+ All Categories
Home > Documents > Cyber Crime

Cyber Crime

Date post: 16-Nov-2014
Category:
Upload: handik-zusen
View: 8 times
Download: 3 times
Share this document with a friend
Description:
Presentation of Cyber Crime; The Concept of cyber crime; Basic Theory of Cyber Crime
Popular Tags:
20
Transcript
Page 1: Cyber Crime
Page 2: Cyber Crime

Real-world & cybercrime

• Current approaches evolved to deal with real-world crime

• Cybercrime occurs in

a different context and therefore presents different issues

Page 3: Cyber Crime

Example : Theft

• Real-world theft: possession of property shifts completely from A to B, i.e., A had it now B has it

• Cyber-theft: Property

is copied, so A “has”

it and so does B

Page 4: Cyber Crime

What is cybercrime?Cybercrimes are divided into 3

categories:

crimes where a computer is the target of the crime,

crimes where a computer is a tool of the crime, and

crimes where a computer is

incidental to the commission of the crime.

Page 5: Cyber Crime

Computer as Target

• Hacking (trespass)• Cracking (burglary)• Malicious code (viruses,

worms, Trojan horses)• Vandalism (web site

defacement)• Denial of service

attacks

Page 6: Cyber Crime

Computer As Tool

• Fraud

• Theft

• Extortion

• Stalking

• Forgery

• Child pornography

• Other???

Page 7: Cyber Crime

Computer Incidental

• Blackmailer uses computer to write blackmail letters

• Drug dealer stores

records on computer

• Computer used to

research murder methods

Page 8: Cyber Crime

Divergences• Real-world crime and

cybercrime differ in several respects

• Differences make it

difficult to apply

traditional principles

of criminal law and law enforcement to

cybercrime

Page 9: Cyber Crime

Real-world crime

• Proximity

• Limited Scale

• Physical constraints

• Patterns

Page 10: Cyber Crime

Real-world crime shaped law enforcement

• Reactive model

• Crime committed

• Investigation

• Apprehension

• Conviction

• Deterrence

• Crime controlled

Page 11: Cyber Crime

Cybercrime: proximity

“In the networked world, no island is an

island.”McConnell International, Cyber Crime . . . And Punishment Archaic Laws

Threaten Global Information (2001).

Page 12: Cyber Crime

Proximity: example #1

• Onel de Guzman, accused author of the “Love Bug” virus

• $10-$12 billion in damage in over 20 countries

• Not a crime in the Philippines, never prosecuted, anywhere

Page 13: Cyber Crime

Proximity: example #2

• Attacked companies in 10 states

• Extorted money by threatening to sell stolen data/return and cause damage

• FBI identified Vasiliy Gorshkov and Alexey Ivanov as the hackers Gorshkov Ivanov

Page 14: Cyber Crime

Physical constraints

• Anonymity

• Easier to avoid leaving trace evidence

• Crimes are committed quickly – more easily concealed

Page 15: Cyber Crime

Cybercrime Patterns?

• Lack of accurate statistics• No standard offense

definitions• Hard to parse a cybercrime

into “offenses” – was the Love Bug one crime or thousands of

crimes?

Page 16: Cyber Crime

Different Approaches• Collaborative model –

commercial• Prevention (information

sharing, etc.)• Informal reporting of

cybercrimes• Reacting – private resources

supplement law enforcement resources

Page 17: Cyber Crime

Legal issues• Must private personnel abide

by rules governing law enforcement?

• Permissibility of using private personnel in evidence-gathering

• Locus of the decision to prosecute

Page 18: Cyber Crime

Shift• Emerging model is a shift from a law enforcement, primarily reactive model, to a collaborative preventive-reactive model

• Emphasizes prevention because of the difficulties involved in reacting to cybercrime

Page 19: Cyber Crime

CYBER CRIME

UN Congress document of The Prevention of Crime and The Treatment of Offenders at Havana, Cuba in 1999 and at Wina, Austria in 2000, declared about cyber crime terminology :

a. Cyber crime in a narrow sense is computer crime : any illegal behaviour directed by means of electronic operation that target the security of computer system and the data processed by them.

b. Cyber crime in a broader sense is computer related crime : any illegal behaviour committed by means on relation to, a computer system offering or system or network, including such crime as illegal possession in, offering or distributing information by means of computer system or network.

Page 20: Cyber Crime

CYBER CRIME CASES2006

INP CYBER CRIME UNIT

Number Types Total

SOURCE

EXPLAINATIONComplain via INTERPOL/ FOREIGN MINISTRY

POLICE REPORT

1. Fraud 51 50 1

2. Coubterfeit 2 2 Phising

3. Threat 3 3 Viaemail (PM Australia & Bombing)

4. Gambling 5 5

5. Terrorism 1 1 www.anshar.net

6. Deface 1 1 Deface website Partai Golkar www.golkar.or.id.

7. Others 2 2 Hacking, intrusion


Recommended