You Think You’ve Been a Victim of Identity Theft: 1. Police report 2. Fraud alert 3. Credit freeze

What Are Your Rights? Truth in Lending – Federal law passed in 1968 that protects consumers in credit transactions by requiring clear disclosure of key terms of the lending agreement and all costs Fair Credit Reporting Act – originally passed in 1970; enforced by the FTC - regulates the collection, dissemination, and use of consumer information. Fair Credit Billing Act – an amendment to the Truth In Lending Act, passed in 1986, to protect consumers from unfair billing practices and to provide a mechanism for dealing with billing errors; applies to “open end” credit accounts, such as credit cards and other revolving charge accounts. Examples of errors and other info:

The Credit Card Act of 2009 The latest update of the Truth In Lending Act to protect consumers from abusive tactics used by credit card companies: day advance notice of change in rates or late fees 2. No more retroactive interest rate hikes 3. No more raising interest rates based on other, unrelated cards or utility bills 4. Payment due dates must be at least 21 days after mailing of bill 5. Extra payment above minimum due must be applied to higher rate balances 6. Must “opt-in” to over-the-limit fees; plus other fee restrictions 7. Must disclose to consumers how long it will take to pay off; also payments for paying off within 12, 24, or 36 months 8. Restricts card issuance to students 9. Gift card protections

Establishing Good Credit College students are (used to be) targets Checking account Department store cards Prepaid cards Co-signer on applications

Crime Fighting vs Privacy & Civil Liberties 4 th Amendment requires that search warrants be specific about what is to be searched or seized … so what happens when authorities are searching a computer for one thing and finds other illegal activities, or illegal activities by other people who use that same computer? … or when a computer technician is servicing someone’s computer and finds what he believes is illegal material on the person’s computer – see if you can find out whatever happened in the Washington State vs Westbrook case, where this happened and the technician reported it to authorities