chapter 14 © 2004 pearson education, inc. technology and crime © 2004 pearson education, inc

48

Upload: cory-bailey

Post on 18-Dec-2015

226 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc
Page 2: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Chapter 14

© 2004 Pearson Education, Inc.

Page 3: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Technology and

Crime

© 2004 Pearson Education, Inc.

Page 4: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Used by both crime fighters and lawbreakers

Technology and Crime

© 2004 Pearson Education, Inc.

Page 5: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Early use of telephones for scams

Technology and Crime

• Getaway cars for escape

© 2004 Pearson Education, Inc.

Page 6: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

High tech criminals seek illegitimate access to computerized information and digital databases

Technology and Crime

© 2004 Pearson Education, Inc.

Page 7: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Direct accessDirect access

Office workers or corporate spies violate positions of trust, gain entry, and steal data during business hours

Technology and Crime

© 2004 Pearson Education, Inc.

Page 8: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Computer trespassComputer trespass

Remote access to targeted machines to gain information and copy programs

Technology and Crime

© 2004 Pearson Education, Inc.

Page 9: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Hackers

• Computer viruses

• Software piracy

Technology and CrimeComputer trespassComputer trespass

© 2004 Pearson Education, Inc.

Page 10: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Computer CrimeComputer Crime

Any violation of a federal or state computer crime statute

Technology and Crime

© 2004 Pearson Education, Inc.

Page 11: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Forms of Software PiracyForms of Software Piracy

• Softlifting• Internet piracy• Software counterfeiting• OEM unbundling• Hard disk loading• Renting

Technology and Crime

© 2004 Pearson Education, Inc.

Page 12: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Computer Crime and the Law

All states and the federal government have developed computer-crime statutes specifically applicable to…

© 2004 Pearson Education, Inc.

Page 13: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

…invasive activities aimed at illegally accessing stored information

Computer Crime and the Law

© 2004 Pearson Education, Inc.

Page 14: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Computer Crime and the Law

Ambiguities in existing computer-crime

laws, complicated by rapid changes

in technology,…© 2004 Pearson Education, Inc.

Page 15: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

…can make it difficult even to tell that a crime has occurred

Computer Crime and the Law

© 2004 Pearson Education, Inc.

Page 16: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Computer Criminals

HackerHacker

• Male, aged 16-25, lives in the United States

• Computer user, not programmer

© 2004 Pearson Education, Inc.

Page 17: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Hacks with software written by others

Computer Criminals

HackerHacker

© 2004 Pearson Education, Inc.

Page 18: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Primary motivation is togain access toWeb sites andcomputernetworks, but…

Computer Criminals

HackerHacker

© 2004 Pearson Education, Inc.

Page 19: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

…not to profit financially

Computer Criminals

HackerHacker

© 2004 Pearson Education, Inc.

Page 20: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Pioneers are fascinated by evolving technology and explore out of genuine curiosity

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 21: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Scamps hack with a sense of fun and typically intend no overt harm

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 22: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Explorers delight in the discoveries associated with breaking into new computer systems

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 23: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Game players enjoy defeating software or systemic protections against intrusion

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 24: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Vandals are malicious hackers who cause deliberate damage with no apparent personal gain

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 25: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Addicts are classic “nerds” addicted to hacking and computer technology

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 26: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Share common behavior-related issues and other similarities with computer criminals, including…

Computer Criminals

White-collar CriminalsWhite-collar Criminals

© 2004 Pearson Education, Inc.

Page 27: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Commonly use nonviolent means and employment- related knowledge or technical skills to commit their crimes

Computer Criminals

White-collar CriminalsWhite-collar Criminals

© 2004 Pearson Education, Inc.

Page 28: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Often manipulate information to create profits or losses

• Can work alone, in groups, or in organizations

Computer Criminals

White-collar CriminalsWhite-collar Criminals

© 2004 Pearson Education, Inc.

Page 29: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Often commit crimes that

are hard to detect, and that

cause large losses of

money and other resources

Computer Criminals

White-collar CriminalsWhite-collar Criminals

© 2004 Pearson Education, Inc.

Page 30: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Are often found out by accident, and tend to be viewed by the general public as having committed offenses that are less serious than violent offenses

Computer Criminals

White-collar CriminalsWhite-collar Criminals

© 2004 Pearson Education, Inc.

Page 31: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Information Superhighway

Information is the lifeblood of today’s economy© 2004 Pearson Education, Inc.

Page 32: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Most valuable resource of the new age

• Of great strategic importance

Information Superhighway

© 2004 Pearson Education, Inc.

Page 33: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• A new tool for wrongdoers to commit crimes

• Potential to reach vast audiences

Information Superhighway

© 2004 Pearson Education, Inc.

Page 34: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Technology and Crime

Fight against CrimeFight against Crime

Traffic radar’s laser speed measuring apparatus

28 mph

© 2004 Pearson Education, Inc.

Page 35: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Fight against CrimeFight against Crime

• Computer databases of known offenders

• Public access to sex offender databases

Technology and Crime

© 2004 Pearson Education, Inc.

Page 36: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Technology and Crime

Fight against CrimeFight against Crime

• Cellular communications

• Electronic eavesdropping

• DNA analysis

• Less than lethal weapons© 2004 Pearson Education, Inc.

Page 37: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

DNA (Deoxyribonucleic acid)DNA (Deoxyribonucleic acid)

The genetic code which is unique to each individual

Technology and Crime

© 2004 Pearson Education, Inc.

Page 38: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

DNA Fingerprinting

May be obtained from blood, hair, semen, saliva, or flakes of skin left at a crime scene

© 2004 Pearson Education, Inc.

Page 39: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Long lasting

• Highly reliable forensic tool

DNA FingerprintingDNADNA

© 2004 Pearson Education, Inc.

Page 40: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

DNA Fingerprinting

Many states and the federal government have begun building digitized forensic DNA databases

DNADNA

© 2004 Pearson Education, Inc.

Page 41: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Has been called the “most important technological breakthrough of 20th century science”

DNA FingerprintingDNADNA

© 2004 Pearson Education, Inc.

Page 42: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Technology and Crime

Computer crimeComputer crime

Threat (risk) analysis involves a complete and thorough assessment of the kinds of perils facing an organization

© 2004 Pearson Education, Inc.

Page 43: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Allows identification of risks and development of plans to effectively deal with them

Technology and Crime

Threat AnalysisThreat Analysis

© 2004 Pearson Education, Inc.

Page 44: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• A powerful and useful tool

• Requires training of state and local police

Technology and Crime

Audit TrailAudit Trail

© 2004 Pearson Education, Inc.

Page 45: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Three sanctions against computer criminals

Technology and Crime

© 2004 Pearson Education, Inc.

Page 46: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

• Confiscate equipment used to commit a computer crime

• Limit the offender’s use of computers

Technology and Crime

© 2004 Pearson Education, Inc.

Page 47: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc

Restrict the offender’s

freedom to accept employment

involving computers

Technology and Crime

© 2004 Pearson Education, Inc.

Page 48: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc