SlideShare a Scribd company logo
Computer Crime Scope of the problem
Computer Crime: Background In 1991, a business firm in the U.S. was 8 times more likely to be the victim of a crime than an individual living in the U.S.  Economic crime cost American businesses $128 billion.
Computer Crime: Background The accounting firm of Ernst & Young estimates that computer-related crime cost U.S. businesses about $3 billion to $5 billion a year in losses. Other researchers put the total loss figure as high as $40 billion if losses from Viruses and Software Piracy are included.
Computer Crime: Background Only 6% to 11% of computer crime is reported. Of this segment, only 2% of the cases resulted in a conviction requiring any jail time. Less than a dozen computer criminals nationwide have served any time.
Computer Crime: Background Average insured losses resulting from exploitation and tampering of computer systems are in the range of $500,000 - $600,000.
Computer Crime: Background 75% to 80% of all computer crime is traceable to trusted insiders who had legitimate computer access, and/or knowledge of how operational procedures could be manipulated to their financial benefit.
Computer Crime: Background Key motivational factors driving insider actions are: - lax security - revenge aimed at management.
Computer Crime: Background Average bank robber: $5K / 90% / 7 yrs hard time vs. Computer criminal: $600K / 2%/ 2 yrs min. security
Computer Crime: Background Normal computer crime takes less than one second to pull off, and is usually done from  another state or foreign country.
Computer Crime: Background A 1989 study by the National Center for Computer Crime Data of 3,500 companies found an average loss of $110,000, 365 man-hours, and 26 hours of computer time for each computer crime event discovered. 70% of all events involved theft of money or services.
Computer Crime: Background When a computer criminal is caught, it is "because such a large sum of money is taken that even the most ill-prepared system will note the anomaly."   (Donn Parker. SRI computer crime expert)
Computer Crime: Background "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than a bomb." "To date, we have been remarkably lucky... Unfortunately, there is reason to believe that our luck will soon run out."
Computer Crime: Background "The committee is concerned that the development of legislation and case law is being outpaced by the growth of technology and changes in our society."  (Source: Computers At Risk, National Research Council, 1991)
Computer Crime: Insider Examples Stanley Mark Rifkin hits Security Pacific Bank for  $10.2 million using EFT passwords he observed pasted to terminals in the money transfer room of the bank. ('78)
Computer Crime: Insider Examples A New York brokerage firm disables the audit trail on their computer system to speed up operations. Shortly after, a clerk disappears to Switzerland with an estimated $28.8 million. ('86)
Computer Crime: Insider Examples The computer program that Volkswagen of West Germany used to control its international finance operations was altered so that 5 high-level executives got away with $260 million. No charges filed, but all fired! ('87)
Computer Crime: Insider Examples A London bank releases a press statement claiming their banks are not vulnerable to fraud the same day 4 persons are arrested with 1,864 valid, but forged, ATM cards in their possession. ('87)
Computer Crime: Insider Examples  Seven New York men use stolen EFT codes to  embezzle S70 million from the bank accounts of  Merrill-Lynch and United Airlines. They are caught only after they cause Merrill-Lynch's account to be overdrawn. ('88)
Computer Crime: Insider Examples A Delaware state lottery computer system  malfunctions, allowing unscrupulous lottery vendors to help themselves to $555,000 in winning tickets after the numbers had already been drawn. ('89)
Computer Crime: Insider Examples The Washington State prison system suspends a  program where inmates were allowed to keep PCs in their cells, citing security issues after one prison's main computer system experienced unusual problems. ('89)
Computer Crime: Insider Examples 18 inmates working as data entry operators at the Tennessee State Prison guess the password to a payroll system and give themselves raises ranging from $20 to $500 a month. ('90)
Computer Crime: Insider Examples U.S. Attorney's Office in Kentucky sells computer at surplus auction for $45, and then realizes that 7 years worth of data on Federal Agents and Witness Protection participants were not erased. ('90)
Computer Crime: Insider Examples Laptop computer is stolen from Wing Commander of British military. On the laptop were classified plans for Persian Gulf war. Returned 4 days later in the mail. ('91)
Computer Crime: Insider Examples Four Cal Poly University students are arrested after charging $250,000 in goods to MasterCard and Visa cards. They gained access to Equifax, and copied some 1,600 credit reports. They then used the good credit-card numbers to re-program the magnetic data on stolen credit cards. They did this from a laptop in their car. ('91)
Computer Crime: Hacker History The term "hacking" was coined by members of the MIT Railroad Club in the mid 1960s. Back then, "hacker" was a term used to show respect for someone's technical expertise. "Hands on imperative" became the Golden Rule.
Computer Crime: Hacker History Today, "Hacking" is described by some as the art of young, anti-social males who are arrogant and obsessive. They have hyperactive imaginations that drive them to explore the world of cyberspace, usually returning with other people's money. The goal of today s hacker is to make the rules, not follow them.
Computer Crime: Hacker Profile Profile of a typical hacker is a white or Asian male,  age 14 to 20, with average to below-average grades, an introvert who does not relate well to even his peers, has no father in the home, and has a personal life that is severely disorganized.
Computer Crime: Hacker Profile Hackers will spend 200 to 300 hours a month on the phone exchanging messages with other hackers, as well as trying to gain entry to computer systems world wide.
Computer Crime: Malicious Hackers AF-OSI nabs 14 year old for hacking into computers at the Pentagon and downloading several unclassified documents. Use of an "800" number allowed him to be traced. ('89)
Computer Crime: Malicious Hackers Kevin Mitnick, the "Darth Vader of Hackers,"  hacks into DEC and copies the security software (loss, $4 million) they use to protect their systems. When arrested, he had 16 stolen MCI codes in his possession. He also shut down 911 service in California ('89)
Computer Crime: Malicious Hackers  Republican Party staff member from New Jersey hacks into the Democratic Party computer system and copies confidential files. Files showed that state workers were using state time for campaign work. ('90)
Computer Crime: Malicious Hackers The Legion of Doom is credited with planting a virus in the AT&T Switching Network. The system was down for 9 hours. 25 million long distance phone calls get busy signal.  (Jan 15, 1990 - MLK holiday)
Computer Crime: Malicious Hackers Johnson Space Center denies it has lost $12 million over two years due to abuse of their phone system. One stolen access code was distributed to hundreds of hackers. ('90)
Computer Crime: Malicious Hackers Leslie Lynne Douchette (AKA, Kyrie), ring-leader of nationwide group of hackers, is sentenced to 27 months. Losses directly tied to her pivot on 481 MCI access codes in her possession that accounted for S595,000 in long-distance phone fraud. ('90)
Computer Crime: Malicious Hackers "Hacker Heaven": Belgium, Greece, Italy and the Netherlands. As of August 1991, they had no laws that made unauthorized access/tampering of computers a crime.
Computer Crime: Malicious Hackers U.S. vendor of secure modems issues challenge to hackers: "Hack into my system and I will give you cash reward." 8,000 hackers tried. ('91)
Computer Crime: Viruses & Worms A "virus" is software that hides itself inside of other legitimate software programs. A virus can not exist on its own, it requires a host. A "worm" is software, which does not hide itself in other programs, but rather is self-sufficient, stand-alone code.
Computer Crime: Viruses & Worms The goal of both viruses and worms is to replicate themselves. They may, or may-not trigger on some external event that causes them to be annoying or destructive.
Computer Crime: Viruses & Worms Of the 1,000 or so core viruses known to researchers, we only know the origin of about 40%. Most common origins: Minnesota, Italy, and Bulgaria.
Computer Crime: Viruses & Worms The public attitude toward viruses is changing. They are now seen as a bizarre form of industrial sabotage, rather than a technological version of a practical joke.
Computer Crime: Viruses & Worms "Christmas Tree" virus forces IBM to shut down 350,000 internal communications networks world- wide for nearly three days to permit location and removal of the virus. ('87)
Computer Crime: Viruses & Worms The Internet Unix worm, written by Robert Morris, caused 6,200 computer systems to crash, it took 1 million hours to repair the damage, at an estimated cost of $97 million.
Computer Crime: Viruses & Worms Convicted, Morris could have gotten five years and a $250,000 fine, but instead a U.S. District Court Judge gave him  400 hours  of community service, a  $10,000 fine  and  3 years probation . ('88)
Computer Crime: Viruses & Worms A survey of 200 businesses in the U.S. found that 25% hat been hit with a virus. ('90) A survey of 950 businesses in England revealed that 50% had been hit with a virus. ('90)
Computer Crime: Viruses & Worms One of the most common viruses, the "Friday the 13th," was written by a programmer in the Middle East as a protest against the 40-year anniversary of the founding of Israel.
Computer Crime: Pedophiles Pedophiles are increasingly using microcomputers and BBS technology to share child pornography and to identify potential victims. The ability of microcomputers to display high-resolution graphics makes them ideal vehicles for the distribution of child pornography. The BBS networks give pedophile's anonymity and make them difficult to track.
Computer Crime: Pedophiles Medford, Massachusetts Police raided a child pornography video operation and discovered a major computer BBS network. There were over 1,000 users on the system from across the U.S. , and many international users. (‘90)
Computer Crime: Pedophiles Alameda County, California District Attorney’s Office prosecuted two males on pedophilia-related charges after an investigation revealed the suspects were running a travel service for pedophiles to Thailand. The contact information was kept in Casio databank watches. (‘86)
Computer Crime: Pedophiles The pedophile victim profile is very similar to the computer hacker profile, making electronic networks a fertile hunting ground for pedophiles.
Computer Crime: Pedophiles Mr. Roger Deitz of Fremont, California told newspapers and TV stations that he posed as a 13 year old homosexual male and was able to make contact with 20 - 30 pedophiles using America  On-Line service. The service is assisting the FBI in a subsequent investigation but does not monitor private E-Mail. (New York Times 3/92)
Computer Crime: Pedophiles A San Jose, California detective posing as a pedophile on a BBS system was solicited by pedophiles Dean Lambey and Daniel Depew to participate in a kidnapping and "snuff flick" of a 12-year-old. FBI officials arrested both Lambey and Depew when they made an overt act to further the conspiracy. (Los Angeles Times 10/91)
Data Diddling Simplest Safest Most Common Method Used in discovered Cases Involves changing Data Before or During Input Process Can Be accomplished by anyone having access to the data
Data Diddling: Attack Points Creating  Recording  Transporting  Encoding  Examination Checking Converting Transforming
Data Diddling: Examples Counterfeiting Documents Exchanging Valid computer tapes, cards, disks with prepared replacements Source data entry procedure violations (entering wrong data)
Data diddling: Detection Transaction Participant: Data comparison Data Preparers: Document Validation Source data suppliers: Manual controls
Trojan horse: Definition The covert placement of computer instructions in a program so that the computer will perform unauthorized functions. But usually still will allow the basic program to perform its intended purpose
Trojan horse: Common method for prevention or detection Typical business application program can consist of 100,000 + instructions Operating system can consist of 5 to 6 million instructions Poor system documentation and maintenance practices aids perpetrators
Trojan horse: Detection Programmers: Program code comparisons
Trojan horse: Sources  Employees Vendor programs Contract programmers User community
Salami Technique: Definition Theft of small amounts of assets from a larger number of sources Individual losses small and often unnoticed Requires a large amount of accounts be accessible to the perpetrator Random selection of target accounts reduces detection probability
Salami Technique:  Most common targets Savings accounts Margin accounts Mortgage accounts Trust accounts Payroll Most common method used is the round down
Salami Technique: Detection Programmers: Application test User community: Detailed data analysis Former employees: Program comparisons Contractors: Transaction audits Vendors: Financial status of possible suspect
Superzapping A program that permits the user to bypass all normal system controls. It makes possible the disclosure and/or modification of any program or data resident in the system.
Trap Doors/Back doors Computer instructions (part of a program) that allows users to access the program and/or data without initializing the program in the normal fashion. (Go in the back door)
Logic bomb Special unauthorized instruction imbedded in computer routines that determine process conditions or system status.
Scavenging: Definition Obtaining information that may be resident in or around a computer system
Scavenging: Sources Discarded listings Carbon paper Source documents Scratch paper Company Phone books

More Related Content

PDF
Utilizing Internet for Fraud Examination and Investigation
PPT
2009 10 21 Rajgoel Trends In Financial Crimes
PDF
SEO2India - Cyber crime
PDF
Cyber crime and security
PDF
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
PPT
Computer crime (1)
PPTX
What constitutes a cyber crime in the country
PPT
Cyber crime
Utilizing Internet for Fraud Examination and Investigation
2009 10 21 Rajgoel Trends In Financial Crimes
SEO2India - Cyber crime
Cyber crime and security
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Computer crime (1)
What constitutes a cyber crime in the country
Cyber crime

What's hot (20)

PDF
Cyber Fraud and Risk Management By Bolaji Bankole
PPTX
Cyber-crime PPT
DOCX
Cyber security and threats
PPT
Email crimes and Cyber Law-Nasscom Cyber safe 2010
DOCX
87161911 selected-case-studies-on-cyber-crime
DOC
Assignment of cyber crimes for oumh1203
PPTX
12 c business i environment i society mba 2016
PDF
Computer and Cyber forensics, a case study of Ghana
PPTX
Cyber crime
PPT
Cyber Wars And Cyber Terrorism
ODP
Cyber crime law libreoffice
PPTX
Cyber crime and issues
PPTX
Rajveer choudhary cyber crime presentation
DOCX
Shilpa
PDF
Cyber law
PDF
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
PPTX
Lesson iv on fraud awareness (cyber frauds)
PPTX
Lesson iv on fraud awareness (cyber frauds)
PPTX
Cyber warfare ss
DOC
Cyber Fraud
Cyber Fraud and Risk Management By Bolaji Bankole
Cyber-crime PPT
Cyber security and threats
Email crimes and Cyber Law-Nasscom Cyber safe 2010
87161911 selected-case-studies-on-cyber-crime
Assignment of cyber crimes for oumh1203
12 c business i environment i society mba 2016
Computer and Cyber forensics, a case study of Ghana
Cyber crime
Cyber Wars And Cyber Terrorism
Cyber crime law libreoffice
Cyber crime and issues
Rajveer choudhary cyber crime presentation
Shilpa
Cyber law
Computer Security,Types of Hackers,Installation of Kali Linux, Common Keywords
Lesson iv on fraud awareness (cyber frauds)
Lesson iv on fraud awareness (cyber frauds)
Cyber warfare ss
Cyber Fraud
Ad

Viewers also liked (12)

PPTX
Legal500
PDF
Secure Wall - how should companies protect themselves from cyber crime?
PDF
Tackling Financial Crime through Business Process Management
PDF
The International Comparative Legal Guide to: Business Crime 2017
DOCX
Business Crime Research Assignment FC
PPT
PDF
Global Economic Crime Survey
PPTX
Crime in the Business World
PPT
Chapter 2 Criminology
PDF
The International Comparative Legal Guide to Business Crime 2016
PDF
Bribery and Corruption
PDF
eCrime-report-2011-accessible
Legal500
Secure Wall - how should companies protect themselves from cyber crime?
Tackling Financial Crime through Business Process Management
The International Comparative Legal Guide to: Business Crime 2017
Business Crime Research Assignment FC
Global Economic Crime Survey
Crime in the Business World
Chapter 2 Criminology
The International Comparative Legal Guide to Business Crime 2016
Bribery and Corruption
eCrime-report-2011-accessible
Ad

Similar to L Scope (20)

PPT
Security and privacy
PPTX
Chap11
PPT
Chap11
PPT
Hacking
PPT
Security and privacy
PPT
css ppt.ppt
PDF
Computer crimes
PPTX
Hacker risks presentation to ACFE PR Chapter
PPT
Cyber Crime
PPTX
Managing and securing the enterprise
PPT
Presentation1
PPTX
Week_7.pptx Computer science topic 7 Notes
PPT
PPT
Hackers
PPT
Hackers
PPT
Computer security and_privacy_2010-2011
PPT
How to become Hackers .
PPT
Hackers Cracker Network Intruder
PPT
Security and privacy
Chap11
Chap11
Hacking
Security and privacy
css ppt.ppt
Computer crimes
Hacker risks presentation to ACFE PR Chapter
Cyber Crime
Managing and securing the enterprise
Presentation1
Week_7.pptx Computer science topic 7 Notes
Hackers
Hackers
Computer security and_privacy_2010-2011
How to become Hackers .
Hackers Cracker Network Intruder

More from CTIN (20)

PPTX
Mounting virtual hard drives
PPTX
Open Source Forensics
PDF
Encase V7 Presented by Guidance Software august 2011
PDF
Windows 7 forensics -overview-r3
PDF
Windows 7 forensics event logs-dtl-r3
PPTX
Msra 2011 windows7 forensics-troyla
PPTX
Windows 7 forensics thumbnail-dtl-r4
PPTX
Windows 7 forensics jump lists-rv3-public
PPTX
Time Stamp Analysis of Windows Systems
PPT
Vista Forensics
PPT
Mac Forensics
PPT
Nra
PPT
Live Forensics
PPT
Translating Geek To Attorneys It Security
PPT
Edrm
PPT
Computer Searchs, Electronic Communication, Computer Trespass
PPT
CyberCrime
PPT
Search Warrants
PPT
Part6 Private Sector Concerns
PDF
Sadfe2007
Mounting virtual hard drives
Open Source Forensics
Encase V7 Presented by Guidance Software august 2011
Windows 7 forensics -overview-r3
Windows 7 forensics event logs-dtl-r3
Msra 2011 windows7 forensics-troyla
Windows 7 forensics thumbnail-dtl-r4
Windows 7 forensics jump lists-rv3-public
Time Stamp Analysis of Windows Systems
Vista Forensics
Mac Forensics
Nra
Live Forensics
Translating Geek To Attorneys It Security
Edrm
Computer Searchs, Electronic Communication, Computer Trespass
CyberCrime
Search Warrants
Part6 Private Sector Concerns
Sadfe2007

Recently uploaded (20)

PPTX
Introduction to Customs (June 2025) v1.pptx
PDF
caregiving tools.pdf...........................
PPTX
Understanding-Economic-Growth in macro..
PDF
Blockchain Pesa Research by Samuel Mefane
PPTX
Session 14-16. Capital Structure Theories.pptx
PDF
Is Retirement Income a Three Dimensional (3-D) problem_ What is the differenc...
PDF
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
PPTX
EABDM Slides for Indifference curve.pptx
PPTX
What is next for the Fractional CFO - August 2025
PPTX
Introduction to Essence of Indian traditional knowledge.pptx
PPTX
4.5.1 Financial Governance_Appropriation & Finance.pptx
PPTX
Who’s winning the race to be the world’s first trillionaire.pptx
PDF
Predicting Customer Bankruptcy Using Machine Learning Algorithm research pape...
PDF
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
PPTX
Globalization-of-Religion. Contemporary World
PDF
Copia de Minimal 3D Technology Consulting Presentation.pdf
PDF
Understanding University Research Expenditures (1)_compressed.pdf
PDF
Bladex Earnings Call Presentation 2Q2025
PDF
Dialnet-DynamicHedgingOfPricesOfNaturalGasInMexico-8788871.pdf
PPTX
Unilever_Financial_Analysis_Presentation.pptx
Introduction to Customs (June 2025) v1.pptx
caregiving tools.pdf...........................
Understanding-Economic-Growth in macro..
Blockchain Pesa Research by Samuel Mefane
Session 14-16. Capital Structure Theories.pptx
Is Retirement Income a Three Dimensional (3-D) problem_ What is the differenc...
Why Ignoring Passive Income for Retirees Could Cost You Big.pdf
EABDM Slides for Indifference curve.pptx
What is next for the Fractional CFO - August 2025
Introduction to Essence of Indian traditional knowledge.pptx
4.5.1 Financial Governance_Appropriation & Finance.pptx
Who’s winning the race to be the world’s first trillionaire.pptx
Predicting Customer Bankruptcy Using Machine Learning Algorithm research pape...
Dr Tran Quoc Bao the first Vietnamese speaker at GITEX DigiHealth Conference ...
Globalization-of-Religion. Contemporary World
Copia de Minimal 3D Technology Consulting Presentation.pdf
Understanding University Research Expenditures (1)_compressed.pdf
Bladex Earnings Call Presentation 2Q2025
Dialnet-DynamicHedgingOfPricesOfNaturalGasInMexico-8788871.pdf
Unilever_Financial_Analysis_Presentation.pptx

L Scope

  • 1. Computer Crime Scope of the problem
  • 2. Computer Crime: Background In 1991, a business firm in the U.S. was 8 times more likely to be the victim of a crime than an individual living in the U.S. Economic crime cost American businesses $128 billion.
  • 3. Computer Crime: Background The accounting firm of Ernst & Young estimates that computer-related crime cost U.S. businesses about $3 billion to $5 billion a year in losses. Other researchers put the total loss figure as high as $40 billion if losses from Viruses and Software Piracy are included.
  • 4. Computer Crime: Background Only 6% to 11% of computer crime is reported. Of this segment, only 2% of the cases resulted in a conviction requiring any jail time. Less than a dozen computer criminals nationwide have served any time.
  • 5. Computer Crime: Background Average insured losses resulting from exploitation and tampering of computer systems are in the range of $500,000 - $600,000.
  • 6. Computer Crime: Background 75% to 80% of all computer crime is traceable to trusted insiders who had legitimate computer access, and/or knowledge of how operational procedures could be manipulated to their financial benefit.
  • 7. Computer Crime: Background Key motivational factors driving insider actions are: - lax security - revenge aimed at management.
  • 8. Computer Crime: Background Average bank robber: $5K / 90% / 7 yrs hard time vs. Computer criminal: $600K / 2%/ 2 yrs min. security
  • 9. Computer Crime: Background Normal computer crime takes less than one second to pull off, and is usually done from another state or foreign country.
  • 10. Computer Crime: Background A 1989 study by the National Center for Computer Crime Data of 3,500 companies found an average loss of $110,000, 365 man-hours, and 26 hours of computer time for each computer crime event discovered. 70% of all events involved theft of money or services.
  • 11. Computer Crime: Background When a computer criminal is caught, it is "because such a large sum of money is taken that even the most ill-prepared system will note the anomaly." (Donn Parker. SRI computer crime expert)
  • 12. Computer Crime: Background "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may be able to do more damage with a keyboard than a bomb." "To date, we have been remarkably lucky... Unfortunately, there is reason to believe that our luck will soon run out."
  • 13. Computer Crime: Background "The committee is concerned that the development of legislation and case law is being outpaced by the growth of technology and changes in our society." (Source: Computers At Risk, National Research Council, 1991)
  • 14. Computer Crime: Insider Examples Stanley Mark Rifkin hits Security Pacific Bank for $10.2 million using EFT passwords he observed pasted to terminals in the money transfer room of the bank. ('78)
  • 15. Computer Crime: Insider Examples A New York brokerage firm disables the audit trail on their computer system to speed up operations. Shortly after, a clerk disappears to Switzerland with an estimated $28.8 million. ('86)
  • 16. Computer Crime: Insider Examples The computer program that Volkswagen of West Germany used to control its international finance operations was altered so that 5 high-level executives got away with $260 million. No charges filed, but all fired! ('87)
  • 17. Computer Crime: Insider Examples A London bank releases a press statement claiming their banks are not vulnerable to fraud the same day 4 persons are arrested with 1,864 valid, but forged, ATM cards in their possession. ('87)
  • 18. Computer Crime: Insider Examples Seven New York men use stolen EFT codes to embezzle S70 million from the bank accounts of Merrill-Lynch and United Airlines. They are caught only after they cause Merrill-Lynch's account to be overdrawn. ('88)
  • 19. Computer Crime: Insider Examples A Delaware state lottery computer system malfunctions, allowing unscrupulous lottery vendors to help themselves to $555,000 in winning tickets after the numbers had already been drawn. ('89)
  • 20. Computer Crime: Insider Examples The Washington State prison system suspends a program where inmates were allowed to keep PCs in their cells, citing security issues after one prison's main computer system experienced unusual problems. ('89)
  • 21. Computer Crime: Insider Examples 18 inmates working as data entry operators at the Tennessee State Prison guess the password to a payroll system and give themselves raises ranging from $20 to $500 a month. ('90)
  • 22. Computer Crime: Insider Examples U.S. Attorney's Office in Kentucky sells computer at surplus auction for $45, and then realizes that 7 years worth of data on Federal Agents and Witness Protection participants were not erased. ('90)
  • 23. Computer Crime: Insider Examples Laptop computer is stolen from Wing Commander of British military. On the laptop were classified plans for Persian Gulf war. Returned 4 days later in the mail. ('91)
  • 24. Computer Crime: Insider Examples Four Cal Poly University students are arrested after charging $250,000 in goods to MasterCard and Visa cards. They gained access to Equifax, and copied some 1,600 credit reports. They then used the good credit-card numbers to re-program the magnetic data on stolen credit cards. They did this from a laptop in their car. ('91)
  • 25. Computer Crime: Hacker History The term "hacking" was coined by members of the MIT Railroad Club in the mid 1960s. Back then, "hacker" was a term used to show respect for someone's technical expertise. "Hands on imperative" became the Golden Rule.
  • 26. Computer Crime: Hacker History Today, "Hacking" is described by some as the art of young, anti-social males who are arrogant and obsessive. They have hyperactive imaginations that drive them to explore the world of cyberspace, usually returning with other people's money. The goal of today s hacker is to make the rules, not follow them.
  • 27. Computer Crime: Hacker Profile Profile of a typical hacker is a white or Asian male, age 14 to 20, with average to below-average grades, an introvert who does not relate well to even his peers, has no father in the home, and has a personal life that is severely disorganized.
  • 28. Computer Crime: Hacker Profile Hackers will spend 200 to 300 hours a month on the phone exchanging messages with other hackers, as well as trying to gain entry to computer systems world wide.
  • 29. Computer Crime: Malicious Hackers AF-OSI nabs 14 year old for hacking into computers at the Pentagon and downloading several unclassified documents. Use of an "800" number allowed him to be traced. ('89)
  • 30. Computer Crime: Malicious Hackers Kevin Mitnick, the "Darth Vader of Hackers," hacks into DEC and copies the security software (loss, $4 million) they use to protect their systems. When arrested, he had 16 stolen MCI codes in his possession. He also shut down 911 service in California ('89)
  • 31. Computer Crime: Malicious Hackers Republican Party staff member from New Jersey hacks into the Democratic Party computer system and copies confidential files. Files showed that state workers were using state time for campaign work. ('90)
  • 32. Computer Crime: Malicious Hackers The Legion of Doom is credited with planting a virus in the AT&T Switching Network. The system was down for 9 hours. 25 million long distance phone calls get busy signal. (Jan 15, 1990 - MLK holiday)
  • 33. Computer Crime: Malicious Hackers Johnson Space Center denies it has lost $12 million over two years due to abuse of their phone system. One stolen access code was distributed to hundreds of hackers. ('90)
  • 34. Computer Crime: Malicious Hackers Leslie Lynne Douchette (AKA, Kyrie), ring-leader of nationwide group of hackers, is sentenced to 27 months. Losses directly tied to her pivot on 481 MCI access codes in her possession that accounted for S595,000 in long-distance phone fraud. ('90)
  • 35. Computer Crime: Malicious Hackers "Hacker Heaven": Belgium, Greece, Italy and the Netherlands. As of August 1991, they had no laws that made unauthorized access/tampering of computers a crime.
  • 36. Computer Crime: Malicious Hackers U.S. vendor of secure modems issues challenge to hackers: "Hack into my system and I will give you cash reward." 8,000 hackers tried. ('91)
  • 37. Computer Crime: Viruses & Worms A "virus" is software that hides itself inside of other legitimate software programs. A virus can not exist on its own, it requires a host. A "worm" is software, which does not hide itself in other programs, but rather is self-sufficient, stand-alone code.
  • 38. Computer Crime: Viruses & Worms The goal of both viruses and worms is to replicate themselves. They may, or may-not trigger on some external event that causes them to be annoying or destructive.
  • 39. Computer Crime: Viruses & Worms Of the 1,000 or so core viruses known to researchers, we only know the origin of about 40%. Most common origins: Minnesota, Italy, and Bulgaria.
  • 40. Computer Crime: Viruses & Worms The public attitude toward viruses is changing. They are now seen as a bizarre form of industrial sabotage, rather than a technological version of a practical joke.
  • 41. Computer Crime: Viruses & Worms "Christmas Tree" virus forces IBM to shut down 350,000 internal communications networks world- wide for nearly three days to permit location and removal of the virus. ('87)
  • 42. Computer Crime: Viruses & Worms The Internet Unix worm, written by Robert Morris, caused 6,200 computer systems to crash, it took 1 million hours to repair the damage, at an estimated cost of $97 million.
  • 43. Computer Crime: Viruses & Worms Convicted, Morris could have gotten five years and a $250,000 fine, but instead a U.S. District Court Judge gave him 400 hours of community service, a $10,000 fine and 3 years probation . ('88)
  • 44. Computer Crime: Viruses & Worms A survey of 200 businesses in the U.S. found that 25% hat been hit with a virus. ('90) A survey of 950 businesses in England revealed that 50% had been hit with a virus. ('90)
  • 45. Computer Crime: Viruses & Worms One of the most common viruses, the "Friday the 13th," was written by a programmer in the Middle East as a protest against the 40-year anniversary of the founding of Israel.
  • 46. Computer Crime: Pedophiles Pedophiles are increasingly using microcomputers and BBS technology to share child pornography and to identify potential victims. The ability of microcomputers to display high-resolution graphics makes them ideal vehicles for the distribution of child pornography. The BBS networks give pedophile's anonymity and make them difficult to track.
  • 47. Computer Crime: Pedophiles Medford, Massachusetts Police raided a child pornography video operation and discovered a major computer BBS network. There were over 1,000 users on the system from across the U.S. , and many international users. (‘90)
  • 48. Computer Crime: Pedophiles Alameda County, California District Attorney’s Office prosecuted two males on pedophilia-related charges after an investigation revealed the suspects were running a travel service for pedophiles to Thailand. The contact information was kept in Casio databank watches. (‘86)
  • 49. Computer Crime: Pedophiles The pedophile victim profile is very similar to the computer hacker profile, making electronic networks a fertile hunting ground for pedophiles.
  • 50. Computer Crime: Pedophiles Mr. Roger Deitz of Fremont, California told newspapers and TV stations that he posed as a 13 year old homosexual male and was able to make contact with 20 - 30 pedophiles using America On-Line service. The service is assisting the FBI in a subsequent investigation but does not monitor private E-Mail. (New York Times 3/92)
  • 51. Computer Crime: Pedophiles A San Jose, California detective posing as a pedophile on a BBS system was solicited by pedophiles Dean Lambey and Daniel Depew to participate in a kidnapping and "snuff flick" of a 12-year-old. FBI officials arrested both Lambey and Depew when they made an overt act to further the conspiracy. (Los Angeles Times 10/91)
  • 52. Data Diddling Simplest Safest Most Common Method Used in discovered Cases Involves changing Data Before or During Input Process Can Be accomplished by anyone having access to the data
  • 53. Data Diddling: Attack Points Creating Recording Transporting Encoding Examination Checking Converting Transforming
  • 54. Data Diddling: Examples Counterfeiting Documents Exchanging Valid computer tapes, cards, disks with prepared replacements Source data entry procedure violations (entering wrong data)
  • 55. Data diddling: Detection Transaction Participant: Data comparison Data Preparers: Document Validation Source data suppliers: Manual controls
  • 56. Trojan horse: Definition The covert placement of computer instructions in a program so that the computer will perform unauthorized functions. But usually still will allow the basic program to perform its intended purpose
  • 57. Trojan horse: Common method for prevention or detection Typical business application program can consist of 100,000 + instructions Operating system can consist of 5 to 6 million instructions Poor system documentation and maintenance practices aids perpetrators
  • 58. Trojan horse: Detection Programmers: Program code comparisons
  • 59. Trojan horse: Sources Employees Vendor programs Contract programmers User community
  • 60. Salami Technique: Definition Theft of small amounts of assets from a larger number of sources Individual losses small and often unnoticed Requires a large amount of accounts be accessible to the perpetrator Random selection of target accounts reduces detection probability
  • 61. Salami Technique: Most common targets Savings accounts Margin accounts Mortgage accounts Trust accounts Payroll Most common method used is the round down
  • 62. Salami Technique: Detection Programmers: Application test User community: Detailed data analysis Former employees: Program comparisons Contractors: Transaction audits Vendors: Financial status of possible suspect
  • 63. Superzapping A program that permits the user to bypass all normal system controls. It makes possible the disclosure and/or modification of any program or data resident in the system.
  • 64. Trap Doors/Back doors Computer instructions (part of a program) that allows users to access the program and/or data without initializing the program in the normal fashion. (Go in the back door)
  • 65. Logic bomb Special unauthorized instruction imbedded in computer routines that determine process conditions or system status.
  • 66. Scavenging: Definition Obtaining information that may be resident in or around a computer system
  • 67. Scavenging: Sources Discarded listings Carbon paper Source documents Scratch paper Company Phone books

Editor's Notes

  • #2: File Name: Scope.ppt This presentation provides the student with an overview of the computer crime problem.