Computer Crimes - Indiana University of Pennsylvania

Download Report

Transcript Computer Crimes - Indiana University of Pennsylvania

Computer Crimes
Justin A. Sarvey
Overview






Define computer crime
Examples of computer crime
Statistics on computer crime
How to Protect Yourself
What can be done to stop computer crime
Conclusion
Computer Crime



Committed when a computer is the target
of a crime, or the means to commit a
crime
Most of these crimes are not new except
for the tools used
Criminals use new methods, such as the
Internet, to commit fraud, forgery,
blackmail and embezzlement
Computer Crime

There are three major classifications of
computer crime:



1. Unauthorized use of a Computer
2. Creating or releasing a malicious computer
program
3. Cyber stalking and harassment
Types of Computer Crime







Fraud
Piracy
Harassment
Cyber Terrorism
Child Pornography
Identity Theft
Theft of Company Secrets
Fraud


Any dishonest misrepresentation of fact
intended to induce another to do or refrain
from doing something which causes loss
Most notorious example of fraud is the
unauthorized use of credit cards
Piracy


Deals with copying copyrighted material and
either possessing or selling that material
Examples



Burning DVD’s and then selling them
Downloading music off of the Internet
The Copyright and Related Rights Regulations of
2003

Designed to deal with protecting information online
Harassment




Directs obscenities and derogatory comments at
specific individuals focusing on gender, race,
religion, nationality and sexual orientation
Often occurs in chat rooms, newsgroups and
sending hate emails
People using the Internet to defame others
New laws state: If a reasonable person in
possession of the same information would think
the course of conduct amounted to harassment
of the other, the knowledge will be imputed to
the defendant
Cyber Terrorism





Cyber Terrorism – an act of terrorism committed through
the use or cyber space or computer resources
Cyber terrorist – someone who intimidates or coerces a
government or organization to advance his or her
political or social objectives
Done by launching computer based attack against
computers, network, and the information stored on them
Government officials have seen a significant increase in
Internet probes and server scans since 2001
Officials concerned that terrorists will take advantage of
vulnerabilities in critical systems
Cyber Terrorism

National Infrastructure Protection Center






Founded in February 1998
Designed to combat cyber terrorism
Became part of Homeland Security after 2001
Serves as focal point for threat assessment, warning,
investigation, and response for threats or attacks against
our countries critical infrastructure
Includes: banks, energy, telecommunications, water
systems, government organizations, and emergency
services
If an attack was to occur on one of these systems it
could be disastrous
Child Pornography



Visual depiction of minors engaged in a
sex act as well as lascivious depictions of
the genitals
Prohibited under both federal and state
laws
Texts which depicts sexual acts of minors
are not considered child pornography
Child Pornography & Child
Predators

Sting operations





District Attorney Offices
Dateline NBC “To Catch a Predator”
Police, FBI and ICE
Child pornography has become a key issue
Many police organizations are trying to
help put a stop to it
Child Pornography & Child
Predators

Problems:



Many of the individuals caught by Dateline
have not been prosecuted
The people luring the offender were not legal
law officers
As a result in the new episodes the people
luring the offenders are made honorary
deputies
Child Pornography & Child
Predators

It is argued that the police officers are
entrapping the offenders.
The officer enticed the individual to talk to the
minor
 The person isn’t really a minor



How competent are the officers working
on these cases?
Are the counts of pornography accurate?
Theft of Company Secrets



Big concern for companies
Easy access because it’s done by someone
from the inside
Easy to do with today’s technology




Thumb drive
Palm pilot
Email
Personal Computers
Theft of Company Secrets





What can be done to stop it?
Tough computer use policies
Surprise inspections of the computer
Limit the number of employees that are
allowed laptops
Monitor the use of email and network
Identity Theft



Occurs when someone wrongfully acquires
or uses another person’s personal data,
typically for their own financial gain
A growing concern for consumers in the
United States
Costs Americans millions of dollars a year
and takes hours of work to clear your
credit
Identity Theft

Usually obtained by:





Rummaging through the trash
Eavesdropping on public telecommunications
Infiltration of organizations that store
personal data
Impersonating a trusted organization in an
electronic communication
Spam – responding to contests
Examples of Identity Theft




Social Security Number is stolen
Credit card or bank card is stolen
Account number is stolen
Address or phone number is stolen
Identity Theft



Thieves can use your social security
number to impersonate you
Thieves can steal your bank card and/or
credit card number to rack up charges on
your account
Thieves can use your address and phone
number to open up accounts in your name
Ways to Protect Yourself From
Identity Theft





Never reveal personal information to a company
over the phone
If someone does call and ask for information ask
them to tell you when the last time was that you
made a payment, the amount, and your
mother’s maiden name
Don’t be fooled and respond to emails stating
you’ve won 1 million dollars
Install a firewall and privacy software
Shred all important documents
Statistics






In 2005 cost business 67.2 billion dollars
In the past two years U.S. consumers lost more than 8
billion dollars to viruses, spyware, and online fraud
schemes
In 2004 3.6 million Americans were affected by identity
theft
3 in 10 households experience some form of identity
theft
2/3 of individuals who experienced identity theft
reported some sort of financial loss
Individuals in the 18-24 age range are most likely to
become a victim
Statistics



The child pornography industry generates
over 20 billion dollars a year in revenue
Since 1988 the number of Internet child
pornography pictures grew by 1300
percent
Over 3.5 million child pornography images
have been identified by U.S. law
enforcement
Statistics on Cyber Stalking



443 cases for calendar year 2005
196 cases for calendar year 2004
198 cases for calendar year 2003
50 percent of individuals knew their
offender
48 percent of individuals did not know
their offender
Statistics on Cyber Stalking
Statistics on Cyber Stalking
Stopping Computer Crimes




Create larger budgets for law enforcement
Train law enforcement agencies about
computer crimes
Hire more officers to work in the computer
crime department
Train the general public about computer
crimes and the risks associated with it
Conclusion


Computer Crime - Committed when a computer is the
target of a crime, or the means to commit a crime
Types of Computer Crime








Fraud
Piracy
Harassment
Cyber Terrorism
Child Pornography
Identity Theft
Problems with prosecuting child pornography
Individuals in the 18-24 age range are the most
susceptible to identity theft
Sources









http://www.crime-research.org/news/12.10.2006/2290/
http://www.protectkids.com/dangers/stats.htm
http://www.consumeraffairs.com/news04/2006/04/id_theft_stats02.
html
http://www.ojp.usdoj.gov/bjs/abstract/it04.htm
http://www.haltabuse.org/resources/stats/resolution.shtml
http://en.wikipedia.org/wiki/Computer_crime
http://en.wikipedia.org/wiki/Computer_crime#Fraud
http://en.wikipedia.org/wiki/Computer_crime#Harassment
http://en.wikipedia.org/wiki/Computer_crime#Cyberterrorism