cyber-crime-1209117260149121-8

Embed Size (px)

Citation preview

  • 8/20/2019 cyber-crime-1209117260149121-8

    1/19

    Cyber Crime – “Is theCyber Crime – “Is theInternet the new “Internet the new “W W ildild

    W W ildild W W est?”est?”Prepared for the Southern MassachusettsPrepared for the Southern Massachusetts

    E-Commerce etwor!E-Commerce etwor!

    o" # $%%&o" # $%%&byby

    Su'anne MelloSu'anne Mello

    www.suzannemello.comwww.suzannemello.com

  • 8/20/2019 cyber-crime-1209117260149121-8

    2/19

      E-Commerce etwor! - Su'

    -

    In the ews(()In the ews(()

    1 out of 5 children received a1 out of 5 children received asexual solicitation or approachsexual solicitation or approachover the Internet in a one-yearover the Internet in a one-year period of time (  period of time ( www.missingchildren.comwww.missingchildren.com ) )

    California warns of massive ICalifornia warns of massive Itheft ! personal data stolen fromtheft ! personal data stolen fromcomputers at "niversity ofcomputers at "niversity ofCalifornia# $er%eley (&ct '1# 'California# $er%eley (&ct '1# 'I* news service)I* news service)

    +icrosoft and Cisco announced a+icrosoft and Cisco announced anew initiative to wor% together tonew initiative to wor% together toincrease internet securityincrease internet security(&ct 1,# '(&ct 1,# ' www.cnetnews.comwww.cnetnews.com ) )

    http://www.missingchildren.com/http://www.missingchildren.com/http://www.cnetnews.com/http://www.cnetnews.com/http://www.cnetnews.com/http://www.missingchildren.com/

  • 8/20/2019 cyber-crime-1209117260149121-8

    3/19

      E-Commerce etwor! - Su'

    -

    *he ew +ild +ild +est*he ew +ild +ild +est

    More cyber criminals thanMore cyber criminals thancyber copscyber cops

    Criminals feel “safe”Criminals feel “safe”committin, crimes fromcommittin, crimes from

    the pri"acy of their ownthe pri"acy of their ownhomeshomes

    rand new challen,esrand new challen,esfacin, law enforcementfacin, law enforcement Most not trained in theMost not trained in the

    technolo,iestechnolo,ies Internet crimes spanInternet crimes span

    multiple .urisdictionsmultiple .urisdictions eed to retrofit new crimeseed to retrofit new crimes

    to e/istin, lawsto e/istin, laws

  • 8/20/2019 cyber-crime-1209117260149121-8

    4/19

      E-Commerce etwor! - Su'

    -

    Computer CrimeComputer Crime

    Computer used to commitComputer used to commit

    a crimea crime Child porn0 threatenin,Child porn0 threatenin,

    email0 assumin, someone1semail0 assumin, someone1s

    identity0 se/ual harassment0identity0 se/ual harassment0

    defamation0 spam0 phishin,defamation0 spam0 phishin,

    Computer as a tar,et of aComputer as a tar,et of acrimecrime  2iruses0 worms0 industrial2iruses0 worms0 industrial

    espiona,e0 software piracy0espiona,e0 software piracy0

    hac!in,hac!in,

  • 8/20/2019 cyber-crime-1209117260149121-8

    5/19

      E-Commerce etwor! - Su'

    -

    Computer 3orensicsComputer 3orensics

    +hat is it?+hat is it? an autopsy of a computer or networ! toan autopsy of a computer or networ! to

    unco"er di,ital e"idence of a crimeunco"er di,ital e"idence of a crime E"idence must be preser"ed and hold upE"idence must be preser"ed and hold up

    in a court of lawin a court of law

    4rowin, field – Many becomin,4rowin, field – Many becomin,computer forensic sa""ycomputer forensic sa""y 3I0 State and 5ocal Police0 I6S03I0 State and 5ocal Police0 I6S0

    7omeland Security7omeland Security 8efense attorneys0 .ud,es and8efense attorneys0 .ud,es and

    prosecutorsprosecutors Independent security a,enciesIndependent security a,encies +hite hat or Ethical 7ac!ers+hite hat or Ethical 7ac!ers Pro,rams offered at ma.or uni"ersitiesPro,rams offered at ma.or uni"ersities

    such as 96Isuch as 96Ihttp:;;http:;;homepa,e)cs)uri)edu;faculty;wolfe;cf homepa,e)cs)uri)edu;faculty;wolfe;cf 

    http://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cf

  • 8/20/2019 cyber-crime-1209117260149121-8

    6/19

      E-Commerce etwor! - Su'

    -

    9nco"erin, 8i,ital E"idence9nco"erin, 8i,ital E"idence

    Smart Criminals don’t use theirSmart Criminals don’t use theirown computersown computers

    3loppy dis!s3loppy dis!s

    s4ame bo/es4ame bo/es

    etwor!setwor!s

    7ard dri"es7ard dri"es

  • 8/20/2019 cyber-crime-1209117260149121-8

    7/19

      E-Commerce etwor! - Su'

    -

    8i,ital E"idence8i,ital E"idence

    Criminals 7ide E"idenceCriminals 7ide E"idence

    8elete their files and emails8elete their files and emails

    7ide their files by encryption07ide their files by encryption0password protection0 orpassword protection0 or

    embeddin, them in unrelatedembeddin, them in unrelatedfiles dll0 os etc@files dll0 os etc@

    9se +i-3i networ!s and cyber9se +i-3i networ!s and cybercafes to co"er their trac!scafes to co"er their trac!s

    3orensics 9nco"er E"idence3orensics 9nco"er E"idence 

    6estore deleted files and emails –6estore deleted files and emails –they are still really thereAthey are still really thereA

    3ind the hidden files throu,h3ind the hidden files throu,hcomple/ password0 encryptioncomple/ password0 encryption

    pro,rams0 and searchin,pro,rams0 and searchin,techniBuestechniBues

    *rac! them down throu,h the*rac! them down throu,h thedi,ital trail - IP addresses to ISPsdi,ital trail - IP addresses to ISPsto the offender to the offender 

    Not obvious…….it’s most likely hidden on purposeor needs to be unearthed by forensics experts

  • 8/20/2019 cyber-crime-1209117260149121-8

    8/19

      E-Commerce etwor! - Su'

    -

    *he Crime Scene*he Crime Scene(with Computer orensics)(with Computer orensics)

    Similar to traditional crime scenesSimilar to traditional crime scenes

    Must acBuire the e"idence whileMust acBuire the e"idence whilepreser"in, the inte,rity of the e"idencepreser"in, the inte,rity of the e"idence

    o dama,e durin, collection0o dama,e durin, collection0transportation0 or stora,etransportation0 or stora,e

    8ocument e"erythin,8ocument e"erythin,

    Collect e"erythin, the first timeCollect e"erythin, the first time

    Establish a chain of custodyEstablish a chain of custody

    ut also different(()ut also different(()

    Can perform analysis of e"idence onCan perform analysis of e"idence one/act copyAe/act copyA

    Ma!e many copies and in"esti,ateMa!e many copies and in"esti,atethem without touchin, ori,inalthem without touchin, ori,inal

    Can use time stampin,;hash codeCan use time stampin,;hash codetechniBues to pro"e e"idence hasn1ttechniBues to pro"e e"idence hasn1tbeen compromisedbeen compromised

  • 8/20/2019 cyber-crime-1209117260149121-8

    9/19

    *op Cyber Crimes that*op Cyber Crimes that

     >ttac! usiness >ttac! usinessSpamSpam

    2iruses;+orms2iruses;+orms

    Industrial Espiona,e and 7ac!ersIndustrial Espiona,e and 7ac!ers

    +i-3i 7i,h =ac!in,+i-3i 7i,h =ac!in,

  • 8/20/2019 cyber-crime-1209117260149121-8

    10/19

      E-Commerce etwor! - Su'

    -

    SpamSpam

    ““Spam accounts for out of e"ery D%Spam accounts for out of e"ery D%emails in the 9nited States)”emails in the 9nited States)”

    +essagea/s# Inc.# an email management+essagea/s# Inc.# an email managementand security company /ased in 0ewand security company /ased in 0ewor%.or%. 

    2 2 3e do not o/4ect to the use of this slang3e do not o/4ect to the use of this slangterm to descri/e "C (unsolicitedterm to descri/e "C (unsolicitedcommercial email)# although we docommercial email)# although we doo/4ect to the use of the word 2spam6 aso/4ect to the use of the word 2spam6 asa trademar% and the use of our producta trademar% and the use of our product

    image in association with that term6image in association with that term6www.hormel.comwww.hormel.com

    http://www.hormel.com/http://www.hormel.com/http://www.hormel.com/

  • 8/20/2019 cyber-crime-1209117260149121-8

    11/19

      E-Commerce etwor! - Su'

    -

    Can-Spam >ct of $%%Can-Spam >ct of $%%

    Controllin, the >ssault of on-Solicited Porno,raphy and Mar!etin,Controllin, the >ssault of on-Solicited Porno,raphy and Mar!etin, >ct Can-Spam@ >ct Can-Spam@

    Si,ned into law by President ush on 8ec DF0 $%%Si,ned into law by President ush on 8ec DF0 $%% *oo! effect =an D0 $%%&*oo! effect =an D0 $%%&

    9nsolicited commercial email must:9nsolicited commercial email must: e labelede labeled Include Gpt-Gut instructionsInclude Gpt-Gut instructions o false headerso false headers

    3*C is authori'ed but not reBuired@ to establish a “do-not-email”3*C is authori'ed but not reBuired@ to establish a “do-not-email”re,istryre,istry

    www)spamlaws)comwww)spamlaws)com –lists all the latest in federal0 state0 and –lists all the latest in federal0 state0 andinternational lawsinternational laws

    http://www.spamlaws.com/http://www.spamlaws.com/http://www.spamlaws.com/

  • 8/20/2019 cyber-crime-1209117260149121-8

    12/19

      Su'anne Mello - o" # $

    Spam is 7ostileSpam is 7ostile

    Hou pay for Spam0 not SpammersHou pay for Spam0 not Spammers Email costs are paid by emailEmail costs are paid by email

    recipientsrecipients

    Spam can be dan,erousSpam can be dan,erous e"er clic! on the opt-out lin!Ae"er clic! on the opt-out lin!A

    May ta!e you to hostile web siteMay ta!e you to hostile web sitewhere mouse-o"er downloadswhere mouse-o"er downloads

    an )e/ean )e/e

    *ells spammers they found a*ells spammers they found a

    wor!in, addresswor!in, address

    *hey won1t ta!e you off the list*hey won1t ta!e you off the list

    anywayanyway+hat should you do?+hat should you do? 3ilter it out whene"er possible3ilter it out whene"er possible

    eep filters up to dateeep filters up to date

    If you ,et it0 .ust delete the emailIf you ,et it0 .ust delete the email

  • 8/20/2019 cyber-crime-1209117260149121-8

    13/19

      E-Commerce etwor! - Su'

    -

    2iruses and +orms2iruses and +orms

    8ifferent types of “ailments”8ifferent types of “ailments”

    2iruses2iruses software that pi,,ybac!s onsoftware that pi,,ybac!s on

    other software and runs whenother software and runs whenyou run somethin, elseyou run somethin, else

    Macro in e/cel0 wordMacro in e/cel0 word*ransmitted throu,h sharin,*ransmitted throu,h sharin,pro,rams on bulletin boardspro,rams on bulletin boards

    Passin, around floppy dis!sPassin, around floppy dis!s  >n )e/e0 )com file in your email >n )e/e0 )com file in your email

    +orms+orms software that uses computersoftware that uses computer

    networ!s to find security holesnetwor!s to find security holesto ,et in to your computer –to ,et in to your computer –usually in Microsoft GSAA utusually in Microsoft GSAA utworm for M>C was recentlyworm for M>C was recentlywrittenwritten

  • 8/20/2019 cyber-crime-1209117260149121-8

    14/19

      E-Commerce etwor! - Su'-

    7ac!ers are E"erywhere7ac!ers are E"erywhere

    Stealin, dataStealin, data Industrial Espiona,eIndustrial Espiona,e Identity theftIdentity theft 8efamation8efamation

    8eletin, data for fun8eletin, data for fun  > lot of bored DF year olds late at > lot of bored DF year olds late at

    ni,htni,ht

    *urnin, computers into 'ombies*urnin, computers into 'ombies *o commit crimes*o commit crimes *a!e down networ!s*a!e down networ!s 8istribute porn8istribute porn

    7arass someone7arass someoneEthical;white hat hac!ers e/ist tooEthical;white hat hac!ers e/ist too 7elp brea! into networ!s to7elp brea! into networ!s to

    pre"ent crimespre"ent crimes

    Mafia oy

  • 8/20/2019 cyber-crime-1209117260149121-8

    15/19

      E-Commerce etwor! - Su'-

    +ireless 3idelity +i-3i@+ireless 3idelity +i-3i@

    9sin, antennas to create “hot spots”9sin, antennas to create “hot spots”

    7otspots – Internet >ccess sometimes free@7otspots – Internet >ccess sometimes free@ ewport 7arbor - >ll the boats in 7arbor ha"e internet accessewport 7arbor - >ll the boats in 7arbor ha"e internet access

    San 3rancisco 4iants Stadium – Surf the web while catchin, aSan 3rancisco 4iants Stadium – Surf the web while catchin, a,ame,ame

    9Mass need to re,ister0 but it1s free@9Mass need to re,ister0 but it1s free@

    Cambrid,e0 M>Cambrid,e0 M>

    Philadelphia0 P> – .ust announced – entire city by $%%FPhiladelphia0 P> – .ust announced – entire city by $%%F

  • 8/20/2019 cyber-crime-1209117260149121-8

    16/19

      E-Commerce etwor! - Su'-

    +i-3i 7i,h =ac!in,+i-3i 7i,h =ac!in,

    F%-J%K wireless networ!s are wide openF%-J%K wireless networ!s are wide open

    +hy are the +i-3i networ!s unprotected?+hy are the +i-3i networ!s unprotected? Most people say “Gur data is borin,”Most people say “Gur data is borin,”

    ut( criminals loo! for wireless networ!s to commitut( criminals loo! for wireless networ!s to commit

    their crimestheir crimes

     >nd( the authorities will come !noc!in, on your >nd( the authorities will come !noc!in, on yourdoor())door())

  • 8/20/2019 cyber-crime-1209117260149121-8

    17/19

      E-Commerce etwor! - Su'-

    Protect your ComputersAProtect your ComputersA

    Use anti-virus software andUse anti-virus software andrewalls - keep them up to daterewalls - keep them up to date

    Keep your operating system upKeep your operating system upto date with critical securityto date with critical securityupdates and patchesupdates and patches

    Don't open emails orDon't open emails orattachments from unknownattachments from unknownsourcessources

    Use hard-to-guess passwords.Use hard-to-guess passwords.Don’t use words found in aDon’t use words found in a

    dictionary. Rememer thatdictionary. Rememer thatpassword cracking tools e!istpassword cracking tools e!ist

    "ack-up your computer data on"ack-up your computer data ondisks or #Ds oftendisks or #Ds often

    Don't share access to yourDon't share access to yourcomputers with strangerscomputers with strangers

    $f $f  you have a wi- network%you have a wi- network%password protect itpassword protect it

    Disconnect from the $nternetDisconnect from the $nternetwhen not in usewhen not in use

    Reevaluate your security on aReevaluate your security on aregular asisregular asis

    &ake sure your employees&ake sure your employeesand family memers knowand family memers knowthis info toothis info too

  • 8/20/2019 cyber-crime-1209117260149121-8

    18/19

    *han! youA*han! youA

  • 8/20/2019 cyber-crime-1209117260149121-8

    19/19

      E-Commerce etwor! - Su'

    +eb sites of Interest+eb sites of Interest

    http:;;http:;;homepa,e)cs)uri)edu;faculty;wolfe;cf homepa,e)cs)uri)edu;faculty;wolfe;cf 

    www)missin,children)comwww)missin,children)com

    www)spamlaws)comwww)spamlaws)com 

    www)netsmart')or,www)netsmart')or,http:;;www)ifccfbi),o"http:;;www)ifccfbi),o"  - operation web snare – latest- operation web snare – latest

    cyber crimes to be aware of cyber crimes to be aware of 

    http:;;www)dcfl),o";dc;home)htmhttp:;;www)dcfl),o";dc;home)htm

    http:;;www)cops)or,;http:;;www)cops)or,;

    http://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cfhttp://www.missingchildren.com/http://www.missingchildren.com/http://www.spamlaws.com/http://www.spamlaws.com/http://www.ifccfbi.gov/http://www.ifccfbi.gov/http://www.dcfl.gov/dc3/home.htmhttp://www.dcfl.gov/dc3/home.htmhttp://www.dcfl.gov/dc3/home.htmhttp://www.ifccfbi.gov/http://www.spamlaws.com/http://www.missingchildren.com/http://homepage.cs.uri.edu/faculty/wolfe/cfhttp://homepage.cs.uri.edu/faculty/wolfe/cf