08.11.2014 Views

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

Download - Foreign Military Studies Office - U.S. Army

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

into the system. Copyrighted music was and still is available for download. The<br />

biggest site, Napster, was forced to shut down its use of copyrighted music but<br />

can still make available noncopyrighted music. Digital videos are the latest<br />

victim. During a computer security assessment at a US government agency, an<br />

FTP site that was hacked was found to contain digital videos that had not been<br />

publicly released on DVD yet.<br />

(7) Virus Creation and Distribution<br />

This type of crime fits many of the above categories. A virus can have<br />

many purposes, such as the destruction of data for sabotage reasons, the<br />

collection of data for intelligence purposes, network slowdowns for information<br />

warfare purposes, and so on. A virus is built to spread itself to other computers<br />

via several means, to include “Sneakernet”, the manual transport of a diskette,<br />

or a worm that propagates itself in some fashion across the network. Most<br />

viruses are attachments to emails that are executed by the user. However,<br />

today’s viruses are becoming even more lethal. They can be part of a website<br />

script, or they can be automatically executed by the function of the mail<br />

program. Destruction of data may occur or information may be intercepted and<br />

sent via email to other locations (data such as the password file). Some worms<br />

or viruses attack other systems until the network is clogged to a stand still.<br />

Others infect a system but then wait until a certain date to carry out their<br />

destructive task, such as wiping out all of the contents of the user’s hard drive.<br />

These latter viruses are called “logic bombs,” but the payload may be<br />

considered a virus.<br />

Formatted: Bullets<br />

Other Criminal Uses of the Computer<br />

Computers help criminals by providing them tools available either<br />

commercially or on the Internet. These include deceptive messages, fake return<br />

addresses, encryption, and even steganography tools to hide communications.<br />

Deception can include disguising a site as a place to send money for a<br />

charitable cause, when, in fact, the money goes into a private account.<br />

Encryption is the method of encoding a file with a key to produce a scrambled<br />

document. The receiver of the encrypted message must have a key to decode<br />

the message. Steganography is the art of hiding or embedding a document or<br />

other file within another “carrier” file. Most standard steganography programs<br />

have the ability to encrypt the document first and then embed it in a carrier file<br />

such as a web graphic file or audio file. This presents two levels of difficulty in<br />

finding these illicit communications: first detection and extraction of the<br />

embedded file, and then the decryption of the encrypted document. Of course,<br />

law enforcement can benefit from the use of these tools as well.<br />

Another communication device used by criminals is IRC. This is an<br />

Internet tool that indicates who is online at any time and enables you to contact<br />

308

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!