Crime and Hacking
Most computer crimes are "inside jobs" (about 85%)
85-97% of break-ins go undetected according to the FBI
Not all computer crime is "high tech" (e.g. fake ATM machines)
An attack that exploits a system weakness may be called a "macro"
attack." An attack that is implemented by re-programming a system may be
called a "micro attack."
Some Types of Crimes
- Rogue Programs
- Denial of Service-normal service is interrupted or a single user
monopolizes the resource.
- Fraud or Embezzlement-example: inserting a "horse" or fraudulent
account into a system in order to siphon off funds. Click
here for
scams
- Child Pornography
- Theft of intellectual Property
- Trespass
- Destruction of Property
Problems in Prosecuting Computer Crimes
- Perpetrator may be underage
- Perpetrator may be in a foreign country
- There may be multiple perpetrators in several countries
- It may be hard to gather evidence
- Judges and juries may not understand the evidence
- Laws/extradition may not be in place
- Law enforcement may not have experience or tools-may need expert help
Important Organizations
- NCCCD-National Center for Computer Crime Data, Los Angeles, CA
- NCSC-National Computer Security Center, Fort Meade, MD
- NCCS-FBI's National Computer Crime Squad
- CERT-Computer Emergency Response Team, Carnegie Mellon, PA
Law Enforcement
- local police
- state attorney general
- FBI
- Secret Service
Some Famous Cases
- Internet Worm Incident perpetrated by Robert Morris Jr. 1988
- Cliff Stoll published The Cuckoo's Egg in 1989
which told how he cracked a West German hacking ring. (Film)
Hacking
- Dumpster Diving
- Packet Sniffing
- Bulletin Boards, IRC-Internet Relay Chat
- Publications, such as Phrack or 2600.
- Hacker tools such as SATAN
- Legion of Doom, Chaos Computer Club
- C|NET article
with interesting links
For more information, see: Donn Parker, Fighting Computer
Crime. 1998.
Discussion:
- Hacking
- Vigilantes
- Cyberwarfare