Presentation is loading. Please wait.

Presentation is loading. Please wait.

14 Technology and Crime.

Similar presentations


Presentation on theme: "14 Technology and Crime."— Presentation transcript:

1 14 Technology and Crime

2 The Advance of Technology
Technology and criminology have always been closely linked Technology can be used by crime fighters and lawbreakers As technology progresses, it facilitates new forms of behavior, including new crimes

3 High Technology and Criminal Opportunity
Routes to illegitimate access to computerized information Direct access Computer trespass Cybercrime any violation of a federal or state computer-crime statute continued on next slide

4 High Technology and Criminal Opportunity
Types of cybercrime Internal cybercrimes Internet/telecommunications crimes Support of criminal enterprises Computer-manipulation crimes Hardware, software, and information theft Money today is information

5 The Extent of Cybercrime
Software piracy The unauthorized and illegal copying of software programs Phishing An Internet-based scam that uses official-looking messages to steal valuable information May threaten the viability of e-commerce continued on next slide

6 The Extent of Cybercrime
Not all cybercrime is committed for financial gain Criminal mischief creating/transmitting malicious forms of programming code

7 Cybercrime and the Law Communications Decency Act (1996)
Reno v. ACLU No Electronic Theft Act (1997) Digital Theft Deterrence and Copyright Damages Improvement Act (1999) Cyber Security Enhancement Act (2002) continued on next slide

8 Cybercrime and the Law Computer-related crime
Any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution continued on next slide

9 Cybercrime and the Law Computer abuse
Any incident associated with computer technology in which a victim suffered or could have suffered loss and perpetrator intentionally gained or could have gained

10 The History and Nature of Hacking
Computer hacking may have started in the late 1950s with the creation of the interstate phone system and direct distance dialing continued on next slide

11 The History and Nature of Hacking
Phone phreaks Used special telecommunications access codes and other restricted technical information to avoid paying long-distance charges Modern version involves electronic theft of cell phone numbers and access codes Voice mail hacking and voice mail fraud

12 A Profile of Cybercriminals
Cybercriminals tend to come from hacker subculture because hackers and hacker identities are a product of cyberspace continued on next slide

13 A Profile of Cybercriminals
Average hacker Male between who lives in the US Computer user but not programmer Hacks with software written by others Primary motivation is to gain access to Web sites and computer networks continued on next slide

14 A Profile of Cybercriminals
Hacker typology based on psychological characteristics Pioneers Scamps Explorers Game players Vandals Addicts continued on next slide

15 A Profile of Cybercriminals
Not all hackers are kids - some are high-tech computer operators

16 Cybercrime as a Form of White-Collar Crime
Some see computer crime as a new form of white-collar crime. There are many similarities between the two: Both often committed through nonviolent means Access to computers or storage media often needed Involve information manipulations creating profits or losses continued on next slide

17 Cybercrime as a Form of White-Collar Crime
Some see computer crime as a new form of white-collar crime. There are many similarities between the two: Both can be committed by individuals or organizations Both are difficult to detect Viewed them as less serious than violent crimes continued on next slide

18 Cybercrime as a Form of White-Collar Crime
Some see computer crime as a new form of white-collar crime. There are many similarities between the two: Both cost individuals, organizations, and society large amounts of money and other resources Prevention requires a combination of legal, technical, managerial, security, and audit-monitoring controls

19 Technology in the Fight Against Crime
Technology is a double-edged sword Provides criminals new weapons to commit crimes Provides the criminal justice system with new tools to fight crime Criminally useful or evasive technologies and law enforcement capabilities commonly leapfrog one another

20 DNA Technology DNA profiling
The use of biological residue found at a crime scene for genetic comparisons to help identify suspects DNA evidence long-lasting Highly reliable but not infallible The greatest threat to reliable results is human error in conducting the tests continued on next slide

21 DNA Technology Daubert standard
Test to determine whether a form of scientific evidence is reliable Key factors: It has been subjected to testing It has been subjected to peer review It has known/potential rates of error It has standards controlling application of the techniques involved continued on next slide

22 DNA Technology Most states and the federal government have digitized forensic DNA databases FBI’s National DNA Index System (NDIS) All states have legislation requiring convicted offenders to provide samples for DNA databases DNA Identification Act of 1994

23 Computers and Crime-Fighting Tools
Computers used to keep records Computers help design new technology and assign resources to problem areas Computers connect people continued on next slide

24 Computers and Crime-Fighting Tools
Expert systems Computer hardware and software system that tries to duplicate the decision-making processes used by investigators in analyzing evidence and recognizing patterns

25 Combating Cybercrime Threat analysis (risk analysis)
a complete and thorough assessment of the kinds of perils facing an organization continued on next slide

26 Combating Cybercrime Once threats are identified, strategies to deal with them can be introduced An audit trail traces/records activities of computer operators and allows auditors to examine the sequence of events relating to any transaction A powerful tool for identifying instances of computer crime

27 Police Investigation of Computer Crime
Many police departments lack personnel skilled in the investigation of computer crimes May intentionally avoid computer-crime investigations Many departments place a low priority on computer crime continued on next slide

28 Police Investigation of Computer Crime
FBI’s National Computer Crime Squad investigates violations of federal computer crime laws DCS-3000 network “sniffer” focuses on intercepting suspect personal communications delivered via wireless services

29 Cybercrime and Internet Security
Information is the lifeblood of the modern age – needs to be moved safely and securely Commission on Critical Infrastructure Protection National Infrastructure Protection Center (1998) Succeeded by the Office of Infrastructure Protection (part of DHS) continued on next slide

30 Cybercrime and Internet Security
U.S. Computer Emergency Readiness Team (2003) Pres. Obama has identified cybersecurity as one of the most serious economic and national security challenges facing the U.S. continued on next slide

31 Cybercrime and Internet Security
In 2009, announcement appoint of first White House Cybersecurity Coordinator Responsible for coordinating cybersecurity activities across the federal government Howard A. Schmidt

32 Policy Issues: Personal Freedoms in the Information Age
First Amendment Freedom of speech Are electronic communications protected? Fourth Amendment Freedom from unreasonable searches and seizures Does this include electronic information?


Download ppt "14 Technology and Crime."

Similar presentations


Ads by Google