Computer Forensics and Cyber Crime 2013 PDF

Summary

This chapter of Computer Forensics and Cyber Crime, 3rd edition, by Marjie T. Britz, explores various aspects of terrorism and organized crime. It covers the definitions and motivations behind these criminal activities, different types of terrorism (like political, nationalist, and religious terrorism), cyberterrorism, and how organized crime utilizes technology. A comprehensive overview is given of complex topics.

Full Transcript

Computer Forensics and Cyber Crime CHAPTER 6 Terrorism and Organized Crime Computer Forensics and Cyber Crime, 3r...

Computer Forensics and Cyber Crime CHAPTER 6 Terrorism and Organized Crime Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Marjie T. Britz All Rights Reserved Defining Terrorism From a governmental perspective, terrorism would involve: All criminal acts directed against a State or organization...to create a state of terror in the minds of particular persons or a group of persons or the general public. (League of Nations Convention, 1937) Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Defining Terrorism From an academic perspective, terrorism is: Employed for idiosyncratic, criminal or political reasons In contrast to assassination, the direct targets of violence are not the main targets. The immediate victims are generally chosen randomly or selectively from a target population, and serve as message generators. An attempt to communicate messages through the use of orchestrated violence. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terrorism Includes:  An act of violence  The victimization of innocents  Advance planning  Criminal character  Attempts to gain attention  Intended to instill fear Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terrorism: Classification through Motivation Can distinguish among acts of terror by the goals of those committing acts of violence:  Individual Terrorism can get overlooked due to its often lower impact, while eschewing group involvement; Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terrorism: Classification through Motivation  Political-Social Terrorism is often carried out by those with a political agenda, often to overthrow an existing government; if successful, they get called patriots, freedom- fighters, or heroes, as with the rebelling American colonists or Castro's 26th of July Movement.  Nationalist Terrorism can involve those with a social commonality or group identification and a collective perception of oppression, who persist with large memberships due to persecution. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terrorism: Classification through Motivation Environmental Terrorists, also called ecoterrorists, are ideologicaly focused on conservation of natural resources and animal rights; for example, the Earth Liberation Front (ELF) and Animal Liberation Front (ALF). State-Sponsored Terrorism consists of governments committing acts of terror against their own citizens, such as in Nazi Germany or those that support or commit acts of terror against other governments, like North Korea. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terrorism: Classification through Motivation  Religious Terrorism is perhaps the most virulent, dangerous and persistent, due to a basis in religious zealotry, among a continuum of religious organizations, including Christian, Judaic, and Islamic, among others. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Cyberterrorism is the act of Internet terrorism in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, by the means of tools such as computer viruses.  It is a controversial term.  disruption attacks against information systems for the primary purpose of creating alarm and panic.  The intentional use of computer, networks, and public internet to cause destruction and harm for certain objectives such as political or ideological. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Cyberterrorism as a Concept Instead of a display of physical catastrophe or suffering, like other forms of terrorism, may instead emphasize communication, requiring:  A transmitter (the terrorist)  A recipient (an audience, who typically are not the victims)  A mean (victims which usually randomly selected)  A message (often ideological)  A reaction (the desired impact) Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Cyberterrorism Types Simple-Unstructured: The capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target analysis, command and control, or learning capability. Advanced-Structured: The capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses an elementary target analysis, command and control, and learning capability. Complex-Coordinated: The capability for a coordinated attack capable of causing mass-disruption against integrated, heterogeneous defenses. Ability to create sophisticated hacking tools. Highly capable target analysis, command and control, and organization learning capability. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terror Online Activity Propaganda, information dissemination, recruiting and fundraising Categories for justification of committing acts of terror include that they:  Are victims and had “no choice” but to commit these acts.  Have a weakness that makes this the only feasible option.  May employ peaceful, nonviolent rhetoric to achieve a settlement. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terror Online Activity Training  Started using web-based training like legitimate organizations, which is cheaper  Still use films, training documents, outlines, and checklists about topics like building a suicide vest, using surface-to-air missiles, and creating fraudulent identification Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terror Online Activity Research and Planning  Critical processes involving identifying, locating critical information like blueprints or "how to" manuals (i.e., bomb-making), as well as plotting steps to take Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terror Online Activity Communication  Especially with the Web, communication can be decentralized, cheaper, more reliable, and harder to detect  Can use electronic dead drops (storing messages in draft folders on computers with shared access), steganography (embedded messages), online social networking sites (like Google's Orkut), and encryption Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terror Online Activity Attack Mechanism  Cyberattacks attacks can come as quickly as the attack in Estonia, or more slowly, as when Stuxnet disabled Iranian centrifuges to produce weapons-grade uranium Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terror Online Physical Critical Data Infra- Compromise of Compromise of structure a critical computer a critical system system to alter, manipulate, or severely affects destroy critical data, physical with the potential for infrastructures death, destruction, or economic turmoil Power grids, Social Security, water/sewer, dams, Center for hospitals, GPS, air Disease traffic systems, Control, communication, Department of energy pipelines Defense, etc. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Terrorism and Crime Criminal Activities  Identity theft  Copyright infringement  Cyberwarfare  Computer viruses Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Organized Crime Organized crime: is a category of transnational, national, or local groupings of highly centralized enterprises run by criminals who intend to engage in illegal activity, most commonly for money and profit.  Trafficking in nuclear materials  Human smuggling  Identity theft  Online criminal activities all organized crime groups began as criminal gangs Those engaging in organized crime are increasingly turning to technology for complex, more profitable crimes. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Organized Crime Structure & hierarchy Ritualistic Violence Profitability Recognizability Corruption of political Longevity authorities Recruitment Racketeering and Innovative, infiltration of entrepreneurial, and legitimate business opportunistic Monopolistic Exclusive membership Criminal activity Strict rules and regulations Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Organized Crime and Technology Organized crime exploiting technological advancements to conduct traditional crimes, including: Extortion Confidence scams, Fraud, including bank such as the Nigerian fraud, ATM/credit card 419 letter fraud, and stock fraud Fencing of stolen Money laundering property Human smuggling Data piracy and counterfeit goods Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Cybergangs/Cyber-Criminal Organizations Groups of individuals brought together through the medium of the Internet which conspire and/or commit non-violent or violent criminal acts facilitated by the exploitation of networked or interconnected systems. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved Confronting Contemporary Organized Crime When confronting contemporary organized crime, consider:  The diversity among emerging groups, suggesting that more are involved  The economic motivation behind hacking, cyber- attacks by organized crime groups  Incorporating "know your customer" requirements in banking to reduce fraud  That traditional hacking methods employed by organized crime groups are innovative  The convergence of transnational organized crime and terrorism Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved The Intersection of Organized Crime and Terrorism Differences:  Organized crime is economically focused, where terrorist groups are ideological.  Terrorist groups plan on replacing the government, while organized crime wants to corrupt existing government.  Organized crime wants to avoid publicity, whereas terrorist groups seek it out and thrive on it.  Terrorist groups indiscriminately seek victims, while organized crime tends to want to limit outsiders. Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved The Intersection of Organized Crime and Terrorism similarities:  Increasingly sophisticated  Employ similar methodologies  Use the web to engage in money laundering  Use the web for communication  Most common where there are minimal government controls, weak enforcement of law, and open borders  Exploit geographic locales far removed from control centers of government Computer Forensics and Cyber Crime, 3rd ed. Copyright © 2013 by Pearson Education, Inc. Britz All Rights Reserved

Use Quizgecko on...
Browser
Browser