SlideShare a Scribd company logo
Computer Crime
   Another Jurisdiction?




                                           Germán Terán
                           Social Communication Student
                                      Universidad de Lima
                                                     Perú
                                  tersamge@hotmail.com
Structure
• Crime history
• Types of crime
• Another types of crime
• Special crime adv. Found on internet.
• National & International Efforts + Cb.crime
  Future.
• Conclusion
Crime & Cybercrime
• Crime
  – Engaging in conduct
    that has been outlawed
    by a particular society.
  – Harm to: Individuals,
    property, government
    and morality.
• Cybercrime
  – Differ in the tool: guns
    are change for
    computers.
Cybercriminals + computer technology = difficulties to apply the law.

             not only real-world crimes by using computers…
DDoS attack




• Distributed Denial of Service.
   – Harm upon property by shutting down a website.
   – The attack doesn’t fit in conceptual category the law has
     devised to deal with crime.
Emergence of cybercrime
• 1950- word “hack” is use to refer to creative
  college pranks and migrate to computer culture.
• 1960- first published accounts of computers
  being used illegally.
  – Crimes committed by insiders.
• 1969- ARPANET link computers in hundred of
  universities.
• 1980- Personal networked computer .
  – Hackers were up to no good.
Phone Phreaking
• Manipulating the telephone
  system
   – Provide free long-
     distance service.
   – Prosecuted under
     existing law (fraud or
     theft)
   – Phone phreaks move on
     to hacking in the 1980s
Meanwhile…
• First civilian bulletin board
  system on-line in Chicago.
  Some engaged in darker
  activities.
• 1984- Hacker groups appear.
                                            Robert Tappan – Morris worm
  Legion Of Doom (LOD),
  Masters of deception
  (MOD), etc. War startetd.
• 1988- Robert Tappan Morris
  released the first Internet
  worm.
                                  Chris Goggans (LOD)        Mark Abene (MOD)
Hacking
• Kevin Poulsen jumped from
  Phone phreak to hacking.

• Attacks to Pacific Bell
  Telephone Company and
  federal government
  installations.

• Apprehended in 1991-Charges:
  accessed device fraud,
  conspiracy, wiretapping,
  computer fraud, mail fraud,
  money laundering and
  espionage.
                                                            Kevin Poulsen

     Kevin Mitnick was the first hacker included in FBI’S MOS WANTED list.
Malware




•   Robert Tappan Morris “invented” the network malware.
•   He demostrate how quickly malware can spread from system to system.
•   1999- Melissa is the first mass-mailing computer virus.
•   At first malware was not addresss by local criminal law.
Theft
  • 1994- Vladimir Levin
    siphoned millions of dollars
    from Citibank accounts.
  • Use of computers
    technology to obtain funds
    belonging to someone else.
  • Traditional crime in a no
    traditional way.

                                                               Vladimir Levin



China: Song Chenglin used a computer at an Internet Café to hack 158 accounts at the ICBC
Fraud




•   “Official” fraud           •   Internet auction fraud
     –   Transfer millions          –   Factory direct products
•   Lottery fraud              •   Identity theft
     –   “Won” the lottery     •   Specific legislation is not needed.
Child Pornography
• Internet provides less risk of
  being identified.
• Highly organized, global
  subculture.
• Many of them are in
  countries where child
  pornography is not a priority
  for law enforcement.
• What is child pornography?
  Definition of child.
Extortion




•   Same dynamic as in real-world
•   Threaten to reveal sensitive information of an online business.
•   DDoS Attack to Casinos.
•   Will eventually be directed to bigger organizations.
Cyberterrorism
• Terrorism: Commission of criminal acts for
  political motives.
• Has involved the use of methods of physical
  destruction.
• USA Patriot ACT
  – Hacking, cracking, extortion, fraud and malware.
Warning




Korean Warning on the internet
Internet Homicide




• Distribution of Hardcore and Snuff Movies
• A face to face date with online friend can turn deadly.
• Consensual homicide.
Rotenburg Cannibal




•   Germany .- March 9, 2001.
     – Armin Meiwes (Cannibal)
     – Bernd Jürgen Brandes (Victime)
•   Armin post a message on “The Cannibal Café” website.
•   Documentary: http://video.google.com/videoplay?docid=1299254578438715427
Internet Suicide
  • Suicide pact made on
    internet.
  • Most of cases have ocurred
    in Japan.
       – Some of them are also in
         China, South Korea,
         Germany, USA, etc.
  • Traditional suicide pacts
    involved older peole (50-60
    years old)
  • Internet suicide pact now
    involve young people,
    usually teenagers.

Check this link for more information: http://www.espacoacademico.com.br/044/44eueno_ing.htm
Online Mercenaries
• Found by searching material for this
  presentation.
• http://club.telepolis.com/servmerc/index.htm
+                                 =


PC + Internet = Cybercrime legislation far more imperative
National & International Efforts
• First Wave (privacy)
   – Sweden (1973) ; USA (1974); Federal Republic of German (1977);
     Austria, Denmark, France and Norway (1978), etc.
• Second Wave (property)
   – Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark
     (1985), etc.
• Third Wave (intellectual property)
• Convention on Cybercrime
   –   Ensuring that countries adopt procedural laws.
   –   International cooperation.
   –   Harmonizing national cybercrime law.
   –   Domestic law criminalizes: Attacks on PC data or system; Pc tech. to
       commit fraud or forgery; Pc tech. to create Child Pornograpy.; infringe
       copyright.
Cybercrime: the future




• Two main trends:
   – Professionalization of Cybercrime (creation of cybermafias,
     similar to italian families in early of US history).
   – Increasing the automization of Cybercrime.
Clever cybercriminals can enjoy the benefits of
criminal organization without its disadvantages.


Definitely this is another arena for human activity.
      But, is it legally another jurisdiction?


This seems to be more than a study case because all we studied in
      Information Society class can turn into a crime activity
                    What can we do?

More Related Content

What's hot

Cyber crime
Cyber crimeCyber crime
Cyber crime
dixitas
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
Alisha Korpal
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
gururaj lulkarni
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
Amos Oyoo
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
yazad dumasia
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
Sanguine_Eva
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
pinkutinku26
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
Dr Raghu Khimani
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
Ramesh Upadhaya
 
Computer crime
Computer crimeComputer crime
Computer crime
Uc Man
 
Phishing
PhishingPhishing
Phishing
Sagar Rai
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
Dawood Faheem Abbasi
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
FCA - Future Chartered Accountants
 
Hacking
HackingHacking
Hacking
Sitwat Rao
 
Cyber crime
Cyber crimeCyber crime
CyberCrime
CyberCrimeCyberCrime
CyberCrime
Sourav Kumar Mund
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
ANKUR BAROT
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
presentation on cyber crime and security
presentation on cyber crime and securitypresentation on cyber crime and security
presentation on cyber crime and security
 
Cyber crime defination, meaning and history
Cyber crime defination, meaning and historyCyber crime defination, meaning and history
Cyber crime defination, meaning and history
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime and Security
Cyber Crime and Security Cyber Crime and Security
Cyber Crime and Security
 
Cyber crime & security
Cyber crime & securityCyber crime & security
Cyber crime & security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Phishing
PhishingPhishing
Phishing
 
Cyber crime.pptx
Cyber crime.pptxCyber crime.pptx
Cyber crime.pptx
 
Cyber crime and fraud
Cyber crime and fraudCyber crime and fraud
Cyber crime and fraud
 
Hacking
HackingHacking
Hacking
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Cybercrime the emerging threat
Cybercrime the emerging threatCybercrime the emerging threat
Cybercrime the emerging threat
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 

Viewers also liked

Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
Mar Soriano
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
Upekha Vandebona
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
almario1988
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
УЦСБ, Яблонко
УЦСБ, ЯблонкоУЦСБ, Яблонко
УЦСБ, Яблонко
Expolink
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
jaenjenny
 
Internet literacy and safety
Internet literacy and safetyInternet literacy and safety
Internet literacy and safety
Social Development Centre Waterloo Region
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
jgswift
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
vishalgohel12195
 
Computer crime
Computer crimeComputer crime
Computer crime
Surya Prasad
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
Sandra Fathi
 

Viewers also liked (20)

Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
УЦСБ, Яблонко
УЦСБ, ЯблонкоУЦСБ, Яблонко
УЦСБ, Яблонко
 
Internet safety
Internet safetyInternet safety
Internet safety
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Internet literacy and safety
Internet literacy and safetyInternet literacy and safety
Internet literacy and safety
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 

Similar to [Exposicion] Computer and Internet Crime

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
mukeshkaran
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
sainnrg
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Andrea Rossetti
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
Dr. Arun Verma
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
- Mark - Fullbright
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
Dhurba Mainali
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
udhaya jeni
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
Jyotisheklingji
 
Final ppt
Final pptFinal ppt
Final ppt
HEMAL SHAH
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
Paper Writer UK
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
Farjana Akter
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber securityNabarun Sarkar
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
McafeeCareers
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 

Similar to [Exposicion] Computer and Internet Crime (20)

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
L Scope
L ScopeL Scope
L Scope
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Final ppt
Final pptFinal ppt
Final ppt
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Communications
CommunicationsCommunications
Communications
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber security
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 

More from German Teran

[Critica] Asia y los Gansos Voladores (UNCTAD)
[Critica] Asia y los Gansos Voladores (UNCTAD)[Critica] Asia y los Gansos Voladores (UNCTAD)
[Critica] Asia y los Gansos Voladores (UNCTAD)
German Teran
 
[Critica] China y América Latina y el Caribe (CEPAL)
[Critica] China y América Latina y el Caribe (CEPAL)[Critica] China y América Latina y el Caribe (CEPAL)
[Critica] China y América Latina y el Caribe (CEPAL)
German Teran
 
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia OrientalGerman Teran
 
[Exposicion] Los efectos económicos y sociales de la liberalización financier...
[Exposicion] Los efectos económicos y sociales de la liberalización financier...[Exposicion] Los efectos económicos y sociales de la liberalización financier...
[Exposicion] Los efectos económicos y sociales de la liberalización financier...
German Teran
 
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
German Teran
 
[Critica] Facebook colectivism
[Critica] Facebook colectivism[Critica] Facebook colectivism
[Critica] Facebook colectivismGerman Teran
 
[Investigacion] China Tibet Issue
[Investigacion] China Tibet Issue[Investigacion] China Tibet Issue
[Investigacion] China Tibet Issue
German Teran
 
[Critica] Apple's Weakness
[Critica] Apple's Weakness[Critica] Apple's Weakness
[Critica] Apple's WeaknessGerman Teran
 

More from German Teran (8)

[Critica] Asia y los Gansos Voladores (UNCTAD)
[Critica] Asia y los Gansos Voladores (UNCTAD)[Critica] Asia y los Gansos Voladores (UNCTAD)
[Critica] Asia y los Gansos Voladores (UNCTAD)
 
[Critica] China y América Latina y el Caribe (CEPAL)
[Critica] China y América Latina y el Caribe (CEPAL)[Critica] China y América Latina y el Caribe (CEPAL)
[Critica] China y América Latina y el Caribe (CEPAL)
 
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
 
[Exposicion] Los efectos económicos y sociales de la liberalización financier...
[Exposicion] Los efectos económicos y sociales de la liberalización financier...[Exposicion] Los efectos económicos y sociales de la liberalización financier...
[Exposicion] Los efectos económicos y sociales de la liberalización financier...
 
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
 
[Critica] Facebook colectivism
[Critica] Facebook colectivism[Critica] Facebook colectivism
[Critica] Facebook colectivism
 
[Investigacion] China Tibet Issue
[Investigacion] China Tibet Issue[Investigacion] China Tibet Issue
[Investigacion] China Tibet Issue
 
[Critica] Apple's Weakness
[Critica] Apple's Weakness[Critica] Apple's Weakness
[Critica] Apple's Weakness
 

Recently uploaded

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Ashish Kohli
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
AG2 Design
 

Recently uploaded (20)

Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
Aficamten in HCM (SEQUOIA HCM TRIAL 2024)
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Delivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and TrainingDelivering Micro-Credentials in Technical and Vocational Education and Training
Delivering Micro-Credentials in Technical and Vocational Education and Training
 

[Exposicion] Computer and Internet Crime

  • 1. Computer Crime Another Jurisdiction? Germán Terán Social Communication Student Universidad de Lima Perú tersamge@hotmail.com
  • 2. Structure • Crime history • Types of crime • Another types of crime • Special crime adv. Found on internet. • National & International Efforts + Cb.crime Future. • Conclusion
  • 3. Crime & Cybercrime • Crime – Engaging in conduct that has been outlawed by a particular society. – Harm to: Individuals, property, government and morality. • Cybercrime – Differ in the tool: guns are change for computers.
  • 4. Cybercriminals + computer technology = difficulties to apply the law. not only real-world crimes by using computers…
  • 5. DDoS attack • Distributed Denial of Service. – Harm upon property by shutting down a website. – The attack doesn’t fit in conceptual category the law has devised to deal with crime.
  • 6. Emergence of cybercrime • 1950- word “hack” is use to refer to creative college pranks and migrate to computer culture. • 1960- first published accounts of computers being used illegally. – Crimes committed by insiders. • 1969- ARPANET link computers in hundred of universities. • 1980- Personal networked computer . – Hackers were up to no good.
  • 7. Phone Phreaking • Manipulating the telephone system – Provide free long- distance service. – Prosecuted under existing law (fraud or theft) – Phone phreaks move on to hacking in the 1980s
  • 8. Meanwhile… • First civilian bulletin board system on-line in Chicago. Some engaged in darker activities. • 1984- Hacker groups appear. Robert Tappan – Morris worm Legion Of Doom (LOD), Masters of deception (MOD), etc. War startetd. • 1988- Robert Tappan Morris released the first Internet worm. Chris Goggans (LOD) Mark Abene (MOD)
  • 9. Hacking • Kevin Poulsen jumped from Phone phreak to hacking. • Attacks to Pacific Bell Telephone Company and federal government installations. • Apprehended in 1991-Charges: accessed device fraud, conspiracy, wiretapping, computer fraud, mail fraud, money laundering and espionage. Kevin Poulsen Kevin Mitnick was the first hacker included in FBI’S MOS WANTED list.
  • 10. Malware • Robert Tappan Morris “invented” the network malware. • He demostrate how quickly malware can spread from system to system. • 1999- Melissa is the first mass-mailing computer virus. • At first malware was not addresss by local criminal law.
  • 11. Theft • 1994- Vladimir Levin siphoned millions of dollars from Citibank accounts. • Use of computers technology to obtain funds belonging to someone else. • Traditional crime in a no traditional way. Vladimir Levin China: Song Chenglin used a computer at an Internet Café to hack 158 accounts at the ICBC
  • 12. Fraud • “Official” fraud • Internet auction fraud – Transfer millions – Factory direct products • Lottery fraud • Identity theft – “Won” the lottery • Specific legislation is not needed.
  • 13. Child Pornography • Internet provides less risk of being identified. • Highly organized, global subculture. • Many of them are in countries where child pornography is not a priority for law enforcement. • What is child pornography? Definition of child.
  • 14. Extortion • Same dynamic as in real-world • Threaten to reveal sensitive information of an online business. • DDoS Attack to Casinos. • Will eventually be directed to bigger organizations.
  • 15. Cyberterrorism • Terrorism: Commission of criminal acts for political motives. • Has involved the use of methods of physical destruction. • USA Patriot ACT – Hacking, cracking, extortion, fraud and malware.
  • 17. Internet Homicide • Distribution of Hardcore and Snuff Movies • A face to face date with online friend can turn deadly. • Consensual homicide.
  • 18. Rotenburg Cannibal • Germany .- March 9, 2001. – Armin Meiwes (Cannibal) – Bernd Jürgen Brandes (Victime) • Armin post a message on “The Cannibal Café” website. • Documentary: http://video.google.com/videoplay?docid=1299254578438715427
  • 19. Internet Suicide • Suicide pact made on internet. • Most of cases have ocurred in Japan. – Some of them are also in China, South Korea, Germany, USA, etc. • Traditional suicide pacts involved older peole (50-60 years old) • Internet suicide pact now involve young people, usually teenagers. Check this link for more information: http://www.espacoacademico.com.br/044/44eueno_ing.htm
  • 20. Online Mercenaries • Found by searching material for this presentation. • http://club.telepolis.com/servmerc/index.htm
  • 21.
  • 22.
  • 23.
  • 24. + = PC + Internet = Cybercrime legislation far more imperative
  • 25. National & International Efforts • First Wave (privacy) – Sweden (1973) ; USA (1974); Federal Republic of German (1977); Austria, Denmark, France and Norway (1978), etc. • Second Wave (property) – Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc. • Third Wave (intellectual property) • Convention on Cybercrime – Ensuring that countries adopt procedural laws. – International cooperation. – Harmonizing national cybercrime law. – Domestic law criminalizes: Attacks on PC data or system; Pc tech. to commit fraud or forgery; Pc tech. to create Child Pornograpy.; infringe copyright.
  • 26. Cybercrime: the future • Two main trends: – Professionalization of Cybercrime (creation of cybermafias, similar to italian families in early of US history). – Increasing the automization of Cybercrime.
  • 27. Clever cybercriminals can enjoy the benefits of criminal organization without its disadvantages. Definitely this is another arena for human activity. But, is it legally another jurisdiction? This seems to be more than a study case because all we studied in Information Society class can turn into a crime activity What can we do?