Criminal homework help
Criminal homework help.
CYBER CRIME
Chapter 3
Objectives
- Review Traditional Problems in the Recognition and Prosecution of Computer Crime
- Discuss the History of Computer Crimes
- Explore the Traditional Rationales for Phreakers and Hackers
- Discuss the Evolution of Hacking
- Acquire an Appreciation for Computers as Marketable Commodities
- Explore the Current State of Computer Crimes Globally
Details
Traditional Problems vs. Emerging Issues
- Normally criminal statutes are based upon the physical location (vicinage) of the act
- Jurisdictional issues usually involve which court (local, state, federal, military, Indian Reservation), will prosecute the case
- Cybercrime expands beyond the spatial boundaries into global connectivity
- Cybercrime obscures the jurisdictional landscape for traditional crimes
- Identifying the vicinage is difficult
- Scenario: Resident of Tennessee places an illegal wager on a sporting event by purchasing gaming software from a site located overseas
- The winnings are electronically transferred to an account in Las Vegas
- He violated state and federal gambling laws by possessing a gaming device but inconclusive whether he placed any bets
- Conclusion: lack of physicality creates questions about crime being committed and which agency has jurisdiction
- Cybercrime is not enforced by any International Agreements or Memorandums of Understanding
- Many countries have become safe havens for cybercrime because they receive significant compensation in the form of corporate taxes (payoffs) from fraudsters
- Cybercriminals use techniques that mask or block their identities
- Anonymizer: sites which enable the user to mask their IP (computer) addresses through rerouting, remailing, or deletion of header information
- Privacy advocates support the these sites as a nurturing environment for First Amendment
- Criminals use encryption programs to hide their activities
- Federal government attempting to enact laws that would make encryption keys discoverable by subpoena
- Evidence Retrieval
- Internet service providers not required to maintain transmission records like telecommunications companies
- Digital evidence is voluminous thus time consuming for investigators
- Digital evidence is easily modified or deleted
- Anonymizer: sites which enable the user to mask their IP (computer) addresses through rerouting, remailing, or deletion of header information
- Identifying the vicinage is difficult
Historical Highlights of Computer Crime
- First computer crime: ( 1800’s) workers at a textile plant destroyed a machine that automated several steps in manufacturing process threatening manual labor jobs
- (1986) Russian KGB operative (Cal Berkeley employee) hacked into military database and obtained information
- (1988) Cornell student created damaging program (Morris worm) that attacked computers via the Internet; damaged 6,000 computers; $5-100 million in losses
Phreakers and Hackers
- Phreakers: manipulation of telecommunication carriers to gain knowledge of telecommunications and/or theft of services
- Illegal access to Private Branch Exchange Systems (Businesses)
- Illegal use of access codes and access tones
- Shoulder surfing: looking over person’s shoulder while dialing
- War dialing: testing numerous codes until one is successful
- Used in college dorms, military bases, traveling business teams
- Hacking: term used by MIT students in 1960’s referring to techniques that identify computer shortcuts or clever pranks; (1980’s) term was popularized in the film, War Games
- Traditional hacker culture was characterized by anti-establishment rhetoric
- Hackers use a service that could be inexpensive except it’s run by profiteering gluttons
- We explore and you call us criminals
- We seek after knowledge and you call us criminals
- We exist without skin color, without nationality, without religious bias and you call us criminals
- Hacker Typologies
- White hat hackers: individuals who identify system vulnerabilities in the interest of promoting heightened security
- Black hat hackers: individuals who identify and exploit system vulnerabilities for illegal purposes such as destruction or theft
- Gray hat hackers: may identify weaknesses in systems for administrators but also sell information to black hat hackers
Computer Intrusion Motivations
- Boredom (informational voyeurism): individuals are motivated by inquisitiveness to sensationalism
- Intellectual challenge (mining for knowledge-pure hackers-thrill seekers): subculture that proclaim to be seekers of knowledge and reject any individuals who use skills for cybercrime
- Revenge (insiders, disgruntled employees): intentional acts of destruction by insiders who become disgruntled after being passed over for promotion or laid off by budget cuts; unintentional breach of security protocols pose most significant threat (failure to protect passwords) cite p. 60 (Seeking Revenge)
- Sexual Gratification (stalking, harassment): Sexual predators
- Economic ( Criminals): Personal gain
- Political (hacktivists, terrorists, spies): Extremist groups target government and business entities for ideological, religious beliefs
Hierarchy of Contemporary Cybercriminals
- Script kiddies: Lowest form of cybercriminal; inexperienced hackers who employ scripts or other programs authored by others to exploit security vulnerabilities
- Motivations range from simple pranks on college campuses to criminal profit when hackers capture bank accounts and password information to access victim’s account
- Cyberpunks: law enforcement labels these individuals who vandalize and destroy computers by introducing viruses and worms for no economic gain
- Crackers: Sophisticated users who employ their knowledge for personal gain
- Cybercriminal Organizations: term does not include traditional organized crime groups but rather groups of individuals who use the internet to communicate collaborate and facilitate cybercrime
- Hacktivists: Fastest growing group of hackers; activist groups added data breaches to their arsenal of destructive weapons
Computers as Targets
- Hardware:
- Computer chips
- Integrated circuits
- CPU’s
- Motherboards
- Ethercards
- Resale of components are high due to difficulty in tracing them
- Blackmarket dealers are organized groups trafficking in stolen computer components that solicit orders and target victims accordingly
- Gray market dealers are legitimate businesses that buy stolen components from thieves and sell to customers who want custom computers
- Theft of Intellectual Property
- Software: Industries involved in mass production of intellectual property have benefited from enhanced production strategies
- Digital pirates have targeted these industries to duplicate and distribute unauthorized copies of their intellectual property
- Top Target Industries: Manufacturing, Sales/distribution, Service, Financial Services, Software Development
- (2010) theft of software for personal computers increased by 14%; $59 billion
- Film Piracy: Optical disc piracy, Internet piracy, video-cassette piracy, theatrical print theft, broadcast piracy
- Overseas market for American films involves new releases and old films
- Primary market in US are those films not yet available on DVD or cable
- Illegal copying and distribution are done by individuals and organized crime groups