1 / 14

Computer Crime Erik Krohn

Computer Crime Erik Krohn. Computer Crime. Computer crime is defined well by the following:. Any criminal activity involving the copy of, use of, removal of, interference with, access to, manipulation of computer systems, and/or their related functions, data or programs.

shamus
Download Presentation

Computer Crime Erik Krohn

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Computer CrimeErik Krohn

  2. Computer Crime Computer crime is defined well by the following: Any criminal activity involving the copy of, use of, removal of, interference with, access to, manipulation of computer systems, and/or their related functions, data or programs.

  3. Whoever willingly, knowingly and without authorization does any of the following may be penalized as provided in part (b): Modifies data Destroys data Accesses data Takes possession of data Copies data Discloses restricted access codes or other restricted access information to unauthorized persons Wisconsin Laws

  4. Punishment! • Class A misdemeanor unless 2,3,4. • Class E felony if offense is committed to defraud or to obtain property. • Class D felony if the damage is greater than $2,500 or if it causes an interruption or impairment of governmental operations or public communication, of transportation or of a supply of water, gas or other public service. • A Class C felony if the offense creates a situation of unreasonable risk and high probability of death or great bodily harm to another.

  5. Penalties

  6. Federal Laws(brief) • Title 18 – Crimes and Criminal Procedure • Part I – Crimes • Chapter 47 – Fraud and False Statements • § 1030. Fraud and related activity in connection with computers

  7. Federal Laws(brief) • Unauthorized use, treason • Bank hacking • Viewing classified information • Hinder government work • Send viruses/trojans/malicious code • Recklessly cause damage • Defraud/slow internet traffic only if it affects: Interstate/Foreign Commerce Computer used by government • Extortion

  8. Strange Federal Law “(4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period;”

  9. Federal Penalties • Very similar to Wisconsin penalties. • Highest is fines of up to $10,000 and 20 years in prison. • Minimum can be a few hundred dollars and a small amount of time on probation.

  10. Computer Crime Cases $80 Million “Melissa” Virus $7.8M

  11. Computer Crime Cases(cont.) Juvenile hacker 68 months

  12. Operation Buccaneer • The “Release” Process: • Speed and efficiency are essential. • Supply • Crack • Testing and Packing • Prerelease/Courier

  13. Operation Buccaneer • Release Groups: • DrinkOrDie, Razor1911, RiSCISO, MYTH, POPZ • Courier Groups: • RequestToSend(RTS), WeLoveWarez(WLW), RiSC

  14. Bibliography • http://nsi.org/Library/Compsec/computerlaw/Wisconsi.txt • Wisconsin Laws • http://www.usdoj.gov/criminal/cybercrime/cccases.html • Criminal Cases • http://www.usdoj.gov/criminal/cybercrime/1030NEW.htm • Federal Laws • http://www.usdoj.gov/criminal/cybercrime/ob/OBMain.htm • Operation Buccaneer Main • http://www.usdoj.gov/criminal/cybercrime/ob/OBorg&pr.htm • Operation Buccaneer Overview • http://www.usdoj.gov/criminal/cybercrime/ob/OBinvest.htm • Operation Buccaneer Investigation • http://privacy.openflows.org/powerpoint/computercrime/sld001.htm • Definition of Computer Crime

More Related