SlideShare a Scribd company logo
1 of 19
Cyber Crime – “Is the
Internet the new “Wild
     Wild West?”
   Prepared for the Southern Massachusetts
            E-Commerce Network
                  Nov 5 2004
                      by
                 Suzanne Mello
           www.suzannemello.com
In the News…….
1 out of 5 children received a
sexual solicitation or approach
over the Internet in a one-year
period of time (
www.missingchildren.com)

California warns of massive ID
theft – personal data stolen from
computers at University of
California, Berkeley (Oct 21, 2004
IDG news service)

Microsoft and Cisco announced a
new initiative to work together to
increase internet security
(Oct 18, 2004
www.cnetnews.com)


                       E-Commerce Network - Suzanne Mello
                                 - Nov 5 2004
The New Wild Wild West
More cyber criminals than
cyber cops
Criminals feel “safe”
committing crimes from
the privacy of their own
homes
Brand new challenges
facing law enforcement

    Most not trained in the
    technologies

    Internet crimes span
    multiple jurisdictions

    Need to retrofit new crimes
    to existing laws
                     E-Commerce Network - Suzanne Mello
                               - Nov 5 2004
Computer Crime
Computer used to commit
a crime

    Child porn, threatening
    email, assuming
    someone’s identity, sexual
    harassment, defamation,
    spam, phishing


Computer as a target of a
crime

    Viruses, worms, industrial
    espionage, software piracy,
    hacking         E-Commerce Network - Suzanne Mello
                              - Nov 5 2004
Computer Forensics
What is it?
    an autopsy of a computer or network to
     uncover digital evidence of a crime
    Evidence must be preserved and hold up
     in a court of law

Growing field – Many becoming
computer forensic savvy
 
     FBI, State and Local Police, IRS,
     Homeland Security
    Defense attorneys, judges and
     prosecutors
    Independent security agencies
    White hat or Ethical Hackers
    Programs offered at major universities
     such as URI
      http://homepage.cs.uri.edu/faculty/wolfe/cf

                         E-Commerce Network - Suzanne Mello
                                   - Nov 5 2004
Uncovering Digital Evidence
Smart Criminals don’t use their
  own computers

  Floppy disks
  Zip/Jazz disks
  Tapes
  Digital cameras
  Memory sticks
  Printers
  CDs
  PDAs
  Game boxes
  Networks
  Hard drives

                     E-Commerce Network - Suzanne Mello
                               - Nov 5 2004
Digital Evidence
    Not obvious…….it’s most likely hidden on purpose
    or needs to be unearthed by forensics experts

Criminals Hide Evidence                    Forensics Uncover Evidence

  Delete their files and emails                Restore deleted files and emails –
                                               they are still really there!

                                               Find the hidden files through
  Hide their files by encryption,              complex password, encryption
  password protection, or                      programs, and searching
  embedding them in unrelated                  techniques
  files (dll, os etc)

  Use Wi-Fi networks and cyber                 Track them down through the
  cafes to cover their tracks                  digital trail - IP addresses to ISPs
                                               to the offender
                      E-Commerce Network - Suzanne Mello
                                - Nov 5 2004
The Crime Scene
                      (with Computer Forensics)
    Similar to traditional crime scenes

      Must acquire the evidence while
       preserving the integrity of the
       evidence
           No damage during collection,
           transportation, or storage
           Document everything
           Collect everything the first time
      Establish a chain of custody

    But also different…….

      Can perform analysis of evidence on
       exact copy!
      Make many copies and investigate
       them without touching original
      Can use time stamping/hash code
       techniques to prove evidence hasn’t
       been compromised

                            E-Commerce Network - Suzanne Mello
                                      - Nov 5 2004
Top Cyber Crimes that
   Attack Business
                 Spam
            Viruses/Worms
  Industrial Espionage and Hackers
          Wi-Fi High Jacking
Spam
“Spam accounts for 9 out of every 10
   emails in the United States.”
            MessageLabs, Inc., an email management
              and security company based in New
              York.


“We do not object to the use of this slang
  term to describe UCE (unsolicited
  commercial email), although we do
  object to the use of the word “spam” as
  a trademark and the use of our product
  image in association with that term”
                www.hormel.com




                          E-Commerce Network - Suzanne Mello
                                    - Nov 5 2004
Can-Spam Act of 2003
Controlling the Assault of Non-Solicited Pornography and Marketing
Act (Can-Spam)
Signed into law by President Bush on Dec 16, 2003
    Took effect Jan 1, 2004

Unsolicited commercial email must:
    Be labeled
    Include Opt-Out instructions
    No false headers

FTC is authorized (but not required) to establish a “do-not-email”
registry

www.spamlaws.com –lists all the latest in federal, state, and
international laws

                        E-Commerce Network - Suzanne Mello
                                  - Nov 5 2004
Spam is Hostile
You pay for Spam, not Spammers
    Email costs are paid by email
     recipients
Spam can be dangerous
    Never click on the opt-out link!
         May take you to hostile web site
         where mouse-over downloads
         an .exe
    Tells spammers they found a
     working address
    They won’t take you off the list
     anyway
What should you do?
    Filter it out whenever possible
    Keep filters up to date
    If you get it, just delete the email

                                 Suzanne Mello - Nov 5 2004
Viruses and Worms
Different types of “ailments”
Viruses
    software that piggybacks on
     other software and runs when
     you run something else
    Macro in excel, word
         Transmitted through sharing
         programs on bulletin boards
         Passing around floppy disks
    An .exe, .com file in your email
Worms
    software that uses computer
     networks to find security holes
     to get in to your computer –
     usually in Microsoft OS!! But
     worm for MAC was recently
     written
                         E-Commerce Network - Suzanne Mello
                                   - Nov 5 2004
Hackers are Everywhere
Stealing data
    Industrial Espionage
    Identity theft
    Defamation
Deleting data for fun
    A lot of bored 16 year olds late at
     night                                                       Mafia Boy
Turning computers into zombies
    To commit crimes
    Take down networks
    Distribute porn
    Harass someone
Ethical/white hat hackers exist too
    Help break into networks to
     prevent crimes



                            E-Commerce Network - Suzanne Mello
                                      - Nov 5 2004
Wireless Fidelity (Wi-Fi)
Using antennas to create “hot spots”
Hotspots – Internet Access (sometimes free)
   Newport Harbor - All the boats in Harbor have internet access
   San Francisco Giants Stadium – Surf the web while catching a
    game
   UMass (need to register, but it’s free)
   Cambridge, MA
   Philadelphia, PA – just announced – entire city by 2006




                    E-Commerce Network - Suzanne Mello
                              - Nov 5 2004
Wi-Fi High Jacking
60-70% wireless networks are wide open

Why are the Wi-Fi networks unprotected?
     Most people say “Our data is boring”
     But… criminals look for wireless networks to commit
      their crimes
  
      And… the authorities will come knocking on your
      door…..


                    E-Commerce Network - Suzanne Mello
                              - Nov 5 2004
Protect your Computers!
Use anti-virus software and                   Don't share access to your
firewalls - keep them up to date              computers with strangers

Keep your operating system up to              If you have a wi-fi network,
date with critical security updates           password protect it
and patches
                                              Disconnect from the Internet
Don't open emails or attachments              when not in use
from unknown sources
                                              Reevaluate your security on a
Use hard-to-guess passwords.                  regular basis
Don’t use words found in a
dictionary. Remember that
password cracking tools exist                 Make sure your employees and
                                              family members know this info
                                              too!
Back-up your computer data on
disks or CDs often
                       E-Commerce Network - Suzanne Mello
                                 - Nov 5 2004
Thank you!
Web sites of Interest
http://homepage.cs.uri.edu/faculty/wolfe/cf
www.missingchildren.com
www.spamlaws.com
www.netsmartz.org
http://www.ifccfbi.gov - operation web snare – latest
cyber crimes to be aware of
http://www.dcfl.gov/dc3/home.htm
http://www.cops.org/



                 E-Commerce Network - Suzanne Mello
                           - Nov 5 2004

More Related Content

What's hot

Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacyGouthamXander
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer CrimesRaffa Learning Community
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!Wayne Norris
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?Jerric Lyns John
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxanbersattar
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxanbersattar
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrimeOnline
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxanbersattar
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Securitymmavis
 

What's hot (20)

Computer crime and internet crime privacy
Computer crime and internet crime privacyComputer crime and internet crime privacy
Computer crime and internet crime privacy
 
Powerpoint
PowerpointPowerpoint
Powerpoint
 
3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Computer crimes
Computer crimesComputer crimes
Computer crimes
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptx
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Say NO to Piracy
Say NO to PiracySay NO to Piracy
Say NO to Piracy
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
History and future cybercrime
History and future cybercrimeHistory and future cybercrime
History and future cybercrime
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptx
 
Infocom Security
Infocom SecurityInfocom Security
Infocom Security
 

Viewers also liked

Viewers also liked (7)

Pp ptk
Pp ptkPp ptk
Pp ptk
 
Bab v ptk
Bab v ptkBab v ptk
Bab v ptk
 
Bab v ptk
Bab v ptkBab v ptk
Bab v ptk
 
Pp ptk
Pp ptkPp ptk
Pp ptk
 
Pp ptk
Pp ptkPp ptk
Pp ptk
 
Pp ptk v
Pp ptk vPp ptk v
Pp ptk v
 
Carl cattebeke inleiding tot marketing Actie voor Starters Unizo Vlaamse Sta...
Carl cattebeke  inleiding tot marketing Actie voor Starters Unizo Vlaamse Sta...Carl cattebeke  inleiding tot marketing Actie voor Starters Unizo Vlaamse Sta...
Carl cattebeke inleiding tot marketing Actie voor Starters Unizo Vlaamse Sta...
 

Similar to Cybercrime123

Similar to Cybercrime123 (20)

Cybercrimeg
CybercrimegCybercrimeg
Cybercrimeg
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer safety
Computer safetyComputer safety
Computer safety
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Internet safety
Internet safetyInternet safety
Internet safety
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
 
Seminar
SeminarSeminar
Seminar
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Information security
Information securityInformation security
Information security
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
Users guide
Users guideUsers guide
Users guide
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 

Cybercrime123

  • 1. Cyber Crime – “Is the Internet the new “Wild Wild West?” Prepared for the Southern Massachusetts E-Commerce Network Nov 5 2004 by Suzanne Mello www.suzannemello.com
  • 2. In the News……. 1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time ( www.missingchildren.com) California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com) E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 3. The New Wild Wild West More cyber criminals than cyber cops Criminals feel “safe” committing crimes from the privacy of their own homes Brand new challenges facing law enforcement  Most not trained in the technologies  Internet crimes span multiple jurisdictions  Need to retrofit new crimes to existing laws E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 4. Computer Crime Computer used to commit a crime  Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing Computer as a target of a crime  Viruses, worms, industrial espionage, software piracy, hacking E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 5. Computer Forensics What is it?  an autopsy of a computer or network to uncover digital evidence of a crime  Evidence must be preserved and hold up in a court of law Growing field – Many becoming computer forensic savvy  FBI, State and Local Police, IRS, Homeland Security  Defense attorneys, judges and prosecutors  Independent security agencies  White hat or Ethical Hackers  Programs offered at major universities such as URI http://homepage.cs.uri.edu/faculty/wolfe/cf E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 6. Uncovering Digital Evidence Smart Criminals don’t use their own computers Floppy disks Zip/Jazz disks Tapes Digital cameras Memory sticks Printers CDs PDAs Game boxes Networks Hard drives E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 7. Digital Evidence Not obvious…….it’s most likely hidden on purpose or needs to be unearthed by forensics experts Criminals Hide Evidence Forensics Uncover Evidence Delete their files and emails Restore deleted files and emails – they are still really there! Find the hidden files through Hide their files by encryption, complex password, encryption password protection, or programs, and searching embedding them in unrelated techniques files (dll, os etc) Use Wi-Fi networks and cyber Track them down through the cafes to cover their tracks digital trail - IP addresses to ISPs to the offender E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 8. The Crime Scene (with Computer Forensics) Similar to traditional crime scenes  Must acquire the evidence while preserving the integrity of the evidence No damage during collection, transportation, or storage Document everything Collect everything the first time  Establish a chain of custody But also different…….  Can perform analysis of evidence on exact copy!  Make many copies and investigate them without touching original  Can use time stamping/hash code techniques to prove evidence hasn’t been compromised E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 9. Top Cyber Crimes that Attack Business Spam Viruses/Worms Industrial Espionage and Hackers Wi-Fi High Jacking
  • 10. Spam “Spam accounts for 9 out of every 10 emails in the United States.” MessageLabs, Inc., an email management and security company based in New York. “We do not object to the use of this slang term to describe UCE (unsolicited commercial email), although we do object to the use of the word “spam” as a trademark and the use of our product image in association with that term” www.hormel.com E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 11. Can-Spam Act of 2003 Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can-Spam) Signed into law by President Bush on Dec 16, 2003  Took effect Jan 1, 2004 Unsolicited commercial email must:  Be labeled  Include Opt-Out instructions  No false headers FTC is authorized (but not required) to establish a “do-not-email” registry www.spamlaws.com –lists all the latest in federal, state, and international laws E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 12. Spam is Hostile You pay for Spam, not Spammers  Email costs are paid by email recipients Spam can be dangerous  Never click on the opt-out link! May take you to hostile web site where mouse-over downloads an .exe  Tells spammers they found a working address  They won’t take you off the list anyway What should you do?  Filter it out whenever possible  Keep filters up to date  If you get it, just delete the email Suzanne Mello - Nov 5 2004
  • 13. Viruses and Worms Different types of “ailments” Viruses  software that piggybacks on other software and runs when you run something else  Macro in excel, word Transmitted through sharing programs on bulletin boards Passing around floppy disks  An .exe, .com file in your email Worms  software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 14. Hackers are Everywhere Stealing data  Industrial Espionage  Identity theft  Defamation Deleting data for fun  A lot of bored 16 year olds late at night Mafia Boy Turning computers into zombies  To commit crimes  Take down networks  Distribute porn  Harass someone Ethical/white hat hackers exist too  Help break into networks to prevent crimes E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 15. Wireless Fidelity (Wi-Fi) Using antennas to create “hot spots” Hotspots – Internet Access (sometimes free)  Newport Harbor - All the boats in Harbor have internet access  San Francisco Giants Stadium – Surf the web while catching a game  UMass (need to register, but it’s free)  Cambridge, MA  Philadelphia, PA – just announced – entire city by 2006 E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 16. Wi-Fi High Jacking 60-70% wireless networks are wide open Why are the Wi-Fi networks unprotected?  Most people say “Our data is boring”  But… criminals look for wireless networks to commit their crimes  And… the authorities will come knocking on your door….. E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 17. Protect your Computers! Use anti-virus software and Don't share access to your firewalls - keep them up to date computers with strangers Keep your operating system up to If you have a wi-fi network, date with critical security updates password protect it and patches Disconnect from the Internet Don't open emails or attachments when not in use from unknown sources Reevaluate your security on a Use hard-to-guess passwords. regular basis Don’t use words found in a dictionary. Remember that password cracking tools exist Make sure your employees and family members know this info too! Back-up your computer data on disks or CDs often E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 19. Web sites of Interest http://homepage.cs.uri.edu/faculty/wolfe/cf www.missingchildren.com www.spamlaws.com www.netsmartz.org http://www.ifccfbi.gov - operation web snare – latest cyber crimes to be aware of http://www.dcfl.gov/dc3/home.htm http://www.cops.org/ E-Commerce Network - Suzanne Mello - Nov 5 2004