Chapter 11 Cybercrime - Detailed Notes

Hacking
  • Definition of Hacking: Unauthorized access to computer networks or devices for information or data.

  • Types of Hacking Activities:

    • Hacking: Using ingenuity to modify existing programs.

    • Cracking: Intruding into systems without permission.

    • Vandalism: Disturbing system operations.

    • Spoofing: Impersonating another device to gain access.

  • Historical Context:

    • Emerged in the 1970s with various criminal acts against computer systems.

    • Key figures: Kevin Mitnick and Julian Assange, known for their significant breaches and consequences.

Impact of Hacking
  • Consequences:

    • Disruptions can lead to significant financial losses for companies. For example, Mitnick's exploits resulted in millions stolen and extensive damage.

    • Hacking can also lead to severe repercussions in critical areas like healthcare, demonstrated by incidents involving delays in medical procedures due to system breaches.

Recent Examples of Hacking
  • Health Sector: Ransomware attacks on hospitals, e.g., the closure of services affecting patient care.

  • Environmental Damage: Unauthorized access led to raw sewage overflow caused by manipulating sewer systems.

  • State-Sponsored Hacking: A notable example includes the "Olympic Games" operation which targeted Iranian nuclear facilities using the Stuxnet malware.

Phishing
  • Definition: A technique used to gain unauthorized access through fraudulent emails prompting users to click links or provide personal information.

  • Growth of Phishing: Significant increase in phishing attempts since 2000; reports jumped from 113 unique attacks in December 2003 to over 42,273 in September 2019.

  • Spearphishing: Specific campaigns targeting individuals or businesses, sometimes impersonating high-ranking company officials to deceive employees into transferring funds.

Illegal Interceptions
  • Description: Unauthorized interception of communications, a practice dating back to the 17th century.

  • Modern Techniques: Includes bugging conversations, using GPS for tracking, and exploiting electromagnetic signals to gather information.

  • Examples: Interception by criminal organizations, e.g., a hacker accessing police intelligence in Amsterdam.

Types of Digital Crime
  • Telecommunication Fraud: Included phreakging (illegal access to phone systems) and recent cases such as the misuse of cryptocurrencies for fraudulent activities.

  • Electronic Funds Transfer Crimes: Includes sophisticated scams that manipulate financial transactions, leading to significant losses. Examples include the Citibank heist and the attempted theft from the Central Bank of Bangladesh.

  • Cryptocurrency Utilization: The blockchain's dual-use for legitimate and illicit activities such as trafficking and finance fraud.

Cyberbullying and Cyberstalking
  • Cyberbullying: Online shaming, exclusion, or harassment, significantly affecting mental health among youth. Statistics indicate high prevalence in young Australians.

  • Cyberstalking: Persistent harassment through electronic means leading to severe emotional distress for victims.

Identity Crimes
  • Identity Theft: Stealing personal information for financial gain; estimates suggest identity crime costs Australia about $2.65 billion annually.

  • Unauthorized Phone Porting: Criminals use personal information to port phone numbers illicitly for fraud.

Spam & Cyberterrorism
  • Spam: Unsolicited messages leading to economic losses and often containing malicious links.

  • Cyberterrorism: Attacks on computer systems with political motives, including using digital platforms for recruitment, training, and propaganda.

Summary
  • Cybercrime is a complex field involving various forms of digital crime, including hacking, phishing, cyberbullying, and financial fraud.

  • The implications of these crimes can be severe, ranging from personal distress to national security threats, necessitating robust strategies for prevention and law enforcement.