Title: Cybercrime and Cyberrelated Crimes
1Cybercrime and Cyberrelated Crimes
2Background
- Cybercrime before networked computers
- Hacker now a pejorative term
- Computer fraud vs. computer abuse
- Fraud for gain
- Abuse for malice
- Unreported cybercrime
3Properties of a cybercriminal
- Are hackers cybercriminals?
- Precocity, curiosity, persistence
- Amateur vs. professional
- Motivation greed? thrills? notoriety?
- Crimes of opportunity?
4Famous cybercriminals
- Kevin Mitnick
- Robert Morris
- Onel de Guzman
- Mafia Boy
- Dmitri
- Curador
- Cults
5Hacking vs. cracking
- Hacker enthusiast
- Cracker destructive hacker
- White hat vs. black hat
- General public unaware of distinction
- Is all hacking criminal?
- Many IT leaders were hackers
6Hacking and the law
- Invasive activity, trespass, both, neither?
- Early legislation no distinction between
malicious vs. non-malicious hacking - Physical crime distinction between trespass and
theft or vandalism - Distinction not as clear for cyberspace
7Cybercrime
- Mere use/presence of a computer does not make a
crime a cybercrime - A criminal act in which a computer is used as
the principal tool. - Computer as a central component
- Cybercrime can be committed only with computers
8Three Categories of Cybercrime
1. Cyberpiracy - using cyber-technology in
unauthorized ways to
a. reproduce copies of proprietary software and
proprietary information, or
b. distribute proprietary information (in
digital form) across a computer network.
2. Cybertrespass - using cyber-technology to
gain or to exceed unauthorized access to
a. an individual's or an organization's
computer system, or
b. a password-protected Web site.
3. Cybervandalism - using cyber-technology to
unleash one or more programs that
a. disrupt the transmission of electronic
information across one or more computer
networks, including the Internet, or
b. destroy data resident in a computer or
damage a computer system's resources, or both.
9Figure 7-1 Cybercrimes and Cyberrelated Crimes
Cybercrimes
Cyberrelated Crimes
Cyberexacerbated
Cyberassisted
Cyberspecific
Income-tax cheating (with a computer) Physical
assault with a computer Property damage using a
computer hardware device (e.g., throwing a
hardware device through a window)
Cyberpiracy Cybertrespass Cybervandalism
Cyberstalking Internet Pedophilia Internet
Pornography
10Organized cybercrime
- Gambling, drug trafficking, racketeering
- Professionals out for gain, more skilled, less
likely to get caught - Law enforcement
- keystroke monitoring
- Echelon
- Entrapment
- Patriot Act
- Homeland Security Act
11Corporate espionage
- Intercepted cell phone calls
- Cybertech facilitates espionage
- Economic Espionage Act of 1996
12International efforts
- Jurisdiction where is crime committed?
- On-line gambling example
- Cyberspace a place? a medium?
- ILOVEYOU launched from Philippines, global
effect, should Guzman be extradited? - Prosecution in multiple jurisdictions?
13Legislation
- Patriot Act Magic Lantern, vendor complicity
- Back doors potential for abuse
- Technology changes too fast for law to keep up
- COE Convention on Cybercrime
14Tools to combat cybercrime
- Encryption
- Clipper chip
- Keys held by government
- Quality unverifiable
- Potential for government abuse
- Market impact
- Strong encryption
- Violate Fourth Amendment?
- Will they try again?
15Tools (continued)
- Biometrics
- Eye retina, iris
- Hand handprints, fingerprints, handwriting
- Voice
- Face
- Super Bowl XXXV
- Eurodac
- Effect of 9/11