high tech (cyber) crimes

18
HIGH TECH (CYBER) CRIMES Elizabeth Hall Kaplan University CJ216-07 Erik Bernholdt 5.18.10

Upload: elizabeth-hall

Post on 08-May-2015

5.221 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: High Tech (Cyber) Crimes

HIGH TECH (CYBER) CRIMES

Elizabeth HallKaplan University

CJ216-07Erik Bernholdt

5.18.10

Page 2: High Tech (Cyber) Crimes

TYPES OF CYBER CRIMES

Cyber Vandalism/Computer Crimes

Technology CrimesCyber Theft/Computer Related

CrimesCyber Warfare(Siegel, 2010)(Foster, 2000)

Page 3: High Tech (Cyber) Crimes

CYBER VANDALISM

Computer Crime in which the computer or the performance of the

computer is attacked

Carried out through the computer for malevolent intent, vengeance, or damage

(Siegel, 2010)(Foster, 2000)

Page 4: High Tech (Cyber) Crimes

TYPES OF CYBER VANDALISMWorms- usually spread through e-mails, attaches itself and

resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network

computers.

Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and

hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key-loggers, remote access programs, open pornography sites on its

own, and access to total control over computer.

Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information

(Siegel, 2010)(Foster, 2000)

Page 5: High Tech (Cyber) Crimes

TYPES OF CYBER VANDALISM 2

Cyber Bullying- Repeatedly posting threatening messages, rumors, lies, and other hurtful things on social networking sites against someone, or sending

threatening e-mails etc.

Cyber Stalking- unwanted pursuing of another person through the internet either stealthily or openly

This crime generally means malicious or harmful actions directed at computers or persons via internet

(Siegel, 2010)(Foster, 2000)

Page 6: High Tech (Cyber) Crimes

TECHNOLOGY CRIMES

Technology used in crime commission other than computers themselves- includes software

These crimes often affect the elderly through phone scams promising large cash prizes after giving up

personal information such as bank account numbers, or social security numbers.

(Siegel, 2010)(Foster, 2000)

Page 7: High Tech (Cyber) Crimes

TYPES OF TECHNOLOGY CRIMES

Cell Phone Fraud- fraudulently or legitimately obtained cell phones used for

deceptive purposes such as promises of fake charities or prizes designed to illicit personal

information and money from people

Software Piracy- illegal downloads of software from the internet

(Siegel, 2010)(Foster, 2000)

Page 8: High Tech (Cyber) Crimes

TYPES OF TECHNOLOGY CRIMES

Shoplifting SoftwarePhysically stealing hardware

for resale or information Theft of cable services

(Siegel, 2010)(Foster, 2000)

Page 9: High Tech (Cyber) Crimes

TYPES OF TECHNOLOGY CRIMES 2

Duplicating Software

Selling duplicated software via internet or otherwise

This crime generally means using technology other than computers in commission of crime

(Siegel, 2010)(Foster, 2000)

Page 10: High Tech (Cyber) Crimes

CYBER THEFT

Use of the internet in the distribution of unlawful materials for profit or to commit

fraud for swift revenue returns

These crimes promote child pornography, and perpetrators swindle millions of dollars a year

from innocent people while remaining anonymous.

(Siegel, 2010)(Foster, 2000)

Page 11: High Tech (Cyber) Crimes

TYPES OF CYBER THEFT

Computer Fraud- includes theft of information, software, manipulation of bank

and credit card accounts, and corporate espionage

Unlawful distribution of pornography or drugs for profit

Denial of Services Attack- used to annoy or extract money from web users by

preventing access to service (Siegel, 2010)(Foster, 2000)

Page 12: High Tech (Cyber) Crimes

TYPES OF CYBER THEFT 2

Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file

sharingInternet securities fraud

Identity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information

(Siegel, 2010)(Foster, 2000)

Page 13: High Tech (Cyber) Crimes

TYPES OF CYBER THEFT 3

Phishing- duplicating legitimate websites in order to obtain personal information

E-tailing- illegal buying selling products via internet using fraudulent receipts

(shoplisting) and switching codes on merchandise for refunds

(Siegel, 2010)(Foster, 2000)

Page 14: High Tech (Cyber) Crimes

CYBER WARFARE

Cyber crime in which perpetrators have political motives attached

These crimes may involve computer network penetrations on military bases, defense

contractors, and aerospace companies. The goal is to embezzle vital data and information

(Siegel, 2010)(Foster, 2000)

Page 15: High Tech (Cyber) Crimes

TYPES OF CYBER WARFARE

Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the

internet to gather information on future targets without having to go behind enemy lines. Cyber Warfare- use of hackers to infiltrate

important systems such as the pentagon, the National Security Agency, and nuclear weapons lab.

Can also be used to attack electric power and essential services

(Siegel, 2010)(Foster, 2000)

Page 16: High Tech (Cyber) Crimes

CONTROLLING CYBERCRIME

The growing phenomenon of cybercrime is causing a whole new set of laws and law

enforcement processes.This causes numerous challenges for law

enforcement, because technology changes so rapidly it is hard to keep up with the

training

(Siegel, 2010)(Foster, 2000)

Page 17: High Tech (Cyber) Crimes

CONTROLLING CYBERCRIME 2

Some of these challenges include: Global nature of cybercrime

High tech crimes are often misclassified causing Statistical information to be skewed

Allocation of funds usually favors traditionalcrimes because of skewed statistics

Plenty of these crimes go unreported or recorded wrongly as traditional crimes, for the UCR

(Siegel, 2010)(Foster, 2000)

Page 18: High Tech (Cyber) Crimes

REFERENCES

Foster, R.E. (2000). Police Technology. Upper

Saddle River: Pearson Prentice HallSiegel, L.J. (2010). Criminology: Theories,

Patterns, and Typologies. Tenth Edition. Belmont:

Wadsworth Cengage Learning.