Internet Vulnerabilities & Criminal Activity

Download Report

Transcript Internet Vulnerabilities & Criminal Activity

Internet Vulnerabilities &
Criminal Activity
Criminology Theories & Cyber Crime
11.1
4/19/10
Classifications of Cyber Crimes
 Cyber trespass
 Crossing boundaries into other people’s property &/or cause
damage
 Hacking, defacement, malware
 Cyber deceptions & thefts
 Stealing money or resources
 Credit card fraud, IP violations
 Cyber pornography
 Breach laws of obscenity
 Cyber violence
 Psychological or physical harm to others
 Hate speech, stalking
Cyber Criminals
 Broad range of persons
 Students, terrorists, amateurs, organized crime groups
 More likely to have affluent socioeconomic
backgrounds
 Has knowledge of computers & the Internet which
enables him/her to commit crime of choice
 Any technically oriented person has potential to
become cyber criminal
 Cyber criminal has changed since the ‘80’s and 90’s
when cyber crime was infiltration by hacking
FBI’s Definitions of Cyber Criminals
Crackers
Young offenders seeking intellectual stimulation
Criminals
Adult subgroups
Commit fraud, damage systems undertake
espionage
Vandals
Not pursuing intellectual stimulation
Motivated by revenge
Typology for Cyber Criminals
White-collar criminals
Vengeful criminals
Disgruntled employees
Patient criminals
Desire more than what they have
Negative state of mind not immediately obvious
Desperate criminals
Facing financial crisis
Easiest to catch
Typology for Cyber Criminals cont.
 Hackers
 Old School Hackers
 Computer experts
 Used technology in new, innovative ways
 Internals
 Disgruntled or ex-employees
 Cyber punks
 Antisocial, socially inept, angst toward the world
 Direct anger into cyberspace
 Professional criminals & cyber terrorists
 Guns for hire
 Good at espionage, leave no trace
 Newbies & Script Kiddies
 Want recognition but lack skills
 Usually teenagers looking for recoognition
Typology for Cyber Criminals cont.
 Crackers
 Obtain & use data illegally, IP violators
 Password crackers
 Concerned with cryptography & encoding
 Will use any means to discover passwords
 Executable program crackers
 Programs should obey humans
 Reverse engineer programs so changes can be made
 Have years of experience programming
 Can easily discover program weaknesses
 Hobbyists
 Cross between above 2 groups
 Cracks code for knowledge
 May release cracked code to the public
Typology for Cyber Criminals cont.
 Con artists
 Great actors
 Motivations
 Financial stress - need money
 Power - control over victims, smarter, better than victims
 Challenge - enjoy what they do, mastered the skill
 Punish the victim - victim deserves what they get
 Techniques used
 Familiarization - flatter victim, gain victims trust
 Risk free investments - con man will refund all victim’s money if
the plan fails
 Avoiding questions - talk a lot, vague answers, spout useless
jargon
 Pressurizing tactics - once in a lifetime chance, will regret it if
not done
Typology for Cyber Criminals cont.
 Psycho-criminals
 Mentally ill - need no external conditions to commit crimes
 Pedophiles
 Abnormal sexual attraction to children
 Larger pool of victims online
 Cyberstalkers
 Torment victims at a distance
 Usually have sexual motivations, power & control
 Serial Killers
 Internet used as tool to track down victims
 Disorganized - low IQ, social outcast, bad at covering tracks
 Organized - high IQ, Know what he/she wants & how too get
away with it. Most dangerous of all cyber criminals.
Crimes in Physical Space vs
Crimes in Cyber Space
Transnational nature and jurisdictional issues
Attacks can take place anywhere from anywhere
Multiple boundaries may be crossed
Physical constraints
Do not exist in cyber space
Crime can happen in milliseconds
Proximity
No physical proximity required
Crimes in Physical Space vs
Crimes in Cyber Space cont.
Scale & multiple victimization
Automated process
Multiple simultaneous victims for the same effort
Conduct at issue may not be illegal
Conduct may not be criminalized in country where
it originates
Cannot extradite criminal unless law of his/her
country is broken
Crimes in Physical Space vs
Crimes in Cyber Space
Perfect anonymity
Can disguise identity in ways impossible in the
physical world
Can achieve perfect pseudonymity
Velocity
Criminal activity can happen very rapidly
Slammer took down large part of the Internet in
15 minutes
Space Transition Theory
1) Persons with repressed criminal behavior (in
the physical space) have a propensity to
commit crime in cyberspace, which
otherwise they would not commit in physical
space, due to their status and position.
 Concern for status in physical space does
not transition to cyber space.
 Behavior repressed in physical space are not
in cyber space.
Space Transition Theory
2) Identity flexibility, dissociative anonymity, and lack of
deterrence factor in the cyberspace provides the
offenders the choice to commit cyber crime.
 Disinhibiting effect allows individuals:
 Open honesty about personal issues
 To act out on unpleasant needs
 Deinidividualization - inner restraints are lost when
individuals not seen as individuals
 Leads to behavior that is
 Less altruistic
 More selfish
 More aggressive
Space Transition Theory
2) Identity flexibility, dissociative anonymity,
and lack of deterrence factor in the
cyberspace provides the offenders the choice
to commit cyber crime.
 Deterrence factor changes
Attacks can be made from a remote location
Crime reslts not immediately apparent
Space Transition Theory
3) Criminal behavior of offenders in cyberspace is likely
to be imported to physical space which, in physical
space maybe exported to cyberspace as well.
 Cyber crime has moved from the single individual
acting for fame to professional criminals
 Huge financial gain with little risk
 Growth of e-commerce attracts criminals to the net
Space Transition Theory
4) Intermittent venture of offenders in to the
cyberspace and the dynamic spatiotemporal
nature of cyberspace provide the chance to
escape
Cyber space is transient
Cyber space is dynamic
Cyber crimes have do not have spatial temporal restrictions of traditional crimes
Space Transition Theory
5) (a)Strangers are likely too unite together in
cyberspace to commit crime in the physical space;
(b) Associates of physical space are likely to unite to
commit crime in cyberspace.
 Cyberspace allows for recruitment and dissemination
 Cyberspace is:
 Unmoderated
 Easy to access
 Cyberspace can pose an insider threat
 Spy / mole
 Disgruntled employee
Space Transition Theory
6) Persons from closed society are more likely
to commit crimes in cyberspace than persons
from open society.
Open society allows individuals to voice
opinions & vent feelings.
Cyberspace allows individuals from closed
societies to express anger & frustrations
through hate messages, web page vandalism,
up to cyber terrorism attacks
Space Transition Theory
7) The conflict of norms and values of physical
space with the norms and values of
cyberspace may lead to cyber crimes.
Cyberspace is international
Societal differences between individuals may
lead to cyber crime
Conflicts between nations carry over into
cyberspace
Routine Activity Theory
 Routine activities in conventional societies provide
opportunities for perpetrator to commit crime
 Three things must be present for crime to occur:
 Suitable target is available
 Motivated offender is present
 Lack of a suitable guardian to prevent crime from occurring
 Assessment of situation determines whether or not a
crime takes place.
Routine Activity Theory
 A suitable target can be:
 A person
 An object
 A place
 Target comes to the attention of a person searching
for a criminal opportunity
 Targets behavior may place target in contact with
perpetrator
 No significant deterring mechanism is present
Routine Activity Theory
Motivated Perpetrator
Predatory crime is a method for the
perpetrator to secure basic needs of desires
Actions of perpetrator are intentional and
illegal
Routine Activity Theory
A capable guardian
Police patrol, Security guards
Neighbors, neighborhood watch, dogs
Locks, fences, CCTV systems
Passwords, tokens, biometric measures
Guardians can be formal or informal
Guardians can be human or machine
Guardians MUST be capable of acting as a
deterrent
Opportunity Theory
Opportunity to commit a crime is a root cause
of crime
No crime can occur without the physical
opportunity
Opportunity plays a role in all crimes, not just
those involving physical property
Reducing opportunity reduces crime
Displacement Theory
Reductions in opportunity will not reduce
crime because crime will be displaced to
another location
Opportunity is so compelling that removing
perpetrators will not reduce crime because
other perpetrators will step in
Research on displacement theory has shown
crime is not always displaced
Routine Activity Theory & the Internet
Opportunity to commit crime is multiplied
Target and perpetrator are much more likely
to come in contact with each other
Victim has to keep returning to scene of the
crime
Deterrence comes shifting either events or
circumstances
Neither are easily altered
Routine Activity Theory & the Internet
Cybercrime has more to do with the
effectiveness of indirect guardianship
Internet is open & unmoderated
Mechanisms of the Internet designed to
transfer data, not to examine the data
Internet guardianships are all mechanical
Reactive, respond to some action - IDS
Cannot respond to new, previously untried activity
Hacker Neutralization Techniques
Allows for temporary neutralization of values,
beliefs, and attitudes so illegal behaviors can
be performed.
Justification of an act requires the need to
assert its positive values
Used by different types of deviants
Hacker Neutralization Techniques
Denial of Injury
No harm or insignificant harm done to victim
No physical information stolen, information in an
electronic form
Belief that downloading is copying not stealing
As long as no one knows their information is being
perused, no harm is done
Hacker Neutralization Techniques
Denial of Victim
Victim is deserving of punishment
Four categories of victims
Close enemies who have harmed offender directly
People who do not conform to normative social roles
Groups with tribal stigmas
Remote enemies who hold positions perceived as
questionable or corrupt
Offender may assume role of “avenger” or
“crusader for justice”
May justify actions as revenge
Hacker Neutralization Techniques
Condemnation of the Condemners
Divert attention from offenders actions to the
motives and behaviors of those condemning
offender’s actions
Mistrust of authority
Promote decentralization
Price charged by software companies too high and
unfair
Victim failed to protect their computer system
Hacker Neutralization Techniques
Appeal to higher loyalties
Offender doesn’t deny damage, act was done to
protect higher loyalties
Loyalty to group
Responsibility to family or spouse
Employer (Corporate crimes)
Claim actions were done to acquire knowledge
Hacker Neutralization Techniques
Self-fulfillment
Illegal activity done for
Fun
Excitement or thrill
Computer virtuosity
Offender achieves feelings of superiority & control
Voyeurism
Demonstration of ability
Hacker Neutralization Techniques
Hackers do not use all neutralization
techniques
Denial of responsibility
Sad story
Both external forms of neutralization
Only use techniques based on internal
neutralization
Hackers take pride in what they do
Hackers feel in shame or guilt
Computer Hackers & Social Organization
Mutual Association
Clear interpersonal relationship
No strong or deep interpersonal relationships on
or off line
Social connections relatively shallow
Multiple identities and multiple forum use may
limit ability to form interpersonal connections
Utilize social networks to exchange knowledge and
information
Computer Hackers & Social Organization
Mutual Participation
Groups are stratified rather than centrally
controlled
Participation in groups did not lead to group
attacks
Many do not want an group affiliation
Computer Hackers & Social Organization
Division of labor
Some specialization in group forums does exist
Stratification & division of labor
Small group of moderators
Larger group of users exchanging knowledge &
information
Loose set of rules
Give respect, get respect
No flaming
Large population of users enforcing the rules
Computer Hackers & Social Organization
Extended duration
No group with extended history
Relationships appear transitory
Relationships within forums weak & short-lived