Computer Forensics and Cyber Crime PDF
Document Details
Uploaded by IndebtedOwl
Marjie T. Britz
Tags
Summary
This document provides an overview of computer forensics and cybercrime, specifically concentrating on traditional computer crimes, early hackers, and the theft of components. It explores various aspects of these topics and includes discussions and definitions.
Full Transcript
Computer Forensics and Cyber Crime CHAPTER 3 Traditional Computer Crime: Early Hackers...
Computer Forensics and Cyber Crime CHAPTER 3 Traditional Computer Crime: Early Hackers and Theft of Components Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz Public All Rights Reserved Introduction Computer criminals will possess varying degrees of technical sophistication. Hence, the metaphor of a continuum of offenses in terms of seriousness. However, degrees of computer crimes may also be reflected by the degrees of technical expertise of agencies investigating such crimes. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Traditional Problems Traditional problems with any crime may pose more complicated issues for computer crime investigation and prosecution, such as: Questions of vicinage: The jurisdiction of most crimes is based on the location of the crime. However, computer-based crime may be subject to laws where criminal and the victim live. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Traditional Problems Lack of international cooperation: Collaboration among nations to investigate and prosecute may suffer in the absence of prior agreements to deal with this kind of crime. Perhaps due to judicial inconsistency, administrative apathy, cultural skepticism Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Traditional Problems Encryption & steganography: Encoding (cryptography) or hiding information (steganography) makes it harder for prosecution. Delay in detection can mean increased chance of escaping prosecution. Perception of anonymity: Since some may have a way to cloak their identity, anonymity may embolden them to commit crimes. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Recognizing and Defining Computer Crime Difficulties in recognizing and defining computer crimes may depend upon the: Targets Are victims individuals, organizations, countries? What are the fruits of the illegal activity? Means: To what degree does technology matter? Hacking requires a lot of technology, where fraud may involve only an e-mail, as with phishing. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Recognizing and Defining Computer Crime Incidentals Is computer technology incidental to the commission of the crime? If so, to what extent? Online gambling versus filing a false insurance claim Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Recognizing and Defining Computer Crime History Early forms of computer crime could include the theft of the physical technology (like an abacus) or sabotage, such as the destruction of Jacquard’s automated textile machine in the early 19th century CE. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Phreakers: Yesterday’s Hackers Phreaking: Manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services Illegal use, manipulation of access codes, access tones, PBXs, or switches Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Phreakers: Yesterday’s Hackers Methods Social engineering, like shoulder surfing, stealing codes while people are dialing Use of blue boxes, devices that deceived switching system to put through a call for free Some approaches became dated due to changes in phone equipment. New strategies were constantly developed, such as with the theft and sale of stolen access codes ("call-sell" operations). Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Evolution in the Hacking Community Initially: Hacking was conducted via role-playing games, by young, socially inept individuals fascinated with computer technology. Some advocated anti-establishment ideology, but others were motivated to hack telephone exchanges because of the costs associated with downloading. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Contemporary Hacking Communities Most of the original ideology is gone. Contemporary motivation includes: Profit, economic goals (like theft) Revenge (for example, by insiders such as disgruntled employees) Personal notoriety Relief from boredom Informational voyeurism (what's there to see?) (Continued) Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Contemporary Hacking Communities (Continued) Intellectual challenge (hacking as a way to mine for knowledge) Sexual gratification (stalking, harassment) Political goals (the aims of terrorists and spies) Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Hierarchy of Contemporary Cyber- Criminals Script kiddies Inexperienced hackers who use others' programs (like scripts) to exploit vulnerabilities and compromise computer systems, but they don't understand these programs Also known as skidiots, skiddie, or Victor Skill Deficiency (VSD) Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Hacking Cyberpunks Name used by law enforcement for those who wreak havoc on the Internet Not its original, more benign meaning Hackers/Crackers Sophisticated computer criminals Cyber-criminal organizations Greater threat Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Social Engineering Social engineering takes advantage of people who use technology. Insiders may be the most dangerous, whether by accident or intentionally Can reduce risks through security awareness training Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Computers as Commodities Whereas the black market involves criminal organization, the gray market involves legitimate businesses engaging in questionable activities. In addition to the ability to be stolen, software could also have problems with counterfeiting. Data piracy can include the sale of credit card numbers, for example. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Theft of Intellectual Property IP can include patents, trademarks and copyright. Software is copyright-protected. Film and television piracy can be conducted via bitstream. Can include illegal copies of DVDs, CDs, videocassettes Sometimes identifiable because of absence of authentication information, like a security hologram Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved Theft of Intellectual Property Internet piracy can include broadcast piracy and signal theft. Technology piracy can include the counterfeiting of computer chips. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz Public All Rights Reserved