You are on page 1of 19

Chapter 3

Traditional Computer Crime


Varying Sophistication
Continuum of computer criminals
Technology changes MO

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 2 All Rights Reserved.
 Questions of Vicinage
 Lack of international cooperation –
disincentives for some countries
 Perception of Anonymity – increases activity
 Encryption & Steganography
 Delayed detection
 Judicial inconsistency
 Administrative apathy
 Cultural skepticism
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 3 All Rights Reserved.
 cryptology – the study of secret written messages
usually of a military or diplomatic nature
 Cryptography – the making or encrypting of
secret messages
 May involve simple manipulation of letters – i.e. HAL
(2001:Space Odyssey) represented IBM (following
letter in the alphabet)
 Cyptanalysis – the breaking or decrypting of
secret messages
 Steganography – secret messages hidden from
normal view

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 4 All Rights Reserved.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 5 All Rights Reserved.
 First crime unclear – theft of abacus?
 First computer sabotage –destruction of
Jacquard’s automated textile machine (early
19th century)
 Theft of components
 Three Incidents

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 6 All Rights Reserved.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 7 All Rights Reserved.
 Definition – the manipulation of
telecommunications carriers to gain knowledge of
telecommunications, and/or theft of applicable
services.
 Includes any activity that incorporates the illegal
use or manipulation of access codes, access tones,
PBX’s, or switches
 Methods
 Shoulder surfing
 Blue boxes
 Current version – “call-sell” operations (prepaid
phone cards)

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 8 All Rights Reserved.
 1960’s – term “hacking” is used by MIT
students to refer to either the development of
novel techniques to identify computer
shortcuts or clever pranks
 “hacking” away at an object until it gives way
 Term popularized in the 1980’s War Games
 Hacker ethos – lashing out at big business, no
profit, etc.

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 9 All Rights Reserved.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 10 All Rights Reserved.
 Kevin Mitnick
 Downfall – breaking into computer of fellow hacker –
Tsutomo Shimomura – who tracked him down with the FBI
 cOmrade
 First teen to be incarcerated for hacking
Targets included Miami-Dad school system, BellSouth, DOD, etc.
 Terminus
 Unix programmer & AT&T minicomputer expert
 Targeted AT&T among others
 Shadowhawk
 Sentenced to 9 months for breaking and entering into U.S.
Missile Command
 Also targeted AT&T
 Kyrie
 One of the few female hackers
 Specialty involved abuse of corporate voice mail
 Also involved her children in her activities
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 11 All Rights Reserved.
 Initially
 Young, socially inept individuals enamored of computers
and computer technology through role-playing games
 Expense associated with downloading led to
manipulation of telephone exchanges
 Anti- establishment ideology

• Contemporary communities
• Lost much of the original ideology
• Motivations now include easy money, revenge, personal
notoriety
• Increase in hacking for profit

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 12 All Rights Reserved.
 Six categories based on motivation
 Boredom - Informational Voyeurism
 Intellectual challenge – pure hackers, mining for
knowledge
 Revenge – insiders, disgruntled employees, etc.
 Economic (criminals)
 Sexual gratification (stalking, harassment)
 Political (terrorists, spies, etc.)

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 13 All Rights Reserved.
 Insiders – most dangerous
 May be accidental or intentional
 How can you prevent it?
 Security awareness training

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 14 All Rights Reserved.
 Script kiddies
 Aka – skidiots, skiddie, or Victor Skill Deficiency (VSD)
 Inexperienced hackers who employ scripts or other
programs authored by others to exploit security
vulnerabilities or otherwise compromise computer systems
 Do not understand the programs they are actually
employing
 Cyberpunks
 Hotly contested term – used by LE to refer to those intent
on wreaking havoc via the Internet
 Hackers/Crackers
 Cyber-criminal organizations

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 15 All Rights Reserved.
 Hardware
 Black market
 Grey market
 Software
 counterfeiting
 Data piracy
 Theft of Computer Components
 10/2006 – Brothers Jimmy Luong and Danny Hung Leung
– convicted of money laundering in connection with the
theft of over $10 million in computer components
 2/2001 – Employees of SoftBank - $700K of computer
products
 6/2001 - $4 million in disk drives stolen from IBM in San
Jose

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 16 All Rights Reserved.
 Film piracy
 Optical disc piracy
 Internet piracy
 Videocassette piracy
 Theatrical print theft
 Signal theft
 Broadcast piracy
 Public performances
 Parallel imports
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 17 All Rights Reserved.
Counterfeit software
Committed via burners
Increasingly organized
Methods of identification
o Counterfeit hologram; absence of original reserve label & absence
of polygraphic packing; absence of Copyright and Adjacent Rights
Protection sign; abnormalities in packaging material
o Absence of high quality images on the CD

Counterfeit chips
Commodities
Popular in U.S. and Asia

Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 18 All Rights Reserved.
Computer Forensics and Cyber Crime, 2nd ed. © 2009 Pearson Education, Upper Saddle River, NJ 07458.
Britz 19 All Rights Reserved.

You might also like