• Tidak ada hasil yang ditemukan

Cyber Crime 2000.ppt 819KB Jun 23 2011 10:19:18 AM

N/A
N/A
Protected

Academic year: 2017

Membagikan "Cyber Crime 2000.ppt 819KB Jun 23 2011 10:19:18 AM"

Copied!
99
0
0

Teks penuh

(1)

CyberCrime

Kelly R. Burke District Attorney

Houston Judicial Circuit

Contact at 478.218.4810 or E-mail at [email protected]

(2)

We’ll examine:

Definition of Cybercrime

Georgia Law on Computer Issues Federal Laws on Computer Issues Forensic Issues

Case Studies

(3)

Definition of Cybercrime

“any illegal act involving a computer, its systems, or its applications”

Must be intentional – not accidental

Types or categories of cybercrime- 3 T’s

Tool of the crime – traditional crime w/ a

computer

 Target of the crime – Hacking

(4)

“Georgia Computer

Systems Protection Act"

The General Assembly finds that: (1) Computer related crime is a

(5)

“Georgia Computer

Systems Protection Act"

(2) Such crime occurs at great cost to the public, since losses for each

(6)

“Georgia Computer

Systems Protection Act"

(3) The opportunities for computer related

crimes in state programs, and in other entities which operate within the state, through the

introduction of fraudulent records into a computer system, unauthorized use of

(7)

“Georgia Computer

Systems Protection Act"

(8)

“Georgia Computer

Systems Protection Act"

(6) The prosecution of persons

engaged in computer related crime is difficult under previously existing

(9)

Georgia Law - Definitions

(1) "Computer" means an electronic, magnetic, optical, electrochemical, or other high-speed data processing

device or system performing computer operations with or on data and includes any data storage facility or

(10)

Georgia Law - Definitions

(1) ....but such term does not include an automated typewriter or typesetter,

portable hand-held calculator,

household appliance, or other similar device that is not used to communicate with or to manipulate any other

(11)

Georgia Law - Definitions

(2) "Computer network" means a set of related, remotely connected computers and any communications facilities with the function and purpose of transmitting data among them through the

(12)

Georgia Law - Definitions

(3) "Computer operation" means

computing, classifying, transmitting, receiving, retrieving, originating,

switching, storing, displaying,

(13)

Georgia Law - Definitions

(4) "Computer program" means one or more statements or instructions

composed and structured in a form acceptable to a computer that, when executed by a computer in actual or modified form, cause the computer to perform one or more computer

(14)

Georgia Law - Definitions

(5) "Data" includes any representation of information, intelligence, or data in any fixed medium, including

documentation, computer printouts, magnetic storage media, punched cards, storage in a computer, or

(15)

Georgia Law - Definitions

(6) "Financial instruments" includes any check, draft, money order, note,

certificate of deposit, letter of credit, bill of exchange, credit or debit card,

(16)

Georgia Law - Definitions

(7) "Property" includes computers, computer networks, computer

programs, data, financial instruments, and services.

(17)

Georgia Law - Definitions

(9) "Use" includes causing or attempting to cause:

(18)

Georgia Law - Definitions

(9) "Use" includes causing or attempting to cause:

(B) The obstruction, interruption,

malfunction, or denial of the use of a

computer, computer network, computer program, or data; or

(19)

Georgia Law - Definitions

(10) "Victim expenditure" means any

expenditure reasonably and necessarily incurred by the owner to verify that a

computer, computer network, computer program, or data was or was not

(20)

Georgia Law - Definitions

(11) "Without authority" includes the use of a computer or computer network in a manner that exceeds any right or

(21)

Computer Crimes

O.C.G.A. Sec. 16-9-93

Computer Theft

Computer Trespass

Computer Invasion of Privacy Computer Forgery

(22)

Computer Crimes

O.C.G.A. Sec. 16-9-93

All computer crimes are felonies:

Computer Theft (15 years, $50,000 fine)

Computer Trespass (15 years, $50,000 fine) Computer Invasion of Privacy (15 years,

$50,000 fine)

(23)

Computer Crimes

O.C.G.A. Sec. 16-9-93

Any person who uses a computer or computer network with knowledge that such use is

without authority and with the intention of: (1) Taking or appropriating any property of another, whether or not with the intention of depriving the owner of possession;

(24)

Computer Crimes

O.C.G.A. Sec. 16-9-93

or (3) Converting property to such person's use in violation of an agreement or other

known legal obligation to make a specified application or disposition of such property

(25)

Computer Trespass

Any person who uses a computer or computer network with knowledge that such use is without authority and with the intention of:

(1) Deleting or in any way removing, either temporarily or permanently, any computer program or data from a

(26)

Computer Trespass

(2) Obstructing, interrupting, or in any way interfering with the use of a computer

program or data; or

(3) Altering, damaging, or in any way causing the malfunction of a computer, computer

network, or computer program, regardless of how long the alteration, damage, or

(27)

Computer Trespass

(28)

Computer Invasion of

Privacy

Any person who uses a computer or computer network with the intention of

(29)

Computer Forgery

Any person who creates, alters, or deletes any data contained in any

computer or computer network, who, if such person had created, altered, or deleted a tangible document or

instrument would have committed

(30)

Computer Forgery

The absence of a tangible writing directly created or altered by the

offender shall not be a defense to the crime of computer forgery if a creation, alteration, or deletion of data was

(31)

Computer Password

Disclosure

Any person who discloses a number, code, password, or other means of access to a

computer or computer network knowing that such disclosure is without authority and which results in damages (including the fair market value of any services used and victim

(32)

Anonymity and the Internet

Computer False Identity

(a) It shall be unlawful for any person, any organization, or any representative of any organization knowingly to

transmit any data through a computer network or over the transmission

(33)

Anonymity and the Internet

Computer False Identity

for the purpose of setting up,

maintaining, operating, or exchanging data with an electronic mailbox, home page, or any other electronic

(34)

Anonymity and the Internet

Computer False Identity

if such data uses any individual name, trade name, registered trademark, logo, legal or official seal, or copyrighted

symbol to falsely identify the person, organization, or representative

(35)

Anonymity and the Internet

Computer False Identity

or which would falsely state or imply that such person, organization, or

representative has permission or is legally authorized to use such trade

(36)

Anonymity and the Internet

Computer False Identity

provided, however, that no

telecommunications company or Internet access provider shall

violate this Code section solely as a result of carrying or transmitting such data for its customers.

(37)

Anonymity and the Internet

Court Challenge

A court case challenged this Georgia law. In ACLU v. Miller, 977 F. Supp.

1228 (1997), the ACLU alleged that the misappropriation of identity portion of this law was overbroad and, thus,

(38)

Anonymity and the Internet

ACLU V. Miller

Plaintiffs were “a group of individuals and organization members who communicate over the internet, interpret it as imposing

unconstitutional content-based restrictions on their right to communicate anonymously and pseudonymous over the internet, as well as on their right to use trade names, logos, and other graphics in a manner held to be

(39)

Anonymity and the Internet

ACLU v. Miller

Plaintiffs argue that the act has

tremendous implications for internet users, many of whom "falsely

identify" themselves on a regular basis for the purpose of

communicating about sensitive

topics without subjecting themselves to ostracism or embarrassment.

(40)

Anonymity and the Internet

ACLU V. Miller

(41)

Anonymity and the Internet

ACLU V. Miller

“Defendants contend that the act prohibits a much narrower class of communications.

They interpret it as forbidding only fraudulent transmissions or the appropriation of the

(42)

Anonymity and the Internet

ACLU V. Miller

The State of Georgia: “...also ask the Court to abstain from exercising jurisdiction over this case on the grounds that the law is ambiguous and in need of state court

(43)

Anonymity and the Internet

ACLU V. Miller

Defendants allege that the statute's purpose is fraud prevention, which the Court agrees is a

compelling state interest. However, the statute is not narrowly tailored to achieve that end and

instead sweeps innocent, protected speech

within its scope. Specifically, by its plain language the criminal prohibition applies regardless of

(44)

Anonymity and the Internet

ACLU V. Miller

Defendants respond that the act does not mean what it says and that, instead, a variety of limiting concepts should be engrafted onto it. First,

defendants propose to add an element of fraud, or a specific intent requirement of "intent to

defraud" or "intent to deceive" to the act. None of these terms or phrases appears in the statute,

however, although they are expressly included in other Georgia criminal statutes which require

(45)

Anonymity and the Internet

ACLU V. Miller

“In construing a statute, the Court must "follow the literal language of the statute 'unless it produces contradiction,

absurdity or such an inconvenience as to insure that the legislature meant

something else.'"

(46)

Anonymity and the Internet

ACLU V. Miller

The Court concludes that the statute was not drafted with the precision

(47)

Anonymity and the Internet

ACLU V. Miller

On its face, the act prohibits such protected speech as the use of false identification to avoid social ostracism, to prevent

discrimination and harassment, and to protect privacy, as well as the use of trade names or logos in non-commercial educational speech, news, and commentary--a prohibition with

(48)

Computer Crimes - Venue

For the purpose of venue under this

article, any violation of this article shall be considered to have been committed:

(49)

Computer Crimes - Venue

(2) In any county in which any person alleged to have violated any provision of this article had control or possession of any proceeds of the violation or of

any books, records, documents, or property which were used in

(50)

Computer Crimes - Venue

(3) In any county in which any act was

performed in furtherance of any transaction which violated this article; and

(4) In any county from which, to which, or through which any use of a computer or computer network was made, whether by

(51)

More Georgia Computer Crimes

Remaining Georgia computer crimes are “crime specific,” such as

Sexual Offenses, Stalking Offenses and Theft Offenses

(52)

Federal Laws on

Cybercrime

Computer Fraud and Abuse Act of 1986

Three goals (page 309 in your textbook)

Confidentiality of data communications Integrity of data communications

 Availability of data communications

(53)

Forensic Issues

Computer Seizures

Who will do seizure?

Who has the best forensic capability? What will be seized?

Computers, disks, tapes, books, etc. Education of officers executing search. Power issues, movement issues,

(54)

Forensic Issues

Computer Seizures

Backlogs in computer labs result in

searches that take months to get done. Therefore, we tend to limit search to

specific issues. If you’re looking for child porn, and you find it, don’t make

(55)

Forensic Issues

Computer Seizures

E-mail, or ICQ searches are more

problematic. Cost may force limiting search to known conversations,

however, you want to search through

(56)

Forensic Issues

Computer Seizures

GBI and FBI are generally the only agencies with qualified forensic

scientists. Even there, pay is an issue. It’s a new paradigm.

How do you start a “computer nerd” at twice or three times the salary of a

(57)

Forensic Issues

Computer Seizures

Local law enforcement officer can learn basic forensics, and probably appear educated before a jury.... until the

defense brings in a “real” expert who blows the officer out of the water.

(58)

Terroristic Threats and

Acts

A person commits the offense of a terroristic threat when he threatens to commit any crime of violence ... with the purpose of terrorizing another or of causing the evacuation of a

building... or in reckless disregard of the risk of causing such terror or inconvenience. No person shall be convicted under this

subsection on the uncorroborated testimony of the party to whom the threat is

(59)

Terroristic Threats and

Acts

Statute requires corroboration, which was generally difficult to do on a

telephone conversation. Hence, “I’m going to kill you...” communicated

during a telephone conversation may not be actionable, at least as a

(60)

Terroristic Threats and

Acts

However, that same threat,

(61)

Intercepting

Communications

O.C.G.A. Sec. 16-11-62

It shall be unlawful for (4) Any person

intentionally and secretly to intercept by the use of any device, instrument, or apparatus the contents of a message sent by telephone, telegraph, letter, or by any other means of

(62)

Intercepting

Communications

But, what if the police seize a computer and discover a conversation where a

crime is discussed. That conversation, if by telephone or telegraph, would have been protected. Not the case with a

(63)

Intercepting

Communications

(64)

Case Studies

Cyber Crime Comes To Life

Officer sets up a meeting with a suspected

cybersex perpetrator. Perp drives to Houston County, thinking he’s meeting the 13 year old girl he met on-line. Instead he’s meeting a 35 year old, 225 pound, detective. Whoops,

wrong move.

(65)

Case Studies

Cyber Crime Comes To Life

Recent Court of Appeals case of State vs. Dennard ruled that, so long as the State can prove that a substantial step was taken toward the commission of the crime, the State can proceed to trial.

(66)

Undercover Officer

Participation

OCGA 16-12-100.2 (f) The sole fact that an undercover operative or law

enforcement officer was involved in the detection and investigation of an

(67)

Case Studies

Cyber Crime Comes To Life

So mere speech can get someone in trouble?

Sure, it’s been that way for years. The only thing different is the computer is the means of communicating the

(68)

Computer Assisted Sexual

Exploitation

However, Legislature has recently enacted a

misdemeanor statute that makes the use of a

computer in the

(69)

Computer Assisted Sexual

Exploitation

This legislation is entirely new, recognizing the

uniqueness of computer assisted child exploitation which was not possible

(70)

Computer Assisted Sexual

Exploitation

O.C.G.A. Sec 16-12-100.2 (d) (1) Effective 7/1/99

It shall be unlawful for any person

intentionally or willfully to utilize a computer on-line service, Internet service, or local

(71)

Computer Assisted Sexual

Exploitation

(d) (1) .. to commit any illegal act ... relating to the offense of sodomy or aggravated

sodomy; ... relating to the offense of child

molestation or aggravated child molestation; ... relating to the offense of enticing a child for indecent purposes; ... relating to the

(72)

Computer Assisted Sexual

Exploitation

(d) (2) Any person who violates

(73)

Case Studies

Cyber Crime Comes To Life

(74)

Case Studies

Cyber Crime Comes To Life

In Dennard, the Court of Appeals ruled that the State can proceed on Criminal Attempt, even though the crime of

Sexual Exploitation has arguably been committed. The State commonly goes after the highest crime committed.

(75)

ISP Operators Beware

OCGA 16-12-100.2 (e) (1) It shall be unlawful for any owner or

operator of a computer on-line service, Internet service, or local

bulletin board service intentionally or willfully to permit a subscriber to

utilize the service to commit a violation of this Code section,

(76)

ISP Operators Beware

(77)

Anonymity Opportunity

In the “old days,” sexual perversion was certainly present, but the desire to not be caught diminished the opportunities to accomplish the crime. Hanging

around the neighbor park was too risky, especially for bank presidents,

(78)

Anonymity Opportunity

Today, a sexual pervert can “hang

around” in teenage chat rooms and find suitable victims with little risk of

(79)

Anonymity Opportunity

After awhile, the “friendship” will

develop to the point that the predator can talk about sex. Again, teenagers

(80)

Anonymity Opportunity

Once the predator has established a

trusting relationship, he/she will seek to make a physical encounter. Usually,

this encounter will be solely about sex for the predator. There is too much

(81)

Anonymity Opportunity

The child usually seeks to get out of the situation once she/he realizes that this “friend” is not what was portrayed on the Internet. However, in many instances, it is too late to back out or stop the

assault. If the child will tell about it,

(82)

Georgia Law - Issue

Last point on child sexual crimes. My office will not release videotapes of

interviews of child molestation victims to the defense. We are obligated by law to allow the defendant and his attorney see the tape. Those tapes contain

(83)

Winding Down

Hang On.

(84)

Cyber Stalking

A different twist on an old crime, Cyber Stalking. Stalking has been going on for centuries, having grown more

sophisticated as technology has advanced.

(85)

Cyber Stalking

OCGA 16-5-90. (a) A person commits the offense of stalking when he or she follows, places under surveillance, or contacts another person at or about a place or places without the consent of the other person for the purpose of

(86)

Cyber Stalking

For the purposes of this article, the term "harassing and intimidating" means a

knowing and willful course of conduct directed at a specific person which

causes emotional distress by placing

such person in reasonable fear for such person's safety or a family member’s

(87)

Cyber Stalking

by establishing a pattern of harassing and intimidating behavior, and which serves no legitimate purpose. This

(88)

Cyber Stalking

(89)

Cyber Stalking

Where in the World is Carmen

(90)

Cyber Theft is Theft…

Theft is nothing new,

computers have simply

(91)

Case Study – Cyber Theft

Houston County:

Saturday a.m. - Intruder breaks into local ISP, steals account names and

(92)

Case Study – Cyber Theft

Houston County:

(93)

Case Study – Cyber Theft

Houston County:

(94)

Case Study – Cyber Theft

Houston County:

Saturday p.m. - Police

(95)

Case Study – Cyber Theft

Proving the old adage:

If criminals weren’t stupid, we wouldn’t catch many of

(96)

Protecting Children

(& networks)

Keep Computer In Public Access Room Install Child Safe Software (NetNanny, CyberPatrol, etc.)

Know How To Track “History”

Watch Your Child At The Computer, Regardless of Age

(97)

Final points

You may see this material on an exam!

 Number one fraud on the internet?

 Auctions!! Ebay users, pay with a credit card!

 Most common computer attack?

 Viruses- “malicious logic” vs. worms

 Worms are self-replicating, death by expansion, filling

harddrive or bandwidth

 Denial of Service Attacks- it’s cybercrime

 Floods the server with data, prevents access

 Carnivore – FBI tool for internet wiretaps

 Makes a copy of email for law enforcement

 Money laundering – transfer of money from illegal

(98)

In Closing

Cyber Crime Is Still Crime

Computers Offer Widespread Havoc Computers Have Detection Issues, Good and Bad

(99)

Thank You for Coming!

Kelly R. Burke District Attorney

Houston County, Georgia 478.987.2450 or

[email protected]

Referensi

Dokumen terkait

Bidang pekerjaan : artinya setiap kotaj dalam struktur organisasi Bidang pekerjaan : artinya setiap kotaj dalam struktur organisasi memberikan informasi mengenai tugas –tugas

If a Uranium atom is struck by a Neutron, it can break apart into a Cesium atom, a Rubidium atom and two more Neutrons.. When this happens, LOTS and LOTS and LOTS of energy

The most effective way to meet those goals is to implement security The most effective way to meet those goals is to implement security risk assessment through a security policy and

application software Sometimes called Sometimes called end-user certifications end-user certifications Microsoft Microsoft Certified Certified Desktop Desktop Support

– IPSec is a suite of authentication and encryption protocols IPSec is a suite of authentication and encryption protocols developed by the Internet Engineering Task Force (IETF) and

• What communication practices do you have in place to foster in-person interaction with co- workers to build working relationships. – Younger users – are there opportunities

• RSS Feed Reader: Organization is mainly chronological (that’s limiting!). Can serve as offline reader. • Print: “Smell of the Book,” Ability to look at two pages at

o the different types of teams in health care o the characteristics of effective teams.. o how ones values and assumptions affect interactions