Date post: | 23-Dec-2015 |
Category: |
Documents |
Upload: | justin-griffin |
View: | 215 times |
Download: | 0 times |
B Y : S T U D E N T N A M E
Computer Crimes
Computer Crime Introduction
2
The development of computer technology has created a vast new potential for crime.
Some of these are just new spins and old fashioned crimes such embezzlement, extortion , counterfeiting, and espionage created by the existence of computers.
Others are new kinds of crimes that would not have existed without computers such as destructive software
Computer Crimes Definition
3
Computer crimes is defined any illegal act for which knowledge of computer technology is used to commit offense
A computer may be either actively or passively involved in the crime
It is actively involved if teh computer is used to break into files, steal money.
And it is passively involved where a computer is used to keep track of clients and goods
Computer crimes classification 4
McEwen classifies computer crimes into five categories:
1. internal computer crimes (viruses)
2. Telecommunications crimes
3. Computer manipulation crimes (embezzlement, fraud)
4. Support of criminals enterprises (data bases)
5. Hardware/ software thefts
Kinds of Computer crime 5
Computer crimes can be divided into two basic categories
1. Crimes against computer
2. Crimes committed using computer
Crimes against computers 6
Crimes against computers can involve damage to computer hardware or software, or theft of computer technology
Damage to computer : people get angry at computer for a variety of reasons, and making an action against the computer
Erasure all computer data and tampering with computer programsDestroy files of the network corporate customersPouring a salt solution or a caustic fluid into the operational consoleAttacks on computer systems would not have to physically harm the
computers themselves, there are many ways to destroy the information on a computer without ever coming physically near it or damaging its hardware
The theft of computer themselves
Crimes using computers 7
The computer has become a new tool that can act like an extension of the human mind. It can be used for good or evil
the positive uses are applauded and should be encouraged to augnment human development.
Some of the negative use involve systems that make killing in war war more efficient, and the expanding growth of industries supported by computer use that endanger the environment.
Other applications are in the area of crime, where the computer creates new possibilities for criminal activity and can be used as the criminal’s tool to carry them out
Crimes using computers embezzlement by computer
8
Computer did’nt do it, computers don’t commit crimes, but they can be misused
Theft9
Theft of information is one of te problems that rise using electronic credit cards, where people can access credit card records to alter bad reports for customers, or sells some’one good credit history to another who need one
Th idea is that anyone who can access computerized records may be able to change them, and can create a who fictious person and give him or her a birthdate, birthplace, job, school record and social number .
Fraud 10
Embezzlement is a kind of fraud Three mens working at a travel agency computerized reservation terminal
to create fictitious frequent flyer accounts and credit them with miles flown by passengers who where not in frequent flyer program
Computerized election results present a good opportunity for tampering and outright fraud, where it can report the wrong winner. In this kind of fraud it is difficult of verifying results and it is inpossible the detection of thefraud
Using the tax is one kind of fraud, where in some case some tax records can be erased and in another bills , additional tax can be added
One of tehfraud issue is to selling the stock market, that means entering on the stock system of the firms and salling the market
Stealing the online identities of the richest people, like stealing credit card numbers from the Internet.
Counterfeiting
11
Counterfeiting has just recently gone from an art requiring highly skilled practitioners to an easy job for anyone with high quality copier or a computer, a scanner, and a laser printer.
ATM CARDs Watermarks
Other computer crimes
12
Data interception: interception of data in transmission Data modification: alteration , destruction, or erasing of data Data theft: taking or copying data, regardless od wether it is protected by other
laws, copyright, privacy Network interference: impeding or preventing access for others. The most
common example of this action is instigating (a distributed denial of service attack. Floding web sites or Internet service providers.
Network sabotage : modification or destruction of network or a system Unauthorized access: hacking or cracking to gain access to a system or data Virus dissemination: introduction of software damaging to system or data Aiding and abettin) enabling the communication of a cyber crime Computer related forgery alteration of data with intent to represent as authentic Computer related fraud : alteration of data with intent to derive economic
benefit from its misrepresentation.
Computer crime victims
13
It is said that computer crimes are victimlessbut this is not true. If there is embezzlement or fraud there are some one, some companies that suffer.
If software or hardware or information is stolen, it is stolen from some individual. That has the right to it.
The more these agreements are broken, the more the fabric of society is weakened, and we all suffer.
Thus though big business and the government may seen to be the victims of computer crime, in fact we are really all its
victims.
Computer criminals
14Most often, they are employed by the institution they attack.
Computer crime is antiseptic and has none of the physical risks of normal crime.
It also appears easier to rob someone you cannot see, through an inanimate device.
It often doesn’t seem like crime at all to the prepetrator but more like game, a test of skills and intelligence.
One of the problem with computer criminals is that often they are not severely punished
Those who have committed damaging break-ins to computer systems often only pay a fine and serve a short time on probation or community service
It is said that: the just individual is one who protects money when it is not in use, and the one best prepared to protect money is the one who knows well how to steal it
Computer crime stoppers
Arwa Zabian Computer Ethics
15 Not only are computers serving as the tools for criminals, they are also
becoming the toole of the authorities for maintaining security and apprehending crinimals.
Computerized security checks can be instant checks of finger prints, hand prints, voice prints, or even eye prints. However, there are devious and /or violent means around all these checks
Computer can be used to track criminals’ patterns, to figure out where they may strike next
Computer is used to find proof of tax envasion, is used in tracking terrorists and their networks
Computer can be used to track a person’s movements and financial transactions
Use of ATM card or credit card can place the user at a particular location at a certain time, that means helps in discovering the crime when it is committed.
Computerized fingerprint identification systems have greatly improved the apprehension of criminals
Computer crime stoppers:16
Noting that currently the computer technologies are able to be aware of the crimes that can be perpetrated using computers and to use the computer them selves in tracking down offenders .
Failure to report computer crime
17 Many computer crimes are not ever detected, because their subtletly , or
because those who have been violated sadly have very little knowledge of how their computer system work.
Even when crimes are discovered, they are not always reported to the authorities.
There are a number of reasons for this, banks, insurance companies and other organizations who base much of their success on public trust do not want the public to know that their security has been compromised.
Other reasons include a lack of confidence in the ability of the authorities to apprehend the criminals
There are still very few dedicated computer crime units that have knowledge able personnel to deal with these matters.
Many victims state that they do not report computer related offenses because of unsatisfactory responses by law enforcement agencies to previous complaints.
Failure to report computer crime
18
Companies often do not know who they should contactInvestigations can be very time consuming and prosecutions
can also be expensive.There is also fear that publicizing the crime will give others
ideas, including perhaps even ideas about methods of attackThefts of information may not seem so important to a judge
who have no personal use for such informationSo, for a variety of reasons, many computer crimes are not
discovered or, even if they are, are not fully prosecuted hich gives rise to an increase in computer crime which are damaging to the stability of society
The Cyber Crime Laws of Nations
19
Based on its findings in the E-Readiness study, and in the wake of the Philippines inability to prosecute the student responsible for the “I Love You” virus, McConnell International surveyed its global network of information technology policy officials to determine the state of cyber security laws around the world.
Countries were asked to provide laws that would be used to prosecute criminal acts involving both private and public sector computers.
Over fifty national governments4 responded with recent pieces of legislation, copies of updated statutes, draft legislation, or statements that no concrete course of action has been planned to respond to a cyber attack on the public or private sector. Countries were provided the opportunity to review the presentation of the results in draft, and this report reflects their comments.
The Cyber Crime Laws of Nations
20
Countries that provided legislation were evaluated to determine whether their criminal statutes had been extended into cyberspace to cover ten different types of cyber crime in four categories:
1. data-related crimes, including interception, modification, and theft
2. network-related crimes, including interference and sabotage
3. crimes of access, including hacking and virusDistributionand associated computer-related crimes, including aiding and
abetting cyber criminals, computer fraud, and computer forgery.
The Cyber Crime Laws of Nations
21
Thirty-three of the countries surveyed have not yet updated their laws to address any type of cyber crime.
Of the remaining countries, nine have enacted legislation to address five or fewer types of cyber crime, and ten have updated their laws to prosecute against six or more of the ten types of cyber crime.
The countries evaluated are: Albania, Australia, Brazil, Bulgaria, Burundi, Canada, Chile, China, Cuba, the Czech Republic, Denmark, Dominican Republic, Egypt, Estonia, Ethiopia, Fiji, France, Gambia, Hungary, Iceland, India, Iran, Italy, Japan, Jordan, Kazakhstan, Latvia, Lebanon, Lesotho, Malaysia, Malta, Mauritius, Moldova, Morocco, New Zealand, Nicaragua, Nigeria, Norway, Peru, Philippines, Poland, Romania, South Africa, Spain, Sudan, Turkey, United Kingdom, United States, Vietnam, Yugoslavia, Zambia, and Zimbabwe.
22
23
The End