Romeo D. Bartolome IV: Cybercriminals
Romeo D. Bartolome IV: Cybercriminals
Romeo D. Bartolome IV: Cybercriminals
Bartolome IV
BE4AA
Cybercriminals
Are motivated by the potential for monetary gain and hack info corporate
computers to steal, often by transferring money from one account to another to
another, leaving a hopelessly complicated trail for law enforcement officers to
follow. Cybercriminals also engage in all forms of computer fraud, stealing and
reselling credit card numbers, personal identities, and cell phone IDs. Because the
potential for monetary gain is high, they can afford so spend large sums of money
to buy the technical expertise and access at they need from unethical insiders.
Hacktivists
A combination of the words hacking and activism, is hacking to achieve a political or
social goals.
Cyberterrorists
Launches computer based attack against other computer or networks in an attempt
to intimidate or coerce a government in order to advance certain political or social
objective. Cyberterrorist are more extreme in their goals than hacktivits although
there is no clear demarcation line. Because of the internet cyberattacks can easily
originate from foreign countries, making detection and retaliation much more
difficult.
What is a Profession
A profession is a disciplined group of individuals who adhere to ethical standards
and who hold themselves out as, and are accepted by the public as possessing
special knowledge and skills in a widely recognized body of learning derived from
research, education and training at a high level, and who are prepared to apply this
knowledge and exercise these skills in the interest of others. It is inherent in the
definition of a profession that a code of ethics governs the activities of each
profession. Such codes require behavior and practice beyond the personal moral
obligations of an individual. They define and demand high standards of behavior in
respect to the services provided to the public and in dealing with professional
colleagues.
Due to the Obligation to Profession
Purpose of Sanctions
Sanctioning individuals for unethical conduct has four major goals:
1. To penalize the person in violation
When an individual violates the Code of Ethics there must be consequences
associated with that misconduct. Depending on how egregious the misconduct is,
the Board of Ethics has a range of sanctions that it can impose, from less to more
punitive depending on the violation and the totality of the facts.
2. To serve as a mechanism to educate and rehabilitate
It is important to provide feedback to individuals who violate the Code of Ethics so
that they understand and appreciate exactly how their past conduct was
inappropriate, so that it will be less likely to occur again in the future. These
measures serve a rehabilitation function.
3. To protect the public
The welfare of the consumer and the reputation and integrity of the professions
must be protected.
4. To inform other ASHA members and certificate holders that the Association
enforces its ethical standards and alerts them that there are penalties for engaging
in professional miscounduct
The Association requires the Board of Ethics to publish the majority of its sanctions
in The ASHA Leader to serve as a means of informing the membership of their
ongoing ethical responsibilities and to alert them that there are penalties for
engaging in professional misconduct.
2
Types of Sanctions the Board of Ethics Can Impose
The Board of Ethics has a range of sanctions it can impose when individuals are
found in violation of one or more provisions of the Code of Ethics; generally, the
more egregious the misconduct, the harsher the sanction.
Revocation - For cases of egregious misconduct, the Board of Ethics can revoke the
individual's ASHA membership and certification for a period of years, up to life. The
sanction of Revocation requires a two-thirds vote of the members of the Board of
Ethics present and voting. Notice of this sanction to the ASHA membership and
other entities is the same as with the sanction of Censure.
After the period of revocation has expired, in order for the individual to seek
reinstatement of ASHA membership and/or certification a petition must be made to
the Board of Ethics and the board must approve reinstatement by a two-thirds vote.
In petitioning for reinstatement [PDF], the individual has the burden of
demonstrating that conditions that led to the revocation have been rectified and
that, upon reinstatement, the individual will abide by the Code of Ethics. The
individual must also satisfy all certification standards and procedures of the Council
for Clinical Certification and/or membership requirements that are in effect at the
time of the Board of Ethics Reinstatement Order.
Suspension - The Board of Ethics can impose the sanction of Suspension of ASHA
membership and certification in lieu of Revocation. The sanction is usually intended
to be employed for short periods of time (e.g., 6 months). A major difference
between Revocation and Suspension is that during the period of suspension, the
sanctioned member must pay all dues and fees as well as fulfill certification
maintenance requirements. At the end of the period of suspension, the sanctioned
member must directly contact ASHA Certification to find out how to become current
again; approval of the Board of Ethics is not required.
3
Withholding - The Board of Ethics can impose the sanction of Withholding of
ASHA membership and certification in cases where an applicant for membership
and/or certification is found in violation of misconduct, or a Clinical Fellow who is a
member in the application process but is not yet certified. The Board of Ethics
cannot revoke what the applicant does not yet have, but the board can impose the
sanction of Withholding of membership and/or certification for a period of years up
to life.
After the period of withholding has expired, in order for the individual to seek
reinstatement of ASHA membership and/or certification a petition must be made to
the Board of Ethics and the board must approve reinstatement by a two.
In addition to the sanctions identified above, the Board of Ethics can also order an
individual to cease and desist from any practice or conduct found to be in violation
of the Code of Ethics. The order
The Electronic Fund Transfer Act was passed by the U.S. Congress in 1978
and Rights of consumers
The EFT Act recognizes their right to nominate the financial institution to which such
payments are to be made.
The EFT Act also prohibits a creditor or lender from requiring a consumer to repay a
loan or other credit by electronic fund transfer, except when there is an overdraft on
checking plans.
Financial institution liability
The financial institution must give the customer notice of their liability in case the
card is lost or stolen. This must thirds vote in.
If a customer reports to the financial institution that their card is missing before any
transactions takes place, they are not held responsible for any transaction that
takes place after the report of a missing/stolen card.
A customer can be liable for unauthorized withdrawals if their card is lost or stolen
and they do not follow certain criteria:
4
Loss could be up to $500 if institution is notified between 3 and 59
days
EFT Errors
EFT is not a perfect system; therefore customers should still be diligent in reviewing
their EFT statements for possible errors as they would with any other type of
transaction. Should a customer notice that there has been an error in an electronic
fund transfer relating to their account certain steps must be taken.
Under the Acts, the customer must:
The EFT Act does not apply to all preauthorized plans. The EFT Act does not
apply to automatic transfers from any account held in the name of the institution
the consumer uses to the account the consumer uses.
An example of this would be where the EFT Act would not apply to any
automatic payments put towards a mortgage held by the financial institution
where a consumer would hold their electronic funds account.
The EFT Act would also not apply to automatic transfers among a consumers
account at a specific financial institution.
The EFT Act also does not cover all transfers. Some banks, other financial
institutions, and vendors will produce cards with a cash value imprinted into
the card itself
Examples of these include public transit passes, store gift cards, and prepaid
telephone cards. These cards may not be covered by the EFT Act.
When using electronic funds transfer, the Act does not give the consumer the
right to stop payment.
5
Privacy Protection Act of 1980
When CPSR was established, it was concerned solely about the use of computers in
warfare. It was focused on the Strategic Computing Initiative, a US Defense project
to use artificial intelligence in military systems, but added opposition to
the Strategic Defense Initiative (SDI) shortly after the program was announced. The
Boston chapter helped organize a debate related to the software reliability of SDI
systems which drew national attention ("Software Seen as Obstacle in Developing
'Star Wars', Philip M. Boffey, (The New York Times, September 16, 1986) to these
issues. Later, workplace issues, privacy, and community networks were added to
CPSR's agenda.
CPSR began as a chapter-based organization and had chapters in Palo Alto, Boston,
Seattle, Austin, Washington DC, Portland (Oregon) and other US locations as well as
a variety of international chapters including Peru and Spain. The chapters often
developed innovative projects including a slide show about the dangers of launch on
warning (Boston chapter) and the Seattle Community Network (Seattle chapter).
CPSR sponsored two conferences: the Participatory Design Conferences which was
held biennially and the Directions and Implications of Advanced Computing (DIAC)
symposium series which was launched in 1987 in Seattle. The DIAC symposia have
been convened roughly every other year since that time in conjunction with the
Community Information Research Network (CIRN) annual conference. Four books
(Directions and Implications of Advanced Computing; Reinventing Technology,
Rediscovering Community; Community Practice in the Network Society; Shaping the
Network Society; "Liberating Voices: A Pattern Language for Communication
Revolution") and two special sections in the Communications of the ACM ("Social
Responsibility" and "Social Computing") resulted from the DIAC symposia.
CPSR awarded the Norbert Wiener Award for Social and Professional Responsibility.
Some notable recipients include David Parnas, Joseph Weizenbaum, Kristen
Nygaard, Barbara Simons, Antonia Stone, Peter G. Neumann, Marc Rotenberg, Mitch
Kapor, and Douglas Engelbart. The final award in 2013 went posthumously to the
organizations first executive director, Gary Chapman.The organization was
dissolved in May 2013.
Code of Conduct
This Code sets out the professional standards required by the Society as a condition
of membership. It applies to members of all grades, including students, and
affiliates, and also non-members who offer their expertise as part of the Societys
Professional Advice Register. Within this document, the term relevant authority is
used to identify the person or organization which has authority over your activity as
an individual. If you are a practicing professional, this is normally an employer or
client. If you are a student, this is normally an academic institution. The Code
governs your personal conduct as an individual member of the BCS and not the
6
nature of business or ethics of the relevant authority. It will, therefore, be a matter
of your exercising your personal judgment in meeting the Codes requirements. Any
breach of the Code of Conduct brought to the attention of the Society will be
considered under the Societys disciplinary procedures. You should also ensure that
you notify the Society of any significant violation of this Code by another BCS
member. Code of Conduct British Computer Society.
Relevant Authority
You shall avoid any situation that may give rise to a conflict of interest between you
and your relevant authority. You shall make full and immediate disclosure to them if
any conflict is likely to occur or be seen by a third party as likely to occur. You shall
not disclose or authorize to be disclosed, or use for personal gain or to benefit a
third party, confidential information except with the permission of your relevant
authority.
7
Under the RFPA, the FBI could obtain records with a national security letter (NSL)
only if the FBI could first demonstrate the person was a foreign power or an agent of
a foreign power. Compliance by the recipient of the NSL was voluntary, and states'
consumer privacy laws often allowed financial institutions to decline the requests.
[2]
In 1986, Congress amended RFPA to allow the government to compel disclosure
of the requested information. The USA PATRIOT Act of 2001 amended the RFPA.
Four Imperatives
General Moral Imperatives
8
More Specific Professional Responsibilites
Strive to achieve the highest quality, effectiveness and dignity in both the
process and products of professional work.
Acquire and maintain professional competence.
Know and respect existing laws pertaining to professional work.
Accept and provide appropriate professional review.
Give comprehensive and thorough evaluations of computer systems and their
impacts, including analysis of possible risks.
Honor contracts, agreements, and assigned responsibilities.
Improve public understanding of computing and its consequences.
Access computing and communication resources only when authorized to do
so.
of the personal information contained in the files of the credit reporting agencies. It
requires that any person or entity requesting your report must demonstrate a
permissible purpose for the information before it is released. It also designates
the Federal Trade Commission (FTC) as the enforcement authority for the provisions
of the act.
9
is a federal freedom of information law that allows for the full or partial disclosure of
previously unreleased information and documents controlled by the United States
government. The Act defines agency records subject to disclosure, outlines
mandatory disclosure procedures and grants nine exemptions to the statute. [1]
[2]
This amendment was signed into law by President Lyndon B. Johnson.
Background
With the ongoing stress on both constitutional and inherent rights of American
citizens and the added assertion of government subservience to the individual,
some, particularly representative John Moss, thought it was necessary for
government information to be available to the public. This push built on existing
principles and protocols of government administration already in place.
Scope
The act explicitly applies only to executive branch government agencies. These
agencies are under several mandates to comply with public solicitation of
information. Along with making public and accessible all bureaucratic and technical
procedures for applying for documents from that agency, agencies are also subject
to penalties for hindering the process of a petition for information.
History
The law came about because of the determination of Congressman John E. Moss of
California. Moss was the chairman of the Government Information Subcommittee. It
took Moss 12 years to get the Freedom of Information Act through Congress
successfully. Much of the desire for government transparency stemmed from the
Department of Defense and Congressional committees evaluation of the nation's
classification system in the late 1950s. They determined that the misuse of
government classification of documents was causing insiders to leak documents
10
that were marked "confidential." The committee also determined that the lowest
rung of the confidentiality ladder "confidential" should be removed. They deemed
that "secret" and "top secret" covered National security adequately. The Moss
Committee took it upon itself to reform confidentiality policy and implement
punishments for the overuse of classification by officials and departments.
The purpose of this code of conduct is to define behaviors and actions which CIPS
members must commit to maintain as long as they are members of CIPS.
Members of CIPS worldwide are required to uphold this code and to seek
commitment to it by all the parties they engage within their professional practice.
Members conduct will be judged against the code and any breach may lead to
action under the disciplinary rules set out in the Institutes Royal Charter. Members
are expected to assist any investigation by CIPS in the event of a complaint being
made against them. Find out more about the complaints and disciplinary procedure.
Code of Conduct
11
Maintain the highest standard of integrity in all business
relationship by:
12
Recommendation
13
14