computer crime computer fraud and cyber terrorism n.
Skip this Video
Loading SlideShow in 5 Seconds..
Chapter 10 PowerPoint Presentation

Chapter 10

270 Vues Download Presentation
Télécharger la présentation

Chapter 10

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Computer Crime, Computer Fraud, and Cyber Terrorism III. COMPUTER FORENSICS, ELECTRONIC EVIDENCE, FRAUD, AND COMPUTER CRIME LAWS Chapter 10

  2. Chapter 10 Learning Objectives • Computer crimes and punishments. • Federal statutes for prosecuting computer crimes. • Computers as targets of crime. • Computers as instruments of crime. • Computer fraud as white-collar crime (WCC). • Cyber terrorist threats • Incident response documentation and handling

  3. Early cyber crime and laws • Prior to 1984, there were very few statutes that defined computer-related criminal offenses. • For example: When the Morris worm paralyzed half the Internet in 1988, the cost to recover was estimated at $186 million. But in 1988 there was no clearly defined law against computer viruses or worms that the government could use to prosecute Robert Morris Jr., the worms creator. • Instead, Morris was charged with illegal wiretapping.

  4. Allied Irish Banks Trader Gets 7 ½ Years for fourth Largest Bank Fraud Scandal in the World • John M. Rusnak, a former currency trader for Allfirst Financial Inc., manipulated his company’s computer system, which allowed him to illegally collect over $850,000 in enhanced salary and bonuses. • Rusnak entered fictitiousoptions trades in Allfirst’s computer system in the late 1990s making it appear as if his $691 million in trading losses had been offset by the options positions, and to show millions of dollars in bogus profits. • Case on Point: Bank Fraud Scandal

  5. Trusted Controller Commits $2.5 Million Fraud • A manufacturing firm blamed inefficiencies in their manufacturing process as the cause of cash flow problems. • Their new chief financial officer (CFO) realized that a manufacturing inefficiency was not the problem so he begun a forensics accounting investigation. • The investigation revealed that the controller had altered checks, which he then deposited into his own bank accounts. • The controller’s fraud scheme had cost the firm $2.5 million over 5 years. • Case on Point: Fraudsters are often long-time employees

  6. U.S. Federal Statutes That Define Computer Crime, Fraud, and Terrorism

  7. Computer Fraud and Abuse Act of 1986 • In the U.S., most computer hacking is penalized under one or more federal statutes. • The most commonly used federal statute for computer crime is the Computer Fraud and Abuse Act of 1986.

  8. Electronic Communications Privacy Act, (ECPA) • In 1986, Congress passed the first version of the Electronic Communications Privacy Act, (ECPA). • This Act updated the Federal Wiretap Act so that it would apply to the illegal interception of electronic communications or the intentional, unauthorized access of electronically stored data.

  9. Communications Assistance for Law Enforcement Act • On October 25, 1994, Congress amended the ECPA by enacting the Communications Assistance for Law Enforcement Act. • It noted that: “In the 8 years since the enactment of ECPA, society’s patterns of using electronic communications technology have changed dramatically.”

  10. Key “Computer Fraud and Abuse” Terms • The DOJ defines computer crime as: • “Any violations of criminal law that involve knowledge of computer technology for their perpetration, investigation, or prosecution.” • Statutes must define terms precisely to be effective. • If the wording of any key term is ambiguous, crimes are extremely difficult to prosecute. • Definition

  11. Specific Meanings of the Key Terms FIGURE 10.1 Key terms in the Computer Fraud and Abuse Act

  12. Specific Meanings of the Key Terms FIGURE 10.1 Key terms in the Computer Fraud and Abuse Act (continued)

  13. Specific Meanings of the Key Terms FIGURE 10.1 Key terms in the Computer Fraud and Abuse Act (continued)

  14. Specific Meanings of the Key Terms FIGURE 10.1 Key terms in the Computer Fraud and Abuse Act (continued)

  15. Specific Meanings of the Key Terms FIGURE 10.1 Key terms in the Computer Fraud and Abuse Act (continued)

  16. Where does junk mail (spam) come from? • From software called Spam ware. • Spam wareis software that automatically searches the Web to collect what it recognizes as email addresses. • Definition

  17. CyberBrief: Spam ware • The Center for Democracy and Technology (CDT) investigated how junk-mail spammers get hold of email addresses. • They created 100s of email addresses and used each one only once. • After 6 months, over 8,000 unsolicited emails arrived to these email addresses. How does it work?

  18. What can you do to help prevent spam? • Spam ware software failed when an email address was obscured in some way • For example, writing “at” instead of the @ symbol. Obscured addresses can not be detected by spam ware

  19. Computer as the Instrument of Crime: • Using a Computer tend to be traditional offenses, such as: • Theft • Fraud • Forgery • They differ from traditional crimes in that they are committed using either a: • Computer • Computer network or • Information or communications technology Definition

  20. Computer Fraud • According to The Wells Report of 2000, computer fraud and abuse cost U.S. companies over $400 billion a year. • The Association of Certified Fraud Examiners (CFE), the largest antifraud organization, estimated that U.S. companies lost 6% of revenues, or $600 billion annually, to fraud in 2002. Defining the Problem

  21. Computer Fraud as White-collar Crime (WCC) • White-collar Crime (WCC) • Any nonviolent crime. • These crimes are committed using deception for economic gain. Definition

  22. Cyber Terrorist Threats Cyber Terrorism • The use of computers and the Internet to launch attacks and horrible acts that may directly or indirectly harm or kill people. Definition

  23. Cyber Terrorist Threats • Computers control many important operations, such as: • Power plants • Telephone systems • Manufacturing activities • Airline traffic • Transportation systems • Energy Therefore, disruptions in any of these systems could cause loss of life or widespread panic.

  24. Incident Response

  25. Incident Response Documentation and Handling • Documenting incidentsof computer crime is a very important activity. • Also critical is to have documentation of what to do in case of an incident. • Documentation ensures that contact information is available so that attention can be focused on containing and documenting the incident.

  26. Incident Response Documentation and Handling Incident Survey Form Forms may be posted on local Web server.

  27. Incident Response Documentation and Handling • These forms alert people to suspicious events. • If the incident becomes a legal action, documentation that was captured during the incident may prove: • Proper care, • Control, and • Chain of custody of the evidence.