internet crime by alaina harden & matthew bradshaw

32
Internet Crime By Alaina Harden & Matthew Bradshaw

Upload: alexandra-oneal

Post on 17-Dec-2015

225 views

Category:

Documents


1 download

TRANSCRIPT

Internet Crime

ByAlaina Harden

&Matthew Bradshaw

Objective

• To define internet crime and to identify some of the many types of internet crime

• To exhibit the dangers of and the ways to prevent internet crime in your home or office

Internet Crime

Internet crime can be easily defined as “any illegal act that involves a computer system where the computer is used as a tool for committing a crime.(www.mlj.com)”

Types of Internet Crime

•Computer intrusion (i.e. hacking) •Password trafficking•Copyright (software, movie, sound recording) piracy •Trademark counterfeiting •Counterfeiting of currency •Data transfer theft•Misuse of computer time •Computer output theft •Desktop forgery

Types of Internet Crime Cont.

•Wrongful programming •Child Pornography or Exploitation•Child Exploitation and Internet Fraud matters that have a mail nexus •Internet Fraud•Internet harassment •Internet bomb threats •Trafficking in explosive or incendiary devices or firearms over the Internet

Computer Intrusion (i.e. hacking)

• Computer intrusion “is an unauthorised access by any person using a computer and any other communications device to break computer security or circumvent it to enter into a computer system. (www.mlj.com)”

Password Trafficking

• Misuse and illegal selling of other people’s passwords

Copyright Piracy

• Stealing other people’s ideas, music, and anything else that could be copyrighted, and selling them or misusing them for personal gain

Data Transfer Theft• Stealing of personal information by

tapping into a phone line outside one’s house and running a line directly into one’s own computer. This can often be done without one even knowing it through split lines. Some thieves will even take this a step further. When a person is done using their computer and signs off the network, they simply remain online and continue using the system as if it were actually that person. (www.avsands.com)

Misuse of Computer Time

• One of the most common computer crimes, involving Public and private employees who, on the taxpayers' or company's time and money, surf the computer or play games without proper authorization. This kind of behavior in many instances is not accepted by supervisors, but there's little way to regulate it. (www.avsands.com)

Computer Output Theft

• Thieves steal information that come from personal or company computers for the sake of finding out secret or personal information. They do this by taking computer printouts, mailing lists, customer lists, and etc. (www.avsands.com)

Desktop Forgery

• With computer technology and desktop publishing programs, thieves copy official letterhead, documents, passports, birth certificates, and cash receipts for personal gain. (www.avsands.com)

Wrongful Programming

• Wrongful programming crimes occur when someone alters a computer program and directs it to manipulate information on the network or someone's personal information. This is a more complicated crime than most others. (www.avsands.com)

Child Pornography or Exploitation

• Illegally placing child pornography on the internet in order to make a profit, or looking at child pornography for pleasure.

Internet Fraud

• “Any type of fraud scheme that uses one or more components of the internet such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme. (www.usdoj.gov)”

Internet Harassment

• Stalking or harassing any person through the use of the internet.

Ways to report Internet Crime

• All of the Internet Crimes that we have discussed today can be reported to your local Federal Bureau of Investigations (you can find your local office at http://www.fbi.gov/contact/fo/fo.htm).

Real Life Instances

Kenya Kidnapping

Here is a real life story of a man who opened the wrong email and ended up getting kidnapped for ransom in Kenya. (http://www.techtv.com/cybercrime/internetfraud/story/0,23008,3396768,00.html)

Kenya Kidnapping• Juergen Ahlmann is an entrepreneur in

Southern California. In January 2001 he and a business partner were looking for ways to get some extra cash to launch their new catfish importing and exporting company.

• In an interview with "CyberCrime" Ahlmann says he was aware of "419" scams, but the origin of the messages played a big role in his decision to answer one he received.

Kenya Kidnapping Cont.• "I did not have any concerns," Ahlmann

said of his first impression. "If it had been Nigeria, perhaps it would have been a different story. I never heard of anything coming out of Kenya.“

• The man who contacted Ahlmann said his name was Mike Otieno and that he was from Nairobi, Kenya. Otieno claimed he was a business promoter who had a client who was willing to invest in Ahlmann's project.

Kenya Kidnapping Cont.

• Juergen negotiated with the "investors" for nearly four months before they insisted that he and his associate, Jim Harrel, fly to Nairobi to sign some papers

• But shortly after the two businessmen arrived in Kenya, their negotiations took a turn for the worse when the "investors" found out the two did not have as much money as they thought.

Kenya Kidnapping Cont.

• That's when Alhmann and Harrel became instant hostages to the men who had lured them to Kenya.

• "We were chained around the ankles and around the wrists," Ahlmann said. "The window [of the room they were held in] was covered with a piece of plywood so there was no daylight coming in."

• Their kidnappers demanded that a sum of $30,000 be paid for their release.

Kenya Kidnapping Cont.

• Alhmann says he was subject to torment by the kidnappers.

• They threatened to hang him and his business partner upside-down and kill them if their wives could not come up with the ransom money, he says.

• After receiving an unusual email from her husband, Sheila Ahlmann knew something had gone wrong in Kenya and quickly contacted the FBI.

Kenya Kidnapping Cont.• FBI agents in San Diego worked with Sheila

Alhmann as she agreed to send a ransom of $7,000 to a Western Union office in Nairobi.

• Agents from the FBI's San Diego Field Office contacted the bureau's office in Nairobi about the kidnapping. With the help of Kenyan police, authorities arrested Otieno, whose actual name is Augustine Nwanga, when he arrived at the location to pick up the ransom.

These exerts were taken from the previously listed Internet address. They were written by Chris Anderson from Cyber

Crime. Originally aired September 17, 2002 Modified September 16, 2002

Real Life Internet Crime

• There are many stories to be told just like the previous example. Many Internet crimes are committed everyday and real people like you and me are involved in them. If you ever find yourself in the midst of one you should contact the FBI, however there are many ways to prevent these crimes altogether.

Ways of Prevention

• Parents should supervise their children not to give out their real name and address to strangers, and teach them the dangers involved with using the internet.

(http://www.cnn.com/2000/TECH/computing/07/14/prevent.cybercrime.idg/)

• Children should be taught to report anything odd to their parents immediately (such as friendly chatters asking to keep “secret friendships”).

(http://www.cnn.com/2000/TECH/computing/07/14/prevent.cybercrime.idg/)

Prevention Cont.

• Know the laws. (check some of the Internet laws at www.findlaw.com/)

http://www.zdnet.com/anchordesk/story/story_2022.html

• Be a crime stopper. Report your findings to your local FBI bureau.

http://www.zdnet.com/anchordesk/story/story_2022.html

• Become knowledgeable about what kind of crimes are being committed. A good place to start is http://www.cyberangels.org/.

http://www.zdnet.com/anchordesk/story/story_2022.html

Prevention Cont.

• You should maintain the most up to date anti-virus software, and run the software before downloading and installing software.

• Also maintain the most current security updates and patches for all of your operating systems and programs.

Prevention Cont.

• Keep back up copies of information on removable media such as disks instead of on your hard drive.

• While you are not using your computer, unplug it and try not to leave both phone and electric cord in the computer at the same time.

Prevention Cont.

• When shopping on the Internet be as careful as you would be in a store, don’t forget to print out a copy of your order with the company’s name and confirmation number, date and amount paid.

• Make up an account you use for online purposes only and deposit money into it only as you spend it.

Prevention Cont.

• Do not disclose any important information such as social security numbers, etc. over the Internet, major companies do not ask for this kind of information through email.

• Be aware of the fact that if you do not use encryption software, any third party can read your emails.

The following prevention methods were found at http://www.ccmostwanted.com/safetyguide.htm

Thank you for your Attention

• We hope you have learned at least a few tips to make your Internet experience a safer one!