SlideShare a Scribd company logo
Cyber Crime – “Is the Internet the new “ W ild  W ild  W est?” Prepared for the Southern Massachusetts  E-Commerce Network Nov 5 2004 by Suzanne Mello www.suzannemello.com
In the News……. 1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time ( www.missingchildren.com ) California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) Microsoft and Cisco announced a new initiative to work together to increase internet security  (Oct 18, 2004  www.cnetnews.com )
The New Wild Wild West More cyber criminals than cyber cops Criminals feel “safe” committing crimes from the privacy of their own homes Brand new challenges facing law enforcement Most not trained in the technologies Internet crimes span multiple jurisdictions Need to retrofit new crimes to existing laws
Computer Crime  Computer used to commit a crime Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing Computer as a target of a crime  Viruses, worms, industrial espionage, software piracy, hacking
Computer Forensics What is it? an autopsy of a computer or network to uncover digital evidence of a crime Evidence must be preserved and hold up in a court of law Growing field – Many becoming computer forensic savvy FBI, State and Local Police, IRS, Homeland Security Defense attorneys, judges and prosecutors Independent security agencies White hat or Ethical Hackers Programs offered at major universities such as URI http:// homepage.cs.uri.edu/faculty/wolfe/cf
Uncovering Digital Evidence Smart Criminals don’t use their own computers Floppy disks Zip/Jazz disks Tapes Digital cameras Memory sticks Printers CDs PDAs Game boxes Networks Hard drives
Digital Evidence Criminals Hide Evidence Delete their files and emails Hide their files by encryption, password protection, or embedding them in unrelated files (dll, os etc) Use Wi-Fi networks and cyber cafes to cover their tracks Forensics Uncover Evidence   Restore deleted files and emails – they are still really there! Find the hidden files through complex password, encryption programs, and searching techniques Track them down through the digital trail - IP addresses to ISPs to the offender Not obvious…….it’s most likely hidden on purpose  or needs to be unearthed by forensics experts
The Crime Scene (with Computer Forensics) Similar to traditional crime scenes Must acquire the evidence while preserving the integrity of the evidence No damage during collection, transportation, or storage Document everything Collect everything the first time Establish a chain of custody But also different……. Can perform analysis of evidence on exact copy! Make many copies and investigate them without touching original Can use time stamping/hash code techniques to prove evidence hasn’t been compromised
Top Cyber Crimes that Attack Business Spam Viruses/Worms Industrial Espionage and Hackers Wi-Fi High Jacking
Spam “ Spam accounts for 9 out of every 10 emails in the United States.”  MessageLabs, Inc., an email management and security company based in New York.   “ We do not object to the use of this slang term to describe UCE (unsolicited commercial email), although we do object to the use of the word “spam” as a trademark and the use of our product image in association with that term”  www.hormel.com
Can-Spam Act of 2003 Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can-Spam) Signed into law by President Bush on Dec 16, 2003 Took effect Jan 1, 2004 Unsolicited commercial email must: Be labeled Include Opt-Out instructions No false headers FTC is authorized (but not required) to establish a “do-not-email” registry www.spamlaws.com  –lists all the latest in federal, state, and international laws
Spam is Hostile You pay for Spam, not Spammers Email costs are paid by email recipients Spam can be dangerous Never click on the opt-out link! May take you to hostile web site where mouse-over downloads an .exe Tells spammers they found a working address They won’t take you off the list anyway What should you do? Filter it out whenever possible Keep filters up to date If you get it, just delete the email
Viruses and Worms Different types of “ailments” Viruses software that piggybacks on other software and runs when you run something else Macro in excel, word Transmitted through sharing programs on bulletin boards Passing around floppy disks An .exe, .com file in your email Worms software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written
Hackers are Everywhere Stealing data Industrial Espionage Identity theft Defamation Deleting data for fun A lot of bored 16 year olds late at night Turning computers into zombies To commit crimes Take down networks Distribute porn Harass someone Ethical/white hat hackers exist too Help break into networks to prevent crimes Mafia Boy
Wireless Fidelity (Wi-Fi) Using antennas to create “hot spots” Hotspots – Internet Access (sometimes free) Newport Harbor - All the boats in Harbor have internet access San Francisco Giants Stadium – Surf the web while catching a game UMass (need to register, but it’s free) Cambridge, MA Philadelphia, PA – just announced – entire city by 2006
Wi-Fi High Jacking 60-70% wireless networks are wide open Why are the Wi-Fi networks unprotected? Most people say “Our data is boring” But… criminals look for wireless networks to commit their crimes  And… the authorities will come knocking on your door…..
Protect your Computers! Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown sources Use hard-to-guess passwords. Don’t use words found in a dictionary.  Remember that password cracking tools exist Back-up your computer data on disks or CDs often Don't share access to your computers with strangers  If  you have a wi-fi network, password protect it Disconnect from the Internet when not in use Reevaluate your security on a regular basis Make sure your employees and family members know this info too!
Thank you!
Web sites of Interest http:// homepage.cs.uri.edu/faculty/wolfe/cf www.missingchildren.com www.spamlaws.com   www.netsmartz.org http://www.ifccfbi.gov   - operation web snare – latest cyber crimes to be aware of http://www.dcfl.gov/dc3/home.htm http://www.cops.org/

More Related Content

PPT
Cybercrime and IT ACT
PPT
Cybercrime123
PPT
Cybercrime
PPT
Cybercrime
PPTX
presentation on hacking
PPTX
[Exposicion] Computer and Internet Crime
Cybercrime and IT ACT
Cybercrime123
Cybercrime
Cybercrime
presentation on hacking
[Exposicion] Computer and Internet Crime

What's hot (18)

PDF
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
PPTX
Types Of Computer Crime
PPTX
Powerpoint
PPTX
Cyber Safety Class 9
PDF
File000145
PDF
Misuse of computer
PPTX
Cyber crime lecture pp update
PPTX
Cyber crime against children
PPT
Security Presentation
PPTX
Cybercrimes
PPT
C|EH Introduction
PPSX
What Are My Risks
PPTX
ppt on child pornography and cyber crime
PPTX
Cybercrime
PPT
computer misuse n criminal law
PPTX
Cyber crime- a case study
PPT
Cyber crimes and their prevention
PDF
Cyber Security | Patricia Watson
Cyber Crime 101: The Impact of Cyber Crime on Higher Education in South Africa
Types Of Computer Crime
Powerpoint
Cyber Safety Class 9
File000145
Misuse of computer
Cyber crime lecture pp update
Cyber crime against children
Security Presentation
Cybercrimes
C|EH Introduction
What Are My Risks
ppt on child pornography and cyber crime
Cybercrime
computer misuse n criminal law
Cyber crime- a case study
Cyber crimes and their prevention
Cyber Security | Patricia Watson
Ad

Viewers also liked (8)

PPT
Napier
PPT
Ecommerce1
PPT
Hoodies
PPT
Ecommerce(3)
PPT
Ecommerce(2)
PPT
Ecommerce Overview
PPTX
Pages Fans, quelles interactions avec vos fans ? | Maxime Garrigues (X-prime ...
PPT
E Commerce052503
Napier
Ecommerce1
Hoodies
Ecommerce(3)
Ecommerce(2)
Ecommerce Overview
Pages Fans, quelles interactions avec vos fans ? | Maxime Garrigues (X-prime ...
E Commerce052503
Ad

Similar to Cybercrime (20)

PPT
Cybercrimeg
PPTX
Information Technology - System Threats
PPT
Cyber Crime
PPTX
Hacking presentation
PPT
Cybercrime (1)
PPT
Cybercrime (1)
PPT
Protect Yourself From Internet Pests
PPT
Cybercrime 1
PPTX
Presentation on cyber security
PPT
091005 Internet Security
PPTX
Cyber Crime PPT
PPTX
Frontiers of Computational Journalism week 11 - Privacy and Security
PDF
Cyber Crime Types & Tips
PPTX
cyber crime and security
PPT
4598 cybercrime
PPTX
lec 15.pptxlec 15.pptxlec 15.pptxlec 15.pptx
PPTX
Information security
PPT
Tech Topic Privacy
PPTX
First Lecture- Cyber Security-Bangladesh.pptx
PPT
Hackers
Cybercrimeg
Information Technology - System Threats
Cyber Crime
Hacking presentation
Cybercrime (1)
Cybercrime (1)
Protect Yourself From Internet Pests
Cybercrime 1
Presentation on cyber security
091005 Internet Security
Cyber Crime PPT
Frontiers of Computational Journalism week 11 - Privacy and Security
Cyber Crime Types & Tips
cyber crime and security
4598 cybercrime
lec 15.pptxlec 15.pptxlec 15.pptxlec 15.pptx
Information security
Tech Topic Privacy
First Lecture- Cyber Security-Bangladesh.pptx
Hackers

More from ecommerce (13)

PPT
E Commerce14a(2)
PPT
E Com Center Klagenfurt
PPT
Maloney Slides
PPT
E Commerce14a
PPT
B Hkorba
PPT
Am Cham Taipei Sept2004
PPT
Nordin Malaysia
PPT
B4 Gusmeroli
PPT
Wsis Alf C7 Unctad
PPT
Ecommerce
PPT
Documentation Set Up
PPT
S719a
PPT
Mea1
E Commerce14a(2)
E Com Center Klagenfurt
Maloney Slides
E Commerce14a
B Hkorba
Am Cham Taipei Sept2004
Nordin Malaysia
B4 Gusmeroli
Wsis Alf C7 Unctad
Ecommerce
Documentation Set Up
S719a
Mea1

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
VCE English Exam - Section C Student Revision Booklet
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Structure & Organelles in detailed.
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Institutional Correction lecture only . . .
PPTX
master seminar digital applications in india
PDF
RMMM.pdf make it easy to upload and study
Renaissance Architecture: A Journey from Faith to Humanism
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
Abdominal Access Techniques with Prof. Dr. R K Mishra
VCE English Exam - Section C Student Revision Booklet
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Microbial diseases, their pathogenesis and prophylaxis
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Module 4: Burden of Disease Tutorial Slides S2 2025
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Supply Chain Operations Speaking Notes -ICLT Program
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Structure & Organelles in detailed.
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Institutional Correction lecture only . . .
master seminar digital applications in india
RMMM.pdf make it easy to upload and study

Cybercrime

  • 1. Cyber Crime – “Is the Internet the new “ W ild W ild W est?” Prepared for the Southern Massachusetts E-Commerce Network Nov 5 2004 by Suzanne Mello www.suzannemello.com
  • 2. In the News……. 1 out of 5 children received a sexual solicitation or approach over the Internet in a one-year period of time ( www.missingchildren.com ) California warns of massive ID theft – personal data stolen from computers at University of California, Berkeley (Oct 21, 2004 IDG news service) Microsoft and Cisco announced a new initiative to work together to increase internet security (Oct 18, 2004 www.cnetnews.com )
  • 3. The New Wild Wild West More cyber criminals than cyber cops Criminals feel “safe” committing crimes from the privacy of their own homes Brand new challenges facing law enforcement Most not trained in the technologies Internet crimes span multiple jurisdictions Need to retrofit new crimes to existing laws
  • 4. Computer Crime Computer used to commit a crime Child porn, threatening email, assuming someone’s identity, sexual harassment, defamation, spam, phishing Computer as a target of a crime Viruses, worms, industrial espionage, software piracy, hacking
  • 5. Computer Forensics What is it? an autopsy of a computer or network to uncover digital evidence of a crime Evidence must be preserved and hold up in a court of law Growing field – Many becoming computer forensic savvy FBI, State and Local Police, IRS, Homeland Security Defense attorneys, judges and prosecutors Independent security agencies White hat or Ethical Hackers Programs offered at major universities such as URI http:// homepage.cs.uri.edu/faculty/wolfe/cf
  • 6. Uncovering Digital Evidence Smart Criminals don’t use their own computers Floppy disks Zip/Jazz disks Tapes Digital cameras Memory sticks Printers CDs PDAs Game boxes Networks Hard drives
  • 7. Digital Evidence Criminals Hide Evidence Delete their files and emails Hide their files by encryption, password protection, or embedding them in unrelated files (dll, os etc) Use Wi-Fi networks and cyber cafes to cover their tracks Forensics Uncover Evidence Restore deleted files and emails – they are still really there! Find the hidden files through complex password, encryption programs, and searching techniques Track them down through the digital trail - IP addresses to ISPs to the offender Not obvious…….it’s most likely hidden on purpose or needs to be unearthed by forensics experts
  • 8. The Crime Scene (with Computer Forensics) Similar to traditional crime scenes Must acquire the evidence while preserving the integrity of the evidence No damage during collection, transportation, or storage Document everything Collect everything the first time Establish a chain of custody But also different……. Can perform analysis of evidence on exact copy! Make many copies and investigate them without touching original Can use time stamping/hash code techniques to prove evidence hasn’t been compromised
  • 9. Top Cyber Crimes that Attack Business Spam Viruses/Worms Industrial Espionage and Hackers Wi-Fi High Jacking
  • 10. Spam “ Spam accounts for 9 out of every 10 emails in the United States.” MessageLabs, Inc., an email management and security company based in New York. “ We do not object to the use of this slang term to describe UCE (unsolicited commercial email), although we do object to the use of the word “spam” as a trademark and the use of our product image in association with that term” www.hormel.com
  • 11. Can-Spam Act of 2003 Controlling the Assault of Non-Solicited Pornography and Marketing Act (Can-Spam) Signed into law by President Bush on Dec 16, 2003 Took effect Jan 1, 2004 Unsolicited commercial email must: Be labeled Include Opt-Out instructions No false headers FTC is authorized (but not required) to establish a “do-not-email” registry www.spamlaws.com –lists all the latest in federal, state, and international laws
  • 12. Spam is Hostile You pay for Spam, not Spammers Email costs are paid by email recipients Spam can be dangerous Never click on the opt-out link! May take you to hostile web site where mouse-over downloads an .exe Tells spammers they found a working address They won’t take you off the list anyway What should you do? Filter it out whenever possible Keep filters up to date If you get it, just delete the email
  • 13. Viruses and Worms Different types of “ailments” Viruses software that piggybacks on other software and runs when you run something else Macro in excel, word Transmitted through sharing programs on bulletin boards Passing around floppy disks An .exe, .com file in your email Worms software that uses computer networks to find security holes to get in to your computer – usually in Microsoft OS!! But worm for MAC was recently written
  • 14. Hackers are Everywhere Stealing data Industrial Espionage Identity theft Defamation Deleting data for fun A lot of bored 16 year olds late at night Turning computers into zombies To commit crimes Take down networks Distribute porn Harass someone Ethical/white hat hackers exist too Help break into networks to prevent crimes Mafia Boy
  • 15. Wireless Fidelity (Wi-Fi) Using antennas to create “hot spots” Hotspots – Internet Access (sometimes free) Newport Harbor - All the boats in Harbor have internet access San Francisco Giants Stadium – Surf the web while catching a game UMass (need to register, but it’s free) Cambridge, MA Philadelphia, PA – just announced – entire city by 2006
  • 16. Wi-Fi High Jacking 60-70% wireless networks are wide open Why are the Wi-Fi networks unprotected? Most people say “Our data is boring” But… criminals look for wireless networks to commit their crimes And… the authorities will come knocking on your door…..
  • 17. Protect your Computers! Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown sources Use hard-to-guess passwords. Don’t use words found in a dictionary. Remember that password cracking tools exist Back-up your computer data on disks or CDs often Don't share access to your computers with strangers If you have a wi-fi network, password protect it Disconnect from the Internet when not in use Reevaluate your security on a regular basis Make sure your employees and family members know this info too!
  • 19. Web sites of Interest http:// homepage.cs.uri.edu/faculty/wolfe/cf www.missingchildren.com www.spamlaws.com www.netsmartz.org http://www.ifccfbi.gov - operation web snare – latest cyber crimes to be aware of http://www.dcfl.gov/dc3/home.htm http://www.cops.org/