190 likes | 229 Views
Explore the impact of cyber crimes, reliability of web banking, profile of cyber criminals, cyber terrorism, and information warfare. Delve into enforcement challenges in gathering electronic evidence and updating laws for technology advancements. Learn about infamous cyber attacks and implications for law enforcement in transnational investigations.
E N D
Computer Crime By FUNG Wai-keung Hong Kong Police
Reliability of Computers Money • Is Web banking reliable? • Sample case • Impact large enough to deter large corporations to migrate to e-banking\ • Average bank robbery is $14,000 USD, whilst average Computer theft was more that $2M USD (Association of Certified Fraud Examiners) $ 2,000,000
Profile of a cyber criminal • crimes of concealment and deceit • no violence required (A weakling ?) • needs computer with a little skill • college kids • non organized • no investment needed.
Traditional Enforcement • Evidence used to be paper format, hard evidence - finger print, blood sample, witnesses
Present Evidence • Electronic evidence inside a computer • cyber-trail • pursuance of crime across continents 0100110100101100
Phenomenal with Cyber Crime • Against the culture to report the crime (Rape ?) • Company reputation • Victims don’t know they were robbed until sometime late in time.
Implications for Law Enforcement • Pacing with technology (broadband, WAP …) • Collecting cyber Intelligence (Non traditional) • It is anachronism to testify new technology with outdated Laws from the past, • Acceptance of Electronic evidence
Serious Cyber Crimes • Cyber-terrorism • Information warfare • Infrastructure Attack • Electronic Battlefield
Cyber-Terrorism • In 1996 - Times of London reported several London financial institutions had paid over 400 M to fend off extortionist with logic bomb. • Some of the proceeds went to Russia. • No national border boundary
Information Warfare • In 1994 - two hackers downed a computers in a Air Force Base in Rome N.Y. for 18 days • Sensitive Defense projects with sensitive files were stolen • Use ROME computers to attack NASA’s Goddard Space Flight Center and other defence contractor’s computers
Information Warfare • One was arrested in England • All stolen data were still missing • The victim estimated that their Defense systems were attacked about 250,000 times a year • no secret as hackers attacked 130,000 U.S. government sites on 1.1 million hosts in 1997 (National institude of Standards and Technology)
Implications for Law Enforcement • Gathering of evidence (Ethical problem - U.S. Electronic Communications Privacy Act), • Transnational • Time Constrain - legal issue
Implications for Law Enforcement • Non standard interpretation of LAW (Gambling, terrorism - Traditional prerogatives of national sovereignty)
Common HK Cases • Criminal Damage • Obtaining Property by Deception • Publishing Obscene Articles • Cyberstalking • Unauthorised Access to Computer