1 / 13

10. High-profile Cybercrime

10. High-profile Cybercrime. Definition. High-Profile Cyber Crime An intentionally conspicuous, well-publicized crime that including the violation of criminal law involved the knowledge of computer technology. Definition. U.S. Department of Justice (DOJ)

gzifa
Télécharger la présentation

10. High-profile Cybercrime

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. 10.High-profile Cybercrime

  2. Definition • High-Profile Cyber Crime An intentionally conspicuous, well-publicized crime that including the violation of criminal law involved the knowledge of computer technology

  3. Definition U.S. Department of Justice (DOJ) In its manual on computer crime, defines such crime as “any violations of criminal law that involve knowledge of computer technology for their perpetration, investigation, or prosecution” Being very broad, the definition, dating to 1989, remains valid.

  4. Definition DOJ divides computer crime into three categories: • Crimes in which computer hardware, peripherals, and software are the target of a crime; the criminal is obtaining these objects illegally; • Crimes in which the computer is the immediate "subject" or "victim" of a crime, i.e., the crime consists of attacks on a computer or a system, destruction or disrupting of which is the damage caused; and • Crimes in which computers and related systems are the means or "instrument" by which ordinary crimes are committed, such as theft of identities, data, or money or the distribution of child pornography.

  5. High-Profile Cyber Crime Related Cases • T.J.Maxx • 45 million credit and debit card numbers stolen • Kwame Kilpatrick • Cell phone text messages • BTK Serial Killer • Sent murder details to police and local media • Kevin Mitnick • Used social engineering to bypass the bus system

  6. T.J.Maxx • Sometimes referred to as TJ's or The Maxx • Major clothes retailer in the US • The company was at the center of major credit card fraud which affected its international operation in March, 2007

  7. T.J.Maxx • 45 million of the details of customers’ credit cards and debit cards were accessed by hackers • Affected customers were stolen by hackers installing software via wi-fi, and allowed to access customers’ personal information

  8. Kwame Kilpatrick • A former mayor of Detroit, Michigan • Text-messaging scandal emerging from a Whistleblower Lawsuit involving former Detroit Police Chief Gary Brown, Detroit Mayor Kwame Kilpatrick and his former Chief of Staff Christine Beatty

  9. Kwame Kilpatrick • The Detroit Free Press revealed the existence of more than 14,000 text messages exchanged between Kilpatrick and his chief of staff Christine • On March 11, 2013, Kilpatrick was convicted on 24 additional federal felony counts, including mail fraud, wire fraud, and racketeering

  10. BTK Serial Killer(Dennis Lynn Rader) • Birth name - Dennis Lynn Rader • Deacon of Lutheran Church • BTK – “bind, torture and kill” • Murdered 10 people in Sedgwick Country, Kansas, between 1974 and 1991

  11. BTK Serial Killer(Dennis Lynn Rader) • Sent a letter to the police for a killing that was not known • He was arrested by the evidence that found in his metadata of the Microsoft Word document inside the floppy that he sent and the DNA of the Pap smear Rader’s daughter taken was a near match to the DNA of the sample taken from the victim’s fingernails

  12. Kevin Mitnick • Computer security consultant with vast computer hacking experience, including many exploits as an infamous cyber-criminal • Used social engineering to circumvent various types of computer technology

  13. Kevin Mitnick • Charged with hacking Digital Equipment Corporation’s hardware, Pacific Bell’s hardware and the systems of companies like Motorola, NEC and Nokia

More Related