Chapter 1-Fundamentals of Cyber Crime - PRESENTATION
Chapter 1-Fundamentals of Cyber Crime - PRESENTATION
Faculty of Sciences
Department of Computer Science
Module: Cybercrime
Chapter 1: Fundamentals of Cyber
crime
L.GOUDJIL
2022-2023
Chapter 1: Fundamentals of Cybercrime
3. Terrestrial 1.Cybercrime
1. Definition of 2.Contemporary
Crimes Versus and White Collar
Cybercrime Cybercrime Cybercrimes Crime
3
I. Introduction
Digital technology and cybercrime are pervasive features of modern life.
4
II. Definition of Cybercrime
There is no universally accepte definition of Current definitions of
Cybercrime have evolved experientially.
cybercrime.Like traditional crime, Cybercrime has many different
facets and occurs in a wide variety of scenarios an environments.
5
II. Definition of Cybercrime
6
II. Definition of Cybercrime
Example
8
II. Definition of Cybercrime
Table. Organizational definitions of cybercrime.
Year Organization Definition of Cybercrime
1994 The United Nations “The United Nations manual [23] on the prevention and
control of
computer-related crime (1994) uses the terms, computer crime
and computer-related crime interchangeably. This manual did
not provide any definition” [18] (p. 116)
2000 1. “any illegal behaviour directed by means of electronic
The Tenth United Nations operations that target the security of computer systems and
Congress on the Prevention of the data processed by them.”
Crime and the Treatment of 2. “any illegal behaviour committed by means of, or in relation
Offenders to, a computer system or network, including such crimes as
illegal possession and offering or distributing information by
means of a computer system or network” [24] (p. 5
2001 “action directed against the confidentiality, integrity and
The Council of Europe availability of computer systems, networks and computer data
Cybercrime Convention as well as the misuse of such systems, networks and data by9
(also known as The providing for the criminalisation of such
Budapest Convention conduct” [25] (p. 2)
II. Definition of Cybercrime
Table. Organizational definitions of cybercrime.
Year Organization Definition of Cybercrime
2007 The Commission of “criminal acts committed using electronic
European Communities communications networks and information systems or
against such networks and systems” [26] (p. 2)
2013 Shanghai Cooperation “the use of information resources and (or) the impact
Organization (SCO) on them in the informational sphere for illegal
Agreement purposes” (cited in Malby et al. [27] (p. 15))
2013 Cybersecurity Strategy of “a broad range of different criminal activities where
the computers and information systems are involved either
European Union as a primary tool or as a primary target” [28] (p. 3)
2016 Commonwealth of “a criminal act of which the target is computer
Independent information” (cited in Akhgar et al. [29] (p. 298))
States Agreement
10
III. Cybercrime vs traditional crime?
Simply put, cyber crime is a crime committed using the means of
technology and the internet.
11
III. Cybercrime vs traditional crime?
The Scale
Attacks can be conducted on a scale not possible in the physical world. A
traditional bank robber may only be able to hit one or two banks a week, a
cyber-attack can target 100s if not 1000s of sites at once.
12
III. Cybercrime vs traditional crime?
The Reach
Attacks can be performed from anywhere in the world; they can be
performed anonymously and within jurisdictions where the consequences
of those actions may not, or cannot, be addressed by the criminal justice
system. Attackers are also able to extract far more data digitally than would
ever be possible in the physical world.
14
III. Cybercrime vs traditional crime?
Perception and media effect
There is another part of the cyber threat to be considered, the public and
media perception of cyber crime. When large financial institutions have
been hacked the media has often wholly apportioned blame to the
organisations rather than the criminals, this would not be the case in a
physical bank robbery.
15
IV. HISTORY OF CYBERCRIME
1970-1995 – Kevin Mitnick-Kevin Mitnick penetrates some of the
highest-guarded networks in the world, including Nokia and Motorola,
leveraging specialized social engineering systems, tricking insiders into
handing codes and passwords over and using codes to breach internal
operating systems.
1973 – Embezzlement-A local New York bank teller uses a machine to
embezzle more than $2 million.
1982 – The Logic Bomb The CIA blows up a Siberian gas pipeline by
injecting a code into the network and the operating system to monitor the
gas pipeline without using a bomb or a missile.
16
IV. HISTORY OF CYBERCRIME
1999 – The Melissa Virus-A virus infects Microsoft Word records,
transmitting itself via email as an attachment automatically. It mails
out to the first 50 names mentioned in the Outlook email address
box of an infected device.
2000 – Barry Schlossberg, alias Lou Cipher, successfully extort $1.4
million from CD Universe for services given to the Russian hacker
in an effort to apprehend him.
17
IV. HISTORY OF CYBERCRIME
2013-2015 – Global Bank Hack-More than 100 organizations
around the world have access to secure information from a
community of Russian-based hackers.
2015 – On Android phones, LockerPin resets the pin code and
demands $500 from victims to unlock the system, claiming
personal data leakage on up to 78.8 million current and former
users.
18
IV. HISTORY OF CYBERCRIME
2016 – DNC Email Leaks-Emails from the Democratic National
Committee were leaked to and released by WikiLeaks prior to the
2016 US presidential election.
2017 – Equifax-Equifax is compromised, revealing 143 million
customer accounts, one of the biggest US credit bureaus. Social
Security numbers, birth dates, addresses, driver’s license numbers,
and certain credit card numbers are part of the confidential leaked
info.
19
V. Contemporary Cybercrime
20
V. Contemporary Cybercrime
five-category typology described in Marcum and Higgins
21
VI. Who investigates cyber crime?
1. The victim
2. The victim's system and network security team.
3. Private investigators.
4. Law enforcement with jurisdiction.
5. Reporters
6. Sociologists
7. Threat intelligence vendors
8. Cybersecurity companies 22
VII. White-Collar Crime
26
VII. Types of White Collar Crime
Corporate Fraud
Corporate fraud can damage the economy as well as investor
confidence, the FBI points out. Many corporate fraud cases are
committed in finance or accounting. The goal is to mislead investors,
auditors, and other stakeholders about the financial success of a
company. This is done through manipulation of data, share price, and
other measures of financial health. Types of corporate fraud include:
Falsification of financial information
Self-dealing by corporate insiders
27
VII. Types of White Collar Crime
Corporate Fraud
Falsification of financial information
Self-dealing by corporate insiders
28
VII. Types of White Collar Crime
Securities and Commodities Fraud
This is carried out through forging documents
altering account statements,
illegal trading
29
VII. Types of White Collar Crime
Money Laundering
They might launder their money through real estate
ventures,
international trade,
financial institutions
30