More Related Content Similar to Computer Forensics and Cyber CrimeCHAPTERComputer Fore.docx (8) Computer Forensics and Cyber CrimeCHAPTERComputer Fore.docx1. Computer Forensics and Cyber Crime
CHAPTER
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and Organized Crime
6
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Learning ObjectivesFully understand the concept of terrorism.
Learn the impact of the Internet on terrorism and organized
crime.
Develop a working knowledge of organized crime.
Gain insight into the future direction of organized crime.
Recognize and understand the contemporary characteristics of
organized crime.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
2. All Rights Reserved
Defining Terrorism
From a governmental perspective, terrorism would involve: All
criminal acts directed against a State...to create a state of terror
in the minds of particular persons or a group of persons or the
general public. (League of Nations Convention, 1937) Criminal
acts intended...to provoke a state of terror...for political
purposes are in any circumstance unjustifiable... (UN
Resolution Language, 1994)The calculated use of unlawful
violence or threat ... to inculcate fear; intended to coerce or to
intimidate governments or societies in the pursuit of goals that
are generally political, religious, or ideological. (U.S.
Department of Defense, 2007)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Terrorism
From an academic perspective, terrorism is: An anxiety-
inspiring method of repeated violent actionEmployed for
idiosyncratic, criminal or political reasonsIn contrast to
assassination, the direct targets of violence are not the main
targetsThe immediate victims are generally chosen randomly or
selectively from a target population, and serve as message
generators Threat- and violence-based communication processes
are used to manipulate the main target, turning it into a target of
terror, demands, or attention, depending on whether
intimidation, coercion, or propaganda is primarily sought
Schmid, Alex P. and Albert J. Jongman, et al. (1988). Political
Terrorism: A New Guide to Actors, Authors, Concepts, DATA
3. Bases, Theories and Literature (2nd Ed.). North-Holland
Publishing: Amsterdam.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining TerrorismAn attempt to communicate messages
through the use of orchestrated violence.
Tsfati, Yariv and Weimann, Gabriel (2002).
“www.terrorism.com: Terror on the Internet.” Studies in
Conflict and Terrorism, 25: 317–332.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
4. TerrorismIncludes: An act of violenceThe victimization of
innocentsMethodical or serial operationsAdvance
planningCriminal characterAbsence of moral restraintsPolitical
demandsAttempts to garner attentionPerformed for an
audienceUnpredictability or unexpectednessIntended to instill
fear
Britz, Marjie T. (2013). “The Internet as a Tool for Terrorists:
Implications for Physical and Virtual Worlds.” In Tom Holt
(ed.)
Crime On-Line (2nd Ed). Carolina University Press: Charlotte.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationCan distinguish
among acts of terror by the goals of those committing acts of
violence:
Individual Terrorism can get overlooked due to its often lower
impact, while eschewing group involvement; look at the
Unabomber's crimes and his paranoid rants against technology.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationPolitical-Social
Terrorism is often carried out by those with a political agenda,
often to overthrow an existing government; if successful, they
5. get called patriots, freedom-fighters, or heroes, as with the
rebelling American colonists or Castro's 26th of July
Movement. Nationalist Terrorism can involve those with a
social commonality or group identification and a collective
perception of oppression, who persist with large memberships
due to persecution, like the IRA, HAMAS, Hezbollah, or the
ETA.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationEnvironmental
Terrorists, also called ecoterrorists, are ideologicaly focused on
conservation of natural resources and animal rights; for
example, the Earth Liberation Front (ELF) and Animal
Liberation Front (ALF).
State-Sponsored Terrorism consists of governments committing
acts of terror against their own citizens, such as in Nazi
Germany or those that support or commit acts of terror against
other governments, like North Korea.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationReligious
Terrorism is perhaps the most virulent, dangerous and
persistent, due to a basis in religious zealotry, among a
continuum of religious organizations, including Christian,
6. Judaic, and Islamic, among others.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Roots of Contemporary TerrorismThere are many historical
examples of terrorism, from the assassination of Julius Caesar
to tyrannicide committed in Renaissance Italy, Spain, and in
France during the Age of Absolutism.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism as a StagePreplanningScript preparation (goals
identified)Cast selection (who commits the acts)Set creation
(where will this take place)Prop development (could include
means to accomplish goals)Dress rehearsal (to ensure success)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism as a StagePromotion Identification of target audience
(often Western media)(often more important than actual
7. victims)Selection of appropriate media outlets and placement of
public relations personnel, since emotional, psychological
repercussions are paramount
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Cyberterrorism as a ConceptInstead of a display of physical
catastrophe or suffering, like other forms of terrorism, may
instead emphasize communication, requiring:A transmitter (the
terrorist)A recipient (an audience, who typically are not the
victims)A message (often ideological)A reaction (the desired
impact)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlinePropaganda, information dissemination, recruiting
and fundraising
Categories for justification of committing acts of terror include
that they:Are victims and had “no choice” but to commit these
acts.Vilify their opponent, who has hurt the powerless.Have a
weakness that makes this the only feasible option.May employ
peaceful, nonviolent rhetoric to achieve a settlement.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
8. Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineTrainingStarted using web-based training like
legitimate organizations, which is cheaper Still use films,
training documents, outlines, and checklists about topics like
building a suicide vest, using surface-to-air missiles, and
creating fraudulent identification
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineResearch and PlanningCritical processes involving
identifying, locating critical information like blueprints or "how
to" manuals (i.e., bomb-making), as well as plotting steps to
take
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineCommunicationEspecially with the Web,
communication can be decentralized, cheaper, more reliable,
and harder to detectCan use electronic dead drops (storing
messages in draft folders on computers with shared access),
steganography (embedded messages), online social networking
sites (like Google's Orkut), and encryption
9. Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineAttack MechanismCyberattacks attacks can come
as quickly as the attack in Estonia, or more slowly, as when
Stuxnet disabled Iranian centrifuges to produce weapons-grade
uranium
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror Online
Physical Critical Data
Infra-
structure
Compromise of
a critical system severely affects physical infrastructures
Compromise of
a critical computer system to alter, manipulate, or destroy
critical data, with the potential for death, destruction, or
economic turmoil
Power grids, water/sewer, dams, hospitals, GPS, air traffic
systems, communication, energy pipelines
10. Social Security, Center for Disease Control, Department of
Defense, etc.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeCriminal Activities Identity theft could
lead to credit card fraud or generation of fraudulent documents,
to generate revenue, and frustrate law enforcement's efforts at
tracking down those planning on committing acts of terror.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeCriminalizing Terrorist ActsBefore the
September 11 attacks, terrorist acts usually consisted of murder,
kidnapping, and hostage-taking.Law enforcement has since
expanded its scope of inquiry.The Department of Homeland
Security has taken lead on this.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
11. Terrorism and CrimeOther Federal agencies have initiated
efforts, such as: Consular Lookout & Support System, State
DepartmentTIPOFF Database (terrorist watch list), State
DepartmentViolent Gang & Terrorist Organization (emphasis on
organized crime), FBIBorder Inspection System, Immigration
and Customs Enforcement (ICE)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeConclusionsAs the Internet facilitates
communication, it makes it easier those who would commit acts
of terror to achieve their goals.Decentralizing infrastructure,
like energy production, may make societies less vulnerable, but
tough in a society that demands greater efficiency and
convenience.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeEspecially transnational Organized Crime (OC)
may flourish in 21st century, in forms such as: Trafficking in
nuclear materialsHuman smugglingIdentity theftOnline criminal
activitiesTransitional, developing nations may provide the
greatest opportunities for organized crime.Those engaging in
organized crime are increasingly turning to technology for
complex, more profitable crimes.
12. Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Organized CrimeOften started from marginalized
groups
Historical factors: Arose often in times of economic
hardshipCultural emphasis on masculinityHistorical territorial
rivalriesAdvent of mass unemployment
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeEarly emphasis in this country on Italian
organized crime, La Cosa Nostra.
Definitions have varied, sometimes to advance particular
agendas as: Focusing on institutionalized crime where criminal
societies had systemized tasks and practices, unique traditions,
and distinctive jargon. Chicago Crime Commission
(1915)Criminal syndicates developed because of Prohibition.
Wickersham Commission (1929)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
13. Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeInvestigating gambling, and finding ethnic
communities housed criminal groups which used a sophisticated
command hierarchy, creating an international conspiracy to
traffick narcotics and contraband. Kefauver Committee (1950s)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeAiming again to stop Italian organized crime,
relied on testimony of former gang member, Joe Valachi, who
talked about rules, recruitment practices, organizational
structure & illegal activities. McClellan Committee (1960s)
Broadly talking about organized crime: "A society that seeks to
operate outside the control of the American people … It
involves thousands of criminals, working within structures as
large as those of any corporation.” President’s Commission on
Law Enforcement (1967)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeLooking at "The unlawful activities of a highly
organized, disciplined association engaged in supplying illegal
goods and services including, but not limited to: gambling,
14. prostitution, loan sharking, narcotics, labor racketeering, and
other lawful activities." Omnibus Crime Control & Safe
Streets Act (1968)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeStructure &
hierarchyViolenceRecognizabilityLongevityRecruitmentInnovat
ive, entrepreneurial, and opportunisticExclusive
membershipStrict rules and
regulationsRitualisticProfitabilityCorruption of political
authoritiesRacketeering and infiltration of legitimate
businessMonopolisticCriminal activity
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized Crime vs. CybergangsA monopolistic, self-
perpetuating, hierarchical organization willing to use violence
and the corruption of public officials to engage in complex
criminal enterprises, which ensures organizational longevity
through ritualistic practices, rules and regulations,
organizational tithing, and investment in legitimate industry.
15. Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Cybergangs/Cyber-Criminal OrganizationsGroups of individuals
brought together through the medium of the Internet which
conspire and/or commit non-violent criminal acts facilitated by
the exploitation of networked or interconnected systems.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized Crime and TechnologyExtortionCargo heists and
armed robberyFraud, including bank fraud, ATM/credit card
fraud, and stock fraudMoney launderingThe sex trade
Organized crime exploiting technological advancements to
conduct traditional crimes, including:Confidence scams, such as
the Nigerian 419 letterFencing of stolen propertyData piracy
and counterfeit goodsHuman smuggling
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Confronting Contemporary Organized CrimeWhen confronting
contemporary organized crime, consider:The diversity among
emerging groups, suggesting that more are involvedThe
16. economic motivation behind hacking, cyber-attacks by
organized crime groupsIncorporating "know your customer"
(KYC) requirements in banking to reduce fraudThat traditional
hacking methods employed by organized crime groups are
innovativeThe convergence of transnational organized crime
and terrorism
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Confronting Contemporary Organized CrimeThe benefits of
global harmonization of regulation and the development of
mutual legal assistance treaties, including banking/securities &
guidelines for police actionUsing bilateral and multilateral
crime-fighting effortsThe devising of specific strategies for
individual groupsEmpowering local government responses
through an increase in resourcesIncreasing educational efforts,
accountability for e-banking vendors and companies
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Intersection of Organized Crime and TerrorismNote their
similarities:Increasingly sophisticatedEmploy similar
methodologiesUse the web to engage in money launderingUse
the web for communicationMost common where there are
minimal government controls, weak enforcement of law, and
open bordersExploit geographic locales far removed from
17. control centers of government
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Intersection of Organized Crime and TerrorismAlso,
traditional lines are blurred and collaboration is
increasing.Differences:Organized crime is economically
focused, where terrorist groups are ideological.Terrorist groups
plan on replacing the government, while organized crime wants
to corrupt existing government.Organized cirme wants to avoid
publicity, whereas terrorist groups seek it out and thrive on
it.Terrorist groups indiscriminately seek victims, while
organized crime tends to want to limit outsiders.
1
CYBER CRIME
Chapter 6
Objectives
1. Discuss general concept of Terrorism
2. Introduce Cyberterrorism as another method of targeting
victims
3. Provide an understanding of the differences between
Organized Crime and Cyber Gangs
Details
I. Terrorism: Definition
· Act of violence
· Innocent victims
18. · Methodical operations
· Absence of moral restraints
· Performed for an audience
· Intended to instill fear
Motivations:
· Individual terrorism: act independently, discontented with
society
· Ted Kaczynski: Unabomber
· Political-social terrorism: groups engage to overthrow
established order
· Early American Colonists
· Nationalist terrorism: groups share collective perception of
oppression or persecution
· Palestine Liberation Front, Irish Republican Army
· Environmental terrorism: groups base their ideology on the
conservation of natural resources or animal rights
· Earth Liberation Front (ELF), Stop Huntington Animal Cruelty
(SHAC)
· State sponsored terrorism: two groups of government
offenders, one that commits acts of terror against its own
citizens and the other commits acts of terror against other
governments
· Nazi government targeted Jewish and other groups in Germany
· Cuban, Syrian and Iranian governments target other
governments such as Israel and any other governments that
support Israel, including US and European governments
19. · Religious terrorism: most prevalent and dangerous, motivated
by religion
· God’s Army (Christian), Jewish Defense League (Judiac), al
Qaeda (Islamic)
II. Cyberterrorism: Definition
· Premeditated, methodological and ideological motivated
· Dissemination of information, facilitation of communication
or attack against digital information, information systems
and/or computer programs
· Requires advanced planning
· Intended to result in social, financial, physical or
psychological harm to civilians
· Terrorist groups have used the Internet to disseminate
propaganda, recruit, train, research and attack targets
· Types of Cyberterrorist Threats
· Physical attacks: involve conventional weapons directed at a
computer facility for transmission lines
· Electronic attacks: electromagnetic energy is employed as a
weapon by inserting malicious code into an enemy microwave
radio transmission
· Computer network attacks: involve malware, computer or
network intrusion, or other cyber attacks on critical computer
systems
· Digital threats to physical infrastructure: compromise systems
that operate critical physical infrastructures such as power
grids, water and sewer systems, hospitals, communications,
20. financial institutions
· Critical data threat: compromise critical computer system to
alter, manipulate, or destroy critical data with potential of
death, destruction, and/or economic turmoil.
· Databases such as Social Security, Centers for Disease Control
(CDC), Department of Defense (DOD)
· Estonia Cyberattacks: (2007) Estonia’s infrastructure was
attacked by unknown individuals or groups focusing on the
nation’s critical databases.
· Numerous DDoS attacks crippled the banks and newspapers,
interrupted government communications
· Social unrest and rioting resulted in 150 injuries
· Iran Stuxnet Cyberattacks: (2010) Unknown entities (US and
Israel) planted a self-replicating malware (worm) into Iran’s
nuclear power plant in Bushehr and its uranium enrichment
facility in Natanz
· Identity Theft and 911 Attacks
· Each of the suicide bombers involved in the 911 attacks had
established fraudulent identities
· Driver’s licenses, stolen credit cards, fictitious or temporary
addresses, social security numbers and fraudulent travel
documents
· FBI Statement: Former FBI Director, Robert Mueller:
technology is moving so rapidly that, from a security
perspective, it is difficult to keep up…in the future, we
anticipate that the cyber threat will pose the number one threat
to our country…. once isolated hackers have joined forces to
form criminal syndicates
III. Organized Crime and Cyber Gangs
21. · Organized crime is recognizable, monopolistic, self-
perpetuating, hierarchical organization willing to use violence
and the corruption of public officials to engage in both
traditional vice ( gambling, drugs, prostitution) and complex
criminal enterprises which allows investment in legitimate
businesses
· Cyber gangs are groups of individuals brought together
through the medium of the Internet which conspire and/or
commit non-violent criminal acts facilitated by the exploitation
of networked or interconnected systems
· Shadowcrew, Carderplanet, Darkprofits
Computer Forensics and Cyber Crime
CHAPTER
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and Organized Crime
6
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
22. Learning ObjectivesFully understand the concept of terrorism.
Learn the impact of the Internet on terrorism and organized
crime.
Develop a working knowledge of organized crime.
Gain insight into the future direction of organized crime.
Recognize and understand the contemporary characteristics of
organized crime.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Terrorism
From a governmental perspective, terrorism would involve: All
criminal acts directed against a State...to create a state of terror
in the minds of particular persons or a group of persons or the
general public. (League of Nations Convention, 1937) Criminal
acts intended...to provoke a state of terror...for political
purposes are in any circumstance unjustifiable... (UN
Resolution Language, 1994)The calculated use of unlawful
violence or threat ... to inculcate fear; intended to coerce or to
intimidate governments or societies in the pursuit of goals that
are generally political, religious, or ideological. (U.S.
Department of Defense, 2007)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Terrorism
23. From an academic perspective, terrorism is: An anxiety-
inspiring method of repeated violent actionEmployed for
idiosyncratic, criminal or political reasonsIn contrast to
assassination, the direct targets of violence are not the main
targetsThe immediate victims are generally chosen randomly or
selectively from a target population, and serve as message
generators Threat- and violence-based communication processes
are used to manipulate the main target, turning it into a target of
terror, demands, or attention, depending on whether
intimidation, coercion, or propaganda is primarily sought
Schmid, Alex P. and Albert J. Jongman, et al. (1988). Political
Terrorism: A New Guide to Actors, Authors, Concepts, DATA
Bases, Theories and Literature (2nd Ed.). North-Holland
Publishing: Amsterdam.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining TerrorismAn attempt to communicate messages
through the use of orchestrated violence.
24. Tsfati, Yariv and Weimann, Gabriel (2002).
“www.terrorism.com: Terror on the Internet.” Studies in
Conflict and Terrorism, 25: 317–332.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
TerrorismIncludes: An act of violenceThe victimization of
innocentsMethodical or serial operationsAdvance
planningCriminal characterAbsence of moral restraintsPolitical
demandsAttempts to garner attentionPerformed for an
audienceUnpredictability or unexpectednessIntended to instill
fear
Britz, Marjie T. (2013). “The Internet as a Tool for Terrorists:
Implications for Physical and Virtual Worlds.” In Tom Holt
(ed.)
Crime On-Line (2nd Ed). Carolina University Press: Charlotte.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationCan distinguish
among acts of terror by the goals of those committing acts of
violence:
Individual Terrorism can get overlooked due to its often lower
25. impact, while eschewing group involvement; look at the
Unabomber's crimes and his paranoid rants against technology.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationPolitical-Social
Terrorism is often carried out by those with a political agenda,
often to overthrow an existing government; if successful, they
get called patriots, freedom-fighters, or heroes, as with the
rebelling American colonists or Castro's 26th of July
Movement. Nationalist Terrorism can involve those with a
social commonality or group identification and a collective
perception of oppression, who persist with large memberships
due to persecution, like the IRA, HAMAS, Hezbollah, or the
ETA.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationEnvironmental
Terrorists, also called ecoterrorists, are ideologicaly focused on
conservation of natural resources and animal rights; for
example, the Earth Liberation Front (ELF) and Animal
Liberation Front (ALF).
State-Sponsored Terrorism consists of governments committing
acts of terror against their own citizens, such as in Nazi
Germany or those that support or commit acts of terror against
26. other governments, like North Korea.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationReligious
Terrorism is perhaps the most virulent, dangerous and
persistent, due to a basis in religious zealotry, among a
continuum of religious organizations, including Christian,
Judaic, and Islamic, among others.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Roots of Contemporary TerrorismThere are many historical
examples of terrorism, from the assassination of Julius Caesar
to tyrannicide committed in Renaissance Italy, Spain, and in
France during the Age of Absolutism.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism as a StagePreplanningScript preparation (goals
27. identified)Cast selection (who commits the acts)Set creation
(where will this take place)Prop development (could include
means to accomplish goals)Dress rehearsal (to ensure success)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism as a StagePromotion Identification of target audience
(often Western media)(often more important than actual
victims)Selection of appropriate media outlets and placement of
public relations personnel, since emotional, psychological
repercussions are paramount
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Cyberterrorism as a ConceptInstead of a display of physical
catastrophe or suffering, like other forms of terrorism, may
instead emphasize communication, requiring:A transmitter (the
terrorist)A recipient (an audience, who typically are not the
victims)A message (often ideological)A reaction (the desired
impact)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
28. All Rights Reserved
Terror OnlinePropaganda, information dissemination, recruiting
and fundraising
Categories for justification of committing acts of terror include
that they:Are victims and had “no choice” but to commit these
acts.Vilify their opponent, who has hurt the powerless.Have a
weakness that makes this the only feasible option.May employ
peaceful, nonviolent rhetoric to achieve a settlement.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineTrainingStarted using web-based training like
legitimate organizations, which is cheaper Still use films,
training documents, outlines, and checklists about topics like
building a suicide vest, using surface-to-air missiles, and
creating fraudulent identification
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineResearch and PlanningCritical processes involving
identifying, locating critical information like blueprints or "how
to" manuals (i.e., bomb-making), as well as plotting steps to
take
29. Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineCommunicationEspecially with the Web,
communication can be decentralized, cheaper, more reliable,
and harder to detectCan use electronic dead drops (storing
messages in draft folders on computers with shared access),
steganography (embedded messages), online social networking
sites (like Google's Orkut), and encryption
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineAttack MechanismCyberattacks attacks can come
as quickly as the attack in Estonia, or more slowly, as when
Stuxnet disabled Iranian centrifuges to produce weapons-grade
uranium
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror Online
Physical Critical Data
30. Infra-
structure
Compromise of
a critical system severely affects physical infrastructures
Compromise of
a critical computer system to alter, manipulate, or destroy
critical data, with the potential for death, destruction, or
economic turmoil
Power grids, water/sewer, dams, hospitals, GPS, air traffic
systems, communication, energy pipelines
Social Security, Center for Disease Control, Department of
Defense, etc.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeCriminal Activities Identity theft could
lead to credit card fraud or generation of fraudulent documents,
to generate revenue, and frustrate law enforcement's efforts at
tracking down those planning on committing acts of terror.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
31. Terrorism and CrimeCriminalizing Terrorist ActsBefore the
September 11 attacks, terrorist acts usually consisted of murder,
kidnapping, and hostage-taking.Law enforcement has since
expanded its scope of inquiry.The Department of Homeland
Security has taken lead on this.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeOther Federal agencies have initiated
efforts, such as: Consular Lookout & Support System, State
DepartmentTIPOFF Database (terrorist watch list), State
DepartmentViolent Gang & Terrorist Organization (emphasis on
organized crime), FBIBorder Inspection System, Immigration
and Customs Enforcement (ICE)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeConclusionsAs the Internet facilitates
communication, it makes it easier those who would commit acts
of terror to achieve their goals.Decentralizing infrastructure,
like energy production, may make societies less vulnerable, but
tough in a society that demands greater efficiency and
convenience.
32. Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeEspecially transnational Organized Crime (OC)
may flourish in 21st century, in forms such as: Trafficking in
nuclear materialsHuman smugglingIdentity theftOnline criminal
activitiesTransitional, developing nations may provide the
greatest opportunities for organized crime.Those engaging in
organized crime are increasingly turning to technology for
complex, more profitable crimes.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Organized CrimeOften started from marginalized
groups
Historical factors: Arose often in times of economic
hardshipCultural emphasis on masculinityHistorical territorial
rivalriesAdvent of mass unemployment
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
33. Organized CrimeEarly emphasis in this country on Italian
organized crime, La Cosa Nostra.
Definitions have varied, sometimes to advance particular
agendas as: Focusing on institutionalized crime where criminal
societies had systemized tasks and practices, unique traditions,
and distinctive jargon. Chicago Crime Commission
(1915)Criminal syndicates developed because of Prohibition.
Wickersham Commission (1929)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeInvestigating gambling, and finding ethnic
communities housed criminal groups which used a sophisticated
command hierarchy, creating an international conspiracy to
traffick narcotics and contraband. Kefauver Committee (1950s)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeAiming again to stop Italian organized crime,
relied on testimony of former gang member, Joe Valachi, who
talked about rules, recruitment practices, organizational
structure & illegal activities. McClellan Committee (1960s)
Broadly talking about organized crime: "A society that seeks to
operate outside the control of the American people … It
involves thousands of criminals, working within structures as
34. large as those of any corporation.” President’s Commission on
Law Enforcement (1967)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeLooking at "The unlawful activities of a highly
organized, disciplined association engaged in supplying illegal
goods and services including, but not limited to: gambling,
prostitution, loan sharking, narcotics, labor racketeering, and
other lawful activities." Omnibus Crime Control & Safe
Streets Act (1968)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeStructure &
hierarchyViolenceRecognizabilityLongevityRecruitmentInnovat
ive, entrepreneurial, and opportunisticExclusive
membershipStrict rules and
regulationsRitualisticProfitabilityCorruption of political
authoritiesRacketeering and infiltration of legitimate
businessMonopolisticCriminal activity
Computer Forensics and Cyber Crime, 3rd ed.
Britz
35. Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized Crime vs. CybergangsA monopolistic, self-
perpetuating, hierarchical organization willing to use violence
and the corruption of public officials to engage in complex
criminal enterprises, which ensures organizational longevity
through ritualistic practices, rules and regulations,
organizational tithing, and investment in legitimate industry.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Cybergangs/Cyber-Criminal OrganizationsGroups of individuals
brought together through the medium of the Internet which
conspire and/or commit non-violent criminal acts facilitated by
the exploitation of networked or interconnected systems.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized Crime and TechnologyExtortionCargo heists and
armed robberyFraud, including bank fraud, ATM/credit card
fraud, and stock fraudMoney launderingThe sex trade
Organized crime exploiting technological advancements to
conduct traditional crimes, including:Confidence scams, such as
36. the Nigerian 419 letterFencing of stolen propertyData piracy
and counterfeit goodsHuman smuggling
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Confronting Contemporary Organized CrimeWhen confronting
contemporary organized crime, consider:The diversity among
emerging groups, suggesting that more are involvedThe
economic motivation behind hacking, cyber-attacks by
organized crime groupsIncorporating "know your customer"
(KYC) requirements in banking to reduce fraudThat traditional
hacking methods employed by organized crime groups are
innovativeThe convergence of transnational organized crime
and terrorism
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Confronting Contemporary Organized CrimeThe benefits of
global harmonization of regulation and the development of
mutual legal assistance treaties, including banking/securities &
guidelines for police actionUsing bilateral and multilateral
crime-fighting effortsThe devising of specific strategies for
individual groupsEmpowering local government responses
through an increase in resourcesIncreasing educational efforts,
accountability for e-banking vendors and companies
37. Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Intersection of Organized Crime and TerrorismNote their
similarities:Increasingly sophisticatedEmploy similar
methodologiesUse the web to engage in money launderingUse
the web for communicationMost common where there are
minimal government controls, weak enforcement of law, and
open bordersExploit geographic locales far removed from
control centers of government
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Intersection of Organized Crime and TerrorismAlso,
traditional lines are blurred and collaboration is
increasing.Differences:Organized crime is economically
focused, where terrorist groups are ideological.Terrorist groups
plan on replacing the government, while organized crime wants
to corrupt existing government.Organized cirme wants to avoid
publicity, whereas terrorist groups seek it out and thrive on
it.Terrorist groups indiscriminately seek victims, while
organized crime tends to want to limit outsiders.
1
CYBER CRIME
Chapter 6
38. Objectives
1. Discuss general concept of Terrorism
2. Introduce Cyberterrorism as another method of targeting
victims
3. Provide an understanding of the differences between
Organized Crime and Cyber Gangs
Details
I. Terrorism: Definition
· Act of violence
· Innocent victims
· Methodical operations
· Absence of moral restraints
· Performed for an audience
· Intended to instill fear
Motivations:
· Individual terrorism: act independently, discontented with
society
· Ted Kaczynski: Unabomber
· Political-social terrorism: groups engage to overthrow
established order
· Early American Colonists
· Nationalist terrorism: groups share collective perception of
oppression or persecution
· Palestine Liberation Front, Irish Republican Army
· Environmental terrorism: groups base their ideology on the
39. conservation of natural resources or animal rights
· Earth Liberation Front (ELF), Stop Huntington Animal Cruelty
(SHAC)
· State sponsored terrorism: two groups of government
offenders, one that commits acts of terror against its own
citizens and the other commits acts of terror against other
governments
· Nazi government targeted Jewish and other groups in Germany
· Cuban, Syrian and Iranian governments target other
governments such as Israel and any other governments that
support Israel, including US and European governments
· Religious terrorism: most prevalent and dangerous, motivated
by religion
· God’s Army (Christian), Jewish Defense League (Judiac), al
Qaeda (Islamic)
II. Cyberterrorism: Definition
· Premeditated, methodological and ideological motivated
· Dissemination of information, facilitation of communication
or attack against digital information, information systems
and/or computer programs
· Requires advanced planning
· Intended to result in social, financial, physical or
psychological harm to civilians
· Terrorist groups have used the Internet to disseminate
propaganda, recruit, train, research and attack targets
· Types of Cyberterrorist Threats
40. · Physical attacks: involve conventional weapons directed at a
computer facility for transmission lines
· Electronic attacks: electromagnetic energy is employed as a
weapon by inserting malicious code into an enemy microwave
radio transmission
· Computer network attacks: involve malware, computer or
network intrusion, or other cyber attacks on critical computer
systems
· Digital threats to physical infrastructure: compromise systems
that operate critical physical infrastructures such as power
grids, water and sewer systems, hospitals, communications,
financial institutions
· Critical data threat: compromise critical computer system to
alter, manipulate, or destroy critical data with potential of
death, destruction, and/or economic turmoil.
· Databases such as Social Security, Centers for Disease Control
(CDC), Department of Defense (DOD)
· Estonia Cyberattacks: (2007) Estonia’s infrastructure was
attacked by unknown individuals or groups focusing on the
nation’s critical databases.
· Numerous DDoS attacks crippled the banks and newspapers,
interrupted government communications
· Social unrest and rioting resulted in 150 injuries
· Iran Stuxnet Cyberattacks: (2010) Unknown entities (US and
Israel) planted a self-replicating malware (worm) into Iran’s
nuclear power plant in Bushehr and its uranium enrichment
facility in Natanz
· Identity Theft and 911 Attacks
41. · Each of the suicide bombers involved in the 911 attacks had
established fraudulent identities
· Driver’s licenses, stolen credit cards, fictitious or temporary
addresses, social security numbers and fraudulent travel
documents
· FBI Statement: Former FBI Director, Robert Mueller:
technology is moving so rapidly that, from a security
perspective, it is difficult to keep up…in the future, we
anticipate that the cyber threat will pose the number one threat
to our country…. once isolated hackers have joined forces to
form criminal syndicates
III. Organized Crime and Cyber Gangs
· Organized crime is recognizable, monopolistic, self-
perpetuating, hierarchical organization willing to use violence
and the corruption of public officials to engage in both
traditional vice ( gambling, drugs, prostitution) and complex
criminal enterprises which allows investment in legitimate
businesses
· Cyber gangs are groups of individuals brought together
through the medium of the Internet which conspire and/or
commit non-violent criminal acts facilitated by the exploitation
of networked or interconnected systems
· Shadowcrew, Carderplanet, Darkprofits