Podcast
Questions and Answers
Which of the following is NOT considered a form of online crime?
Which of the following is NOT considered a form of online crime?
- Industrial espionage
- Eco-terrorism
- Identity theft
- Public speaking (correct)
Cyber vandalism involves interference with the lawful use of computers.
Cyber vandalism involves interference with the lawful use of computers.
True (A)
What type of crime involves threats such as extortion and cyber bullying?
What type of crime involves threats such as extortion and cyber bullying?
Threatening communications
The illegal practice of manipulating stock markets is known as __________.
The illegal practice of manipulating stock markets is known as __________.
Match the following types of online crimes with their descriptions:
Match the following types of online crimes with their descriptions:
Which of the following is NOT a traditional method of proprietary information theft?
Which of the following is NOT a traditional method of proprietary information theft?
Disgruntled employees can be a source of trade secrets theft.
Disgruntled employees can be a source of trade secrets theft.
What is the FBI's estimate regarding foreign intelligence operations targeting the U.S.?
What is the FBI's estimate regarding foreign intelligence operations targeting the U.S.?
Political espionage can involve monitoring communications from __________.
Political espionage can involve monitoring communications from __________.
Match the method of theft with its description:
Match the method of theft with its description:
Which group is primarily associated with cyber terrorism?
Which group is primarily associated with cyber terrorism?
Cyber terrorism entails non-disruptive attacks aimed at acquiring information.
Cyber terrorism entails non-disruptive attacks aimed at acquiring information.
Name one common method used in cyber terrorism.
Name one common method used in cyber terrorism.
Which of the following is illegal in all states and prohibited by federal law?
Which of the following is illegal in all states and prohibited by federal law?
Child enticement and exploitation is a crime that law enforcement has had little success in preventing.
Child enticement and exploitation is a crime that law enforcement has had little success in preventing.
What does the term 'child pornography' generally refer to?
What does the term 'child pornography' generally refer to?
The ease of access to online gambling, including access by ______, raises concerns about its legality.
The ease of access to online gambling, including access by ______, raises concerns about its legality.
Match the following crimes with their descriptions:
Match the following crimes with their descriptions:
What is a common challenge in prosecuting child pornography cases?
What is a common challenge in prosecuting child pornography cases?
The Internet Gambling Prohibition & Enforcement Act of 2006 effectively eliminates online gambling.
The Internet Gambling Prohibition & Enforcement Act of 2006 effectively eliminates online gambling.
What is the strategy employed by law enforcement in sting operations for child enticement?
What is the strategy employed by law enforcement in sting operations for child enticement?
What is web-cramming?
What is web-cramming?
ISP Jacking involves connecting users to their selected Internet service providers.
ISP Jacking involves connecting users to their selected Internet service providers.
What technique involves stealing fractions of a cent from numerous accounts?
What technique involves stealing fractions of a cent from numerous accounts?
______ involves the manipulation of data packets to mimic a third party.
______ involves the manipulation of data packets to mimic a third party.
What is insider trading?
What is insider trading?
Match the following terms with their definitions:
Match the following terms with their definitions:
Securities fraud can result from the dissemination of false information.
Securities fraud can result from the dissemination of false information.
Define e-Fencing in the context of neo-traditional crime.
Define e-Fencing in the context of neo-traditional crime.
Which of the following is NOT a step in the money laundering process?
Which of the following is NOT a step in the money laundering process?
The primary purpose of layering in money laundering is to return funds to the legitimate economy.
The primary purpose of layering in money laundering is to return funds to the legitimate economy.
What is the first step in the money laundering process?
What is the first step in the money laundering process?
Money laundering is often a critical element for __________ crime to function.
Money laundering is often a critical element for __________ crime to function.
Which action is part of combating money laundering?
Which action is part of combating money laundering?
Match the following aspects of technology with their implications for modern society:
Match the following aspects of technology with their implications for modern society:
Holding Internet service providers accountable for inadequate record maintenance is a method to combat money laundering.
Holding Internet service providers accountable for inadequate record maintenance is a method to combat money laundering.
What is one responsibility of financial institutions in combating money laundering?
What is one responsibility of financial institutions in combating money laundering?
Which of the following is an example of online crime that disrupts lawful computer use?
Which of the following is an example of online crime that disrupts lawful computer use?
Cyber bullying is classified as a type of online crime.
Cyber bullying is classified as a type of online crime.
What crime involves the unauthorized theft of someone's personal information for financial gain?
What crime involves the unauthorized theft of someone's personal information for financial gain?
______ refers to illegal activities involving the transfer of funds through malpractices to hide their origin.
______ refers to illegal activities involving the transfer of funds through malpractices to hide their origin.
Match the following online crimes with their descriptions:
Match the following online crimes with their descriptions:
Which of the following is NOT a traditional method of proprietary information theft?
Which of the following is NOT a traditional method of proprietary information theft?
Disgruntled employees can contribute to the theft of trade secrets.
Disgruntled employees can contribute to the theft of trade secrets.
What type of crime involves deliberate attacks against information systems intended to disrupt services?
What type of crime involves deliberate attacks against information systems intended to disrupt services?
___________ refers to techniques like shoulder surfing and dumpster diving to acquire sensitive information.
___________ refers to techniques like shoulder surfing and dumpster diving to acquire sensitive information.
Match the following methods of theft with their descriptions:
Match the following methods of theft with their descriptions:
Which foreign intelligence agency was noted for monitoring Presidential communications?
Which foreign intelligence agency was noted for monitoring Presidential communications?
Political espionage is not considered an international threat.
Political espionage is not considered an international threat.
What is a common result of political espionage according to FBI estimates?
What is a common result of political espionage according to FBI estimates?
What is a major challenge in prosecuting child pornography cases?
What is a major challenge in prosecuting child pornography cases?
Child pornography is legal in some states in the United States.
Child pornography is legal in some states in the United States.
What strategy do law enforcement officials use in sting operations to combat child enticement?
What strategy do law enforcement officials use in sting operations to combat child enticement?
The Internet Gambling Prohibition & Enforcement Act of 2006 makes online gambling ________.
The Internet Gambling Prohibition & Enforcement Act of 2006 makes online gambling ________.
What type of materials can online pharmacies be used to purchase illegally?
What type of materials can online pharmacies be used to purchase illegally?
Match the following crimes with their descriptions:
Match the following crimes with their descriptions:
Online gambling is easily accessible to minors.
Online gambling is easily accessible to minors.
What law enforcement strategy has proven effective against child exploitation?
What law enforcement strategy has proven effective against child exploitation?
What is cyberstalking?
What is cyberstalking?
Cyberbullying is illegal under Federal law.
Cyberbullying is illegal under Federal law.
Name one form of online fraud that involves misrepresentation.
Name one form of online fraud that involves misrepresentation.
Cyberharassment focuses on actual harm suffered, including _____ of character.
Cyberharassment focuses on actual harm suffered, including _____ of character.
Match the following types of online fraud with their descriptions:
Match the following types of online fraud with their descriptions:
Which of the following methods is part of online credit card fraud?
Which of the following methods is part of online credit card fraud?
Online fraud affects only a specific demographic group.
Online fraud affects only a specific demographic group.
What is the primary goal of online fraud?
What is the primary goal of online fraud?
What is the first step in the money laundering process?
What is the first step in the money laundering process?
Layering in money laundering involves returning funds to the legitimate economy.
Layering in money laundering involves returning funds to the legitimate economy.
Name one critical action in combating money laundering.
Name one critical action in combating money laundering.
The practice of using networks to obscure the origins of funds is known as __________.
The practice of using networks to obscure the origins of funds is known as __________.
Match the steps of money laundering to their descriptions:
Match the steps of money laundering to their descriptions:
Which of the following is a method to combat money laundering?
Which of the following is a method to combat money laundering?
Computers are becoming less important in conducting cyber crime.
Computers are becoming less important in conducting cyber crime.
What is one reason for the increase in computer crime?
What is one reason for the increase in computer crime?
What is the primary legal challenge in prosecuting child pornography cases?
What is the primary legal challenge in prosecuting child pornography cases?
Child pornography is legal in some states in the United States.
Child pornography is legal in some states in the United States.
What type of crime involves law enforcement pretending to be a child to catch predators?
What type of crime involves law enforcement pretending to be a child to catch predators?
Online gambling raises concerns about access for __________.
Online gambling raises concerns about access for __________.
Match the following types of neo-traditional crime with their descriptions:
Match the following types of neo-traditional crime with their descriptions:
Which act makes online gambling illegal, but is difficult to enforce?
Which act makes online gambling illegal, but is difficult to enforce?
Online pharmacies are only used for legitimate purchases.
Online pharmacies are only used for legitimate purchases.
What is a common type of substance illegally purchased through online pharmacies?
What is a common type of substance illegally purchased through online pharmacies?
During which era did viruses primarily target DOS machines?
During which era did viruses primarily target DOS machines?
Worms are primarily used to create DoS attacks.
Worms are primarily used to create DoS attacks.
What type of malware makes digital resources inaccessible as part of extortion?
What type of malware makes digital resources inaccessible as part of extortion?
The use of compromised computers linked to the Internet for attacks is known as a __________.
The use of compromised computers linked to the Internet for attacks is known as a __________.
Match the following malware types with their descriptions:
Match the following malware types with their descriptions:
Which malware type specifically infects documents and templates?
Which malware type specifically infects documents and templates?
All spam is harmless and does not impact electronic messaging systems.
All spam is harmless and does not impact electronic messaging systems.
What level of education may affect vulnerability to ransomware attacks?
What level of education may affect vulnerability to ransomware attacks?
Which of the following is NOT a step in the money laundering process?
Which of the following is NOT a step in the money laundering process?
Frozing accounts is a strategy used to combat money laundering.
Frozing accounts is a strategy used to combat money laundering.
What is the primary goal of layering in money laundering?
What is the primary goal of layering in money laundering?
The process of money laundering typically includes three stages: Placement, Layering, and __________.
The process of money laundering typically includes three stages: Placement, Layering, and __________.
Match the following terms with their definitions:
Match the following terms with their definitions:
What is one accountability measure for Internet service providers regarding money laundering?
What is one accountability measure for Internet service providers regarding money laundering?
Technology has no impact on the increase of computer crime.
Technology has no impact on the increase of computer crime.
What role do financial institutions play in combating money laundering?
What role do financial institutions play in combating money laundering?
What is cyberstalking?
What is cyberstalking?
Cyberbullying is illegal in all states under federal law.
Cyberbullying is illegal in all states under federal law.
What is a common method of online credit card fraud?
What is a common method of online credit card fraud?
_____________ is characterized by intentional deception or misrepresentation to receive unwarranted compensation.
_____________ is characterized by intentional deception or misrepresentation to receive unwarranted compensation.
Match the following illegal online practices with their examples:
Match the following illegal online practices with their examples:
Which of the following describes shill bidding?
Which of the following describes shill bidding?
What type of communication does cyberharassment focus on?
What type of communication does cyberharassment focus on?
Online auction fraud includes misrepresentation about the condition of an item.
Online auction fraud includes misrepresentation about the condition of an item.
What is the primary tactic used in the salami technique of fraud?
What is the primary tactic used in the salami technique of fraud?
ISP jacking involves disconnecting users from their selected Internet service providers to generate long distance charges.
ISP jacking involves disconnecting users from their selected Internet service providers to generate long distance charges.
What is data diddling?
What is data diddling?
_______ refers to the sale of stolen goods through technological means.
_______ refers to the sale of stolen goods through technological means.
Match the following terms to their definitions:
Match the following terms to their definitions:
Which of the following describes web-cramming?
Which of the following describes web-cramming?
The insider trading practice is legal if the information is publicly available.
The insider trading practice is legal if the information is publicly available.
What is the main characteristic of securities fraud?
What is the main characteristic of securities fraud?
Study Notes
Web-Based Criminal Activity
- Computer crime involves more than Internet-based activities
- It includes financial losses, threats to personal security, industrial espionage, threats to international security, and threats to public safety
- Online crime includes interference with lawful use of computers, theft of information and copyright infringement, dissemination of contraband or offensive materials, threatening communications, fraud, and ancillary crimes.
- Examples of interference with lawful use of computers include eco-terrorism, DOS attacks, use of malware, cyber vandalism, cyber terrorism, spam, and etc.
- Examples of theft of information and copyright infringement include industrial espionage, ID theft, and ID fraud.
- Examples of dissemination of contraband or offensive materials include pornography, child pornography, online gaming, and treasonous or racist material.
- Examples of threatening communications include, extortion, cyber stalking, cyber harassment, and cyber bullying.
- Examples of fraud include auction fraud, credit card fraud, theft of services, and stock manipulation.
- Examples of ancillary crimes include money laundering and conspiracy.
Theft of Information, Data Manipulation, and Web Encroachment
- Traditional methods of proprietary information theft can occur due to insiders, social engineering, theft of equipment, and malware.
- Concerns about trade secrets and copyrights include having value independent of whatever owner produces and theft can come from disgruntled employees, competitors, and government entities.
- Seriousness of political espionage includes FBI estimates that over 120 foreign governments have intelligence operations targeting the U.S.
Cyber Terrorism
- A deliberate, politically, or religiously motivated attack against data compilations, computer programs, and/or information systems which is intended to disrupt and/or deny service or acquire information which disrupts the social, physical, or political infrastructure of a target
- Typical array of methods used against the U.S. Government include viruses and worms.
Neo-Traditional Crime
- Child pornography is difficult to define but refers to any visual depiction of a lascivious exhibition of the genitals or pubic area or sexually explicit conduct of a minor
- Child pornography is illegal in all states and is prohibited by federal law making it legally difficult to prosecute.
- Law enforcement has had great success with sting operations or "honeypots" by using the same strategy as predators of pretending to be a child and arranging for a meeting.
- Online pharmacies are used to make legitimate and illegitimate purchases privately and conveniently
- Ease of access for minors and open all day make online gambling popular
- e-Banking making it easier to play and potential for billions in profit also contributed to online gambling popularity.
- The Internet Gambling Prohibition & Enforcement Act of 2006 makes online gambling illegal but it is difficult to enforce due to lack of public, international cooperation.
- Web-Cramming is the unauthorized charging of consumers via monthly telecommunication fees.
- ISP Jacking is disconnecting individual users from their selected Internet service providers and redirecting them to illegitimate servers to generate long distance charges for those using dial-up.
Fraud via Data Manipulation
- Data Diddling is a method of fraud via data manipulation involving redirecting or rerouting data representing monies or economic exchanges.
- The salami technique is a method of stealing a fraction of a cent from millions of accounts, designed to go undetected.
- IP Spoofing is manipulation of data packets between computers to mimic a third party and falsely gain access to funds.
Securities Fraud and Stock Manipulation
- Instant access to stock values and statistics encourages day-trading, buying stock with little or no actual knowledge of the company
- Dissemination of false information is used to trick individuals to purchase stock at inflated prices.
- Insider trading involves individuals with access to confidential information unavailable to the public who use it to make stock purchases/sales, for personal gain.
Ancillary Crimes
- Money Laundering is an enterprise or practice of engaging in deliberate financial transactions to conceal the identity, source, and/or destination of income.
- Money Laundering is typically a critical element for organized crime.
- Steps in the money laundering process include: placement, layering, integration.
- Combating money laundering is accomplished by finding, freezing, and forfeiting.
Conclusions
- Technology both enhances and threatens modern society.
- Computer crime is increasing due to computers being equivalent to storage warehouses, Increasing connectivity & interdependence of infrastructures, technical expertise being decreasingly important, increasing number of threat groups with sophisticated methodologies & advance technology, and government apathy.
Web-Based Criminal Activity
- Computer crimes are not limited to Internet-based activities but can include financial losses, threats to personal security, industrial espionage, and threats to international and public safety.
- Online crime can include interference with lawful use of computers, such as eco-terrorism, denial of service (DoS) attacks, malware use, cyber vandalism, cyber terrorism, and spam.
- Online crime can also include theft of information and copyright infringement, such as industrial espionage, ID theft, and ID fraud.
- Dissemination of contraband or offensive materials, such as pornography, child pornography, online gaming, and treasonous or racist material is a common web-based crime.
- Threatening communications like extortion, cyberstalking, cyber harassment, and cyberbullying are frequent crimes.
- Online fraud such as auction fraud, credit card fraud, theft of services, and stock manipulation are other web-based crimes.
- Ancillary crimes, such as money laundering and conspiracy, can be facilitated by the internet.
Theft of Information, Data Manipulation, and Web Encroachment
- Traditional methods of information theft can occur through insiders, social engineering, theft of equipment, and malware.
- Trade secrets and copyrights are valuable forms of intellectual property subject to theft from disgruntled employees, competitors, and government entities.
- Political espionage is a serious concern, with foreign governments targeting the U.S. for intelligence gathering.
Cyber Terrorism
- Cyber terrorism is a deliberate, politically or religiously motivated attack against data compilations, computer programs, and information systems.
- The goal of cyber terrorism is to disrupt or deny service to a target or to acquire information that disrupts the social, physical, or political infrastructure of a target.
- Common methods used in cyber terrorism include viruses and worms.
Neo-Traditional Crime
Child Pornography
- It is challenging to define, but generally refers to any visual depiction of a lascivious exhibition of the genitals or pubic area or sexually explicit conduct of a minor.
- It's difficult to prosecute due to potential First Amendment issues regarding freedom of speech.
- It's illegal in all states and prohibited by federal law.
Child Enticement/Exploitation
- Law enforcement utilizes "honeypots" where officers pretend to be children to arrange meetings with potential predators.
Online Pharmacies
- Used for both legitimate and illegitimate purchases of substances like anabolic steroids, amphetamines, and painkillers.
Online Gambling
- Easy accessibility, including for minors.
- Operates 24/7.
- Facilitated by e-banking.
- Potentially generates billions in profit.
- The Internet Gambling Prohibition & Enforcement Act of 2006 makes it illegal, but enforcement is challenging.
Threatening and harassing communications
- Cyberstalking: Willful, malicious, and repeated following or harassing another person via electronic means.
- Cyberharassment: Focuses on the actual harm suffered, including defacement of character.
- Cyberbullying: Aggressive, intentional acts carried out using electronic forms of contact repeatedly and over time against a victim who cannot easily defend themselves.
Online Fraud
- Intentional deception, misrepresentation, or falsehood made with the intention of receiving unwarranted compensation or gratification.
- It affects people across various demographics.
- It exists in various forms, including internet auction fraud and online credit card fraud.
Internet Auction Fraud
- Nondelivery of goods.
- Misrepresentation of the condition of an item.
- Addition of hidden charges (fee-stacking).
- Shill bidding (where the seller submits bids to drive up the price).
Online Credit Card Fraud
- Skimming (installing devices to steal information from cards).
- RFID (taking information from "wave and pay" devices).
Ancillary Crimes
Money Laundering
- The practice of deliberately engaging in financial transactions to conceal the identity, source, and/or destination of income.
- Crucial for organized crime to function.
Process of Money Laundering
- Placement (point of entry of illicit funds).
- Layering (using networks to obscure the origins of funds).
- Integration (return of funds to the legitimate economy).
Combating Money Laundering
- Finding, freezing, and forfeiting funds.
Strategies Used to Combat Money Laundering
- Holding Internet service providers accountable for not maintaining adequate records.
- Making financial institutions responsible for insufficient security.
- Enforcing "Know Your Customers" regulations.
Conclusions
- Technology enhances and threatens modern society.
- Computer crime is increasing for various reasons, including:
- Computers resembling storage warehouses of data.
- Increased connectivity and interdependence of infrastructures.
- Decreasing importance of technical expertise for committing crimes.
- Rise in threat groups with sophisticated methodologies and advanced technology.
- Government apathy.
Malware Evolution
- Malware has evolved through different eras, each with its own characteristics and impact.
- The Classical Era (1960s-1970s): Primarily involved pranks or accidental distribution.
- The Floppy Era (1980s-1990s): Targeted DOS machines and was disseminated mainly through floppy disks.
- The Macro Era (1990s-2000s): Targeted documents and templates instead of programs.
- The Internet Era (2000-present): Characterized by more sophisticated malware that exploits vulnerabilities in systems.
Worms, DoS, and Botnets
- Worms are used to facilitate large-scale DoS attacks.
- DoS (Denial of Service) and DDOS (Distributed Denial of Service) Attacks: Overwhelm servers, often through mail-bombing.
- Botnets and Zombie Armies: Compromised computers connected to the internet are used as a network (botnet) for theft, extortion, or DDOS attacks.
Spam
- Spam is the abuse of electronic messaging systems across multiple platforms, consuming resources.
Ransomware
- Ransomware is malware that makes digital resources inoperable or inaccessible, extracting payment from the victim.
- Its effectiveness is influenced by user education (less educated users are more vulnerable) and the sophistication of the ransomware (some are not easily addressed by standard software remedies).
Neo-Traditional Crime: Child Pornography
- Child pornography involves visual depictions of sexually explicit conduct of minors.
- It is difficult to define and prosecute due to First Amendment concerns about freedom of speech but is illegal in all states and prohibited by federal law.
Neo-Traditional Crime: Child Enticement/Exploitation
- Law enforcement utilizes "honeypots", posing as children to attract and apprehend predators.
Neo-Traditional Crime: Online Pharmacies
- Used to purchase both legitimate and illegitimate substances (anabolic steroids, amphetamines, painkillers).
- Provide convenience and privacy for users.
Neo-Traditional Crime: Online Gambling
- Offers ease of access, including for minors.
- It is available 24/7.
- e-banking facilitates participation.
- Generates significant profits.
- The Internet Gambling Prohibition & Enforcement Act of 2006 makes it illegal, but enforcing the law is difficult due to limited international cooperation.
Neo-Traditional Crime: Threatening and Harassing Communications
- Cyberstalking: Wilful, malicious, and repeated harassment via electronic means.
- Cyberharassment: Focuses on the harm inflicted, including defamation of character.
- Cyberbullying: Aggressive, intentional acts using electronic forms of contact, repeated over time against a victim who cannot easily defend themselves. It is illegal only in some states, not under federal law.
Neo-Traditional Crime: Online Fraud
- Intentional deception, misrepresentation, or falsehood for unwarranted compensation or gratification.
- Covers a wide range of practices.
Neo-Traditional Crime: Internet Auction Fraud
- Nondelivery of goods.
- Misrepresentation of the condition of an item.
- Hidden charges (fee-stacking).
- Shill bidding (seller submits bids to inflate the price).
Neo-Traditional Crime: Online Credit Card Fraud
- Skimming: Installing devices to steal card information (like at ATMs).
- RFID (Radio Frequency Identification): Taking information from "wave and pay" devices.
Neo-Traditional Crime: Web-Cramming/ISP Jacking
- Web-Cramming: Unauthorised charging of consumers via monthly telecommunication fees.
- ISP Jacking: Disconnecting users from their chosen internet service providers, redirecting them to illegitimate servers to generate long-distance charges.
Neo-Traditional Crime: Fraud via Data Manipulation
- Data Diddling: Any fraudulent method involving data manipulation.
- Salami Technique: Stealing small amounts from numerous accounts to avoid detection.
- IP Spoofing: Manipulating data packets to mimic a third party and gain access to funds.
Neo-Traditional Crime: Securities Fraud and Stock Manipulation
- Individuals with access to confidential information (insider trading) use it to gain an unfair advantage.
- False information is disseminated to trick individuals into buying stock at inflated prices.
Neo-Traditional Crime: e-Fencing and Fraudulent Instruments
- e-Fencing: Sale of stolen goods online.
- Fraudulent instruments: Counterfeiting and forgery using technology.
Ancillary Crimes: Money Laundering
- It involves concealing the source, identity, and/or destination of illegal income.
- Placement: Putting illegal funds into the financial system.
- Layering: Using networks to disguise the origin of funds.
- Integration: Reintroducing funds into the legitimate economy.
Ancillary Crimes: Combating Money Laundering
- Finding: Identifying money laundering activities.
- Freezing: Stopping transactions and holding accounts.
- Forfeiture: Confiscation of funds.
- Holding internet service providers accountable for inadequate record-keeping.
- Holding financial institutions responsible for inadequate security.
- Enforcing "Know Your Customers" regulations.
Conclusions
- Technology both enhances and threatens modern society.
- Computer crime is increasing due to:
- Computers being data warehouses.
- Increasing connectivity and interdependence of infrastructures.
- Decreasing technical expertise required.
- Increasing number of threat groups with sophisticated methodologies and advanced technology.
- Government apathy.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Explore the vast realm of computer crime that extends beyond just Internet-related activities. This quiz examines the various forms of online crime including financial losses, threats to personal security, and the proliferation of harmful materials. Test your knowledge on topics such as cyber terrorism, industrial espionage, and online harassment.