SlideShare a Scribd company logo
1 of 19
Cyber Crime – “Is the
Internet the new “Wild
     Wild West?”
   Prepared for the Southern Massachusetts
            E-Commerce Network
                  Nov 5 2004
                      by
                 Suzanne Mello
           www.suzannemello.com
In the News…….
1 out of 5 children received a
sexual solicitation or approach
over the Internet in a one-year
period of time
(www.missingchildren.com)

California warns of massive ID
theft – personal data stolen from
computers at University of
California, Berkeley (Oct 21, 2004
IDG news service)

Microsoft and Cisco announced a
new initiative to work together to
increase internet security
(Oct 18, 2004
www.cnetnews.com)



                       E-Commerce Network - Suzanne Mello - Nov 5 2004
The New Wild Wild West
More cyber criminals than
cyber cops
Criminals feel “safe”
committing crimes from
the privacy of their own
homes
Brand new challenges
facing law enforcement

    Most not trained in the
    technologies

    Internet crimes span
    multiple jurisdictions

    Need to retrofit new crimes
    to existing laws
                     E-Commerce Network - Suzanne Mello - Nov 5 2004
Computer Crime
Computer used to commit
a crime

    Child porn, threatening
    email, assuming
    someone’s identity, sexual
    harassment, defamation,
    spam, phishing


Computer as a target of a
crime

    Viruses, worms, industrial
    espionage, software piracy,
    hacking         E-Commerce Network - Suzanne Mello - Nov 5 2004
Computer Forensics
What is it?
    an autopsy of a computer or network to
     uncover digital evidence of a crime
    Evidence must be preserved and hold up
     in a court of law

Growing field – Many becoming
computer forensic savvy
    FBI, State and Local Police, IRS,
     Homeland Security
    Defense attorneys, judges and
     prosecutors
    Independent security agencies
    White hat or Ethical Hackers
    Programs offered at major universities
     such as URI
      http://homepage.cs.uri.edu/faculty/wolfe/cf


                         E-Commerce Network - Suzanne Mello - Nov 5 2004
Uncovering Digital Evidence
Smart Criminals don’t use their
  own computers

  Floppy disks
  Zip/Jazz disks
  Tapes
  Digital cameras
  Memory sticks
  Printers
  CDs
  PDAs
  Game boxes
  Networks
  Hard drives


                     E-Commerce Network - Suzanne Mello - Nov 5 2004
Digital Evidence
    Not obvious…….it’s most likely hidden on purpose
    or needs to be unearthed by forensics experts

Criminals Hide Evidence             Forensics Uncover Evidence

  Delete their files and emails        Restore deleted files and emails –
                                       they are still really there!

                                       Find the hidden files through
  Hide their files by encryption,      complex password, encryption
  password protection, or              programs, and searching
  embedding them in unrelated          techniques
  files (dll, os etc)

  Use Wi-Fi networks and cyber         Track them down through the
  cafes to cover their tracks          digital trail - IP addresses to ISPs
                                       to the offender

                      E-Commerce Network - Suzanne Mello - Nov 5 2004
The Crime Scene
                      (with Computer Forensics)
    Similar to traditional crime scenes

      Must acquire the evidence while
       preserving the integrity of the
       evidence
           No damage during collection,
           transportation, or storage
           Document everything
           Collect everything the first time
      Establish a chain of custody

    But also different…….

      Can perform analysis of evidence on
       exact copy!
      Make many copies and investigate
       them without touching original
      Can use time stamping/hash code
       techniques to prove evidence hasn’t
       been compromised


                            E-Commerce Network - Suzanne Mello - Nov 5 2004
Top Cyber Crimes that
   Attack Business
                 Spam
            Viruses/Worms
  Industrial Espionage and Hackers
          Wi-Fi High Jacking
Spam
“Spam accounts for 9 out of every 10
   emails in the United States.”
            MessageLabs, Inc., an email management
              and security company based in New
              York.


“We do not object to the use of this slang
  term to describe UCE (unsolicited
  commercial email), although we do
  object to the use of the word “spam” as
  a trademark and the use of our product
  image in association with that term”
                www.hormel.com




                          E-Commerce Network - Suzanne Mello - Nov 5 2004
Can-Spam Act of 2003
Controlling the Assault of Non-Solicited Pornography and Marketing
Act (Can-Spam)
Signed into law by President Bush on Dec 16, 2003
    Took effect Jan 1, 2004

Unsolicited commercial email must:
 
     Be labeled
    Include Opt-Out instructions
    No false headers

FTC is authorized (but not required) to establish a “do-not-email”
registry

www.spamlaws.com –lists all the latest in federal, state, and
international laws


                       E-Commerce Network - Suzanne Mello - Nov 5 2004
Spam is Hostile
You pay for Spam, not Spammers
    Email costs are paid by email
     recipients
Spam can be dangerous
    Never click on the opt-out link!
         May take you to hostile web site
         where mouse-over downloads
         an .exe
    Tells spammers they found a
     working address
    They won’t take you off the list
     anyway
What should you do?
    Filter it out whenever possible
    Keep filters up to date
    If you get it, just delete the email

                            Suzanne Mello - Nov 5 2004
Viruses and Worms
Different types of “ailments”
Viruses
    software that piggybacks on
     other software and runs when
     you run something else
    Macro in excel, word
         Transmitted through sharing
         programs on bulletin boards
         Passing around floppy disks
    An .exe, .com file in your email
Worms
    software that uses computer
     networks to find security holes
     to get in to your computer –
     usually in Microsoft OS!! But
     worm for MAC was recently
     written
                         E-Commerce Network - Suzanne Mello - Nov 5 2004
Hackers are Everywhere
Stealing data
    Industrial Espionage
    Identity theft
    Defamation
Deleting data for fun
    A lot of bored 16 year olds late at
     night                                              Mafia Boy
Turning computers into zombies
    To commit crimes
    Take down networks
    Distribute porn
    Harass someone
Ethical/white hat hackers exist too
    Help break into networks to
     prevent crimes




                            E-Commerce Network - Suzanne Mello - Nov 5 2004
Wireless Fidelity (Wi-Fi)
Using antennas to create “hot spots”
Hotspots – Internet Access (sometimes free)

    Newport Harbor - All the boats in Harbor have internet access

    San Francisco Giants Stadium – Surf the web while catching a
    game

    UMass (need to register, but it’s free)

    Cambridge, MA

    Philadelphia, PA – just announced – entire city by 2006




                    E-Commerce Network - Suzanne Mello - Nov 5 2004
Wi-Fi High Jacking
60-70% wireless networks are wide open

Why are the Wi-Fi networks unprotected?
     Most people say “Our data is boring”
  
      But… criminals look for wireless networks to commit
      their crimes
  
      And… the authorities will come knocking on your
      door…..



                   E-Commerce Network - Suzanne Mello - Nov 5 2004
Protect your Computers!
Use anti-virus software and            Don't share access to your
firewalls - keep them up to date       computers with strangers

Keep your operating system up to       If you have a wi-fi network,
date with critical security updates    password protect it
and patches
                                       Disconnect from the Internet
Don't open emails or attachments       when not in use
from unknown sources
                                       Reevaluate your security on a
Use hard-to-guess passwords.           regular basis
Don’t use words found in a
dictionary. Remember that
password cracking tools exist          Make sure your employees and
                                       family members know this info
                                       too!
Back-up your computer data on
disks or CDs often

                       E-Commerce Network - Suzanne Mello - Nov 5 2004
Thank you!
Web sites of Interest
http://homepage.cs.uri.edu/faculty/wolfe/cf
www.missingchildren.com
www.spamlaws.com
www.netsmartz.org
http://www.ifccfbi.gov - operation web snare – latest
cyber crimes to be aware of
http://www.dcfl.gov/dc3/home.htm
http://www.cops.org/




                 E-Commerce Network - Suzanne Mello - Nov 5 2004

More Related Content

What's hot

[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?Jerric Lyns John
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and natureDr. Arun Verma
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracyguesteb94797
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace Karnika Seth
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case studyShubh Thakkar
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02Wayne Norris
 

What's hot (20)

Cybercrime
CybercrimeCybercrime
Cybercrime
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Say NO to Piracy
Say NO to PiracySay NO to Piracy
Say NO to Piracy
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
 
Piracy
PiracyPiracy
Piracy
 
File000145
File000145File000145
File000145
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Cyber crime lecture one definition and nature
Cyber crime lecture one definition and natureCyber crime lecture one definition and nature
Cyber crime lecture one definition and nature
 
Misuse of computer
Misuse of computerMisuse of computer
Misuse of computer
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Digital Media Piracy
Digital Media PiracyDigital Media Piracy
Digital Media Piracy
 
Protecting children in cyberspace
Protecting children in cyberspace Protecting children in cyberspace
Protecting children in cyberspace
 
Cyber crime- a case study
Cyber crime- a case studyCyber crime- a case study
Cyber crime- a case study
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!-02
 
9 ethics in it space
9 ethics in it space9 ethics in it space
9 ethics in it space
 
Computer crime
 Computer crime Computer crime
Computer crime
 

Viewers also liked

1 how you look in pictures tells a lot about you
1 how you look in pictures tells a lot about you1 how you look in pictures tells a lot about you
1 how you look in pictures tells a lot about youMy English
 
Who am i
Who am iWho am i
Who am iKaren
 
Wrd podcast power point
Wrd   podcast power pointWrd   podcast power point
Wrd podcast power pointLillieMiller
 
Public Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORPublic Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORMaureen Kenney
 
атмосфера творчества
атмосфера творчестваатмосфера творчества
атмосфера творчестваartsveta
 
Featured Article YMS Magazine November_December 2012 edition
Featured Article YMS Magazine November_December 2012 editionFeatured Article YMS Magazine November_December 2012 edition
Featured Article YMS Magazine November_December 2012 editionNellie Ngwenya
 
iLumTech Nanodiffuser
iLumTech NanodiffuseriLumTech Nanodiffuser
iLumTech NanodiffuseriLumTech
 
единая россия 2016
единая россия 2016единая россия 2016
единая россия 2016Leyla Shamuzova
 
Delhi-Mumbai Industrial Corridor (DMIC) - A collaborative public-private part...
Delhi-Mumbai Industrial Corridor (DMIC) - A collaborative public-private part...Delhi-Mumbai Industrial Corridor (DMIC) - A collaborative public-private part...
Delhi-Mumbai Industrial Corridor (DMIC) - A collaborative public-private part...Focus India Group
 
como hacer booteable a una USB.
como hacer booteable a una USB.como hacer booteable a una USB.
como hacer booteable a una USB.guadalupegardenia
 
Trauma & Attachment informed practice for children in residential and foster ...
Trauma & Attachment informed practice for children in residential and foster ...Trauma & Attachment informed practice for children in residential and foster ...
Trauma & Attachment informed practice for children in residential and foster ...fiveriverschildrensservices
 
Driver Hire Australia Brochure
Driver Hire Australia BrochureDriver Hire Australia Brochure
Driver Hire Australia BrochureVikki Low
 

Viewers also liked (17)

Ba7013 services marketing
Ba7013 services marketingBa7013 services marketing
Ba7013 services marketing
 
1 how you look in pictures tells a lot about you
1 how you look in pictures tells a lot about you1 how you look in pictures tells a lot about you
1 how you look in pictures tells a lot about you
 
Who am i
Who am iWho am i
Who am i
 
Wrd podcast power point
Wrd   podcast power pointWrd   podcast power point
Wrd podcast power point
 
Public Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, ORPublic Hearing Brings Support for Modern Police Facility for Salem, OR
Public Hearing Brings Support for Modern Police Facility for Salem, OR
 
атмосфера творчества
атмосфера творчестваатмосфера творчества
атмосфера творчества
 
Featured Article YMS Magazine November_December 2012 edition
Featured Article YMS Magazine November_December 2012 editionFeatured Article YMS Magazine November_December 2012 edition
Featured Article YMS Magazine November_December 2012 edition
 
Kernel
KernelKernel
Kernel
 
iLumTech Nanodiffuser
iLumTech NanodiffuseriLumTech Nanodiffuser
iLumTech Nanodiffuser
 
единая россия 2016
единая россия 2016единая россия 2016
единая россия 2016
 
Stage 14 DAP
Stage 14 DAPStage 14 DAP
Stage 14 DAP
 
Scrum Model
Scrum ModelScrum Model
Scrum Model
 
Delhi-Mumbai Industrial Corridor (DMIC) - A collaborative public-private part...
Delhi-Mumbai Industrial Corridor (DMIC) - A collaborative public-private part...Delhi-Mumbai Industrial Corridor (DMIC) - A collaborative public-private part...
Delhi-Mumbai Industrial Corridor (DMIC) - A collaborative public-private part...
 
como hacer booteable a una USB.
como hacer booteable a una USB.como hacer booteable a una USB.
como hacer booteable a una USB.
 
Overview
OverviewOverview
Overview
 
Trauma & Attachment informed practice for children in residential and foster ...
Trauma & Attachment informed practice for children in residential and foster ...Trauma & Attachment informed practice for children in residential and foster ...
Trauma & Attachment informed practice for children in residential and foster ...
 
Driver Hire Australia Brochure
Driver Hire Australia BrochureDriver Hire Australia Brochure
Driver Hire Australia Brochure
 

Similar to Cybercrimeg

Similar to Cybercrimeg (20)

Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Information security
Information securityInformation security
Information security
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Internet safety
Internet safetyInternet safety
Internet safety
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
 
Seminar
SeminarSeminar
Seminar
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Users guide
Users guideUsers guide
Users guide
 

Recently uploaded

Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...Amil Baba Company
 
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...Amil baba
 
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts ServiceVIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts ServiceApsara Of India
 
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji Escorts
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji EscortsFun Call Girls In Goa 7028418221 Call Girl Service In Panaji Escorts
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji EscortsApsara Of India
 
The Fine Line Between Honest and Evil Comics by Salty Vixen
The Fine Line Between Honest and Evil Comics by Salty VixenThe Fine Line Between Honest and Evil Comics by Salty Vixen
The Fine Line Between Honest and Evil Comics by Salty VixenSalty Vixen Stories & More
 
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170Sonam Pathan
 
1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdf1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdfTanjirokamado769606
 
Fun Call Girls In Goa 7028418221 Escort Service In Morjim Beach Call Girl
Fun Call Girls In Goa 7028418221 Escort Service In Morjim Beach Call GirlFun Call Girls In Goa 7028418221 Escort Service In Morjim Beach Call Girl
Fun Call Girls In Goa 7028418221 Escort Service In Morjim Beach Call GirlApsara Of India
 
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...anamikaraghav4
 
Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713Sonam Pathan
 
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...Amil Baba Company
 
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Amil Baba Company
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607dollysharma2066
 
Hifi Laxmi Nagar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ D...
Hifi Laxmi Nagar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ D...Hifi Laxmi Nagar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ D...
Hifi Laxmi Nagar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ D...srsj9000
 
fmovies-Movies hold a special place in the hearts
fmovies-Movies hold a special place in the heartsfmovies-Movies hold a special place in the hearts
fmovies-Movies hold a special place in the heartsa18205752
 
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcEViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcEApsara Of India
 
Kolkata Call Girl Bagbazar 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Bagbazar 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Bagbazar 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Bagbazar 👉 8250192130 ❣️💯 Available With Room 24×7Riya Pathan
 
Hi Class Call Girls In Goa 7028418221 Call Girls In Anjuna Beach Escort Services
Hi Class Call Girls In Goa 7028418221 Call Girls In Anjuna Beach Escort ServicesHi Class Call Girls In Goa 7028418221 Call Girls In Anjuna Beach Escort Services
Hi Class Call Girls In Goa 7028418221 Call Girls In Anjuna Beach Escort ServicesApsara Of India
 
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Riya Pathan
 

Recently uploaded (20)

Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
Amil Baba in Pakistan Kala jadu Expert Amil baba Black magic Specialist in Is...
 
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
NO1 WorldWide Amil baba in pakistan Amil Baba in Karachi Black Magic Islamaba...
 
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts ServiceVIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
VIP Call Girls In Goa 7028418221 Call Girls In Baga Beach Escorts Service
 
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji Escorts
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji EscortsFun Call Girls In Goa 7028418221 Call Girl Service In Panaji Escorts
Fun Call Girls In Goa 7028418221 Call Girl Service In Panaji Escorts
 
The Fine Line Between Honest and Evil Comics by Salty Vixen
The Fine Line Between Honest and Evil Comics by Salty VixenThe Fine Line Between Honest and Evil Comics by Salty Vixen
The Fine Line Between Honest and Evil Comics by Salty Vixen
 
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170
Call Girls Near Taurus Sarovar Portico Hotel New Delhi 9873777170
 
1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdf1681275559_haunting-adeline and hunting.pdf
1681275559_haunting-adeline and hunting.pdf
 
Fun Call Girls In Goa 7028418221 Escort Service In Morjim Beach Call Girl
Fun Call Girls In Goa 7028418221 Escort Service In Morjim Beach Call GirlFun Call Girls In Goa 7028418221 Escort Service In Morjim Beach Call Girl
Fun Call Girls In Goa 7028418221 Escort Service In Morjim Beach Call Girl
 
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...
Verified Call Girls Esplanade - [ Cash on Delivery ] Contact 8250192130 Escor...
 
Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713Call Girl Contact Number Andheri WhatsApp:+91-9833363713
Call Girl Contact Number Andheri WhatsApp:+91-9833363713
 
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...
Amil baba in Pakistan amil baba Karachi amil baba in pakistan amil baba in la...
 
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
Real NO1 Amil baba in Faisalabad Kala jadu in faisalabad Aamil baba Faisalaba...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377087607
 
Hifi Laxmi Nagar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ D...
Hifi Laxmi Nagar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ D...Hifi Laxmi Nagar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ D...
Hifi Laxmi Nagar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ D...
 
fmovies-Movies hold a special place in the hearts
fmovies-Movies hold a special place in the heartsfmovies-Movies hold a special place in the hearts
fmovies-Movies hold a special place in the hearts
 
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcEViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
ViP Call Girls In Udaipur 9602870969 Gulab Bagh Escorts SeRvIcE
 
Kolkata Call Girl Bagbazar 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Bagbazar 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Bagbazar 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Bagbazar 👉 8250192130 ❣️💯 Available With Room 24×7
 
Call Girls Koti 7001305949 all area service COD available Any Time
Call Girls Koti 7001305949 all area service COD available Any TimeCall Girls Koti 7001305949 all area service COD available Any Time
Call Girls Koti 7001305949 all area service COD available Any Time
 
Hi Class Call Girls In Goa 7028418221 Call Girls In Anjuna Beach Escort Services
Hi Class Call Girls In Goa 7028418221 Call Girls In Anjuna Beach Escort ServicesHi Class Call Girls In Goa 7028418221 Call Girls In Anjuna Beach Escort Services
Hi Class Call Girls In Goa 7028418221 Call Girls In Anjuna Beach Escort Services
 
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
Kolkata Call Girl Howrah 👉 8250192130 ❣️💯 Available With Room 24×7
 

Cybercrimeg

  • 1. Cyber Crime – “Is the Internet the new “Wild Wild West?” Prepared for the Southern Massachusetts E-Commerce Network Nov 5 2004 by Suzanne Mello www.suzannemello.com
  • 2. In the News……. 1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time (www.missingchildren.com) California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com) E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 3. The New Wild Wild West More cyber criminals than cyber cops Criminals feel “safe” committing crimes from the privacy of their own homes Brand new challenges facing law enforcement  Most not trained in the technologies  Internet crimes span multiple jurisdictions  Need to retrofit new crimes to existing laws E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 4. Computer Crime Computer used to commit a crime  Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing Computer as a target of a crime  Viruses, worms, industrial espionage, software piracy, hacking E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 5. Computer Forensics What is it?  an autopsy of a computer or network to uncover digital evidence of a crime  Evidence must be preserved and hold up in a court of law Growing field – Many becoming computer forensic savvy  FBI, State and Local Police, IRS, Homeland Security  Defense attorneys, judges and prosecutors  Independent security agencies  White hat or Ethical Hackers  Programs offered at major universities such as URI http://homepage.cs.uri.edu/faculty/wolfe/cf E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 6. Uncovering Digital Evidence Smart Criminals don’t use their own computers Floppy disks Zip/Jazz disks Tapes Digital cameras Memory sticks Printers CDs PDAs Game boxes Networks Hard drives E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 7. Digital Evidence Not obvious…….it’s most likely hidden on purpose or needs to be unearthed by forensics experts Criminals Hide Evidence Forensics Uncover Evidence Delete their files and emails Restore deleted files and emails – they are still really there! Find the hidden files through Hide their files by encryption, complex password, encryption password protection, or programs, and searching embedding them in unrelated techniques files (dll, os etc) Use Wi-Fi networks and cyber Track them down through the cafes to cover their tracks digital trail - IP addresses to ISPs to the offender E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 8. The Crime Scene (with Computer Forensics) Similar to traditional crime scenes  Must acquire the evidence while preserving the integrity of the evidence No damage during collection, transportation, or storage Document everything Collect everything the first time  Establish a chain of custody But also different…….  Can perform analysis of evidence on exact copy!  Make many copies and investigate them without touching original  Can use time stamping/hash code techniques to prove evidence hasn’t been compromised E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 9. Top Cyber Crimes that Attack Business Spam Viruses/Worms Industrial Espionage and Hackers Wi-Fi High Jacking
  • 10. Spam “Spam accounts for 9 out of every 10 emails in the United States.” MessageLabs, Inc., an email management and security company based in New York. “We do not object to the use of this slang term to describe UCE (unsolicited commercial email), although we do object to the use of the word “spam” as a trademark and the use of our product image in association with that term” www.hormel.com E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 11. Can-Spam Act of 2003 Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can-Spam) Signed into law by President Bush on Dec 16, 2003  Took effect Jan 1, 2004 Unsolicited commercial email must:  Be labeled  Include Opt-Out instructions  No false headers FTC is authorized (but not required) to establish a “do-not-email” registry www.spamlaws.com –lists all the latest in federal, state, and international laws E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 12. Spam is Hostile You pay for Spam, not Spammers  Email costs are paid by email recipients Spam can be dangerous  Never click on the opt-out link! May take you to hostile web site where mouse-over downloads an .exe  Tells spammers they found a working address  They won’t take you off the list anyway What should you do?  Filter it out whenever possible  Keep filters up to date  If you get it, just delete the email Suzanne Mello - Nov 5 2004
  • 13. Viruses and Worms Different types of “ailments” Viruses  software that piggybacks on other software and runs when you run something else  Macro in excel, word Transmitted through sharing programs on bulletin boards Passing around floppy disks  An .exe, .com file in your email Worms  software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 14. Hackers are Everywhere Stealing data  Industrial Espionage  Identity theft  Defamation Deleting data for fun  A lot of bored 16 year olds late at night Mafia Boy Turning computers into zombies  To commit crimes  Take down networks  Distribute porn  Harass someone Ethical/white hat hackers exist too  Help break into networks to prevent crimes E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 15. Wireless Fidelity (Wi-Fi) Using antennas to create “hot spots” Hotspots – Internet Access (sometimes free)  Newport Harbor - All the boats in Harbor have internet access  San Francisco Giants Stadium – Surf the web while catching a game  UMass (need to register, but it’s free)  Cambridge, MA  Philadelphia, PA – just announced – entire city by 2006 E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 16. Wi-Fi High Jacking 60-70% wireless networks are wide open Why are the Wi-Fi networks unprotected?  Most people say “Our data is boring”  But… criminals look for wireless networks to commit their crimes  And… the authorities will come knocking on your door….. E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 17. Protect your Computers! Use anti-virus software and Don't share access to your firewalls - keep them up to date computers with strangers Keep your operating system up to If you have a wi-fi network, date with critical security updates password protect it and patches Disconnect from the Internet Don't open emails or attachments when not in use from unknown sources Reevaluate your security on a Use hard-to-guess passwords. regular basis Don’t use words found in a dictionary. Remember that password cracking tools exist Make sure your employees and family members know this info too! Back-up your computer data on disks or CDs often E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 19. Web sites of Interest http://homepage.cs.uri.edu/faculty/wolfe/cf www.missingchildren.com www.spamlaws.com www.netsmartz.org http://www.ifccfbi.gov - operation web snare – latest cyber crimes to be aware of http://www.dcfl.gov/dc3/home.htm http://www.cops.org/ E-Commerce Network - Suzanne Mello - Nov 5 2004