CyberCrime: Background and Motivation Computer Forensics BACS 371.

Post on 18-Dec-2015

238 views 4 download

Tags:

Transcript of CyberCrime: Background and Motivation Computer Forensics BACS 371.

CyberCrime: Background and Motivation

Computer ForensicsBACS 371

Outline

Categories of Computer Crime Types of CyberCrime Trends in CyberCrime Sources of CyberCrime Stakeholders in CyberCrime Hacker Types and Motivation

Definition of CyberCrime

CyberCrime is “any violations of criminal law that involve knowledge of computer technology for their perpetration.”

USDOJ Categories1

1. Hardware as Contraband or Fruits of a Crime

2. Hardware as an Instrumentality3. Hardware as Evidence4. Information as Contraband or Fruits of

a Crime5. Information as an Instrumentality6. Information as Evidence

1 US Dept of Justice, Search and Seizure Guidelines Document

Categories of Computer Crime1

A computer can be the object of a crime A computer can be the subject of a crime The computer can be used as the tool for

conducting or planning a crime Includes… compromising a computer and using

that computer as a source for further attacks The symbol of the computer itself can be

used to intimidate or deceive The most significant omission, according

to Casey, is computers as sources of digital evidence

1 from Donn Parker as described in Eoghan Casey, Digital Evidence and Computer Crime

Categories of Computer Crime

Computers as targets Computers as storage devices Computers as communication tools

Same ole stuff, but computers are involved!!

Categories of Computer Crime cont.

Computers as targets: Attack on the confidentiality, integrity, or availability of a computer’s information or services.1)Acquire information on the computer2)Control the target system without

authorization or payment3)Alter integrity of data or interfere with

delivery of service

Categories of Computer Crime cont.

Computers as storage devices: Passive storage of information concerning a crime.

Computers as a communication tool: Traditional crimes committed online. Email or chat used to plan a crime.

Types of CyberCrime

DoS and DDoS Attacks Intellectual Property Theft

Trade secrets Piracy

Identity Theft Fraud Extortion Cyberstalking Transmission of Malware Hacking Spamming Sale of Purchase of Narcotics over Internet Gambling

Trends in CyberCrime

Number of threats targeting enterprises has increased.

Attack toolkits make the crime easier. Web-based attacks are more numerous. Emerging countries are having increased

activity.

Complaint Type Percentages 2011

Complaint Count 2001 -- 2011

Crime Complaint Categories 2011

15

10

6

55

54443

39

Identity Theft

Debt Collection

Prizes, Lotteries, etc.

Shop-at-Home sales

Banks and Lenders

Internet Services

Auto Related

Imposter Scams

Telephone & Mobile services

Advance-fee loans and Credit repair

All others (20 types)

Sources of CyberCrimes

Nation-States Cyberterrorists Organized crime Activists Corporations Individuals

Stakeholders in Computer Crime Government/National Security Government/Customs & Excise Lawyers Courts Police Businesses Insurance firms Corporate crime International (transnational) crime Personal (privacy)

Categories of Computer Criminals Newbies (script kiddies) Cyberpunks Internals Coders Old guard Professional criminals Cyberterrorists

Hacker Types

Thrill-seeker Hackers White-Hat Hackers Black-Hat Hackers Crackers Hacktivists Classic Mischievous Kid Disgruntled Employee Robber Ringleader

Social Engineering

Why do Hackers Hack?* Revenge Profit

Money and Monetary Tools Banks Stocks Digital Goods

Pride Intellectual Challenge (Curiosity)

Damage Business

Steal money or services

Damage files

Invade privacy

Be noticed

Explore

Revenge X X X

Profit X

Pride X X

Curiosity X X

* Steven Branigan, High-Tech Crimes Revealed, Addison Wesley, 2005

Opportunities for Cybercriminals Affordability – Equipment and software

becoming cheaper Acceptable risk – Risk of being caught is

relatively low. Small scale criminals often not aggressively prosecuted.

Attractiveness – More available targets. Laws not always current.

Availability – Each Internet access for perp and victim.

Anonymity – Internet gives the illusion of anonymity.