Presentation is loading. Please wait.

Presentation is loading. Please wait.

Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics.

Similar presentations


Presentation on theme: "Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics."— Presentation transcript:

1 Computer Crimes Justin A. Sarvey

2 Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics on computer crime Statistics on computer crime How to Protect Yourself How to Protect Yourself What can be done to stop computer crime What can be done to stop computer crime Conclusion Conclusion

3 Computer Crime Committed when a computer is the target of a crime, or the means to commit a crime Committed when a computer is the target of a crime, or the means to commit a crime Most of these crimes are not new except for the tools used Most of these crimes are not new except for the tools used Criminals use new methods, such as the Internet, to commit fraud, forgery, blackmail and embezzlement Criminals use new methods, such as the Internet, to commit fraud, forgery, blackmail and embezzlement

4 Computer Crime There are three major classifications of computer crime: There are three major classifications of computer crime: 1. Unauthorized use of a Computer 1. Unauthorized use of a Computer 2. Creating or releasing a malicious computer program 2. Creating or releasing a malicious computer program 3. Cyber stalking and harassment 3. Cyber stalking and harassment

5 Types of Computer Crime Fraud Fraud Piracy Piracy Harassment Harassment Cyber Terrorism Cyber Terrorism Child Pornography Child Pornography Identity Theft Identity Theft Theft of Company Secrets Theft of Company Secrets

6 Fraud Any dishonest misrepresentation of fact intended to induce another to do or refrain from doing something which causes loss Any dishonest misrepresentation of fact intended to induce another to do or refrain from doing something which causes loss Most notorious example of fraud is the unauthorized use of credit cards Most notorious example of fraud is the unauthorized use of credit cards

7 Piracy Deals with copying copyrighted material and either possessing or selling that material Deals with copying copyrighted material and either possessing or selling that material Examples Examples Burning DVD’s and then selling them Burning DVD’s and then selling them Downloading music off of the Internet Downloading music off of the Internet The Copyright and Related Rights Regulations of 2003 The Copyright and Related Rights Regulations of 2003 Designed to deal with protecting information online Designed to deal with protecting information online

8 Harassment Directs obscenities and derogatory comments at specific individuals focusing on gender, race, religion, nationality and sexual orientation Directs obscenities and derogatory comments at specific individuals focusing on gender, race, religion, nationality and sexual orientation Often occurs in chat rooms, newsgroups and sending hate emails Often occurs in chat rooms, newsgroups and sending hate emails People using the Internet to defame others People using the Internet to defame others New laws state: If a reasonable person in possession of the same information would think the course of conduct amounted to harassment of the other, the knowledge will be imputed to the defendant New laws state: If a reasonable person in possession of the same information would think the course of conduct amounted to harassment of the other, the knowledge will be imputed to the defendant

9 Cyber Terrorism Cyber Terrorism – an act of terrorism committed through the use or cyber space or computer resources Cyber Terrorism – an act of terrorism committed through the use or cyber space or computer resources Cyber terrorist – someone who intimidates or coerces a government or organization to advance his or her political or social objectives Cyber terrorist – someone who intimidates or coerces a government or organization to advance his or her political or social objectives Done by launching computer based attack against computers, network, and the information stored on them Done by launching computer based attack against computers, network, and the information stored on them Government officials have seen a significant increase in Internet probes and server scans since 2001 Government officials have seen a significant increase in Internet probes and server scans since 2001 Officials concerned that terrorists will take advantage of vulnerabilities in critical systems Officials concerned that terrorists will take advantage of vulnerabilities in critical systems

10 Cyber Terrorism National Infrastructure Protection Center National Infrastructure Protection Center Founded in February 1998 Founded in February 1998 Designed to combat cyber terrorism Designed to combat cyber terrorism Became part of Homeland Security after 2001 Became part of Homeland Security after 2001 Serves as focal point for threat assessment, warning, investigation, and response for threats or attacks against our countries critical infrastructure Serves as focal point for threat assessment, warning, investigation, and response for threats or attacks against our countries critical infrastructure Includes: banks, energy, telecommunications, water systems, government organizations, and emergency services Includes: banks, energy, telecommunications, water systems, government organizations, and emergency services If an attack was to occur on one of these systems it could be disastrous If an attack was to occur on one of these systems it could be disastrous

11 Child Pornography Visual depiction of minors engaged in a sex act as well as lascivious depictions of the genitals Visual depiction of minors engaged in a sex act as well as lascivious depictions of the genitals Prohibited under both federal and state laws Prohibited under both federal and state laws Texts which depicts sexual acts of minors are not considered child pornography Texts which depicts sexual acts of minors are not considered child pornography

12 Child Pornography & Child Predators Sting operations Sting operations District Attorney Offices District Attorney Offices Dateline NBC “To Catch a Predator” Dateline NBC “To Catch a Predator” Police, FBI and ICE Police, FBI and ICE Child pornography has become a key issue Child pornography has become a key issue Many police organizations are trying to help put a stop to it Many police organizations are trying to help put a stop to it

13 Child Pornography & Child Predators Problems: Problems: Many of the individuals caught by Dateline have not been prosecuted Many of the individuals caught by Dateline have not been prosecuted The people luring the offender were not legal law officers The people luring the offender were not legal law officers As a result in the new episodes the people luring the offenders are made honorary deputies As a result in the new episodes the people luring the offenders are made honorary deputies

14 Child Pornography & Child Predators It is argued that the police officers are entrapping the offenders. It is argued that the police officers are entrapping the offenders. The officer enticed the individual to talk to the minor The officer enticed the individual to talk to the minor The person isn’t really a minor The person isn’t really a minor How competent are the officers working on these cases? How competent are the officers working on these cases? Are the counts of pornography accurate? Are the counts of pornography accurate?

15 Theft of Company Secrets Big concern for companies Big concern for companies Easy access because it’s done by someone from the inside Easy access because it’s done by someone from the inside Easy to do with today’s technology Easy to do with today’s technology Thumb drive Thumb drive Palm pilot Palm pilot Email Email Personal Computers Personal Computers

16 Theft of Company Secrets What can be done to stop it? What can be done to stop it? Tough computer use policies Tough computer use policies Surprise inspections of the computer Surprise inspections of the computer Limit the number of employees that are allowed laptops Limit the number of employees that are allowed laptops Monitor the use of email and network Monitor the use of email and network

17 Identity Theft Occurs when someone wrongfully acquires or uses another person’s personal data, typically for their own financial gain Occurs when someone wrongfully acquires or uses another person’s personal data, typically for their own financial gain A growing concern for consumers in the United States A growing concern for consumers in the United States Costs Americans millions of dollars a year and takes hours of work to clear your credit Costs Americans millions of dollars a year and takes hours of work to clear your credit

18 Identity Theft Usually obtained by: Usually obtained by: Rummaging through the trash Rummaging through the trash Eavesdropping on public telecommunications Eavesdropping on public telecommunications Infiltration of organizations that store personal data Infiltration of organizations that store personal data Impersonating a trusted organization in an electronic communication Impersonating a trusted organization in an electronic communication Spam – responding to contests Spam – responding to contests

19 Examples of Identity Theft Social Security Number is stolen Social Security Number is stolen Credit card or bank card is stolen Credit card or bank card is stolen Account number is stolen Account number is stolen Address or phone number is stolen Address or phone number is stolen

20 Identity Theft Thieves can use your social security number to impersonate you Thieves can use your social security number to impersonate you Thieves can steal your bank card and/or credit card number to rack up charges on your account Thieves can steal your bank card and/or credit card number to rack up charges on your account Thieves can use your address and phone number to open up accounts in your name Thieves can use your address and phone number to open up accounts in your name

21 Ways to Protect Yourself From Identity Theft Never reveal personal information to a company over the phone Never reveal personal information to a company over the phone If someone does call and ask for information ask them to tell you when the last time was that you made a payment, the amount, and your mother’s maiden name If someone does call and ask for information ask them to tell you when the last time was that you made a payment, the amount, and your mother’s maiden name Don’t be fooled and respond to emails stating you’ve won 1 million dollars Don’t be fooled and respond to emails stating you’ve won 1 million dollars Install a firewall and privacy software Install a firewall and privacy software Shred all important documents Shred all important documents

22 Statistics In 2005 cost business 67.2 billion dollars In 2005 cost business 67.2 billion dollars In the past two years U.S. consumers lost more than 8 billion dollars to viruses, spyware, and online fraud schemes In the past two years U.S. consumers lost more than 8 billion dollars to viruses, spyware, and online fraud schemes In 2004 3.6 million Americans were affected by identity theft In 2004 3.6 million Americans were affected by identity theft 3 in 10 households experience some form of identity theft 3 in 10 households experience some form of identity theft 2/3 of individuals who experienced identity theft reported some sort of financial loss 2/3 of individuals who experienced identity theft reported some sort of financial loss Individuals in the 18-24 age range are most likely to become a victim Individuals in the 18-24 age range are most likely to become a victim

23 Statistics The child pornography industry generates over 20 billion dollars a year in revenue The child pornography industry generates over 20 billion dollars a year in revenue Since 1988 the number of Internet child pornography pictures grew by 1300 percent Since 1988 the number of Internet child pornography pictures grew by 1300 percent Over 3.5 million child pornography images have been identified by U.S. law enforcement Over 3.5 million child pornography images have been identified by U.S. law enforcement

24 Statistics on Cyber Stalking 443 cases for calendar year 2005 196 cases for calendar year 2004 198 cases for calendar year 2003 443 cases for calendar year 2005 196 cases for calendar year 2004 198 cases for calendar year 2003 50 percent of individuals knew their offender 50 percent of individuals knew their offender 48 percent of individuals did not know their offender 48 percent of individuals did not know their offender

25 Statistics on Cyber Stalking

26

27 Stopping Computer Crimes Create larger budgets for law enforcement Create larger budgets for law enforcement Train law enforcement agencies about computer crimes Train law enforcement agencies about computer crimes Hire more officers to work in the computer crime department Hire more officers to work in the computer crime department Train the general public about computer crimes and the risks associated with it Train the general public about computer crimes and the risks associated with it

28 Conclusion Computer Crime - Committed when a computer is the target of a crime, or the means to commit a crime Computer Crime - Committed when a computer is the target of a crime, or the means to commit a crime Types of Computer Crime Types of Computer Crime Fraud Fraud Piracy Piracy Harassment Harassment Cyber Terrorism Cyber Terrorism Child Pornography Child Pornography Identity Theft Identity Theft Problems with prosecuting child pornography Problems with prosecuting child pornography Individuals in the 18-24 age range are the most susceptible to identity theft Individuals in the 18-24 age range are the most susceptible to identity theft

29 Sources http://www.crime-research.org/news/12.10.2006/2290/ http://www.crime-research.org/news/12.10.2006/2290/ http://www.crime-research.org/news/12.10.2006/2290/ http://www.protectkids.com/dangers/stats.htm http://www.protectkids.com/dangers/stats.htm http://www.protectkids.com/dangers/stats.htm http://www.consumeraffairs.com/news04/2006/04/id_theft_stats02. html http://www.consumeraffairs.com/news04/2006/04/id_theft_stats02. html http://www.consumeraffairs.com/news04/2006/04/id_theft_stats02. html http://www.consumeraffairs.com/news04/2006/04/id_theft_stats02. html http://www.ojp.usdoj.gov/bjs/abstract/it04.htm http://www.ojp.usdoj.gov/bjs/abstract/it04.htm http://www.ojp.usdoj.gov/bjs/abstract/it04.htm http://www.haltabuse.org/resources/stats/resolution.shtml http://www.haltabuse.org/resources/stats/resolution.shtml http://www.haltabuse.org/resources/stats/resolution.shtml http://en.wikipedia.org/wiki/Computer_crime http://en.wikipedia.org/wiki/Computer_crime http://en.wikipedia.org/wiki/Computer_crime http://en.wikipedia.org/wiki/Computer_crime#Fraud http://en.wikipedia.org/wiki/Computer_crime#Fraud http://en.wikipedia.org/wiki/Computer_crime#Fraud http://en.wikipedia.org/wiki/Computer_crime#Harassment http://en.wikipedia.org/wiki/Computer_crime#Harassment http://en.wikipedia.org/wiki/Computer_crime#Harassment http://en.wikipedia.org/wiki/Computer_crime#Cyberterrorism http://en.wikipedia.org/wiki/Computer_crime#Cyberterrorism http://en.wikipedia.org/wiki/Computer_crime#Cyberterrorism


Download ppt "Computer Crimes Justin A. Sarvey. Overview Define computer crime Define computer crime Examples of computer crime Examples of computer crime Statistics."

Similar presentations


Ads by Google