Computer crime involves illegal activities related to computers and networks. Crimes can involve actively using computers to commit offenses like hacking or sabotage, or passively using computers for crimes like recording illegal weapons dealings. Some computer crimes are old crimes transformed, like espionage or theft, while others are new like hacking into networks. Reasons for underreporting computer crimes include fear of bad publicity, lack of confidence in authorities, and public perception that computer crimes are not serious. Computer abuse involves sending offensive messages, while computer fraud aims to manipulate systems for illicit gain through activities like credit card or telecommunications fraud. Hackers may break into systems for challenges, money or sabotage using techniques like password guessing. Viruses, worms, Tro
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
59 views20 pages
04 MID Computer Crime
Computer crime involves illegal activities related to computers and networks. Crimes can involve actively using computers to commit offenses like hacking or sabotage, or passively using computers for crimes like recording illegal weapons dealings. Some computer crimes are old crimes transformed, like espionage or theft, while others are new like hacking into networks. Reasons for underreporting computer crimes include fear of bad publicity, lack of confidence in authorities, and public perception that computer crimes are not serious. Computer abuse involves sending offensive messages, while computer fraud aims to manipulate systems for illicit gain through activities like credit card or telecommunications fraud. Hackers may break into systems for challenges, money or sabotage using techniques like password guessing. Viruses, worms, Tro
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20
Computer Crime
The illegal activities related to computers and computer
networks are usually classified as computer crime. The computer can be involved either actively (computer-assisted crime), when the computer is used to commit the crime (computer sabotage and hacking), or passively (computer-related crime), when the computer is used indirectly to commit the crime (e.g., record data for an illegal weapon dealing). Some computer crimes are transformations of old crimes, such as espionage, theft, fraud and sabotage; others are entirely new kinds of crimes, such as trespassing in computer networks, cyberterrorism, and computer sabotage Non-Reported Computer Crime Fear of bad publicity and reputation Lack of confidence that the authorities will apprehend the computer criminals Lack of specialised personnel to investigate computer crimes Ignorance of rights Ignorance of who is in charge in these cases Publicising computer crime will bring new ideas and methods of attacks Prosecutions are expensive, investigations are time- consuming and the sentences often light The existing laws are monolithic to computer technology, and most juries do not regard computer crimes as serious crimes because jury members in general lack the technical knowledge necessary to appreciate the severity of the crime Computer Abuse
Computer abuse: the use of computer systems
to perform irresponsible or unacceptable acts such as sending electronic messages with offensive language or pornographic material and spam (unsolicited or illegal electronic messages sent automatically to bulk recipients, usually for advertisement). Who are the computer criminals?
Computer criminals can be either
insiders or outsiders. Where insiders are individuals coming from within the company or the organisation where the criminal act takes place, such as employees, managers, supervisors, computer staff, clerks and cashiers, outsiders such as skilful hackers and terrorist groups have no direct relationship with the place of crime. Motivations
Computer criminals are usually driven by the
desire to win easy money steal goods to enjoy themselves by fooling the system to sabotage other people and machines to take revenge for personal reasons to perform acts of terrorism to produce propagandistic messages and revolutionary actions. Targets
The usual victims of
computer criminals are Big companies Institutions Organisations Governments Computer Fraud
Computer fraud includes any technique aimed at manipulating
information within a computer system for the purpose of illicit gain. It is divided into computer-related fraud, in which the computer is used unintentionally to commit the fraud, and computer-assisted fraud, in which the computer is used actively to commit the fraud. Computer fraud involve: theft of money (e.g., unauthorised transfer of payments to different accounts); theft of information (e.g., retrieval of data from databases for illegal use); theft of goods (e.g., redirection of goods to wrong destinations); and theft of services (e.g., illegal use of a cable TV channel) Forms of Computer Fraud ATM fraud: the fraudster uses automated teller machines EFT fraud: the fraudster uses the Electronic Fund Transfer system (EFT) EDI fraud: the fraudster uses the Electronic Data Interchange system (EDI) Credit card fraud: the fraudster steals the credit card number and the owner’s authentication. Telecommunication fraud: involves (1) long distance phone fraud and (2) mobile phone fraud. The latter is also known as cloning. Cable TV fraud: the fraudster decodes illegally the signal of a cable- TV channel. Telemarketing fraud: the fraudster redirects telemarketing goods to wrong addresses or sells fake telemarketing products to unsuspecting customers. Internet Stock fraud: the fraudster pretends to be an investment expert. Hackers and Hacking
Skilful programmers, usually referred to as
intruders or hackers, can gain unauthorised access, or break-in, to computers and computer networks. Hackers can either act directly, by penetrating the system themselves, or indirectly, by embedding a destructive program within the system that causes serious damage or problems to the machine. Categories Hacker is just to a skilful programmer who is obsessive about programming Cracker is a person who gains unauthorised access to a computer system for malicious purposes Phreak (‘phone’, ‘free’, and ‘freak’) is a person that gains illegal access to telephone services and use these services to satisfy individual goals. Cypherpunker is an intruder who wishes to create new regions of privacy where ‘the system’ will not be able to invade. Hactivist is the use of hacking by hackers for political purposes such as promoting a political cause or spreading anti-war messages via the Web. Kevin Mitnick
The most typical example a hacker
persona is that of Kevin Mitnick. He was accused of hacking the computer systems of international companies such as Motorola and Nokia and governmental agencies such as the North American Aerospace Defence Command and the FBI. He was arrested by the FBI in September 1995 and remained in prison until January 2000. He was under supervision until January 2003, and during this period he was prohibited in the use of any telecommunication technology Cyberpunk
The rebellious personality of a
hacker is actually portrayed in the cyberpunk movement. The term cyberpunk was made famous by William Gibson’s bestselling novel Neuromancer (published in 1984). A cyberpunker is a fictitious countercultural personality of a rebellious hacker who lives in a high-tech future, within a dystopian and dehumanised society integrated by computers and computer networks. Hacking Techniques Piggybacking: the hacker invades a computer system by pretending to be a legitimate user of the network. Scavenging: the hacker searches through stray data for clues that might unlock the secrets of a targeted computer system. A similar technique is known as dumpster diving, wherein the hacker searches electronic garbage in order to find discarded documentation that may include user names and passwords. Password guessing: the hacker aims just to crack the password. Autodialing: the hacker systematically dials with his/her computer until answered by the computer on the other side of the line. Zapping: The hacker penetrates a computer system by unlocking the master key to its program, then self-destroying it by activating its own emergency program. Computer Sabotage
The computer saboteurs create
tiny but destructive programs that cause serious hardware and/or software problems in a computer system, such as deleting files in the hard disk, destabilising the computer system, clogging up mail servers by sending fake e-mails to the address found in the address book of the victim, and stealing information from the computer of the victim and sending this information back to the saboteur. Viruses
Viruses: By analogy to a ‘biological virus’, a ‘computer
virus’ is a self-replicating program reproduced by attaching executable copies of itself to other programs. The effects of a virus may range from irritating messages to complete destruction of the system. A virus cannot run independently. The most common type of viruses are: (1) boot sector viruses: infects the system boot and spreads whenever the system is loaded; (2) e-mail viruses: spread through e-mail attachments; and (3) macro viruses: spread through documents that contain macros—programming instructions that perform automated tasks. Worms
Worms: A worm is a virus-like program that makes copies of
itself across network connections, seeking uninfected workstations in which to reproduce. In contrast to a computer virus, a worm program can travel independently through different hosts and resides more in the computer memory of a system rather than on disk. The aim of a typical worm is through continued reproductions to cause disk or memory overload throughout the network. Inevitably, the network freezes and the system has to be reloaded; this process causes complete loss of memory data that have not been saved on disk. On the other hand, the consequences of a worm are not as destructive as that of a virus. A worm is a memory virus; thus it can be removed by shutting down the infected system. Trojan Horses
Trojan Horses: A Trojan horse is a destructive program
disguised to appear as something benign. The name of this malicious program comes from the famous wooden horse of the Trojan War that the Greeks left as a gift to the Trojans. The horse was full of Greek armed forces that caused the fall of Troy from when released into the city at the right moment. Likewise, the electronic version of the Trojan horse resides in the code of a program until the moment of its activation. The conditions of activation are determined by the computer programmer who designed the program. A Trojan horse is usually posted through the Internet disguised as a harmless program, game, or utility. Trojan horses are also used to exchange secret information between hackers. Some Trojan horses release other malicious programs such as viruses or worms. Bombs
Logic Bombs and Time Bombs: Logic Bombs and Time
Bombs are kinds of Trojan horses. A Logic Bomb inserts secretly into a system and causes a destructive action when a certain logical event or a sequence of events happens (i.e., if program x runs, then do destructive action y). Similarly, a Time Bomb is triggered after a particular time-related event (i.e., if program x runs after date y, then do the destructive action z). Frequently, a logic bomb or a time bomb is an act of vengeance. For example, a programmer who is unfairly removed from his or her post may plant a time bomb to be triggered after the date of his or her removal. Spyware
Spyware: A spyware is a type of
surveillance program that is inserted into a computer system in order to monitor, store, and analyse the electronic transmissions of the system. A spyware is not itself a destructive program. In some cases, spywares are used for security reasons. Fighting Computer Crime
Three different approaches are
suggested to prevent computer crime: (1) computer security and management; (2) appropriate legislation, policies, and standards; and (3) education and moral awareness.