SlideShare a Scribd company logo
1 of 19
Cyber Crime – “Is the
Internet the new “Wild
     Wild West?”
   Prepared for the Southern Massachusetts
            E-Commerce Network
                  Nov 5 2004
                      by
                 Suzanne Mello
           www.suzannemello.com
In the News…….
1 out of 5 children received a
sexual solicitation or approach
over the Internet in a one-year
period of time (
www.missingchildren.com)

California warns of massive ID
theft – personal data stolen from
computers at University of
California, Berkeley (Oct 21, 2004
IDG news service)

Microsoft and Cisco announced a
new initiative to work together to
increase internet security
(Oct 18, 2004 www.cnetnews.com
)



                       E-Commerce Network - Suzanne Mello - Nov 5 2004
The New Wild Wild West
More cyber criminals than
cyber cops
Criminals feel “safe”
committing crimes from
the privacy of their own
homes
Brand new challenges
facing law enforcement
   Most not trained in the
    technologies
   Internet crimes span
    multiple jurisdictions
   Need to retrofit new crimes
    to existing laws
                     E-Commerce Network - Suzanne Mello - Nov 5 2004
Computer Crime
Computer used to commit
a crime
   Child porn, threatening
    email, assuming
    someone’s identity, sexual
    harassment, defamation,
    spam, phishing


Computer as a target of a
crime
   Viruses, worms, industrial
    espionage, software piracy,
    hacking         E-Commerce Network - Suzanne Mello   - Nov 5 2004
Computer Forensics
What is it?
    an autopsy of a computer or network to
     uncover digital evidence of a crime
    Evidence must be preserved and hold up
     in a court of law

Growing field – Many becoming
computer forensic savvy
    FBI, State and Local Police, IRS,
     Homeland Security
    Defense attorneys, judges and
     prosecutors
    Independent security agencies
    White hat or Ethical Hackers
    Programs offered at major universities
     such as URI
      http://homepage.cs.uri.edu/faculty/wolfe/cf


                         E-Commerce Network - Suzanne Mello - Nov 5 2004
Uncovering Digital Evidence
Smart Criminals don’t use their
  own computers

  Floppy disks
  Zip/Jazz disks
  Tapes
  Digital cameras
  Memory sticks
  Printers
  CDs
  PDAs
  Game boxes
  Networks
  Hard drives


                     E-Commerce Network - Suzanne Mello - Nov 5 2004
Digital Evidence
      Not obvious…….it’s most likely hidden on purpose
      or needs to be unearthed by forensics experts

Criminals Hide Evidence                    Forensics Uncover Evidence
  Delete their files and emails                 Restore deleted files and emails –
                                                they are still really there!

  Hide their files by encryption,               Find the hidden files through
  password protection, or                       complex password, encryption
  embedding them in unrelated                   programs, and searching
  files (dll, os etc)                           techniques

  Use Wi-Fi networks and cyber                  Track them down through the
  cafes to cover their tracks                   digital trail - IP addresses to ISPs
                                                to the offender


                      E-Commerce Network - Suzanne Mello - Nov 5 2004
The Crime Scene
                      (with Computer Forensics)
    Similar to traditional crime scenes

      Must acquire the evidence while
       preserving the integrity of the
       evidence
           No damage during collection,
           transportation, or storage
           Document everything
           Collect everything the first time
      Establish a chain of custody

    But also different…….

      Can perform analysis of evidence on
       exact copy!
      Make many copies and investigate
       them without touching original
      Can use time stamping/hash code
       techniques to prove evidence hasn’t
       been compromised


                            E-Commerce Network - Suzanne Mello - Nov 5 2004
Top Cyber Crimes that
   Attack Business
                 Spam
            Viruses/Worms
  Industrial Espionage and Hackers
          Wi-Fi High Jacking
Spam
“Spam accounts for 9 out of every 10
   emails in the United States.”
            MessageLabs, Inc., an email management
              and security company based in New
              York.


“We do not object to the use of this slang
  term to describe UCE (unsolicited
  commercial email), although we do
  object to the use of the word “spam” as
  a trademark and the use of our product
  image in association with that term”
                www.hormel.com




                          E-Commerce Network - Suzanne Mello - Nov 5 2004
Can-Spam Act of 2003
Controlling the Assault of Non-Solicited Pornography and Marketing
Act (Can-Spam)
Signed into law by President Bush on Dec 16, 2003
    Took effect Jan 1, 2004

Unsolicited commercial email must:
    Be labeled
    Include Opt-Out instructions
    No false headers

FTC is authorized (but not required) to establish a “do-not-email”
registry

www.spamlaws.com –lists all the latest in federal, state, and
international laws


                       E-Commerce Network - Suzanne Mello - Nov 5 2004
Spam is Hostile
You pay for Spam, not Spammers
    Email costs are paid by email
     recipients
Spam can be dangerous
    Never click on the opt-out link!
         May take you to hostile web site
         where mouse-over downloads
         an .exe
    Tells spammers they found a
     working address
    They won’t take you off the list
     anyway
What should you do?
    Filter it out whenever possible
    Keep filters up to date
    If you get it, just delete the email

                                 Suzanne Mello - Nov 5 2004
Viruses and Worms
Different types of “ailments”
Viruses
    software that piggybacks on
     other software and runs when
     you run something else
    Macro in excel, word
         Transmitted through sharing
         programs on bulletin boards
         Passing around floppy disks
    An .exe, .com file in your email
Worms
    software that uses computer
     networks to find security holes
     to get in to your computer –
     usually in Microsoft OS!! But
     worm for MAC was recently
     written
                         E-Commerce Network - Suzanne Mello - Nov 5 2004
Hackers are Everywhere
Stealing data
    Industrial Espionage
    Identity theft
    Defamation
Deleting data for fun
    A lot of bored 16 year olds late at
     night                                                            Mafia Boy
Turning computers into zombies
    To commit crimes
    Take down networks
    Distribute porn
    Harass someone
Ethical/white hat hackers exist too
    Help break into networks to
     prevent crimes




                            E-Commerce Network - Suzanne Mello - Nov 5 2004
Wireless Fidelity (Wi-Fi)
Using antennas to create “hot spots”
Hotspots – Internet Access (sometimes free)
   Newport Harbor - All the boats in Harbor have internet access
   San Francisco Giants Stadium – Surf the web while catching a
    game
   UMass (need to register, but it’s free)
   Cambridge, MA
   Philadelphia, PA – just announced – entire city by 2006




                    E-Commerce Network - Suzanne Mello - Nov 5 2004
Wi-Fi High Jacking
60-70% wireless networks are wide open

Why are the Wi-Fi networks unprotected?
     Most people say “Our data is boring”
     But… criminals look for wireless networks to commit
      their crimes
     And… the authorities will come knocking on your
      door…..



                   E-Commerce Network - Suzanne Mello - Nov 5 2004
Protect your Computers!
Use anti-virus software and                    Don't share access to your
firewalls - keep them up to date               computers with strangers

Keep your operating system up to               If you have a wi-fi network,
date with critical security updates            password protect it
and patches
                                               Disconnect from the Internet
Don't open emails or attachments               when not in use
from unknown sources
                                               Reevaluate your security on a
Use hard-to-guess passwords.                   regular basis
Don’t use words found in a
dictionary. Remember that
password cracking tools exist                  Make sure your employees and
                                               family members know this info
                                               too!
Back-up your computer data on
disks or CDs often


                       E-Commerce Network - Suzanne Mello - Nov 5 2004
Thank you!
Web sites of Interest
http://homepage.cs.uri.edu/faculty/wolfe/cf
www.missingchildren.com
www.spamlaws.com
www.netsmartz.org
http://www.ifccfbi.gov - operation web snare – latest
cyber crimes to be aware of
http://www.dcfl.gov/dc3/home.htm
http://www.cops.org/




                 E-Commerce Network - Suzanne Mello - Nov 5 2004

More Related Content

What's hot

Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hackingmsolis0710
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxanbersattar
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxanbersattar
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!Wayne Norris
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxanbersattar
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?Jerric Lyns John
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacyJoy Chakraborty
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII studentsAkiumi Hasegawa
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesJayakumar PP
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation Ajith Reddy
 

What's hot (19)

Powerpoint
PowerpointPowerpoint
Powerpoint
 
Sit presentation - Hacking
Sit presentation - HackingSit presentation - Hacking
Sit presentation - Hacking
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Information-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptxInformation-Security-Lecture-5.pptx
Information-Security-Lecture-5.pptx
 
Information-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptxInformation-Security-Lecture-4.pptx
Information-Security-Lecture-4.pptx
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
Say NO to Piracy
Say NO to PiracySay NO to Piracy
Say NO to Piracy
 
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
TheInternetOfEvidence(tm)-LittleBrotherIsWatchingYou-AndHe'sTakingNotes!
 
Information-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptxInformation-Security-Lecture-7.pptx
Information-Security-Lecture-7.pptx
 
How private is your privacy?
How private is your privacy?How private is your privacy?
How private is your privacy?
 
File000145
File000145File000145
File000145
 
Information security and privacy
Information security and privacyInformation security and privacy
Information security and privacy
 
Piracy
PiracyPiracy
Piracy
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Lecture about network and host security to NII students
Lecture about network and host security to NII studentsLecture about network and host security to NII students
Lecture about network and host security to NII students
 
Cyber Space Threats and Opportunities
Cyber Space Threats and OpportunitiesCyber Space Threats and Opportunities
Cyber Space Threats and Opportunities
 
Hacking presentation
Hacking presentation Hacking presentation
Hacking presentation
 
Hacking
HackingHacking
Hacking
 

Similar to Cybercrime

Similar to Cybercrime (20)

Cybercrimeg
CybercrimegCybercrimeg
Cybercrimeg
 
Information Technology - System Threats
Information Technology - System ThreatsInformation Technology - System Threats
Information Technology - System Threats
 
Rules of Netiquette
 Rules of Netiquette Rules of Netiquette
Rules of Netiquette
 
Computer safety
Computer safetyComputer safety
Computer safety
 
cyber crime and security
cyber crime and securitycyber crime and security
cyber crime and security
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Internet safety
Internet safetyInternet safety
Internet safety
 
4598 cybercrime
4598 cybercrime4598 cybercrime
4598 cybercrime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing & spamming
Phishing & spammingPhishing & spamming
Phishing & spamming
 
Seminar
SeminarSeminar
Seminar
 
N.sai kiran IIITA AP
N.sai kiran IIITA APN.sai kiran IIITA AP
N.sai kiran IIITA AP
 
A to z of Cyber Crime
A to z of Cyber CrimeA to z of Cyber Crime
A to z of Cyber Crime
 
Information security
Information securityInformation security
Information security
 
Lesson 2 Rules of Netiquette
Lesson 2   Rules of NetiquetteLesson 2   Rules of Netiquette
Lesson 2 Rules of Netiquette
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Microsoft protect ppt_ms_final
Microsoft protect ppt_ms_finalMicrosoft protect ppt_ms_final
Microsoft protect ppt_ms_final
 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
 
Cyber Crime PPT
Cyber Crime PPTCyber Crime PPT
Cyber Crime PPT
 
Cybercrime 1
Cybercrime 1Cybercrime 1
Cybercrime 1
 

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 

Cybercrime

  • 1. Cyber Crime – “Is the Internet the new “Wild Wild West?” Prepared for the Southern Massachusetts E-Commerce Network Nov 5 2004 by Suzanne Mello www.suzannemello.com
  • 2. In the News……. 1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time ( www.missingchildren.com) California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com ) E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 3. The New Wild Wild West More cyber criminals than cyber cops Criminals feel “safe” committing crimes from the privacy of their own homes Brand new challenges facing law enforcement  Most not trained in the technologies  Internet crimes span multiple jurisdictions  Need to retrofit new crimes to existing laws E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 4. Computer Crime Computer used to commit a crime  Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing Computer as a target of a crime  Viruses, worms, industrial espionage, software piracy, hacking E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 5. Computer Forensics What is it?  an autopsy of a computer or network to uncover digital evidence of a crime  Evidence must be preserved and hold up in a court of law Growing field – Many becoming computer forensic savvy  FBI, State and Local Police, IRS, Homeland Security  Defense attorneys, judges and prosecutors  Independent security agencies  White hat or Ethical Hackers  Programs offered at major universities such as URI http://homepage.cs.uri.edu/faculty/wolfe/cf E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 6. Uncovering Digital Evidence Smart Criminals don’t use their own computers Floppy disks Zip/Jazz disks Tapes Digital cameras Memory sticks Printers CDs PDAs Game boxes Networks Hard drives E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 7. Digital Evidence Not obvious…….it’s most likely hidden on purpose or needs to be unearthed by forensics experts Criminals Hide Evidence Forensics Uncover Evidence Delete their files and emails Restore deleted files and emails – they are still really there! Hide their files by encryption, Find the hidden files through password protection, or complex password, encryption embedding them in unrelated programs, and searching files (dll, os etc) techniques Use Wi-Fi networks and cyber Track them down through the cafes to cover their tracks digital trail - IP addresses to ISPs to the offender E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 8. The Crime Scene (with Computer Forensics) Similar to traditional crime scenes  Must acquire the evidence while preserving the integrity of the evidence No damage during collection, transportation, or storage Document everything Collect everything the first time  Establish a chain of custody But also different…….  Can perform analysis of evidence on exact copy!  Make many copies and investigate them without touching original  Can use time stamping/hash code techniques to prove evidence hasn’t been compromised E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 9. Top Cyber Crimes that Attack Business Spam Viruses/Worms Industrial Espionage and Hackers Wi-Fi High Jacking
  • 10. Spam “Spam accounts for 9 out of every 10 emails in the United States.” MessageLabs, Inc., an email management and security company based in New York. “We do not object to the use of this slang term to describe UCE (unsolicited commercial email), although we do object to the use of the word “spam” as a trademark and the use of our product image in association with that term” www.hormel.com E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 11. Can-Spam Act of 2003 Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can-Spam) Signed into law by President Bush on Dec 16, 2003  Took effect Jan 1, 2004 Unsolicited commercial email must:  Be labeled  Include Opt-Out instructions  No false headers FTC is authorized (but not required) to establish a “do-not-email” registry www.spamlaws.com –lists all the latest in federal, state, and international laws E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 12. Spam is Hostile You pay for Spam, not Spammers  Email costs are paid by email recipients Spam can be dangerous  Never click on the opt-out link! May take you to hostile web site where mouse-over downloads an .exe  Tells spammers they found a working address  They won’t take you off the list anyway What should you do?  Filter it out whenever possible  Keep filters up to date  If you get it, just delete the email Suzanne Mello - Nov 5 2004
  • 13. Viruses and Worms Different types of “ailments” Viruses  software that piggybacks on other software and runs when you run something else  Macro in excel, word Transmitted through sharing programs on bulletin boards Passing around floppy disks  An .exe, .com file in your email Worms  software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 14. Hackers are Everywhere Stealing data  Industrial Espionage  Identity theft  Defamation Deleting data for fun  A lot of bored 16 year olds late at night Mafia Boy Turning computers into zombies  To commit crimes  Take down networks  Distribute porn  Harass someone Ethical/white hat hackers exist too  Help break into networks to prevent crimes E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 15. Wireless Fidelity (Wi-Fi) Using antennas to create “hot spots” Hotspots – Internet Access (sometimes free)  Newport Harbor - All the boats in Harbor have internet access  San Francisco Giants Stadium – Surf the web while catching a game  UMass (need to register, but it’s free)  Cambridge, MA  Philadelphia, PA – just announced – entire city by 2006 E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 16. Wi-Fi High Jacking 60-70% wireless networks are wide open Why are the Wi-Fi networks unprotected?  Most people say “Our data is boring”  But… criminals look for wireless networks to commit their crimes  And… the authorities will come knocking on your door….. E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 17. Protect your Computers! Use anti-virus software and Don't share access to your firewalls - keep them up to date computers with strangers Keep your operating system up to If you have a wi-fi network, date with critical security updates password protect it and patches Disconnect from the Internet Don't open emails or attachments when not in use from unknown sources Reevaluate your security on a Use hard-to-guess passwords. regular basis Don’t use words found in a dictionary. Remember that password cracking tools exist Make sure your employees and family members know this info too! Back-up your computer data on disks or CDs often E-Commerce Network - Suzanne Mello - Nov 5 2004
  • 19. Web sites of Interest http://homepage.cs.uri.edu/faculty/wolfe/cf www.missingchildren.com www.spamlaws.com www.netsmartz.org http://www.ifccfbi.gov - operation web snare – latest cyber crimes to be aware of http://www.dcfl.gov/dc3/home.htm http://www.cops.org/ E-Commerce Network - Suzanne Mello - Nov 5 2004