SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Chapter SixteenChapter Sixteen
Hi-Tech CrimeHi-Tech Crime
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Learning ObjectivesLearning Objectives
 The difference between computer crime,The difference between computer crime,
computer related crime and technologycomputer related crime and technology
crime.crime.
 Why Hi-Tech crime may be under-reported.Why Hi-Tech crime may be under-reported.
 How the Internet changed traditional crime.How the Internet changed traditional crime.
 Explore system attack, theft of services andExplore system attack, theft of services and
software piracy.software piracy.
 Explore the Independent ComponentExplore the Independent Component
Doctrine.Doctrine.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Hi Tech CrimeHi Tech Crime
Technology has changed theTechnology has changed the
nature of crime – to prevent, deternature of crime – to prevent, deter
and arrest you must understandand arrest you must understand
the nature of the crime.the nature of the crime.
Was the computer the target?Was the computer the target?
Was the technology inside theWas the technology inside the
computer the target? Did thecomputer the target? Did the
computer facilitate the crime? Or,computer facilitate the crime? Or,
has the technology morphed thehas the technology morphed the
nature of a traditional crime?nature of a traditional crime?
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer CrimeComputer Crime
 The computer is the object of the attack;The computer is the object of the attack;
however, the attack is not physical, it ishowever, the attack is not physical, it is
virtual –virtual –
 VirusVirus
 HackingHacking
 Theft of servicesTheft of services
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer Related CrimeComputer Related Crime
 These types of crimes occur when theThese types of crimes occur when the
offender uses a computer to:offender uses a computer to:
 Commit a traditional crimeCommit a traditional crime
 The computer is used to commit the crime.The computer is used to commit the crime.
 Stores evidence of a crimeStores evidence of a crime
 The computer is used to facilitate the crime.The computer is used to facilitate the crime.
 Software PiracySoftware Piracy
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Technology CrimeTechnology Crime
 A crime directed at a technology, otherA crime directed at a technology, other
than a computerthan a computer
 Theft of services – cellular telephones, cableTheft of services – cellular telephones, cable
televisiontelevision
 Theft of computer componentsTheft of computer components
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Hi Tech CrimeHi Tech Crime
Classification Unique Feature Types of crime
Computer Computer system or capability is the object
of the crime.
Viruses, theft of system capabilities
Computer
Related
Computer facilitates crime or keeps records
of crime. Some are traditional crimes, others
are crime created as a result of computer
age.
Traditional:
Child pornography, Narcotics Trafficking
Non-Traditional:
Software Piracy, Internet Fraud.
Technology
Crime
Technology is stolen, or other technology
services are stolen
Computer Hardware theft, theft of cellular
telephone service, theft of cable television
services
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer CrimeComputer Crime
VirusesViruses
 A malicious software program whichA malicious software program which
attempts to replicate itself and spread.attempts to replicate itself and spread.
 Most commonly spread by emailMost commonly spread by email
attachment, file download or infected discattachment, file download or infected disc
 Attaches to executable programAttaches to executable program
 Sometimes to use host computer to infectSometimes to use host computer to infect
others via email list.others via email list.
 Causes disruption, including complete failureCauses disruption, including complete failure
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer CrimeComputer Crime
VirusesViruses
 Viruses can spreadViruses can spread
rapidly, in somerapidly, in some
instances a computerinstances a computer
virus canvirus can
circumnavigate thecircumnavigate the
globe in under anglobe in under an
hour – infectinghour – infecting
millions of computersmillions of computersScreen Capture – Panda SoftwareScreen Capture – Panda Software
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer CrimeComputer Crime
Hacking, Cracking and WhackingHacking, Cracking and Whacking
 Hacking refers to the non-malicious virtualHacking refers to the non-malicious virtual
entry into a software program.entry into a software program.
 May still be illegalMay still be illegal
 A non-illegal aspect might be purchasing aA non-illegal aspect might be purchasing a
computer game and hacking it to ease yourcomputer game and hacking it to ease your
playplay
 Cracking refers to the illegal and oftenCracking refers to the illegal and often
malicious virtual entry into a softwaremalicious virtual entry into a software
program, system or network.program, system or network.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer CrimeComputer Crime
Hacking, Cracking and WhackingHacking, Cracking and Whacking
 Whacking is theWhacking is the
illegal and oftenillegal and often
malicious virtual entrymalicious virtual entry
into a softwareinto a software
program, system orprogram, system or
network via wirelessnetwork via wireless
connection.connection.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer CrimeComputer Crime
Virtual Street NamesVirtual Street Names
 Coders – Semi-professional softwareCoders – Semi-professional software
engineers who write code and experimentengineers who write code and experiment
in virtual zoos. Their codes arein virtual zoos. Their codes are
sometimes used by the cyber-punks.sometimes used by the cyber-punks.
 Cyber-punks – anti-social, angry; theyCyber-punks – anti-social, angry; they
write and use code for maliciouswrite and use code for malicious
purposes.purposes.
 Old Guard Hackers – Generally, noOld Guard Hackers – Generally, no
malicious intent. However, their softwaremalicious intent. However, their software
is often used by cyber-punks.is often used by cyber-punks.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer CrimeComputer Crime
Virtual Street NamesVirtual Street Names
 Cyber-terrorists – Professional criminalsCyber-terrorists – Professional criminals
who sell their computer skills. Often usedwho sell their computer skills. Often used
in corporate espionage.in corporate espionage.
 Old-School Hackers – Belief that InternetOld-School Hackers – Belief that Internet
is open source. No criminal intent.is open source. No criminal intent.
 Script kiddies – juvenile cyber-punks.Script kiddies – juvenile cyber-punks.
 Phreaker – uses technology to stealPhreaker – uses technology to steal
telephone system capabilitiestelephone system capabilities
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer Related CrimeComputer Related Crime
 The Internet affords a wider net of victims.The Internet affords a wider net of victims.
 The Internet affords greater anonymityThe Internet affords greater anonymity
 The Internet can connect offendersThe Internet can connect offenders
togethertogether
 The Internet makes jurisdiction issuesThe Internet makes jurisdiction issues
difficult.difficult.
 The Internet is new to law enforcement.The Internet is new to law enforcement.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer Related CrimeComputer Related Crime
Crimes Against ChildrenCrimes Against Children
 Use of Internet Relay Chat (IRC) toUse of Internet Relay Chat (IRC) to
contact children.contact children.
 Arrange meetings.Arrange meetings.
 Engage in sexual talk, exchange of images.Engage in sexual talk, exchange of images.
 Use of the Internet to exchange ideas onUse of the Internet to exchange ideas on
committing crimes against children.committing crimes against children.
 Use of the Internet to exchange images ofUse of the Internet to exchange images of
children.children.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer Related CrimeComputer Related Crime
New InformationNew Information
 Steganography – from the greekSteganography – from the greek
“steganos” meaning hidden and “graphy”“steganos” meaning hidden and “graphy”
meaning writing.meaning writing.
 The process of hiding messages orThe process of hiding messages or
images inside of the coding of images.images inside of the coding of images.
 It is considered the newest challenge to lawIt is considered the newest challenge to law
enforcement’s prosecution of pedophiles.enforcement’s prosecution of pedophiles.
 It may have been used by internationalIt may have been used by international
terrorist to transmit messages to remote cells.terrorist to transmit messages to remote cells.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer Related CrimeComputer Related Crime
FraudFraud
 The “box of rocks” becomes auction fraud.The “box of rocks” becomes auction fraud.
 On the street – offender uses a sealedOn the street – offender uses a sealed
package to entice victim. On the Internet –package to entice victim. On the Internet –
photographs and descriptions are used.photographs and descriptions are used.
 The Pigeon Drop becomes the NigerianThe Pigeon Drop becomes the Nigerian
419 scam.419 scam.
 On the street found money entices the victim.On the street found money entices the victim.
On the Internet – email is used to describeOn the Internet – email is used to describe
inheritances, overages, etc.inheritances, overages, etc.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer Related CrimeComputer Related Crime
FraudFraud
 In most fraud wereIn most fraud were
the victim is an activethe victim is an active
participant the streetparticipant the street
and the Internet shareand the Internet share
a common theme –a common theme –
The victim’s thoughtThe victim’s thought
they were gettingthey were getting
something forsomething for
nothing!nothing!
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer Related CrimeComputer Related Crime
Software PiracySoftware Piracy
 A very broad category that involves theA very broad category that involves the
theft of any intellectual property usingtheft of any intellectual property using
computer, primarily the internet.computer, primarily the internet.
 Illegal music downloads.Illegal music downloads.
 Copy Right infringementCopy Right infringement
 Trademark infringementTrademark infringement
 Illegal downloads of music.Illegal downloads of music.
 Copying any work, including software, music,Copying any work, including software, music,
written work and providing it to a third person.written work and providing it to a third person.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer Related CrimeComputer Related Crime
FraudFraud
 Credit card fraud and theftCredit card fraud and theft
 Email used to “Phish.” An email looksEmail used to “Phish.” An email looks
like it comes from a legitimate source.like it comes from a legitimate source.
Asks for personal information which isAsks for personal information which is
then to steal the victim’s identity orthen to steal the victim’s identity or
using the victim’s credit.using the victim’s credit.
 Personal information is hacked from aPersonal information is hacked from a
legitimate sourcelegitimate source
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Computer Related CrimeComputer Related Crime
FraudFraud
 Pump and DumpPump and Dump
 Emails and websitesEmails and websites
used to drive up orused to drive up or
down the price of andown the price of an
equity. The offenderequity. The offender
then sells/buysthen sells/buys
accordinglyaccordingly
 ToutingTouting
 Employee of legitimateEmployee of legitimate
publication publishespublication publishes
false or exaggeratedfalse or exaggerated
newsnews
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Technology CrimeTechnology Crime
 Theft of components.Theft of components.
 ShopliftingShoplifting
 BurglaryBurglary
 HijackingHijacking
 Theft of cellular telephone services.Theft of cellular telephone services.
 Theft of telephone serviceTheft of telephone service
 Theft of cable televisionTheft of cable television
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Legal Aspects of Computer CrimeLegal Aspects of Computer Crime
 Approximately half of theApproximately half of the
states modeled theirstates modeled their
computer crime relatedcomputer crime related
statutes after the 1977 andstatutes after the 1977 and
1979 versions of the1979 versions of the
Federal ComputerFederal Computer
Systems Protection Act.Systems Protection Act.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Independent Component DoctrineIndependent Component Doctrine
 The Search and Seizure of computerThe Search and Seizure of computer
equipment is protected by the Fourthequipment is protected by the Fourth
Amendment.Amendment.
 Generally, a desk top computer consists ofGenerally, a desk top computer consists of
a computer, monitor, printer and othera computer, monitor, printer and other
peripheral devices.peripheral devices.
 Investigators should consider listing eachInvestigators should consider listing each
component separately on the searchcomponent separately on the search
warrantwarrant
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
JurisdictionJurisdiction
 One of the mostOne of the most
difficult issues.difficult issues.
 Greatly benefits theGreatly benefits the
offender.offender.
 Offender can live inOffender can live in
one state (or country)one state (or country)
and victim in another.and victim in another.
 Different laws.Different laws.
 Poor interagencyPoor interagency
cooperationcooperation
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Under-ReportedUnder-Reported
 Federal Bureau of Investigation recentlyFederal Bureau of Investigation recently
updated the Uniform Crime Reporting toupdated the Uniform Crime Reporting to
include certain technology related crimes.include certain technology related crimes.
 Victims don’t know they are victimsVictims don’t know they are victims
 Companies stand to loose customerCompanies stand to loose customer
confidence if breach is reported.confidence if breach is reported.
 Law enforcement is often weak in itsLaw enforcement is often weak in its
responseresponse
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Task ForcesTask Forces
 Combine investigative and computerCombine investigative and computer
expertise.expertise.
 Share costs.Share costs.
 Help solve jurisdictional problems.Help solve jurisdictional problems.
 Help the exchange of information andHelp the exchange of information and
trend identificationtrend identification
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
Protection - TheftProtection - Theft
 The recording ofThe recording of
serial numbers andserial numbers and
periodic audits canperiodic audits can
detect theft.detect theft.
 Some companiesSome companies
have installedhave installed
software that if asoftware that if a
laptop is stolen, it willlaptop is stolen, it will
report its locationreport its location
when it connects towhen it connects to
the Internetthe Internet
Screen capture provided by Absolute Software CorpScreen capture provided by Absolute Software Corp
Copy Right Protected 2005: Hi Tech Criminal Justice, Raym
ProtectionProtection
 Software and hardware is being used toSoftware and hardware is being used to
detect intrusions in real-time.detect intrusions in real-time.
 Software and hardware is used to preventSoftware and hardware is used to prevent
SPAM and email attachments that mightSPAM and email attachments that might
contain viruses.contain viruses.
 Education programs reduce haplessEducation programs reduce hapless
victimizationvictimization
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Go to theGo to the Student ResourcesStudent Resources page atpage at
www.hitechcj.comwww.hitechcj.com

Weitere ähnliche Inhalte

Was ist angesagt? (13)

Personnel and Training
Personnel and TrainingPersonnel and Training
Personnel and Training
 
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
Internet Wiretapping - Government and Law Use (Omnivore, Carnivore, DragonWar...
 
Agency Systems
Agency SystemsAgency Systems
Agency Systems
 
Cii iq's national business excellence conclave 2013
Cii   iq's national business excellence conclave 2013Cii   iq's national business excellence conclave 2013
Cii iq's national business excellence conclave 2013
 
File000167
File000167File000167
File000167
 
File000164
File000164File000164
File000164
 
Computer forensics [pdf library]
Computer forensics [pdf library]Computer forensics [pdf library]
Computer forensics [pdf library]
 
File000158
File000158File000158
File000158
 
File000159
File000159File000159
File000159
 
Sec Wars Episode 3
Sec Wars Episode 3Sec Wars Episode 3
Sec Wars Episode 3
 
File000090
File000090File000090
File000090
 
File000089
File000089File000089
File000089
 
File000165
File000165File000165
File000165
 

Andere mochten auch

American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesHi Tech Criminal Justice
 
Law Enforcement 2.0 - The Next Generation
Law Enforcement 2.0 - The Next GenerationLaw Enforcement 2.0 - The Next Generation
Law Enforcement 2.0 - The Next GenerationMark Fidelman
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Hi Tech Criminal Justice
 
Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headingsHi Tech Criminal Justice
 

Andere mochten auch (7)

How to Become a Texas State Trooper
How to Become a Texas State TrooperHow to Become a Texas State Trooper
How to Become a Texas State Trooper
 
Travel Safety
Travel SafetyTravel Safety
Travel Safety
 
Leadership texas hold em style
Leadership texas hold em styleLeadership texas hold em style
Leadership texas hold em style
 
American Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign DignitariesAmerican Municipal Policing: A Briefing for Foreign Dignitaries
American Municipal Policing: A Briefing for Foreign Dignitaries
 
Law Enforcement 2.0 - The Next Generation
Law Enforcement 2.0 - The Next GenerationLaw Enforcement 2.0 - The Next Generation
Law Enforcement 2.0 - The Next Generation
 
Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)Public Policy and Practice: Decision Making (Part Three)
Public Policy and Practice: Decision Making (Part Three)
 
Police report writing arrest report headings
Police report writing arrest report headingsPolice report writing arrest report headings
Police report writing arrest report headings
 

Ähnlich wie Tracking and Surveillance

Ähnlich wie Tracking and Surveillance (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Growing cyber crime
Growing cyber crimeGrowing cyber crime
Growing cyber crime
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)SITA LAB PPT (XYBER CRIME)
SITA LAB PPT (XYBER CRIME)
 
Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation Learn More About Cyber Crime Investigation
Learn More About Cyber Crime Investigation
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Course on Ehtical Hacking - Introduction
Course on Ehtical Hacking - IntroductionCourse on Ehtical Hacking - Introduction
Course on Ehtical Hacking - Introduction
 
Cyber crime & law
Cyber crime & lawCyber crime & law
Cyber crime & law
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Digital Piracy
Digital PiracyDigital Piracy
Digital Piracy
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
First Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptxFirst Lecture- Cyber Security-Bangladesh.pptx
First Lecture- Cyber Security-Bangladesh.pptx
 
UNIT 1.pptx
UNIT 1.pptxUNIT 1.pptx
UNIT 1.pptx
 
E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Mehr von Hi Tech Criminal Justice

You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)Hi Tech Criminal Justice
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersHi Tech Criminal Justice
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlHi Tech Criminal Justice
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsHi Tech Criminal Justice
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Hi Tech Criminal Justice
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisHi Tech Criminal Justice
 

Mehr von Hi Tech Criminal Justice (16)

You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)You tube for the criminal justice educator (version 1.0)
You tube for the criminal justice educator (version 1.0)
 
Cop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck RodgersCop Cars: From Buck Boards to Buck Rodgers
Cop Cars: From Buck Boards to Buck Rodgers
 
The National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and ControlThe National Incident Management System: Rethinking Command and Control
The National Incident Management System: Rethinking Command and Control
 
An introduction to federal courts
An introduction to federal courtsAn introduction to federal courts
An introduction to federal courts
 
Law Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and TacticsLaw Enforcement: Uniformed Patrol Concepts and Tactics
Law Enforcement: Uniformed Patrol Concepts and Tactics
 
Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)Public Policy and Practice: Decision Making (Part Two)
Public Policy and Practice: Decision Making (Part Two)
 
Public Policy Decision Making and Analysis
Public Policy Decision Making and AnalysisPublic Policy Decision Making and Analysis
Public Policy Decision Making and Analysis
 
Implementing and Managing Technology
Implementing and Managing TechnologyImplementing and Managing Technology
Implementing and Managing Technology
 
Major Incident and Disaster Response
Major Incident and Disaster ResponseMajor Incident and Disaster Response
Major Incident and Disaster Response
 
Crime Analysis
Crime AnalysisCrime Analysis
Crime Analysis
 
The Internet and Law Enforcement
The Internet and Law EnforcementThe Internet and Law Enforcement
The Internet and Law Enforcement
 
External Systems
External SystemsExternal Systems
External Systems
 
Geographic Information Systems
Geographic Information SystemsGeographic Information Systems
Geographic Information Systems
 
Networks
NetworksNetworks
Networks
 
Wireless Communications
Wireless CommunicationsWireless Communications
Wireless Communications
 
Computer Basics
Computer BasicsComputer Basics
Computer Basics
 

Kürzlich hochgeladen

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Kürzlich hochgeladen (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Tracking and Surveillance

  • 1. Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Chapter SixteenChapter Sixteen Hi-Tech CrimeHi-Tech Crime
  • 2. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Learning ObjectivesLearning Objectives  The difference between computer crime,The difference between computer crime, computer related crime and technologycomputer related crime and technology crime.crime.  Why Hi-Tech crime may be under-reported.Why Hi-Tech crime may be under-reported.  How the Internet changed traditional crime.How the Internet changed traditional crime.  Explore system attack, theft of services andExplore system attack, theft of services and software piracy.software piracy.  Explore the Independent ComponentExplore the Independent Component Doctrine.Doctrine.
  • 3. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Hi Tech CrimeHi Tech Crime Technology has changed theTechnology has changed the nature of crime – to prevent, deternature of crime – to prevent, deter and arrest you must understandand arrest you must understand the nature of the crime.the nature of the crime. Was the computer the target?Was the computer the target? Was the technology inside theWas the technology inside the computer the target? Did thecomputer the target? Did the computer facilitate the crime? Or,computer facilitate the crime? Or, has the technology morphed thehas the technology morphed the nature of a traditional crime?nature of a traditional crime?
  • 4. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer CrimeComputer Crime  The computer is the object of the attack;The computer is the object of the attack; however, the attack is not physical, it ishowever, the attack is not physical, it is virtual –virtual –  VirusVirus  HackingHacking  Theft of servicesTheft of services
  • 5. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer Related CrimeComputer Related Crime  These types of crimes occur when theThese types of crimes occur when the offender uses a computer to:offender uses a computer to:  Commit a traditional crimeCommit a traditional crime  The computer is used to commit the crime.The computer is used to commit the crime.  Stores evidence of a crimeStores evidence of a crime  The computer is used to facilitate the crime.The computer is used to facilitate the crime.  Software PiracySoftware Piracy
  • 6. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Technology CrimeTechnology Crime  A crime directed at a technology, otherA crime directed at a technology, other than a computerthan a computer  Theft of services – cellular telephones, cableTheft of services – cellular telephones, cable televisiontelevision  Theft of computer componentsTheft of computer components
  • 7. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Hi Tech CrimeHi Tech Crime Classification Unique Feature Types of crime Computer Computer system or capability is the object of the crime. Viruses, theft of system capabilities Computer Related Computer facilitates crime or keeps records of crime. Some are traditional crimes, others are crime created as a result of computer age. Traditional: Child pornography, Narcotics Trafficking Non-Traditional: Software Piracy, Internet Fraud. Technology Crime Technology is stolen, or other technology services are stolen Computer Hardware theft, theft of cellular telephone service, theft of cable television services
  • 8. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer CrimeComputer Crime VirusesViruses  A malicious software program whichA malicious software program which attempts to replicate itself and spread.attempts to replicate itself and spread.  Most commonly spread by emailMost commonly spread by email attachment, file download or infected discattachment, file download or infected disc  Attaches to executable programAttaches to executable program  Sometimes to use host computer to infectSometimes to use host computer to infect others via email list.others via email list.  Causes disruption, including complete failureCauses disruption, including complete failure
  • 9. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer CrimeComputer Crime VirusesViruses  Viruses can spreadViruses can spread rapidly, in somerapidly, in some instances a computerinstances a computer virus canvirus can circumnavigate thecircumnavigate the globe in under anglobe in under an hour – infectinghour – infecting millions of computersmillions of computersScreen Capture – Panda SoftwareScreen Capture – Panda Software
  • 10. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer CrimeComputer Crime Hacking, Cracking and WhackingHacking, Cracking and Whacking  Hacking refers to the non-malicious virtualHacking refers to the non-malicious virtual entry into a software program.entry into a software program.  May still be illegalMay still be illegal  A non-illegal aspect might be purchasing aA non-illegal aspect might be purchasing a computer game and hacking it to ease yourcomputer game and hacking it to ease your playplay  Cracking refers to the illegal and oftenCracking refers to the illegal and often malicious virtual entry into a softwaremalicious virtual entry into a software program, system or network.program, system or network.
  • 11. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer CrimeComputer Crime Hacking, Cracking and WhackingHacking, Cracking and Whacking  Whacking is theWhacking is the illegal and oftenillegal and often malicious virtual entrymalicious virtual entry into a softwareinto a software program, system orprogram, system or network via wirelessnetwork via wireless connection.connection.
  • 12. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer CrimeComputer Crime Virtual Street NamesVirtual Street Names  Coders – Semi-professional softwareCoders – Semi-professional software engineers who write code and experimentengineers who write code and experiment in virtual zoos. Their codes arein virtual zoos. Their codes are sometimes used by the cyber-punks.sometimes used by the cyber-punks.  Cyber-punks – anti-social, angry; theyCyber-punks – anti-social, angry; they write and use code for maliciouswrite and use code for malicious purposes.purposes.  Old Guard Hackers – Generally, noOld Guard Hackers – Generally, no malicious intent. However, their softwaremalicious intent. However, their software is often used by cyber-punks.is often used by cyber-punks.
  • 13. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer CrimeComputer Crime Virtual Street NamesVirtual Street Names  Cyber-terrorists – Professional criminalsCyber-terrorists – Professional criminals who sell their computer skills. Often usedwho sell their computer skills. Often used in corporate espionage.in corporate espionage.  Old-School Hackers – Belief that InternetOld-School Hackers – Belief that Internet is open source. No criminal intent.is open source. No criminal intent.  Script kiddies – juvenile cyber-punks.Script kiddies – juvenile cyber-punks.  Phreaker – uses technology to stealPhreaker – uses technology to steal telephone system capabilitiestelephone system capabilities
  • 14. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer Related CrimeComputer Related Crime  The Internet affords a wider net of victims.The Internet affords a wider net of victims.  The Internet affords greater anonymityThe Internet affords greater anonymity  The Internet can connect offendersThe Internet can connect offenders togethertogether  The Internet makes jurisdiction issuesThe Internet makes jurisdiction issues difficult.difficult.  The Internet is new to law enforcement.The Internet is new to law enforcement.
  • 15. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer Related CrimeComputer Related Crime Crimes Against ChildrenCrimes Against Children  Use of Internet Relay Chat (IRC) toUse of Internet Relay Chat (IRC) to contact children.contact children.  Arrange meetings.Arrange meetings.  Engage in sexual talk, exchange of images.Engage in sexual talk, exchange of images.  Use of the Internet to exchange ideas onUse of the Internet to exchange ideas on committing crimes against children.committing crimes against children.  Use of the Internet to exchange images ofUse of the Internet to exchange images of children.children.
  • 16. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer Related CrimeComputer Related Crime New InformationNew Information  Steganography – from the greekSteganography – from the greek “steganos” meaning hidden and “graphy”“steganos” meaning hidden and “graphy” meaning writing.meaning writing.  The process of hiding messages orThe process of hiding messages or images inside of the coding of images.images inside of the coding of images.  It is considered the newest challenge to lawIt is considered the newest challenge to law enforcement’s prosecution of pedophiles.enforcement’s prosecution of pedophiles.  It may have been used by internationalIt may have been used by international terrorist to transmit messages to remote cells.terrorist to transmit messages to remote cells.
  • 17. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer Related CrimeComputer Related Crime FraudFraud  The “box of rocks” becomes auction fraud.The “box of rocks” becomes auction fraud.  On the street – offender uses a sealedOn the street – offender uses a sealed package to entice victim. On the Internet –package to entice victim. On the Internet – photographs and descriptions are used.photographs and descriptions are used.  The Pigeon Drop becomes the NigerianThe Pigeon Drop becomes the Nigerian 419 scam.419 scam.  On the street found money entices the victim.On the street found money entices the victim. On the Internet – email is used to describeOn the Internet – email is used to describe inheritances, overages, etc.inheritances, overages, etc.
  • 18. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer Related CrimeComputer Related Crime FraudFraud  In most fraud wereIn most fraud were the victim is an activethe victim is an active participant the streetparticipant the street and the Internet shareand the Internet share a common theme –a common theme – The victim’s thoughtThe victim’s thought they were gettingthey were getting something forsomething for nothing!nothing!
  • 19. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer Related CrimeComputer Related Crime Software PiracySoftware Piracy  A very broad category that involves theA very broad category that involves the theft of any intellectual property usingtheft of any intellectual property using computer, primarily the internet.computer, primarily the internet.  Illegal music downloads.Illegal music downloads.  Copy Right infringementCopy Right infringement  Trademark infringementTrademark infringement  Illegal downloads of music.Illegal downloads of music.  Copying any work, including software, music,Copying any work, including software, music, written work and providing it to a third person.written work and providing it to a third person.
  • 20. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer Related CrimeComputer Related Crime FraudFraud  Credit card fraud and theftCredit card fraud and theft  Email used to “Phish.” An email looksEmail used to “Phish.” An email looks like it comes from a legitimate source.like it comes from a legitimate source. Asks for personal information which isAsks for personal information which is then to steal the victim’s identity orthen to steal the victim’s identity or using the victim’s credit.using the victim’s credit.  Personal information is hacked from aPersonal information is hacked from a legitimate sourcelegitimate source
  • 21. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Computer Related CrimeComputer Related Crime FraudFraud  Pump and DumpPump and Dump  Emails and websitesEmails and websites used to drive up orused to drive up or down the price of andown the price of an equity. The offenderequity. The offender then sells/buysthen sells/buys accordinglyaccordingly  ToutingTouting  Employee of legitimateEmployee of legitimate publication publishespublication publishes false or exaggeratedfalse or exaggerated newsnews
  • 22. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Technology CrimeTechnology Crime  Theft of components.Theft of components.  ShopliftingShoplifting  BurglaryBurglary  HijackingHijacking  Theft of cellular telephone services.Theft of cellular telephone services.  Theft of telephone serviceTheft of telephone service  Theft of cable televisionTheft of cable television
  • 23. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Legal Aspects of Computer CrimeLegal Aspects of Computer Crime  Approximately half of theApproximately half of the states modeled theirstates modeled their computer crime relatedcomputer crime related statutes after the 1977 andstatutes after the 1977 and 1979 versions of the1979 versions of the Federal ComputerFederal Computer Systems Protection Act.Systems Protection Act.
  • 24. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Independent Component DoctrineIndependent Component Doctrine  The Search and Seizure of computerThe Search and Seizure of computer equipment is protected by the Fourthequipment is protected by the Fourth Amendment.Amendment.  Generally, a desk top computer consists ofGenerally, a desk top computer consists of a computer, monitor, printer and othera computer, monitor, printer and other peripheral devices.peripheral devices.  Investigators should consider listing eachInvestigators should consider listing each component separately on the searchcomponent separately on the search warrantwarrant
  • 25. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym JurisdictionJurisdiction  One of the mostOne of the most difficult issues.difficult issues.  Greatly benefits theGreatly benefits the offender.offender.  Offender can live inOffender can live in one state (or country)one state (or country) and victim in another.and victim in another.  Different laws.Different laws.  Poor interagencyPoor interagency cooperationcooperation
  • 26. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Under-ReportedUnder-Reported  Federal Bureau of Investigation recentlyFederal Bureau of Investigation recently updated the Uniform Crime Reporting toupdated the Uniform Crime Reporting to include certain technology related crimes.include certain technology related crimes.  Victims don’t know they are victimsVictims don’t know they are victims  Companies stand to loose customerCompanies stand to loose customer confidence if breach is reported.confidence if breach is reported.  Law enforcement is often weak in itsLaw enforcement is often weak in its responseresponse
  • 27. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Task ForcesTask Forces  Combine investigative and computerCombine investigative and computer expertise.expertise.  Share costs.Share costs.  Help solve jurisdictional problems.Help solve jurisdictional problems.  Help the exchange of information andHelp the exchange of information and trend identificationtrend identification
  • 28. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym Protection - TheftProtection - Theft  The recording ofThe recording of serial numbers andserial numbers and periodic audits canperiodic audits can detect theft.detect theft.  Some companiesSome companies have installedhave installed software that if asoftware that if a laptop is stolen, it willlaptop is stolen, it will report its locationreport its location when it connects towhen it connects to the Internetthe Internet Screen capture provided by Absolute Software CorpScreen capture provided by Absolute Software Corp
  • 29. Copy Right Protected 2005: Hi Tech Criminal Justice, Raym ProtectionProtection  Software and hardware is being used toSoftware and hardware is being used to detect intrusions in real-time.detect intrusions in real-time.  Software and hardware is used to preventSoftware and hardware is used to prevent SPAM and email attachments that mightSPAM and email attachments that might contain viruses.contain viruses.  Education programs reduce haplessEducation programs reduce hapless victimizationvictimization
  • 30. Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster Police TechnologyPolice Technology Go to theGo to the Student ResourcesStudent Resources page atpage at www.hitechcj.comwww.hitechcj.com