Computer Crime

Authors Avatar

Jameel Khan        Information and Processing Technologies         Mr Carey


Table of Contents

         

         

         


Cybercrime: An Overview of Computer  Fraud and Abuse

New times bring new crimes. It's a story as old as humanity and as new as the Internet. First came cars, then car thieves followed. Telephones are followed by telephone fraud. Now we've got computers. (Anonymous1 Year Unknown)

In the past decade technology has exponentially increased, and along with it computer crime. All new and emerging technologies are being affected by this transgression and this has been creating many problems for consumers, companies, agencies and the government. Companies and agencies have only now become conscious of the fact that their computers are prone to attack. In response to this, new security systems have been implemented and penalties for such an act increased.

This report will briefly touch on technologies under threat, the impact of computer felonies on society, steps taken by companies and the government to control the problem, penalties associated with such crimes, loop holes in the justice system and chances of the perpetrators being caught.

What is Cybercrime?

Cyber crime is often defined as a crime committed online with the aid of a computer or networks. Typical activities of cyber crime can include the following:

  • Child pornography
  • Botnets
  • SPAM
  • Identity theft
  • Fake security software
  • Credit card fraud
  • DDoS Extortion
  • Click fraud
  • Cyber squatting
  • Blackhat SEO
  • Pump‐and‐dump stock schemes

Of all these, botnets has grown exponentially over the last 4 years. Botnets are created to be rented out for their combined computing power to send SPAM, host phishing sites, or sell fake anti‐virus software (see appendix – figure 1 for scam estimates).

(Peter Guerra 2009)

New and emerging technologies and their impact on personal privacy protection 

I-Phone

Released June 19, 2009, the Apple I-Phone 3GS, third generation , is a ‘smart phone’ with inbuilt GPS, voice recognition system, 156, 650 downloadable applets, touch screen, iPod and the list goes on (Wikipedia Contributors 2010). Added together, data from all these capabilities and applications hold a tremendous amount of personal information. If a rogue application were to be on an I-Phone, information such as the following can be transmitted to a remote server setup by the AppCreator:

  • Email
  • Messages
  • Contacts
  • Facebook Personal Information
  • Twitter Personal Information
  • AOL Instant Messenger Personal Information
  • Saved Passwords for banking, shopping, ebay and so on

In a conference scheduled at Black Hat DC security conference, Nicolas Seriot explained how an innocent looking applet on the I-Phone could be easily designed to harvest personal data stored on the I-Phone and routed to a remote sever with ease and without the user noticing.

To get his point across, Seriot created a spyware dubbed "SpyPhone". This shook the world of the Apple Company, as this one innocent looking applet, running in the background or even under a clever disguise as a game, could access and remotely store:

  • Address and Contact Book
  • Safari and Youtube Searches
  • Consumer’s Name and Email Parameters (including login data)
  • UUID, ICCID, IMSI (IMSI allowing to track although the device has been changed)
  • Keyboard Cache (equal to key-logging)
  • DCIM Directory (contains photos)
  • Photos and Videos (able to transfer)
  • Current Location (using weather apps and GPS parameters)
  • Recent Wifi Networks connected to (also parameters except password field can be accessed, also capable of being used to pinpoint phone)

(Nicolas Seriot 2010, Ellinor Mills 2010, Nine News - 4:30, Tuesday March 09, 2010)

Seriot says, “Harvested from large numbers of users, such data have a huge value in the underground market of personal data, and it must be assumed that Trojans are, in fact, exploiting this on the App Store."

With the knowledge that the creators of the original I-Phone to the latest I-Phone 3GS have not updated their security and information protection system used on the phones after civilians like Nicolas Seriot have highlighted holes which could leak chunks of personal information, would you buy it?

I-Pad

The new Apple I-Pad, with similar functionality to the I-Phone, is also threatened by the same rogue applications, including the elusive ‘SpyPhone’, as it is compatible with a majority of applets released for the I-Phone (Wikipedia Contributors2 2010). The security system on this latest piece of technology released by Apple has also not been updated to prevent the leaking of personal information, so the question is again posed would you trust your personal information in the hands of the new Apple I-Pad?  

RFID Tagging

Another technology that is becoming more widely used is Radio Frequency Identification, RFID in short. RFID is the use of an object (usually RFID tag) applied or implanted into another object for the purpose of identification and tracking using radio waves. Examples of such are:

  • Contactless Smart Cards (GO cards, Security cards, Access Cards, Human Identification Cards, Master/Visa card, etc)
  • Public Transit (GO cards, EToll, etc)
  • Human Identification (Passports, Entering/Exiting in Areas [Government Grounds, Schools, Universities, etc], Driving History implanted in Licenses, etc)
  • Human Identification to Technology ({cars, computers, laptops} – to start, vending machines, ATMs, etc)
  • Animal Management
  • Supply Chain Management
  • Asset Management (retail assets, Libraries, etc)
  • Hospital Operating Room – keep track of surgery tools
  • Contactless Payment
  • And more
Join now!

Because the RFID tagging system is becoming so popular and widely used, concerns and controversy are beginning to rise as to how much privacy the holder has. The major concern so far is that the owner of an item will not necessarily be aware the tag can be read at a distance without the owner’s acknowledgment, making it possible to gather sensitive data about an individual without consent and track the individual at a distance if the perimeter of signal is large enough.

This can also apply to an individual seeking out information about another person. As all that ...

This is a preview of the whole essay

Here's what a star student thought of this essay

Avatar

The style of writing is that of a formal report with few grammatical errors. One thing to note in particular would be personal opinions, rhetoric and straying away from the consistent style of writing, as an example, consider this extract: “This ignorance of both the court judges allows cybercriminals and civilians to think cyber felonies committed in Australia have somewhat little or no consequences. Can an increase be expected in cybercriminals? You tell me.” A short abstract would have been helpful, along with clear headers for an introduction and a conclusion. Overall, considering that this is an A-Level piece of work, the standard and effort involved is excellent.

The writer provides numerous examples of the topics discussed and demonstrates a considerable level of analytical skills as evidenced through the references and citations included and drawing accurate assumptions and conclusions accordingly. However, the writer provides a number of Wikipedia citations and should instead have provided what Wikipedia itself references (found towards the end of the page).

This is an exceptionally detailed and well researched document which describes modern day computer misuse. The writer outlines in the introductory paragraphs of what the report is to discuss and also includes a section to define cybercrime along with the appropriate references, before continuing. The main text begins in an orderly and structured fashion by first discussing the web technologies, applications and hardware/components prone to abuse and then applying this information by demonstrating its effects on society. The writer also notes the consequences and how law enforcement agencies and companies retaliate with new measures.