Space Tracking and Surveillance System Advanced Technology ...
Tracking and Surveillance
-
Upload
hi-tech-criminal-justice -
Category
Technology
-
view
119 -
download
0
description
Transcript of Tracking and Surveillance
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice TechnologyChapter SixteenChapter Sixteen
Hi-Tech CrimeHi-Tech Crime
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Learning ObjectivesLearning Objectives
The difference between computer crime, The difference between computer crime, computer related crime and technology computer related crime and technology crime.crime.
Why Hi-Tech crime may be under-reported.Why Hi-Tech crime may be under-reported. How the Internet changed traditional How the Internet changed traditional
crime.crime. Explore system attack, theft of services Explore system attack, theft of services
and software piracy.and software piracy. Explore the Independent Component Explore the Independent Component
Doctrine.Doctrine.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Hi Tech CrimeHi Tech CrimeTechnology has changed the Technology has changed the nature of crime – to prevent, nature of crime – to prevent, deter and arrest you must deter and arrest you must understand the nature of the understand the nature of the crime.crime.
Was the computer the target? Was the computer the target? Was the technology inside the Was the technology inside the computer the target? Did the computer the target? Did the computer facilitate the crime? computer facilitate the crime? Or, has the technology Or, has the technology morphed the nature of a morphed the nature of a traditional crime?traditional crime?
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer CrimeComputer Crime
The computer is the object of the The computer is the object of the attack; however, the attack is not attack; however, the attack is not physical, it is virtual –physical, it is virtual – VirusVirus HackingHacking Theft of servicesTheft of services
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer Related CrimeComputer Related Crime
These types of crimes occur when These types of crimes occur when the offender uses a computer to:the offender uses a computer to: Commit a traditional crimeCommit a traditional crime
The computer is used to commit the crime.The computer is used to commit the crime. Stores evidence of a crimeStores evidence of a crime
The computer is used to facilitate the crime.The computer is used to facilitate the crime. Software PiracySoftware Piracy
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Technology CrimeTechnology Crime
A crime directed at a technology, A crime directed at a technology, other than a computerother than a computer Theft of services – cellular telephones, Theft of services – cellular telephones,
cable televisioncable television Theft of computer componentsTheft of computer components
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Hi Tech CrimeHi Tech CrimeClassification Unique Feature Types of crime
Computer Computer system or capability is the object of the crime.
Viruses, theft of system capabilities
Computer Related
Computer facilitates crime or keeps records of crime. Some are traditional crimes, others are crime created as a result of computer age.
Traditional:Child pornography, Narcotics TraffickingNon-Traditional:Software Piracy, Internet Fraud.
Technology Crime
Technology is stolen, or other technology services are stolen
Computer Hardware theft, theft of cellular telephone service, theft of cable television services
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer CrimeComputer CrimeVirusesViruses
A malicious software program which A malicious software program which attempts to replicate itself and spread.attempts to replicate itself and spread.
Most commonly spread by email Most commonly spread by email attachment, file download or infected discattachment, file download or infected disc
Attaches to executable programAttaches to executable program Sometimes to use host computer to infect Sometimes to use host computer to infect
others via email list.others via email list. Causes disruption, including complete failure Causes disruption, including complete failure
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer CrimeComputer Crime Viruses Viruses
Viruses can spread Viruses can spread rapidly, in some rapidly, in some instances a instances a computer virus can computer virus can circumnavigate the circumnavigate the globe in under an globe in under an hour – infecting hour – infecting millions of millions of computerscomputers
Screen Capture – Panda SoftwareScreen Capture – Panda Software
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer CrimeComputer CrimeHacking, Cracking and WhackingHacking, Cracking and Whacking
Hacking refers to the non-malicious Hacking refers to the non-malicious virtual entry into a software program.virtual entry into a software program. May still be illegalMay still be illegal A non-illegal aspect might be purchasing A non-illegal aspect might be purchasing
a computer game and hacking it to ease a computer game and hacking it to ease your playyour play
Cracking refers to the illegal and often Cracking refers to the illegal and often malicious virtual entry into a software malicious virtual entry into a software program, system or network.program, system or network.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer CrimeComputer CrimeHacking, Cracking and WhackingHacking, Cracking and Whacking
Whacking is the Whacking is the illegal and often illegal and often malicious virtual malicious virtual entry into a software entry into a software program, system or program, system or network via wireless network via wireless connection.connection.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer CrimeComputer CrimeVirtual Street NamesVirtual Street Names
Coders – Semi-professional software Coders – Semi-professional software engineers who write code and engineers who write code and experiment in virtual zoos. Their codes experiment in virtual zoos. Their codes are sometimes used by the cyber-punks.are sometimes used by the cyber-punks.
Cyber-punks – anti-social, angry; they Cyber-punks – anti-social, angry; they write and use code for malicious write and use code for malicious purposes.purposes.
Old Guard Hackers – Generally, no Old Guard Hackers – Generally, no malicious intent. However, their malicious intent. However, their software is often used by cyber-punks.software is often used by cyber-punks.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer CrimeComputer CrimeVirtual Street NamesVirtual Street Names
Cyber-terrorists – Professional criminals Cyber-terrorists – Professional criminals who sell their computer skills. Often who sell their computer skills. Often used in corporate espionage.used in corporate espionage.
Old-School Hackers – Belief that Internet Old-School Hackers – Belief that Internet is open source. No criminal intent.is open source. No criminal intent.
Script kiddies – juvenile cyber-punks.Script kiddies – juvenile cyber-punks. Phreaker – uses technology to steal Phreaker – uses technology to steal
telephone system capabilitiestelephone system capabilities
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer Related CrimeComputer Related Crime
The Internet affords a wider net of The Internet affords a wider net of victims.victims.
The Internet affords greater anonymityThe Internet affords greater anonymity The Internet can connect offenders The Internet can connect offenders
togethertogether The Internet makes jurisdiction issues The Internet makes jurisdiction issues
difficult.difficult. The Internet is new to law enforcement.The Internet is new to law enforcement.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer Related CrimeComputer Related CrimeCrimes Against ChildrenCrimes Against Children
Use of Internet Relay Chat (IRC) to Use of Internet Relay Chat (IRC) to contact children.contact children. Arrange meetings.Arrange meetings. Engage in sexual talk, exchange of images.Engage in sexual talk, exchange of images.
Use of the Internet to exchange ideas Use of the Internet to exchange ideas on committing crimes against children.on committing crimes against children.
Use of the Internet to exchange images Use of the Internet to exchange images of children.of children.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer Related CrimeComputer Related CrimeNew InformationNew Information
Steganography – from the greek Steganography – from the greek “steganos” meaning hidden and “steganos” meaning hidden and “graphy” meaning writing. “graphy” meaning writing.
The process of hiding messages or The process of hiding messages or images inside of the coding of images.images inside of the coding of images. It is considered the newest challenge to law It is considered the newest challenge to law
enforcement’s prosecution of pedophiles.enforcement’s prosecution of pedophiles. It may have been used by international It may have been used by international
terrorist to transmit messages to remote terrorist to transmit messages to remote cells. cells.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer Related CrimeComputer Related CrimeFraudFraud
The “box of rocks” becomes auction The “box of rocks” becomes auction fraud.fraud. On the street – offender uses a sealed On the street – offender uses a sealed
package to entice victim. On the Internet – package to entice victim. On the Internet – photographs and descriptions are used.photographs and descriptions are used.
The Pigeon Drop becomes the Nigerian The Pigeon Drop becomes the Nigerian 419 scam.419 scam. On the street found money entices the On the street found money entices the
victim. On the Internet – email is used to victim. On the Internet – email is used to describe inheritances, overages, etc.describe inheritances, overages, etc.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer Related CrimeComputer Related CrimeFraudFraud
In most fraud were In most fraud were the victim is an the victim is an active participant active participant the street and the the street and the Internet share a Internet share a common theme – common theme – The victim’s The victim’s thought they were thought they were getting something getting something for nothing!for nothing!
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer Related CrimeComputer Related CrimeSoftware PiracySoftware Piracy
A very broad category that involves A very broad category that involves the theft of any intellectual property the theft of any intellectual property using computer, primarily the internet.using computer, primarily the internet. Illegal music downloads.Illegal music downloads. Copy Right infringementCopy Right infringement Trademark infringementTrademark infringement Illegal downloads of music.Illegal downloads of music. Copying any work, including software, Copying any work, including software,
music, written work and providing it to a music, written work and providing it to a third person.third person.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer Related CrimeComputer Related CrimeFraudFraud
Credit card fraud and theftCredit card fraud and theft Email used to “Phish.” An email Email used to “Phish.” An email
looks like it comes from a looks like it comes from a legitimate source. Asks for legitimate source. Asks for personal information which is personal information which is then to steal the victim’s identity then to steal the victim’s identity or using the victim’s credit.or using the victim’s credit.
Personal information is hacked Personal information is hacked from a legitimate sourcefrom a legitimate source
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Computer Related CrimeComputer Related CrimeFraudFraud
Pump and DumpPump and Dump Emails and websites Emails and websites
used to drive up or used to drive up or down the price of an down the price of an equity. The offender equity. The offender then sells/buys then sells/buys accordinglyaccordingly
ToutingTouting Employee of Employee of
legitimate publication legitimate publication publishes false or publishes false or exaggerated newsexaggerated news
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Technology CrimeTechnology Crime
Theft of components.Theft of components. ShopliftingShoplifting BurglaryBurglary HijackingHijacking
Theft of cellular telephone services.Theft of cellular telephone services. Theft of telephone serviceTheft of telephone service Theft of cable televisionTheft of cable television
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Legal Aspects of Computer CrimeLegal Aspects of Computer Crime
Approximately half of Approximately half of the states modeled their the states modeled their computer crime related computer crime related statutes after the 1977 statutes after the 1977 and 1979 versions of and 1979 versions of the Federal Computer the Federal Computer Systems Protection Act.Systems Protection Act.
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Independent Component DoctrineIndependent Component Doctrine
The Search and Seizure of computer The Search and Seizure of computer equipment is protected by the Fourth equipment is protected by the Fourth Amendment.Amendment.
Generally, a desk top computer Generally, a desk top computer consists of a computer, monitor, consists of a computer, monitor, printer and other peripheral devices. printer and other peripheral devices.
Investigators should consider listing Investigators should consider listing each component separately on the each component separately on the search warrantsearch warrant
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
JurisdictionJurisdiction
One of the most One of the most difficult issues.difficult issues. Greatly benefits the Greatly benefits the
offender.offender. Offender can live in Offender can live in
one state (or one state (or country) and victim country) and victim in another.in another.
Different laws.Different laws. Poor interagency Poor interagency
cooperationcooperation
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Under-ReportedUnder-Reported
Federal Bureau of Investigation Federal Bureau of Investigation recently updated the Uniform Crime recently updated the Uniform Crime Reporting to include certain Reporting to include certain technology related crimes.technology related crimes.
Victims don’t know they are victimsVictims don’t know they are victims Companies stand to loose customer Companies stand to loose customer
confidence if breach is reported.confidence if breach is reported. Law enforcement is often weak in its Law enforcement is often weak in its
responseresponse
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Task ForcesTask Forces
Combine investigative and computer Combine investigative and computer expertise.expertise.
Share costs.Share costs. Help solve jurisdictional problems.Help solve jurisdictional problems. Help the exchange of information Help the exchange of information
and trend identificationand trend identification
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Protection - TheftProtection - Theft
The recording of The recording of serial numbers and serial numbers and periodic audits can periodic audits can detect theft.detect theft.
Some companies Some companies have installed have installed software that if a software that if a laptop is stolen, it laptop is stolen, it will report its will report its location when it location when it connects to the connects to the InternetInternet
Screen capture provided by Absolute Software Screen capture provided by Absolute Software Corp Corp
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
ProtectionProtection
Software and hardware is being used Software and hardware is being used to detect intrusions in real-time.to detect intrusions in real-time.
Software and hardware is used to Software and hardware is used to prevent SPAM and email attachments prevent SPAM and email attachments that might contain viruses.that might contain viruses.
Education programs reduce hapless Education programs reduce hapless victimizationvictimization
Copy Right Protected 2005: Hi Tech Criminal Justice, Raymond E. Foster
Police TechnologyPolice Technology
Go to the Go to the Student ResourcesStudent Resources page at page at www.hitechcj.comwww.hitechcj.com