Lesson 1 - Overview of Cybercrime
Lesson 1 - Overview of Cybercrime
CYBERCRIME
Lesson 1
TECHNOLOGICAL
DEFEATISM
a belief that, since a given
technology is here to stay,
there's nothing we can do
about it other than get on
with it and simply adjust our
norms.
EVGENY MOROZOV
What is
Cyber
Crime?
CYBERCRIME
Cybercrime is an act that violates the
law, which is perpetrated using
information and communication
technology (ICT) to either target
networks, systems, data, websites
and/or technology or facilitate a
crime (e.g., Goodman, and Brenner,
2002; Wall, 2007; Wilson, 2008; ITU,
2012; Maras, 2014; Maras, 2016).
READ MORE
https://www.unodc.org
CYBERCRIME
While most cybercrimes are carried
out in order to generate profit for the
cybercriminals, some cybercrimes
are carried out against computers or
devices directly to damage or
disable them.
READ MORE
https://www.techtarget.com
5 BILLION
PEOPLE
around the world use the internet
today – equivalent to 63 percent of
the world’s total population.
Internet users continue to grow too,
with the latest data indicating that
the world’s connected population
grew by almost 200 million in the 12
months to April 2022.
DATAREPORTAL
https://datareportal.com
SOCIAL MEDIA-ENABLED
CYBERCRIME
is generating at least $3.25B in
global revenue annually, according
to an extensive six-month academic
study undertaken by Dr. Mike
McGuire, Senior Lecturer in
Criminology at the University of
Surrey.
READ MORE
https://www.helpnetsecurity.com
74 ZETABYTES
In 2021, the amount of data on the
internet hit 74 zetabytes.
READ MORE
https://financesonline.com
YOTTA
BYTE
History of
Cybercrime
FIRST DIGITAL
COMPUTER
PROGRAMMERS
READ MORE
https://www.phillyvoice.com
DIAL PHONES
This desk set was the first free-
standing dial telephone and was
introduced in 1919.
It began an era of rotary dial
telephone sets which would span
the rest of the 20th century.
READ MORE
http://www.arctos.com
PHONE PHREAKS
Phone hackers, aka 'phone phreaks‘,
first emerged in the US in the late
1950s and would listen to tones
emitted by phones to figure out how
calls were routed.
READ MORE
http://historyofphonephreaking.org
JOHN THOMAS DRAPER
A.K.A. CAPTAIN CRUNCH
READ MORE
https://www.mentalfloss.com
BLUE BOX
an electronic device that produces
tones used to generate the in-band
signaling tones formerly used within
the North American long-distance
telephone network to send line
status and called number
information over
voice circuits.
READ MORE
https://www.esquire.com
WHIRLWIND MACHINE
> Massachusetts Institute of Technology
(MIT)
> first computer with RAM
> first digital computer with magnetic
core RAM and real time graphics
> fastest digital computer of that time
that took up the space of 3,300
square feet
READ MORE
https://history-computer.com
ARPANET
> first computer-to-computer link was
established on ARPANET the
precursor to the internet
> Advanced Research Projects Agency
Network
> was used for projects at universities
and research laboratories in the US
> packet switching
READ MORE
https://www.thoughtco.com
FIRST PERSONAL
COMPUTER
The Altair 8800 from Micro
Instrumentation Telemetry Systems
(MITS) of Albuquerque, NM, is
considered by many to be the first
"personal computer" - a computer that
is easily affordable and obtainable.
READ MORE
https://www.oldcomputers.net
KEVIN MITNICK
READ MORE
https://cyberexperts.com
IBM PC
READ MORE
https://www.ibm.com
BULLETIN BOARD
SYSTEM (BBS)
is a computer-based electronic
community on which its members can
read and write messages, play text-
based games, and download files. They
originated in 1978 in Chicago, and their
popularity peaked around 1995, just as
the internet began to go
mainstream.
READ MORE
https://www.networkworld.com
WORLD WIDE WEB
(1995)
READ MORE
https://webfoundation.org
BROADBAND
READ MORE
https://www.whichvoip.com
WIRELESS (2000‘S)
READ MORE
https://gizmodo.com
FIRST SPAM EMAIL
READ MORE
https://www.edn.com
FIRST COMPUTER VIRUS
READ MORE
https://www.edn.com
The Nature of
Cybercrime
DRUGS
CHILD SEXUAL EXPLOITATION
MATERIAL
CYBER TOOLS AND SERVICES
CYBER TERRORISM
COUNTERFEIT GOODS
DATA THEFT
WEAPON SMUGGLING
WHAT MAKES CYBERCRIME
ATTRACTIVE?
• Lower Cost
• Force Multiplier
• Low Risk of Detection
• Lack of Laws
Wall’s (2001)
Typology of
Cybercrime
CYBERTRESPASS
Crossing boundaries into other
people’s property and/or causing
damage (e.g., hacking, defacement,
viruses)
READ MORE
READ MORE
READ MORE
READ MORE
READ MORE
https://virtualarmour.com
THE TOOLS OF THE CYBER
CRIMINALS
While there is a technical aspect of hacking
(such as creating malware or breaking into
networks), psychology also plays a role in this
illegal activity. Social engineering, where
hackers use psychology to trick unsuspecting
victims into complying with their requests,
plays a vital role in many cybersecurity attacks.
READ MORE
https://virtualarmour.com
Preventive Measures Against
Cybercrimes
• Keep the Computer System Up-to-Date
• Protect your personal information
• Install or update your Antivirus Software
• Keep your firewall turned on
• Read the fine print on website privacy policies
• Review financial statement regularly
• Secure configuration of the system
• If it seems too good to be true, it is not true
• Choose a strong password and protect it
• Turn off your computer
Policing
Cyber Crime
CHALLENGES
• Anonymity
• Attribution
• Trace back can be time consuming
• The lack of harmonized national cybercrime laws,
international standardization of evidentiary
requirements (both in terms of admissibility in a court
of law, and in terms of international state
responsibility), mutual legal assistance on cybercrime
matters, and timely collection, preservation, and
sharing of digital evidence between countries
CHALLENGES
• Technical Challenges
• Existing limited abilities of law enforcement agencies
to conduct these investigations
READ MORE
https://www.unodc.org/
Case
Studies
ONEL DE GUZMAN
JJ MARIA GENER
KATE MARTINEZ IGNACIO
Best
Practices