MSC Forensic Accounting

Electronic Crime

Keeping Your Business Running

in the event of a criminal attack:

Prevention, Protection & Continuity measures

Paul Senior

Student ID: 14031395

8th May 2008 – Version 2


CONTENTS

                Page(s)

  1. Introduction                3
  2. Cyber/Electronic Crime         4
  1. What is Cyber/Electronic Crime?        4
  2. Categories/Methods of Attacks        5
  3. Drivers of E-Crime        7
  1. Preparing The Organisation        8
  1. Risk Management        8
  2. Protection Methods        10
  1. Keeping Your Business Running        12
  1. Business Continuity Management        12
  2. BCM Recovery Strategies        13
  1. Next Steps                17
  1. Testing Your Systems        17
  2. Investigation Tools        18
  1. Conclusion                19
  2. References and Bibliography        20

  1. Introduction

Over the past two decades, computer technology has seen enormous growth.  Prior to this, business decisions were made that determined if the use of technology or PC’s were required.  Contrast this with today’s high-tech world, where decisions are now influenced by the technology available.

Home computers were seen as a luxury item less than a ten years ago (Vacca, 2005, p21), but are now a major part in many people’s lives.  The rise of computer technology has obviously enhanced our lives in many ways, such as enabling improved productivity and efficiency at work, school, and home. Anyone with access to a computer and the Internet now has unparalleled opportunities.

The Internet is almost certainly one of the greatest business tools ever invented.  Merchants, trading partners and online retail shoppers are presented with a greater selection of goods and along with the convenience of use and greater competition leading to lower prices, it has revolutionised how business is conducted today.

However, despite the Internet's many advantages and opportunities, it also raises some new risks for businesses – including that of electronic crime.  A survey carried out by Get Safe Online (Carter, 2006), revealed that fear of Internet crime is now more prevalent than concerns about more conventional crimes such as burglary, mugging and car theft.  This is quite an astonishing fact, given that these more conventional crimes appear to be more widespread.

In this paper I will review what organisations need to do to identify the risks to their business, and subsequently what they can do to protect themselves in preparation against such risks, looking at systems and tools available for this purpose.

I will then review the business continuity processes that organisations can employ, which will look at types of approaches used to ensure minimal business disruption in the event of an incident occurring.  Finally, I will consider the next steps an organisation can take to ensure they are prepared, whilst covering the investigative tools available.


  1. Cyber/Electronic Crime

  1. What is Cyber/Electronic Crime?

Unfortunately, with the increase in computer skills and knowledge, it has led to an increase in people looking to take advantage of the vast array of information available to them and the opportunities this provides.

Sharon Lemon, the head of e-crime for the UK’s Serious Organised Crime Agency (SOCA), is warning that cyber-crime is so widespread it features in nearly every criminal investigation, as reported by the continuity forum in March 2008.

So what exactly is cyber-crime or electronic crime (e-crime)?  Vacca (2005, p154) views electronic crime as something which ‘occurs when information technology is used to commit or conceal an offence’, or any ‘illegal behaviour directed by means of electronic operations that targets the security of computer systems and the data processed by them’.  

Volonino, Anzaldua and Godwin (2007, p6) use additional terms when talking of cyber-crime.  These are computer crime and high tech crime, and most people including the courts and the legal profession use these terms interchangeably.

 

Throughout the world today, huge amounts of data is held in digital format with the majority of paper-based systems being phased out and replaced by either electronic systems or document management solutions.  This leaves a frightening amount of personal data in digital format.

Before use of the Internet became so widespread, most attacks were carried out as pranks or vandalism, but now, the focus is on generating profit through means of extortion or fraud.

Computer crime along with computer supported criminal activities is booming business and many organised criminal gangs are getting in on the act.  Criminals are increasingly targeting cyberspace as more and more people shop online and use Internet banking services.


  1. Categories/Methods of Attacks

There are several categories of cyber-crime and the method of attacks used by criminals will be dependent on the reasons for the attack.  According to Vacca (2005, p154), such attacks include:

  • Sabotage of data or networks
  • Theft of proprietary information
  • System penetration from the outside
  • Denial of Service (DoS)
  • Unauthorised access by insiders
  • Viruses

Of these, the most common criminal activities are:

Financial - crimes that disrupt a businesses' ability to function either by committing a DoS attack and restricting its operating abilities or by making financial demands on an organisation to ‘prevent’ an attack from happening.

Gambling sites are major targets for online criminals and regularly suffer DoS attacks.  Paddypower.com reported an attack on its site, following an extortion demand,  which led to it being offline for several hours in February 2004 as reported by The Register.

Piracy - the act of copying copyrighted material.  Online theft is defined as any type of 'piracy' that involves the use of the Internet to market or distribute creative works protected by copyright.  Software and movie piracy is huge business for online ‘entrepreneurs’!  As you can see from this, the driver behind piracy is also financial.

Hacking - the act of gaining unauthorised access to a computer system or network and in some cases making unauthorised use of this access. Hacking is also the act by which other forms of cyber-crime (e.g., fraud, terrorism, etc.) are committed, and is seen as the most damaging method of attack.

Cyber-terrorism – As with conventional terrorism, `e-terrorism' is classified as such, if the result of hacking is to cause violence against persons or property, or at least cause enough harm to generate fear.  This particular crime has increased significantly post September 11th 2001.

Volonino, Anzaldua and Godwin (2007, p6) believe there are two specific categories of offences involving computers, dependent on how the computer is used or attacked:

The Computer as an Instrument – When the computer is used to commit a crime.  There are many types of crimes committed in this way and many are traditional crimes such as fraud, theft, forgery, and stalking.  The use of a computer in this manner assists the crime taking place.

Cyber-crimes committed using the computer as an instrument usually tend to be profit motivated, financial frauds (Volonino, Anzaldua and Godwin, 2007, p64), and investigators of such crimes require not only knowledge of how the computer system is supposed to function but a further understanding of accounting and auditing practices – which is an investigative field known as forensic accounting.  

Manning (2005, pV) believes that forensic accounting in its basic form, is classed as ‘the science of gathering and presenting financial information in a form that will be accepted by a court of jurisprudence against perpetrators of economic crimes’.  

Join now!

Essentially, it is for a forensic accountant to dissect crucial financial information and provide it in a format that is easy to understand.  For this method of investigation, there are software tools available to assist with computer interrogation.  Packages such as the Forensic Toolkit (FTK) and EnCase, are invaluable for investigators.

The second category is when the computer is used as an agent for crime by being used as an ‘instrument’ to perform the offence(s):

The Computer as a Target – When a computer, or the data stored on it is the target of a crime.  Such ...

This is a preview of the whole essay