0% found this document useful (0 votes)
37 views

Lesson 1 - Overview of Cybercrime

This document provides an overview of cybercrime. It defines cybercrime and discusses how it has evolved with advances in technology. Some key points include: - Cybercrime involves using information and communication technology to commit crimes like data theft, fraud, and hacking. It has become more profitable with the rise of the internet and 5 billion users worldwide. - Early "cybercriminals" in the 1970s included hackers who experimented with phone systems. As personal computers and the internet emerged, new opportunities for cybercrime developed through tools like malware, spam, and digital attacks. - Challenges in policing cybercrime include the anonymity of online attacks, the complex technical investigations required, and the need for

Uploaded by

jacob tradio
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views

Lesson 1 - Overview of Cybercrime

This document provides an overview of cybercrime. It defines cybercrime and discusses how it has evolved with advances in technology. Some key points include: - Cybercrime involves using information and communication technology to commit crimes like data theft, fraud, and hacking. It has become more profitable with the rise of the internet and 5 billion users worldwide. - Early "cybercriminals" in the 1970s included hackers who experimented with phone systems. As personal computers and the internet emerged, new opportunities for cybercrime developed through tools like malware, spam, and digital attacks. - Challenges in policing cybercrime include the anonymity of online attacks, the complex technical investigations required, and the need for

Uploaded by

jacob tradio
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

OVERVIEW OF

CYBERCRIME

Lesson 1
TECHNOLOGICAL
DEFEATISM
a belief that, since a given
technology is here to stay,
there's nothing we can do
about it other than get on
with it and simply adjust our
norms.

EVGENY MOROZOV
What is
Cyber
Crime?
CYBERCRIME
Cybercrime is an act that violates the
law, which is perpetrated using
information and communication
technology (ICT) to either target
networks, systems, data, websites
and/or technology or facilitate a
crime (e.g., Goodman, and Brenner,
2002; Wall, 2007; Wilson, 2008; ITU,
2012; Maras, 2014; Maras, 2016).

READ MORE

https://www.unodc.org
CYBERCRIME
While most cybercrimes are carried
out in order to generate profit for the
cybercriminals, some cybercrimes
are carried out against computers or
devices directly to damage or
disable them.

READ MORE

https://www.techtarget.com
5 BILLION
PEOPLE
around the world use the internet
today – equivalent to 63 percent of
the world’s total population.
Internet users continue to grow too,
with the latest data indicating that
the world’s connected population
grew by almost 200 million in the 12
months to April 2022.

DATAREPORTAL

https://datareportal.com
SOCIAL MEDIA-ENABLED
CYBERCRIME
is generating at least $3.25B in
global revenue annually, according
to an extensive six-month academic
study undertaken by Dr. Mike
McGuire, Senior Lecturer in
Criminology at the University of
Surrey.

READ MORE

https://www.helpnetsecurity.com
74 ZETABYTES
In 2021, the amount of data on the
internet hit 74 zetabytes.

A zetabyte is about a trillion


gigabytes.

Gigabyte, Terabyte, Petabyte,


Exabyte, Zettabyte.

READ MORE

https://financesonline.com
YOTTA
BYTE
History of
Cybercrime
FIRST DIGITAL
COMPUTER
PROGRAMMERS

70 years ago, six Philly women


became the world's first digital
computer programmers.

READ MORE

https://www.phillyvoice.com
DIAL PHONES
This desk set was the first free-
standing dial telephone and was
introduced in 1919.
It began an era of rotary dial
telephone sets which would span
the rest of the 20th century.

READ MORE

http://www.arctos.com
PHONE PHREAKS
Phone hackers, aka 'phone phreaks‘,
first emerged in the US in the late
1950s and would listen to tones
emitted by phones to figure out how
calls were routed.

READ MORE

http://historyofphonephreaking.org
JOHN THOMAS DRAPER
A.K.A. CAPTAIN CRUNCH

sending a tone of 2600Hz using a toy


whistle over the telephone lines, it
was possible to make free calls.

READ MORE

https://www.mentalfloss.com
BLUE BOX
an electronic device that produces
tones used to generate the in-band
signaling tones formerly used within
the North American long-distance
telephone network to send line
status and called number
information over
voice circuits.

READ MORE

https://www.esquire.com
WHIRLWIND MACHINE
> Massachusetts Institute of Technology
(MIT)
> first computer with RAM
> first digital computer with magnetic
core RAM and real time graphics
> fastest digital computer of that time
that took up the space of 3,300
square feet

READ MORE

https://history-computer.com
ARPANET
> first computer-to-computer link was
established on ARPANET the
precursor to the internet
> Advanced Research Projects Agency
Network
> was used for projects at universities
and research laboratories in the US
> packet switching

READ MORE

https://www.thoughtco.com
FIRST PERSONAL
COMPUTER
The Altair 8800 from Micro
Instrumentation Telemetry Systems
(MITS) of Albuquerque, NM, is
considered by many to be the first
"personal computer" - a computer that
is easily affordable and obtainable.

READ MORE

https://www.oldcomputers.net
KEVIN MITNICK

From the 1970s until 1995 Mitnick


penetrated some of the
most highly-guarded networks in the
world, including those of Motorola
and Nokia.

READ MORE

https://cyberexperts.com
IBM PC

IBM introduced its PC in 1981 with a


folksy advertising campaign aimed
at the general public.

READ MORE

https://www.ibm.com
BULLETIN BOARD
SYSTEM (BBS)
is a computer-based electronic
community on which its members can
read and write messages, play text-
based games, and download files. They
originated in 1978 in Chicago, and their
popularity peaked around 1995, just as
the internet began to go
mainstream.

READ MORE

https://www.networkworld.com
WORLD WIDE WEB
(1995)

Sir Tim Berners-Lee invented the World


Wide Web in 1989.

READ MORE

https://webfoundation.org
BROADBAND

Since the early 2000's Broadband has


gone from strength to strength,
and available speeds have become
faster and faster.

READ MORE

https://www.whichvoip.com
WIRELESS (2000‘S)

with this type of technology, people and


other entities can communicate
over very long distances. Wireless
technology includes RF and IR waves.
RF and IR stand for radio frequency and
infrared respectively.

READ MORE

https://gizmodo.com
FIRST SPAM EMAIL

The first unsolicited bulk commercial


email (commonly known today as
“spam”) was sent by a Digital
Equipment Corp marketing
representative to every ARPANET
address on the west coast of the United
States on May 3, 1978.

READ MORE

https://www.edn.com
FIRST COMPUTER VIRUS

Richard Skrenta’s “Elk Cloner” was 400


lines long and disguised as an Apple
boot program. Described by its author
as “some dumb little practical joke,” the
virus attached itself to the Apple DOS
3.3 operating system and spread by
floppy disk on January 30, 1982.

READ MORE

https://www.edn.com
The Nature of
Cybercrime
DRUGS
CHILD SEXUAL EXPLOITATION
MATERIAL
CYBER TOOLS AND SERVICES
CYBER TERRORISM
COUNTERFEIT GOODS
DATA THEFT
WEAPON SMUGGLING
WHAT MAKES CYBERCRIME
ATTRACTIVE?
• Lower Cost
• Force Multiplier
• Low Risk of Detection
• Lack of Laws
Wall’s (2001)
Typology of
Cybercrime
CYBERTRESPASS
Crossing boundaries into other
people’s property and/or causing
damage (e.g., hacking, defacement,
viruses)

READ MORE

Cybercrimes and the Internet,


Wall, D.S. (2001)
CYBERDECEPTIONS AND
THEFTS
Stealing money, property (e.g., credit
card fraud, intellectual property
violations, aka “piracy”)

READ MORE

Cybercrimes and the Internet,


Wall, D.S. (2001)
CYBER
PORNOGRAPHY
Breaching laws on obscenity and
decency

READ MORE

Cybercrimes and the Internet,


Wall, D.S. (2001)
CYBERVIOLENCE
Doing psychological harm to or
inciting physical harm against
others, thereby breaching laws
relating to the protection of the
person (e.g., hate speech, stalking;
pp. 3–7)

READ MORE

Cybercrimes and the Internet,


Wall, D.S. (2001)
The
Cyber Criminals
Types of Cyber Criminals
1. Individuals and small criminal
groups
2. Insiders
3. Organized Criminal Organization
4. State and State Affiliated Agents
5. Hacktivist
6. Cyber terrorist
7. Script Kiddies

READ MORE

https://virtualarmour.com
THE TOOLS OF THE CYBER
CRIMINALS
While there is a technical aspect of hacking
(such as creating malware or breaking into
networks), psychology also plays a role in this
illegal activity. Social engineering, where
hackers use psychology to trick unsuspecting
victims into complying with their requests,
plays a vital role in many cybersecurity attacks.

READ MORE

https://virtualarmour.com
Preventive Measures Against
Cybercrimes
• Keep the Computer System Up-to-Date
• Protect your personal information
• Install or update your Antivirus Software
• Keep your firewall turned on
• Read the fine print on website privacy policies
• Review financial statement regularly
• Secure configuration of the system
• If it seems too good to be true, it is not true
• Choose a strong password and protect it
• Turn off your computer
Policing
Cyber Crime
CHALLENGES

• Anonymity
• Attribution
• Trace back can be time consuming
• The lack of harmonized national cybercrime laws,
international standardization of evidentiary
requirements (both in terms of admissibility in a court
of law, and in terms of international state
responsibility), mutual legal assistance on cybercrime
matters, and timely collection, preservation, and
sharing of digital evidence between countries
CHALLENGES

• Technical Challenges
• Existing limited abilities of law enforcement agencies
to conduct these investigations

READ MORE

https://www.unodc.org/
Case
Studies
ONEL DE GUZMAN
JJ MARIA GENER
KATE MARTINEZ IGNACIO
Best
Practices

You might also like