cyber crime
DESCRIPTION
Presentation of Cyber Crime; The Concept of cyber crime; Basic Theory of Cyber CrimeTRANSCRIPT
![Page 1: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/1.jpg)
![Page 2: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/2.jpg)
Real-world & cybercrime
• Current approaches evolved to deal with real-world crime
• Cybercrime occurs in
a different context and therefore presents different issues
![Page 3: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/3.jpg)
Example : Theft
• Real-world theft: possession of property shifts completely from A to B, i.e., A had it now B has it
• Cyber-theft: Property
is copied, so A “has”
it and so does B
![Page 4: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/4.jpg)
What is cybercrime?Cybercrimes are divided into 3
categories:
crimes where a computer is the target of the crime,
crimes where a computer is a tool of the crime, and
crimes where a computer is
incidental to the commission of the crime.
![Page 5: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/5.jpg)
Computer as Target
• Hacking (trespass)• Cracking (burglary)• Malicious code (viruses,
worms, Trojan horses)• Vandalism (web site
defacement)• Denial of service
attacks
![Page 6: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/6.jpg)
Computer As Tool
• Fraud
• Theft
• Extortion
• Stalking
• Forgery
• Child pornography
• Other???
![Page 7: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/7.jpg)
Computer Incidental
• Blackmailer uses computer to write blackmail letters
• Drug dealer stores
records on computer
• Computer used to
research murder methods
![Page 8: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/8.jpg)
Divergences• Real-world crime and
cybercrime differ in several respects
• Differences make it
difficult to apply
traditional principles
of criminal law and law enforcement to
cybercrime
![Page 9: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/9.jpg)
Real-world crime
• Proximity
• Limited Scale
• Physical constraints
• Patterns
![Page 10: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/10.jpg)
Real-world crime shaped law enforcement
• Reactive model
• Crime committed
• Investigation
• Apprehension
• Conviction
• Deterrence
• Crime controlled
![Page 11: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/11.jpg)
Cybercrime: proximity
“In the networked world, no island is an
island.”McConnell International, Cyber Crime . . . And Punishment Archaic Laws
Threaten Global Information (2001).
![Page 12: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/12.jpg)
Proximity: example #1
• Onel de Guzman, accused author of the “Love Bug” virus
• $10-$12 billion in damage in over 20 countries
• Not a crime in the Philippines, never prosecuted, anywhere
![Page 13: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/13.jpg)
Proximity: example #2
• Attacked companies in 10 states
• Extorted money by threatening to sell stolen data/return and cause damage
• FBI identified Vasiliy Gorshkov and Alexey Ivanov as the hackers Gorshkov Ivanov
![Page 14: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/14.jpg)
Physical constraints
• Anonymity
• Easier to avoid leaving trace evidence
• Crimes are committed quickly – more easily concealed
![Page 15: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/15.jpg)
Cybercrime Patterns?
• Lack of accurate statistics• No standard offense
definitions• Hard to parse a cybercrime
into “offenses” – was the Love Bug one crime or thousands of
crimes?
![Page 16: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/16.jpg)
Different Approaches• Collaborative model –
commercial• Prevention (information
sharing, etc.)• Informal reporting of
cybercrimes• Reacting – private resources
supplement law enforcement resources
![Page 17: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/17.jpg)
Legal issues• Must private personnel abide
by rules governing law enforcement?
• Permissibility of using private personnel in evidence-gathering
• Locus of the decision to prosecute
![Page 18: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/18.jpg)
Shift• Emerging model is a shift from a law enforcement, primarily reactive model, to a collaborative preventive-reactive model
• Emphasizes prevention because of the difficulties involved in reacting to cybercrime
![Page 19: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/19.jpg)
CYBER CRIME
UN Congress document of The Prevention of Crime and The Treatment of Offenders at Havana, Cuba in 1999 and at Wina, Austria in 2000, declared about cyber crime terminology :
a. Cyber crime in a narrow sense is computer crime : any illegal behaviour directed by means of electronic operation that target the security of computer system and the data processed by them.
b. Cyber crime in a broader sense is computer related crime : any illegal behaviour committed by means on relation to, a computer system offering or system or network, including such crime as illegal possession in, offering or distributing information by means of computer system or network.
![Page 20: Cyber Crime](https://reader033.vdocuments.us/reader033/viewer/2022061121/54686f43b4af9f62558b4dee/html5/thumbnails/20.jpg)
CYBER CRIME CASES2006
INP CYBER CRIME UNIT
Number Types Total
SOURCE
EXPLAINATIONComplain via INTERPOL/ FOREIGN MINISTRY
POLICE REPORT
1. Fraud 51 50 1
2. Coubterfeit 2 2 Phising
3. Threat 3 3 Viaemail (PM Australia & Bombing)
4. Gambling 5 5
5. Terrorism 1 1 www.anshar.net
6. Deface 1 1 Deface website Partai Golkar www.golkar.or.id.
7. Others 2 2 Hacking, intrusion