Law Enforcement Technology and Computer Crime

Law Enforcement Technology and Computer Crime - 1 Law...

Info iconThis preview shows pages 1–13. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 1 Law Enforcement, Technology, and Computer Crime Professor Holt Computer Crime 2 Cyber-terror? All manner of criminal and deviant behavior can occur on-line What about terrorism? Why should we discuss these issues? Is it a criminal justice problem? A information systems problem? 3 Information Warfare Information warfare is a term used to describe the use and manipulation of information to gain advantage over others Psychological operations Electronic warfare Military deception Physical destruction Security measures Information attacks 4 Cyberterrorism Terrorism involves the actual or threatened use of violence by an individual or group motivated by ideological or political objectives Cyberterrorists utilize similar tactics against information systems or computer resources to the same end Cyberterror is a relatively nebulous term 5 Why Worry? Allows for asymetric attacks Groups with relatively little power or size can perform devastating attacks with little expense Incorporates citizens into events Also provides force multipliers A physical attack coupled with a computer based attack What about 9/11 6 Threats? A number of groups are primary concerns to US resources Radical muslim groups Chinese and North Korean government State supported hacking? Environmental groups Radical political groups within the US The threat varies with each country around the globe 7 Targets? There are a multitude of targets and weak points in the US Information Infrastructure Telecommunications, information resources for civilians and government Critical Infrastructure Electrical power Water Transportation Emergency services Oil and gas Food stuffs/supply lines How do we protect private resources publicly? 8 So. . . Most all of these resources are managed or maintained by computer These threats could be potential doomsday scenarios Chinese hack into CA electrical grid The digital ramifications of physical attacks are also key 9 Methods Web defacement Hacks of high profile or other sites that enable individuals to send a message to a group Relatively short lived attack method Common and hits all sorts of groups http://attrition.org/mirror/attrition/2001/04/30/wdccplmr2-ws.opm.gov/ http://attrition.org/mirror/attrition/2001/04/30/www.njhri.edu.cn/ http://attrition.org/mirror/attrition/2001/04/30/www.segamatplastic.com.my/ 10 Other Methods Viruses and worms DOS or DDOS attacks Intrusions for espionage or disruption Misinformation sites Detailing targets and materials to facilitate an attack 11 Other Uses The Internet is a great communications device Enables fast, cheap distributed communications Steganographics and cryptography Allows data to be hidden in all sorts of images and materials 12 Other Uses Web pages, forums, e-mail, chat rooms, and IM...
View Full Document

Page1 / 57

Law Enforcement Technology and Computer Crime - 1 Law...

This preview shows document pages 1 - 13. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online