SlideShare une entreprise Scribd logo
1  sur  27
Computer Crime
   Another Jurisdiction?




                                           Germán Terán
                           Social Communication Student
                                      Universidad de Lima
                                                     Perú
                                  tersamge@hotmail.com
Structure
• Crime history
• Types of crime
• Another types of crime
• Special crime adv. Found on internet.
• National & International Efforts + Cb.crime
  Future.
• Conclusion
Crime & Cybercrime
• Crime
  – Engaging in conduct
    that has been outlawed
    by a particular society.
  – Harm to: Individuals,
    property, government
    and morality.
• Cybercrime
  – Differ in the tool: guns
    are change for
    computers.
Cybercriminals + computer technology = difficulties to apply the law.

             not only real-world crimes by using computers…
DDoS attack




• Distributed Denial of Service.
   – Harm upon property by shutting down a website.
   – The attack doesn’t fit in conceptual category the law has
     devised to deal with crime.
Emergence of cybercrime
• 1950- word “hack” is use to refer to creative
  college pranks and migrate to computer culture.
• 1960- first published accounts of computers
  being used illegally.
  – Crimes committed by insiders.
• 1969- ARPANET link computers in hundred of
  universities.
• 1980- Personal networked computer .
  – Hackers were up to no good.
Phone Phreaking
• Manipulating the telephone
  system
   – Provide free long-
     distance service.
   – Prosecuted under
     existing law (fraud or
     theft)
   – Phone phreaks move on
     to hacking in the 1980s
Meanwhile…
• First civilian bulletin board
  system on-line in Chicago.
  Some engaged in darker
  activities.
• 1984- Hacker groups appear.
                                            Robert Tappan – Morris worm
  Legion Of Doom (LOD),
  Masters of deception
  (MOD), etc. War startetd.
• 1988- Robert Tappan Morris
  released the first Internet
  worm.
                                  Chris Goggans (LOD)        Mark Abene (MOD)
Hacking
• Kevin Poulsen jumped from
  Phone phreak to hacking.

• Attacks to Pacific Bell
  Telephone Company and
  federal government
  installations.

• Apprehended in 1991-Charges:
  accessed device fraud,
  conspiracy, wiretapping,
  computer fraud, mail fraud,
  money laundering and
  espionage.
                                                            Kevin Poulsen

     Kevin Mitnick was the first hacker included in FBI’S MOS WANTED list.
Malware




•   Robert Tappan Morris “invented” the network malware.
•   He demostrate how quickly malware can spread from system to system.
•   1999- Melissa is the first mass-mailing computer virus.
•   At first malware was not addresss by local criminal law.
Theft
  • 1994- Vladimir Levin
    siphoned millions of dollars
    from Citibank accounts.
  • Use of computers
    technology to obtain funds
    belonging to someone else.
  • Traditional crime in a no
    traditional way.

                                                               Vladimir Levin



China: Song Chenglin used a computer at an Internet Café to hack 158 accounts at the ICBC
Fraud




•   “Official” fraud           •   Internet auction fraud
     –   Transfer millions          –   Factory direct products
•   Lottery fraud              •   Identity theft
     –   “Won” the lottery     •   Specific legislation is not needed.
Child Pornography
• Internet provides less risk of
  being identified.
• Highly organized, global
  subculture.
• Many of them are in
  countries where child
  pornography is not a priority
  for law enforcement.
• What is child pornography?
  Definition of child.
Extortion




•   Same dynamic as in real-world
•   Threaten to reveal sensitive information of an online business.
•   DDoS Attack to Casinos.
•   Will eventually be directed to bigger organizations.
Cyberterrorism
• Terrorism: Commission of criminal acts for
  political motives.
• Has involved the use of methods of physical
  destruction.
• USA Patriot ACT
  – Hacking, cracking, extortion, fraud and malware.
Warning




Korean Warning on the internet
Internet Homicide




• Distribution of Hardcore and Snuff Movies
• A face to face date with online friend can turn deadly.
• Consensual homicide.
Rotenburg Cannibal




•   Germany .- March 9, 2001.
     – Armin Meiwes (Cannibal)
     – Bernd Jürgen Brandes (Victime)
•   Armin post a message on “The Cannibal Café” website.
•   Documentary: http://video.google.com/videoplay?docid=1299254578438715427
Internet Suicide
  • Suicide pact made on
    internet.
  • Most of cases have ocurred
    in Japan.
       – Some of them are also in
         China, South Korea,
         Germany, USA, etc.
  • Traditional suicide pacts
    involved older peole (50-60
    years old)
  • Internet suicide pact now
    involve young people,
    usually teenagers.

Check this link for more information: http://www.espacoacademico.com.br/044/44eueno_ing.htm
Online Mercenaries
• Found by searching material for this
  presentation.
• http://club.telepolis.com/servmerc/index.htm
+                                 =


PC + Internet = Cybercrime legislation far more imperative
National & International Efforts
• First Wave (privacy)
   – Sweden (1973) ; USA (1974); Federal Republic of German (1977);
     Austria, Denmark, France and Norway (1978), etc.
• Second Wave (property)
   – Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark
     (1985), etc.
• Third Wave (intellectual property)
• Convention on Cybercrime
   –   Ensuring that countries adopt procedural laws.
   –   International cooperation.
   –   Harmonizing national cybercrime law.
   –   Domestic law criminalizes: Attacks on PC data or system; Pc tech. to
       commit fraud or forgery; Pc tech. to create Child Pornograpy.; infringe
       copyright.
Cybercrime: the future




• Two main trends:
   – Professionalization of Cybercrime (creation of cybermafias,
     similar to italian families in early of US history).
   – Increasing the automization of Cybercrime.
Clever cybercriminals can enjoy the benefits of
criminal organization without its disadvantages.


Definitely this is another arena for human activity.
      But, is it legally another jurisdiction?


This seems to be more than a study case because all we studied in
      Information Society class can turn into a crime activity
                    What can we do?

Contenu connexe

Tendances

Tendances (20)

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime and cyber security
Cyber crime and cyber securityCyber crime and cyber security
Cyber crime and cyber security
 
Cyber crimes and their prevention
Cyber crimes and their preventionCyber crimes and their prevention
Cyber crimes and their prevention
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber security laws
Cyber security lawsCyber security laws
Cyber security laws
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Cybercrime and Security
Cybercrime and SecurityCybercrime and Security
Cybercrime and Security
 
Cyber Security in Society
Cyber Security in SocietyCyber Security in Society
Cyber Security in Society
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cybercrime presentation
Cybercrime presentationCybercrime presentation
Cybercrime presentation
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 
Cybercrime a growing threat of 21 st century !!!
Cybercrime a growing threat of 21 st  century !!!Cybercrime a growing threat of 21 st  century !!!
Cybercrime a growing threat of 21 st century !!!
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

En vedette

Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Usersalmario1988
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
УЦСБ, Яблонко
УЦСБ, ЯблонкоУЦСБ, Яблонко
УЦСБ, ЯблонкоExpolink
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safetyjaenjenny
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsingjgswift
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crimevishalgohel12195
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Projecttsdikshit
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And KidsSandra Fathi
 

En vedette (20)

Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
УЦСБ, Яблонко
УЦСБ, ЯблонкоУЦСБ, Яблонко
УЦСБ, Яблонко
 
Internet safety
Internet safetyInternet safety
Internet safety
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Internet literacy and safety
Internet literacy and safetyInternet literacy and safety
Internet literacy and safety
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 

Similaire à [Exposicion] Computer and Internet Crime

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptxsainnrg
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011Andrea Rossetti
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxsainnrg
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newDr. Arun Verma
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Gol D Roger
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010- Mark - Fullbright
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sDhurba Mainali
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simonudhaya jeni
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGJyotisheklingji
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber securityNabarun Sarkar
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats ReportMcafeeCareers
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Mohammad Ahmed
 

Similaire à [Exposicion] Computer and Internet Crime (20)

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
L Scope
L ScopeL Scope
L Scope
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Final ppt
Final pptFinal ppt
Final ppt
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Communications
CommunicationsCommunications
Communications
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber security
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 

Plus de German Teran

[Critica] Asia y los Gansos Voladores (UNCTAD)
[Critica] Asia y los Gansos Voladores (UNCTAD)[Critica] Asia y los Gansos Voladores (UNCTAD)
[Critica] Asia y los Gansos Voladores (UNCTAD)German Teran
 
[Critica] China y América Latina y el Caribe (CEPAL)
[Critica] China y América Latina y el Caribe (CEPAL)[Critica] China y América Latina y el Caribe (CEPAL)
[Critica] China y América Latina y el Caribe (CEPAL)German Teran
 
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia OrientalGerman Teran
 
[Exposicion] Los efectos económicos y sociales de la liberalización financier...
[Exposicion] Los efectos económicos y sociales de la liberalización financier...[Exposicion] Los efectos económicos y sociales de la liberalización financier...
[Exposicion] Los efectos económicos y sociales de la liberalización financier...German Teran
 
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
[Critica] Los orígenes de la independencia hispanoamericana Por John LynchGerman Teran
 
[Critica] Facebook colectivism
[Critica] Facebook colectivism[Critica] Facebook colectivism
[Critica] Facebook colectivismGerman Teran
 
[Investigacion] China Tibet Issue
[Investigacion] China Tibet Issue[Investigacion] China Tibet Issue
[Investigacion] China Tibet IssueGerman Teran
 
[Critica] Apple's Weakness
[Critica] Apple's Weakness[Critica] Apple's Weakness
[Critica] Apple's WeaknessGerman Teran
 

Plus de German Teran (8)

[Critica] Asia y los Gansos Voladores (UNCTAD)
[Critica] Asia y los Gansos Voladores (UNCTAD)[Critica] Asia y los Gansos Voladores (UNCTAD)
[Critica] Asia y los Gansos Voladores (UNCTAD)
 
[Critica] China y América Latina y el Caribe (CEPAL)
[Critica] China y América Latina y el Caribe (CEPAL)[Critica] China y América Latina y el Caribe (CEPAL)
[Critica] China y América Latina y el Caribe (CEPAL)
 
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
 
[Exposicion] Los efectos económicos y sociales de la liberalización financier...
[Exposicion] Los efectos económicos y sociales de la liberalización financier...[Exposicion] Los efectos económicos y sociales de la liberalización financier...
[Exposicion] Los efectos económicos y sociales de la liberalización financier...
 
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
 
[Critica] Facebook colectivism
[Critica] Facebook colectivism[Critica] Facebook colectivism
[Critica] Facebook colectivism
 
[Investigacion] China Tibet Issue
[Investigacion] China Tibet Issue[Investigacion] China Tibet Issue
[Investigacion] China Tibet Issue
 
[Critica] Apple's Weakness
[Critica] Apple's Weakness[Critica] Apple's Weakness
[Critica] Apple's Weakness
 

Dernier

Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfChristalin Nelson
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Celine George
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptxmary850239
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research DiscourseAnita GoswamiGiri
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvRicaMaeCastro1
 

Dernier (20)

prashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Professionprashanth updated resume 2024 for Teaching Profession
prashanth updated resume 2024 for Teaching Profession
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Indexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdfIndexing Structures in Database Management system.pdf
Indexing Structures in Database Management system.pdf
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17Tree View Decoration Attribute in the Odoo 17
Tree View Decoration Attribute in the Odoo 17
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx4.9.24 School Desegregation in Boston.pptx
4.9.24 School Desegregation in Boston.pptx
 
Scientific Writing :Research Discourse
Scientific  Writing :Research  DiscourseScientific  Writing :Research  Discourse
Scientific Writing :Research Discourse
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnvESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
ESP 4-EDITED.pdfmmcncncncmcmmnmnmncnmncmnnjvnnv
 

[Exposicion] Computer and Internet Crime

  • 1. Computer Crime Another Jurisdiction? Germán Terán Social Communication Student Universidad de Lima Perú tersamge@hotmail.com
  • 2. Structure • Crime history • Types of crime • Another types of crime • Special crime adv. Found on internet. • National & International Efforts + Cb.crime Future. • Conclusion
  • 3. Crime & Cybercrime • Crime – Engaging in conduct that has been outlawed by a particular society. – Harm to: Individuals, property, government and morality. • Cybercrime – Differ in the tool: guns are change for computers.
  • 4. Cybercriminals + computer technology = difficulties to apply the law. not only real-world crimes by using computers…
  • 5. DDoS attack • Distributed Denial of Service. – Harm upon property by shutting down a website. – The attack doesn’t fit in conceptual category the law has devised to deal with crime.
  • 6. Emergence of cybercrime • 1950- word “hack” is use to refer to creative college pranks and migrate to computer culture. • 1960- first published accounts of computers being used illegally. – Crimes committed by insiders. • 1969- ARPANET link computers in hundred of universities. • 1980- Personal networked computer . – Hackers were up to no good.
  • 7. Phone Phreaking • Manipulating the telephone system – Provide free long- distance service. – Prosecuted under existing law (fraud or theft) – Phone phreaks move on to hacking in the 1980s
  • 8. Meanwhile… • First civilian bulletin board system on-line in Chicago. Some engaged in darker activities. • 1984- Hacker groups appear. Robert Tappan – Morris worm Legion Of Doom (LOD), Masters of deception (MOD), etc. War startetd. • 1988- Robert Tappan Morris released the first Internet worm. Chris Goggans (LOD) Mark Abene (MOD)
  • 9. Hacking • Kevin Poulsen jumped from Phone phreak to hacking. • Attacks to Pacific Bell Telephone Company and federal government installations. • Apprehended in 1991-Charges: accessed device fraud, conspiracy, wiretapping, computer fraud, mail fraud, money laundering and espionage. Kevin Poulsen Kevin Mitnick was the first hacker included in FBI’S MOS WANTED list.
  • 10. Malware • Robert Tappan Morris “invented” the network malware. • He demostrate how quickly malware can spread from system to system. • 1999- Melissa is the first mass-mailing computer virus. • At first malware was not addresss by local criminal law.
  • 11. Theft • 1994- Vladimir Levin siphoned millions of dollars from Citibank accounts. • Use of computers technology to obtain funds belonging to someone else. • Traditional crime in a no traditional way. Vladimir Levin China: Song Chenglin used a computer at an Internet Café to hack 158 accounts at the ICBC
  • 12. Fraud • “Official” fraud • Internet auction fraud – Transfer millions – Factory direct products • Lottery fraud • Identity theft – “Won” the lottery • Specific legislation is not needed.
  • 13. Child Pornography • Internet provides less risk of being identified. • Highly organized, global subculture. • Many of them are in countries where child pornography is not a priority for law enforcement. • What is child pornography? Definition of child.
  • 14. Extortion • Same dynamic as in real-world • Threaten to reveal sensitive information of an online business. • DDoS Attack to Casinos. • Will eventually be directed to bigger organizations.
  • 15. Cyberterrorism • Terrorism: Commission of criminal acts for political motives. • Has involved the use of methods of physical destruction. • USA Patriot ACT – Hacking, cracking, extortion, fraud and malware.
  • 17. Internet Homicide • Distribution of Hardcore and Snuff Movies • A face to face date with online friend can turn deadly. • Consensual homicide.
  • 18. Rotenburg Cannibal • Germany .- March 9, 2001. – Armin Meiwes (Cannibal) – Bernd Jürgen Brandes (Victime) • Armin post a message on “The Cannibal Café” website. • Documentary: http://video.google.com/videoplay?docid=1299254578438715427
  • 19. Internet Suicide • Suicide pact made on internet. • Most of cases have ocurred in Japan. – Some of them are also in China, South Korea, Germany, USA, etc. • Traditional suicide pacts involved older peole (50-60 years old) • Internet suicide pact now involve young people, usually teenagers. Check this link for more information: http://www.espacoacademico.com.br/044/44eueno_ing.htm
  • 20. Online Mercenaries • Found by searching material for this presentation. • http://club.telepolis.com/servmerc/index.htm
  • 21.
  • 22.
  • 23.
  • 24. + = PC + Internet = Cybercrime legislation far more imperative
  • 25. National & International Efforts • First Wave (privacy) – Sweden (1973) ; USA (1974); Federal Republic of German (1977); Austria, Denmark, France and Norway (1978), etc. • Second Wave (property) – Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc. • Third Wave (intellectual property) • Convention on Cybercrime – Ensuring that countries adopt procedural laws. – International cooperation. – Harmonizing national cybercrime law. – Domestic law criminalizes: Attacks on PC data or system; Pc tech. to commit fraud or forgery; Pc tech. to create Child Pornograpy.; infringe copyright.
  • 26. Cybercrime: the future • Two main trends: – Professionalization of Cybercrime (creation of cybermafias, similar to italian families in early of US history). – Increasing the automization of Cybercrime.
  • 27. Clever cybercriminals can enjoy the benefits of criminal organization without its disadvantages. Definitely this is another arena for human activity. But, is it legally another jurisdiction? This seems to be more than a study case because all we studied in Information Society class can turn into a crime activity What can we do?