Types of Crime that uses IT Systems as weapons?
Results 1 to 10 of 10

Thread: Types of Crime that uses IT Systems as weapons?

  1. #1
    Junior Member
    Join Date
    Oct 2003
    Posts
    20

    Types of Crime that uses IT Systems as weapons?

    I'm writing a paper for class on the types of Crime that uses IT Systems as weapons. I was wondering what your guys thoughts were on this, how would you define the different types of crime that could use IT systems as weapons?
    Share on Google+

  2. #2
    AO Ancient: Team Leader
    Join Date
    Oct 2002
    Posts
    5,197
    Really, pick your crime..... Other than physical..... Your imagination is the limit......
    Don\'t SYN us.... We\'ll SYN you.....
    \"A nation that draws too broad a difference between its scholars and its warriors will have its thinking done by cowards, and its fighting done by fools.\" - Thucydides
    Share on Google+

  3. #3
    Junior Member
    Join Date
    Oct 2003
    Posts
    20
    Good point well maybe I should ask on what type of crime that you guys experience the most? Since I know a lot of you work with computers and are computer security enthusiasts
    Share on Google+

  4. #4
    Super Moderator: GMT Zone nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,192
    Hi, phreeOn


    I have a few weeks to spare for this kind of stuff.....................please feel free to PM or e mail me.

    EDIT: sorry...........hit wrong button...I used to work for PW Coopers...out of the military....I have some ideas that might help?

    Cheers

    Johnno
    If you cannot do someone any good: don't do them any harm....
    As long as you did this to one of these, the least of my little ones............you did it unto Me.
    What profiteth a man if he gains the entire World at the expense of his immortal soul?
    Share on Google+

  5. #5
    Junior Member
    Join Date
    Sep 2001
    Posts
    23
    A$k Bill Gate$
    Share on Google+

  6. #6
    Senior Member
    Join Date
    Oct 2002
    Posts
    1,130
    Other than physical? So if I beat you to death with my keyboard, then what?

    On a more serious note, look into terrorists sending stegonagraphically encoded messages over public channells to spread news of thier plans. It happens, it gets the attention of Joe B Donuts, and it's not something most people are aware of. I think that would make for an interesting paper.
    Government is like fire - a handy servant, but a dangerous master - George Washington
    Government is not reason, it is not eloquence - it is force. - George Washington.

    Join the UnError community!
    Share on Google+

  7. #7
    Senior Member
    Join Date
    Sep 2002
    Posts
    236
    Worms and trojons are by far the most troublesome for us (Army). We have at least 500+ attempted attacks a day, and that is on a little training post (Ft. Lee).

    Getting Military servers to crash would be one crime I could think of... With the war going on crashing the systems that area operating across the pond would hurt a little bit...
    \"Nuts!\"- Commanding General 101st Airborne Division Dec 1944 in answer to German request that he surrender Bastogne during the Battle of the Bulge
    Life has a certian flavor for those who have fought and risked it all that the sheltered and protected can never experience.- John Stewart Mill
    White, Hetrosexual, Christian male. I own guns, hunt, eat meat, burn wood, and my wife wears fur... Any questions?
    Share on Google+

  8. #8
    Super Moderator: GMT Zone nihil's Avatar
    Join Date
    Jul 2003
    Location
    United Kingdom: Bridlington
    Posts
    17,192
    OK a few more thoughts........

    I recommend that you look on the computer as the MO (modus operandi), that is, the methodology or way a criminal works. What I am saying is that the computer is a "medium", rather than a "weapon".

    Try doing a Google search for "Tempest" and "nonstop", "non-stop".............I am not being lazy, I have to be very careful of what I say Let's just say that will give you some info on the "Langley" side of things (MI5/MI6 over here, Mossad to the Israelis etc....)

    "Wardriving" could also be brought into the topic, perhaps?......insecure wireless networks.

    Otherwise:

    1. Personal fraud
    2. Corporate fraud
    3. Identity theft
    4. Industrial Espionage
    5. Espionage/Spying
    6. Drug trafficking
    7. Child Pornography
    8. Terrorism


    Those are the most obvious?

    Good luck, and, as already offered, please feel free to contact me personally and I will help you as best I can within the restraints placed on me by our Official Secrets Acts.......I have seen 2 guys get 11 years each recently, one on a site I was at at the time


    Cheers
    If you cannot do someone any good: don't do them any harm....
    As long as you did this to one of these, the least of my little ones............you did it unto Me.
    What profiteth a man if he gains the entire World at the expense of his immortal soul?
    Share on Google+

  9. #9
    Senior since the 3 dot era
    Join Date
    Nov 2001
    Posts
    1,540
    I don't know if it's posted already but:

    - economical damage by DoS / DDos (Denial of Service / Distributed Denail of Service) for example smurf attacks.
    - email abuse: stalking, spam, email bombers, mail server DoS, ...
    Share on Google+

  10. #10
    AO übergeek phishphreek's Avatar
    Join Date
    Jan 2002
    Posts
    4,324
    This probably falls under fraud, but this is becoming more and more common.

    Blackmail

    There are numberous threads already about this... but here are a couple of the more interesting.

    http://www.antionline.com/showthread...ight=blackmail

    http://www.antionline.com/showthread...ight=blackmail

    http://www.antionline.com/showthread...ight=blackmail

    http://www.antionline.com/showthread...ight=blackmail

    http://www.antionline.com/search.php...by=&sortorder=
    Quitmzilla is a firefox extension that gives you stats on how long you have quit smoking, how much money you\'ve saved, how much you haven\'t smoked and recent milestones. Very helpful for people who quit smoking and used to smoke at their computers... Helps out with the urges.
    Share on Google+

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides