internet crime schemes: the new technology of crime professor byrne technology and the criminal...

31
INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE S YST EM

Upload: dennis-dawson

Post on 12-Jan-2016

216 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

INTE

RNET CRIM

E

SCHEMES: THE N

EW

TECHNOLO

GY OF

CRIME

PROFE

SSOR B

YRNE

TECHNOLO

GY AND T

HE CRIM

INAL J

USTICE

SYSTE

M

Page 2: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

TECHNO-CRIME AND TECHNO CRIMINALS

*Advances in both hard and soft technology have not been restricted to the criminal justice system’s response to crime;

*1.these advances have resulted in new opportunities for crime: on the internet (via darknet and traditional internet), and in the community

*2.new forms of criminality: new categories of crime( internet stalking, solicitation, and new synthetic drug prohibitions) via new federal and state laws

*3.new techniques for committing crime: hacking, ransoming access to computers, internet scams

*4.the creation of new categories of both offenders( internet sex crimes, stalkers, hackers, and victims (identity theft, human trafficking, internet scam victims).

We will review the use of technology to commit crime in the following lecture, but see the chapter in text for more background

Page 3: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

TECHNO-CRIMINALS REPRESENT A NEW TYPE OF CRIMINAL, BUT THE CRIMES ARE TYPICALLY NOT NEW

Exploring the impact of technology on criminal opportunity    (e.g. new Drugs/new crimes; the internet and criminal opportunity)

New forms of criminality (e.g. internet scams and sex crimes)

New techniques for committing crimes through advances in hard and Soft technology (e.g. computer software programs, pirating, firearms)

Page 4: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

NEW CATEGORIES OF OFFENDERS AND VICTIMS

NEW OFFENDERSNEW OFFENDERSNew types of sex crime offenders:pornography, solicitation,trafficking

New types of stalking and Harrassment: sexting, email monitoringNew types of drug offenders: prescription drugs, date rape drugs

NEW VICTIMSNEW VICTIMS

New categories of Sex crime victims New categories of Stalking VictimsNew categories drug-related victimization

Page 5: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

INTERNET CRIME SCHEMES: AN OVERVIEW OF CRIME TYPES AND TECHNIQUES:

INTERNET AUCTION FRAUDCOUNTERFEIT CASHIERS CHECK FRAUDCREDIT CARD FRAUDDEBT ELIMINATION FRAUDIDENTITY THEFTOTHER INTERNET-BASED FRAUDS

Page 6: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

INTERNET AUCTION FRAUDMisinterpretation of a product or non-delivery of products through

web

The seller posts the auction as if he resides in the United States, then responds to victims with a congratulatory email stating he is outside the United States for business reasons, family emergency, etc. Similarly, beware of sellers who post the auction under one name, and ask for the funds to be transferred to another individual.

The subject requests funds to be wired directly to him/her via Western Union, MoneyGram, or bank-to-bank wire transfer. By using these services, the money is virtually unrecoverable with no recourse for the victim.

Sellers acting as authorized dealers or factory representatives in countries where there would be no such dealers should be avoided.

Buyers who ask for the purchase to be shipped using a certain method to avoid customs or taxes inside another country should be avoided.

Be suspect of any credit card purchases where the address of the card holder does not match the shipping address. Always receive the card holder's authorization before shipping any products.

Page 7: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

INTERNET AUCTION FRAUDS

Extent of Problem: almost half (48%) of all complaints filed with the Internet Crime Complaint Center involve internet auction frauds.

Offenders: Both buyers and sellers may be involved in frauds.

Victims: E-Bay estimates that only about 1 in every 40,000 transactions is an internet fraud, but with millions of transactions, these quickly add up. The internet auction sites were bringing in 19 billion in revenue in 2003 alone. The offenders are simply following the money stream.

http://www.texomashomepage.com/news/scams-await-users-of-online-auction-sites

Page 8: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

COUNTERFEIT CASHIER’S CHECK

Targets individuals using internet classified ads

An interested party located outside the U.S. contacts seller

Check is for more than specified amount and seller is told to send check back for difference after it clears

Check turns out fraudulent and victim is responsible for sum of check

Page 9: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

CREDIT CARD FRAUD

Unauthorized use of credit/debit cards or card #

Card numbers stolen from unsecure website or as part of identity theft scheme

Victim generally lose between 5,000-20,000

http://abcnews.go.com/WNT/video/undercover-investigation-credit-card-fraud-identity-theft-rise-24080640

Page 10: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

DEBT ELIMINATION

Participant sends $1-2k along with specifics of loan information, and power of atty to make decisions over house deed

Participant then pays another % of total debt

Bonds and promissory notes issued to participants true lenders

Potential risk of ID theft immense because all personal info is released

Page 11: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

EMPLOYMENT/BUSINESS OPPORTUNITIESForeign based companies contact via

employment websites for work from home

They hire you, get all personal info, explain you will be paid via U.S. creditor that works with the company

A check comes higher than salary permits employee is asked to deposit the check into personal account and wire back the rest.

Check is fraudulent

Page 12: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

ESCROW SERVICES FRAUD

Wary internet auction participant is persuaded to use third party escrow account

Perpetrator has compromised a true escrow website and creates a similar looking site

Victim sends payment, never sees product

Page 13: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

ID THEFT

How does someone steal your identity? Individuals give personal information in the belief it is for legitimate business purpose, in response to email looking to update billing or membership info, or job hiring

What can be done to prevent identity theft? http://www.consumer.ftc.gov/media/video-0023-what-identity-theft

Links to other internet crimes: ID theft is often use for other forms of internet crime, such as credit card theft, false identifiucation, etc.

Extent of problem: In 2004, 3% of households in U.S. had at least victim in in previous 6 months (ncjrs)

Offender explains how to commit ID theft: http://www.bloomberg.com/news/articles/2015-07-15/an-identity-thief-explains-the-art-of-emptying-your-bank-account

Page 14: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

INTERNET EXTORTION

What is internet extortion? It takes various forms

1.Hacking into & controlling various industry databases. Criminals Ask for funds in return for releasing control back to the company. These criminals often threaten the release of compromising consumer information

2. Extorting ransoms from individuals by taking control of their home computers or threatening the release of damaging or embarrassing information. There are internet companies that now promise to restore your reputation… for a fee.

http://www.reputation.com/reputationwatch/internet-extortion

Page 15: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

INVESTMENT FRAUD

Using false claims to solicit investments, loans, forged or counterfeit securities

http://khon2.com/2015/08/24/fbi-exposes-platform-trading-as-investment-fraud/

Page 16: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

LOTTERIES

Contacted via email that person has won large lump sum payment from lottery

The winner must pay fee, $1-5k to initiate process, more fees once process has begun

Page 17: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

NIGERIAN LETTER/ “419”

Victim is contacted via email to give opportunity to share in % of millions of $ to place money in overseas bank accounts

Victim is knowingly involving self in crime unknowing the irony

Victim is asked to send money in installments for variety of reasons

Millions of dollars are lost annually

https://www.youtube.com/watch?v=Vm77jHuOBi8

Page 18: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

PHISHING/SPOOFING

Emails are sent appearing to be from legitimate business in attempts to divulge personal info

Directs user to website which is fraudulent but appears to be legitimate

176 unique phishing attacks in Jan. 2004

Page 19: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

PONZI/PYRAMID

Investors are promised high return on investments, no investments are made

Early investors are paid with fund received from later investors

System collapses and lose investment

Page 20: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

RESHIPPING

Subject is hired as a “reshipper” for employment individual divulges personal information

Schemer opens credit in victims

Victim receives products that were bought with his/her credit (unknowingly)

Victim reships products as instructed in hiring

Page 21: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

SPAM

Bulk email act as a vehicle for accessing computers and servers transmitting viruses and Botnets

Page 22: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

THIRD PARTY RECEIVER OF FUNDSJob sites solicit assistance from U.S. citizens

Foreign web based entrepreneurs explain they cannot receive funds for their online business because their foreign base

Victims sets up account to receive funds and then forwards it overseas

U.S. citizens receives funds from victim and forwards overseas and becomes victim as well

Page 23: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

CRIME PREVENTION

Six Social-Engineering Strategies

Target Removal

Target Devaluation

Target Insulation

Offender Incapacitation

Offender Exclusion

Offense, Offender, and Target Identification

Page 24: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

TARGET REMOVAL

The logic of prevention is clearest and most effective when a target is removed. Something that is not there cannot be taken.

Some Examples:The move toward a cashless society is one

example of target removal. Furniture built in to the wall cannot be stolen,

and that bolted or welded to the floor is unlikely to be.

A number of urban schools have created dress codes banning signs of gang affiliation and expensive clothes and jewelry

Page 25: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

TARGET DEVALUATION

The goal of target devaluation is to reduce or eliminate the value of a potential target to anyone but authorized users.

Examples of devalued targets include products that self-destruct (some car radios when tampered with) or that leave dear proof of theft (exploding red dye packs that stain money taken in bank robberies).

There is a device that, via cellular phone, can remotely cut off the engine of a stolen car. Another system, called Auto Avenger, is triggered if the door is opened while the engine is running. If not disengaged by a hidden switch, the engine will shut down after a few minutes and the system tells the thief he has fifteen seconds to get out or face a 50,000-volt shock.

Page 26: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

TARGET INSULATION

Target insulation is probably among the oldest of techniques for preventing violations

We can separate perimeter-maintaining strategies such as fences, walls, moats, guards, and guard dogs from more specific protections such as safes, chastity belts, and placing goods in locked cases, chaining them to immovable objects, and hiding them.

"Skywalks" linking downtown buildings shield their occupants from life on the street.

Page 27: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

OFFENDER INCAPACITATION

Offender incapacitation renders the potential offender harmless.

There are a variety of "immobilizers," "restrainers," and "containers" that seek to prevent violations by weakening the potential offender's will or ability to commit the offense.

psychosurgery for the violent, literal or chemical castration for sex offenders, and the practice in some Middle Eastern countries of cutting off the hands of pickpockets. Excessively aggressive behavior may be treated with tranquilizers. Drugs such as Depo-Provera may be used to reduce the sex drive.

Page 28: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

OFFENDER EXCLUSION

offender exclusion is the opposite of target insulation. The offender, rather than the potential target, is restricted.

In short, the goal of offender exclusion is to keep potential offenders away from persons or environments that may tempt them to commit violations.

Capital punishment is the most extreme form of this strategy.

Page 29: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

EXAMPLES OF OFFENDER EXCLUSION

Other examples are exile, prison, curfews, and mobility restrictions (such as house arrests or restraining orders).

At the group level, the creation of red light and drug districts away from residential areas (as in Amsterdam and Zurich) is also based on the idea of exclusion.

Electronic location devices have recently made individual exclusion easier.

the ultimate exclusion may be genetic screening: persons believed to have a biological predisposition to undesirable behavior simply never appear-they aren't born. This screening could be voluntary or mandatory.

Page 30: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

OFFENSE, OFFENDER, AND TARGET IDENTIFICATION The goal of identification is to document

the occurrence of the violation and identify or even trap the violator.

Various sensors and alarms fit here.Another expanding area involves

immobilization or seizure strategies. One system involves a super-glue that

spreads onto the floor after an explosion. Persons may be able to get into a building, but the human flypaper makes it impossible for them to get out.

Page 31: INTERNET CRIME SCHEMES: THE NEW TECHNOLOGY OF CRIME PROFESSOR BYRNE TECHNOLOGY AND THE CRIMINAL JUSTICE SYSTEM

OTHER EXAMPLES OF IDENTIFICATION STRATEGIESA more general form of identification is the stigmatic mark

of the "scarlet letter," which gives evidence of past violations.

In some jurisdictions convicted drunk drivers must have special identifying license plates or signs on their cars. The requirement that individuals carry their records, or that these be checked, is equivalent.

In some jurisdictions sex offenders are required to take out newspaper ads accompanied by photographs with warnings that they have been convicted of particular crimes; or their pictures may be prominently displayed around playgrounds.

There is a proposal to electrically shock those under house arrest if they attempt to leave and, if they succeed in leaving, to increase the voltage the farther they stray