- Technology and criminology have always been closely linked
- Technology can be used by crime fighters and lawbreakers
- As technology progresses, it facilitates new forms of behavior, including new crimes
High Technology and Criminal Opportunity - Routes to illegitimate access to computerized information
- Direct access
- Computer trespass
- Cybercrime
- any violation of a federal or state computer-crime statute
High Technology and Criminal Opportunity - Types of cybercrime
- Internal cybercrimes
- Internet/telecommunications crimes
- Support of criminal enterprises
- Computer-manipulation crimes
- Hardware, software, and information theft
- Money today is information
The Extent of Cybercrime - Software piracy
- The unauthorized and illegal copying of software programs
- Phishing
- An Internet-based scam that uses official-looking e-mail messages to steal valuable information
- May threaten the viability of
- e-commerce
The Extent of Cybercrime - Not all cybercrime is committed for financial gain
Cybercrime and the Law - Communications Decency Act (1996)
- No Electronic Theft Act (1997)
- Digital Theft Deterrence and Copyright Damages Improvement Act (1999)
- Cyber Security Enhancement Act (2002)
Cybercrime and the Law - Computer-related crime
- Any illegal act for which knowledge of computer technology is involved for its investigation, perpetration, or prosecution
Cybercrime and the Law - Computer abuse
- Any incident associated with computer technology in which a victim suffered or could have suffered loss and perpetrator intentionally gained or could have gained
The History and Nature of Hacking - Computer hacking may have started in the late 1950s with the creation of the interstate phone system and direct distance dialing
The History and Nature of Hacking - Phone phreaks
- Used special telecommunications access codes and other restricted technical information to avoid paying long-distance charges
- Modern version involves electronic theft of cell phone numbers and access codes
- Voice mail hacking and voice mail fraud
A Profile of Cybercriminals - Cybercriminals tend to come from hacker subculture because hackers and hacker identities are a product of cyberspace
A Profile of Cybercriminals - Average hacker
- Male between 16-25 who lives in the US
- Computer user but not programmer
- Hacks with software written by others
- Primary motivation is to gain access to Web sites and computer networks
A Profile of Cybercriminals - Hacker typology based on psychological characteristics
- Pioneers
- Scamps
- Explorers
- Game players
- Vandals
- Addicts
A Profile of Cybercriminals - Not all hackers are kids - some are high-tech computer operators
Cybercrime as a Form of White-Collar Crime - Some see computer crime as a new form of white-collar crime. There are many similarities between the two:
- Both often committed through nonviolent means
- Access to computers or storage media often needed
- Involve information manipulations creating profits or losses
Cybercrime as a Form of White-Collar Crime - Some see computer crime as a new form of white-collar crime. There are many similarities between the two:
- Both can be committed by individuals or organizations
- Both are difficult to detect
- Viewed them as less serious than violent crimes
Cybercrime as a Form of White-Collar Crime - Some see computer crime as a new form of white-collar crime. There are many similarities between the two:
- Both cost individuals, organizations, and society large amounts of money and other resources
- Prevention requires a combination of legal, technical, managerial, security, and audit-monitoring controls
Technology in the Fight Against Crime - Technology is a double-edged sword
- Provides criminals new weapons to commit crimes
- Provides the criminal justice system with new tools to fight crime
- Criminally useful or evasive technologies and law enforcement capabilities commonly leapfrog one another
DNA Technology - DNA profiling
- The use of biological residue found at a crime scene for genetic comparisons to help identify suspects
- DNA evidence long-lasting
- Highly reliable but not infallible
- The greatest threat to reliable results is human error in conducting the tests
DNA Technology - Daubert standard
- Test to determine whether a form of scientific evidence is reliable
- Key factors:
- It has been subjected to testing
- It has been subjected to peer review
- It has known/potential rates of error
- It has standards controlling application of the techniques involved
DNA Technology - Most states and the federal government have digitized forensic DNA databases
- FBI’s National DNA Index System (NDIS)
- All states have legislation requiring convicted offenders to provide samples for DNA databases
- DNA Identification Act of 1994
Computers and Crime-Fighting Tools - Computers used to keep records
- Computers help design new technology and assign resources to problem areas
- Computers connect people
Computers and Crime-Fighting Tools - Expert systems
- Computer hardware and software system that tries to duplicate the decision-making processes used by investigators in analyzing evidence and recognizing patterns
Combating Cybercrime - Threat analysis (risk analysis)
- a complete and thorough assessment of the kinds of perils facing an organization
Combating Cybercrime - Once threats are identified, strategies to deal with them can be introduced
- An audit trail traces/records activities of computer operators and allows auditors to examine the sequence of events relating to any transaction
- A powerful tool for identifying instances of computer crime
Police Investigation of Computer Crime - Many police departments lack personnel skilled in the investigation of computer crimes
- May intentionally avoid computer-crime investigations
- Many departments place a low priority on computer crime
Police Investigation of Computer Crime - FBI’s National Computer Crime Squad investigates violations of federal computer crime laws
- DCS-3000 network “sniffer” focuses on intercepting suspect personal communications delivered via wireless services
Cybercrime and Internet Security - Information is the lifeblood of the modern age – needs to be moved safely and securely
- Commission on Critical Infrastructure Protection
- National Infrastructure Protection Center (1998)
- Succeeded by the Office of Infrastructure Protection (part of DHS)
Cybercrime and Internet Security - U.S. Computer Emergency Readiness Team (2003)
- Pres. Obama has identified cybersecurity as one of the most serious economic and national security challenges facing the U.S.
Cybercrime and Internet Security - In 2009, announcement appoint of first White House Cybersecurity Coordinator
- Responsible for coordinating cybersecurity activities across the federal government
- Howard A. Schmidt
Policy Issues: Personal Freedoms in the Information Age - First Amendment
- Freedom of speech
- Are electronic communications protected?
- Fourth Amendment
- Freedom from unreasonable searches and seizures
- Does this include electronic information?
Do'stlaringiz bilan baham: |