digital crime and digital terrorism - login - mycsu ... · digital crime and digital terrorism,...
TRANSCRIPT
Digital Crime and Digital Terrorism
CHAPTER
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
THIRD EDITION
Introduction and Overview of Digital Crime and Digital Terrorism
1
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Chapter Objectives
After completing this chapter, you should be able to:
1. Describe the issues, trends, and problems in digital crime and digital terrorism.
2. Understand estimates on the costs of cybercrime.
3. Understand the intended audience, purpose, and scope of this text.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Chapter Objectives
After completing this chapter, you should be able to:
4. Discuss the developmental perspective on the problem and changes to cybervictimization.
5. Describe the scheme for classifying computer crimes.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Introduction
• New Threats to the Information Age
Computers are now fixtures of everyday life.
The fear and threat of cybercrime is real.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Introduction
• New Threats to the Information Age
Computers can be used to perform many traditional criminal acts.
• Distribution of child pornography
• Exploitation
• Stalking
• Identity theft
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Defining the Terms
• Key terms for this course:
Prefix of "cyber"
Digital crime
Digital terrorism
Malware
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Overview
• The major complications of cybercrime:
Cybercrime has increased dramatically in recent years.
There is a significant inconsistency in defining computer crime offenses.
There is no systematic data collection procedure for cybercrimes.
Offenses vary greatly in character.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Developmental Perspective
• Much has changed since computers were first introduced.
Few experts explored the potential to use computers to commit crimes in the beginning.
A pioneer in early research was Donn Parker.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Developmental Perspective
• Much has changed since computers were first introduced.
Other popular publications include The Cuckoo's Egg and Takedown.
Most research focuses on the mechanics and techniques of computer crime and not the offenders or offenses committed.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Cybervictimization
• Two trends drive the reality of increased cybervictimization:
Increased use of computers
Increased availability of technical information on virus creation and computer hacking techniques
• Who poses the greatest threat?
Insiders
Outsiders
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Digital Terror
• The dynamics and processes involved in the productive of digital crime and digital terrorism are virtually the same.
• The rise of digital terrorism poses at least as grave a threat as digital crime.
• Inferences from the National Infrastructure Protection Center data can be made that digital crime and digital terrorism are on parallel tracks.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
The Costs of Cybercrime
• Estimates of cost:
Most estimates are derived from surveys of corporations and government agencies.
These estimate vary dramatically.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
The Costs of Cybercrime
• Estimates of cost:
It is very difficult to accurately calculate the costs across different categories of crime.
Many companies underreport crimes.
There may be intentional or unintentional biases.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
The Costs of Cybercrime
• Example of cybercrime costs:
FDLE survey
• Out of 403 respondents, 25% reported they had been victimized by computer crime.
• Embezzlement of funds by employees a major source of crime.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
The Costs of Cybercrime
• Example of cybercrime costs:
FDLE survey
• No attempt to estimate losses was made.
• Companies may underreport such crimes to limit public perceptions of the vulnerability.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
The Costs of Cybercrime
• Anderson and colleagues conducted the first systematic study on the costs of cybercrime. Costs were associated with different categories of computer crime:
Traditional crimes that are now "cyber" because they are conducted online.
Transitional crimes that have changed with the advent of the internet.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
The Costs of Cybercrime
• Anderson and colleagues conducted the first systematic study on the costs of cybercrime. Costs were associated with different categories of computer crime:
New crimes that have originated since the advent of the internet.
Crimes that facilitate other crimes through the misuse of the computer.
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Classification of Computer Crime
• Computer crimes can be classified into four categories:
The computer as a target
The computer as an instrument of a crime
The computer as incidental to a crime
Crimes associated with the prevalence of computers
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
The Computer as a Target
• Crimes where the computer itself is the target include the denial of expected service or the alteration of data.
• Examples include:
Data alteration
Network intrusion
Computer vandalism
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
The Computer as an Instrumentof a Crime
• The computer is used as the instrument of the crime when the computer is used to gain some other criminal objective.
• Examples include:
Theft
Fraud
Threats and harassment
Bullying
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
The Computer as Incidentalto a Crime
• The computer facilitates a crime.
• Examples include:
Money laundering
Criminal enterprise
Child pornography
Luring victims
Copyright © 2015 by Pearson Education, Inc.All Rights Reserved
Digital Crime and Digital Terrorism, Third EditionTaylor | Fritsch | Liederbach
Crimes Associated with the Prevalence of Computers
• Even those who avoid technology can be victims of crime through the prevalence of computers.
Intellectual property theft
Component theft
Counterfeiting
Identify theft