cyber crimes
TRANSCRIPT
![Page 1: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/1.jpg)
Cyber Crimes
Dr.V.MariappanDept of Banking Technology
Pondicherry University
April 7, 2023 Cyber crimes 1
![Page 2: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/2.jpg)
Agenda for the session
Cyber crime definition
Cyber Crime Vs. Normal Crimes
Victims of Cyber Crimes
Classification of Cyber Crimes
April 7, 2023 Cyber crimes 2
![Page 3: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/3.jpg)
Cyber Crimes Definition of Cyber Crime, computer crimes, cyber frauds, computer frauds etc.
Legal definition: I.T. Act – No Accepted definitions and usages
Illegal behavior that targets the security of computer
systems and/or the data accessed and processed by computer networks
An act where computer is an object or a subject of crime Any crime where an I.T. gadget is used in the act
Cyber Crimes are technological variants of normal crimes.The Act of committing, investigation, trial, evidence .. ALL
VARYTheft, forgery, fraud, blackmail, harassment, law of torts….
April 7, 2023 Cyber crimes 3
![Page 4: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/4.jpg)
Cyber Crimes - definitionAll crimes performed or resorted to by abuse of
electronic media or otherwise, with the purpose of influencing the functioning of computer or computer system.
COMPUTER CRIME is any crime where – Computer is a target or a tool of crime or just incidental to crime.
A harmful acts committed from or against a computer or network. (McConnell International Report, 2000)
April 7, 2023 Cyber crimes 4
![Page 5: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/5.jpg)
Cyber Crimes and Normal Crimes Scene of crime issues Investigation mechanism and process Process of trial E-evidence: Volatility, production of an e-evidence Acceptability, irretrievability, technological issues Jurisprudence and related issues Irrefutability and reliability of records and process “Justice should not only be done but should also
appear to have been done”
April 7, 2023 Cyber crimes 5
![Page 6: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/6.jpg)
Victims of cyber crimes• Against persons:
• defamation, cyber stalking, phishing, id theft, email spoofing, online gambling, card frauds, virus, DoS, etc
• Against property: • larceny, data, information, software piracy, trade
marks, copyrights, IPR etc
• Against government: cyber terrorism
• Combination of one or more of the threeApril 7, 2023 Cyber crimes 6
![Page 7: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/7.jpg)
Classification of Cyber Crimes
Computer as a target of crime
Computer as a tool in the commission of crime
Computer as incidental to crime
April 7, 2023 Cyber crimes 7
![Page 8: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/8.jpg)
1.Computer as Target of CrimeSabotage of computer and computer systems
or computer networksTheft of data / informationTheft of intellectual property such as
computer softwareTheft of marketable informationBlackmails based on information gained from
computerized files such as medical information, personal history, sexual preferences, financial data etc.
April 7, 2023 Cyber crimes 8
![Page 9: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/9.jpg)
2.Computer as a Tool in commission of crimeFraudulent use of ATM cards and accounts
Credit card frauds
Frauds involving NEFT
Frauds involving stock transfers
Frauds relating to e-commerce
Telecommunication frauds
April 7, 2023 Cyber crimes 9
![Page 10: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/10.jpg)
3. Computers as incidental to crime
Internet crimes
Web Based crimes
April 7, 2023 Cyber crimes 10
![Page 11: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/11.jpg)
A. Internet CrimesHacking
Theft of information
Theft of passwords
Theft of credit card numbers
Launch of malicious programmes
Espionage
Spamming
April 7, 2023 Cyber crimes 11
![Page 12: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/12.jpg)
B. Web Based CrimesWeb based crimesCrimes through e-mailsUsenet related crimesInternet relay chat crimesOffences related to computerOffences against confidentiality, integrity and
availability of data and systemsOffences related to contentsOffences related to crime on web
April 7, 2023 Cyber crimes 12
![Page 13: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/13.jpg)
B.1 Web site Related CrimesCheating and Frauds
Insurance frauds
Gambling
Distribution of pornography
Sale of pirated software April 7, 2023 Cyber crimes 13
![Page 14: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/14.jpg)
B.2 Crimes Through e-mailsThreats
Extortion
E-mail bombing
Defamation
Launching of malicious programmes
April 7, 2023 Cyber crimes 14
![Page 15: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/15.jpg)
B.3 Usenet Related CrimesDistribution / sale of pornography material
Distribution / sale of pirated software
Discussion on methods of jacking
Sale of stolen credit card numbers
Sale of stolen data April 7, 2023 Cyber crimes 15
![Page 16: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/16.jpg)
B.4 Internet Relay Chat CrimeCyber stalking
Fraudsters use chat room for developing relations
with unsuspecting victims
Criminals use it for meeting conspirators
Hackers use it for discussing their expertise of
showing the techniques
Pedophiles use chat room to allure small children
April 7, 2023 Cyber crimes 16
![Page 17: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/17.jpg)
B.5 Offences against confidentiality etc.,
Illegal access
Illegal interception
Data interference
System interference
Illegal devicesApril 7, 2023 Cyber crimes 17
![Page 18: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/18.jpg)
B.6 Offence related to computers
Computer related forgery
Computer related fraud
Computer sabotage
Cyber stalking
April 7, 2023 Cyber crimes 18
![Page 19: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/19.jpg)
B.7 Offences related to contents
Offences related to Child pornography
Offences related to infringements of
copyright and related rights
April 7, 2023 Cyber crimes 19
![Page 20: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/20.jpg)
B.8 Offences related to crime on WebComputer network break-insIndustrial espionageSoftware piracyCyber pornographyMail bombsPassword sniffersSpoofingCredit card fraudsCyersquatting
April 7, 2023 Cyber crimes 20
![Page 21: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/21.jpg)
Alternative Classification of Crime
Data crimes Software crimesOnline crimesIPR crimes Physical crimes
April 7, 2023 Cyber crimes 21
![Page 22: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/22.jpg)
1.Data related computer crimes
• Unauthorized access • Data diddling (False data entry)• Data manipulation• Data spying• Scavenging• Data Leakage• Piggy backing and tailgating• Masquerading
April 7, 2023 Cyber crimes 22
![Page 23: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/23.jpg)
Unauthorized Access
Any person who secures access or attempts to secure access to a computer system or networks that is protected from unauthorized entry.
April 7, 2023 Cyber crimes 23
![Page 24: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/24.jpg)
Data DiddlingOne of the most common forms of computer crime is
data diddling - illegal or unauthorized data alteration. These changes can occur before and during data input or before output.
Data diddling cases have affected banks, payrolls, inventory records, credit records, school transcripts and virtually all other forms of data processing known. Case: The New Delhi Municipal Corp Electricity Billing Fraud
Case that took place in 1996 is a typical example. Collection of money, computerized accounting, record maintenance and remittance in the bank were exclusively left to a private contractor who was a computer professional. He misappropriated huge amount of funds by manipulating data files to show less receipt and bank remittance.
April 7, 2023 Cyber crimes 24
![Page 25: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/25.jpg)
Data Manipulation
A misuse of statistics occurs when a statistical argument asserts a falsehood.
In some cases, the misuse may be accidental.
In others, it is purposeful and for the gain of the perpetrator and it attracts civil/ criminal liability.
April 7, 2023 Cyber crimes 25
![Page 26: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/26.jpg)
Espionage / Data spying Espionage, commonly known as spying, is the practice of secretly
gathering information about a foreign government or a competing industry, with the purpose of placing one's own government or corporation at some strategic or financial advantage.
Access to the network is done from a remotely located computer; like a home PC using the legitimate password or breaking the password.
The data collected is either used or sold for money. It involve the analysis of diplomatic reports, publications, statistics,
and broadcasts, as well as spying, a clandestine activity carried out by an individual or individuals working under secret identity to gather classified information on behalf of another entity or nation.
In the United States, the organization that heads most activities dedicated to espionage is the CIA.
April 7, 2023 Cyber crimes 26
![Page 27: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/27.jpg)
ScavengingScavenging is the obtaining of information
left around a computer system, in the computer room rubbish bins, etc. Bin diving (called 'Dumpster Diving' in the US) also involves obtaining sensitive information from an organisation's rubbish receptacles and bins.
This also refers to scavenging from areas of hard disks that are not in use by files but are currently 'file slack' or 'unallocated clusters'
April 7, 2023 Cyber crimes 27
![Page 28: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/28.jpg)
Data LeakageData leakage is the removing of information
by smuggling it out as part of a printed document, encoding the information to look like something different, and removing it from the facility.
Many instances of employees of software companies involved in leaking of corporate information of customers.
April 7, 2023 Cyber crimes 28
![Page 29: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/29.jpg)
Piggy backing and tailgatingPhysical access is one method used in
piggybacking/ impersonation.
Examples include following someone in through a door with a badge reader, electronically using another's user identification and password to gain computer access, and tapping into the terminal link of a user to cause the computer to believe that both terminals are the same person.
April 7, 2023 Cyber crimes 29
![Page 30: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/30.jpg)
Masquerading IP masquerading is a form of network address translation
(NAT) which allows internal computers with no known address outside their network, to communicate to the outside. It allows one machine to act on behalf of other machines.
It's similar to someone buying stocks through a broker. The person buying stocks, tells the broker to buy the stocks, the broker gets the stocks and passes them to the person who made the purchase. The broker acts on behalf of the stock purchaser as though he was the one buying the stock.
April 7, 2023 Cyber crimes 30
![Page 31: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/31.jpg)
2.Software related crimes• Virus related crimes:
• Malware, Spyware • Virus, Worm attacks
• Trojan Horses• Salami Techniques• Trapdoors• Logic Bombs and Time Bombs• Software Piracy• Program and source code manipulation• Hacking, phishing, vishing attacks
April 7, 2023 Cyber crimes 31
![Page 32: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/32.jpg)
Software related crimes cont.., SteganographyCyber StalkingPornographyPedophiliasDoS and DDoSSpoofing: email, IP etcBotnetsCard Skimming
April 7, 2023 Cyber crimes 32
![Page 33: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/33.jpg)
Software related issues cont…,
Spam mailsMarketing mailsCyber squattingCommunication interceptionInappropriate, inefficient codingSoftware errors Inefficient testing methodologies
April 7, 2023 Cyber crimes 33
![Page 34: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/34.jpg)
Virus related crimes: Malware, is a malicious software designed to infiltrate a
computer system without the owner's informed consent. Software is considered to be malware based on the perceived intent of the creator rather than any particular features. Malware includes computer viruses, worms, trojan horses , spyware, crimeware etc.
Spyware is a type of malware that can be installed on computers and collects bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Spyware is secretly installed on the user's personal computer.
Sometimes, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.
April 7, 2023 Cyber crimes 34
![Page 35: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/35.jpg)
Virus / Worm Attacks Computer viruses are small software programs that are designed
to spread from one computer to another and to interfere with computer operation. A virus might corrupt or delete data on the victims computer, even erase everything on the victims hard disk. (Brain)
Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computers memory. Case – 1: The VBS_LOVELETTER virus (better known as the Love Bug or the
ILOVEYOU virus) was reportedly written by a Filipino undergraduate. In May 2000, this deadly virus became the world’s most prevalent virus. Losses incurred during this virus attack were pegged at US $ 10 billion.
VBS_LOVELETTER utilized the addresses in Microsoft Outlook and e-mailed itself to those addresses. The e-mail, which was sent out, had ILOVEYOU in its subject line. The attachment file was named LOVE-LETTER-FOR-YOU.TXT.vbs.
April 7, 2023 Cyber crimes 35
![Page 36: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/36.jpg)
Virus / Worms …, Case: 2 In 2002, the creator of the Melissa computer virus was
convicted. The virus had spread in 1999 and caused more than $80 million in damage by disrupting personal computers, business and government computer networks.
Case -3: The most famous worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988, then, still internet was developing years and this worm, which affected thousands of computers, almost brought its development to a complete halt. It took a team of experts almost three days to get rid of the worm and in the meantime many of the computers had to be disconnected from the network.
April 7, 2023 Cyber crimes 36
![Page 37: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/37.jpg)
Trojan HorsesA Trojan, as this program is aptly called, is an
unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing. Case- 1: A young lady reporter was working on an article about
online relationships. The article focused on how people can easily find friendship and even love on the Internet. During the course of her research she made a lot of online friends. One of these friends managed to infect her computer with a Trojan.
She stayed in a small one bedroom apartment and her computer was located in one corner of her bedroom. Unknown to her, the Trojan would activate her web camera and microphone even when the Internet was switched off. A year later she realized that hundreds of her pictures were posted on pornographic sites around the world!
April 7, 2023 Cyber crimes 37
![Page 38: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/38.jpg)
Salami TechniquesThese attacks are used for committing financial crimes. The key
here is to make the alteration so insignificant that in a single case it would go completely unnoticed.
For instance, a bank employee inserts a program, into the bank’s servers, that deducts a small amount of money (say Rs. 2 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizeable amount of money every month. Case-1: In January 1997, Willis Robinson of Maryland USA, was
sentenced to 10 years in prison for having reprogrammed his Taco Bell drive-up-window cash register - causing it to ring up each $2.99 item internally as a 1-cent item, so that he could pocket $2.98 each time.
Case -2: Four executives of a rental-car franchise in Florida USA defrauded at least 47,000 customers using a salami technique. They modified a computer billing program to add five extra gallons to the actual gas tank capacity of their vehicles.
April 7, 2023 Cyber crimes 38
![Page 39: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/39.jpg)
Key loggers Key loggers are regularly used were to log all
the strokes a victim makes on the keyboard generally installed on a computer used for online banking and other financial transactions. Key-loggers are most commonly found in public computers such as those in cyber cafes, hotels etc.
April 7, 2023 Cyber crimes 39
![Page 40: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/40.jpg)
Internet Time Theft
The usage by an unauthorized person of the Internet hours paid for by another person.
Case- 1: In May 2000, the Delhi police arrested an engineer who had misused the login name and password of a customer whose Internet connection he had set up.
The case was filed under the Indian Penal Code and the Indian Telegraph Act.
April 7, 2023 Cyber crimes 40
![Page 41: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/41.jpg)
Web Jacking Just as conventional hijacking of an airplane is done by
using force, similarly web jacking means forcefully taking over control of a website. The motive is usually the same as hijacking - ransom. The perpetrators have either a monetary or political purpose which they try to satiate by holding the owners of the website to ransom. Case-1: In an incident reported in the USA, the owner of a hobby
website for children received an e-mail informing her that a group of hackers had gained control over her website. They demanded a ransom of 1 million dollars and she ignored as fake. Three days later that she came to know that the hackers had web jacked her website. Subsequently, they had altered a portion of the website which was entitled -How to have fun with goldfish. They had replaced the word –goldfish- with the word “piranhas” a tiny but extremely dangerous flesh-eating fish. Many children had visited the popular website and had believed the contents and tried to play with piranhas, and were very seriously injured.
April 7, 2023 Cyber crimes 41
![Page 42: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/42.jpg)
Trapdoors Trapdoor is a programme by which the security
protocols are bypassed to directly enter into a specific portion of the programme through a short-cut.
Used during the time of testing the programme to reach to the specific portion quickly using short-cut. In case, if the trapdoor are not deleted before the launch of the program by oversight, the person who have this knowledge misuses it through authorized entry.
April 7, 2023 Cyber crimes 42
![Page 43: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/43.jpg)
Super Zapping A logic through which an intruder is able to
penetrate into the system areas and can even change the programmes.
The intruder can create an extra-system administrator level password for himself without the knowledge of the actual system administrator.
Can introduce any crime related logic programmes like Trapdoor, Salami logic and Virus etc.
April 7, 2023 Cyber crimes 43
![Page 44: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/44.jpg)
Logic bombs and time bombs This is a event related programme where an
virus is activated when an appointed time / even occurs.
It explodes and become active only when a particular event happens till then they lie dormant.
Ex: Chernobyl virus. ( a Microsoft Windows computer virus written by Chen Ing Hau of Taiwan)
April 7, 2023 Cyber crimes 44
![Page 45: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/45.jpg)
Program and source code manipulation
Changing / altering the programme or source code of the system with the help of malware, spyware with an intent to gain access and misuse.
To render useless of the system for the user.
April 7, 2023 Cyber crimes 45
![Page 46: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/46.jpg)
Electronic eavesdroppingEavesdropping is the act of secretly listening to
the private conversation of others without their consent and later misuses those information for some benefit.
Eavesdropping can also be done over telephone lines (wiretapping), email, instant messaging and other methods of communication considered private
VoIP communications software is also vulnerable to electronic eavesdropping by via malware infections such as Trojan.
April 7, 2023 Cyber crimes 46
![Page 47: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/47.jpg)
Hacking, Phishing & Vishing Hacking is unauthorized access to computers
/ networks with an intent to gain access to the computer / network and misuse for monetary or other gains.
Oldest and most dangerous cybercrimes.
No geographical boundaries and great challenge to the criminal justice system
April 7, 2023 Cyber crimes 47
![Page 48: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/48.jpg)
SteganographySteganography is the art and science of writing hidden
messages in such a way that no one, apart from the sender and intended recipient, suspects the existence of the message, a form of security through obscurity.
Steganography includes the concealment of information within computer files. In digital steganography, electronic communications may include steganographic coding inside of a transport layer, such as a document file, image file, program or protocol. Media files are ideal for steganographic transmission because of their large size.
While cryptography protects the contents of a message, steganography can be said to protect both messages and communicating parties.
April 7, 2023 Cyber crimes 48
![Page 49: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/49.jpg)
Cyber / Child PornographyCyber pornography covers pornographic websites,
pornographic magazines produced using computers and Internet (to download and transmit pornographic pictures, photos, writings etc).
Images of children performing a variety of sexual acts on internet.
Pornography per se is not illegal in many countries, child pornography is strictly illegal in most countries.
Millions of pornographic websites flourish today. Case: The CEO of online auction website bazee.com (a part of the ebay
group) was arrested by the Delhi police for violating India’s strict laws on cyber pornography. An engineering student was using the bazee website to sell a video depicting two school students having sexual intercourse. Bazee.com was held liable for distributing porn and hence the CEO was arrested.
April 7, 2023 Cyber crimes 49
![Page 50: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/50.jpg)
Cyber Stalking Cyber stalking refers to the use of the Internet, e-
mail, or other electronic communications devices to harass or threatening individual / family repeatedly such as following, appearing at a person's home or business –place, making harassing phone calls, or vandalizing a person's property.
Case: A student of University of San Diego in USA terrorized five female students over the Internet for more than a year through hundreds of violent and threatening e-mails, sometimes receiving four or five messages a day. The student, who pleaded guilty, told the police that he had committed the crimes because he thought the women were laughing at him and causing others to ridicule him. In reality, the victims had never met him.
April 7, 2023 Cyber crimes 50
![Page 51: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/51.jpg)
DoS and DDoSDenial of Service attacks (DOS attacks) involve flooding a
computer with more requests than it can handle. This causes the computer (e.g. a web server) to crash and results in authorized users being unable to access the service offered by the computer.
Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the
perpetrators are many and are geographically widespread. A series of distributed denial of service attacks in February 2000
crippled many popular websites including yahoo.com, amazon.com and cnn.com
A series of more than 125 separate but coordinated denial of service attacks hit the cyber infrastructure of Estonia in early 2007. The attacks were apparently connected with protests against the Estonian government's decision to remove a Soviet-era war memorial from the capital city. It is suspected that the attacks were carried out by Russian hackers.
April 7, 2023 Cyber crimes 51
![Page 52: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/52.jpg)
Email bombing Email bombing refers to sending a large
number of emails to the victim resulting in the victim’s email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing. Email bombing is a type of denial-of-service attack. Case: In one case, a foreigner who had been residing in Simla, India
for almost 30 years wanted to avail of a scheme introduced by the Simla Housing Board to buy land at lower rates. When he made an application it was rejected on the grounds that the scheme was available only for citizens of India. He decided to take his revenge. Consequently, he sent thousands of mails to the Simla Housing Board and repeatedly kept sending e-mails till their servers crashed.
April 7, 2023 Cyber crimes 52
![Page 53: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/53.jpg)
Spoofing – email / IPA spoofed email is one that appears to
originate from one source but actually has been sent from another source e.g Pooja has an e-mail address [email protected]. Her
ex-boyfriend, sham spoofs her e-mail and sends obscene messages to all her acquaintances to damage her image.
Case: In an American case, a teenager made millions of dollars by spreading false information about certain companies whose shares he had short sold, by sending spoofed emails, purportedly from news agencies like Reuters, to share brokers and investors who were informed that the companies were doing very badly, thousands of investors lost a lot of money.
April 7, 2023 Cyber crimes 53
![Page 54: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/54.jpg)
Email Frauds Most of these scam emails promise the receiver millions (or
sometimes billions) of dollars. Most commonly the email says that some rich African bureaucrat or businessman or politician has died and left behind a lot of money.
These scams mails are commonly referred to as Nigerian 419 scams. These scam emails are believed to originate from Nigeria and section 419 of the Nigerian Penal Code relates to cheating (like the famous section 420 of the Indian Penal Code).
In 2007, Asian School of Cyber Laws conducted a 3 month intensive investigation of hundreds of scam emails. The results were very surprising to say the least. Less than 10% of these emails had actually originated from Nigeria! A majority of these emails (more than 60%) have originated from Israel, followed by the Netherlands, UK and other European countries.
April 7, 2023 Cyber crimes 54
![Page 55: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/55.jpg)
Email FraudsAsking for bank details for deposit of money Lottery scams – stating Microsoft / Yahoo etc
Employee of the Euro LotteryBritish National Lottery
Promise to transfer property to people who pray (wealth and prayer) Case -1: In 2005, an Indian businessman received an email from the
Vice President of a major African bank offering him a lucrative contract in return for a kickback of Rs 1 million. The businessman had many telephonic conversations with the sender of the email. He also verified the email address of the Vice President from the website of the bank and subsequently transferred the money to the bank account mentioned in the email. It later turned out that the email was a spoofed one and was actually sent by an Indian based in Nigeria.
A new type of scam e-mail threatens to kill recipients if they do not pay thousands of dollars to the sender, who purports to be a hired assassin.
April 7, 2023 Cyber crimes 55
![Page 56: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/56.jpg)
BotnetsA group of computers infected with malicious kind of
robot software, then the computer becomes a zombie or drone , unable to resist the command of the bot commander.
Bot is a programme that operates an automatic task on the internet and executes repeatedly the task during the operation.
The owner of the computer do not know that his computer is infected with robot software and remotely controlled by another person.
April 7, 2023 Cyber crimes 56
![Page 57: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/57.jpg)
Card Skimming Illegal copying of information from the
magnetic trip of the credit card / debit card either to produce a fake card for misuse or steel the information to access your account.
More direct version of phishing.
April 7, 2023 Cyber crimes 57
![Page 58: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/58.jpg)
3. On line scamsBanking online account scams Chain letter and pyramid scamsHealth and medical scamsIdentity theft scams Investment scamsJob/ employment scamsLottery / competition scamMoney transfer scamSmall business scams
April 7, 2023 Cyber crimes 58
![Page 59: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/59.jpg)
Banking & online account fraudsPhishing
Phishing emails are fake emails usually pretending to be from banks or other financial institutions. They make up some reason for you to give your account details and then use these details to steal your money.
Phoney Fraud Alerts: Scammers pretend to be from your bank or
financial institution and tell you that there is a problem with your account. They ask for your account details to protect your money, but then use these details to steal your money
April 7, 2023 Cyber crimes 59
![Page 60: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/60.jpg)
Banking & online account frauds cont..,Credit Card Scams
There are many types of scams that aim to steal your credit card details, either by taking the card itself or by tricking you into giving them the card’s details.
Credit card FraudsSteeling the card details from the online
databases and fraudulently take away the money from the bank accounts.
April 7, 2023 Cyber crimes 60
![Page 61: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/61.jpg)
Spam mails Most spam is commercial advertising, often for
dubious products, get-rich-quick schemes, or quasi-legal services.
There are two main types of spam, and they have different effects on Internet users. Cancellable Usenet spam is a single message sent to 20 or more Usenet newsgroups.
Email spam lists are often created by scanning Usenet postings, stealing Internet mailing lists, or searching the Web for addresses.
April 7, 2023 Cyber crimes 61
![Page 62: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/62.jpg)
4. IPR CrimesCyber squatting
Patent and copyright infringements
Software piracy
Industrial piracy
Corporate piracyApril 7, 2023 Cyber crimes 62
![Page 63: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/63.jpg)
Cyberquatting Cybersquatting (also known as domain squatting), is
registering, trafficking in, or using a domain name with bad faith intent to profit from the goodwill of a trademark belonging to someone else.
The cyber squatter then offers to sell the domain to the person or company who owns a trademark contained within the name at an inflated price.
Some cybersquatters put up derogatory remarks about the person or company the domain is meant to represent in an effort to encourage the subject to buy the domain from them
April 7, 2023 Cyber crimes 63
![Page 64: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/64.jpg)
Patent and copyright infringement
One producer copies material or process from another for profit.
April 7, 2023 Cyber crimes 64
![Page 65: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/65.jpg)
Software piracy Duplicating the original software without
notifying to the other and sell it for profit by an individual.
It is illegal as it violates the copyright law.
It amounts to civil liability .
April 7, 2023 Cyber crimes 65
![Page 66: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/66.jpg)
Industrial PiracyA group of individuals attempt duplication and
distribution of copyright software’s for larger profits.
It is on the increase as the cost of the duplicator machines fallen in the recent years.
It is illegal as it violates the copyright law and amounts to civil liability.
Industrial piracy are more in developing nations.
April 7, 2023 Cyber crimes 66
![Page 67: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/67.jpg)
Corporate PiracyInstalling one copy of the software
application on a LAN server, hundreds of employees gain unlicensed access to the software.
It is a common phenomenon in most of the organization.
It is illegal as it violates the copyright law and amounts to civil liability.
April 7, 2023 Cyber crimes 67
![Page 68: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/68.jpg)
Other Crimes Cyber defamation
Cyberventing
Cyber Terrorism
April 7, 2023 Cyber crimes 68
![Page 69: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/69.jpg)
Cyber defamationAn act, deed, word, gesture etc. in the
cyberspace designed to harm a persons, institutions, organizations, country’s reputation on the internet or even off-line.
This type of violation is similar to cyberventing.
April 7, 2023 Cyber crimes 69
![Page 70: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/70.jpg)
CyberventingSetting up a website to anonymously air
grouses in the cyberspace.
Indulged by former employees, ex-boy/girl friends, anti-government groups etc.
April 7, 2023 Cyber crimes 70
![Page 71: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/71.jpg)
Cyber TerrorismUse of cyber tools to shut down critical
national infrastructure such as energy, communication, transportation in order to coerce governments into submission.
Internet bomb threats, internet harassment and tech driven crimes such as focused virus strikes are the next wave of crime that the world has to encounter in the coming days.
April 7, 2023 Cyber crimes 71
![Page 72: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/72.jpg)
Physical crimes
• Computer Larceny
• Sabotage
• Theft of storage devices: CDs, Pen-drives, hard-
disks
April 7, 2023 Cyber crimes 72
![Page 73: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/73.jpg)
Computer Larceny
Theft and burglary of computer systems / computer parts or components / computer peripherals
April 7, 2023 Cyber crimes 73
![Page 74: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/74.jpg)
Computer sabotageUse of the internet to hinder the normal
functioning of a computer system through the introduction of worms, viruses or logic bombs.
Some times used to gain economic advantage over a competitor, promote illegal activities of terrorists, or to steel data or programmes for extortion purposes.
April 7, 2023 Cyber crimes 74
![Page 75: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/75.jpg)
Crimes where computer is used
• Most of the crimes nowadays will fall under this classification – Computer is used as a device for information exchange in most of the serious and major crimes
• Murders and kidnaps with computer data• Data theft, Id theft, 419 Nigerian frauds• Password theft, Phishing based crimes• Crimes where mobile is used to communicate• Offences where other electronic gadgets used
April 7, 2023 Cyber crimes 75
![Page 76: Cyber Crimes](https://reader033.vdocument.in/reader033/viewer/2022061105/543ef384b1af9f780b8b4bf6/html5/thumbnails/76.jpg)
Thank you
April 7, 2023 Cyber crimes 76