10
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.

Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

Embed Size (px)

Citation preview

Page 1: Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

Chapter 1

Introduction to Cybercrime and Cyberterror

Copyright © 2015 Carolina Academic Press. All rights reserved.

Page 2: Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

Technology and Society

• The world has changed due to the introduction of computers and the Internet• Email, text, Facebook, etc. have changed the nature of personal

communication• Online banking and commerce have revolutionized our access

to money• Technology affords multiple avenues for remote management

of critical infrastructure

• All manner of crime and terror are now enabled in part by technology

Copyright © 2015 Carolina Academic Press. All rights reserved.

Page 3: Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

Defining Cybercrime

• Cyber-trespass– Individuals cross boundaries of computer systems

into areas where ownership has already been established• Hackers, crackers, phreakers

• Cyber-Deception/Theft– Criminal acquisitions that can occur online• Pirates, fraudsters, and hackers

Copyright © 2015 Carolina Academic Press. All rights reserved.

Page 4: Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

Wall’s Typology of Cybercrime

• Cyberporn/Obscenity– Pedophiles, pornographers• Not always criminal• Sexual services

• Cyber-violence– Violence against individuals or groups on-line• Cyber-stalking• Cyber-hate• Tech-talk

Copyright © 2015 Carolina Academic Press. All rights reserved.

Page 5: Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

Defining Cyberterrorism• One of the most inclusive definitions for cyberterror recognizes

the utility of the Internet as a communications or attack venue– The premeditated, methodological, ideologically motivated

dissemination of information, facilitation of communication, or, attack against physical targets, digital information, computer systems, and/or computer programs which is intended to cause social, financial, physical, or psychological harm to noncombatant targets and audiences for the purpose of affecting ideological, political, or social change; or any utilization of digital communication or information which facilitates such actions directly or indirectly

Copyright © 2015 Carolina Academic Press. All rights reserved.

Page 6: Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

Policing Cyberspace

• The Internet is a complex environment that is policed by multiple groups– Internet users– Internet Service Providers– Corporate Security and Industry– Non-Governmental Non-Police Organizations– Governmental Non-Police Organizations– Public Policing Agencies

Copyright © 2015 Carolina Academic Press. All rights reserved.

Page 7: Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

Local Law Enforcement

• Though multiple entities are responsible for managing and policing the Internet, local law enforcement serve as gatekeepers– Point of first contact for most victims– Act as first responders to most all crime scenes

• It is unclear how well they respond to cybercrime calls for service– Limited budgets– Limited jurisdictions– Limited Knowledge

Copyright © 2015 Carolina Academic Press. All rights reserved.

Page 8: Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

NIJ Recommendations

• The National Institute of Justice presented 10 steps needed to improve the capability of state and local law enforcement agencies to handle cybercrimes – Public awareness campaigns – Better data and reporting of these crimes – Uniform training and certification to assist law

enforcement and scientists – Onsite management assistance for task forces or

electronic crime units – Updated federal and state laws

Copyright © 2015 Carolina Academic Press. All rights reserved.

Page 9: Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

NIJ Recommendations

• The National Institute of Justice presented 10 steps needed to improve the capability of state and local law enforcement agencies to handle cybercrimes – Cooperation with the high tech industry– Special research and publications– Police management awareness and support– Investigative and forensics tools– Research on how to structure cybercrime units

Copyright © 2015 Carolina Academic Press. All rights reserved.

Page 10: Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved

The full set of PowerPoint slides is available upon adoption.

Email [email protected] for more information.