Sunday, May 19, 2019
Digital Crime and Terrorism Essay
AbstractThe use of the profit for criminal pur coiffure is one of the most censorious challenges facing the FBI and law enforcement in general. Understanding and victimisation the profits to combat Internet Fraud is internal for law enforcement. The invention being committed all over the Internet is the same Type of white collar fraud the FBI has traditionally investigated but poses additional concerns And Challenges, because of the fresh environment in which it is located. The Internet is a perfect vehicle to locate victims and provide the environment where the victims bustt see or speak to the fraudulent. The Internet environment often creates a false aesthesis of Security among users leading them to check bug out opportunities found on the Internet less Thoroughly than they big businessman otherwise. Computer crime poses a daunting task for law Enforcement agencies because they be highly Technical crimes. righteousness enforcement agencies essential Have individuals tr ained in figurer science or computer forensics in install to properly to Properly investigate computer crimes. Computer crime is defined as any soul that violates any Of the provisions of the following unauthorized access to a computer system, Theft of computer Services, hanging of computer Services, Misuses of computer system information, and Destruction of computer equipment. The general heading of computer crime potty electric potentially Cover an array of offense by examining several existing definitions of computer crime, as tumefy as Elements suggested as essential, some Have defined computer crime as any offense that uses or Somehow involves a computer.Role of Internet and crimeThe growth of the Internet has improved our rescue, practice of medicine and engineering. Unfortunately, it has brought new opportunities for criminal activity, as well. Often, people Think cyber-crime simply refers to hacking, viruses and other intrusion tactics. Cyber- crime, However, scourg eens more than our businesses, economy or home(a) infrastructure. Cyber- crime Affects us individuals, as well. Reprehensible crimes, such as child vulgarism and cyber Stalking, terrorize our children and our families.At the first hearing in this series, on May 24th, the Texas Deputy Attorney cosmopolitan for Criminal Justice testified that, quote, One of the biggest problems is that computer criminals are targeting The most vulnerable of our society, children. He pointed out that, consort to the Federal Bureau of Investigation, child pornography was virtually extinct prior to the advent of the Internet. Now it is a serious plague on our society that must be stopped.Adults also experience the dark cheek of the Internet revolution. Using computer technology, Criminal types steal life savings and however identities of unsuspecting individuals. These pose Serious threats to the lives and the livelihoods of many individuals. But in addressing these field of forces Of crime, law-e nforcement officers face several challenges. Identifying a sophisticated criminal tummy be difficult. Once they are identified, bringing a criminal to justice may be questionable for Jurisdictional reasons.The criminal may be in a different State or even another conceivery, and then law enforcement Officials must deal with extradition issues. Also, retrieving the information stored on a computer And employ it for prosecution may be difficult if it requires highly technical skills not normally Taught to investigators or prosecutors. As long as at that place is technology, cybercrime will exist, yet Cybercrime must be curtailed as much as possible so that technology dope trustworthyly continue To enrich our lives and strengthen our economy.Congress understands that law-enforcement officials must aim the appropriate training and Equipment to fight fire with fire, or computer technology with computer technology but Law-enforcement must remain cognizant of the need to protect the law-abiding publics Privacy while defend the public. The public must understand that law-enforcement does need To use technology to deal with this new emerging threat to our children, our economy and our National security.Under current law, law-enforcement government must apply for the identical order in multiple Jurisdictions, causing burdens and delays that benefit no one but criminals. Congress should look At the opening night of a single order that would cover these kinds of requests comprehensively. Over the last decade, use of computers and the Internet has grown exponentially. Indeed, for some individuals it is an integral part of their daily lives. With little more than a click of a Mouse, people plunder communicate, transfer information, engage in commerce, and expand their Educational opportunities. Unfortunately, criminals exploit these same technologies to commit Crimes and harm the safety, security, and silence of us all.Indeed, as more people go online, More cri minals are realizing that online crime can be lucrative, e surplusly given the amount of Valuable commercial and in-person information now being stored electronically. supposed cybercrime can be divided into two categories. On the one hand, we are seeing the Migration of traditional crimes from the animal(prenominal) to the online world. These crimes include Threats, child pornography, fraud, gambling, extortion, and theft of intellectual property.SimplyPut, criminals are migrating online because they can reach more victims quickly, can collaborate With other criminals, can disguise their identities, and can use the global nature of the Internet to uphold anonymous. On the other hand, the Internet has spawned an entirely new set of criminal Activity that targets computer entanglements them. include in this category are such crimes as Hacking, releasing viruses, and shutting down computers by fill up them with unwanted entropy (so-called denial of service set ons). Our vulner ability toand the damages caused Bythis type of crime are astonishingly high.For example, in May of last year, the I Love You Virus began to infect computers on the Internet. in spite of appearance a short period of time, it had disrupted the communications of hundreds of Thousands of computers, causing losses estimated in the billions of dollars. Virus present a new capability when it infected a computer, it accessed the users Computer passwords and sent them electronically to a computer in a foreign country. The Implications of this virusand the many viruses that have followed itare staggering.In March of this year, the FBIs National Infrastructure Protection Center issued a warning that An organized group of hackers from Russia and Eastern europium had committed a series of Intrusions into more than forty banks and e-commerce companies in the joined States. The Hackers stole over 1,000,000 opinion card song from the companies data bases. They then Embarked on extortion of ma ny of the companies, threatening to disclose confidential Information or damage the victims computer systems. Evidence suggests that the hackers then Sold many of the trust card numbers to organized crime groups. This crimethe investigation into which the Treasury department participated and which has to Date resulted in two arrestshas unsafe implications. Not only did it cause financial losses forThe Companies, but it harmed the privacy and security of the ordinary citizens whose credit Cards numbers and face-to-face data were stolen. Individuals victimized by these sorts of Rightfully Fear the ramifications of criminals gaining access to their clannish financial and Personal data. This type of crime strikes at the confidence of consumers, threatening the vital Growth of e-commerce. mesh crimes not only affect the security of individuals and businesses, they can also threaten Our nations critical infrastructures. Our power and water supply systems, telecommunications Networks, financial sector, and critical government services, such as emergency and national Defense services, all rely on computer vanes.Cyber terrorist, the same devastating result could be achieved by hacking into the control Network and commanding the computer to open the floodgates. This is not a purely hypothetical Scenario. several(prenominal) years ago, a juvenile hacker gained unauthorized access to the computers Controlling the operations of the Roosevelt Dam in Arizona.Although there are as yet no definitive statistics on the scope of the problem, there is no doubt That the number of crimes involving computers and the Internet is rising dramatically. For Example, the CERT Coordination Center, which was created to warn about computer attacks and Viruses, received over 21,000 network crime incident reports last year. This is more than double The number of reports it received the year before. Similarly, a scan conducted by the FBI and The Computer Security Institute recently reveale d substantial increases in computer crime. Over 85 percent of the companies and government agencies surveyed reported computer securityBreaches within the preceding twelve months, up from 70 percent last year. Moreover, investigateers at the University of California at San Diego recently reported a methodology that Enabled them to count the numbers of denial of service attacks. Their research revealed that 4,000 attacks occur every(prenominal) week. Responding to these threats is a daunting challenge. From my perspective, as I begin my assessment of our cybercrime efforts and the direction they Should take in the future, at least(prenominal) three themes or elements await to emerge as particularly? Important to success in confronting cybercrime developing specialized expertise, building Teamwork and partnerships, and guarantee we have legal authorities which are both effective and Appropriate in the unique and ever-evolving reach of computers and the Internet.DEVELOPING SPECIAL IZED EXPERTISECombating computer crime requires a team of professionals, including investigators, forensic Experts, and prosecutors, all of whom have technical expertise. In addition to traditional Investigative skills, cybercrime investigators must be well versed in the intricacies of technology To insure that evidence is not lost or overlooked. Forensic experts must know how to hold Electronic evidence to protect its integrity for later use at trial, as well as how to recover and Analyze digital evidence from computers with hard drives that store gigabytes of data.And Prosecutors must understand the jargon and complexities of high-technology crimes and be able To translate technical evidence into a form understandable to a judge and jury. United States law enforcement agencies have devoted significant resources to developing cadres Of investigators and forensic experts who have the specialized skills needed for cybercrime Investigations. The FBI and whodunit Service, which have particularly important investigative Responsibilities with respect to Internet and computer-related crimes, have certainly been in theA particularly important aspect of developing, and then sharing expertise in the field is the Nationwide network of federal prosecutors called Computer and Telecommunications Coordinators (or CTCs)at least one from each regularisewho serve as the districts Prosecutorial expert on computer crime cases. The CTC initiative was started by CCIPS in 1995, And has been strongly support by our U.S. Attorneys. CCIPS trains and supports these Coordinators specially, so that they, in turn, can serve as a resource for their offices and the law Enforcement authorities and concerned industry in their regions of the country.In the Criminal Division, specialized expertise in combating cybercrime is not bound to CCIPS. Other sections have developed this expertise as traditional forms of criminality have Moved onto the Internet.For example, the incision has seen dra matic growth in various types of fraudulent online Schemes, and the Criminal Divisions Fraud ingredient has played a critical role in the Justice Departments response, including overseeing a Department-wide Internet Fraud Initiative begun In 1999. Its work to appointee has included (1) advising and supporting federal prosecutors by means ofout The country, including keep of an Internet fraud brief bank (2) developing specialized Training on Internet fraud for courses at the Departments National Advocacy Center (3) Publishing extensive materials on the Departments website, www.internetfraud.usdoj.gov, in Order to promote public understanding of Internet fraud schemes and how to deal with them and (4) funding improvements in federal agencies investigative and analytical resources, Including the Internet Fraud Complaint Center, a joint insure of the FBI and the National Collar Crime Center.The Department has also been involved in the related problem of individualism Theft, in pa rt by providing national coordination of governmental efforts through the Identity Theft Subcommittee of the Attorney world-wides Council on White Collar Crime. Of course, one of the most disturbing facets of cybercrime is the exploitation and abuse of Children, whether through distribution of child pornography over the Internet or through the Horrific conduct of familiar predators that operate online.The FBI, the U.S. Attorneys Offices, And the Divisions Child Exploitation and Obscenity Section have developed special expertise In Investigating and prosecuting these crimes and currently devote significant resources to the Online aspects of child pornography and luring cases. Moreover, in this area and others, the Departments Office of Legal Education, in conjunction with various components of the Criminal Division on a regular basis sponsors classes regarding computer crime and electronic evidence.BUILDING PARTNERSHIPSAs I noted at the beginning of my statement, the number elemen t which seems particularly Important to our efforts against cybercrime is partnership building. Of course, from years as a Prosecutor, I know that teamwork is essential to any successful crime-fighting effort. But it Strikes me that in the area of cybercrime the need for effective partnerships, is not only curiously important but also requires partnerships well outside the traditional law enforcement Community. The complexity of cybercrime and the breadth, or potential breadth of its Impact, are part of the reason. However, another factor is the diversity of interests at play in the Cyber-world, and then in our efforts to combat cybercrime. These include, among others, law Enforcement Interests, national security interests, privacy interests, and Commercial interests. Partnership, or at least dialogue, we will allow those interests to conflict and collide in ways Destructive of our efforts to combat cybercrime.VIRUSES AND MALICOUS CODEViruses and cattish commandment are simply p rograms and like any other program, are designed for a particularized function. A virus or malicious code program iswritten for a variety of noncriminal Purposes including advertisements, jokes, and semipolitical messages, however, less humorous and More malicious intentions include destroying data, information, information acquisition, and Identity theft, surreptitious control of a remote machine, or the shutdown of a legitimate business Or website. The virus is executed by some type of payload trigger, which causes the virus or Malicious code to deliver its contents or execute its commands. The trigger can be something The user does, such as opening an email fastening or downloading a file, it can be triggered By some event such as date or condition on a computer, or it can self- execute based on code Written into the virus program.PHISHINGThe term phishing means the fraudulent attempt to get a persons private information (i.e. Username, password, account number, etc.). Phisher s send an email pretending to be from a legitimate lodge and bait you to provide your Private information. Typically the email will address you as a client and will direct you to Click on a link to provide critical information to neutralise a looming problem which they have Discovered. This link will be to a false website not the website of the legitimate company.Basically, they are fishing for peoples information to use illegally. Phishing is a very Sophisticated cabbage and many individuals and companies have been fooled, resulting in the theft Of their sensitive information as well as millions of dollars every year. The email is usually designed to look like it is sent from a real company. The bait for personal Information is often contained in the emails subject line. The subject usually contains a sand of Urgency. For example, it will read in ones inbox Your account needs to be verified or Your Account is about to be suspended.CONCLUSIONIt is important to note that compute r security is always hooked on the weakest link in the Chain. Security on the Internet and exposure to a potential attack is contingent upon the security Or lack thereof, of other parts of the network. It is also important to note that there is an Increasing number of dedicated infrastructure attacks.The interdependency of systems connected To the Internet used to carry out day-to-day business is ever growing and increasingly being Relied upon by variety of businesses, governments, and a numerous of other operations. There are four categories DDoS, worms, attacks on the Internet Domain Name System (DNS) And attacks against or using routers. Any attacks describe from my research could lead to Denial Of Service, compromise of sensitive or personal information, misinformation, and an extreme Economic impact, largely from lost revenue and the time and resources necessary to recover.ReferenceSecond magnetic variation Digital Crime and Digital Terrorist (Robert W. Taylor, Eric J. Fritsc h, John Liederbach, and Thomas J. Holt) www.pearsonhighered.comGrossman, M. (Feb. 1999) Cyber terrorism http//www.mgrossmanlaw.com/articles/1999.cyberterrorism.htm Computer Security Policy and Research Institute. http.//www.cpi.seas.gwu.edu/aboutus.html www.research.ibm.com/antiviruswww.internetfraud.usdoj.gov
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.