week 1 chapter 1-2.ppt - Cyber-Security Law and Money...

This preview shows page 1 out of 28 pages.

You've reached the end of this preview.

Unformatted text preview: Cyber-Security, Law and Money Laundering Sean Grillo Email:[email protected] Materials/Grading Scene of the Cybercrime-Second Edition In class handouts In class notes (3) Short Tests (1) Class project-handed out in week (9) Investigation using materials from class Class Participation Be prepared to discuss materials Defining Cyber Crime Crimes committed using computers and the internet Can involve just computers or be a combination with traditional crime Computer can be just one tool in the commission of a simple or complex crime Hacking or Nigerian 419 scam Use Net vs Depend on Net “Same old Stuf Computer network is somehow involved Pyramid scheme, take bets, prostitution, 419 scams, child porn photos Cyber aspect is not a necessary element of the ofense, it merely provides the means Use Net vs Depend on Net Dependant-The crime is unique and came into being with the advent of the internet Unauthorized access (hacking network) DDOS (Distributed Denial of Service) Categories of Cybercrime Violent or Potentially Violent Cybercrime Categories Cyberterrorism Committed, planned, or coordinated in cyberspace (Bin Laden) Email between conspirators Recruitment Infiltrating various systems-air traffic control, water system, power grids Categories of Cybercrime Assault by threat-Cyber bullying Threats via email Social Network sites Cyberstalking Similar to Assault but can be a mechanism to stalk victim Cyberstalking Categories of Cybercrime Child Pornography Creating materials Exchanging materials Find and create victims Categories of Cybercrime Nonviolent Cybercrime Cybertrespass Access computer or network without authorization but does not misuse or damage Snooping Cybertheft Using a computer and network to steal information, money or other valuables Embezzlement, Unlawful appropriation, Corporate/Industrial espionage, Identity theft Categories of Cybercrime Cyberfraud Promoting flasehoods to obtain something of value or benefit Similar to theft EXCEPT victim knowingly and voluntarily gives money or property to the criminal-Misrepresentation 419 scams Misrepresenting credentials Categories of Cybercrime Categories of Cybercrime Destructive Cybercrimes Service disrupted or data destroyed Hacking Network to delete, deface, intro worms and viruses, DDOS Other Non-Violent Cybercrimes Internet Gambling Internet Drug Sales Cyberlaundering Skimming/Carding Drops/reshipping Reasons for Cybercrime Internet has made it easier to reach more victims or carry out criminal activity Easier for pedophile to acquire items Commit crime anonymously Using websites and email to herd more victims Target attacks against former employee or rich targets Fighting Cybercrime Know the enemy Players Police Law makers IT professionals Courts Fighting Cybercrime Some problems Businesses reluctant to admit problem Brand or image issue Law Enforcement too slow or not sharing into Technical issues Computers and networks can be involved in crimes in several different ways The computer or network can be the tool of the crime The computer or network can be the target of the crime The computer or network can be used to support the crime-storing records of criminal activity Jurisdiction Issues Covering Federal Issues Numerous ways to establish venue Where criminal is located Where victim is located Where servers are located Where undercover created venue State and local Can be very dicey Quantifying Cybercrime Internet Crime Center (IC3) Partnership of FBI and National White Coller Crime Center (NW3C) Take complaints from victims of cybercrime Can be a wealth of information Request is made, research, results Example Two Groups IT Professionals Discover on systems-report or not • Law Enforcement Sort through legal, jurisdictional and practical issues Social Networking Social Networking Social Networking The popularity of online social networks has changed the investigative landscape drastically. Almost every type of case, from homicide to sex crimes to financial crimes,” Cohen said, “it is hard to find a crime that doesn’t have some sort of evidentiary trail on online social networks Social Networking Facebook Homework Assignment Research a current Cybercrime Discuss the crime/scheme Who are the players What is the reason for the violation Professional or weekend warrior What laws were violated Did they use social networking in the commission 5 minute presentation ...
View Full Document

  • Fall '16

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern