View
230
Download
1
Category
Tags:
Preview:
Citation preview
Chapter 14
© 2004 Pearson Education, Inc.
Technology and
Crime
© 2004 Pearson Education, Inc.
Used by both crime fighters and lawbreakers
Technology and Crime
© 2004 Pearson Education, Inc.
• Early use of telephones for scams
Technology and Crime
• Getaway cars for escape
© 2004 Pearson Education, Inc.
High tech criminals seek illegitimate access to computerized information and digital databases
Technology and Crime
© 2004 Pearson Education, Inc.
Direct accessDirect access
Office workers or corporate spies violate positions of trust, gain entry, and steal data during business hours
Technology and Crime
© 2004 Pearson Education, Inc.
Computer trespassComputer trespass
Remote access to targeted machines to gain information and copy programs
Technology and Crime
© 2004 Pearson Education, Inc.
• Hackers
• Computer viruses
• Software piracy
Technology and CrimeComputer trespassComputer trespass
© 2004 Pearson Education, Inc.
Computer CrimeComputer Crime
Any violation of a federal or state computer crime statute
Technology and Crime
© 2004 Pearson Education, Inc.
Forms of Software PiracyForms of Software Piracy
• Softlifting• Internet piracy• Software counterfeiting• OEM unbundling• Hard disk loading• Renting
Technology and Crime
© 2004 Pearson Education, Inc.
Computer Crime and the Law
All states and the federal government have developed computer-crime statutes specifically applicable to…
© 2004 Pearson Education, Inc.
…invasive activities aimed at illegally accessing stored information
Computer Crime and the Law
© 2004 Pearson Education, Inc.
Computer Crime and the Law
Ambiguities in existing computer-crime
laws, complicated by rapid changes
in technology,…© 2004 Pearson Education, Inc.
…can make it difficult even to tell that a crime has occurred
Computer Crime and the Law
© 2004 Pearson Education, Inc.
Computer Criminals
HackerHacker
• Male, aged 16-25, lives in the United States
• Computer user, not programmer
© 2004 Pearson Education, Inc.
Hacks with software written by others
Computer Criminals
HackerHacker
© 2004 Pearson Education, Inc.
Primary motivation is togain access toWeb sites andcomputernetworks, but…
Computer Criminals
HackerHacker
© 2004 Pearson Education, Inc.
…not to profit financially
Computer Criminals
HackerHacker
© 2004 Pearson Education, Inc.
• Pioneers are fascinated by evolving technology and explore out of genuine curiosity
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
• Scamps hack with a sense of fun and typically intend no overt harm
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
• Explorers delight in the discoveries associated with breaking into new computer systems
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
• Game players enjoy defeating software or systemic protections against intrusion
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
• Vandals are malicious hackers who cause deliberate damage with no apparent personal gain
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
• Addicts are classic “nerds” addicted to hacking and computer technology
Computer Criminals
Hacker ClassificationsHacker Classifications
© 2004 Pearson Education, Inc.
Share common behavior-related issues and other similarities with computer criminals, including…
Computer Criminals
White-collar CriminalsWhite-collar Criminals
© 2004 Pearson Education, Inc.
• Commonly use nonviolent means and employment- related knowledge or technical skills to commit their crimes
Computer Criminals
White-collar CriminalsWhite-collar Criminals
© 2004 Pearson Education, Inc.
• Often manipulate information to create profits or losses
• Can work alone, in groups, or in organizations
Computer Criminals
White-collar CriminalsWhite-collar Criminals
© 2004 Pearson Education, Inc.
• Often commit crimes that
are hard to detect, and that
cause large losses of
money and other resources
Computer Criminals
White-collar CriminalsWhite-collar Criminals
© 2004 Pearson Education, Inc.
• Are often found out by accident, and tend to be viewed by the general public as having committed offenses that are less serious than violent offenses
Computer Criminals
White-collar CriminalsWhite-collar Criminals
© 2004 Pearson Education, Inc.
Information Superhighway
Information is the lifeblood of today’s economy© 2004 Pearson Education, Inc.
• Most valuable resource of the new age
• Of great strategic importance
Information Superhighway
© 2004 Pearson Education, Inc.
• A new tool for wrongdoers to commit crimes
• Potential to reach vast audiences
Information Superhighway
© 2004 Pearson Education, Inc.
Technology and Crime
Fight against CrimeFight against Crime
Traffic radar’s laser speed measuring apparatus
28 mph
© 2004 Pearson Education, Inc.
Fight against CrimeFight against Crime
• Computer databases of known offenders
• Public access to sex offender databases
Technology and Crime
© 2004 Pearson Education, Inc.
Technology and Crime
Fight against CrimeFight against Crime
• Cellular communications
• Electronic eavesdropping
• DNA analysis
• Less than lethal weapons© 2004 Pearson Education, Inc.
DNA (Deoxyribonucleic acid)DNA (Deoxyribonucleic acid)
The genetic code which is unique to each individual
Technology and Crime
© 2004 Pearson Education, Inc.
DNA Fingerprinting
May be obtained from blood, hair, semen, saliva, or flakes of skin left at a crime scene
© 2004 Pearson Education, Inc.
• Long lasting
• Highly reliable forensic tool
DNA FingerprintingDNADNA
© 2004 Pearson Education, Inc.
DNA Fingerprinting
Many states and the federal government have begun building digitized forensic DNA databases
DNADNA
© 2004 Pearson Education, Inc.
Has been called the “most important technological breakthrough of 20th century science”
DNA FingerprintingDNADNA
© 2004 Pearson Education, Inc.
Technology and Crime
Computer crimeComputer crime
Threat (risk) analysis involves a complete and thorough assessment of the kinds of perils facing an organization
© 2004 Pearson Education, Inc.
Allows identification of risks and development of plans to effectively deal with them
Technology and Crime
Threat AnalysisThreat Analysis
© 2004 Pearson Education, Inc.
• A powerful and useful tool
• Requires training of state and local police
Technology and Crime
Audit TrailAudit Trail
© 2004 Pearson Education, Inc.
Three sanctions against computer criminals
Technology and Crime
© 2004 Pearson Education, Inc.
• Confiscate equipment used to commit a computer crime
• Limit the offender’s use of computers
Technology and Crime
© 2004 Pearson Education, Inc.
Restrict the offender’s
freedom to accept employment
involving computers
Technology and Crime
© 2004 Pearson Education, Inc.
Recommended