Tracking and Surveillance

30
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymo nd E. Foster Police Technology Police Technology Chapter Sixteen Chapter Sixteen Hi-Tech Crime Hi-Tech Crime

description

The companion PowerPoint presentation for Chapter Fifteen (Tracking and Surveillance) for the book Police Technology.

Transcript of Tracking and Surveillance

Page 1: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Police TechnologyPolice TechnologyChapter SixteenChapter Sixteen

Hi-Tech CrimeHi-Tech Crime

Page 2: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Learning ObjectivesLearning Objectives

The difference between computer crime, The difference between computer crime, computer related crime and technology computer related crime and technology crime.crime.

Why Hi-Tech crime may be under-reported.Why Hi-Tech crime may be under-reported. How the Internet changed traditional How the Internet changed traditional

crime.crime. Explore system attack, theft of services Explore system attack, theft of services

and software piracy.and software piracy. Explore the Independent Component Explore the Independent Component

Doctrine.Doctrine.

Page 3: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Hi Tech CrimeHi Tech CrimeTechnology has changed the Technology has changed the nature of crime – to prevent, nature of crime – to prevent, deter and arrest you must deter and arrest you must understand the nature of the understand the nature of the crime.crime.

Was the computer the target? Was the computer the target? Was the technology inside the Was the technology inside the computer the target? Did the computer the target? Did the computer facilitate the crime? computer facilitate the crime? Or, has the technology Or, has the technology morphed the nature of a morphed the nature of a traditional crime?traditional crime?

Page 4: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer CrimeComputer Crime

The computer is the object of the The computer is the object of the attack; however, the attack is not attack; however, the attack is not physical, it is virtual –physical, it is virtual – VirusVirus HackingHacking Theft of servicesTheft of services

Page 5: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer Related CrimeComputer Related Crime

These types of crimes occur when These types of crimes occur when the offender uses a computer to:the offender uses a computer to: Commit a traditional crimeCommit a traditional crime

The computer is used to commit the crime.The computer is used to commit the crime. Stores evidence of a crimeStores evidence of a crime

The computer is used to facilitate the crime.The computer is used to facilitate the crime. Software PiracySoftware Piracy

Page 6: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Technology CrimeTechnology Crime

A crime directed at a technology, A crime directed at a technology, other than a computerother than a computer Theft of services – cellular telephones, Theft of services – cellular telephones,

cable televisioncable television Theft of computer componentsTheft of computer components

Page 7: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Hi Tech CrimeHi Tech CrimeClassification Unique Feature Types of crime

Computer Computer system or capability is the object of the crime.

Viruses, theft of system capabilities

Computer Related

Computer facilitates crime or keeps records of crime. Some are traditional crimes, others are crime created as a result of computer age.

Traditional:Child pornography, Narcotics TraffickingNon-Traditional:Software Piracy, Internet Fraud.

Technology Crime

Technology is stolen, or other technology services are stolen

Computer Hardware theft, theft of cellular telephone service, theft of cable television services

Page 8: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer CrimeComputer CrimeVirusesViruses

A malicious software program which A malicious software program which attempts to replicate itself and spread.attempts to replicate itself and spread.

Most commonly spread by email Most commonly spread by email attachment, file download or infected discattachment, file download or infected disc

Attaches to executable programAttaches to executable program Sometimes to use host computer to infect Sometimes to use host computer to infect

others via email list.others via email list. Causes disruption, including complete failure Causes disruption, including complete failure

Page 9: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer CrimeComputer Crime Viruses Viruses

Viruses can spread Viruses can spread rapidly, in some rapidly, in some instances a instances a computer virus can computer virus can circumnavigate the circumnavigate the globe in under an globe in under an hour – infecting hour – infecting millions of millions of computerscomputers

Screen Capture – Panda SoftwareScreen Capture – Panda Software

Page 10: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer CrimeComputer CrimeHacking, Cracking and WhackingHacking, Cracking and Whacking

Hacking refers to the non-malicious Hacking refers to the non-malicious virtual entry into a software program.virtual entry into a software program. May still be illegalMay still be illegal A non-illegal aspect might be purchasing A non-illegal aspect might be purchasing

a computer game and hacking it to ease a computer game and hacking it to ease your playyour play

Cracking refers to the illegal and often Cracking refers to the illegal and often malicious virtual entry into a software malicious virtual entry into a software program, system or network.program, system or network.

Page 11: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer CrimeComputer CrimeHacking, Cracking and WhackingHacking, Cracking and Whacking

Whacking is the Whacking is the illegal and often illegal and often malicious virtual malicious virtual entry into a software entry into a software program, system or program, system or network via wireless network via wireless connection.connection.

Page 12: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer CrimeComputer CrimeVirtual Street NamesVirtual Street Names

Coders – Semi-professional software Coders – Semi-professional software engineers who write code and engineers who write code and experiment in virtual zoos. Their codes experiment in virtual zoos. Their codes are sometimes used by the cyber-punks.are sometimes used by the cyber-punks.

Cyber-punks – anti-social, angry; they Cyber-punks – anti-social, angry; they write and use code for malicious write and use code for malicious purposes.purposes.

Old Guard Hackers – Generally, no Old Guard Hackers – Generally, no malicious intent. However, their malicious intent. However, their software is often used by cyber-punks.software is often used by cyber-punks.

Page 13: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer CrimeComputer CrimeVirtual Street NamesVirtual Street Names

Cyber-terrorists – Professional criminals Cyber-terrorists – Professional criminals who sell their computer skills. Often who sell their computer skills. Often used in corporate espionage.used in corporate espionage.

Old-School Hackers – Belief that Internet Old-School Hackers – Belief that Internet is open source. No criminal intent.is open source. No criminal intent.

Script kiddies – juvenile cyber-punks.Script kiddies – juvenile cyber-punks. Phreaker – uses technology to steal Phreaker – uses technology to steal

telephone system capabilitiestelephone system capabilities

Page 14: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer Related CrimeComputer Related Crime

The Internet affords a wider net of The Internet affords a wider net of victims.victims.

The Internet affords greater anonymityThe Internet affords greater anonymity The Internet can connect offenders The Internet can connect offenders

togethertogether The Internet makes jurisdiction issues The Internet makes jurisdiction issues

difficult.difficult. The Internet is new to law enforcement.The Internet is new to law enforcement.

Page 15: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer Related CrimeComputer Related CrimeCrimes Against ChildrenCrimes Against Children

Use of Internet Relay Chat (IRC) to Use of Internet Relay Chat (IRC) to contact children.contact children. Arrange meetings.Arrange meetings. Engage in sexual talk, exchange of images.Engage in sexual talk, exchange of images.

Use of the Internet to exchange ideas Use of the Internet to exchange ideas on committing crimes against children.on committing crimes against children.

Use of the Internet to exchange images Use of the Internet to exchange images of children.of children.

Page 16: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer Related CrimeComputer Related CrimeNew InformationNew Information

Steganography – from the greek Steganography – from the greek “steganos” meaning hidden and “steganos” meaning hidden and “graphy” meaning writing. “graphy” meaning writing.

The process of hiding messages or The process of hiding messages or images inside of the coding of images.images inside of the coding of images. It is considered the newest challenge to law It is considered the newest challenge to law

enforcement’s prosecution of pedophiles.enforcement’s prosecution of pedophiles. It may have been used by international It may have been used by international

terrorist to transmit messages to remote terrorist to transmit messages to remote cells. cells.

Page 17: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer Related CrimeComputer Related CrimeFraudFraud

The “box of rocks” becomes auction The “box of rocks” becomes auction fraud.fraud. On the street – offender uses a sealed On the street – offender uses a sealed

package to entice victim. On the Internet – package to entice victim. On the Internet – photographs and descriptions are used.photographs and descriptions are used.

The Pigeon Drop becomes the Nigerian The Pigeon Drop becomes the Nigerian 419 scam.419 scam. On the street found money entices the On the street found money entices the

victim. On the Internet – email is used to victim. On the Internet – email is used to describe inheritances, overages, etc.describe inheritances, overages, etc.

Page 18: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer Related CrimeComputer Related CrimeFraudFraud

In most fraud were In most fraud were the victim is an the victim is an active participant active participant the street and the the street and the Internet share a Internet share a common theme – common theme – The victim’s The victim’s thought they were thought they were getting something getting something for nothing!for nothing!

Page 19: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer Related CrimeComputer Related CrimeSoftware PiracySoftware Piracy

A very broad category that involves A very broad category that involves the theft of any intellectual property the theft of any intellectual property using computer, primarily the internet.using computer, primarily the internet. Illegal music downloads.Illegal music downloads. Copy Right infringementCopy Right infringement Trademark infringementTrademark infringement Illegal downloads of music.Illegal downloads of music. Copying any work, including software, Copying any work, including software,

music, written work and providing it to a music, written work and providing it to a third person.third person.

Page 20: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer Related CrimeComputer Related CrimeFraudFraud

Credit card fraud and theftCredit card fraud and theft Email used to “Phish.” An email Email used to “Phish.” An email

looks like it comes from a looks like it comes from a legitimate source. Asks for legitimate source. Asks for personal information which is personal information which is then to steal the victim’s identity then to steal the victim’s identity or using the victim’s credit.or using the victim’s credit.

Personal information is hacked Personal information is hacked from a legitimate sourcefrom a legitimate source

Page 21: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Computer Related CrimeComputer Related CrimeFraudFraud

Pump and DumpPump and Dump Emails and websites Emails and websites

used to drive up or used to drive up or down the price of an down the price of an equity. The offender equity. The offender then sells/buys then sells/buys accordinglyaccordingly

ToutingTouting Employee of Employee of

legitimate publication legitimate publication publishes false or publishes false or exaggerated newsexaggerated news

Page 22: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Technology CrimeTechnology Crime

Theft of components.Theft of components. ShopliftingShoplifting BurglaryBurglary HijackingHijacking

Theft of cellular telephone services.Theft of cellular telephone services. Theft of telephone serviceTheft of telephone service Theft of cable televisionTheft of cable television

Page 23: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Legal Aspects of Computer CrimeLegal Aspects of Computer Crime

Approximately half of Approximately half of the states modeled their the states modeled their computer crime related computer crime related statutes after the 1977 statutes after the 1977 and 1979 versions of and 1979 versions of the Federal Computer the Federal Computer Systems Protection Act.Systems Protection Act.

Page 24: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Independent Component DoctrineIndependent Component Doctrine

The Search and Seizure of computer The Search and Seizure of computer equipment is protected by the Fourth equipment is protected by the Fourth Amendment.Amendment.

Generally, a desk top computer Generally, a desk top computer consists of a computer, monitor, consists of a computer, monitor, printer and other peripheral devices. printer and other peripheral devices.

Investigators should consider listing Investigators should consider listing each component separately on the each component separately on the search warrantsearch warrant

Page 25: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

JurisdictionJurisdiction

One of the most One of the most difficult issues.difficult issues. Greatly benefits the Greatly benefits the

offender.offender. Offender can live in Offender can live in

one state (or one state (or country) and victim country) and victim in another.in another.

Different laws.Different laws. Poor interagency Poor interagency

cooperationcooperation

Page 26: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Under-ReportedUnder-Reported

Federal Bureau of Investigation Federal Bureau of Investigation recently updated the Uniform Crime recently updated the Uniform Crime Reporting to include certain Reporting to include certain technology related crimes.technology related crimes.

Victims don’t know they are victimsVictims don’t know they are victims Companies stand to loose customer Companies stand to loose customer

confidence if breach is reported.confidence if breach is reported. Law enforcement is often weak in its Law enforcement is often weak in its

responseresponse

Page 27: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Task ForcesTask Forces

Combine investigative and computer Combine investigative and computer expertise.expertise.

Share costs.Share costs. Help solve jurisdictional problems.Help solve jurisdictional problems. Help the exchange of information Help the exchange of information

and trend identificationand trend identification

Page 28: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Protection - TheftProtection - Theft

The recording of The recording of serial numbers and serial numbers and periodic audits can periodic audits can detect theft.detect theft.

Some companies Some companies have installed have installed software that if a software that if a laptop is stolen, it laptop is stolen, it will report its will report its location when it location when it connects to the connects to the InternetInternet

Screen capture provided by Absolute Software Screen capture provided by Absolute Software Corp Corp

Page 29: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

ProtectionProtection

Software and hardware is being used Software and hardware is being used to detect intrusions in real-time.to detect intrusions in real-time.

Software and hardware is used to Software and hardware is used to prevent SPAM and email attachments prevent SPAM and email attachments that might contain viruses.that might contain viruses.

Education programs reduce hapless Education programs reduce hapless victimizationvictimization

Page 30: Tracking and Surveillance

Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster

Police TechnologyPolice Technology

Go to the Go to the Student ResourcesStudent Resources page at page at www.hitechcj.comwww.hitechcj.com