Introduction to Computer Crime
Total Page:16
File Type:pdf, Size:1020Kb
Introduction to Computer Crime M. E. Kabay, PhD, CISSP-ISSMP Program Director, MSIA School of Graduate Studies Norwich University Northfield, VT Copyright © 1996, 2006 M. E. Kabay. All rights reserved. Introduction to Computer Crime by M. E. Kabay, PhD, CISSP-ISSMP Program Director, MSIA School of Graduate Studies Norwich University, Northfield VT Much of the following material was originally published in the 1996 textbook, NCSA Guide to Enterprise Security (McGraw Hill) and was most recently updated with newer references for use in Norwich University programs in July 2006. Introduction to Computer Crime..................................................................................................... 1 1 Sabotage: Albert the Saboteur ................................................................................................ 3 2 Piggybacking........................................................................................................................... 4 3 Impersonation ......................................................................................................................... 7 4 Equity Funding Fraud ............................................................................................................. 8 4.1 What happened................................................................................................................ 8 4.2 Lessons............................................................................................................................ 8 5 Superzapping......................................................................................................................... 10 6 Scavenging: Garbage Out, Data In ....................................................................................... 12 6.1 Legal status of garbage ................................................................................................. 12 6.2 RAM and Virtual Memory............................................................................................ 13 6.3 Magnetic Spoor............................................................................................................. 13 6.4 Bye-Bye, Data............................................................................................................... 14 7 Trojan horses......................................................................................................................... 16 7.1 Case studies................................................................................................................... 16 7.2 1993-1994: Internet monitoring attacks........................................................................ 17 7.3 Cases from the INFOSEC Year in Review Database ................................................... 18 7.4 Hardware Trojans..........................................................................................................23 7.5 Diagnosis and prevention.............................................................................................. 24 8 Back Doors: Secret Access .................................................................................................. 25 8.1 Origins........................................................................................................................... 25 8.2 Examples of Back Doors .............................................................................................. 25 8.3 Easter Eggs and the Trusted Computing Base.............................................................. 26 8.4 Back Doors: RATs....................................................................................................... 28 8.5 Back Doors: Testing Source Code............................................................................... 29 8.6 Additional resources..................................................................................................... 30 8.7 Additional reports......................................................................................................... 30 _____________________________________________________________________________________________ Copyright © 1996, 2006 M. E. Kabay. All rights reserved. Page 1 of 64 Introduction to Computer Crime _____________________________________________________________________________________________ 9 Voice Mail Security.............................................................................................................. 36 10 Salami Fraud..................................................................................................................... 38 11 Logic bombs...................................................................................................................... 40 11.1 Time bombs.................................................................................................................. 40 11.2 Renewable software licenses ........................................................................................ 40 11.3 Circumventing logic bombs.......................................................................................... 42 12 Data leakage...................................................................................................................... 43 12.1 Some cases of data leakage:.......................................................................................... 44 12.2 USB Flash Drives ......................................................................................................... 50 12.3 Surveillance................................................................................................................... 52 12.4 Steganography............................................................................................................... 53 12.5 Inference ....................................................................................................................... 53 12.6 Plugging covert channels .............................................................................................. 53 13 Extortion ........................................................................................................................... 55 13.1 More recent cases:......................................................................................................... 55 13.2 Defenses........................................................................................................................ 58 14 Forgery.............................................................................................................................. 59 14.1 Desktop forgery............................................................................................................ 59 14.2 Fake credit cards........................................................................................................... 60 15 Simulation......................................................................................................................... 62 16 References......................................................................................................................... 63 _____________________________________________________________________________________________ Copyright © 1996, 2006 M. E. Kabay. All rights reserved. Page 2 of 64 Introduction to Computer Crime _____________________________________________________________________________________________ 1 Sabotage: Albert the Saboteur One of the most interesting cases of computer sabotage occurred at the National Farmers Union Service Corporation of Denver, where a Burroughs B3500 computer suffered 56 disk head crashes in the 2 years from 1970 to 1972. Down time averaged eight hours per incident. Burroughs experts concluded that the crashes must be due to power fluctuations. Total expenses for extensive rewiring and testing exceeded $2M (in today’s currency) but the crashes continued despite the improvements. Further analysis showed that all the crashes had occurred at night when old Albert the night-shift operator had been on duty. Despite Albert’s outstanding helpfulness and friendliness, management installed a closed-circuit TV (CCTV) camera in the computer room – without informing Albert. After yet another crash occurred, the CCTV tape showed Albert opening up a disk cabinet and poking his car key into the read/write solenoid, shorting it out and causing the 57th head crash. The next morning, management confronted Albert with the film of his actions and asked for an explanation. Albert broke down in mingled shame and relief. He confessed to an overpowering urge to shut the computer down. Psychological investigation determined that Albert, who had been allowed to work night shifts for years without a change, had simply become lonely. He arrived just as everyone else was leaving; he left as everyone else was arriving. Hours and days would go by without the slightest human interaction. He never took courses, never participated in committees, never felt involved with others in his company. When the first head crashes occurred– spontaneously – he had been surprised and excited by the arrival of the repair crew. He had felt useful, bustling about, telling them what had happened. When the crashes had become less frequent, he had involuntarily, and almost unconsciously, re-created the friendly atmosphere of a crisis team. He had destroyed disk drives because he needed company. In this case, I blame not Albert but the managers who relegated an employee to a dead-end job and failed to think about his career and