210 likes | 548 Views
Antisocial
E N D
1. CE00340-3Legal and evidentiary aspects to forensic computing R. Shaw
r.shaw@staffs.ac.uk
K235
2. Antisocial e-Behaviour Week 3
3. R. Shaw Learning outcomes Identify areas of antisocial behaviour
Identify specific types
Highlight legal aspects
4. R. Shaw Spot the Trail All criminals leave tracks
Locard Principle
5. R. Shaw Locard Principle "Wherever he steps, whatever he touches, whatever he leaves, even unconsciously, will serve as a silent witness against him. Not only his fingerprints or his footprints, but his hair, the fibres from his clothes, the glass he breaks, the tool mark he leaves, the paint he scratches, the blood or semen he deposits or collects. All of these and more, bear mute witness against him. This is evidence that does not forget. It is not confused by the excitement of the moment. It is not absent because human witnesses are. It is factual evidence. Physical evidence cannot be wrong, it cannot perjure itself, it cannot be wholly absent. Only human failure to find it, study and understand it, can diminish its value."
Professor Edmond Locard(1877-1966)
6. R. Shaw Some relevant legislation Computer Misuse Act 1990
Data Protection Act 1984, 1998
Electronic Communications Act 2000
Electronic Signatures Regulations 2002
Telecommunications (Data Protn & Privacy) Regs 1999
Electronic Commerce Regulations 2002
Police & criminal Evidence Act 1984
Obscene Publications Act 1959, 1964
Protection from Harassment Act 1997
Freedom of Information Act 2000
Defamation Act 1952, 1996
Interception of Communications Act 1985
7. R. Shaw (Poor) E-Behaviour Cyber Attack
Hacking/Cracking
D o S
Spamming
Resource usage
Cyber stalking
Smear campaigns - Cybersmear
E-Mail harassment
8. R. Shaw Cyber attacks #1 Hacking/Cracking
Hackers
White hat
good guys/gals
Crackers
Black hat
bad guys/gals
Grey hats
9. R. Shaw Cyber attacks #2 D o S
Types of DoS attack
Three main classes
Bandwidth/Throughput attack
Resource consumption.
Protocol attack
Refinement of the flood attack
Turn protocol against itself
Logic attack
Exploits vulnerabilities in software
10. R. Shaw Denial of Service How
Most common are Distributed DoS (DDoS)?
Single attacker
Leverage multiple victims (Zombies)
Controlled by master
11. R. Shaw Spamming Over last 12 months 88% of mail was spam
ITNow BCS, 2006, Jan
Spam threat ?four categories
Loss in productivity
Increased potential to virus attack
Reduced bandwidth issues
Potential legal exposure
12. R. Shaw Spamming #2 Stopping Spam
Push versus Pull
Filtering
Blacklists
Legal attack
US CAN-SPAM act 2003
Alan M Raisky Sept 2005
Jeanson James Ancheta Nov 2005
EU Privacy & Elec. Communication Directive 2002
UK Privacy Directive 2003
13. R. Shaw Cyberstalking Stalking Wilful or intentional commission of a series of acts that would cause a reasonable person to fear death of serious bodily injury and that, in fact, places the victim in fear of death or serious bodily injury
14. R. Shaw Cyberstalking #1 Categories of stalkers
Obsessional
Victim & per have prior relationship
Love obsession type
No previous relationship (or very casual one)
Erotomaniacs
Believe victim in love with them
Delusional, often schizophrenic
Vengeance/terrorist stalker
Attempt to elicit specific response or change of behaviour
15. R. Shaw Cyberstalking #2 Cybersmear
Newsgroup postings
Web sites
Identity hijacking
E-mail harrassment
16. R. Shaw Cyberstalking #3 Cybersmear
Organised campaign designed to intimidate, harass or adversely affect the reputation of a person or company (http://forums.ntlhell.co.uk/ )
May start out innocently or as an angry communication, but builds to have a potentially serious affect on the person or business
It may start out small and build with the help of unwitting accomplices manipulated into supporting the campaign
17. R. Shaw Cyberstalking #4 Cybersmear
How does it work?
Rumors and innuendo
Personal attacks and harassment
Cyberstalking and cyber-harassment
Posing and impersonation
Cybersmear by proxy
Communications with key stakeholders
Anonymous defamatory statements
18. R. Shaw Cyberstalking #5 Cybersmear
Everyone leaves behind an IP address
Static and dynamic IP addresses
Preserving the records
How to read a header what it shows
Civil subpoena or law enforcement subpoena process
BUT do anti cybersmear law suits block free speech?
19. R. Shaw e-Mail harassment Not spamming
May also be called Hate-mailing
Usually directed at a single person
I-M s?
20. R. Shaw Summary Identified areas of antisocial behaviour
Cyber Attack
Spamming
Cyber stalking
Identified specific types
Hacking/Cracking
D o S
Smear campaigns - Cybersmear
E-Mail harassment
Highlight legal aspects
21. R. Shaw Which link is ok to click? www.m1crosoft.com
http://128.4.6.3
http://www.respectcompany.com@thisisascam.com
www.stafffs.ac.uk/rs17
www.barclays.org
www.c00p.com.org
www.g00gle.gom
www.stay-loose.com
22. R. Shaw www.usdoj.gov/criminal/cybercrime/gray.htm
www.usdoj.gov/criminal/cybercrime/johnson.htm
www.usdoj.gov/criminal/cybercrime/ngo_pr.htm