home *** CD-ROM | disk | FTP | other *** search
- February 1991
-
-
- COMPUTER CRIMES:
- AN ESCALATING CRIME TREND
-
- By
-
- William S. Sessions
- Director
- Federal Bureau of Investigation
-
-
- Editor's note: This article is based on a speech given by
- FBI Director William S. Sessions.
-
- Artificial intelligence, laptops, PCs, vaxclusters, local
- area networks, cobol, bits, bytes, viruses, and worms. Most
- people recognize these words as computer terms. As computers
- have become a vital part of the American way of life, computer
- terminology has crept into the vernacular. There is no doubt
- that computers touch every aspect of our lives. Well over 80
- percent of daily financial transactions nationwide take place
- via electronic funds transfers. However, many computer systems
- are highly vulnerable to criminal attack. In fact, computer-
- related crime costs American companies as much as $5 billion
- per year.
-
- When Clifford Stoll, an astrophysicist with an interest in
- computers, described computer crime, he likened computer
- networks to neighborhoods and small communities. He said cities
- and towns are tied together by streets, roads, highways, and
- interstates. Likewise, communities of computers are linked
- through local, regional, and national networks. Rather than
- transport food and equipment like highways do, computer networks
- move ideas and information.
-
- Unfortunately, just as American communities are threatened
- with drugs and violent crime, this Nation's computer networks
- are threatened as well. They are threatened by thieves robbing
- banks electronically; they are threatened by vandals spreading
- computer viruses; and they are even threatened by spies breaking
- into U.S. military systems.
-
- White-collar crimes in general--and computer crime in
- particular--are often difficult to detect and even more
- difficult to prosecute because many times they leave no
- witnesses to question and no physical evidence to analyze. And,
- because computer technology is such a rapidly evolving field,
- law enforcement has not yet developed a clear-cut definition of
- computer crime. Nevertheless, two manifestations of computer
- crime are obvious: The first is crime in which the computer is
- the vehicle or tool of the criminal, and second, crime in which
- the computer and the information stored in it are the targets of
- the criminal.
-
- COMPUTERS AS CRIME TOOLS
-
- When criminals use computers as their tools, the crimes
- they engineer are essentially traditional crimes, such as
- embezzlement, fraud, and theft, perpetrated by non-traditional
- means. The criminal uses a computer as an instrument, like the
- forger's pen or the terrorist's bomb.
-
- The vast majority of computer-related crimes that the FBI
- investigates falls into the category of using the computer as a
- tool. For instance, if a team of FBI Agents in one of its 56
- field offices uncovers information that a disgruntled employee
- is tapping into a bank's computer to transfer funds illegally,
- those Agents will probably open up a bank fraud and embezzlement
- case and proceed from there.
-
- COMPUTERS AS CRIME TARGETS
-
- But what about the emerging crime trend that is unique to
- computers--in which the computer is the target? This type of
- crime occurs when a computer and the information it stores are
- the targets of a criminal act committed either internally by
- employees or externally by criminals. The external threat
- usually involves the use of telecommunications to gain
- unauthorized access to the computer system.
-
- In its investigations, the FBI has determined three groups
- of individuals involved in the external threat. The first, and
- the largest, group consists of individuals who break into a
- computer just to see if they can do it--without stealing or
- destroying data. The next group breaks into computer systems to
- destroy, disrupt, alter, or interrupt the system. Their actions
- amount to malicious mischief because they do not attack the
- system for financial gain, which is the motive of the last
- group. This group constitutes a serious threat to businesses
- and national security for these individuals are professionals
- who use specialized skills to steal information, manipulate
- data, or cause loss of service to the computer system.
-
- MEASURES TAKEN AGAINST COMPUTER CRIME
-
- Offenses committed through the use of computers include
- thefts, destruction of property, embezzlement, larceny, and
- malicious mischief, to name a few. For the most part, offenders
- have been prosecuted under Federal statutes (1) to address those
- particular crimes. However, to investigate and prosecute
- computer crimes not adequately covered by existing U.S. Federal
- laws, the Computer Fraud and Abuse Act was passed. One aspect of
- that act made it a crime for an unauthorized person--the
- hacker--to access a computer system.
-
- In 1986, this law was amended and expanded in scope and
- appears on the books as Title 18, U.S. Code, Section 1030. This
- statute contains essentially five parts--computer espionage,
- theft of financial information, trespass into U.S. Government
- computers, trespass into "Federal interest computers" (2) with
- intent to defraud, and trespass into a Federal interest computer
- to alter or destroy information. Both the FBI and the U.S.
- Secret Service have joint jurisdiction to enforce this statute.
- However, the statutes in the new computer fraud and abuse cases
- have seldom been interpreted by the courts. In fact, only 74
- FBI cases with the computer as the target of the crime were
- identified between August 1987, and December 1989.
-
- CASE STUDY
-
- One particular case that captured much media attention
- demonstrated how complex and elusive computer crimes and
- computer criminals can be. In November 1988, a Cornell
- University graduate student designed the "Internet worm," a
- malicious code that spread to several hundred computers and
- affected the operations of several thousand U.S. Government,
- military, education, and commercial computer systems. This
- "worm" did not destroy data but caused massive disruption to
- the Defense Department's Advanced Research Project Agency
- Network and the computers connected to it.
-
- Investigators from several FBI field offices identified the
- man responsible for the attack, which attracted attention when
- it overloaded the system's capacity in numerous locations. This
- student was charged with devising and executing a computer
- attack on approximately 6,200 computers connected to the Defense
- Data Network. On July 26, 1989, he was indicted for violating
- the Computer Fraud and Abuse Act, a felony that carries a
- sentence of up to 5 years in prison. On January 22, 1990, a
- jury in the Northern District of New York returned a verdict of
- guilty. The student was ultimately sentenced to 3 years'
- probation, 400 hours of community service, and a $10,000 fine.
-
- This particular case raised many questions regarding the
- long-range impact of "malicious code." Malicious code is the
- general term for computer software designed to deliberately
- circumvent established security mechanisms or to take advantage
- of inadequate system policies or procedures. It is often
- difficult to trace and is frequently not discovered until it is
- too late to prevent the intended harm.
-
- Computer viruses and computer worms are malicious codes
- most frequently introduced into computer systems. Although some
- viruses have been known to carry benign code, more often they
- will have devastating effects, such as destroying files or
- corrupting data.
-
- EFFECTS OF COMPUTER CRIME
-
- Computer hacking and the unleashing of viruses are not
- harmless pranks. These products of computer criminal action
- have the potential for great harm, not only to large financial
- institutions but also to all citizens. Criminals who hack into
- a computer storing a doctor's patient and prescription
- information could, by electronically altering the drugs and
- dosages, inflict serious harm on patients. Criminals who hack
- into defense computers could compromise valuable intelligence
- information and possibly alter the world's balance of power.
- And, a fanatical terrorist could inflict devastating damage with
- a virus.
-
- These are very real possibilities. And the increase in the
- number of criminals who have the knowledge and capabilities to
- access computers are the reasons why this emerging crime trend
- is among the FBI's top priorities.
-
- INVESTIGATING COMPUTER CRIME
-
- Solving crimes that involve computers demands special
- investigative strategies, training, and skills. To conduct
- successful investigations in computer crime, the FBI uses a team
- approach. In most of the investigations that involve computers,
- the FBI Agent plays the role of the team leader, assisted by a
- computer technician--often drawn from the FBI support personnel
- ranks--when necessary. In addition, the FBI draws on knowledge
- from other government agencies, private sector computer firms,
- and universities to augment the level of expertise brought to
- these sometimes very complex investigations.
-
- COMPUTER CRIME TRAINING
-
- In order to fight the computer criminals of the next
- century, the FBI is providing investigators with the necessary
- training and expert support services to ensure that their
- efforts are well directed. For example, computer crime training
- classes for FBI Agents and National Academy students at the
- Bureau's facility at Quantico, Virginia, began in 1976. The FBI
- training philosophy is: To be a computer crimes investigator,
- you first must be a computer user.
-
- Specifically, the FBI offers two computer courses to FBI
- Agents and police investigators. In the 2-week basic computer
- course, students learn to use computers and become familiar with
- the various databases so they can recognize aberrations and
- crimes when they occur. In short, they are made computer
- literate.
-
- Another course is a 1-week advanced investigative course
- that zeroes in on viruses and other tricks of the trade. This
- course also covers searches and seizures of crime evidence found
- within computers.
-
- INVESTIGATIVE SUPPORT
-
- Not only are FBI Agents and police investigators trained in
- computer operations, but they are also supported with CASIAT--the
- FBI's computer-assisted security and investigative analysis tool.
- CASIAT is not a computer but a group of experts--members of the
- FBI's National Center for the Analysis of Violent Crime--who
- analyze computer crime patterns and develop profiles of computer
- criminals to assist investigators. For instance, as a result of
- their research, it has been determined that computer hackers are
- motivated by a variety of emotions--including revenge,
- retaliation, vandalism, and malicious mischief. The CASIAT
- experts are also establishing a national repository of malicious
- software or viruses. In addition, they are studying the methods
- used by various computer criminals in order to deal with crimes
- committed by these individuals.
-
- CONCLUSION
-
- In the continuing fight against computer crime, law
- enforcement must continue to strengthen its investigations,
- training, and support services. The education of prosecutors
- and investigators is necessary for them to know and to
- understand the elements of criminal conduct in computer crime.
- These crimes will be dealt with by using traditional laws and
- investigative techniques when possible, but new strategies must
- be adopted when needed in order to keep current with the
- computer crime trends of the future.
-
- However, the greatest point of control is removing the
- opportunity to commit computer crime. Computer security is
- first and foremost the responsibility of the system owner.
- Therefore, corporations must bring the issues of computer
- security to the management levels and create policies that
- establish security standards and response strategies to computer
- crimes. Cooperative efforts between the public and private
- sectors will prevent the computer criminal from causing serious
- damage in our Nation.
-
-
- FOOTNOTES
-
- (1) 18 U.S.C. sec. 1030 (Computer Fraud and Abuse Act of
- 1986); 18 U.S.C. sec. 2701 (unlawful access to stored
- communications); 18 U.S.C. sec. 1362 (malicious mischief); 18
- U.S.C. sec. 2314 (interstate transportation of stolen property);
- 18 U.S.C. sec. 1343 (wire fraud); 18 U.S.C. sec. 641 (theft of
- government property); 18 U.S.C. sec. 793 (espionage).
-
- (2) A "Federal interest computer" is defined as either a
- computer used by the Federal Government or financial
- institutions, or affecting the use for the Government or
- institution, or a computer "which is one of two or more
- computers used in committing the offense, not all of which are
- located in the same state."