Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 17

Introduction to

Cybercrime and
Environmental
Laws and Protection
INTRODUCTION TO
CYBERCRIME
COMPUTER CRIME

= IS A CRIME CREATED USING


CALCULATING DEVICE

CYBERCRIME CYBERCRIME

= DEFINE BY THE LAW = IS A MULTI MILLION PROFIT


= USING HARDWARE, SOFTWARE = W/OUT VIOLENCE THE
AND NETWORKING PERPETRATOR GAIN
COMPUTER = CALCULATING DEVICE (BINARY PROGRAM) DIGITAL FINGERPRINT
= DEVICE CONTAINED SOFTWARE HASH VALUE
= DEVICE CONTAINED PROGRAM AND INSTRUCTION - REFERENCE OF COMPUTER DATA
= FORERUNNER; HUMAN CALCULATOR AND TRAFFIC DATA
= FATHER OF COMPUTER; CHARLES BABBAGE
= MEANS OF COMMUNICATION (CELLPHONE OR TABLET OR LAPTOP)

COMPOSITION OF COMPUTER
1. SOFTWARE = INSTRUCTION OR PROGRAM (BIOS = INPUT & OUTPUT SYSTEM)
2. HARDWARE = CONTROLLED AND CAN TOUCH BY THE USER
3. NETWORK = CONNECTION WHETHER LOCAL OR WIDE AREA

NETWORK DYNAMIC COOKIES


4. INTERNET PROTOCOL (IP ADDRESS) 192.168.1.1 = JUANDELACRUZ CACHE MEMORY
192.168.1.1 = PEDRO PENDUKO “DOMAIN”
A. DYNAMIC = NON PERMANENT ADDRESS
B. STATIC = PERMANENT ADDRESS 192.168.1.123 = GOOGLEEARTH
192.168.1.123 = GOOGLEEARTH
VPN = VIRTUAL PRIVATE NETWORK CYBER ETHICS
- RISK TYPE OF SOURCE OF INTERNET - STANDARD ON AVOIDANCE TO CRACK, HACK
- NOT OBSERVE CYBER ETHICS OR PHISHING(EMAIL) EVEN SMISHING(TEXT)
- PRONE TO SOME HACKER STORAGE DEVICESTHOSE DATA POSSESS BY OTHERS

1. RANDOM ACCESS MEMORY = STORED TEMPORARY THOSE


INSTRUCTION “INSTRUCTION MEMORY” – RESTART (DEFAULT)

2. SOLID STATE DRIVE (SSD) = STORED PERMANENTLY THOSE DATA & FILED
(MOST ESSENTIAL PARTS FOR CYBERCRIME INVESTIGATION)
INTERNET SERVICE PROVIDER
COMPUTER DATA TRAFFIC DATA
“ COMPUTER” “ ISP” = CONNECTION THROUGH DIFFERENT WEB OR
SSD/HDD UPLOADED FILES DOMAIN
= SOURCE OF INTERNET (INTERNATIONAL
NETWORKING; FORERUNNER – APARNET)
DICT = DEPT OF INFO AND COMMUNICATION TECHNOLOGY = CREATE THROUGH LEGISLATIVE LAW
CYBER ETHICS
- STANDARD ON AVOIDANCE TO CRACK, HACK OR
PHISHING(EMAIL) EVEN SMISHING(TEXT) THOSE DATA POSSESS BY
OTHERS
CHILD PORNOGRAPHY
RESIDENT IN CAVITE
= HASH VALUE – TRAFFIC DATA =
= COMPUTER DATA = COMPARISON “ISP” - GPS
=HASH VALUE=

HASH VALUE
HISTORY AND EVOLUTION OF CYBERCRIME
Where does cybercrime come from?

Although the internet(APARTNET) is only about 30 years old,


experts consider an 1834 hack the first cybercrime in history. Two thieves
were able to infiltrate the French Telegraph System (TELEGRAM) and gain
access to financial markets, committing data theft (IDENTITY OR
INTELLECTUAL PROPERTY THEFT).

PHIL SETTINGS
CELLPHONE = MULTIMEDIA SERVICE (2005)
APPLICATION = YAHOOMAIL (2000) – YAHOO MESSENGER
HISTORY AND EVOLUTION OF CYBERCRIME
Other early cybercrimes, beginning in the late 1800s and first half of the 20th
century, saw hackers focus on the telephone systems (RA4200 WIRETAPPING LAW).

Just two years after phones were invented, teenage boys broke into Alexander
Graham Bell’s telephone company and caused mischief by misdirecting calls(3 WAY
LINE).

Phone hacking, or phreaking, later became popular in the 1960s to 1980s.

ELECTRONICALLY CONNECTED TO PRIVATE LINE (BUGGING)


HISTORY AND EVOLUTION OF CYBERCRIME

The year 1940 saw the first ethical (LEGAL) hacker:

French computer expert Rene Carmille hacked into the Nazi data registry to thwart
their attempts to register and track Jews
HISTORY AND EVOLUTION OF CYBERCRIME

1834 — French Telegraph System — A pair of thieves hack the French Telegraph
System and steal financial market information, effectively conducting the world’s
first cyberattack.

1870 — Switchboard Hack — A teenager hired as a switchboard (MACHINE THAT


CONNECT THOSE TRANSMISSION & TELEPHONE LINE) operator is able to
disconnect and redirect calls and use the line for personal usage
HISTORY AND EVOLUTION OF CYBERCRIME

1878 — Early Telephone Calls — Two years after Alexander Graham Bell invents the
telephone, the Bell Telephone Company kicks a group of teenage boys off the
telephone system in New York for repeatedly and intentionally misdirecting and
disconnecting customer calls.

1903 — Wireless Telegraphy (FAX MACHINE) — During John Ambrose Fleming’s first
public demonstration of Marconi’s “secure” wireless telegraphy technology, Nevil
Maskelyne disrupts it by sending insulting Morse code messages discrediting the
invention
CRYPTOGRAPHY = SCIENCE OF CODE AND CIPHER

CRYPTO-ANALYST = DECIPHER OR DECODE MESSAGE


HISTORY AND EVOLUTION OF CYBERCRIME

1939 — Military Code breaking — Alan Turing and Gordon Welchman develop
BOMBE, an electro-mechanical machine, during WWII while working as code
breakers at Bletchley Park. It helps to break the German Enigma codes

IRON DOME = CODE OPERATED FIREARMS

1955 — Phone Hacker — David Condon whistles his “Davy Crockett Cat” and
“Canary Bird Call Flute” into his phone, testing a theory on how phone systems
work. The system recognizes the secret code, assumes he is an employee, and
connects him to a long-distance operator. She connects him to any phone number
he requests for free
HISTORY AND EVOLUTION OF CYBERCRIME

1957 — Joybubbles — Joe Engressia (Joybubbles), a blind, 7-year-old boy with


perfect pitch, hears a high-pitched tone on a phone line and begins whistling along
to it at a frequency of 2600Hz (ADHD), enabling him to communicate with phone
lines and become the U.S.’s first phone hacker or “phone phreak.”

1969 — RABBITS Virus (LOGIC BOMB) — An anonymous person installs a program


on a computer at the University of Washington Computer Center. The
inconspicuous program makes copies of itself (breeding like a rabbit) until the
computer overloads and stops working. It is thought to be the first computer virus.
HISTORY AND EVOLUTION OF CYBERCRIME

1971 — Steve Wozniak and Steve Jobs — When Steve Wozniak reads an article
about Joybubbles and other phone phreaks, he becomes acquainted with John
“Captain Crunch” Draper and learns how to hack into phone systems. He builds a
blue box designed to hack into phone systems, even pretending to be Henry
Kissinger and prank-calling the Pope. He starts mass-producing the device with
friend
Steve Jobs (FOUNDER OF APPLE) and selling it to classmates

1981 – Cybercrime Conviction — Ian Murphy, aka “Captain Zap,” hacks into the
AT&T network and changes the internal clock to charge off-hour rates at peak
times. The first person convicted of a cybercrime, and the inspiration for the movie
“Sneakers,” he does 1,000 hours of community service and 2.5 years of probation.
HISTORY AND EVOLUTION OF CYBERCRIME

1982 — The Logic Bomb — The CIA blows up a Siberian Gas pipeline without the
use of a bomb or a missile by inserting a code (MANIPULATIVE) into the network
and the computer system in control of the gas pipeline. The code was embedded
into equipment purchased by the Soviet Union from a company in Canada.

1984 — US Secret Service (GUARD THE FORMER & PRESENT PRES) — The U.S.
Comprehensive Crime Control Act gives Secret Service jurisdiction over computer
fraud.
HISTORY AND EVOLUTION OF CYBERCRIME

1988 — The Morris Worm — Robert Morris creates what would be known as the
first worm on the Internet. The worm is released from a computer at MIT to suggest
that the creator is a student there. The potentially harmless exercise quickly
became a vicious denial of service attack when a bug in the worm’s spreading
mechanism leads to computers being infected and reinfected at a rate much faster
than he anticipates.

1989 — Trojan Horse Software — A diskette claiming to be a database of AIDS


information is mailed to thousands of AIDS researchers and subscribers to a UK
computer magazine. It contains a Trojan (after the Trojan Horse of Greek
mythology), or destructive program masquerading as a benign application.
HISTORY AND EVOLUTION OF CYBERCRIME

1999 — NASA and Defense Department Hack — Jonathan James, 15, manages to
penetrate U.S. Department of Defense division computers and install a backdoor on
its servers, allowing him to intercept thousands of internal emails from different
government organizations, including ones containing usernames and passwords for
various military computers. Using the info, he steals a piece of NASA software.
Systems are shut down for three weeks.

PHIL SETTINGS
ESPIONAGE = ACT OF SPYING AND POSSESSING DATA REGARDING AFP

You might also like