I'm writing a paper for class on the types of Crime that uses IT Systems as weapons. I was wondering what your guys thoughts were on this, how would you define the different types of crime that could use IT systems as weapons?
Printable View
I'm writing a paper for class on the types of Crime that uses IT Systems as weapons. I was wondering what your guys thoughts were on this, how would you define the different types of crime that could use IT systems as weapons?
Really, pick your crime..... Other than physical..... Your imagination is the limit......
Good point well maybe I should ask on what type of crime that you guys experience the most? Since I know a lot of you work with computers and are computer security enthusiasts
Hi, phreeOn
I have a few weeks to spare for this kind of stuff.....................please feel free to PM or e mail me.
EDIT: sorry...........hit wrong button...I used to work for PW Coopers...out of the military....I have some ideas that might help?
Cheers
Johnno
A$k Bill Gate$
Other than physical? So if I beat you to death with my keyboard, then what?
On a more serious note, look into terrorists sending stegonagraphically encoded messages over public channells to spread news of thier plans. It happens, it gets the attention of Joe B Donuts, and it's not something most people are aware of. I think that would make for an interesting paper.
Worms and trojons are by far the most troublesome for us (Army). We have at least 500+ attempted attacks a day, and that is on a little training post (Ft. Lee).
Getting Military servers to crash would be one crime I could think of... With the war going on crashing the systems that area operating across the pond would hurt a little bit...
OK a few more thoughts........
I recommend that you look on the computer as the MO (modus operandi), that is, the methodology or way a criminal works. What I am saying is that the computer is a "medium", rather than a "weapon".
Try doing a Google search for "Tempest" and "nonstop", "non-stop".............I am not being lazy, I have to be very careful of what I say;) Let's just say that will give you some info on the "Langley" side of things (MI5/MI6 over here, Mossad to the Israelis etc....)
"Wardriving" could also be brought into the topic, perhaps?......insecure wireless networks.
Otherwise:
1. Personal fraud
2. Corporate fraud
3. Identity theft
4. Industrial Espionage
5. Espionage/Spying
6. Drug trafficking
7. Child Pornography
8. Terrorism
Those are the most obvious?
Good luck, and, as already offered, please feel free to contact me personally and I will help you as best I can within the restraints placed on me by our Official Secrets Acts.......I have seen 2 guys get 11 years each recently, one on a site I was at at the time
:eek:
Cheers
I don't know if it's posted already but:
- economical damage by DoS / DDos (Denial of Service / Distributed Denail of Service) for example smurf attacks.
- email abuse: stalking, spam, email bombers, mail server DoS, ...
This probably falls under fraud, but this is becoming more and more common.
Blackmail
There are numberous threads already about this... but here are a couple of the more interesting.
http://www.antionline.com/showthread...ight=blackmail
http://www.antionline.com/showthread...ight=blackmail
http://www.antionline.com/showthread...ight=blackmail
http://www.antionline.com/showthread...ight=blackmail
http://www.antionline.com/search.php...by=&sortorder=