CHAPTER 6- Computer Crime
Computer crime:any crime involves a computer and a network
Categories:
🍿crimes that primarily target computer networks or devices - malware
🍿crimes that use computer networks or devices to advance other ends - hacking,fraud and identity theft,phishing scams
Hacking:to gain illegal or unauthorized access to a file,computer or network.
Phase1:
🎉positive term
🎉"hacker"- creative programmer who wrote elegant or clever code
🎉"hack"- was an especially clever piece of code
Phase2:
⚡negative term
⚡breaking into computers for which the hacker does not have authorized access
⚡spreading of computer worms and viruses
⚡phone phreaking- manipulating phone systems
Phase3:
🍒in the growth of Web
🍒hacktivism surfaced
:cherrDenial-of -service (DoS) attack used to shut down Web sites
🍒large scale theft of personal and financial information
Hacktivism:political hacking
🌸use hacking to promote a political cause
🌸disagreement about whether it is a form of civil disobedience and how it should be punished
🌸use appearance of hacktivism to hide other criminal activities
The Law:Catching and Punishing Hackers
🌹1986 Congress passed the Computer Fraud and Abuse Act (CFAA)
🌹penalties for young hackers
🌹 Security
🌹 Responsibility fir security
Identity Theft and Credit Card Fraud
Identity Theft:various crimes which a criminal or large group uses the identity of an unknowning,innocent person
💥Technique used to steal personal and financial information
🌵Phishing- email fishing for personal and financial information disguised ass legitimate business email
🌵Pharming-false Web sites for personal and financial information by planting false URLs in Domain Name Servers
💥activation for new credit cards
💥retailers do not print the full card number and expiration date on receipts
💥software detects unusual spending activities and will prompt retailers to ask for identifying information
Responses to Identity Theft:
✅authentication of email and web sites
✅use of encryption to securely store data so it is useless if stolen
✅authenticating customers to prevent use of stolen numbers,may trade convenience for security
Scams and Forgery
Auctions:
🚩Federal Trade Commission -reports that online auction sites are one of the top sources of fraud complaints - some sellers do not send items or send inferior products
-sellers give themselves or friends glowing reviews to gather customer trust
🚩 auction sites use various techniques to counter dishonest sellers
⭐Click fraud - repeated clicking on an ad to either increase a site's revenue or to use up a competitor's advertising budget
⭐ Stock fraud : most common method is to buy a stock low, send out emails urging others to buy and sell when the price goes up , usually only for a short time
⭐Digital Forgery - new technologies are used to create fake checks,passports,visas,birth certificates-with little skill and investment
Analytical Tools For Cyber Crime
Fraud Analytical Tool
🍓Detect fraud early
🍓identity the right claims to focus on
🍓automate time-consuming processes
🍓streamline workflow
🍓quickly identify suspicious participants or pattern in claims
Hacking Analytical Tool
🖊sense and detect suspicious /doubtful applications which are able to leak private information/financial settlement/company's secret.
Fraud Detection Tools
🔒Fraud.net Guardian
🔒Splunk - for e-commerce purposes - protect customers and reputation and avoid fraud -related costs
🔒FICO- Fraud Management System
🔒fractals - Class-leading integrated,intelligent fraud detection and prevention framework for payment card issuers and acquirers
Hack detection Tools
🌺NetPatrol
🌺sXe Injected
🌺SMS- smishing hacking detector
Crime fighting VS Privacy and Civil Liberties: search and seizure of computer-
🖍Requires a warrant to search and seize a computer
🖍automated searches
The Issues of Venue:
🐨Charges generally filed where the crimes occurs
🐨Laws differ between states and countries
🐨FBI usually files in the sate where the crime was discovered and the investigation began
Cybercrime Treaty:
🥑 to foster international cooperation among law agencies at different countries to fight cybercrime
Whose Laws Rule the Web
⚠Laws vary from country to country
⚠Corporations that do business in multiple countries must comply with the laws of all the countries involved
⚠someone actions are legal in their own country may face prosecution in another country where their actions are illegal
Emergence Cyber Law in Malaysia:
❎Digital Signature Act 1997
❎Copyright (Amendment)Act 1997
❎Telemedicine Act 1997
❎Computer Crimes Act 1997
❎Communications & Multimedia Act (CMA)1998
❎Information Technology Act 2000
❎The Induce Act