CyberCrime: Background and Motivation Computer Forensics BACS 371.

21
CyberCrime: Background and Motivation Computer Forensics BACS 371

Transcript of CyberCrime: Background and Motivation Computer Forensics BACS 371.

Page 1: CyberCrime: Background and Motivation Computer Forensics BACS 371.

CyberCrime: Background and Motivation

Computer ForensicsBACS 371

Page 2: CyberCrime: Background and Motivation Computer Forensics BACS 371.
Page 3: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Outline

Categories of Computer Crime Types of CyberCrime Trends in CyberCrime Sources of CyberCrime Stakeholders in CyberCrime Hacker Types and Motivation

Page 4: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Definition of CyberCrime

CyberCrime is “any violations of criminal law that involve knowledge of computer technology for their perpetration.”

Page 5: CyberCrime: Background and Motivation Computer Forensics BACS 371.

USDOJ Categories1

1. Hardware as Contraband or Fruits of a Crime

2. Hardware as an Instrumentality3. Hardware as Evidence4. Information as Contraband or Fruits of

a Crime5. Information as an Instrumentality6. Information as Evidence

1 US Dept of Justice, Search and Seizure Guidelines Document

Page 6: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Categories of Computer Crime1

A computer can be the object of a crime A computer can be the subject of a crime The computer can be used as the tool for

conducting or planning a crime Includes… compromising a computer and using

that computer as a source for further attacks The symbol of the computer itself can be

used to intimidate or deceive The most significant omission, according

to Casey, is computers as sources of digital evidence

1 from Donn Parker as described in Eoghan Casey, Digital Evidence and Computer Crime

Page 7: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Categories of Computer Crime

Computers as targets Computers as storage devices Computers as communication tools

Same ole stuff, but computers are involved!!

Page 8: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Categories of Computer Crime cont.

Computers as targets: Attack on the confidentiality, integrity, or availability of a computer’s information or services.1)Acquire information on the computer2)Control the target system without

authorization or payment3)Alter integrity of data or interfere with

delivery of service

Page 9: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Categories of Computer Crime cont.

Computers as storage devices: Passive storage of information concerning a crime.

Computers as a communication tool: Traditional crimes committed online. Email or chat used to plan a crime.

Page 10: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Types of CyberCrime

DoS and DDoS Attacks Intellectual Property Theft

Trade secrets Piracy

Identity Theft Fraud Extortion Cyberstalking Transmission of Malware Hacking Spamming Sale of Purchase of Narcotics over Internet Gambling

Page 11: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Trends in CyberCrime

Number of threats targeting enterprises has increased.

Attack toolkits make the crime easier. Web-based attacks are more numerous. Emerging countries are having increased

activity.

Page 12: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Complaint Type Percentages 2011

Page 13: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Complaint Count 2001 -- 2011

Page 14: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Crime Complaint Categories 2011

15

10

6

55

54443

39

Identity Theft

Debt Collection

Prizes, Lotteries, etc.

Shop-at-Home sales

Banks and Lenders

Internet Services

Auto Related

Imposter Scams

Telephone & Mobile services

Advance-fee loans and Credit repair

All others (20 types)

Page 15: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Sources of CyberCrimes

Nation-States Cyberterrorists Organized crime Activists Corporations Individuals

Page 16: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Stakeholders in Computer Crime Government/National Security Government/Customs & Excise Lawyers Courts Police Businesses Insurance firms Corporate crime International (transnational) crime Personal (privacy)

Page 17: CyberCrime: Background and Motivation Computer Forensics BACS 371.
Page 18: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Categories of Computer Criminals Newbies (script kiddies) Cyberpunks Internals Coders Old guard Professional criminals Cyberterrorists

Page 19: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Hacker Types

Thrill-seeker Hackers White-Hat Hackers Black-Hat Hackers Crackers Hacktivists Classic Mischievous Kid Disgruntled Employee Robber Ringleader

Social Engineering

Page 20: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Why do Hackers Hack?* Revenge Profit

Money and Monetary Tools Banks Stocks Digital Goods

Pride Intellectual Challenge (Curiosity)

Damage Business

Steal money or services

Damage files

Invade privacy

Be noticed

Explore

Revenge X X X

Profit X

Pride X X

Curiosity X X

* Steven Branigan, High-Tech Crimes Revealed, Addison Wesley, 2005

Page 21: CyberCrime: Background and Motivation Computer Forensics BACS 371.

Opportunities for Cybercriminals Affordability – Equipment and software

becoming cheaper Acceptable risk – Risk of being caught is

relatively low. Small scale criminals often not aggressively prosecuted.

Attractiveness – More available targets. Laws not always current.

Availability – Each Internet access for perp and victim.

Anonymity – Internet gives the illusion of anonymity.