CyberCrime: Background and Motivation
Computer ForensicsBACS 371
Outline
Categories of Computer Crime Types of CyberCrime Trends in CyberCrime Sources of CyberCrime Stakeholders in CyberCrime Hacker Types and Motivation
Definition of CyberCrime
CyberCrime is “any violations of criminal law that involve knowledge of computer technology for their perpetration.”
USDOJ Categories1
1. Hardware as Contraband or Fruits of a Crime
2. Hardware as an Instrumentality3. Hardware as Evidence4. Information as Contraband or Fruits of
a Crime5. Information as an Instrumentality6. Information as Evidence
1 US Dept of Justice, Search and Seizure Guidelines Document
Categories of Computer Crime1
A computer can be the object of a crime A computer can be the subject of a crime The computer can be used as the tool for
conducting or planning a crime Includes… compromising a computer and using
that computer as a source for further attacks The symbol of the computer itself can be
used to intimidate or deceive The most significant omission, according
to Casey, is computers as sources of digital evidence
1 from Donn Parker as described in Eoghan Casey, Digital Evidence and Computer Crime
Categories of Computer Crime
Computers as targets Computers as storage devices Computers as communication tools
Same ole stuff, but computers are involved!!
Categories of Computer Crime cont.
Computers as targets: Attack on the confidentiality, integrity, or availability of a computer’s information or services.1)Acquire information on the computer2)Control the target system without
authorization or payment3)Alter integrity of data or interfere with
delivery of service
Categories of Computer Crime cont.
Computers as storage devices: Passive storage of information concerning a crime.
Computers as a communication tool: Traditional crimes committed online. Email or chat used to plan a crime.
Types of CyberCrime
DoS and DDoS Attacks Intellectual Property Theft
Trade secrets Piracy
Identity Theft Fraud Extortion Cyberstalking Transmission of Malware Hacking Spamming Sale of Purchase of Narcotics over Internet Gambling
Trends in CyberCrime
Number of threats targeting enterprises has increased.
Attack toolkits make the crime easier. Web-based attacks are more numerous. Emerging countries are having increased
activity.
Complaint Type Percentages 2011
Complaint Count 2001 -- 2011
Crime Complaint Categories 2011
15
10
6
55
54443
39
Identity Theft
Debt Collection
Prizes, Lotteries, etc.
Shop-at-Home sales
Banks and Lenders
Internet Services
Auto Related
Imposter Scams
Telephone & Mobile services
Advance-fee loans and Credit repair
All others (20 types)
Sources of CyberCrimes
Nation-States Cyberterrorists Organized crime Activists Corporations Individuals
Stakeholders in Computer Crime Government/National Security Government/Customs & Excise Lawyers Courts Police Businesses Insurance firms Corporate crime International (transnational) crime Personal (privacy)
Categories of Computer Criminals Newbies (script kiddies) Cyberpunks Internals Coders Old guard Professional criminals Cyberterrorists
Hacker Types
Thrill-seeker Hackers White-Hat Hackers Black-Hat Hackers Crackers Hacktivists Classic Mischievous Kid Disgruntled Employee Robber Ringleader
Social Engineering
Why do Hackers Hack?* Revenge Profit
Money and Monetary Tools Banks Stocks Digital Goods
Pride Intellectual Challenge (Curiosity)
Damage Business
Steal money or services
Damage files
Invade privacy
Be noticed
Explore
Revenge X X X
Profit X
Pride X X
Curiosity X X
* Steven Branigan, High-Tech Crimes Revealed, Addison Wesley, 2005
Opportunities for Cybercriminals Affordability – Equipment and software
becoming cheaper Acceptable risk – Risk of being caught is
relatively low. Small scale criminals often not aggressively prosecuted.
Attractiveness – More available targets. Laws not always current.
Availability – Each Internet access for perp and victim.
Anonymity – Internet gives the illusion of anonymity.
Top Related