Cyber crime
Cyber crime
Any criminal act that involves the theft or destruction of information, resources, or funds utilizing computers, computer networks and the Internet (includes cyber theft, vandalism and terrorism)
Phishing
Asking for person information through email
Organized/syndicate crime
Centered around the provision of goods and sevices with strong ties to police, politicians and judges with a code of conduct to be loyal to your boss and family, honor and respect, teamwork and secrecy
Market manipulation
Control the price of stock by interfering with supply and demand 1. Pump and dump 2. Cyber smear
Fraudulent offerings of securities
Create websites to sell fake stock
File sharing
Downloading music without paying the artists or producers their royalties
Top 5 cyber crimes
Fbi related scams Identify theft Advance fee fraud Non auction non delivery of merchandise Overpayment fraud
Denial of service attack
Flooding the site with bogus messages or orders to tie-up services and prevent them from performing as promised (rival businesses or online gambling casinos)
Shoplisting
Get a receipt, steal a product on the receipt and return it for a gift card or store credit. Usually sell the gift card online.
Illegal copyright infringement
Groups illegally obtaining software and cracking or ripping it's copyright protections, then post it on the Internet for other members of the group to use
Web defacement
Hack a website and insert or substitute codes to expose visitors to misleading or provocative information
Cyber espionage
Hacking secure computer networks at military bases, defense contractors and aerospace companies to steal important data
Organized crime
Illegal activities of people and organizations whose acknowledged purpose is to profit by illegitimate means
Illegal touting
Illegal advertising; convince you to invest in a company without telling you they're being paid by the company to give a positive opinion by that company
Etailing fraud
Illegally buying and selling merchandise on the Internet
Cyber spying
Illegally using the Internet to gather information considered private and confidential
Online retail fraud
Includes non auction items (store website)
Pump and dump
Inflate price of stock by putting out positive information so you can sell it at an artificially higher price
Internet securities fraud
Involves using the Internet to intentionally manipulate the securities marketplace for profit
Contemporary organized crime groups
Loose confederation of ethnic and regional crime groups
Cyber smear
Put out negative information to drive down the price, but it at a low price and then make money
Internet crime complaint center (ic3)
Ran by the fbi which is the main agency responsible for combating cyber crimes and receives Internet related complaints and pass them to appropriate authorities
Online auction fraud
Receive payment for something and never deliver the goods or sending something of lesser value (ebay)
Destructive use of cyberspace
Sending out viruses
Salami fraud
Skin small amounts of money from a large number of accounts in order to bypass internal controls and escape detection
Corporate espionage
Steal trade secrets of your competitors in order to give yourself an advantage
Cyber stalking
Use electronic communication device to stalk someone (cyber vandalism )
Vishing
Using voice over Internet protocol
Swatting
Using voice over Internet protocol to call 911 for fake emergencies
Identity theft
When someone steals a form of ID and uses it to access the persons financial resources
Cyber bullying
Willful and repeated harm inflicted through the medium of electronic text (cyber vandalism)
The computer is
1. The object of the crime 2. The subject of the crime 3. The instrument of the crime
Computer fraud
A common law crime committed using contemporary technology (includes theft of information, the "salami fraud" and corporate espionage)
Cyber vandalism
Criminals interested in revenge and destruction rather than profit or greed
Controlling organized crime
Difficult to control activities because they're secretive, protective and defensive
3 most common activities of organized crime
Narcotics distribution, loan sharking and prostitution
4 types of organized crime
Political social - terrorists or militant social movement groups that use violence to get what they want Mercenary - committed by groups for personal profit In group orientated - primary goal is psychological gratification rather than financial Syndicate - groups that participate in illegal activities through force, intimidation or threats to provide illegal services
Cyber terrorism
Premeditated, politically motivated attack against information, computer systems, computer programs and data which result in violence against noncombatant targets by subnational groups