Real Life and in the Virtual World Presented by Jessica Antes Jennifer Conley Richard Morris Stephanie Schossow Zonia Yee MIS 304 Professor Fang Fang December 2 2008 What is Cyber Crime ID: 252128
Download Presentation The PPT/PDF document "Cyber Crimes" is the property of its rightful owner. Permission is granted to download and print the materials on this web site for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Slide1
Cyber Crimes
Real Life and in the Virtual World
Presented by:
Jessica Antes
Jennifer Conley
Richard Morris
Stephanie
Schossow
Zonia
Yee
MIS 304
Professor Fang
Fang
December 2, 2008Slide2
What is Cyber Crime?
Cyber crime is an
unlawful
act
wherein computer is either a tool or a target or both, it is also any form of threat to the public or private health or safety using the computer Slide3
What is Virtual Crime?
Virtual Crime is similar to crimes that happen in real life, but in the virtual world Some examples of where Virtual Crimes can take place are:Second Life
MMOR (massively multiplayer online game
)
WOW (World of Warcraft
)Slide4
What is a Hacker? The Types?
White Hat
Grey Hat
Black Hat
Cyber Terrorist
Script
Kiddie
HacktivistSlide5
Methods of Hacking
Security ExploitVulnerability ScannerPacket SnifferSpoofing Attack
Rootkit
Social Engineering
Trojan Horse
Virus
Worm
Key LoggersSlide6
Hacking Case I
Hacktivist attacked NASA in Greenbelt, MarylandCreated a worm called WANK, Worms Against Nuclear Killers
The worm ran a banner across all across NASA’s system computers
Protesting the launch of plutonium – fueled Galileo Probe.Slide7
Hacking Case II
17 year old boy with the online name of “Dshocker” attacked other online hackersCharged and
pleaded
guilty multiple felonies
Computer fraudInterstate Threats
4 counts of wire fraud – credit card
Launched a phony bomb threat by hacking into computer systems
Punished with 11 months in juvenile detention center
If he was charged as an adult he would have been convicted with Slide8
Piracy and Intellectual Property Theft
For electronic and audio-visual media, unauthorized reproduction and distribution is referred to as piracyThe unlawful downloading of copyrighted material and sharing of recorded music over the Internet in the form of MP3 and other audio filesSlide9
Penalties for Piracy
Copyright infringement may be liable a copyright owner damages plus any profits made from the infringementCriminal Penalties
up to 10 years and $150,000
DMCA- Digital Millennium Copyright Act of 1998
First Offense
Fine up to $500,000
5 years imprisonment
Subsequent Offenses
One million dollar fine
10 years imprisonmentSlide10
Internet Fraud
Internet fraud is any form of fraudulent solicitation to prospective victims.There are several different types of Internet FraudsIdentity Theft
Purchasing – Financial Scams
Direct Solicitations
Online Automotive Frauds
Cash the Check
System
Internet Ticket Fraud
PhishingSlide11
Cash the Check System Scam
Richard’s IncidentPosted an Ad on Craigslist for a roommateReceived a check for $5000This was to process the deposit and the rent
Was
asked to
send the remaining amount back to the “new roommate”
At the end it cost Richard $4000
Loss for rent
Bank Fees
The money that was sent to “new
roommate”Slide12
Real life Cyber Laws
PhishingAnti-Phishing Act 2005Identity TheftComprehensive Identity Theft Prevention Act
Fair and Accurate Credit Transactions Act of 2003
Identity Theft Penalty Enhancement Act
Identity Theft and Assumption Deterrence Act of 1998
Identity Theft Victims Assistance Act of 2002
Encryption
E-Privacy ActSlide13
Real Life Cyber Laws Cont…
Electronic ChecksCheck Clearing for the 21 Century ActPrivacy
Computer Owners’ Bill of Rights
Online Personal Privacy Act
Online Privacy Protection Act of 2005
SPY BLOCK Act
Spyware Control and Privacy Protection Act of 2000
Spam and Spyware
Enhanced Consumer Protection Against Spyware Act of 2005
U.S. SAFE WEB Act of 2006
SPY ActSlide14
Laws for Virtual Crimes
There is currently no laws for Virtual CrimesThe United States has not convicted nor tried anyone for virtual crimesIf
there is any correlation from virtual crime to real life situation, appropriate legal action will be taken
Other countries are prosecuting people for virtual
crimes, for example:
Korea has a special task force specifically for Virtual Crime Investigation TeamSlide15
Scenario
A Missouri woman created a fictitious 16 year old boy on MySpace. Sent flirtatious messages to a 16 year old girlThe boy then “dumped” the girl in 2006
Then
the
woman told the girl “the world
would be a better place without you.”
The girl hung herself immediately after reading the message.
Prosecutors say that the woman wanted to humiliate the girl for saying mean things to her daughter.
They also said the woman knew that the 16 year old girl was suffering from depression and was emotionally fragile
.Slide16
Class Discussion
What was the crime?What should be the penalty if there was a crime?What should be done to prevent future incidents from occurring?Was this morally just?Slide17
The Outcome of Scenario
This was considered the first trial of cyberbullying
After the suicide Missouri passed a law against cyber-harassment.
Similar federal legislation has been proposed on Capital Hill
The woman was found guilty of three misdemeanor offenses of accessing computers without authorization. Each count is punishable by up to a year in prison and a $100,000 fine.
The woman could have gotten 20 years if convicted of the four original charges.Slide18
Works Cited
http://www.stasi.nl/photos/MCAFFEEdog.jpgwww.foxnews.com