digital crime and digital terrorism - login - mycsu ... · digital crime and digital terrorism,...

22
Digital Crime and Digital Terrorism CHAPTER Digital Crime and Digital Terrorism, Third Edition Taylor | Fritsch | Liederbach Copyright © 2015 by Pearson Education, Inc. All Rights Reserved THIRD EDITION Introduction and Overview of Digital Crime and Digital Terrorism 1

Upload: doancong

Post on 08-Aug-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

Digital Crime and Digital Terrorism

CHAPTER

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

THIRD EDITION

Introduction and Overview of Digital Crime and Digital Terrorism

1

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Chapter Objectives

After completing this chapter, you should be able to:

1. Describe the issues, trends, and problems in digital crime and digital terrorism.

2. Understand estimates on the costs of cybercrime.

3. Understand the intended audience, purpose, and scope of this text.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Chapter Objectives

After completing this chapter, you should be able to:

4. Discuss the developmental perspective on the problem and changes to cybervictimization.

5. Describe the scheme for classifying computer crimes.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Introduction

• New Threats to the Information Age

Computers are now fixtures of everyday life.

The fear and threat of cybercrime is real.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Introduction

• New Threats to the Information Age

Computers can be used to perform many traditional criminal acts.

• Distribution of child pornography

• Exploitation

• Stalking

• Identity theft

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Defining the Terms

• Key terms for this course:

Prefix of "cyber"

Digital crime

Digital terrorism

Malware

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Overview

• The major complications of cybercrime:

Cybercrime has increased dramatically in recent years.

There is a significant inconsistency in defining computer crime offenses.

There is no systematic data collection procedure for cybercrimes.

Offenses vary greatly in character.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Developmental Perspective

• Much has changed since computers were first introduced.

Few experts explored the potential to use computers to commit crimes in the beginning.

A pioneer in early research was Donn Parker.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Developmental Perspective

• Much has changed since computers were first introduced.

Other popular publications include The Cuckoo's Egg and Takedown.

Most research focuses on the mechanics and techniques of computer crime and not the offenders or offenses committed.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Cybervictimization

• Two trends drive the reality of increased cybervictimization:

Increased use of computers

Increased availability of technical information on virus creation and computer hacking techniques

• Who poses the greatest threat?

Insiders

Outsiders

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Digital Terror

• The dynamics and processes involved in the productive of digital crime and digital terrorism are virtually the same.

• The rise of digital terrorism poses at least as grave a threat as digital crime.

• Inferences from the National Infrastructure Protection Center data can be made that digital crime and digital terrorism are on parallel tracks.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

The Costs of Cybercrime

• Estimates of cost:

Most estimates are derived from surveys of corporations and government agencies.

These estimate vary dramatically.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

The Costs of Cybercrime

• Estimates of cost:

It is very difficult to accurately calculate the costs across different categories of crime.

Many companies underreport crimes.

There may be intentional or unintentional biases.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

The Costs of Cybercrime

• Example of cybercrime costs:

FDLE survey

• Out of 403 respondents, 25% reported they had been victimized by computer crime.

• Embezzlement of funds by employees a major source of crime.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

The Costs of Cybercrime

• Example of cybercrime costs:

FDLE survey

• No attempt to estimate losses was made.

• Companies may underreport such crimes to limit public perceptions of the vulnerability.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

The Costs of Cybercrime

• Anderson and colleagues conducted the first systematic study on the costs of cybercrime. Costs were associated with different categories of computer crime:

Traditional crimes that are now "cyber" because they are conducted online.

Transitional crimes that have changed with the advent of the internet.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

The Costs of Cybercrime

• Anderson and colleagues conducted the first systematic study on the costs of cybercrime. Costs were associated with different categories of computer crime:

New crimes that have originated since the advent of the internet.

Crimes that facilitate other crimes through the misuse of the computer.

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Classification of Computer Crime

• Computer crimes can be classified into four categories:

The computer as a target

The computer as an instrument of a crime

The computer as incidental to a crime

Crimes associated with the prevalence of computers

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

The Computer as a Target

• Crimes where the computer itself is the target include the denial of expected service or the alteration of data.

• Examples include:

Data alteration

Network intrusion

Computer vandalism

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

The Computer as an Instrumentof a Crime

• The computer is used as the instrument of the crime when the computer is used to gain some other criminal objective.

• Examples include:

Theft

Fraud

Threats and harassment

Bullying

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

The Computer as Incidentalto a Crime

• The computer facilitates a crime.

• Examples include:

Money laundering

Criminal enterprise

Child pornography

Luring victims

Copyright © 2015 by Pearson Education, Inc.All Rights Reserved

Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach

Crimes Associated with the Prevalence of Computers

• Even those who avoid technology can be victims of crime through the prevalence of computers.

Intellectual property theft

Component theft

Counterfeiting

Identify theft