The Advance of Technology


Download 470 Kb.
Sana18.05.2020
Hajmi470 Kb.
#107614
Bog'liq
CRJ270-Chapter14 (2)

  • 14

The Advance of Technology

  • Technology and criminology have always been closely linked
  • Technology can be used by crime fighters and lawbreakers
  • As technology progresses, it facilitates new forms of behavior, including new crimes

High Technology and Criminal Opportunity

  • Routes to illegitimate access to computerized information
    • Direct access
    • Computer trespass
  • Cybercrime
    • any violation of a federal or state computer-crime statute

High Technology and Criminal Opportunity

  • Types of cybercrime
    • Internal cybercrimes
    • Internet/telecommunications crimes
    • Support of criminal enterprises
    • Computer-manipulation crimes
    • Hardware, software, and information theft
  • Money today is information

The Extent of Cybercrime

  • Software piracy
    • The unauthorized and illegal copying of software programs
  • Phishing
    • An Internet-based scam that uses official-looking e-mail messages to steal valuable information
    • May threaten the viability of
    • e-commerce
  • continued on next slide

The Extent of Cybercrime

  • Not all cybercrime is committed for financial gain

Cybercrime and the Law

  • Communications Decency Act (1996)
    • Reno v. ACLU
  • No Electronic Theft Act (1997)
  • Digital Theft Deterrence and Copyright Damages Improvement Act (1999)
  • Cyber Security Enhancement Act (2002)
  • continued on next slide

Cybercrime and the Law

  • Computer-related crime
    • Any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution
  • continued on next slide

Cybercrime and the Law

  • Computer abuse
    • Any incident associated with computer technology in which a victim suffered or could have suffered loss and perpetrator intentionally gained or could have gained

The History and Nature of Hacking

  • Computer hacking may have started in the late 1950s with the creation of the interstate phone system and direct distance dialing
  • continued on next slide

The History and Nature of Hacking

  • Phone phreaks
    • Used special telecommunications access codes and other restricted technical information to avoid paying long-distance charges
    • Modern version involves electronic theft of cell phone numbers and access codes
  • Voice mail hacking and voice mail fraud

A Profile of Cybercriminals

  • Cybercriminals tend to come from hacker subculture because hackers and hacker identities are a product of cyberspace
  • continued on next slide

A Profile of Cybercriminals

  • Average hacker
    • Male between 16-25 who lives in the US
    • Computer user but not programmer
    • Hacks with software written by others
    • Primary motivation is to gain access to Web sites and computer networks
  • continued on next slide

A Profile of Cybercriminals

  • Hacker typology based on psychological characteristics
    • Pioneers
    • Scamps
    • Explorers
    • Game players
    • Vandals
    • Addicts
  • continued on next slide

A Profile of Cybercriminals

  • Not all hackers are kids - some are high-tech computer operators

Cybercrime as a Form of White-Collar Crime

  • Some see computer crime as a new form of white-collar crime. There are many similarities between the two:
    • Both often committed through nonviolent means
    • Access to computers or storage media often needed
    • Involve information manipulations creating profits or losses
  • continued on next slide

Cybercrime as a Form of White-Collar Crime

  • Some see computer crime as a new form of white-collar crime. There are many similarities between the two:
    • Both can be committed by individuals or organizations
    • Both are difficult to detect
    • Viewed them as less serious than violent crimes
  • continued on next slide

Cybercrime as a Form of White-Collar Crime

  • Some see computer crime as a new form of white-collar crime. There are many similarities between the two:
    • Both cost individuals, organizations, and society large amounts of money and other resources
    • Prevention requires a combination of legal, technical, managerial, security, and audit-monitoring controls

Technology in the Fight Against Crime

  • Technology is a double-edged sword
    • Provides criminals new weapons to commit crimes
    • Provides the criminal justice system with new tools to fight crime
  • Criminally useful or evasive technologies and law enforcement capabilities commonly leapfrog one another

DNA Technology

  • DNA profiling
    • The use of biological residue found at a crime scene for genetic comparisons to help identify suspects
    • DNA evidence long-lasting
    • Highly reliable but not infallible
  • The greatest threat to reliable results is human error in conducting the tests
  • continued on next slide

DNA Technology

  • Daubert standard
    • Test to determine whether a form of scientific evidence is reliable
    • Key factors:
      • It has been subjected to testing
      • It has been subjected to peer review
      • It has known/potential rates of error
      • It has standards controlling application of the techniques involved
  • continued on next slide

DNA Technology

  • Most states and the federal government have digitized forensic DNA databases
    • FBI’s National DNA Index System (NDIS)
  • All states have legislation requiring convicted offenders to provide samples for DNA databases
  • DNA Identification Act of 1994

Computers and Crime-Fighting Tools

  • Computers used to keep records
  • Computers help design new technology and assign resources to problem areas
  • Computers connect people
  • continued on next slide

Computers and Crime-Fighting Tools

  • Expert systems
    • Computer hardware and software system that tries to duplicate the decision-making processes used by investigators in analyzing evidence and recognizing patterns

Combating Cybercrime

  • Threat analysis (risk analysis)
    • a complete and thorough assessment of the kinds of perils facing an organization
  • continued on next slide

Combating Cybercrime

  • Once threats are identified, strategies to deal with them can be introduced
    • An audit trail traces/records activities of computer operators and allows auditors to examine the sequence of events relating to any transaction
    • A powerful tool for identifying instances of computer crime

Police Investigation of Computer Crime

  • Many police departments lack personnel skilled in the investigation of computer crimes
  • May intentionally avoid computer-crime investigations
  • Many departments place a low priority on computer crime
  • continued on next slide

Police Investigation of Computer Crime

  • FBI’s National Computer Crime Squad investigates violations of federal computer crime laws
  • DCS-3000 network “sniffer” focuses on intercepting suspect personal communications delivered via wireless services

Cybercrime and Internet Security

  • Information is the lifeblood of the modern age – needs to be moved safely and securely
  • Commission on Critical Infrastructure Protection
  • National Infrastructure Protection Center (1998)
    • Succeeded by the Office of Infrastructure Protection (part of DHS)
  • continued on next slide

Cybercrime and Internet Security

  • U.S. Computer Emergency Readiness Team (2003)
  • Pres. Obama has identified cybersecurity as one of the most serious economic and national security challenges facing the U.S.
  • continued on next slide

Cybercrime and Internet Security

  • In 2009, announcement appoint of first White House Cybersecurity Coordinator
    • Responsible for coordinating cybersecurity activities across the federal government
    • Howard A. Schmidt

Policy Issues: Personal Freedoms in the Information Age

  • First Amendment
    • Freedom of speech
    • Are electronic communications protected?
  • Fourth Amendment
    • Freedom from unreasonable searches and seizures
    • Does this include electronic information?

Download 470 Kb.

Do'stlaringiz bilan baham:




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling