SlideShare une entreprise Scribd logo
1  sur  27
Computer Crime
   Another Jurisdiction?




                                           Germán Terán
                           Social Communication Student
                                      Universidad de Lima
                                                     Perú
                                  tersamge@hotmail.com
Structure
• Crime history
• Types of crime
• Another types of crime
• Special crime adv. Found on internet.
• National & International Efforts + Cb.crime
  Future.
• Conclusion
Crime & Cybercrime
• Crime
  – Engaging in conduct
    that has been outlawed
    by a particular society.
  – Harm to: Individuals,
    property, government
    and morality.
• Cybercrime
  – Differ in the tool: guns
    are change for
    computers.
Cybercriminals + computer technology = difficulties to apply the law.

             not only real-world crimes by using computers…
DDoS attack




• Distributed Denial of Service.
   – Harm upon property by shutting down a website.
   – The attack doesn’t fit in conceptual category the law has
     devised to deal with crime.
Emergence of cybercrime
• 1950- word “hack” is use to refer to creative
  college pranks and migrate to computer culture.
• 1960- first published accounts of computers
  being used illegally.
  – Crimes committed by insiders.
• 1969- ARPANET link computers in hundred of
  universities.
• 1980- Personal networked computer .
  – Hackers were up to no good.
Phone Phreaking
• Manipulating the telephone
  system
   – Provide free long-
     distance service.
   – Prosecuted under
     existing law (fraud or
     theft)
   – Phone phreaks move on
     to hacking in the 1980s
Meanwhile…
• First civilian bulletin board
  system on-line in Chicago.
  Some engaged in darker
  activities.
• 1984- Hacker groups appear.
                                            Robert Tappan – Morris worm
  Legion Of Doom (LOD),
  Masters of deception
  (MOD), etc. War startetd.
• 1988- Robert Tappan Morris
  released the first Internet
  worm.
                                  Chris Goggans (LOD)        Mark Abene (MOD)
Hacking
• Kevin Poulsen jumped from
  Phone phreak to hacking.

• Attacks to Pacific Bell
  Telephone Company and
  federal government
  installations.

• Apprehended in 1991-Charges:
  accessed device fraud,
  conspiracy, wiretapping,
  computer fraud, mail fraud,
  money laundering and
  espionage.
                                                            Kevin Poulsen

     Kevin Mitnick was the first hacker included in FBI’S MOS WANTED list.
Malware




•   Robert Tappan Morris “invented” the network malware.
•   He demostrate how quickly malware can spread from system to system.
•   1999- Melissa is the first mass-mailing computer virus.
•   At first malware was not addresss by local criminal law.
Theft
  • 1994- Vladimir Levin
    siphoned millions of dollars
    from Citibank accounts.
  • Use of computers
    technology to obtain funds
    belonging to someone else.
  • Traditional crime in a no
    traditional way.

                                                               Vladimir Levin



China: Song Chenglin used a computer at an Internet Café to hack 158 accounts at the ICBC
Fraud




•   “Official” fraud           •   Internet auction fraud
     –   Transfer millions          –   Factory direct products
•   Lottery fraud              •   Identity theft
     –   “Won” the lottery     •   Specific legislation is not needed.
Child Pornography
• Internet provides less risk of
  being identified.
• Highly organized, global
  subculture.
• Many of them are in
  countries where child
  pornography is not a priority
  for law enforcement.
• What is child pornography?
  Definition of child.
Extortion




•   Same dynamic as in real-world
•   Threaten to reveal sensitive information of an online business.
•   DDoS Attack to Casinos.
•   Will eventually be directed to bigger organizations.
Cyberterrorism
• Terrorism: Commission of criminal acts for
  political motives.
• Has involved the use of methods of physical
  destruction.
• USA Patriot ACT
  – Hacking, cracking, extortion, fraud and malware.
Warning




Korean Warning on the internet
Internet Homicide




• Distribution of Hardcore and Snuff Movies
• A face to face date with online friend can turn deadly.
• Consensual homicide.
Rotenburg Cannibal




•   Germany .- March 9, 2001.
     – Armin Meiwes (Cannibal)
     – Bernd Jürgen Brandes (Victime)
•   Armin post a message on “The Cannibal Café” website.
•   Documentary: http://video.google.com/videoplay?docid=1299254578438715427
Internet Suicide
  • Suicide pact made on
    internet.
  • Most of cases have ocurred
    in Japan.
       – Some of them are also in
         China, South Korea,
         Germany, USA, etc.
  • Traditional suicide pacts
    involved older peole (50-60
    years old)
  • Internet suicide pact now
    involve young people,
    usually teenagers.

Check this link for more information: http://www.espacoacademico.com.br/044/44eueno_ing.htm
Online Mercenaries
• Found by searching material for this
  presentation.
• http://club.telepolis.com/servmerc/index.htm
+                                 =


PC + Internet = Cybercrime legislation far more imperative
National & International Efforts
• First Wave (privacy)
   – Sweden (1973) ; USA (1974); Federal Republic of German (1977);
     Austria, Denmark, France and Norway (1978), etc.
• Second Wave (property)
   – Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark
     (1985), etc.
• Third Wave (intellectual property)
• Convention on Cybercrime
   –   Ensuring that countries adopt procedural laws.
   –   International cooperation.
   –   Harmonizing national cybercrime law.
   –   Domestic law criminalizes: Attacks on PC data or system; Pc tech. to
       commit fraud or forgery; Pc tech. to create Child Pornograpy.; infringe
       copyright.
Cybercrime: the future




• Two main trends:
   – Professionalization of Cybercrime (creation of cybermafias,
     similar to italian families in early of US history).
   – Increasing the automization of Cybercrime.
Clever cybercriminals can enjoy the benefits of
criminal organization without its disadvantages.


Definitely this is another arena for human activity.
      But, is it legally another jurisdiction?


This seems to be more than a study case because all we studied in
      Information Society class can turn into a crime activity
                    What can we do?

Contenu connexe

Tendances

Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
Keshab Nath
 

Tendances (20)

Computer misuse
Computer misuse Computer misuse
Computer misuse
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and cyber security
Cyber crime and cyber  securityCyber crime and cyber  security
Cyber crime and cyber security
 
Computer crime
 Computer crime Computer crime
Computer crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Space
Cyber SpaceCyber Space
Cyber Space
 
It act and cyber crime
It act and cyber crimeIt act and cyber crime
It act and cyber crime
 
Introduction to Cyber Crime
Introduction to Cyber CrimeIntroduction to Cyber Crime
Introduction to Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Introduction to cyber security amos
Introduction to cyber security amosIntroduction to cyber security amos
Introduction to cyber security amos
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 
Cybercrime & Security
Cybercrime & SecurityCybercrime & Security
Cybercrime & Security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Ransomware
RansomwareRansomware
Ransomware
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 

En vedette

Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Sundas Kayani
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
Aeman Khan
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
Lipsita Behera
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
tsdikshit
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
aleeya91
 

En vedette (20)

Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Computer Crimes
Computer CrimesComputer Crimes
Computer Crimes
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Ethics for IT Professionals and IT Users
Ethics for IT Professionals and IT UsersEthics for IT Professionals and IT Users
Ethics for IT Professionals and IT Users
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
УЦСБ, Яблонко
УЦСБ, ЯблонкоУЦСБ, Яблонко
УЦСБ, Яблонко
 
Internet safety
Internet safetyInternet safety
Internet safety
 
IS201 Internet Crime and Safety
IS201 Internet Crime and SafetyIS201 Internet Crime and Safety
IS201 Internet Crime and Safety
 
Internet literacy and safety
Internet literacy and safetyInternet literacy and safety
Internet literacy and safety
 
Malware & Safe Browsing
Malware & Safe BrowsingMalware & Safe Browsing
Malware & Safe Browsing
 
Traditional problem associated with cyber crime
Traditional problem associated with cyber crimeTraditional problem associated with cyber crime
Traditional problem associated with cyber crime
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Crime Awareness Project
Cyber Crime Awareness ProjectCyber Crime Awareness Project
Cyber Crime Awareness Project
 
Internet Safety For Parents And Kids
Internet Safety For Parents And KidsInternet Safety For Parents And Kids
Internet Safety For Parents And Kids
 
Ict - Computer Ethics
Ict - Computer EthicsIct - Computer Ethics
Ict - Computer Ethics
 

Similaire à [Exposicion] Computer and Internet Crime

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
Pravir Karna
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
sainnrg
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
sainnrg
 
L Scope
L ScopeL Scope
L Scope
CTIN
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
Gol D Roger
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber security
Nabarun Sarkar
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
Mohammad Ahmed
 

Similaire à [Exposicion] Computer and Internet Crime (20)

Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
cyber-crime by cr.pptx
cyber-crime by cr.pptxcyber-crime by cr.pptx
cyber-crime by cr.pptx
 
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011Francesca Bosco, Cybercrimes  - Bicocca 31.03.2011
Francesca Bosco, Cybercrimes - Bicocca 31.03.2011
 
cyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptxcyber-crime-140128140443-phpapp02.pptx
cyber-crime-140128140443-phpapp02.pptx
 
L Scope
L ScopeL Scope
L Scope
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02Cybercrimeandforensic 120828021931-phpapp02
Cybercrimeandforensic 120828021931-phpapp02
 
The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010The Rise of Cybercrime 1970s - 2010
The Rise of Cybercrime 1970s - 2010
 
Cyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue'sCyber Crime and its Jurisdictional Issue's
Cyber Crime and its Jurisdictional Issue's
 
Cyber crime simon
Cyber crime simonCyber crime simon
Cyber crime simon
 
CYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERINGCYBERCRIME AND MONEY LAUNDERING
CYBERCRIME AND MONEY LAUNDERING
 
Final ppt
Final pptFinal ppt
Final ppt
 
Computer Crime Essay
Computer Crime EssayComputer Crime Essay
Computer Crime Essay
 
Computer Crime
Computer CrimeComputer Crime
Computer Crime
 
Communications
CommunicationsCommunications
Communications
 
A brief look at Cyber security
A brief look at Cyber securityA brief look at Cyber security
A brief look at Cyber security
 
2010q1 Threats Report
2010q1 Threats Report2010q1 Threats Report
2010q1 Threats Report
 
Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)Cyber crimes (By Mohammad Ahmed)
Cyber crimes (By Mohammad Ahmed)
 

Plus de German Teran

[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
German Teran
 
[Critica] Facebook colectivism
[Critica] Facebook colectivism[Critica] Facebook colectivism
[Critica] Facebook colectivism
German Teran
 
[Critica] Apple's Weakness
[Critica] Apple's Weakness[Critica] Apple's Weakness
[Critica] Apple's Weakness
German Teran
 

Plus de German Teran (8)

[Critica] Asia y los Gansos Voladores (UNCTAD)
[Critica] Asia y los Gansos Voladores (UNCTAD)[Critica] Asia y los Gansos Voladores (UNCTAD)
[Critica] Asia y los Gansos Voladores (UNCTAD)
 
[Critica] China y América Latina y el Caribe (CEPAL)
[Critica] China y América Latina y el Caribe (CEPAL)[Critica] China y América Latina y el Caribe (CEPAL)
[Critica] China y América Latina y el Caribe (CEPAL)
 
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
[Exposicion] Saori Katada - Comercio y Regionalismo financiero en Asia Oriental
 
[Exposicion] Los efectos económicos y sociales de la liberalización financier...
[Exposicion] Los efectos económicos y sociales de la liberalización financier...[Exposicion] Los efectos económicos y sociales de la liberalización financier...
[Exposicion] Los efectos económicos y sociales de la liberalización financier...
 
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
[Critica] Los orígenes de la independencia hispanoamericana Por John Lynch
 
[Critica] Facebook colectivism
[Critica] Facebook colectivism[Critica] Facebook colectivism
[Critica] Facebook colectivism
 
[Investigacion] China Tibet Issue
[Investigacion] China Tibet Issue[Investigacion] China Tibet Issue
[Investigacion] China Tibet Issue
 
[Critica] Apple's Weakness
[Critica] Apple's Weakness[Critica] Apple's Weakness
[Critica] Apple's Weakness
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Dernier (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

[Exposicion] Computer and Internet Crime

  • 1. Computer Crime Another Jurisdiction? Germán Terán Social Communication Student Universidad de Lima Perú tersamge@hotmail.com
  • 2. Structure • Crime history • Types of crime • Another types of crime • Special crime adv. Found on internet. • National & International Efforts + Cb.crime Future. • Conclusion
  • 3. Crime & Cybercrime • Crime – Engaging in conduct that has been outlawed by a particular society. – Harm to: Individuals, property, government and morality. • Cybercrime – Differ in the tool: guns are change for computers.
  • 4. Cybercriminals + computer technology = difficulties to apply the law. not only real-world crimes by using computers…
  • 5. DDoS attack • Distributed Denial of Service. – Harm upon property by shutting down a website. – The attack doesn’t fit in conceptual category the law has devised to deal with crime.
  • 6. Emergence of cybercrime • 1950- word “hack” is use to refer to creative college pranks and migrate to computer culture. • 1960- first published accounts of computers being used illegally. – Crimes committed by insiders. • 1969- ARPANET link computers in hundred of universities. • 1980- Personal networked computer . – Hackers were up to no good.
  • 7. Phone Phreaking • Manipulating the telephone system – Provide free long- distance service. – Prosecuted under existing law (fraud or theft) – Phone phreaks move on to hacking in the 1980s
  • 8. Meanwhile… • First civilian bulletin board system on-line in Chicago. Some engaged in darker activities. • 1984- Hacker groups appear. Robert Tappan – Morris worm Legion Of Doom (LOD), Masters of deception (MOD), etc. War startetd. • 1988- Robert Tappan Morris released the first Internet worm. Chris Goggans (LOD) Mark Abene (MOD)
  • 9. Hacking • Kevin Poulsen jumped from Phone phreak to hacking. • Attacks to Pacific Bell Telephone Company and federal government installations. • Apprehended in 1991-Charges: accessed device fraud, conspiracy, wiretapping, computer fraud, mail fraud, money laundering and espionage. Kevin Poulsen Kevin Mitnick was the first hacker included in FBI’S MOS WANTED list.
  • 10. Malware • Robert Tappan Morris “invented” the network malware. • He demostrate how quickly malware can spread from system to system. • 1999- Melissa is the first mass-mailing computer virus. • At first malware was not addresss by local criminal law.
  • 11. Theft • 1994- Vladimir Levin siphoned millions of dollars from Citibank accounts. • Use of computers technology to obtain funds belonging to someone else. • Traditional crime in a no traditional way. Vladimir Levin China: Song Chenglin used a computer at an Internet Café to hack 158 accounts at the ICBC
  • 12. Fraud • “Official” fraud • Internet auction fraud – Transfer millions – Factory direct products • Lottery fraud • Identity theft – “Won” the lottery • Specific legislation is not needed.
  • 13. Child Pornography • Internet provides less risk of being identified. • Highly organized, global subculture. • Many of them are in countries where child pornography is not a priority for law enforcement. • What is child pornography? Definition of child.
  • 14. Extortion • Same dynamic as in real-world • Threaten to reveal sensitive information of an online business. • DDoS Attack to Casinos. • Will eventually be directed to bigger organizations.
  • 15. Cyberterrorism • Terrorism: Commission of criminal acts for political motives. • Has involved the use of methods of physical destruction. • USA Patriot ACT – Hacking, cracking, extortion, fraud and malware.
  • 17. Internet Homicide • Distribution of Hardcore and Snuff Movies • A face to face date with online friend can turn deadly. • Consensual homicide.
  • 18. Rotenburg Cannibal • Germany .- March 9, 2001. – Armin Meiwes (Cannibal) – Bernd Jürgen Brandes (Victime) • Armin post a message on “The Cannibal Café” website. • Documentary: http://video.google.com/videoplay?docid=1299254578438715427
  • 19. Internet Suicide • Suicide pact made on internet. • Most of cases have ocurred in Japan. – Some of them are also in China, South Korea, Germany, USA, etc. • Traditional suicide pacts involved older peole (50-60 years old) • Internet suicide pact now involve young people, usually teenagers. Check this link for more information: http://www.espacoacademico.com.br/044/44eueno_ing.htm
  • 20. Online Mercenaries • Found by searching material for this presentation. • http://club.telepolis.com/servmerc/index.htm
  • 21.
  • 22.
  • 23.
  • 24. + = PC + Internet = Cybercrime legislation far more imperative
  • 25. National & International Efforts • First Wave (privacy) – Sweden (1973) ; USA (1974); Federal Republic of German (1977); Austria, Denmark, France and Norway (1978), etc. • Second Wave (property) – Italy (1978); UK (1981,1990); USA (1980s); Canada and Denmark (1985), etc. • Third Wave (intellectual property) • Convention on Cybercrime – Ensuring that countries adopt procedural laws. – International cooperation. – Harmonizing national cybercrime law. – Domestic law criminalizes: Attacks on PC data or system; Pc tech. to commit fraud or forgery; Pc tech. to create Child Pornograpy.; infringe copyright.
  • 26. Cybercrime: the future • Two main trends: – Professionalization of Cybercrime (creation of cybermafias, similar to italian families in early of US history). – Increasing the automization of Cybercrime.
  • 27. Clever cybercriminals can enjoy the benefits of criminal organization without its disadvantages. Definitely this is another arena for human activity. But, is it legally another jurisdiction? This seems to be more than a study case because all we studied in Information Society class can turn into a crime activity What can we do?