Traditional Computer Crime
Traditional Computer Crime
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 2 All Rights Reserved.
Questions of Vicinage
Lack of international cooperation –
disincentives for some countries
Perception of Anonymity – increases activity
Encryption & Steganography
Delayed detection
Judicial inconsistency
Administrative apathy
Cultural skepticism
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 3 All Rights Reserved.
cryptology – the study of secret written messages
usually of a military or diplomatic nature
Cryptography – the making or encrypting of
secret messages
May involve simple manipulation of letters – i.e. HAL
(2001:Space Odyssey) represented IBM (following
letter in the alphabet)
Cyptanalysis – the breaking or decrypting of
secret messages
Steganography – secret messages hidden from
normal view
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 4 All Rights Reserved.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 5 All Rights Reserved.
First crime unclear – theft of abacus?
First computer sabotage –destruction of
Jacquard’s automated textile machine (early
19th century)
Theft of components
Three Incidents
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 6 All Rights Reserved.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 7 All Rights Reserved.
Definition – the manipulation of
telecommunications carriers to gain knowledge of
telecommunications, and/or theft of applicable
services.
Includes any activity that incorporates the illegal
use or manipulation of access codes, access tones,
PBX’s, or switches
Methods
Shoulder surfing
Blue boxes
Current version – “call-sell” operations (prepaid
phone cards)
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 8 All Rights Reserved.
1960’s – term “hacking” is used by MIT
students to refer to either the development of
novel techniques to identify computer
shortcuts or clever pranks
“hacking” away at an object until it gives way
Term popularized in the 1980’s War Games
Hacker ethos – lashing out at big business, no
profit, etc.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 9 All Rights Reserved.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 10 All Rights Reserved.
Kevin Mitnick
Downfall – breaking into computer of fellow hacker –
Tsutomo Shimomura – who tracked him down with the FBI
cOmrade
First teen to be incarcerated for hacking
Targets included Miami-Dad school system, BellSouth, DOD, etc.
Terminus
Unix programmer & AT&T minicomputer expert
Targeted AT&T among others
Shadowhawk
Sentenced to 9 months for breaking and entering into U.S.
Missile Command
Also targeted AT&T
Kyrie
One of the few female hackers
Specialty involved abuse of corporate voice mail
Also involved her children in her activities
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 11 All Rights Reserved.
Initially
Young, socially inept individuals enamored of computers
and computer technology through role-playing games
Expense associated with downloading led to
manipulation of telephone exchanges
Anti- establishment ideology
• Contemporary communities
• Lost much of the original ideology
• Motivations now include easy money, revenge, personal
notoriety
• Increase in hacking for profit
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 12 All Rights Reserved.
Six categories based on motivation
Boredom - Informational Voyeurism
Intellectual challenge – pure hackers, mining for
knowledge
Revenge – insiders, disgruntled employees, etc.
Economic (criminals)
Sexual gratification (stalking, harassment)
Political (terrorists, spies, etc.)
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 13 All Rights Reserved.
Insiders – most dangerous
May be accidental or intentional
How can you prevent it?
Security awareness training
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 14 All Rights Reserved.
Script kiddies
Aka – skidiots, skiddie, or Victor Skill Deficiency (VSD)
Inexperienced hackers who employ scripts or other
programs authored by others to exploit security
vulnerabilities or otherwise compromise computer systems
Do not understand the programs they are actually
employing
Cyberpunks
Hotly contested term – used by LE to refer to those intent
on wreaking havoc via the Internet
Hackers/Crackers
Cyber-criminal organizations
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 15 All Rights Reserved.
Hardware
Black market
Grey market
Software
counterfeiting
Data piracy
Theft of Computer Components
10/2006 – Brothers Jimmy Luong and Danny Hung Leung
– convicted of money laundering in connection with the
theft of over $10 million in computer components
2/2001 – Employees of SoftBank - $700K of computer
products
6/2001 - $4 million in disk drives stolen from IBM in San
Jose
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 16 All Rights Reserved.
Film piracy
Optical disc piracy
Internet piracy
Videocassette piracy
Theatrical print theft
Signal theft
Broadcast piracy
Public performances
Parallel imports
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 17 All Rights Reserved.
Counterfeit software
Committed via burners
Increasingly organized
Methods of identification
o Counterfeit hologram; absence of original reserve label & absence
of polygraphic packing; absence of Copyright and Adjacent Rights
Protection sign; abnormalities in packaging material
o Absence of high quality images on the CD
Counterfeit chips
Commodities
Popular in U.S. and Asia
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 18 All Rights Reserved.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 19 All Rights Reserved.