Cyber Security
Microsoft Word - Document1 Writing Guidelines 1. Type your submission, double-spaced, in a standard print font, size 12. Use a standard document format with 1-inch margins. (Do not use any fancy or cursive fonts.) 2. Include the following information at the top of your paper: 3. Name and complete mailing address 4. Student number 5. Course title and number (Computer-Based Crime, T06V) 6. Research project name 7. Read the assignment carefully and answer each question. Use proper citation in either APA or MLA style. 8. Be specific. Limit your submission to the questions asked and issues mentioned. 9. Include a reference page. On this page, list websites, journals, and all other references used in preparing the submission. 10. Proofread your work carefully. Check for correct spelling, grammar, punctuation, and capitalization. Some law firms have a policy that no document may leave the firm until at least two people have reviewed it. Even an excellent writer will occasionally make mistakes. If you can, get someone else to look over your work. At a minimum, you should put your work aside for a day or more and then look at it again. You’ll be surprised what problems you notice on a cold reading. Always proofread and edit from a paper copy. Never try to proofread or edit solely from the computer screen. Be sure that your submission contains the following information: Your name Your student ID number The exam name Your email address Your Project It’s time to apply what you’ve learned about digital forensics and cybercrime. This graded project is divided into three sections. Read each question thoroughly, consult the appropriate chapters in your textbook, and use resources available on the internet to identify examples. Part 1 (20 points) 1. Discuss two ways technology has changed human behavior in the past 20 years. Use specific examples. (10 points) 2. Explain what subcultures are and how the growth of the internet has affected how members of subcultures communicate. (10 points) Part 2 (45 points) Look at online news articles to find three recent (2015 or later) examples of cybercrimes. For each example: 1. Explain what happened and identify what kind of cybercrime it is (15 points) 2. Identify the digital evidence used in the investigation (15 points) 3. Apply a criminological theory to explain why the crime may have been committed (15 points) Part 3 (35 points) The FBI suspects that the motor vehicle registration records in three states have been hacked and that the data is being used to create false identities for a variety of thefts and fraud. The FBI has identified a suspect to be investigated. The suspect has both home and office computers as well as a cell phone and an unspecified number of USB drives. 1. What federal laws should be relied upon to investigate this crime? (5 points) 2. Explain the process for obtaining warrants that will be needed to conduct a search and the evidence these warrants might need to seize. (10 points) 3. Describe the process of extracting and processing evidence from the seized materials. (10 points) 4. Identify and explain a court case whose findings might apply to this investigation and the prosecution of the offender. (10 points) Lesson 1 - Cybercrime An Introduction - 75/Chapter 1.pdf Chapter 1 Technology and Cybercrime Chapter goals • Explain how technology has affected human behavior. • Identify the difference between digital natives and digital immigrants. • Discuss the three ways in which technology can be abused by individuals. • Recognize a subculture and their role in offending behaviors. • Identify the differences between cyberdeviance, cybercrime, and cyberterror. • Understand how computers and technology produce digital evidence and its value in criminal investigation . • Explain the factors that make cybercrimes attractive to certain people. • Explore the various forms of cybercrime that occur across the world. Introduction The Internet, computers, and mobile technologies have dramatically reshaped modern society. Although it is difficult to comprehend, less than two decades ago most individuals did not own a cell phone and personal computers were still somewhat expensive pieces of equipment. Individuals could not text and email was uncommon. Internet connectivity was possible through dial-up modems or Ethernet cabling and people paid by the hour for access to the Web. Video game systems used 16-bit graphics and did not connect to other devices. Global Positioning Systems (GPS) were largely used in military applications only. Today, most of the world now depends on computers, the Internet, and cellular technology. Individuals now own laptops that are connected via Wi-Fi, cell phones that may also connect to the Internet, and one or more video game systems that may be networked. In addition, people have multiple email accounts for personal and business use, as well as social networking profiles in multiple platforms. Cell phones have become a preferred method of communication for most people, especially text messages. In fact, individuals under the age of 20 regularly send more texts than any other age group, and prefer to send texts rather than make phone calls (Zickuhr, 2011). Individuals also frequently purchase goods online and are increasingly using e-readers for books and newspapers rather than traditional print media. It is amazing to consider that the world and human behavior have changed so quickly through the use of technology. In fact, there are now 3.4 billion Internet users worldwide, comprising 46.1 percent of the world’s population (Internet Live Stats, 2016). China and India have the largest population of Internet users, though only 55 percent and 34 percent of their total populations have access (Internet Live Stats, 2016). The USA, Brazil, and Japan have the next largest populations, though a much greater proportion of their populations have access (88.5%, 66.4%, and 91.1% respectively: Internet Live Stats, 2016). The proliferation of technology has led to distinct changes in how individuals engage with the world around them. People now shop, communicate, and share information in digital formats, which was previously impossible. Additional changes in behavior are likely to continue in the face of technological innovations as they are developed and implemented. In fact, the sociologist Howard Odum referred to this process as technicways, recognizing the ways in which behavior patterns change in response to, or as consequence of, technological innovations (Odum, 1937; Parker, 1943; Vance, 1972). From Odum’s perspective, technic- ways replace existing behavior patterns and force institutional changes in society (Vance, 1972). For instance, if an individual 30 years ago wanted to communicate with other people, he/she might call them, see them in person if possible, or more likely send a letter through postal mail. Now, however, that person would send a text, write an email, instant message, or poke them through Facebook rather than write a letter through “snail mail.” The impacts of technicways are evident across all demographic groups in modern society. For instance, 77 percent of Americans owned a smart phone as of 2016, with substantial access among younger populations: 92 percent of 18- to 29- year-olds have one (Smith, 2017). In addition, there are over 1 billion mobile phone subscribers each in China and India (Rai, 2016). Importantly, China has over 500 million smartphone users, while India has only 125 million. As these rates continue to increase Internet use will change, transforming social and economic interactions in unique ways from country to country (Rai, 2016). This is evident in the fact that many people around the world use social media as a means to connect and engage with others in different ways. For instance, 79 percent of American adults use Facebook, though there has been a substantial increase in the use of Instagram and LinkedIn as a means to communicate (Greenwood, Perrin, and Duggan, 2016). Adults aged 65 and older are joining these sites at the highest rates compared to other age groups. In addition, Americans appear to use the Facebook messenger app more than any other product available (Schwartz, 2016). WhatsApp is much more popular in a global context, and is the number one messaging application across much of South America, Western Europe, Africa, and Asia. Viber, however, is much more popular across Eastern Europe, particularly Belarus, Ukraine, and other nations in the region (Schwartz, 2016). Despite regional variations in use, technology has had a massive impact on youth populations who have never experienced life without the Internet and computer- mediated communications (CMCs) like email and texting. Today, youth in the USA acquire their first cell phones when they are between the ages of 12 and 13 (Lenhart, 2010). Similar use patterns are evident across the globe, with children in the UK receiving a phone by an average age of 11 (Gibbs, 2013), and 12 in a study of Japan, India, Indonesia, Egypt, and Chile (GSM Association, 2012). For more information on statistics of social media and technology use, go online to: 1. www.pewinternet.org/ 2. www.huffingtonpost.com/april-rudin/life-on-a-social-media- is_b_4600429.html Technology has not simply shifted the behaviors of youth, but has actually shaped and molded their behavior and worldview from the start. Most people born in the mid- to late 1980s have never lived without computers, the Internet, or cell phones. As a consequence, they do not know a world without these devices and what life was like without these resources. Thus, Prensky (2001) argued that these youth are digital natives, in that they were brought into a world that was already digital, spend large amounts of time in digital environments, and use technological resources in their day-to-day lives. For instance, individuals between the ages of 18 and 34 are the most heavy Internet users worldwide (Statistica, 2015). Virtually everyone (96%) aged 16 to 24 in the UK accesses the Internet on