Professional Documents
Culture Documents
Cdi 9 Prelim
Cdi 9 Prelim
Cybercrime and
Environmental
Laws and Protection
INTRODUCTION TO
CYBERCRIME
COMPUTER CRIME
CYBERCRIME CYBERCRIME
COMPOSITION OF COMPUTER
1. SOFTWARE = INSTRUCTION OR PROGRAM (BIOS = INPUT & OUTPUT SYSTEM)
2. HARDWARE = CONTROLLED AND CAN TOUCH BY THE USER
3. NETWORK = CONNECTION WHETHER LOCAL OR WIDE AREA
2. SOLID STATE DRIVE (SSD) = STORED PERMANENTLY THOSE DATA & FILED
(MOST ESSENTIAL PARTS FOR CYBERCRIME INVESTIGATION)
INTERNET SERVICE PROVIDER
COMPUTER DATA TRAFFIC DATA
“ COMPUTER” “ ISP” = CONNECTION THROUGH DIFFERENT WEB OR
SSD/HDD UPLOADED FILES DOMAIN
= SOURCE OF INTERNET (INTERNATIONAL
NETWORKING; FORERUNNER – APARNET)
DICT = DEPT OF INFO AND COMMUNICATION TECHNOLOGY = CREATE THROUGH LEGISLATIVE LAW
CYBER ETHICS
- STANDARD ON AVOIDANCE TO CRACK, HACK OR
PHISHING(EMAIL) EVEN SMISHING(TEXT) THOSE DATA POSSESS BY
OTHERS
CHILD PORNOGRAPHY
RESIDENT IN CAVITE
= HASH VALUE – TRAFFIC DATA =
= COMPUTER DATA = COMPARISON “ISP” - GPS
=HASH VALUE=
HASH VALUE
HISTORY AND EVOLUTION OF CYBERCRIME
Where does cybercrime come from?
PHIL SETTINGS
CELLPHONE = MULTIMEDIA SERVICE (2005)
APPLICATION = YAHOOMAIL (2000) – YAHOO MESSENGER
HISTORY AND EVOLUTION OF CYBERCRIME
Other early cybercrimes, beginning in the late 1800s and first half of the 20th
century, saw hackers focus on the telephone systems (RA4200 WIRETAPPING LAW).
Just two years after phones were invented, teenage boys broke into Alexander
Graham Bell’s telephone company and caused mischief by misdirecting calls(3 WAY
LINE).
French computer expert Rene Carmille hacked into the Nazi data registry to thwart
their attempts to register and track Jews
HISTORY AND EVOLUTION OF CYBERCRIME
1834 — French Telegraph System — A pair of thieves hack the French Telegraph
System and steal financial market information, effectively conducting the world’s
first cyberattack.
1878 — Early Telephone Calls — Two years after Alexander Graham Bell invents the
telephone, the Bell Telephone Company kicks a group of teenage boys off the
telephone system in New York for repeatedly and intentionally misdirecting and
disconnecting customer calls.
1903 — Wireless Telegraphy (FAX MACHINE) — During John Ambrose Fleming’s first
public demonstration of Marconi’s “secure” wireless telegraphy technology, Nevil
Maskelyne disrupts it by sending insulting Morse code messages discrediting the
invention
CRYPTOGRAPHY = SCIENCE OF CODE AND CIPHER
1939 — Military Code breaking — Alan Turing and Gordon Welchman develop
BOMBE, an electro-mechanical machine, during WWII while working as code
breakers at Bletchley Park. It helps to break the German Enigma codes
1955 — Phone Hacker — David Condon whistles his “Davy Crockett Cat” and
“Canary Bird Call Flute” into his phone, testing a theory on how phone systems
work. The system recognizes the secret code, assumes he is an employee, and
connects him to a long-distance operator. She connects him to any phone number
he requests for free
HISTORY AND EVOLUTION OF CYBERCRIME
1971 — Steve Wozniak and Steve Jobs — When Steve Wozniak reads an article
about Joybubbles and other phone phreaks, he becomes acquainted with John
“Captain Crunch” Draper and learns how to hack into phone systems. He builds a
blue box designed to hack into phone systems, even pretending to be Henry
Kissinger and prank-calling the Pope. He starts mass-producing the device with
friend
Steve Jobs (FOUNDER OF APPLE) and selling it to classmates
1981 – Cybercrime Conviction — Ian Murphy, aka “Captain Zap,” hacks into the
AT&T network and changes the internal clock to charge off-hour rates at peak
times. The first person convicted of a cybercrime, and the inspiration for the movie
“Sneakers,” he does 1,000 hours of community service and 2.5 years of probation.
HISTORY AND EVOLUTION OF CYBERCRIME
1982 — The Logic Bomb — The CIA blows up a Siberian Gas pipeline without the
use of a bomb or a missile by inserting a code (MANIPULATIVE) into the network
and the computer system in control of the gas pipeline. The code was embedded
into equipment purchased by the Soviet Union from a company in Canada.
1984 — US Secret Service (GUARD THE FORMER & PRESENT PRES) — The U.S.
Comprehensive Crime Control Act gives Secret Service jurisdiction over computer
fraud.
HISTORY AND EVOLUTION OF CYBERCRIME
1988 — The Morris Worm — Robert Morris creates what would be known as the
first worm on the Internet. The worm is released from a computer at MIT to suggest
that the creator is a student there. The potentially harmless exercise quickly
became a vicious denial of service attack when a bug in the worm’s spreading
mechanism leads to computers being infected and reinfected at a rate much faster
than he anticipates.
1999 — NASA and Defense Department Hack — Jonathan James, 15, manages to
penetrate U.S. Department of Defense division computers and install a backdoor on
its servers, allowing him to intercept thousands of internal emails from different
government organizations, including ones containing usernames and passwords for
various military computers. Using the info, he steals a piece of NASA software.
Systems are shut down for three weeks.
PHIL SETTINGS
ESPIONAGE = ACT OF SPYING AND POSSESSING DATA REGARDING AFP