What It Was Used For? Who Used to Own It?
Cyber Crime – “Is theInternet the new “Wild     Wild West?”
The New Wild Wild WestMore cyber criminals thancyber copsCriminals feel “safe”committing crimes fromthe privacy of their o...
In the News……. 1 out of 5 children received a sexual  solicitation or approach over the  Internet in a one-year period of...
Computer CrimeComputer used to commita crime Child porn, threatening  email, assuming  someone’s identity, sexual  harass...
Global ScenarioGlobal cyber crime is $105 billion industrywhich is more than global drug traffickingEconomic meltdown and ...
Who Commits Cybercrime?Traditional journalism-speak answer: "hackers"Note: journalists really should be saying crackers, n...
ThreatsIndividualsOrganized cyber criminalsRival organizationsHostile StatesInsiders/ex employees 44%HactivistsTerrorists
Types of ThreatsMalwareVirus attacks account for more than 50% of  security incidentsTwo thirds of all malicious code thre...
PhishingEvery month more than 20,000 unique  phishing websites are detected affecting  more than 200 brandsE-BayAmazonPaypal
Electronic Fund TransferNovember 2008 100 compromised card accounts resulted in $9 million fraudulent withdrawals from 130...
Online Grooming, Sexual Exploitation and Child AbuseSec 67 B (B), (C) inserted in IT Act Amendment
Cyber PornographyCyber pornography accounts for 46% of all cyber crimes under IT ActEvery second 28,258 Internet users are...
BotnetsCollection of compromised computersCentralized control
Identity TheftEstimated more than 9 million incidents each yearSeparate offense created under IT Act Amendment
Spam“Spam accounts for 9 out of every 10   emails in the United States.”            MessageLabs, Inc., an email management...
Can-Spam Act of 2003Controlling the Assault of Non-Solicited Pornography and MarketingAct (Can-Spam)Signed into law by Pre...
Spam is HostileYou pay for Spam, not Spammers  Email costs are paid by email   recipientsSpam can be dangerous  Never cl...
Viruses and WormsDifferent types of “ailments”Viruses  software that piggybacks on   other software and runs when   you r...
Viruses and WormsDifferent types of “ailments”Viruses  software that piggybacks on   other software and runs when   you r...
Wireless Fidelity (Wi-Fi)Using antennas to create “hot spots”Hotspots – Internet Access (sometimes free) Newport Harbor -...
Wi-Fi High Jacking60-70% wireless networks are wide openWhy are the Wi-Fi networks unprotected?   Most people say “Our da...
Other Types of Cyber CrimesDenial of Service AttacksCyber stalkingCyber squattingMobile cloning
Cyber TerrorismPower Grid (nuclear power stations)Banking and Financial SystemsStock ExchangeTransportation Control System...
Computer ForensicsWhat is it?  an autopsy of a computer or network to   uncover digital evidence of a crime  Evidence mu...
Uncovering Digital EvidenceSmart Criminals don’t use their  own computers  Floppy disks  Zip/Jazz disks  Tapes  Digital ca...
Digital Evidence    Not obvious…….it’s most likely hidden on purpose    or needs to be unearthed by forensics expertsCrimi...
The Crime Scene                   (with Computer Forensics)Similar to traditional crime scenes   Must acquire the evidenc...
TrendsThe time to exploit vulnerability is decreasingCyber crimes are being committed with financial gains in mindThe atta...
Protect your Computers!Use anti-virus software and           Dont share access to yourfirewalls - keep them up to date    ...
Thank you!Any Questions?
Upcoming SlideShare
Loading in...5
×

Cybercrime

647

Published on

Computer forensics once specialized is now mainstream due to our total dependence on data. Experts deal not only with computer related crime such as hacking, software piracy, and viruses but also with conventional crimes including fraud, embezzlement, organized crime and child pornography.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
647
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
42
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "Cybercrime"

  1. 1. What It Was Used For? Who Used to Own It?
  2. 2. Cyber Crime – “Is theInternet the new “Wild Wild West?”
  3. 3. The New Wild Wild WestMore cyber criminals thancyber copsCriminals feel “safe”committing crimes fromthe privacy of their ownhomesBrand new challengesfacing law enforcement Most not trained in the technologies Internet crimes span multiple jurisdictions Need to retrofit new crimes to existing laws
  4. 4. In the News……. 1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time (www.missingchildren.com) California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com)
  5. 5. Computer CrimeComputer used to commita crime Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishingComputer as a target of acrime Viruses, worms, industrial espionage, software piracy, hacking
  6. 6. Global ScenarioGlobal cyber crime is $105 billion industrywhich is more than global drug traffickingEconomic meltdown and recessionUnder employment/unemployment
  7. 7. Who Commits Cybercrime?Traditional journalism-speak answer: "hackers"Note: journalists really should be saying crackers, not hackers,but we both understand the casual/popular misuse of the"hacker" term instead of the more strictly correct "cracker"nomenclature.Some more specific possible answers to the question of "Whocommits cyber intrusions?" might be…-- Disgruntled/untrustworthy (former) insiders-- Juveniles-- Ideologically motivated individuals-- Sophisticated professionals
  8. 8. ThreatsIndividualsOrganized cyber criminalsRival organizationsHostile StatesInsiders/ex employees 44%HactivistsTerrorists
  9. 9. Types of ThreatsMalwareVirus attacks account for more than 50% of security incidentsTwo thirds of all malicious code threats currently detected were created in 2007Any file can be infected (Flash, Adobe PDF)Toolkits or rootkits easily available
  10. 10. PhishingEvery month more than 20,000 unique phishing websites are detected affecting more than 200 brandsE-BayAmazonPaypal
  11. 11. Electronic Fund TransferNovember 2008 100 compromised card accounts resulted in $9 million fraudulent withdrawals from 130 ATMs in 49 cities across the world in 30 minutes
  12. 12. Online Grooming, Sexual Exploitation and Child AbuseSec 67 B (B), (C) inserted in IT Act Amendment
  13. 13. Cyber PornographyCyber pornography accounts for 46% of all cyber crimes under IT ActEvery second 28,258 Internet users are view pornographyThe pornography industry is larger than revenues of the top technology companies combines: Microsoft, Google, Amazon, eBay, Yahoo, Apple, Netflix and EarthlinkOne of the easiest ways of installing malware
  14. 14. BotnetsCollection of compromised computersCentralized control
  15. 15. Identity TheftEstimated more than 9 million incidents each yearSeparate offense created under IT Act Amendment
  16. 16. Spam“Spam accounts for 9 out of every 10 emails in the United States.” MessageLabs, Inc., an email management and security company based in New York.“We do not object to the use of this slang term to describe UCE (unsolicited commercial email), although we do object to the use of the word “spam” as a trademark and the use of our product image in association with that term” www.hormel.com
  17. 17. Can-Spam Act of 2003Controlling the Assault of Non-Solicited Pornography and MarketingAct (Can-Spam)Signed into law by President Bush on Dec 16, 2003  Took effect Jan 1, 2004Unsolicited commercial email must:  Be labeled  Include Opt-Out instructions  No false headersFTC is authorized (but not required) to establish a “do-not-email”registrywww.spamlaws.com –lists all the latest in federal, state, andinternational laws
  18. 18. Spam is HostileYou pay for Spam, not Spammers  Email costs are paid by email recipientsSpam can be dangerous  Never click on the opt-out link! May take you to hostile web site where mouse-over downloads an .exe  Tells spammers they found a working address  They won’t take you off the list anywayWhat should you do?  Filter it out whenever possible  Keep filters up to date  If you get it, just delete the email
  19. 19. Viruses and WormsDifferent types of “ailments”Viruses  software that piggybacks on other software and runs when you run something else  Macro in excel, word Transmitted through sharing programs on bulletin boards Passing around floppy disks  An .exe, .com file in your emailWorms  software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written
  20. 20. Viruses and WormsDifferent types of “ailments”Viruses  software that piggybacks on other software and runs when you run something else  Macro in excel, word Transmitted through sharing programs on bulletin boards Passing around floppy disks  An .exe, .com file in your emailWorms  software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written
  21. 21. Wireless Fidelity (Wi-Fi)Using antennas to create “hot spots”Hotspots – Internet Access (sometimes free) Newport Harbor - All the boats in Harbor have internet access San Francisco Giants Stadium – Surf the web while catching a game UMass (need to register, but it’s free) Cambridge, MA Philadelphia, PA – just announced – entire city by 2006
  22. 22. Wi-Fi High Jacking60-70% wireless networks are wide openWhy are the Wi-Fi networks unprotected?  Most people say “Our data is boring”  But… criminals look for wireless networks to commit their crimes  And… the authorities will come knocking on your door…..
  23. 23. Other Types of Cyber CrimesDenial of Service AttacksCyber stalkingCyber squattingMobile cloning
  24. 24. Cyber TerrorismPower Grid (nuclear power stations)Banking and Financial SystemsStock ExchangeTransportation Control Systems (Airlines reservations)Tele-CommunicationsGas/Oil/Water Pipeline Control systemsHealth/FoodEmergency ServicesMilitary/Defense Installations
  25. 25. Computer ForensicsWhat is it?  an autopsy of a computer or network to uncover digital evidence of a crime  Evidence must be preserved and hold up in a court of lawGrowing field – Many becomingcomputer forensic savvy  FBI, State and Local Police, IRS, Homeland Security  Defense attorneys, judges and prosecutors  Independent security agencies  White hat or Ethical Hackers  Programs offered at major universities such as URI http://homepage.cs.uri.edu/faculty/wolfe/cf
  26. 26. Uncovering Digital EvidenceSmart Criminals don’t use their own computers Floppy disks Zip/Jazz disks Tapes Digital cameras Memory sticks Printers CDs PDAs Game boxes Networks Hard drives
  27. 27. Digital Evidence Not obvious…….it’s most likely hidden on purpose or needs to be unearthed by forensics expertsCriminals Hide Evidence Forensics Uncover Evidence Delete their files and emails Restore deleted files and emails – they are still really there! Hide their files by encryption, Find the hidden files through password protection, or complex password, encryption embedding them in unrelated programs, and searching files (dll, os etc) techniques Use Wi-Fi networks and cyber Track them down through the cafes to cover their tracks digital trail - IP addresses to ISPs to the offender
  28. 28. The Crime Scene (with Computer Forensics)Similar to traditional crime scenes Must acquire the evidence while preserving the integrity of the evidence No damage during collection, transportation, or storage Document everything Collect everything the first time Establish a chain of custodyBut also different……. Can perform analysis of evidence on exact copy! Make many copies and investigate them without touching original Can use time stamping/hash code techniques to prove evidence hasn’t been compromised
  29. 29. TrendsThe time to exploit vulnerability is decreasingCyber crimes are being committed with financial gains in mindThe attack sophistication is increasing and more automation can be seen in the attacksThe speed of spread of attacks are increasingGrowing evidence of organized crime and beginning to overlap with activities of drug, mafia, pedophiles and money launderingCyber crime increasing on social networking sites
  30. 30. Protect your Computers!Use anti-virus software and Dont share access to yourfirewalls - keep them up to date computers with strangersKeep your operating system up to If you have a wi-fi network,date with critical security updates password protect itand patches Disconnect from the InternetDont open emails or attachments when not in usefrom unknown sources Reevaluate your security on aUse hard-to-guess passwords. regular basisDon’t use words found in adictionary. Remember thatpassword cracking tools exist Make sure your employees and family members know this info too!Back-up your computer data ondisks or CDs often
  31. 31. Thank you!Any Questions?
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×