Top Banner
Computer Crime Germán Terán Social Communication Student Universidad de Lima Perú [email protected] Another Jurisdiction?
27

[Exposicion] Computer and Internet Crime

Dec 13, 2014

Download

Education

German Teran

Society is turning digital and so its crimes. Internet is not only a great tool for research, it is also a perfect place for criminal... how to apply law in those cases?

Create another jurisdiction?
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: [Exposicion] Computer and Internet Crime

Computer Crime

Germán TeránSocial Communication Student

Universidad de LimaPerú

[email protected]

Another Jurisdiction?

Page 2: [Exposicion] Computer and Internet Crime

Structure

• Crime history• Types of crime• Another types of crime• Special crime adv. Found on internet.• National & International Efforts + Cb.crime

Future.• Conclusion

Page 3: [Exposicion] Computer and Internet Crime

Crime & Cybercrime

• Crime– Engaging in conduct that

has been outlawed by a particular society.

– Harm to: Individuals, property, government and morality.

• Cybercrime– Differ in the tool: guns

are change for computers.

Page 4: [Exposicion] Computer and Internet Crime

Cybercriminals + computer technology = difficulties to apply the law.

not only real-world crimes by using computers…

Page 5: [Exposicion] Computer and Internet Crime

DDoS attack

• Distributed Denial of Service.– Harm upon property by shutting down a website.– The attack doesn’t fit in conceptual category the law has devised to deal

with crime.

Page 6: [Exposicion] Computer and Internet Crime

Emergence of cybercrime

• 1950- word “hack” is use to refer to creative college pranks and migrate to computer culture.

• 1960- first published accounts of computers being used illegally.– Crimes committed by insiders.

• 1969- ARPANET link computers in hundred of universities.

• 1980- Personal networked computer .– Hackers were up to no good.

Page 7: [Exposicion] Computer and Internet Crime

Phone Phreaking

• Manipulating the telephone system– Provide free long-

distance service.– Prosecuted under

existing law (fraud or theft)

– Phone phreaks move on to hacking in the 1980s

Page 8: [Exposicion] Computer and Internet Crime

Meanwhile…

• First civilian bulletin board system on-line in Chicago. Some engaged in darker activities.

• 1984- Hacker groups appear. Legion Of Doom (LOD), Masters of deception (MOD), etc. War startetd.

• 1988- Robert Tappan Morris released the first Internet worm.

Robert Tappan – Morris worm

Mark Abene (MOD)Chris Goggans (LOD)

Page 9: [Exposicion] Computer and Internet Crime

Hacking

• Kevin Poulsen jumped from Phone phreak to hacking.

• Attacks to Pacific Bell Telephone Company and federal government installations.

• Apprehended in 1991-Charges: accessed device fraud, conspiracy, wiretapping, computer fraud, mail fraud, money laundering and espionage.

Kevin Mitnick was the first hacker included in FBI’S MOS WANTED list.

Kevin Poulsen

Page 10: [Exposicion] Computer and Internet Crime

Malware

• Robert Tappan Morris “invented” the network malware.• He demostrate how quickly malware can spread from system to system.• 1999- Melissa is the first mass-mailing computer virus.• At first malware was not addresss by local criminal law.

Page 11: [Exposicion] Computer and Internet Crime

Theft

• 1994- Vladimir Levin siphoned millions of dollars from Citibank accounts.

• Use of computers technology to obtain funds belonging to someone else.

• Traditional crime in a no traditional way.

Vladimir Levin

China: Song Chenglin used a computer at an Internet Café to hack 158 accounts at the ICBC

Page 12: [Exposicion] Computer and Internet Crime

Fraud

• “Official” fraud– Transfer millions

• Lottery fraud– “Won” the lottery

• Internet auction fraud– Factory direct products

• Identity theft• Specific legislation is not needed.

Page 13: [Exposicion] Computer and Internet Crime

Child Pornography

• Internet provides less risk of being identified.

• Highly organized, global subculture.

• Many of them are in countries where child pornography is not a priority for law enforcement.

• What is child pornography? Definition of child.

Page 14: [Exposicion] Computer and Internet Crime

Extortion

• Same dynamic as in real-world• Threaten to reveal sensitive information of an online business.• DDoS Attack to Casinos.• Will eventually be directed to bigger organizations.

Page 15: [Exposicion] Computer and Internet Crime

Cyberterrorism

• Terrorism: Commission of criminal acts for political motives.

• Has involved the use of methods of physical destruction.

• USA Patriot ACT– Hacking, cracking, extortion, fraud and malware.

Page 16: [Exposicion] Computer and Internet Crime

Warning

Korean Warning on the internet

Page 17: [Exposicion] Computer and Internet Crime

Internet Homicide

• Distribution of Hardcore and Snuff Movies• A face to face date with online friend can turn deadly.• Consensual homicide.

Page 18: [Exposicion] Computer and Internet Crime

Rotenburg Cannibal

• Germany .- March 9, 2001.– Armin Meiwes (Cannibal) – Bernd Jürgen Brandes (Victime)

• Armin post a message on “The Cannibal Café” website.• Documentary: http://video.google.com/videoplay?docid=1299254578438715427

Page 19: [Exposicion] Computer and Internet Crime

Internet Suicide

• Suicide pact made on internet.• Most of cases have ocurred in

Japan.– Some of them are also in China,

South Korea, Germany, USA, etc.

• Traditional suicide pacts involved older peole (50-60 years old)

• Internet suicide pact now involve young people, usually teenagers.

Check this link for more information: http://www.espacoacademico.com.br/044/44eueno_ing.htm

Page 20: [Exposicion] Computer and Internet Crime

Online Mercenaries

• Found by searching material for this presentation.

• http://club.telepolis.com/servmerc/index.htm

Page 21: [Exposicion] Computer and Internet Crime
Page 22: [Exposicion] Computer and Internet Crime
Page 23: [Exposicion] Computer and Internet Crime
Page 24: [Exposicion] Computer and Internet Crime

+ =

PC + Internet = Cybercrime legislation far more imperative

Page 25: [Exposicion] Computer and Internet Crime

National & International Efforts

• First Wave (privacy)– Sweden (1973) ; USA (1974); Federal Republic of German (1977); Austria,

Denmark, France and Norway (1978), etc.• Second Wave (property)

– Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc.

• Third Wave (intellectual property)• Convention on Cybercrime

– Ensuring that countries adopt procedural laws.– International cooperation.– Harmonizing national cybercrime law.– Domestic law criminalizes: Attacks on PC data or system; Pc tech. to commit

fraud or forgery; Pc tech. to create Child Pornograpy.; infringe copyright.

Page 26: [Exposicion] Computer and Internet Crime

Cybercrime: the future

• Two main trends:– Professionalization of Cybercrime (creation of cybermafias, similar to

italian families in early of US history).– Increasing the automization of Cybercrime.

Page 27: [Exposicion] Computer and Internet Crime

Clever cybercriminals can enjoy the benefits of criminal organization without its disadvantages.

Definitely this is another arena for human activity. But, is it legally another jurisdiction?

This seems to be more than a study case because all we studied in Information Society class can turn into a crime activity

What can we do?