By Margaret Kidd and Mary Rayme
IS 585, Fall 2013
Crime committed by use of a computer.
• child pornography
What is Cybercrime?
What is Cybercrime?
• identity theft
• theft and embezzlement
What are the most
in an information
Published child pornography arrests
in US libraries, 2011-2013
Alaska, Anchorage Loussac Public Library
California, Auburn Library
California, Foothill Ranch Public Library
California, Fresno County Public Library
California, Main Street Library, Santa Monica
Florida, Florida Atlantic University Library
Florida, Harrell Memorial Library
Florida, South East Wimberly Library
Illinois, Bloomingdale Public Library
Illinois, Orland Park Public Library
Illinois, Southwest Illinois College Library
Indiana, Lawrenceburg Library
Kentucky, Louisville Free Public Library
Maryland, Queen Anne Public Library
Michigan, Kent District Library
Missouri, Jefferson College Library
Missouri, Metropolitan Community College Library
Nevada, Western Nevada College
New Jersey, North Plainfield Library
New Jersey, Plainsboro Township Public Library
Oregon, Monroe County Public Library
South Carolina, Oconee County Library
South Dakota, Rapid City Public Library
Tennessee, First Regional Library
Tennessee, Nashville Public Library
Tulsa City-County Library, Oklahoma
West Virginia, Clay County Public Library
West Virginia, Randolph County Public Library
West Virginia, Parkersburg-Wood County Public Library
Other Top Cybercrimes in an
• stolen data/altering data
• identity theft
• info stolen over wifi
• pirated music, audiobooks, ebooks
• malware, viruses
Who polices cybercrime?
The Secret Service was the first law enforcement entity to
police cybercrime. Since then the responsibility has spread
• Department of Homeland Security
1986, The Cuckoo’s Egg
1988, The Morris Worm
1998, Back Orifice
1999, The Melissa Virus
2000, Web Denied
2003, Blaster Worm & Blackout
2007, Israel Air Defense Kill Switch
2007, Zeus Botnet
2009, China Attacks Google
2012, Unlimited Operation
Who are cybercriminals?
From “Top 50 Bad Hosts and Networks”, HostExploits’s Worldwide Cybercrime
Series. Second Quarter, 2012 – Report.
Can Prevent Cybercrime!
Cyber Security Tips
for Library Staff and Users
• Our library users expect to have a safe
• To provide this we must
Be knowledgeable about cybercrime
Some steps that libraries can
take to prevent cybercrime:
• Perform regular anti-virus and
• Use firewalls
• Block users from downloading
programs onto public computers
• Routinely evaluate and update
security measures as needed
• Secure browsing: Does not save browser
history, search history, download history, or
temporary internet files.
• Examples: Firefox Private Browsing & Chrome
• Caution: Files that are downloaded and
bookmarks saved will be kept. The ISP and
employer can still track the pages you visit.
Protect and strengthen
• Never share your passwords with
• Have patrons use passwords to login
• Use guest passwords that are
• Use a password generator for strong passwords
• Example: LastPass a product to generate and manage
• Use a password checker to evaluate password
Two part authentication:
Additional layer of security using password &
Even if password is cracked the account still cannot
be accessed without the code
• Modify behavior: Be careful about
information that you post on social media
as such information could be used to
hack your account by guessing
passwords or challenge questions.
• Click with caution: Do not click on links
or open emails that you are unfamiliar
with. They could potentially be source of
malware. Be aware of phishing scams;
do not provide sensitive information.
Use caution on a public wifi network.
Do not use unsecured wifi for financial or
Check the network name
Turn off sharing
Turn off wifi capability when not in use
Use a virtual private network.
• Clean up
Consolidate or close old accounts that could
be used by someone to gain access.
The Future of Cybercrime and
• Cyber criminals are continually finding new ways to exploit
• Per Project 2020 report: Cyber crimes in 2020 will be
adaptations of existing crimes to the technological
developments of the next seven to eight years.
• New challenges will also emerge such as threats to critical
infrastructure and human implants. These will increasingly blur
the distinction between cyber and physical attack.
What does this mean
• Be aware of how cybercriminals are
evolving and keep up with the latest
trends in cyber security.
• Part of our mission as information
professionals is to educate people.
• Be more proactive in educating our users
on how to protect their information.
All vintage mag covers from: http://www.coverbrowser.com