 Welcome back everyone. I wanted to start this course off by just giving a brief overview of what exactly is cybercrime. So before we actually start investigating digital crime or cybercrime, we need to have a good idea of what cybercrime actually is. So whenever we start talking about what cybercrime is, in 2017, the definition of cybercrime will greatly vary depending on which country you're in, which jurisdiction you're in, how your country, how your country's culture thinks about computers and how they use computers. So one of we're talking about definitions. Definitions really matter on your jurisdiction and how your government sees computers and sees computer crime. So I'm going to give some very basic general definitions that I think most people can agree on, but everything really depends on your country and your culture and how your culture uses the internet and treats cybercrime. So first off, what is cybercrime? We can say that cybercrime is crime conducted via the internet or some computer network. Now most cybercrime happens online because you just have, you know, massive amounts of computers connected together and they can communicate with each other real time. That means that anyone in any other internet connected place can connect to and communicate with computers in your country or your jurisdiction. One of we're talking about cybercrime, there's usually a focus on the connection between systems. So we have two systems, two or more systems talking together and again all of this can be done in real time. So imagine you might be connecting to this K MOOC or you might be connecting to Facebook. Well, where is the K MOOC server located? It's probably located in Korea. So if you're taking this course outside of Korea, you're actually connecting into another country to be able to download these videos. If you're connecting from within Korea, then you're connecting maybe to another city or another location to be able to download this content. If you think about Facebook, Facebook is hosted in the United States with servers all over the world and you are connecting to those other countries or those other jurisdictions in real time. I mean, as fast as you want, you can basically connect to them. So we focus on, whenever we're talking about cybercrimes, connections between systems and there's usually or almost always some type of connection going on between these two systems. Very often these connections are global. So just like K MOOC, just like Facebook, you're going to be connecting to, most of the time, another country. Your traffic will go through another country even if you're making a connection that might even be local. So there's always some sort of global connections and we'll talk more about what globalization means or what these connecting to other countries means in terms of cybercrime in a later video. So cybercrime, we're dealing with some type of connection. Now, it's a little bit different than computer crime because with cybercrime, we're focused mostly on the connections with computer crime. We're focused on the computer as either a tool or a victim. Now, whenever a computer is a victim of cybercrime or of a digital crime, most likely it's because somebody connected in from the internet or some other network connected to it and made it a victim either by stealing a database or just stealing information. But those computers could also be used as tools in cybercrime. So if I can take over your computer, for example, if I just sit down at your computer, use that computer to try to hack into a bank, then I have taken over your computer to commit crime. So I'm using your computer as a tool in crime. So with cybercrime, again, we're focusing mostly on connections between systems with computer crime. We're focused on the system, investigating the system itself. So the computer, the phone, possibly the cloud, even though it's kind of a mix between cybercrime and computer crime. Now, this all brings us to network connections. So how do these computers actually talk to each other? We don't have time to go into all of how the internet networks work. I wish we did. But very basically, devices talk to each other over the internet using TCP IP protocol. You can think of a protocol just like a language. So if two computers want to talk to each other, they have to speak the same language to be able to communicate and pass information. And the protocol that we use for the internet is TCP IP. Each computer using TCP IP needs a unique internet protocol address or an IP address to talk to other computers online. This IP address, you can think of kind of like a phone number. If you have a cell phone, you have your individual phone number for your cell phone, your friend has their unique phone number. And if you dial that phone number, you get your friend or you get your phone. A computer also has this unique number that's used to communicate with it. So if I want to talk to your computer, I just need to know your IP address and I can connect to your computer more or less directly. The local internet service provider provides IP addresses to these users. Your internet service provider, for example, in Korea, it would be like SK Telecom, Olay. Any of the big service providers where you would get internet for your phone, most of the cases, you can also get internet at your house from the same providers. They, those companies, are providing an IP address to you, a public IP address to you, and that's what lets you get online. Now, in your home, you probably have some sort of Wi-Fi access point, right? And maybe even the company gave it to you whenever you signed up for internet. That Wi-Fi access point is getting a public IP address from the company, the service provider, and all of your devices can connect to your own local network. Now, there's a difference between public IP address and private IP address, which is on your local network. We'll talk a little bit more about the different IP addresses in the future. Connection. So when a device is put online, anyone in the world can connect to that IP address. So once you connect your computer to the internet, everyone that's also connected to the internet can connect to your computer. And a lot of people don't realize that. So your home router, anyone can potentially find that IP address and try to make connections to your house or to, you know, your smart TV or your smart computer or whatever devices you have online. The devices security settings determine how the device responds to different connections. So if I connect to your TV and I tell it to change the channel or to turn on the camera or whatever, if your TV is not configured securely and it allows those connections from the internet in, then I might actually be able to connect to your TV and turn on your camera on the TV. So that's actually a big problem right now. Programs running on your computer can open holes. So think of the connection kind of like a wall, right? And every program we run on the computer can potentially open up a different part of the wall. For example, smart TVs, for example, whenever they want to connect to the internet, they might open up some different holes on this wall that can let connections come in and out. And that can make your entire network a little bit less secure. Because of those default settings that most people don't change, there's a lot of security risk in people trying to connect in. So if I can randomly scan your your home, I can find all of the open holes in the wall and then try to make connections to them. Attackers can use these holes to try to gain full access inside your computer or inside your local network. If they can connect into you, then they can take advantage of software vulnerabilities or bad configuration or no security and take over your internal network and then either use your computer to do something bad or just steal your information. Keeping software updated really helps to close vulnerabilities. So most people don't really update Windows very often. They almost never update their wireless router. They don't usually updates much software. Right? But if you keep the latest or the most updated software on your computers, that helps in reducing most of the security vulnerabilities that you're likely to find, not everything. You can't reduce all vulnerability or you can't remove all vulnerabilities, but you can definitely reduce them by keeping your software up to date. And that includes your phone. So make sure your phone always has the latest software installed. Cybercrime comes in many forms. We're talking about making connections and these these always connected networks really help to really help cybercrime, I guess, work because these connections can be made. Cybercrime comes in many forms. The majority of cybercrime is financially motivated in some way. Anyone who's doing cybercrime that's doing it, let's say full time or as a profession is trying to make money. And because of the way that networks work, the way the internet works, a lot of cybercrimes are very profitable. And because of that, organized crime is really starting to do a lot more cybercrime or have a lot more business in cybercrime. Attackers may try to steal data or information stored on a computer. And you think, well, what good is information stored on a computer? Well, if you hack into a business and you steal their business secrets, maybe they make all of their money from those business secrets. And if they sell them to a competitor, they sell them to somebody else, they can make a lot of money from selling it. But they can also put this group out of business. So there's a lot of different types of crime that can happen from those situations. If you think about your own personal computer, or your phone, what information do you have on your phone or personal computer that you might not want other people to know about? Think about chats. Maybe you talked bad about a friend, you don't want your friend to know that you said something bad about them. But if somebody can steal your chats, they know that you said something bad about somebody else, or maybe you sent a bad picture or something like that, then they can use that information against you and say, pay me money, or I'll share this information with your friends or your family. This is a big problem in Korea right now, where people are sharing usually, you know, naked or sexy pictures or videos, and then people are recording those and using that against the person later to ask for money, otherwise they'll share those pictures with their friends and family, coworkers, whatever. It's a big problem in Korea, but it's really happening worldwide. This is not a new type of crime, but it is enabled by network connections. We can now do things much faster, much more efficiently. So this type of crime works pretty well, although the police now are starting to crack down on it a little bit more. So data information stored on a computer is very valuable. Even though we don't individually think that our data is very valuable, it is. And criminals know this, that's why they want to sniff or capture everything that a person is doing, that way they can sell that information to other providers. Steal data information transferred over a network. So any information you transfer over a network is also potentially valuable because it could be secret, it could be credit card numbers, it could be bank accounts, it could be passwords, it could be a lot of things. And all of those are valuable to someone. Now, one password might only be worth one or two cents. But if you have millions and millions of passwords, that's quite a lot of money. And take control of devices and use their resources to do whatever the attacker wants. So this is extremely common. If we can take over a computer system, we can control it to do whatever we want. That includes hacking or denial of service attacks against governments or whatever. So if we can put a virus on everyone's computer, then we can control everyone's computer to tell it to do denial of service against, you know, a government agency. And then the attacker who actually did this, it's very hard to find them because it looks like that it's all of these people's computers that are attacking. So we can use people's computers to basically do crime to try to hide where we're coming from. And that's very common. Yeah, another extremely common thing that we do with, that people do with somebody's computer whenever it's taken over is to send spam email for money. So if you've ever received an email that says you've won a million dollars or whatever, you just have to send us some money. Or yeah, I mean, you guys probably know what spam is by now. I'm sure you've received a lot. If we can take over people's computers, then we can send spam email through their computers and send a lot more spam without getting caught. And spam makes a lot of people a lot of money or spammers, quite a bit of money if they do it properly. Most cyber crime in Korea, most cyber crimes in Korea are online fraud related. So Korea has an extremely high number of white color crime, I'd say. The really violent crime in Korea is very, very low. But crime involving stealing money is very, very high, like extortion, just financial crime, hacking, things like that are relatively high, especially auction fraud. In Korea, everyone probably knows that you can instantly transfer money between Korean banks. Even if the banks are different, you can still instantly transfer money. This creates kind of a bad situation because if you're trying to buy something online, most online sellers just want you to instantly transfer money directly to their bank account and then they'll send you the package. But think about the risk in that. You could send the money and then they don't have to send the package or they can send the wrong thing. What most countries do, because this system would not work in any other country, it can only work in Korea, what most other countries do is have a third party hold the money and then whenever you receive your package from the online auction or whatever it is, you confirm that the package is okay and then this third party will release the money. Basically, there's a third party controlling the situation so you don't have to trust somebody else. Because of instant transfers in Korea, a lot of money is stolen just from people trying to buy things online. It really only happens in Korea and it's partially a cultural thing going back quite a ways. Skype and chat blackmail. I've talked about this a little bit. Somebody gets on KakaoTalk and says hey would you like to chat with me and then people do chat and whoever they're chatting with they get them to do something maybe sexy online and then the person on the other end is recording everything. Now if I record you doing something sexy then I can say pay me money otherwise I'll share this with all your friends and family and coworkers and then that can hurt your reputation. So a lot of people pay a lot of money for that. The important thing here is don't share information that you don't want your friends and family to know about. Just don't do things that you wouldn't want your family to know you're doing and that will stop the crime. So all of those involve some type of connections online either a connection where there's an online auction and then transferring money over the internet or a connection through chat and then through Skype and recording and then sending emails or messages back. So all of those involve some type of communication. Now the problem is most of those also involve connections to other countries. So for example Skype is not based in Korea so if you're using Skype Korean police officers trying to investigate Skype it's very difficult. So many cybercrimes have an international component. Real-time connections across national borders like I said Skype it's across national borders and it's a real-time connection. Suspect victim servers may be in the same country. Suspect may be in another country. The victim and the servers may be in the same country. Suspect and victim might be in the same country but a server is outside. So you might have two Koreans in Korea a suspect and a victim but then they might be using Gmail which is based in the US. Suspect and victim and servers all in different countries and this is probably one of the most common ones is you have a suspect who's trying to hack somebody based in I don't know Thailand China Vietnam wherever and then they are trying to steal money from a Korean in Korea and they're using an American server to be able to route their traffic or exchange messages or whatever. So you have at least three different countries involved and the suspect and the victim are in different locations. So it's very difficult to investigate these types of crimes. Police the reason it's difficult is because police are limited by jurisdiction. So law enforcement have a certain jurisdiction that they have authority in. Korean national police for example have authority in all of Korea. So if there's a police officer in Korea they have authority to arrest somebody or do investigations in all of Korea. Korean national police do not have any authority in South Africa for example. So a Korean police officer cannot go to South Africa and arrest someone. They just don't have the authority to do any type of investigation in South Africa unless South Africa allows them to the South African government. So they cannot carry out an official investigation. They cannot make arrests. They cannot collect evidence outside of their jurisdiction. So what happens if you have a suspect in South Africa and a victim in Korea. Then the two countries have to work together the two governments have to work together and the two governments might not want to work together or maybe the amount of money wasn't enough to justify working together so there's a lot of problems with international cooperation. Cross jurisdiction requires country to country cooperation. So again cybercrime is about connections. We often start with a victim. So somebody coming to us and saying you know somebody stole my information my identity somebody stole money. We want to examine all of the different connections that we can possibly find leading back to who the suspect is for example look at the victim's device look at where the money was transferred to if money was stolen follow money transfers phone calls SMS all of those are connections that are made just follow them back and we can try to lead back to the suspect. There are many types of individuals and organizations committing cybercrime. So many types of individuals and organizations committing cybercrime from very unorganized kind of low level criminals doing very small cybercrimes for maybe you know twenty dollars twenty thousand one something like that to very structured very elite organized crime that are making millions if not billions of dollars per year off of cybercrime. The motivations vary but usually related to finances most cybercriminals again are trying to make money. Individuals have limited resources but a large reach. So a single person can potentially compromise millions of devices online organized organized cybercrime has added organized cyber organized criminal organizations have added cybercrime as an integral part of their operations. They know that cybercrime makes a lot of money. So they're trying to add that to all of the other types of crime that they were doing. So that's it for today. Next I'm going to talk about how to or cybersecurity how to secure yourself and how cybersecurity actually works. Thank you very much.