High tech (cyber) crimes

3,104

Published on

High Tech Cyber Crimes

1 Comment
2 Likes
Statistics
Notes
No Downloads
Views
Total Views
3,104
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
272
Comments
1
Likes
2
Embeds 0
No embeds

No notes for slide

High tech (cyber) crimes

  1. 1. Elizabeth Hall Kaplan University CJ216-07 Erik Bernholdt 5.18.10
  2. 2. Cyber Vandalism/Computer Crimes Technology Crimes Cyber Theft/Computer Related Crimes Cyber Warfare (Siegel, 2010) (Foster, 2000)
  3. 3. Computer Crime in which the computer or the performance of the computer is attacked Carried out through the computer for malevolent intent, vengeance, or damage (Siegel, 2010) (Foster, 2000)
  4. 4. Worms- usually spread through e-mails, attaches itself and resends itself out through your e-mail contacts. Causes files to react slowly, and works its way through individual and network computers. Viruses- usually spread through innocent looking links and social network sites attaching itself to applications, videos, and hyperlinks. Very harmful to computers, causes hard drive failure, or can contain backdoor Trojan programs which can contain key- loggers, remote access programs, open pornography sites on its own, and access to total control over computer. Computer Hacking – perpetrators break into security systems in order to use services, change information, or steal information (Siegel, 2010) (Foster, 2000)
  5. 5. Cyber Bullying- Repeatedly posting threatening messages, rumors, lies, and other hurtful things on social networking sites against someone, or sending threatening e-mails etc. Cyber Stalking- unwanted pursuing of another person through the internet either stealthily or openly This crime generally means malicious or harmful actions directed at computers or persons via internet (Siegel, 2010) (Foster, 2000)
  6. 6. Technology used in crime commission other than computers themselves- includes software These crimes often affect the elderly through phone scams promising large cash prizes after giving up personal information such as bank account numbers, or social security numbers. (Siegel, 2010) (Foster, 2000)
  7. 7. Cell Phone Fraud- fraudulently or legitimately obtained cell phones used for deceptive purposes such as promises of fake charities or prizes designed to illicit personal information and money from people Software Piracy- illegal downloads of software from the internet (Siegel, 2010) (Foster, 2000)
  8. 8. Shoplifting Software Physically stealing hardware for resale or information Theft of cable services (Siegel, 2010) (Foster, 2000)
  9. 9. Duplicating Software Selling duplicated software via internet or otherwise This crime generally means using technology other than computers in commission of crime (Siegel, 2010) (Foster, 2000)
  10. 10. Use of the internet in the distribution of unlawful materials for profit or to commit fraud for swift revenue returns These crimes promote child pornography, and perpetrators swindle millions of dollars a year from innocent people while remaining anonymous. (Siegel, 2010) (Foster, 2000)
  11. 11. Computer Fraud- includes theft of information, software, manipulation of bank and credit card accounts, and corporate espionage Unlawful distribution of pornography or drugs for profit Denial of Services Attack- used to annoy or extract money from web users by preventing access to service (Siegel, 2010) (Foster, 2000)
  12. 12. Illegal Copyright Infringement (Warez) – stealing software, destroying it’s copyright information, then posting on internet or file sharing Internet securities fraud Identity Theft- computer used to steal personal information to obtain fraudulent loans, credit, or bank account information (Siegel, 2010) (Foster, 2000)
  13. 13. Phishing- duplicating legitimate websites in order to obtain personal information E-tailing- illegal buying selling products via internet using fraudulent receipts (shoplisting) and switching codes on merchandise for refunds (Siegel, 2010) (Foster, 2000)
  14. 14. Cyber crime in which perpetrators have political motives attached These crimes may involve computer network penetrations on military bases, defense contractors, and aerospace companies. The goal is to embezzle vital data and information (Siegel, 2010) (Foster, 2000)
  15. 15. Cyber Terrorism- enemies strike at targets without bombs, such as the American economy, or use the internet to gather information on future targets without having to go behind enemy lines. Cyber Warfare- use of hackers to infiltrate important systems such as the pentagon, the National Security Agency, and nuclear weapons lab. Can also be used to attack electric power and essential services (Siegel, 2010) (Foster, 2000)
  16. 16. The growing phenomenon of cybercrime is causing a whole new set of laws and law enforcement processes. This causes numerous challenges for law enforcement, because technology changes so rapidly it is hard to keep up with the training (Siegel, 2010) (Foster, 2000)
  17. 17. Some of these challenges include: Global nature of cybercrime High tech crimes are often misclassified causing Statistical information to be skewed Allocation of funds usually favors traditional crimes because of skewed statistics Plenty of these crimes go unreported or recorded wrongly as traditional crimes, for the UCR (Siegel, 2010) (Foster, 2000)
  18. 18. Foster, R.E. (2000). Police Technology. Upper Saddle River: Pearson Prentice Hall Siegel, L.J. (2010). Criminology: Theories, Patterns, and Typologies. Tenth Edition. Belmont: Wadsworth Cengage Learning.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×