Upload
lesley-george
View
213
Download
0
Embed Size (px)
Citation preview
Chapter 1
Introduction to Cybercrime and Cyberterror
Copyright © 2015 Carolina Academic Press. All rights reserved.
Technology and Society
• The world has changed due to the introduction of computers and the Internet• Email, text, Facebook, etc. have changed the nature of personal
communication• Online banking and commerce have revolutionized our access
to money• Technology affords multiple avenues for remote management
of critical infrastructure
• All manner of crime and terror are now enabled in part by technology
Copyright © 2015 Carolina Academic Press. All rights reserved.
Defining Cybercrime
• Cyber-trespass– Individuals cross boundaries of computer systems
into areas where ownership has already been established• Hackers, crackers, phreakers
• Cyber-Deception/Theft– Criminal acquisitions that can occur online• Pirates, fraudsters, and hackers
Copyright © 2015 Carolina Academic Press. All rights reserved.
Wall’s Typology of Cybercrime
• Cyberporn/Obscenity– Pedophiles, pornographers• Not always criminal• Sexual services
• Cyber-violence– Violence against individuals or groups on-line• Cyber-stalking• Cyber-hate• Tech-talk
Copyright © 2015 Carolina Academic Press. All rights reserved.
Defining Cyberterrorism• One of the most inclusive definitions for cyberterror recognizes
the utility of the Internet as a communications or attack venue– The premeditated, methodological, ideologically motivated
dissemination of information, facilitation of communication, or, attack against physical targets, digital information, computer systems, and/or computer programs which is intended to cause social, financial, physical, or psychological harm to noncombatant targets and audiences for the purpose of affecting ideological, political, or social change; or any utilization of digital communication or information which facilitates such actions directly or indirectly
Copyright © 2015 Carolina Academic Press. All rights reserved.
Policing Cyberspace
• The Internet is a complex environment that is policed by multiple groups– Internet users– Internet Service Providers– Corporate Security and Industry– Non-Governmental Non-Police Organizations– Governmental Non-Police Organizations– Public Policing Agencies
Copyright © 2015 Carolina Academic Press. All rights reserved.
Local Law Enforcement
• Though multiple entities are responsible for managing and policing the Internet, local law enforcement serve as gatekeepers– Point of first contact for most victims– Act as first responders to most all crime scenes
• It is unclear how well they respond to cybercrime calls for service– Limited budgets– Limited jurisdictions– Limited Knowledge
Copyright © 2015 Carolina Academic Press. All rights reserved.
NIJ Recommendations
• The National Institute of Justice presented 10 steps needed to improve the capability of state and local law enforcement agencies to handle cybercrimes – Public awareness campaigns – Better data and reporting of these crimes – Uniform training and certification to assist law
enforcement and scientists – Onsite management assistance for task forces or
electronic crime units – Updated federal and state laws
Copyright © 2015 Carolina Academic Press. All rights reserved.
NIJ Recommendations
• The National Institute of Justice presented 10 steps needed to improve the capability of state and local law enforcement agencies to handle cybercrimes – Cooperation with the high tech industry– Special research and publications– Police management awareness and support– Investigative and forensics tools– Research on how to structure cybercrime units
Copyright © 2015 Carolina Academic Press. All rights reserved.
The full set of PowerPoint slides is available upon adoption.
Email [email protected] for more information.