Computer Crime Essay

1301 words - 6 pages

Cyber Crime Research
Presentation by the Australian Institute of Criminology
Dr Russell G Smith Principal Criminologist

The Australian Institute of Criminology
• Australia's national research and knowledge centre on crime and justice • Core funding from the Australian Government, with income for contract research from public and private sectors • Criminology Research Advisory Council representing all jurisdictions • Staff of 30 academic researchers and 25 support staff – total 55

Cyber crime research
Research questions
• • • • • • • • • • How are cyber crimes committed (e.g. credit cards, internet)? How many crimes are committed and what are the crime trends? Who commits them ...view middle of the document...

g. ID crime)

Political and ideological change
• Cyber-terrorists and attacks on critical infrastructure

Drivers of change in the 21st century
• Increasing risks from the new and developing economies

User profile
• Integration of technology into personal and business life • Increasing use of ICT in government

Technological development
• • • • Increasing use of broadband Increasing use of wireless technologies New methods of identification and verification New payment systems – SVCs, e-cash, gaming currencies, e-gold

Crime methodologies
• Movement from ‘syntactic’ to ‘semantic’ attacks

Internet growth statistics 1995-2011
Internet users as a percentage of world population


Online personal fraud risks
Syntactic attacks
• Exploitation of technical vulnerabilities to commit fraud (e.g. malware, plastic card skimming, illegal funds transfers, Wi-Fi)

Semantic attacks
• Exploitation of social vulnerabilities to gain personal information (e.g. scam solicitations, identity-related fraud, auction fraud)

Blended attacks
• Attacks using technical tools to facilitate social engineering

e.g. Phishing
• Using an unsolicited request to visit a counterfeit website in an attempt to trick users into disclosing personal banking information

Scam categories
Advance fee schemes

Scam sub-categories
Pyramid schemes, Ponzi schemes, chain letters, ‘Nigerian’ emails, business opportunities, prizes and lotteries, dating scams Online auctions, internet services, computer products, sexual services, credit and loan scams, health scams, educational qualifications Spam, securities and investment fraud, bait advertising, inertia selling Phishing, plastic card fraud, card skimming, unauthorised transactions, online banking fraud

Non-delivery and defective products and services Unsolicited and unwanted goods and services Identity crime

Current and previous AIC cyber crime research
Public sector
• • • • • • • • Fraud against the Commonwealth annual survey Electronic funds transfer fraud E-tax fraud, electronic voting fraud risks Electronic Medicare / Centrelink (welfare) fraud ABACUS – Aust Business Assessment of Computer User Security Identity crime, e-banking, funds transfer fraud, business fraud Sharemarket manipulation / e-piracy / intellectual property theft Money laundering / financing of terrorism (SVCs, e-currencies, EFT)

Private sector

Personal cyber crime
• ACFT – Annual Online Scams Survey • Personal fraud / scams / Online child grooming / cyber-stalking

Principal AIC publications on cyber crime

Quantifying the extent of identity crime
SIRCA (2003)
• Direct loss from identity fraud in Australia 2001-02 was $420 million • Total cost of identity fraud $1.1 billion (including prevention & recovery)

Personal identity fraud (ABS)
• Total personal fraud in 2010-11 – 713,600 victims ($1.4b); 6.7% pop’n • ID theft – 124,000, 0.8% (2007);...

Other Papers Like Computer Crime

Computer Crime in a Digital Age

1185 words - 5 pages | Computer Crime in the Digital Age | | | Jane Doe | December 5, 2012 | Jane Doe Professors Name Introduction to Computer Information Systems 15 March 2013 Computer Crime in a Digital Age In today’s world the use of the internet and other digital media is ever increasing. The internet in many ways is relatively new, and every day the numbers of users increase. Not only are individuals fascinated with the internet, but

The Vulnerability Of Computerised Accounting Information Systems To Computer Crime

2560 words - 11 pages Abstract.The objective of this essay is to determine the vulnerability of computerised accounting information system to computer crime and the solutions to prevent such crime from occurring in organisations. Ever-Changing information technology has made computerised accounting processes easier. However, it has also created significant threats in relation to ensuring the security and reliability of computerised accounting information systems

Increasing Computer Crime

288 words - 2 pages Computer crimes seem to be an increasing problem in today's society. The main aspect concerning these offenses is information gained or lost. As our government tries to take control of the information that travels through the digital world, and across networks such as the InterNet, they also seem to be taking away certain rights and privileges that come with these technological advancements. These services open a whole new doorway to

Categories of Cyber Crimes

581 words - 3 pages property, marketing, pricing, or personnel data or can even sabotage of operating systems and programs with the thought of creating chaos in a business operations. There are many ways computers can be targeted unlawful access to criminal justice and other government records is another crime that targets the computer directly. This type of crime you could change a criminal history, modifying warrant information, creating a driver’s license, passport

Computer Crimes

819 words - 4 pages Computer Crimes Andy Berg Professor Gregorio Chavarria CIS Information Technology and Crime 15 January 2012 Defining computer crime effectively is a daunting and difficult task. Nevertheless there are four general categories of criminal crime, including (1) the computer as an instrument of crime, (2) the computer as a target, (3) the computer as incidental to crime, and (4) crimes associated with the prevalence of computers. (Taylor


255 words - 2 pages -related crimes as discrete federal offense with the passage of the counterfeit access device and computer fraud and abuse law in 1984. So as you can see there are quite a few different statutes that apply to computer crime. As for local and state statutes that involve cybercrime there is not too many. In Michigan the terms of cybercrime are these. Mental state must be intentional, misdemeanor if violation involves $200 or less, felony if violation

Cyber Crime

1235 words - 5 pages Argumentative Essay -DISCURSIVE ESSAY COMPUTER CRIME When people hear the word computer crime, they often think of some bad pictures from the Internet that show crimes involving computers. Those tapes of crime are no different from crimes without computers. The computer is only a tool that a criminal uses to commit a crime. There are no precise, reliable statistics on the amount of computer crime and the economic loss to

Assignment 1

477 words - 2 pages ISSC351 - Week 1 Your Name: Search the Internet for articles on computer crime prosecution. Write a one page paper summarizing the article and identify key features of the decision you find in your search. Computer Crime Criminals have always tried to take advantage or exploit the advances in technology. It's extremely profitable to do so and rarely can get to prosecution if caught and if caught will be given the option to work with the

Cyber Crimes

1489 words - 6 pages Computer Crime has become a very large issue in our society today; this paper will look at this issue from a sociological perspective. It will analyze the various crimes that make up computer crime and see what changes it has brought about in the world in which we live in. Computer crime first is a very new problem in our society today and it is crimes that are committed from a computer. These include embezzling, breaking into other computers

Cyber Crime Team

1543 words - 7 pages Cyber-Crime Article Analysis Team D June 12, 2013 CJA/394 Cyber-Crime Article Analysis Cyber-crime is an increasing type of crime locally and globally. Cyber-crime is defined as, “criminal activity or a crime that involves the Internet, a computer system, or computer technology,” ("Cyber-crime," 2012). Law enforcement, courts, and corrections are affected in different ways by cyber

Categories of Computer Crimes

2285 words - 10 pages unsanctioned revelation of passwords with volition to gain an unsanctioned access to the private communication of an organization of a user is one of the widely known computer crimes. Another highly dangerous computer crime is the hacking if IP addresses in order to execute with a false identity, thus remaining anonymous while carrying out the criminal activities. Phishing: Phishing is the act of attempting to obtain sensitive information like

Related Essays

Computer Crime Essay

1185 words - 5 pages have access, computer crimes have become more frequent. Everyone with a computer and a modem can commit a computer crime if so inclined. Anyone, conceivably, could become a "white collar" computer criminal. When the term "white collar" crime came into wide spread use several decades ago, it was thought that certain crimes were committed by persons whom no one would normally suspect of criminal behavior: professional, "white collar" workers. In the

Digital Computer Crime Essay

1368 words - 6 pages Digital Computer Crime There are multiple different scenarios in which computers can play a part in crime. Technology has made significant leaps and bounds in the last three-quarters of a century, which is truly astonishing (Taylor, Fritsch, & Liederbach, 2015). While it is wonderful for thousands of citizens across the world to be able to communicate instantly back and forth, there is a percentage of people that use computers, the

Rbs Computer Crime Essay

3377 words - 14 pages own goods or the legal action. Usually they will steal on a thing that may be useful to be sold or the equipment, software, electronic function, proprietary information and computer time. Beside that the problem of member of organized crime group also have been increase. This is because the company have given them a special job that control an information on the company. So they have use for illegal purpose. The problem are getting serious when

Computer Forensics And Cyber Crime Essay

701 words - 3 pages Computer Forensics and Cyber Crime Author Institution Computer Forensics and Cyber Crime A security survey or audit can also be referred to as a vulnerability analysis. A security survey is an exhaustive physical examination whereby all operational systems and procedures are inspected thoroughly (Fischer & Green, 2004). A security survey involves a critical on-site examination and analysis of a facility, plant, institution