cyber crime
who was the first to highlight the disparities between street crimes and crimes of the privileged class
Edwin Sutherland
What do hackers do?
Find holes, infiltrate computer systems to breach computer security
where are most middle eastern crime groups based
Illinois, Ohio, New Jersey,and New York
what organized crime group presents the most danger to the U.S.
La Cosa Nostra
what is most know for the deep web
TOR
what're acts committed by corporate executives
White collar Crimes
what is sabotage
a category of insider threat that describes an individual taking revenge against an organization primarily because he or she is angry.
what can embezzlement be classified as
a computer assisted crime
what is a black hat hacker
a cracker or malicious hacker
what is a gray hat hacker
a hacker who sometimes behaves ethically but can occasionally violate that
what are insider threats
a malicious criminal who has or had legitimate access to an organization's computing environment, and has intentionally exceeded or intentionally used access in a manner that negatively affected the confidentiality, integrity, or availability of the organization's information or information systems.
who are crackers
a malicious hacker
what are hackers
a person who uses a computer to gain unauthorized access
what is embezzlement
a theft in violation of trust
what is a white hat hacker
an ethical hacker who received permission to hack
what is cyber crime
an evolved state of traditional crime
what is the deep web
an uncharted part of the internet not accessible through regular internet browsers
who are cybercriminals
are from inside an organization present the highest risk for cybercrime and corporate and industrial espionage.
what flourishes in the deep web
criminal and illegal activities
what were hackers portrayed as in the 80s
criminals
who are script kitties
do not have enough skill to write their own programs or explore new exploits themselves. Instead they download attacks programs.
what do Mexican and South American organized crime groups mainly do
drug trafficking `
what is the electronic disturbance theater
electronic company of cyber activists, critical theorists, and performance artists who engage in the development of both the theory and practice of non-violent acts of defiance across and between digital and non-digital spaces.
what is the hacker dialect called
eleet speek, or k-rad
where can internal fraud come from
employees, managers, and board members
what is EaaS
espionage as a service
how are middle eastern crime groups organized
for theft or financial rings
what was documented by levy in his book the hackers
hacker ethic
what is a hacktivist
hackers who come together to challenge the treatment of their peers by the government
what is phreaking
hacking into payphones to get free calls
what is the most frequent type of consumer fraud complaint
identity theft
what does modern day embezzlement not consist of as much
physical theft
what is the economic espionage act of 1996
punishes intentional trade secret misappropriation. ... without authorization copies, downloads, uploads, alters, destroys, transmits, or conveys a trade secret, receives, buys, or possesses a trade secret, knowing that the trade secret has been stolen or obtained wrongfully.
what has espionage evolved too
similar to traditional crime
when was espionage first reported
the 1700's
when did la cosa nostra form
the 1800's
when did criminal hacking emerge
the 80s and 90s
Where did the work hack derive from
the Massachusetts institute of technology
what is money laundering
the act of concealing the source of assets that have been illegal obtained
what is the difference between a hacker and a cybercriminal
the attitude in which the approaches an activity
what is the most common characteristic of a hacktivist
the use of hacker skills and attitudes to portray political messages
what is espionage
theft of intellectual property for gain
what is Russia commonly referred to as
" Hack zone " because of all the hackers that live in Russia
how much does insider fraud cost U.S. businesses a year
$40 million
what tools do law enforcement authorities have to enforce money laundering crimes
- bank secrecy act - money laundering control act - U.S. treasury departments financial crimes enforcement network ( FinCEN )
Eurasian criminal enterprises
- began operating in the U.S. in the 70's - including Russian organized crime
what methods do identity thieves uses to steal personal information
- dumpster diving - direct theft of mail -shoulder surfing - hacking information from corporate databases -bribing of employees who have internal access to customer identifiers
what new opportunities has electronics provided for money laundering
- electronic cash transfer - electronic cash exchange system
what are the three types of espionage
- industrial - economic - corporate
what are examples of intellectual property
- invention - patents - literary and artistic works - designs
what does our society rely on technology wise
- online banking - atm - sharing files remotely - email
the social world of computer hacking is shaped by five social norms
- technology - knowledge - Commitment - categorization - law
what 7 factors have increased corporate espionage
- the increase in use of information and computer technology -global commerce has increasingly been conducted electronically over the internet - increase in spy tactics among corporate rivals - companies victimized by corporate espionage can pursue civil actions
what are the different types of hackers
- white hat hacker - gray hat hacker - black hat hacker - hacktivist
what was the hacker manifesto
-a text that railed against adults, law, enforcement, and schools, evoking the angst of young hackers everywhere.
in a classical sense what is a hacker
-someone who has mastered the art of programming to the point that he or she can simply sit down and "hack" in a program that works.
how much did the Nigerian prince scheme cost the U.S. a year
1-2 billion
when did the first cyberattack against America take place
1870
when were there no laws about hacking
1950s-1970s
since when have middle eastern crime groups been active in the U.S.
1970's
when did complaints of identity theft peak
2007,2008
how much of worldwide cybercrime is committed by organized crime groups
80%
how much of corporate espionage is committed by insiders
85%
what is operation avalanche
•2016 multinational law enforcement taskforce including EuroPol, EuroJust, German police, U.S. D. of J, and FBI dismantled an international criminal infrastructure "Avalanche".
what is one major hacker conference
DEFCON
balkan criminal enterprises
These organizations originate from or operate in Albania, Bosnia-Herzegovina, Croatia, Kosovo, the former Yugoslav Republic of Macedonia, Serbia and Montenegro, Bulgaria, Greece, and Romania
what is tbml
trade based money laundering
why is TBML vulnerable
transportation of large volumes of goods obscures the nature and character of any single trade transaction -nations have limited resources to verify the exchange of goods across the borders
what is industrial espionage
unethical theft of business or trade secrets