SlideShare a Scribd company logo
1 of 41
Computer Forensics and Cyber Crime
CHAPTER
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and Organized Crime
6
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Learning ObjectivesFully understand the concept of terrorism.
Learn the impact of the Internet on terrorism and organized
crime.
Develop a working knowledge of organized crime.
Gain insight into the future direction of organized crime.
Recognize and understand the contemporary characteristics of
organized crime.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Terrorism
From a governmental perspective, terrorism would involve: All
criminal acts directed against a State...to create a state of terror
in the minds of particular persons or a group of persons or the
general public. (League of Nations Convention, 1937) Criminal
acts intended...to provoke a state of terror...for political
purposes are in any circumstance unjustifiable... (UN
Resolution Language, 1994)The calculated use of unlawful
violence or threat ... to inculcate fear; intended to coerce or to
intimidate governments or societies in the pursuit of goals that
are generally political, religious, or ideological. (U.S.
Department of Defense, 2007)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Terrorism
From an academic perspective, terrorism is: An anxiety-
inspiring method of repeated violent actionEmployed for
idiosyncratic, criminal or political reasonsIn contrast to
assassination, the direct targets of violence are not the main
targetsThe immediate victims are generally chosen randomly or
selectively from a target population, and serve as message
generators Threat- and violence-based communication processes
are used to manipulate the main target, turning it into a target of
terror, demands, or attention, depending on whether
intimidation, coercion, or propaganda is primarily sought
Schmid, Alex P. and Albert J. Jongman, et al. (1988). Political
Terrorism: A New Guide to Actors, Authors, Concepts, DATA
Bases, Theories and Literature (2nd Ed.). North-Holland
Publishing: Amsterdam.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining TerrorismAn attempt to communicate messages
through the use of orchestrated violence.
Tsfati, Yariv and Weimann, Gabriel (2002).
“www.terrorism.com: Terror on the Internet.” Studies in
Conflict and Terrorism, 25: 317–332.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
TerrorismIncludes: An act of violenceThe victimization of
innocentsMethodical or serial operationsAdvance
planningCriminal characterAbsence of moral restraintsPolitical
demandsAttempts to garner attentionPerformed for an
audienceUnpredictability or unexpectednessIntended to instill
fear
Britz, Marjie T. (2013). “The Internet as a Tool for Terrorists:
Implications for Physical and Virtual Worlds.” In Tom Holt
(ed.)
Crime On-Line (2nd Ed). Carolina University Press: Charlotte.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationCan distinguish
among acts of terror by the goals of those committing acts of
violence:
Individual Terrorism can get overlooked due to its often lower
impact, while eschewing group involvement; look at the
Unabomber's crimes and his paranoid rants against technology.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationPolitical-Social
Terrorism is often carried out by those with a political agenda,
often to overthrow an existing government; if successful, they
get called patriots, freedom-fighters, or heroes, as with the
rebelling American colonists or Castro's 26th of July
Movement. Nationalist Terrorism can involve those with a
social commonality or group identification and a collective
perception of oppression, who persist with large memberships
due to persecution, like the IRA, HAMAS, Hezbollah, or the
ETA.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationEnvironmental
Terrorists, also called ecoterrorists, are ideologicaly focused on
conservation of natural resources and animal rights; for
example, the Earth Liberation Front (ELF) and Animal
Liberation Front (ALF).
State-Sponsored Terrorism consists of governments committing
acts of terror against their own citizens, such as in Nazi
Germany or those that support or commit acts of terror against
other governments, like North Korea.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationReligious
Terrorism is perhaps the most virulent, dangerous and
persistent, due to a basis in religious zealotry, among a
continuum of religious organizations, including Christian,
Judaic, and Islamic, among others.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Roots of Contemporary TerrorismThere are many historical
examples of terrorism, from the assassination of Julius Caesar
to tyrannicide committed in Renaissance Italy, Spain, and in
France during the Age of Absolutism.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism as a StagePreplanningScript preparation (goals
identified)Cast selection (who commits the acts)Set creation
(where will this take place)Prop development (could include
means to accomplish goals)Dress rehearsal (to ensure success)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism as a StagePromotion Identification of target audience
(often Western media)(often more important than actual
victims)Selection of appropriate media outlets and placement of
public relations personnel, since emotional, psychological
repercussions are paramount
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Cyberterrorism as a ConceptInstead of a display of physical
catastrophe or suffering, like other forms of terrorism, may
instead emphasize communication, requiring:A transmitter (the
terrorist)A recipient (an audience, who typically are not the
victims)A message (often ideological)A reaction (the desired
impact)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlinePropaganda, information dissemination, recruiting
and fundraising
Categories for justification of committing acts of terror include
that they:Are victims and had “no choice” but to commit these
acts.Vilify their opponent, who has hurt the powerless.Have a
weakness that makes this the only feasible option.May employ
peaceful, nonviolent rhetoric to achieve a settlement.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineTrainingStarted using web-based training like
legitimate organizations, which is cheaper Still use films,
training documents, outlines, and checklists about topics like
building a suicide vest, using surface-to-air missiles, and
creating fraudulent identification
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineResearch and PlanningCritical processes involving
identifying, locating critical information like blueprints or "how
to" manuals (i.e., bomb-making), as well as plotting steps to
take
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineCommunicationEspecially with the Web,
communication can be decentralized, cheaper, more reliable,
and harder to detectCan use electronic dead drops (storing
messages in draft folders on computers with shared access),
steganography (embedded messages), online social networking
sites (like Google's Orkut), and encryption
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineAttack MechanismCyberattacks attacks can come
as quickly as the attack in Estonia, or more slowly, as when
Stuxnet disabled Iranian centrifuges to produce weapons-grade
uranium
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror Online
Physical Critical Data
Infra-
structure
Compromise of
a critical system severely affects physical infrastructures
Compromise of
a critical computer system to alter, manipulate, or destroy
critical data, with the potential for death, destruction, or
economic turmoil
Power grids, water/sewer, dams, hospitals, GPS, air traffic
systems, communication, energy pipelines
Social Security, Center for Disease Control, Department of
Defense, etc.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeCriminal Activities Identity theft could
lead to credit card fraud or generation of fraudulent documents,
to generate revenue, and frustrate law enforcement's efforts at
tracking down those planning on committing acts of terror.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeCriminalizing Terrorist ActsBefore the
September 11 attacks, terrorist acts usually consisted of murder,
kidnapping, and hostage-taking.Law enforcement has since
expanded its scope of inquiry.The Department of Homeland
Security has taken lead on this.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeOther Federal agencies have initiated
efforts, such as: Consular Lookout & Support System, State
DepartmentTIPOFF Database (terrorist watch list), State
DepartmentViolent Gang & Terrorist Organization (emphasis on
organized crime), FBIBorder Inspection System, Immigration
and Customs Enforcement (ICE)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeConclusionsAs the Internet facilitates
communication, it makes it easier those who would commit acts
of terror to achieve their goals.Decentralizing infrastructure,
like energy production, may make societies less vulnerable, but
tough in a society that demands greater efficiency and
convenience.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeEspecially transnational Organized Crime (OC)
may flourish in 21st century, in forms such as: Trafficking in
nuclear materialsHuman smugglingIdentity theftOnline criminal
activitiesTransitional, developing nations may provide the
greatest opportunities for organized crime.Those engaging in
organized crime are increasingly turning to technology for
complex, more profitable crimes.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Organized CrimeOften started from marginalized
groups
Historical factors: Arose often in times of economic
hardshipCultural emphasis on masculinityHistorical territorial
rivalriesAdvent of mass unemployment
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeEarly emphasis in this country on Italian
organized crime, La Cosa Nostra.
Definitions have varied, sometimes to advance particular
agendas as: Focusing on institutionalized crime where criminal
societies had systemized tasks and practices, unique traditions,
and distinctive jargon. Chicago Crime Commission
(1915)Criminal syndicates developed because of Prohibition.
Wickersham Commission (1929)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeInvestigating gambling, and finding ethnic
communities housed criminal groups which used a sophisticated
command hierarchy, creating an international conspiracy to
traffick narcotics and contraband. Kefauver Committee (1950s)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeAiming again to stop Italian organized crime,
relied on testimony of former gang member, Joe Valachi, who
talked about rules, recruitment practices, organizational
structure & illegal activities. McClellan Committee (1960s)
Broadly talking about organized crime: "A society that seeks to
operate outside the control of the American people … It
involves thousands of criminals, working within structures as
large as those of any corporation.” President’s Commission on
Law Enforcement (1967)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeLooking at "The unlawful activities of a highly
organized, disciplined association engaged in supplying illegal
goods and services including, but not limited to: gambling,
prostitution, loan sharking, narcotics, labor racketeering, and
other lawful activities." Omnibus Crime Control & Safe
Streets Act (1968)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeStructure &
hierarchyViolenceRecognizabilityLongevityRecruitmentInnovat
ive, entrepreneurial, and opportunisticExclusive
membershipStrict rules and
regulationsRitualisticProfitabilityCorruption of political
authoritiesRacketeering and infiltration of legitimate
businessMonopolisticCriminal activity
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized Crime vs. CybergangsA monopolistic, self-
perpetuating, hierarchical organization willing to use violence
and the corruption of public officials to engage in complex
criminal enterprises, which ensures organizational longevity
through ritualistic practices, rules and regulations,
organizational tithing, and investment in legitimate industry.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Cybergangs/Cyber-Criminal OrganizationsGroups of individuals
brought together through the medium of the Internet which
conspire and/or commit non-violent criminal acts facilitated by
the exploitation of networked or interconnected systems.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized Crime and TechnologyExtortionCargo heists and
armed robberyFraud, including bank fraud, ATM/credit card
fraud, and stock fraudMoney launderingThe sex trade
Organized crime exploiting technological advancements to
conduct traditional crimes, including:Confidence scams, such as
the Nigerian 419 letterFencing of stolen propertyData piracy
and counterfeit goodsHuman smuggling
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Confronting Contemporary Organized CrimeWhen confronting
contemporary organized crime, consider:The diversity among
emerging groups, suggesting that more are involvedThe
economic motivation behind hacking, cyber-attacks by
organized crime groupsIncorporating "know your customer"
(KYC) requirements in banking to reduce fraudThat traditional
hacking methods employed by organized crime groups are
innovativeThe convergence of transnational organized crime
and terrorism
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Confronting Contemporary Organized CrimeThe benefits of
global harmonization of regulation and the development of
mutual legal assistance treaties, including banking/securities &
guidelines for police actionUsing bilateral and multilateral
crime-fighting effortsThe devising of specific strategies for
individual groupsEmpowering local government responses
through an increase in resourcesIncreasing educational efforts,
accountability for e-banking vendors and companies
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Intersection of Organized Crime and TerrorismNote their
similarities:Increasingly sophisticatedEmploy similar
methodologiesUse the web to engage in money launderingUse
the web for communicationMost common where there are
minimal government controls, weak enforcement of law, and
open bordersExploit geographic locales far removed from
control centers of government
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Intersection of Organized Crime and TerrorismAlso,
traditional lines are blurred and collaboration is
increasing.Differences:Organized crime is economically
focused, where terrorist groups are ideological.Terrorist groups
plan on replacing the government, while organized crime wants
to corrupt existing government.Organized cirme wants to avoid
publicity, whereas terrorist groups seek it out and thrive on
it.Terrorist groups indiscriminately seek victims, while
organized crime tends to want to limit outsiders.
1
CYBER CRIME
Chapter 6
Objectives
1. Discuss general concept of Terrorism
2. Introduce Cyberterrorism as another method of targeting
victims
3. Provide an understanding of the differences between
Organized Crime and Cyber Gangs
Details
I. Terrorism: Definition
· Act of violence
· Innocent victims
· Methodical operations
· Absence of moral restraints
· Performed for an audience
· Intended to instill fear
Motivations:
· Individual terrorism: act independently, discontented with
society
· Ted Kaczynski: Unabomber
· Political-social terrorism: groups engage to overthrow
established order
· Early American Colonists
· Nationalist terrorism: groups share collective perception of
oppression or persecution
· Palestine Liberation Front, Irish Republican Army
· Environmental terrorism: groups base their ideology on the
conservation of natural resources or animal rights
· Earth Liberation Front (ELF), Stop Huntington Animal Cruelty
(SHAC)
· State sponsored terrorism: two groups of government
offenders, one that commits acts of terror against its own
citizens and the other commits acts of terror against other
governments
· Nazi government targeted Jewish and other groups in Germany
· Cuban, Syrian and Iranian governments target other
governments such as Israel and any other governments that
support Israel, including US and European governments
· Religious terrorism: most prevalent and dangerous, motivated
by religion
· God’s Army (Christian), Jewish Defense League (Judiac), al
Qaeda (Islamic)
II. Cyberterrorism: Definition
· Premeditated, methodological and ideological motivated
· Dissemination of information, facilitation of communication
or attack against digital information, information systems
and/or computer programs
· Requires advanced planning
· Intended to result in social, financial, physical or
psychological harm to civilians
· Terrorist groups have used the Internet to disseminate
propaganda, recruit, train, research and attack targets
· Types of Cyberterrorist Threats
· Physical attacks: involve conventional weapons directed at a
computer facility for transmission lines
· Electronic attacks: electromagnetic energy is employed as a
weapon by inserting malicious code into an enemy microwave
radio transmission
· Computer network attacks: involve malware, computer or
network intrusion, or other cyber attacks on critical computer
systems
· Digital threats to physical infrastructure: compromise systems
that operate critical physical infrastructures such as power
grids, water and sewer systems, hospitals, communications,
financial institutions
· Critical data threat: compromise critical computer system to
alter, manipulate, or destroy critical data with potential of
death, destruction, and/or economic turmoil.
· Databases such as Social Security, Centers for Disease Control
(CDC), Department of Defense (DOD)
· Estonia Cyberattacks: (2007) Estonia’s infrastructure was
attacked by unknown individuals or groups focusing on the
nation’s critical databases.
· Numerous DDoS attacks crippled the banks and newspapers,
interrupted government communications
· Social unrest and rioting resulted in 150 injuries
· Iran Stuxnet Cyberattacks: (2010) Unknown entities (US and
Israel) planted a self-replicating malware (worm) into Iran’s
nuclear power plant in Bushehr and its uranium enrichment
facility in Natanz
· Identity Theft and 911 Attacks
· Each of the suicide bombers involved in the 911 attacks had
established fraudulent identities
· Driver’s licenses, stolen credit cards, fictitious or temporary
addresses, social security numbers and fraudulent travel
documents
· FBI Statement: Former FBI Director, Robert Mueller:
technology is moving so rapidly that, from a security
perspective, it is difficult to keep up…in the future, we
anticipate that the cyber threat will pose the number one threat
to our country…. once isolated hackers have joined forces to
form criminal syndicates
III. Organized Crime and Cyber Gangs
· Organized crime is recognizable, monopolistic, self-
perpetuating, hierarchical organization willing to use violence
and the corruption of public officials to engage in both
traditional vice ( gambling, drugs, prostitution) and complex
criminal enterprises which allows investment in legitimate
businesses
· Cyber gangs are groups of individuals brought together
through the medium of the Internet which conspire and/or
commit non-violent criminal acts facilitated by the exploitation
of networked or interconnected systems
· Shadowcrew, Carderplanet, Darkprofits
Computer Forensics and Cyber Crime
CHAPTER
Computer Forensics and Cyber Crime, 3rd ed.
Marjie T. Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and Organized Crime
6
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Learning ObjectivesFully understand the concept of terrorism.
Learn the impact of the Internet on terrorism and organized
crime.
Develop a working knowledge of organized crime.
Gain insight into the future direction of organized crime.
Recognize and understand the contemporary characteristics of
organized crime.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Terrorism
From a governmental perspective, terrorism would involve: All
criminal acts directed against a State...to create a state of terror
in the minds of particular persons or a group of persons or the
general public. (League of Nations Convention, 1937) Criminal
acts intended...to provoke a state of terror...for political
purposes are in any circumstance unjustifiable... (UN
Resolution Language, 1994)The calculated use of unlawful
violence or threat ... to inculcate fear; intended to coerce or to
intimidate governments or societies in the pursuit of goals that
are generally political, religious, or ideological. (U.S.
Department of Defense, 2007)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Terrorism
From an academic perspective, terrorism is: An anxiety-
inspiring method of repeated violent actionEmployed for
idiosyncratic, criminal or political reasonsIn contrast to
assassination, the direct targets of violence are not the main
targetsThe immediate victims are generally chosen randomly or
selectively from a target population, and serve as message
generators Threat- and violence-based communication processes
are used to manipulate the main target, turning it into a target of
terror, demands, or attention, depending on whether
intimidation, coercion, or propaganda is primarily sought
Schmid, Alex P. and Albert J. Jongman, et al. (1988). Political
Terrorism: A New Guide to Actors, Authors, Concepts, DATA
Bases, Theories and Literature (2nd Ed.). North-Holland
Publishing: Amsterdam.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining TerrorismAn attempt to communicate messages
through the use of orchestrated violence.
Tsfati, Yariv and Weimann, Gabriel (2002).
“www.terrorism.com: Terror on the Internet.” Studies in
Conflict and Terrorism, 25: 317–332.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
TerrorismIncludes: An act of violenceThe victimization of
innocentsMethodical or serial operationsAdvance
planningCriminal characterAbsence of moral restraintsPolitical
demandsAttempts to garner attentionPerformed for an
audienceUnpredictability or unexpectednessIntended to instill
fear
Britz, Marjie T. (2013). “The Internet as a Tool for Terrorists:
Implications for Physical and Virtual Worlds.” In Tom Holt
(ed.)
Crime On-Line (2nd Ed). Carolina University Press: Charlotte.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationCan distinguish
among acts of terror by the goals of those committing acts of
violence:
Individual Terrorism can get overlooked due to its often lower
impact, while eschewing group involvement; look at the
Unabomber's crimes and his paranoid rants against technology.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationPolitical-Social
Terrorism is often carried out by those with a political agenda,
often to overthrow an existing government; if successful, they
get called patriots, freedom-fighters, or heroes, as with the
rebelling American colonists or Castro's 26th of July
Movement. Nationalist Terrorism can involve those with a
social commonality or group identification and a collective
perception of oppression, who persist with large memberships
due to persecution, like the IRA, HAMAS, Hezbollah, or the
ETA.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationEnvironmental
Terrorists, also called ecoterrorists, are ideologicaly focused on
conservation of natural resources and animal rights; for
example, the Earth Liberation Front (ELF) and Animal
Liberation Front (ALF).
State-Sponsored Terrorism consists of governments committing
acts of terror against their own citizens, such as in Nazi
Germany or those that support or commit acts of terror against
other governments, like North Korea.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism: Classification through MotivationReligious
Terrorism is perhaps the most virulent, dangerous and
persistent, due to a basis in religious zealotry, among a
continuum of religious organizations, including Christian,
Judaic, and Islamic, among others.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Roots of Contemporary TerrorismThere are many historical
examples of terrorism, from the assassination of Julius Caesar
to tyrannicide committed in Renaissance Italy, Spain, and in
France during the Age of Absolutism.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism as a StagePreplanningScript preparation (goals
identified)Cast selection (who commits the acts)Set creation
(where will this take place)Prop development (could include
means to accomplish goals)Dress rehearsal (to ensure success)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism as a StagePromotion Identification of target audience
(often Western media)(often more important than actual
victims)Selection of appropriate media outlets and placement of
public relations personnel, since emotional, psychological
repercussions are paramount
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Cyberterrorism as a ConceptInstead of a display of physical
catastrophe or suffering, like other forms of terrorism, may
instead emphasize communication, requiring:A transmitter (the
terrorist)A recipient (an audience, who typically are not the
victims)A message (often ideological)A reaction (the desired
impact)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlinePropaganda, information dissemination, recruiting
and fundraising
Categories for justification of committing acts of terror include
that they:Are victims and had “no choice” but to commit these
acts.Vilify their opponent, who has hurt the powerless.Have a
weakness that makes this the only feasible option.May employ
peaceful, nonviolent rhetoric to achieve a settlement.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineTrainingStarted using web-based training like
legitimate organizations, which is cheaper Still use films,
training documents, outlines, and checklists about topics like
building a suicide vest, using surface-to-air missiles, and
creating fraudulent identification
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineResearch and PlanningCritical processes involving
identifying, locating critical information like blueprints or "how
to" manuals (i.e., bomb-making), as well as plotting steps to
take
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineCommunicationEspecially with the Web,
communication can be decentralized, cheaper, more reliable,
and harder to detectCan use electronic dead drops (storing
messages in draft folders on computers with shared access),
steganography (embedded messages), online social networking
sites (like Google's Orkut), and encryption
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror OnlineAttack MechanismCyberattacks attacks can come
as quickly as the attack in Estonia, or more slowly, as when
Stuxnet disabled Iranian centrifuges to produce weapons-grade
uranium
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terror Online
Physical Critical Data
Infra-
structure
Compromise of
a critical system severely affects physical infrastructures
Compromise of
a critical computer system to alter, manipulate, or destroy
critical data, with the potential for death, destruction, or
economic turmoil
Power grids, water/sewer, dams, hospitals, GPS, air traffic
systems, communication, energy pipelines
Social Security, Center for Disease Control, Department of
Defense, etc.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeCriminal Activities Identity theft could
lead to credit card fraud or generation of fraudulent documents,
to generate revenue, and frustrate law enforcement's efforts at
tracking down those planning on committing acts of terror.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeCriminalizing Terrorist ActsBefore the
September 11 attacks, terrorist acts usually consisted of murder,
kidnapping, and hostage-taking.Law enforcement has since
expanded its scope of inquiry.The Department of Homeland
Security has taken lead on this.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeOther Federal agencies have initiated
efforts, such as: Consular Lookout & Support System, State
DepartmentTIPOFF Database (terrorist watch list), State
DepartmentViolent Gang & Terrorist Organization (emphasis on
organized crime), FBIBorder Inspection System, Immigration
and Customs Enforcement (ICE)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Terrorism and CrimeConclusionsAs the Internet facilitates
communication, it makes it easier those who would commit acts
of terror to achieve their goals.Decentralizing infrastructure,
like energy production, may make societies less vulnerable, but
tough in a society that demands greater efficiency and
convenience.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeEspecially transnational Organized Crime (OC)
may flourish in 21st century, in forms such as: Trafficking in
nuclear materialsHuman smugglingIdentity theftOnline criminal
activitiesTransitional, developing nations may provide the
greatest opportunities for organized crime.Those engaging in
organized crime are increasingly turning to technology for
complex, more profitable crimes.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Defining Organized CrimeOften started from marginalized
groups
Historical factors: Arose often in times of economic
hardshipCultural emphasis on masculinityHistorical territorial
rivalriesAdvent of mass unemployment
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeEarly emphasis in this country on Italian
organized crime, La Cosa Nostra.
Definitions have varied, sometimes to advance particular
agendas as: Focusing on institutionalized crime where criminal
societies had systemized tasks and practices, unique traditions,
and distinctive jargon. Chicago Crime Commission
(1915)Criminal syndicates developed because of Prohibition.
Wickersham Commission (1929)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeInvestigating gambling, and finding ethnic
communities housed criminal groups which used a sophisticated
command hierarchy, creating an international conspiracy to
traffick narcotics and contraband. Kefauver Committee (1950s)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeAiming again to stop Italian organized crime,
relied on testimony of former gang member, Joe Valachi, who
talked about rules, recruitment practices, organizational
structure & illegal activities. McClellan Committee (1960s)
Broadly talking about organized crime: "A society that seeks to
operate outside the control of the American people … It
involves thousands of criminals, working within structures as
large as those of any corporation.” President’s Commission on
Law Enforcement (1967)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeLooking at "The unlawful activities of a highly
organized, disciplined association engaged in supplying illegal
goods and services including, but not limited to: gambling,
prostitution, loan sharking, narcotics, labor racketeering, and
other lawful activities." Omnibus Crime Control & Safe
Streets Act (1968)
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized CrimeStructure &
hierarchyViolenceRecognizabilityLongevityRecruitmentInnovat
ive, entrepreneurial, and opportunisticExclusive
membershipStrict rules and
regulationsRitualisticProfitabilityCorruption of political
authoritiesRacketeering and infiltration of legitimate
businessMonopolisticCriminal activity
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized Crime vs. CybergangsA monopolistic, self-
perpetuating, hierarchical organization willing to use violence
and the corruption of public officials to engage in complex
criminal enterprises, which ensures organizational longevity
through ritualistic practices, rules and regulations,
organizational tithing, and investment in legitimate industry.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Cybergangs/Cyber-Criminal OrganizationsGroups of individuals
brought together through the medium of the Internet which
conspire and/or commit non-violent criminal acts facilitated by
the exploitation of networked or interconnected systems.
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Organized Crime and TechnologyExtortionCargo heists and
armed robberyFraud, including bank fraud, ATM/credit card
fraud, and stock fraudMoney launderingThe sex trade
Organized crime exploiting technological advancements to
conduct traditional crimes, including:Confidence scams, such as
the Nigerian 419 letterFencing of stolen propertyData piracy
and counterfeit goodsHuman smuggling
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Confronting Contemporary Organized CrimeWhen confronting
contemporary organized crime, consider:The diversity among
emerging groups, suggesting that more are involvedThe
economic motivation behind hacking, cyber-attacks by
organized crime groupsIncorporating "know your customer"
(KYC) requirements in banking to reduce fraudThat traditional
hacking methods employed by organized crime groups are
innovativeThe convergence of transnational organized crime
and terrorism
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
Confronting Contemporary Organized CrimeThe benefits of
global harmonization of regulation and the development of
mutual legal assistance treaties, including banking/securities &
guidelines for police actionUsing bilateral and multilateral
crime-fighting effortsThe devising of specific strategies for
individual groupsEmpowering local government responses
through an increase in resourcesIncreasing educational efforts,
accountability for e-banking vendors and companies
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Intersection of Organized Crime and TerrorismNote their
similarities:Increasingly sophisticatedEmploy similar
methodologiesUse the web to engage in money launderingUse
the web for communicationMost common where there are
minimal government controls, weak enforcement of law, and
open bordersExploit geographic locales far removed from
control centers of government
Computer Forensics and Cyber Crime, 3rd ed.
Britz
Copyright © 2013 by Pearson Education, Inc.
All Rights Reserved
The Intersection of Organized Crime and TerrorismAlso,
traditional lines are blurred and collaboration is
increasing.Differences:Organized crime is economically
focused, where terrorist groups are ideological.Terrorist groups
plan on replacing the government, while organized crime wants
to corrupt existing government.Organized cirme wants to avoid
publicity, whereas terrorist groups seek it out and thrive on
it.Terrorist groups indiscriminately seek victims, while
organized crime tends to want to limit outsiders.
1
CYBER CRIME
Chapter 6
Objectives
1. Discuss general concept of Terrorism
2. Introduce Cyberterrorism as another method of targeting
victims
3. Provide an understanding of the differences between
Organized Crime and Cyber Gangs
Details
I. Terrorism: Definition
· Act of violence
· Innocent victims
· Methodical operations
· Absence of moral restraints
· Performed for an audience
· Intended to instill fear
Motivations:
· Individual terrorism: act independently, discontented with
society
· Ted Kaczynski: Unabomber
· Political-social terrorism: groups engage to overthrow
established order
· Early American Colonists
· Nationalist terrorism: groups share collective perception of
oppression or persecution
· Palestine Liberation Front, Irish Republican Army
· Environmental terrorism: groups base their ideology on the
conservation of natural resources or animal rights
· Earth Liberation Front (ELF), Stop Huntington Animal Cruelty
(SHAC)
· State sponsored terrorism: two groups of government
offenders, one that commits acts of terror against its own
citizens and the other commits acts of terror against other
governments
· Nazi government targeted Jewish and other groups in Germany
· Cuban, Syrian and Iranian governments target other
governments such as Israel and any other governments that
support Israel, including US and European governments
· Religious terrorism: most prevalent and dangerous, motivated
by religion
· God’s Army (Christian), Jewish Defense League (Judiac), al
Qaeda (Islamic)
II. Cyberterrorism: Definition
· Premeditated, methodological and ideological motivated
· Dissemination of information, facilitation of communication
or attack against digital information, information systems
and/or computer programs
· Requires advanced planning
· Intended to result in social, financial, physical or
psychological harm to civilians
· Terrorist groups have used the Internet to disseminate
propaganda, recruit, train, research and attack targets
· Types of Cyberterrorist Threats
· Physical attacks: involve conventional weapons directed at a
computer facility for transmission lines
· Electronic attacks: electromagnetic energy is employed as a
weapon by inserting malicious code into an enemy microwave
radio transmission
· Computer network attacks: involve malware, computer or
network intrusion, or other cyber attacks on critical computer
systems
· Digital threats to physical infrastructure: compromise systems
that operate critical physical infrastructures such as power
grids, water and sewer systems, hospitals, communications,
financial institutions
· Critical data threat: compromise critical computer system to
alter, manipulate, or destroy critical data with potential of
death, destruction, and/or economic turmoil.
· Databases such as Social Security, Centers for Disease Control
(CDC), Department of Defense (DOD)
· Estonia Cyberattacks: (2007) Estonia’s infrastructure was
attacked by unknown individuals or groups focusing on the
nation’s critical databases.
· Numerous DDoS attacks crippled the banks and newspapers,
interrupted government communications
· Social unrest and rioting resulted in 150 injuries
· Iran Stuxnet Cyberattacks: (2010) Unknown entities (US and
Israel) planted a self-replicating malware (worm) into Iran’s
nuclear power plant in Bushehr and its uranium enrichment
facility in Natanz
· Identity Theft and 911 Attacks
· Each of the suicide bombers involved in the 911 attacks had
established fraudulent identities
· Driver’s licenses, stolen credit cards, fictitious or temporary
addresses, social security numbers and fraudulent travel
documents
· FBI Statement: Former FBI Director, Robert Mueller:
technology is moving so rapidly that, from a security
perspective, it is difficult to keep up…in the future, we
anticipate that the cyber threat will pose the number one threat
to our country…. once isolated hackers have joined forces to
form criminal syndicates
III. Organized Crime and Cyber Gangs
· Organized crime is recognizable, monopolistic, self-
perpetuating, hierarchical organization willing to use violence
and the corruption of public officials to engage in both
traditional vice ( gambling, drugs, prostitution) and complex
criminal enterprises which allows investment in legitimate
businesses
· Cyber gangs are groups of individuals brought together
through the medium of the Internet which conspire and/or
commit non-violent criminal acts facilitated by the exploitation
of networked or interconnected systems
· Shadowcrew, Carderplanet, Darkprofits

More Related Content

Similar to Computer Forensics and Cyber CrimeCHAPTERComputer Fore.docx

Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
mali chum
 
11.terrorism and role of media
11.terrorism and role of media11.terrorism and role of media
11.terrorism and role of media
Alexander Decker
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docx
wlynn1
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
anitramcroberts
 

Similar to Computer Forensics and Cyber CrimeCHAPTERComputer Fore.docx (8)

Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
Privacy and terrorism informatics
Privacy and terrorism informaticsPrivacy and terrorism informatics
Privacy and terrorism informatics
 
11.terrorism and role of media
11.terrorism and role of media11.terrorism and role of media
11.terrorism and role of media
 
Against Torture Essay
Against Torture EssayAgainst Torture Essay
Against Torture Essay
 
Running head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docxRunning head ISOL 534 – Application Security 1Running head.docx
Running head ISOL 534 – Application Security 1Running head.docx
 
Buck pr 522
Buck pr 522Buck pr 522
Buck pr 522
 
Essay On Terrorism In World
Essay On Terrorism In WorldEssay On Terrorism In World
Essay On Terrorism In World
 
Printed by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docxPrinted by [email protected] Printing is for personal, p.docx
Printed by [email protected] Printing is for personal, p.docx
 

More from patricke8

Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docxConcept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
patricke8
 
Concept mapping, mind mapping and argumentmapping what are .docx
Concept mapping, mind mapping and argumentmapping what are .docxConcept mapping, mind mapping and argumentmapping what are .docx
Concept mapping, mind mapping and argumentmapping what are .docx
patricke8
 
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docxCONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
patricke8
 
Computer Security Fundamentalsby Chuck EasttomC.docx
Computer Security Fundamentalsby Chuck EasttomC.docxComputer Security Fundamentalsby Chuck EasttomC.docx
Computer Security Fundamentalsby Chuck EasttomC.docx
patricke8
 
Concept A            The first concept that I appreciated in the.docx
Concept A            The first concept that I appreciated in the.docxConcept A            The first concept that I appreciated in the.docx
Concept A            The first concept that I appreciated in the.docx
patricke8
 
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docxConcept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
patricke8
 
Concentration in the mobile operating systemsmarketMauri.docx
Concentration in the mobile operating systemsmarketMauri.docxConcentration in the mobile operating systemsmarketMauri.docx
Concentration in the mobile operating systemsmarketMauri.docx
patricke8
 
Concentric Literary and Cultural Studies 33.1 March 2007 7.docx
Concentric Literary and Cultural Studies 33.1 March 2007 7.docxConcentric Literary and Cultural Studies 33.1 March 2007 7.docx
Concentric Literary and Cultural Studies 33.1 March 2007 7.docx
patricke8
 
Con Should the United States government have bailed out the a.docx
Con Should the United States government have bailed out the a.docxCon Should the United States government have bailed out the a.docx
Con Should the United States government have bailed out the a.docx
patricke8
 
COMS 101Persuasive Speech InstructionsThis course requires you.docx
COMS 101Persuasive Speech InstructionsThis course requires you.docxCOMS 101Persuasive Speech InstructionsThis course requires you.docx
COMS 101Persuasive Speech InstructionsThis course requires you.docx
patricke8
 
computerweekly.com 10-16 September 2019 21Industry experts.docx
computerweekly.com 10-16 September 2019 21Industry experts.docxcomputerweekly.com 10-16 September 2019 21Industry experts.docx
computerweekly.com 10-16 September 2019 21Industry experts.docx
patricke8
 
Computers in Human Behavior 39 (2014) 387–392Contents lists .docx
Computers in Human Behavior 39 (2014) 387–392Contents lists .docxComputers in Human Behavior 39 (2014) 387–392Contents lists .docx
Computers in Human Behavior 39 (2014) 387–392Contents lists .docx
patricke8
 
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docxComputers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
patricke8
 
Computers are often used to make work easier. However, sometimes c.docx
Computers are often used to make work easier. However, sometimes c.docxComputers are often used to make work easier. However, sometimes c.docx
Computers are often used to make work easier. However, sometimes c.docx
patricke8
 
Computers are part of our everyday lives. You are likely reading thi.docx
Computers are part of our everyday lives. You are likely reading thi.docxComputers are part of our everyday lives. You are likely reading thi.docx
Computers are part of our everyday lives. You are likely reading thi.docx
patricke8
 

More from patricke8 (20)

Concept of collection. Assume that An agency has focused its sys.docx
Concept of collection. Assume that An agency has focused its sys.docxConcept of collection. Assume that An agency has focused its sys.docx
Concept of collection. Assume that An agency has focused its sys.docx
 
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docxConcept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
Concept of AestheticsOVERVIEWAesthetics is defined as an appre.docx
 
Concept mapping, mind mapping and argumentmapping what are .docx
Concept mapping, mind mapping and argumentmapping what are .docxConcept mapping, mind mapping and argumentmapping what are .docx
Concept mapping, mind mapping and argumentmapping what are .docx
 
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docxCONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
CONCEPT MAPPINGMid Term Assignment (Concept Mapping).docx
 
Computer Security Fundamentalsby Chuck EasttomC.docx
Computer Security Fundamentalsby Chuck EasttomC.docxComputer Security Fundamentalsby Chuck EasttomC.docx
Computer Security Fundamentalsby Chuck EasttomC.docx
 
Concept A            The first concept that I appreciated in the.docx
Concept A            The first concept that I appreciated in the.docxConcept A            The first concept that I appreciated in the.docx
Concept A            The first concept that I appreciated in the.docx
 
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docxConcept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
Concept Analysis (1,000 words). Deadline 1300, 11 March 2021. .docx
 
Concentration in the mobile operating systemsmarketMauri.docx
Concentration in the mobile operating systemsmarketMauri.docxConcentration in the mobile operating systemsmarketMauri.docx
Concentration in the mobile operating systemsmarketMauri.docx
 
Concentric Literary and Cultural Studies 33.1 March 2007 7.docx
Concentric Literary and Cultural Studies 33.1 March 2007 7.docxConcentric Literary and Cultural Studies 33.1 March 2007 7.docx
Concentric Literary and Cultural Studies 33.1 March 2007 7.docx
 
Con Should the United States government have bailed out the a.docx
Con Should the United States government have bailed out the a.docxCon Should the United States government have bailed out the a.docx
Con Should the United States government have bailed out the a.docx
 
COMS 101Persuasive Speech InstructionsThis course requires you.docx
COMS 101Persuasive Speech InstructionsThis course requires you.docxCOMS 101Persuasive Speech InstructionsThis course requires you.docx
COMS 101Persuasive Speech InstructionsThis course requires you.docx
 
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docxCOMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
COMS 040 AssignmentStudent Congress Bill Choose an argument a.docx
 
computerweekly.com 10-16 September 2019 21Industry experts.docx
computerweekly.com 10-16 September 2019 21Industry experts.docxcomputerweekly.com 10-16 September 2019 21Industry experts.docx
computerweekly.com 10-16 September 2019 21Industry experts.docx
 
Computers in Human Behavior 39 (2014) 387–392Contents lists .docx
Computers in Human Behavior 39 (2014) 387–392Contents lists .docxComputers in Human Behavior 39 (2014) 387–392Contents lists .docx
Computers in Human Behavior 39 (2014) 387–392Contents lists .docx
 
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docxComputers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
Computers in Human Behavior xxx (2012) xxx–xxxContents lists.docx
 
Computers can be used symbolically to intimidate, deceive or defraud.docx
Computers can be used symbolically to intimidate, deceive or defraud.docxComputers can be used symbolically to intimidate, deceive or defraud.docx
Computers can be used symbolically to intimidate, deceive or defraud.docx
 
Computers are often used to make work easier. However, sometimes c.docx
Computers are often used to make work easier. However, sometimes c.docxComputers are often used to make work easier. However, sometimes c.docx
Computers are often used to make work easier. However, sometimes c.docx
 
Computers are part of our everyday lives. You are likely reading thi.docx
Computers are part of our everyday lives. You are likely reading thi.docxComputers are part of our everyday lives. You are likely reading thi.docx
Computers are part of our everyday lives. You are likely reading thi.docx
 
Computerized Operating Systems (OS) are almost everywhere. We encoun.docx
Computerized Operating Systems (OS) are almost everywhere. We encoun.docxComputerized Operating Systems (OS) are almost everywhere. We encoun.docx
Computerized Operating Systems (OS) are almost everywhere. We encoun.docx
 
Computerized Operating Systems (OS) are almost everywhere. We en.docx
Computerized Operating Systems (OS) are almost everywhere. We en.docxComputerized Operating Systems (OS) are almost everywhere. We en.docx
Computerized Operating Systems (OS) are almost everywhere. We en.docx
 

Recently uploaded

ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
ashishpaul799
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
17thcssbs2
 

Recently uploaded (20)

ppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyesppt your views.ppt your views of your college in your eyes
ppt your views.ppt your views of your college in your eyes
 
Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).Dementia (Alzheimer & vasular dementia).
Dementia (Alzheimer & vasular dementia).
 
An Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptxAn Overview of the Odoo 17 Discuss App.pptx
An Overview of the Odoo 17 Discuss App.pptx
 
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptxslides CapTechTalks Webinar May 2024 Alexander Perry.pptx
slides CapTechTalks Webinar May 2024 Alexander Perry.pptx
 
Essential Safety precautions during monsoon season
Essential Safety precautions during monsoon seasonEssential Safety precautions during monsoon season
Essential Safety precautions during monsoon season
 
“O BEIJO” EM ARTE .
“O BEIJO” EM ARTE                       .“O BEIJO” EM ARTE                       .
“O BEIJO” EM ARTE .
 
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
Exploring Gemini AI and Integration with MuleSoft | MuleSoft Mysore Meetup #45
 
philosophy and it's principles based on the life
philosophy and it's principles based on the lifephilosophy and it's principles based on the life
philosophy and it's principles based on the life
 
factors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptxfactors influencing drug absorption-final-2.pptx
factors influencing drug absorption-final-2.pptx
 
Championnat de France de Tennis de table/
Championnat de France de Tennis de table/Championnat de France de Tennis de table/
Championnat de France de Tennis de table/
 
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General QuizPragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
Pragya Champions Chalice 2024 Prelims & Finals Q/A set, General Quiz
 
Word Stress rules esl .pptx
Word Stress rules esl               .pptxWord Stress rules esl               .pptx
Word Stress rules esl .pptx
 
How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17How to Manage Notification Preferences in the Odoo 17
How to Manage Notification Preferences in the Odoo 17
 
IATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdffIATP How-to Foreign Travel May 2024.pdff
IATP How-to Foreign Travel May 2024.pdff
 
Open Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPointOpen Educational Resources Primer PowerPoint
Open Educational Resources Primer PowerPoint
 
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 2 STEPS Using Odoo 17
 
Behavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdfBehavioral-sciences-dr-mowadat rana (1).pdf
Behavioral-sciences-dr-mowadat rana (1).pdf
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
Operations Management - Book1.p  - Dr. Abdulfatah A. SalemOperations Management - Book1.p  - Dr. Abdulfatah A. Salem
Operations Management - Book1.p - Dr. Abdulfatah A. Salem
 
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
Envelope of Discrepancy in Orthodontics: Enhancing Precision in Treatment
 

Computer Forensics and Cyber CrimeCHAPTERComputer Fore.docx

  • 1. Computer Forensics and Cyber Crime CHAPTER Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism and Organized Crime 6 Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Learning ObjectivesFully understand the concept of terrorism. Learn the impact of the Internet on terrorism and organized crime. Develop a working knowledge of organized crime. Gain insight into the future direction of organized crime. Recognize and understand the contemporary characteristics of organized crime. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc.
  • 2. All Rights Reserved Defining Terrorism From a governmental perspective, terrorism would involve: All criminal acts directed against a State...to create a state of terror in the minds of particular persons or a group of persons or the general public. (League of Nations Convention, 1937) Criminal acts intended...to provoke a state of terror...for political purposes are in any circumstance unjustifiable... (UN Resolution Language, 1994)The calculated use of unlawful violence or threat ... to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. (U.S. Department of Defense, 2007) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Defining Terrorism From an academic perspective, terrorism is: An anxiety- inspiring method of repeated violent actionEmployed for idiosyncratic, criminal or political reasonsIn contrast to assassination, the direct targets of violence are not the main targetsThe immediate victims are generally chosen randomly or selectively from a target population, and serve as message generators Threat- and violence-based communication processes are used to manipulate the main target, turning it into a target of terror, demands, or attention, depending on whether intimidation, coercion, or propaganda is primarily sought Schmid, Alex P. and Albert J. Jongman, et al. (1988). Political Terrorism: A New Guide to Actors, Authors, Concepts, DATA
  • 3. Bases, Theories and Literature (2nd Ed.). North-Holland Publishing: Amsterdam. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Defining TerrorismAn attempt to communicate messages through the use of orchestrated violence. Tsfati, Yariv and Weimann, Gabriel (2002). “www.terrorism.com: Terror on the Internet.” Studies in Conflict and Terrorism, 25: 317–332. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved
  • 4. TerrorismIncludes: An act of violenceThe victimization of innocentsMethodical or serial operationsAdvance planningCriminal characterAbsence of moral restraintsPolitical demandsAttempts to garner attentionPerformed for an audienceUnpredictability or unexpectednessIntended to instill fear Britz, Marjie T. (2013). “The Internet as a Tool for Terrorists: Implications for Physical and Virtual Worlds.” In Tom Holt (ed.) Crime On-Line (2nd Ed). Carolina University Press: Charlotte. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism: Classification through MotivationCan distinguish among acts of terror by the goals of those committing acts of violence: Individual Terrorism can get overlooked due to its often lower impact, while eschewing group involvement; look at the Unabomber's crimes and his paranoid rants against technology. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism: Classification through MotivationPolitical-Social Terrorism is often carried out by those with a political agenda, often to overthrow an existing government; if successful, they
  • 5. get called patriots, freedom-fighters, or heroes, as with the rebelling American colonists or Castro's 26th of July Movement. Nationalist Terrorism can involve those with a social commonality or group identification and a collective perception of oppression, who persist with large memberships due to persecution, like the IRA, HAMAS, Hezbollah, or the ETA. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism: Classification through MotivationEnvironmental Terrorists, also called ecoterrorists, are ideologicaly focused on conservation of natural resources and animal rights; for example, the Earth Liberation Front (ELF) and Animal Liberation Front (ALF). State-Sponsored Terrorism consists of governments committing acts of terror against their own citizens, such as in Nazi Germany or those that support or commit acts of terror against other governments, like North Korea. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism: Classification through MotivationReligious Terrorism is perhaps the most virulent, dangerous and persistent, due to a basis in religious zealotry, among a continuum of religious organizations, including Christian,
  • 6. Judaic, and Islamic, among others. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Roots of Contemporary TerrorismThere are many historical examples of terrorism, from the assassination of Julius Caesar to tyrannicide committed in Renaissance Italy, Spain, and in France during the Age of Absolutism. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism as a StagePreplanningScript preparation (goals identified)Cast selection (who commits the acts)Set creation (where will this take place)Prop development (could include means to accomplish goals)Dress rehearsal (to ensure success) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism as a StagePromotion Identification of target audience (often Western media)(often more important than actual
  • 7. victims)Selection of appropriate media outlets and placement of public relations personnel, since emotional, psychological repercussions are paramount Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Cyberterrorism as a ConceptInstead of a display of physical catastrophe or suffering, like other forms of terrorism, may instead emphasize communication, requiring:A transmitter (the terrorist)A recipient (an audience, who typically are not the victims)A message (often ideological)A reaction (the desired impact) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror OnlinePropaganda, information dissemination, recruiting and fundraising Categories for justification of committing acts of terror include that they:Are victims and had “no choice” but to commit these acts.Vilify their opponent, who has hurt the powerless.Have a weakness that makes this the only feasible option.May employ peaceful, nonviolent rhetoric to achieve a settlement. Computer Forensics and Cyber Crime, 3rd ed. Britz
  • 8. Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror OnlineTrainingStarted using web-based training like legitimate organizations, which is cheaper Still use films, training documents, outlines, and checklists about topics like building a suicide vest, using surface-to-air missiles, and creating fraudulent identification Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror OnlineResearch and PlanningCritical processes involving identifying, locating critical information like blueprints or "how to" manuals (i.e., bomb-making), as well as plotting steps to take Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror OnlineCommunicationEspecially with the Web, communication can be decentralized, cheaper, more reliable, and harder to detectCan use electronic dead drops (storing messages in draft folders on computers with shared access), steganography (embedded messages), online social networking sites (like Google's Orkut), and encryption
  • 9. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror OnlineAttack MechanismCyberattacks attacks can come as quickly as the attack in Estonia, or more slowly, as when Stuxnet disabled Iranian centrifuges to produce weapons-grade uranium Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror Online Physical Critical Data Infra- structure Compromise of a critical system severely affects physical infrastructures Compromise of a critical computer system to alter, manipulate, or destroy critical data, with the potential for death, destruction, or economic turmoil Power grids, water/sewer, dams, hospitals, GPS, air traffic systems, communication, energy pipelines
  • 10. Social Security, Center for Disease Control, Department of Defense, etc. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism and CrimeCriminal Activities Identity theft could lead to credit card fraud or generation of fraudulent documents, to generate revenue, and frustrate law enforcement's efforts at tracking down those planning on committing acts of terror. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism and CrimeCriminalizing Terrorist ActsBefore the September 11 attacks, terrorist acts usually consisted of murder, kidnapping, and hostage-taking.Law enforcement has since expanded its scope of inquiry.The Department of Homeland Security has taken lead on this. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved
  • 11. Terrorism and CrimeOther Federal agencies have initiated efforts, such as: Consular Lookout & Support System, State DepartmentTIPOFF Database (terrorist watch list), State DepartmentViolent Gang & Terrorist Organization (emphasis on organized crime), FBIBorder Inspection System, Immigration and Customs Enforcement (ICE) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism and CrimeConclusionsAs the Internet facilitates communication, it makes it easier those who would commit acts of terror to achieve their goals.Decentralizing infrastructure, like energy production, may make societies less vulnerable, but tough in a society that demands greater efficiency and convenience. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeEspecially transnational Organized Crime (OC) may flourish in 21st century, in forms such as: Trafficking in nuclear materialsHuman smugglingIdentity theftOnline criminal activitiesTransitional, developing nations may provide the greatest opportunities for organized crime.Those engaging in organized crime are increasingly turning to technology for complex, more profitable crimes.
  • 12. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Defining Organized CrimeOften started from marginalized groups Historical factors: Arose often in times of economic hardshipCultural emphasis on masculinityHistorical territorial rivalriesAdvent of mass unemployment Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeEarly emphasis in this country on Italian organized crime, La Cosa Nostra. Definitions have varied, sometimes to advance particular agendas as: Focusing on institutionalized crime where criminal societies had systemized tasks and practices, unique traditions, and distinctive jargon. Chicago Crime Commission (1915)Criminal syndicates developed because of Prohibition. Wickersham Commission (1929) Computer Forensics and Cyber Crime, 3rd ed. Britz
  • 13. Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeInvestigating gambling, and finding ethnic communities housed criminal groups which used a sophisticated command hierarchy, creating an international conspiracy to traffick narcotics and contraband. Kefauver Committee (1950s) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeAiming again to stop Italian organized crime, relied on testimony of former gang member, Joe Valachi, who talked about rules, recruitment practices, organizational structure & illegal activities. McClellan Committee (1960s) Broadly talking about organized crime: "A society that seeks to operate outside the control of the American people … It involves thousands of criminals, working within structures as large as those of any corporation.” President’s Commission on Law Enforcement (1967) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeLooking at "The unlawful activities of a highly organized, disciplined association engaged in supplying illegal goods and services including, but not limited to: gambling,
  • 14. prostitution, loan sharking, narcotics, labor racketeering, and other lawful activities." Omnibus Crime Control & Safe Streets Act (1968) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeStructure & hierarchyViolenceRecognizabilityLongevityRecruitmentInnovat ive, entrepreneurial, and opportunisticExclusive membershipStrict rules and regulationsRitualisticProfitabilityCorruption of political authoritiesRacketeering and infiltration of legitimate businessMonopolisticCriminal activity Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized Crime vs. CybergangsA monopolistic, self- perpetuating, hierarchical organization willing to use violence and the corruption of public officials to engage in complex criminal enterprises, which ensures organizational longevity through ritualistic practices, rules and regulations, organizational tithing, and investment in legitimate industry.
  • 15. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Cybergangs/Cyber-Criminal OrganizationsGroups of individuals brought together through the medium of the Internet which conspire and/or commit non-violent criminal acts facilitated by the exploitation of networked or interconnected systems. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized Crime and TechnologyExtortionCargo heists and armed robberyFraud, including bank fraud, ATM/credit card fraud, and stock fraudMoney launderingThe sex trade Organized crime exploiting technological advancements to conduct traditional crimes, including:Confidence scams, such as the Nigerian 419 letterFencing of stolen propertyData piracy and counterfeit goodsHuman smuggling Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Confronting Contemporary Organized CrimeWhen confronting contemporary organized crime, consider:The diversity among emerging groups, suggesting that more are involvedThe
  • 16. economic motivation behind hacking, cyber-attacks by organized crime groupsIncorporating "know your customer" (KYC) requirements in banking to reduce fraudThat traditional hacking methods employed by organized crime groups are innovativeThe convergence of transnational organized crime and terrorism Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Confronting Contemporary Organized CrimeThe benefits of global harmonization of regulation and the development of mutual legal assistance treaties, including banking/securities & guidelines for police actionUsing bilateral and multilateral crime-fighting effortsThe devising of specific strategies for individual groupsEmpowering local government responses through an increase in resourcesIncreasing educational efforts, accountability for e-banking vendors and companies Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Intersection of Organized Crime and TerrorismNote their similarities:Increasingly sophisticatedEmploy similar methodologiesUse the web to engage in money launderingUse the web for communicationMost common where there are minimal government controls, weak enforcement of law, and open bordersExploit geographic locales far removed from
  • 17. control centers of government Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Intersection of Organized Crime and TerrorismAlso, traditional lines are blurred and collaboration is increasing.Differences:Organized crime is economically focused, where terrorist groups are ideological.Terrorist groups plan on replacing the government, while organized crime wants to corrupt existing government.Organized cirme wants to avoid publicity, whereas terrorist groups seek it out and thrive on it.Terrorist groups indiscriminately seek victims, while organized crime tends to want to limit outsiders. 1 CYBER CRIME Chapter 6 Objectives 1. Discuss general concept of Terrorism 2. Introduce Cyberterrorism as another method of targeting victims 3. Provide an understanding of the differences between Organized Crime and Cyber Gangs Details I. Terrorism: Definition · Act of violence · Innocent victims
  • 18. · Methodical operations · Absence of moral restraints · Performed for an audience · Intended to instill fear Motivations: · Individual terrorism: act independently, discontented with society · Ted Kaczynski: Unabomber · Political-social terrorism: groups engage to overthrow established order · Early American Colonists · Nationalist terrorism: groups share collective perception of oppression or persecution · Palestine Liberation Front, Irish Republican Army · Environmental terrorism: groups base their ideology on the conservation of natural resources or animal rights · Earth Liberation Front (ELF), Stop Huntington Animal Cruelty (SHAC) · State sponsored terrorism: two groups of government offenders, one that commits acts of terror against its own citizens and the other commits acts of terror against other governments · Nazi government targeted Jewish and other groups in Germany · Cuban, Syrian and Iranian governments target other governments such as Israel and any other governments that support Israel, including US and European governments
  • 19. · Religious terrorism: most prevalent and dangerous, motivated by religion · God’s Army (Christian), Jewish Defense League (Judiac), al Qaeda (Islamic) II. Cyberterrorism: Definition · Premeditated, methodological and ideological motivated · Dissemination of information, facilitation of communication or attack against digital information, information systems and/or computer programs · Requires advanced planning · Intended to result in social, financial, physical or psychological harm to civilians · Terrorist groups have used the Internet to disseminate propaganda, recruit, train, research and attack targets · Types of Cyberterrorist Threats · Physical attacks: involve conventional weapons directed at a computer facility for transmission lines · Electronic attacks: electromagnetic energy is employed as a weapon by inserting malicious code into an enemy microwave radio transmission · Computer network attacks: involve malware, computer or network intrusion, or other cyber attacks on critical computer systems · Digital threats to physical infrastructure: compromise systems that operate critical physical infrastructures such as power grids, water and sewer systems, hospitals, communications,
  • 20. financial institutions · Critical data threat: compromise critical computer system to alter, manipulate, or destroy critical data with potential of death, destruction, and/or economic turmoil. · Databases such as Social Security, Centers for Disease Control (CDC), Department of Defense (DOD) · Estonia Cyberattacks: (2007) Estonia’s infrastructure was attacked by unknown individuals or groups focusing on the nation’s critical databases. · Numerous DDoS attacks crippled the banks and newspapers, interrupted government communications · Social unrest and rioting resulted in 150 injuries · Iran Stuxnet Cyberattacks: (2010) Unknown entities (US and Israel) planted a self-replicating malware (worm) into Iran’s nuclear power plant in Bushehr and its uranium enrichment facility in Natanz · Identity Theft and 911 Attacks · Each of the suicide bombers involved in the 911 attacks had established fraudulent identities · Driver’s licenses, stolen credit cards, fictitious or temporary addresses, social security numbers and fraudulent travel documents · FBI Statement: Former FBI Director, Robert Mueller: technology is moving so rapidly that, from a security perspective, it is difficult to keep up…in the future, we anticipate that the cyber threat will pose the number one threat to our country…. once isolated hackers have joined forces to form criminal syndicates III. Organized Crime and Cyber Gangs
  • 21. · Organized crime is recognizable, monopolistic, self- perpetuating, hierarchical organization willing to use violence and the corruption of public officials to engage in both traditional vice ( gambling, drugs, prostitution) and complex criminal enterprises which allows investment in legitimate businesses · Cyber gangs are groups of individuals brought together through the medium of the Internet which conspire and/or commit non-violent criminal acts facilitated by the exploitation of networked or interconnected systems · Shadowcrew, Carderplanet, Darkprofits Computer Forensics and Cyber Crime CHAPTER Computer Forensics and Cyber Crime, 3rd ed. Marjie T. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism and Organized Crime 6 Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved
  • 22. Learning ObjectivesFully understand the concept of terrorism. Learn the impact of the Internet on terrorism and organized crime. Develop a working knowledge of organized crime. Gain insight into the future direction of organized crime. Recognize and understand the contemporary characteristics of organized crime. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Defining Terrorism From a governmental perspective, terrorism would involve: All criminal acts directed against a State...to create a state of terror in the minds of particular persons or a group of persons or the general public. (League of Nations Convention, 1937) Criminal acts intended...to provoke a state of terror...for political purposes are in any circumstance unjustifiable... (UN Resolution Language, 1994)The calculated use of unlawful violence or threat ... to inculcate fear; intended to coerce or to intimidate governments or societies in the pursuit of goals that are generally political, religious, or ideological. (U.S. Department of Defense, 2007) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Defining Terrorism
  • 23. From an academic perspective, terrorism is: An anxiety- inspiring method of repeated violent actionEmployed for idiosyncratic, criminal or political reasonsIn contrast to assassination, the direct targets of violence are not the main targetsThe immediate victims are generally chosen randomly or selectively from a target population, and serve as message generators Threat- and violence-based communication processes are used to manipulate the main target, turning it into a target of terror, demands, or attention, depending on whether intimidation, coercion, or propaganda is primarily sought Schmid, Alex P. and Albert J. Jongman, et al. (1988). Political Terrorism: A New Guide to Actors, Authors, Concepts, DATA Bases, Theories and Literature (2nd Ed.). North-Holland Publishing: Amsterdam. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Defining TerrorismAn attempt to communicate messages through the use of orchestrated violence.
  • 24. Tsfati, Yariv and Weimann, Gabriel (2002). “www.terrorism.com: Terror on the Internet.” Studies in Conflict and Terrorism, 25: 317–332. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved TerrorismIncludes: An act of violenceThe victimization of innocentsMethodical or serial operationsAdvance planningCriminal characterAbsence of moral restraintsPolitical demandsAttempts to garner attentionPerformed for an audienceUnpredictability or unexpectednessIntended to instill fear Britz, Marjie T. (2013). “The Internet as a Tool for Terrorists: Implications for Physical and Virtual Worlds.” In Tom Holt (ed.) Crime On-Line (2nd Ed). Carolina University Press: Charlotte. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism: Classification through MotivationCan distinguish among acts of terror by the goals of those committing acts of violence: Individual Terrorism can get overlooked due to its often lower
  • 25. impact, while eschewing group involvement; look at the Unabomber's crimes and his paranoid rants against technology. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism: Classification through MotivationPolitical-Social Terrorism is often carried out by those with a political agenda, often to overthrow an existing government; if successful, they get called patriots, freedom-fighters, or heroes, as with the rebelling American colonists or Castro's 26th of July Movement. Nationalist Terrorism can involve those with a social commonality or group identification and a collective perception of oppression, who persist with large memberships due to persecution, like the IRA, HAMAS, Hezbollah, or the ETA. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism: Classification through MotivationEnvironmental Terrorists, also called ecoterrorists, are ideologicaly focused on conservation of natural resources and animal rights; for example, the Earth Liberation Front (ELF) and Animal Liberation Front (ALF). State-Sponsored Terrorism consists of governments committing acts of terror against their own citizens, such as in Nazi Germany or those that support or commit acts of terror against
  • 26. other governments, like North Korea. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism: Classification through MotivationReligious Terrorism is perhaps the most virulent, dangerous and persistent, due to a basis in religious zealotry, among a continuum of religious organizations, including Christian, Judaic, and Islamic, among others. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Roots of Contemporary TerrorismThere are many historical examples of terrorism, from the assassination of Julius Caesar to tyrannicide committed in Renaissance Italy, Spain, and in France during the Age of Absolutism. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism as a StagePreplanningScript preparation (goals
  • 27. identified)Cast selection (who commits the acts)Set creation (where will this take place)Prop development (could include means to accomplish goals)Dress rehearsal (to ensure success) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism as a StagePromotion Identification of target audience (often Western media)(often more important than actual victims)Selection of appropriate media outlets and placement of public relations personnel, since emotional, psychological repercussions are paramount Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Cyberterrorism as a ConceptInstead of a display of physical catastrophe or suffering, like other forms of terrorism, may instead emphasize communication, requiring:A transmitter (the terrorist)A recipient (an audience, who typically are not the victims)A message (often ideological)A reaction (the desired impact) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc.
  • 28. All Rights Reserved Terror OnlinePropaganda, information dissemination, recruiting and fundraising Categories for justification of committing acts of terror include that they:Are victims and had “no choice” but to commit these acts.Vilify their opponent, who has hurt the powerless.Have a weakness that makes this the only feasible option.May employ peaceful, nonviolent rhetoric to achieve a settlement. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror OnlineTrainingStarted using web-based training like legitimate organizations, which is cheaper Still use films, training documents, outlines, and checklists about topics like building a suicide vest, using surface-to-air missiles, and creating fraudulent identification Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror OnlineResearch and PlanningCritical processes involving identifying, locating critical information like blueprints or "how to" manuals (i.e., bomb-making), as well as plotting steps to take
  • 29. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror OnlineCommunicationEspecially with the Web, communication can be decentralized, cheaper, more reliable, and harder to detectCan use electronic dead drops (storing messages in draft folders on computers with shared access), steganography (embedded messages), online social networking sites (like Google's Orkut), and encryption Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror OnlineAttack MechanismCyberattacks attacks can come as quickly as the attack in Estonia, or more slowly, as when Stuxnet disabled Iranian centrifuges to produce weapons-grade uranium Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terror Online Physical Critical Data
  • 30. Infra- structure Compromise of a critical system severely affects physical infrastructures Compromise of a critical computer system to alter, manipulate, or destroy critical data, with the potential for death, destruction, or economic turmoil Power grids, water/sewer, dams, hospitals, GPS, air traffic systems, communication, energy pipelines Social Security, Center for Disease Control, Department of Defense, etc. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism and CrimeCriminal Activities Identity theft could lead to credit card fraud or generation of fraudulent documents, to generate revenue, and frustrate law enforcement's efforts at tracking down those planning on committing acts of terror. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved
  • 31. Terrorism and CrimeCriminalizing Terrorist ActsBefore the September 11 attacks, terrorist acts usually consisted of murder, kidnapping, and hostage-taking.Law enforcement has since expanded its scope of inquiry.The Department of Homeland Security has taken lead on this. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism and CrimeOther Federal agencies have initiated efforts, such as: Consular Lookout & Support System, State DepartmentTIPOFF Database (terrorist watch list), State DepartmentViolent Gang & Terrorist Organization (emphasis on organized crime), FBIBorder Inspection System, Immigration and Customs Enforcement (ICE) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Terrorism and CrimeConclusionsAs the Internet facilitates communication, it makes it easier those who would commit acts of terror to achieve their goals.Decentralizing infrastructure, like energy production, may make societies less vulnerable, but tough in a society that demands greater efficiency and convenience.
  • 32. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeEspecially transnational Organized Crime (OC) may flourish in 21st century, in forms such as: Trafficking in nuclear materialsHuman smugglingIdentity theftOnline criminal activitiesTransitional, developing nations may provide the greatest opportunities for organized crime.Those engaging in organized crime are increasingly turning to technology for complex, more profitable crimes. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Defining Organized CrimeOften started from marginalized groups Historical factors: Arose often in times of economic hardshipCultural emphasis on masculinityHistorical territorial rivalriesAdvent of mass unemployment Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved
  • 33. Organized CrimeEarly emphasis in this country on Italian organized crime, La Cosa Nostra. Definitions have varied, sometimes to advance particular agendas as: Focusing on institutionalized crime where criminal societies had systemized tasks and practices, unique traditions, and distinctive jargon. Chicago Crime Commission (1915)Criminal syndicates developed because of Prohibition. Wickersham Commission (1929) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeInvestigating gambling, and finding ethnic communities housed criminal groups which used a sophisticated command hierarchy, creating an international conspiracy to traffick narcotics and contraband. Kefauver Committee (1950s) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeAiming again to stop Italian organized crime, relied on testimony of former gang member, Joe Valachi, who talked about rules, recruitment practices, organizational structure & illegal activities. McClellan Committee (1960s) Broadly talking about organized crime: "A society that seeks to operate outside the control of the American people … It involves thousands of criminals, working within structures as
  • 34. large as those of any corporation.” President’s Commission on Law Enforcement (1967) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeLooking at "The unlawful activities of a highly organized, disciplined association engaged in supplying illegal goods and services including, but not limited to: gambling, prostitution, loan sharking, narcotics, labor racketeering, and other lawful activities." Omnibus Crime Control & Safe Streets Act (1968) Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized CrimeStructure & hierarchyViolenceRecognizabilityLongevityRecruitmentInnovat ive, entrepreneurial, and opportunisticExclusive membershipStrict rules and regulationsRitualisticProfitabilityCorruption of political authoritiesRacketeering and infiltration of legitimate businessMonopolisticCriminal activity Computer Forensics and Cyber Crime, 3rd ed. Britz
  • 35. Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized Crime vs. CybergangsA monopolistic, self- perpetuating, hierarchical organization willing to use violence and the corruption of public officials to engage in complex criminal enterprises, which ensures organizational longevity through ritualistic practices, rules and regulations, organizational tithing, and investment in legitimate industry. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Cybergangs/Cyber-Criminal OrganizationsGroups of individuals brought together through the medium of the Internet which conspire and/or commit non-violent criminal acts facilitated by the exploitation of networked or interconnected systems. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Organized Crime and TechnologyExtortionCargo heists and armed robberyFraud, including bank fraud, ATM/credit card fraud, and stock fraudMoney launderingThe sex trade Organized crime exploiting technological advancements to conduct traditional crimes, including:Confidence scams, such as
  • 36. the Nigerian 419 letterFencing of stolen propertyData piracy and counterfeit goodsHuman smuggling Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Confronting Contemporary Organized CrimeWhen confronting contemporary organized crime, consider:The diversity among emerging groups, suggesting that more are involvedThe economic motivation behind hacking, cyber-attacks by organized crime groupsIncorporating "know your customer" (KYC) requirements in banking to reduce fraudThat traditional hacking methods employed by organized crime groups are innovativeThe convergence of transnational organized crime and terrorism Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved Confronting Contemporary Organized CrimeThe benefits of global harmonization of regulation and the development of mutual legal assistance treaties, including banking/securities & guidelines for police actionUsing bilateral and multilateral crime-fighting effortsThe devising of specific strategies for individual groupsEmpowering local government responses through an increase in resourcesIncreasing educational efforts, accountability for e-banking vendors and companies
  • 37. Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Intersection of Organized Crime and TerrorismNote their similarities:Increasingly sophisticatedEmploy similar methodologiesUse the web to engage in money launderingUse the web for communicationMost common where there are minimal government controls, weak enforcement of law, and open bordersExploit geographic locales far removed from control centers of government Computer Forensics and Cyber Crime, 3rd ed. Britz Copyright © 2013 by Pearson Education, Inc. All Rights Reserved The Intersection of Organized Crime and TerrorismAlso, traditional lines are blurred and collaboration is increasing.Differences:Organized crime is economically focused, where terrorist groups are ideological.Terrorist groups plan on replacing the government, while organized crime wants to corrupt existing government.Organized cirme wants to avoid publicity, whereas terrorist groups seek it out and thrive on it.Terrorist groups indiscriminately seek victims, while organized crime tends to want to limit outsiders. 1 CYBER CRIME Chapter 6
  • 38. Objectives 1. Discuss general concept of Terrorism 2. Introduce Cyberterrorism as another method of targeting victims 3. Provide an understanding of the differences between Organized Crime and Cyber Gangs Details I. Terrorism: Definition · Act of violence · Innocent victims · Methodical operations · Absence of moral restraints · Performed for an audience · Intended to instill fear Motivations: · Individual terrorism: act independently, discontented with society · Ted Kaczynski: Unabomber · Political-social terrorism: groups engage to overthrow established order · Early American Colonists · Nationalist terrorism: groups share collective perception of oppression or persecution · Palestine Liberation Front, Irish Republican Army · Environmental terrorism: groups base their ideology on the
  • 39. conservation of natural resources or animal rights · Earth Liberation Front (ELF), Stop Huntington Animal Cruelty (SHAC) · State sponsored terrorism: two groups of government offenders, one that commits acts of terror against its own citizens and the other commits acts of terror against other governments · Nazi government targeted Jewish and other groups in Germany · Cuban, Syrian and Iranian governments target other governments such as Israel and any other governments that support Israel, including US and European governments · Religious terrorism: most prevalent and dangerous, motivated by religion · God’s Army (Christian), Jewish Defense League (Judiac), al Qaeda (Islamic) II. Cyberterrorism: Definition · Premeditated, methodological and ideological motivated · Dissemination of information, facilitation of communication or attack against digital information, information systems and/or computer programs · Requires advanced planning · Intended to result in social, financial, physical or psychological harm to civilians · Terrorist groups have used the Internet to disseminate propaganda, recruit, train, research and attack targets · Types of Cyberterrorist Threats
  • 40. · Physical attacks: involve conventional weapons directed at a computer facility for transmission lines · Electronic attacks: electromagnetic energy is employed as a weapon by inserting malicious code into an enemy microwave radio transmission · Computer network attacks: involve malware, computer or network intrusion, or other cyber attacks on critical computer systems · Digital threats to physical infrastructure: compromise systems that operate critical physical infrastructures such as power grids, water and sewer systems, hospitals, communications, financial institutions · Critical data threat: compromise critical computer system to alter, manipulate, or destroy critical data with potential of death, destruction, and/or economic turmoil. · Databases such as Social Security, Centers for Disease Control (CDC), Department of Defense (DOD) · Estonia Cyberattacks: (2007) Estonia’s infrastructure was attacked by unknown individuals or groups focusing on the nation’s critical databases. · Numerous DDoS attacks crippled the banks and newspapers, interrupted government communications · Social unrest and rioting resulted in 150 injuries · Iran Stuxnet Cyberattacks: (2010) Unknown entities (US and Israel) planted a self-replicating malware (worm) into Iran’s nuclear power plant in Bushehr and its uranium enrichment facility in Natanz · Identity Theft and 911 Attacks
  • 41. · Each of the suicide bombers involved in the 911 attacks had established fraudulent identities · Driver’s licenses, stolen credit cards, fictitious or temporary addresses, social security numbers and fraudulent travel documents · FBI Statement: Former FBI Director, Robert Mueller: technology is moving so rapidly that, from a security perspective, it is difficult to keep up…in the future, we anticipate that the cyber threat will pose the number one threat to our country…. once isolated hackers have joined forces to form criminal syndicates III. Organized Crime and Cyber Gangs · Organized crime is recognizable, monopolistic, self- perpetuating, hierarchical organization willing to use violence and the corruption of public officials to engage in both traditional vice ( gambling, drugs, prostitution) and complex criminal enterprises which allows investment in legitimate businesses · Cyber gangs are groups of individuals brought together through the medium of the Internet which conspire and/or commit non-violent criminal acts facilitated by the exploitation of networked or interconnected systems · Shadowcrew, Carderplanet, Darkprofits