Professional Documents
Culture Documents
Crime
CHAPTER 4
Contemporary
Computer Crime
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Learning Objectives
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Learning Objectives
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Web-Based Criminal Activity
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Web-Based Criminal Activity
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Web-Based Criminal Activity
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Malware: Viruses
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Malware: Ransomware
• Ransomware and the Kidnapping of
Information
Malware program that makes digital
resources inoperable or inaccessible in
extortive scheme
Critical factors can include level of user's
education (less educated, more
vulnerable), sophistication of product (not
amenable to common software remedies)
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Malware: Ransomware
Examples include the PC Cyborg/Aids
information Trojan, distributed through
ordinary mail via a floppy, so that once
installed, victims had to pay $378 to regain
access to all directories and to unencrypt
files.
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Theft of Information, Data
Manipulation, and Web Encroachment
• Traditional methods of proprietary
information theft can occur due to:
Insiders, on the job or through maintenance
back doors
Social engineering, including shoulder surfing
and dumpster diving
Theft of equipment
Malware
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Theft of Information, Data
Manipulation, and Web Encroachment
• Trade Secrets and Copyrights – Concerns:
These forms of intellectual property have value
independent of whatever owner produces, such
as a razor company designing a new shaving
system.
Theft can come from disgruntled employees,
competitors, and government entities.
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Theft of Information, Data
Manipulation, and Web Encroachment
• Political Espionage – Seriousness:
FBI estimates that over 120 foreign
governments have intelligence operations
targeting the U.S.
For example, Israeli intelligence secretly
monitored Presidential communications.
SEARCH (2000). The Investigation of Computer Crime. The National Consortium for Justice Information and Statistics:
Sacramento, CA.
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Cyberterrorism
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine
in New Bottles
Dissemination of Contraband or Offensive
Materials
•Child Pornography
Difficult to define, but generally refers to any
visual depiction of a lascivious exhibition of
the genitals or pubic area or sexually explicit
conduct of a minor
Difficult to prosecute, as this raises First
Amendment issues about freedom of speech
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine
in New Bottles
• Child Pornography
Illegal in all states, prohibited by Federal law
Primary reason for possession is pedophilia
or hebephilia, to satisfy sexual fantasies
about prepubescent children
Sexual miscreants: to satisfy a desire for
new and different sexual stimuli
Curiosity-seekers: to satisfy a peculiar
curiosity
Criminal opportunists: to profit from its
distribution
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine
in New Bottles
• Child Enticement/Exploitation
As a way to generate child pornography and to
molest children, online predators use chat rooms to
identify victims, especially confused or ostracized
kids.
Law enforcement has had great success with sting
operations or “honeypots” by using the same
strategy as predators, of pretending to be a child
and arranging for a meeting.
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine
in New Bottles
• Online Pharmacies
Used to make legitimate and illegitimate
purchases (e.g. anabolic steroids,
amphetamines, and painkillers) privately and
conveniently
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine
in New Bottles
• Online Gambling
Ease of access, including minors
Open all day
e-Banking makes it easier to play
Might generate billions in profit
Internet Gambling Prohibition & Enforcement
Act of 2006 makes it illegal, but is difficult to
enforce due to lack of public, international
cooperation.
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine
in New Bottles
Threatening and harassing communications:
• Cyberstalking and Harassment
Stalking: Willful, malicious, and repeated
following and/or harassing another person in
an effort to inflict or cause fear of actual harm
through words or deeds committed via
electronic means
Cyberstalking: Done via electronic
communication
Cyberharassment: Focuses on actual harm
suffered, including defacement of character
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine in
New Bottles
• Cyberbulling: An aggressive, intentional act
carried out by a group or individual, using
electronic forms of contact, repeatedly and
over time against a victim who cannot
easily defend him or herself
Illegal only in some states, not under Federal law
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine in
New Bottles
• Online Fraud
Intentional deception, misrepresentation, or
falsehood made with the intention of receiving
unwarranted compensation or gratification
Cuts across gender, social class, and race
Comes in a broad array of forms
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine in
New Bottles
• Internet auction fraud can come in the
form of:
Nondelivery of goods
Misrepresentation as to condition of an item
Addition of hidden charges (fee-stacking)
Shill bidding (where seller submits bids to
drive up price of item)
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine in
New Bottles
• Online Credit Card Fraud: Besides
traditional fraud, can include:
Skimming (installing devices at ATMs, for
example, to steal info from cards)
RFID (taking info from "wave and pay" device,
like toll highway transmitters)
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine in
New Bottles
• Web-Cramming/ISP Jacking
Web-Cramming: The unauthorized charging of
consumers via monthly telecommunication
fees
ISP Jacking: Disconnecting individual users
from their selected Internet service providers
and redirecting them to illegitimate servers to
generate long distance charges for those using
dial-up
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine in
New Bottles
• Fraud via Data Manipulation
Data Diddling: Any method of fraud via data
manipulation (usually involves redirecting or
rerouting data representing monies or
economic exchanges)
Salami technique: Stealing fraction of a cent
from millions of accounts, so as to go
undetected
IP Spoofing: Manipulation of data packets
between computers to mimic a third party and
falsely gain access to funds
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old
Wine in New Bottles
• Securities Fraud and Stock Manipulation
Having instant access to stock values and
statistics, encouraging day-trading, buying stock
with little or no actual knowledge of the
company
Vulnerable to dissemination of false information,
used to trick individuals to purchase stock at
inflated prices
Insider trading: Individuals with access to
confidential information unavailable to public
use it to make stock purchases/sales, for
personal gain
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Neo-Traditional Crime: Old Wine in
New Bottles
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Ancillary Crimes
• Money Laundering
An enterprise or practice of engaging in
deliberate financial transactions to conceal the
identity, source, and/or destination of income
Usually a critical element for organized crime
to function
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Ancillary Crimes
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved
Ancillary Crimes
Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc.
Marjie T. Britz All Rights Reserved