November 21st, 2003, 12:05 AM
Types of Crime that uses IT Systems as weapons?
I'm writing a paper for class on the types of Crime that uses IT Systems as weapons. I was wondering what your guys thoughts were on this, how would you define the different types of crime that could use IT systems as weapons?
November 21st, 2003, 12:16 AM
Really, pick your crime..... Other than physical..... Your imagination is the limit......
Don\'t SYN us.... We\'ll SYN you.....
\"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides
November 21st, 2003, 01:35 AM
Good point well maybe I should ask on what type of crime that you guys experience the most? Since I know a lot of you work with computers and are computer security enthusiasts
November 21st, 2003, 01:57 AM
I have a few weeks to spare for this kind of stuff.....................please feel free to PM or e mail me.
EDIT: sorry...........hit wrong button...I used to work for PW Coopers...out of the military....I have some ideas that might help?
November 21st, 2003, 03:13 AM
November 21st, 2003, 04:58 AM
Other than physical? So if I beat you to death with my keyboard, then what?
On a more serious note, look into terrorists sending stegonagraphically encoded messages over public channells to spread news of thier plans. It happens, it gets the attention of Joe B Donuts, and it's not something most people are aware of. I think that would make for an interesting paper.
Government is like fire - a handy servant, but a dangerous master - George Washington
Government is not reason, it is not eloquence - it is force. - George Washington.
Join the UnError
November 21st, 2003, 05:45 AM
Worms and trojons are by far the most troublesome for us (Army). We have at least 500+ attempted attacks a day, and that is on a little training post (Ft. Lee).
Getting Military servers to crash would be one crime I could think of... With the war going on crashing the systems that area operating across the pond would hurt a little bit...
\"Nuts!\"- Commanding General 101st Airborne Division Dec 1944 in answer to German request that he surrender Bastogne during the Battle of the Bulge
Life has a certian flavor for those who have fought and risked it all that the sheltered and protected can never experience.- John Stewart Mill
White, Hetrosexual, Christian male. I own guns, hunt, eat meat, burn wood, and my wife wears fur... Any questions?
November 21st, 2003, 01:54 PM
OK a few more thoughts........
I recommend that you look on the computer as the MO (modus operandi), that is, the methodology or way a criminal works. What I am saying is that the computer is a "medium", rather than a "weapon".
Try doing a Google search for "Tempest" and "nonstop", "non-stop".............I am not being lazy, I have to be very careful of what I say Let's just say that will give you some info on the "Langley" side of things (MI5/MI6 over here, Mossad to the Israelis etc....)
"Wardriving" could also be brought into the topic, perhaps?......insecure wireless networks.
1. Personal fraud
2. Corporate fraud
3. Identity theft
4. Industrial Espionage
6. Drug trafficking
7. Child Pornography
Those are the most obvious?
Good luck, and, as already offered, please feel free to contact me personally and I will help you as best I can within the restraints placed on me by our Official Secrets Acts.......I have seen 2 guys get 11 years each recently, one on a site I was at at the time
November 21st, 2003, 04:36 PM
I don't know if it's posted already but:
- economical damage by DoS / DDos (Denial of Service / Distributed Denail of Service) for example smurf attacks.
- email abuse: stalking, spam, email bombers, mail server DoS, ...
November 21st, 2003, 05:19 PM
is a firefox extension that gives you stats on how long you have quit smoking, how much money you\'ve saved, how much you haven\'t smoked and recent milestones. Very helpful for people who quit smoking and used to smoke at their computers... Helps out with the urges.