Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

48

Transcript of Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Page 1: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.
Page 2: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Chapter 14

© 2004 Pearson Education, Inc.

Page 3: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Technology and

Crime

© 2004 Pearson Education, Inc.

Page 4: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Used by both crime fighters and lawbreakers

Technology and Crime

© 2004 Pearson Education, Inc.

Page 5: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Early use of telephones for scams

Technology and Crime

• Getaway cars for escape

© 2004 Pearson Education, Inc.

Page 6: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

High tech criminals seek illegitimate access to computerized information and digital databases

Technology and Crime

© 2004 Pearson Education, Inc.

Page 7: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Direct accessDirect access

Office workers or corporate spies violate positions of trust, gain entry, and steal data during business hours

Technology and Crime

© 2004 Pearson Education, Inc.

Page 8: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Computer trespassComputer trespass

Remote access to targeted machines to gain information and copy programs

Technology and Crime

© 2004 Pearson Education, Inc.

Page 9: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Hackers

• Computer viruses

• Software piracy

Technology and CrimeComputer trespassComputer trespass

© 2004 Pearson Education, Inc.

Page 10: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Computer CrimeComputer Crime

Any violation of a federal or state computer crime statute

Technology and Crime

© 2004 Pearson Education, Inc.

Page 11: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Forms of Software PiracyForms of Software Piracy

• Softlifting• Internet piracy• Software counterfeiting• OEM unbundling• Hard disk loading• Renting

Technology and Crime

© 2004 Pearson Education, Inc.

Page 12: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Computer Crime and the Law

All states and the federal government have developed computer-crime statutes specifically applicable to…

© 2004 Pearson Education, Inc.

Page 13: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

…invasive activities aimed at illegally accessing stored information

Computer Crime and the Law

© 2004 Pearson Education, Inc.

Page 14: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Computer Crime and the Law

Ambiguities in existing computer-crime

laws, complicated by rapid changes

in technology,…© 2004 Pearson Education, Inc.

Page 15: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

…can make it difficult even to tell that a crime has occurred

Computer Crime and the Law

© 2004 Pearson Education, Inc.

Page 16: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Computer Criminals

HackerHacker

• Male, aged 16-25, lives in the United States

• Computer user, not programmer

© 2004 Pearson Education, Inc.

Page 17: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Hacks with software written by others

Computer Criminals

HackerHacker

© 2004 Pearson Education, Inc.

Page 18: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Primary motivation is togain access toWeb sites andcomputernetworks, but…

Computer Criminals

HackerHacker

© 2004 Pearson Education, Inc.

Page 19: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

…not to profit financially

Computer Criminals

HackerHacker

© 2004 Pearson Education, Inc.

Page 20: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Pioneers are fascinated by evolving technology and explore out of genuine curiosity

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 21: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Scamps hack with a sense of fun and typically intend no overt harm

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 22: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Explorers delight in the discoveries associated with breaking into new computer systems

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 23: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Game players enjoy defeating software or systemic protections against intrusion

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 24: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Vandals are malicious hackers who cause deliberate damage with no apparent personal gain

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 25: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Addicts are classic “nerds” addicted to hacking and computer technology

Computer Criminals

Hacker ClassificationsHacker Classifications

© 2004 Pearson Education, Inc.

Page 26: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Share common behavior-related issues and other similarities with computer criminals, including…

Computer Criminals

White-collar CriminalsWhite-collar Criminals

© 2004 Pearson Education, Inc.

Page 27: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Commonly use nonviolent means and employment- related knowledge or technical skills to commit their crimes

Computer Criminals

White-collar CriminalsWhite-collar Criminals

© 2004 Pearson Education, Inc.

Page 28: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Often manipulate information to create profits or losses

• Can work alone, in groups, or in organizations

Computer Criminals

White-collar CriminalsWhite-collar Criminals

© 2004 Pearson Education, Inc.

Page 29: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Often commit crimes that

are hard to detect, and that

cause large losses of

money and other resources

Computer Criminals

White-collar CriminalsWhite-collar Criminals

© 2004 Pearson Education, Inc.

Page 30: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Are often found out by accident, and tend to be viewed by the general public as having committed offenses that are less serious than violent offenses

Computer Criminals

White-collar CriminalsWhite-collar Criminals

© 2004 Pearson Education, Inc.

Page 31: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Information Superhighway

Information is the lifeblood of today’s economy© 2004 Pearson Education, Inc.

Page 32: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Most valuable resource of the new age

• Of great strategic importance

Information Superhighway

© 2004 Pearson Education, Inc.

Page 33: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• A new tool for wrongdoers to commit crimes

• Potential to reach vast audiences

Information Superhighway

© 2004 Pearson Education, Inc.

Page 34: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Technology and Crime

Fight against CrimeFight against Crime

Traffic radar’s laser speed measuring apparatus

28 mph

© 2004 Pearson Education, Inc.

Page 35: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Fight against CrimeFight against Crime

• Computer databases of known offenders

• Public access to sex offender databases

Technology and Crime

© 2004 Pearson Education, Inc.

Page 36: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Technology and Crime

Fight against CrimeFight against Crime

• Cellular communications

• Electronic eavesdropping

• DNA analysis

• Less than lethal weapons© 2004 Pearson Education, Inc.

Page 37: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

DNA (Deoxyribonucleic acid)DNA (Deoxyribonucleic acid)

The genetic code which is unique to each individual

Technology and Crime

© 2004 Pearson Education, Inc.

Page 38: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

DNA Fingerprinting

May be obtained from blood, hair, semen, saliva, or flakes of skin left at a crime scene

© 2004 Pearson Education, Inc.

Page 39: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Long lasting

• Highly reliable forensic tool

DNA FingerprintingDNADNA

© 2004 Pearson Education, Inc.

Page 40: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

DNA Fingerprinting

Many states and the federal government have begun building digitized forensic DNA databases

DNADNA

© 2004 Pearson Education, Inc.

Page 41: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Has been called the “most important technological breakthrough of 20th century science”

DNA FingerprintingDNADNA

© 2004 Pearson Education, Inc.

Page 42: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Technology and Crime

Computer crimeComputer crime

Threat (risk) analysis involves a complete and thorough assessment of the kinds of perils facing an organization

© 2004 Pearson Education, Inc.

Page 43: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Allows identification of risks and development of plans to effectively deal with them

Technology and Crime

Threat AnalysisThreat Analysis

© 2004 Pearson Education, Inc.

Page 44: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• A powerful and useful tool

• Requires training of state and local police

Technology and Crime

Audit TrailAudit Trail

© 2004 Pearson Education, Inc.

Page 45: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Three sanctions against computer criminals

Technology and Crime

© 2004 Pearson Education, Inc.

Page 46: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

• Confiscate equipment used to commit a computer crime

• Limit the offender’s use of computers

Technology and Crime

© 2004 Pearson Education, Inc.

Page 47: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.

Restrict the offender’s

freedom to accept employment

involving computers

Technology and Crime

© 2004 Pearson Education, Inc.

Page 48: Chapter 14 © 2004 Pearson Education, Inc. Technology and Crime © 2004 Pearson Education, Inc.