Professional Documents
Culture Documents
Cybercrime
Cybercrimes and
Cybercriminals
A "Typical"
Cybercriminal
Precociousness;
Curiosity;
persistence.
A Typical Computer
Criminal (continued)
A Typical Computer
Criminal (continued)
A Typical Computer
Criminal (continued)
Some Notorious
Cybercriminals
Chaos" ;
The Legion of Doom;
The Cult of the Dead Cow."
White hat hackers" refers to "innocent" or nonmalicious forms of hacking, while "black hat
hackers" refers roughly to what we described
above as "cracking."
Defining Cybercrime
Defining Cybercrime
(continued)
Preliminary Definition of a
Computer Crime
Preliminary Definition of
Computer Crime
Consider the following scenario:
(continued)
Scenario 4: Lee uses a computer to file a
Towards A Coherent
Definition of Computer
Girasa (2002) defines "cybercrime" as a
Crime
generic term covering a multiplicity of crimes
Towards a Coherent
Definition of Cybercrime
We can define a (genuine) cybercrime as a
(continued)
crime in which:
Genuine Cybercrimes
Three Categories of
Cybercrime
1. Cyberpiracy - using cyber-technology in unauthorized ways to:
a. reproduce copies of proprietary software and proprietary information, or
b. distribute proprietary information (in digital form) across a computer
network.
2. Cybertrespass - using cyber-technology to gain or to exceed unauthorized access to:
a. an individual's or an organization's computer system, or
b. a password-protected Web site.
3. Cybervandalism - using cyber-technology to unleash one or more programs that:
a. disrupt the transmission of electronic information across one or more
computer networks, including the Internet, or
b. destroy data resident in a computer or damage a computer system's
resources, or both.
Categorizing specific
Cybercrimes
Distinguishing
Cybercrimes from CyberMany crimes that involve the use of cyberrelated
Crimes
technology are not genuine cybercrimes.
Cyber-related Crimes
cyber-exacerbated crimes;
cyber-assisted crimes.
Cyber-exacerbated vs.
Cyber-assisted crimes
Cyberpiracy
Cybertrespass
Cybervandalism
Cyberexacerbated
Cyberstalking
Internet Pedophilia
Internet Pornography
Cyberassisted
Income-tax cheating
(with a computer)
Physical assault with
a computer
Property damage
using a computer
hardware device
(e.g., throwing a
hardware device
through a window)
Law Enforcement
Techniques to Catch
Law-enforcement agencies, in addition to
Cybercriminals
placing wiretaps on phones, have used
Law Enforcement
Techniques (continued)
Industrial Espionage
National and
International Efforts to
Problems of jurisdiction arise at both
Fight Cybercrime
Jurisdictional Problems in
Cyberspace
Jurisdictional Problems in
Cyberspace (continued)
Jurisdictional Problems in
Cyberspace (continued)
Microsoft Scenario
(Continued)
Microsoft Scenario
(Continued)
Legislative Efforts to
Com-bat Cybercrime in
The USA Patriot Act authorizes unannounced
the
U.S.
"sneak
and peek" attacks by the government
International Treaties
International Treaties
(continued)
Some
Tools/Technologies for
Some encryption and
biometrics
Combating
Cybercrime
technologies have been controversial.
Biometric Technologies
Biometric Technologies
(continued)
Facial Recognition
Programs
At Super Bowl XXXV in January 2001, facerecognition technology was used by lawenforcement agencies to scan the faces of
persons entering the football stadium.
The scanned images were then instantly
matched against electronic images (faces)
of suspected criminals and terrorists,
contained in a central computer database.
Initially, this was controversial; after
September 11, 2001, it was supported.