2. CYBERCRIME

Embed Size (px)

Citation preview

  • 7/29/2019 2. CYBERCRIME

    1/10

    INTRODUCTION TO CYBERCRIME:

    Cybercrime is one of the fastest growing criminal activities in the UK and

    with over 3 million Britons falling victim to hackers every year, its about time we

    were more clued up about online threats.

    The first recorded cyber crime took place in the year 1820! That is not

    surprising considering the fact that the abacus, which is thought to be the earliest form

    of a computer, has been around since 3500 B.C. in India, Japan and China. The era of

    modern computers, however, began with the analytical engine of Charles Babbage.

    In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom.

    This device allowed the repetition of a series of steps in the weaving of special

    fabrics. This resulted in a fear amongst Jacquard's employees that their traditional

    employment and livelihood were being threatened. They committed acts of sabotage

    to discourage Jacquard from further use of the new technology. This is the first

    recorded cyber crime!

    DEFINITION OF CYBERCRIME:

    Cybercrimes are defined as: "Offences that are committed against individuals

    or groups of individuals with a criminal motive to intentionally harm the reputation of

    the victim or cause physical or mental harm to the victim directly or indirectly, using

    modern telecommunication networks such as Internet (Chat rooms, emails, notice

    boards and groups) and mobile phones (SMS/MMS)".[

    A simple yet sturdy definition of cyber crime would be unlawful acts wherein

    the computer is either a tool or a target or both. Defining cyber crimes, as acts that

    are punishable by the information Technology Act would be unsuitable as the Indian

    Penal Code also covers many cyber crimes, such as e-mail spoofing, cyber

    defamation, etc.

  • 7/29/2019 2. CYBERCRIME

    2/10

    A BRIEF HISTORY OF CYBERCRIME:

    Cybercrime has been around since the late seventies and over the years has

    evolved into a more malevolent and invasive crime, threatening both our society and

    personal lives.

    The very first spam email was send back in 1978 by a Digital Equipment

    Corp. marketing executive called Gary Thurerk in the US, who used it to sell a new

    computer. Spam has since then, grown from a simple and rather annoying marketing

    tool, into a malicious host of scams and a carrier of software that can control the

    recipients computer.

    One of the first reports of a computer virus was made in 1982, when a high

    school student in the US wrote the Elk Cloner for Apple II computers. This was

    hidden in a floppy disk and infected machines when it was used to boot-up. It

    consisted of a terrible poem, which popped up every 50 boot-up attempts.

    CYBERCRIME ON THE RISE:

    As the years have passed and the likes of ARPAnet and Britains NPL have

    merged to become the Internet, cybercrime has evolved and hackers have discovered

    ever more imaginative ways to attack.

    Leading companies such as Hotmail, WordPress, The Guardian and The New

    York Times have all been affected by cybercrime recently and there was even digital

    sabotage during the 2009 US political campaigns.

    Barack Obamas travel details and personal info were raided and Sarah Palins

    personal emails were made readily available on Wikileaks during the Presidential

    election. The perpetrator allegedly spent 45 minutes researching Palins background

    and was then able to guess her password, splashing screenshots and her entire contact

    list all over the net.

  • 7/29/2019 2. CYBERCRIME

    3/10

    The Pentagon reported that in 2008 there were some 360 million attempts to

    break into its networks, on top of multiple attempts on the White House, figures

    which spurred Obama to appoint a Cyber Crime Official at the White House.

    WHAT ARE THE DIFFERENT TYPES OF CYBERCRIME?

    There are many ways in which a hacker can steal your money and infect your

    computer; in order to stay away from these scams, you need to understand them and

    what they do.

    Adware- Adware, or advertising-supported software, is software which instantly runs

    or downloads an advertisement on to your computer.

    Computer Virus- A computer virus is not very dissimilar to a real virus in that it

    attempts to infect any cells, or bits of data in this case, which surround it. It often

    leeches onto email attachments, audio or video files and spreads through emails and

    instant messaging. It can also spread through portable hard drives, especially USB

    sticks.

    Identity theft- Hackers are becoming increasingly more sophisticated and are able to

    steal your identity simply from looking at your Facebook profile. All a fraudster

    would need is your date of birth, address and your full name in order for them to steal

    your identity. They can also access information as you enter into unsecure sites and

    use that to gain credit in your name.

    Phishing scams- These are emails sent to your email address posing either as a well

    known company or bank. They usually look legitimate and contain messages stating

    that the bank needs to verify your details, or suggest that you have won some money.

    Then you are often directed to a web page where it asks you to enter your bank

    details; your money is subsequently stolen or your data is sold to other cyber

    criminals.

  • 7/29/2019 2. CYBERCRIME

    4/10

    Malware- This is harmful software designed to change, delete or pass on data from a

    hacked computer. It comprises of viruses, worms, Trojan horses, spyware and adware.

    Spam- This is a message sent to people as part of a mass advertising campaign, often

    for dubious products, which can cost the recipient if opened on a mobile device. The

    most popular ways of distributing this mail menace is via email and on blogs and

    forums. It is often used as part of a phishing scam.

    Spyware- Spyware was created to intercept or hand-pick details from a foreign

    computer. Data which is often targeted includes bank or social security numbers, as

    well as general passwords for correspondence. The software can also partially take

    over a computers functions, feeding of its energy and IP address.

    Trojans- Much like the fateful horse that brought down Troy, Trojan Horses are

    disguised as software or a legitimate file. When downloaded, however, it unleashes a

    stream of infected content on to your PC.

    Worms- Probably the most self-replicating type of malware, the Worm can prove

    quite hard to eradicate as they do not really need to feed of files or software to

    duplicate. Instead it feeds of networks and file transmission capabilities.

    ADVANTAGES OF CYBERCRIMES:

    With more cybercrime going on there becomes more of a need for people to

    protect themselves. This makes businesses that deal with computer software to protect

    unwanted ads or sites to show up higher in demand. The company Frontier

    Communications is growing because of the use of cybercrimes. Its program Frontier

    Secure is used to fight off against harmful content like viruses or computer hackers

    (Defend Against Cybercrime! Frontier Communications Frontier SecureTM

    Computer Security Protects Children and Data.). These guys are the winners out of

    cybercrime. They are taking a system being hacked and they create a stronger anti-

    virus protection. As long as viruses and hackers are continuing to grow and evolve,

    protection to fight against it will grow as well.

  • 7/29/2019 2. CYBERCRIME

    5/10

    The FBI is also changing and advancing by ways of keeping up with the new

    forms of crime too. They dont see cybercrime going away any time soon, so they

    think that people in the criminal justice business have a lot of work ahead of them.

    This will keep jobs in need for people interested in cracking down on criminals.

    Fields in technology and computer forensics are growing immensely (Cyber Crime

    Careers.). Being able to detect when criminals are breaking into systems they dont

    belong in is a key system to limit and eventually stop cybercrime. In a bizarre way the

    criminals can come out as winners too. If you think about it, if they steal and dont get

    caught then they are just running away with all their stolen money. Of course its

    never a good thing to steal, but in a situation like cybercrime there arent many

    winners.

    DISADVANTAGES OF CYBERCRIMES:

    In reality, everyone involved with the issue suffers from cyber crimes. The

    ones who are being attacked and threatened to lose either privacy or money are losing

    their security. The ones who are doing the crimes may be feeling high and mighty

    now, but theyre going to get caught eventually. Just ask any of these three men whoare wanted by the FBI thanks to cyber crimes theyve committed.

    Harrison Amadin Ekpetin, Jie Dong, and Tobechi Enyinna Onwuhara are all

    wanted for cyber crimes (Cyber Crimes.).

    Ekpetin is wanted for a Credit Fraud organization in New Mexico originating

    from 2009-2011. He is suspected of making fraudulent banking transactions to

    businesses overseas. Over $4 million was lost from those companies. He was charged

    on April 27th 2011 with bank fraud, wire fraud, and conspiracy.

  • 7/29/2019 2. CYBERCRIME

    6/10

    Dong took a different approach in stealing other peoples money. He set up an

    online auctioning site and kept the money of those bidding on the product without

    ever sending off the good that the people were bidding on. He left over 5,000 people

    wondering where their items were. Dong earned over $800,000 in doing this, but he

    also earned himself a federal arrest warrant charging him with mail fraud and wire

    fraud back in 2004.

    Onwuhara is still on the run today. Hes involved with setting up an

    organization that consists of stealing identities of victims using online databases.

    Once they do this they obtain their personal information and steal their Home Equity

    Line of Credit accounts. The financial industry has lost tens of millions of dollars

    thanks to this man and his followers. Some members of the group have been arrested,

    but the man in charge is still out there today, soon to be caught and charged with bank

    fraud.

    WHO IS VULNERABLE?

    Cybercrime does not just affect big companies and famous names; it affects

    everyone who can access a computer. Hackers can reach you in so many differentways, for example, via spam on your email, through bogus applications on Facebook,

    by posting corrupt links on blog posts and if you enter unsecured websites.

    If you use internet cafes a great deal or you have a computer at work, you

    must be very careful with personal information such as bank details. There have been

    4.3 million cases of identity fraud in the UK to date and with 22 per cent of you

    accessing bank accounts on public computers. Many more can and will fall victim to

    this crime.

    HOW DO I PREVENT IT?

    There is only so much that the companies themselves can do to protect your

    personal information so you must be cautious yourselves and protect your privacy.

    Following the simple rules below will help fend off those cyber crooks:

  • 7/29/2019 2. CYBERCRIME

    7/10

    First and foremost, get some antivirus software! It cannot be stressed enough

    how important it is to protect your computer with software to stop intrusions.

    A pack costing about 39.99 can ultimately save you hundreds down the line,

    either in repair bills or when your bank details are stolen. Norton and McAfee

    have some great offers so check out their websites.

    Regularly update the software you may already have as a new programme

    fights better against the newer viruses.

    Take care not to open emails from unknown senders and do not open dubious

    looking attachments- these could be phishing scams which lead to viruses and

    malware.

    Never enter bank details onto an unsecure site and always check directly with

    your bank if you get any emails from them asking you to verify details online.

    It is a good idea to regularly change passwords on email or social networking

    accounts just in case someone has hacked into them.

    Do not display too much personal information on social networking sites as

    identity thieves can use this to get credit in your name and even get a passport

    issued.

    If you have children who like to use your family computer be sure to find

    antivirus software that has parental controls to make sure they do not enter

    malicious sites.

  • 7/29/2019 2. CYBERCRIME

    8/10

    INTRODUCTION TO CYBER LAW:

    Cyberlaw is a new phenomenon having emerged much after the onset of

    Internet. Internet grew in a completely unplanned and unregulated manner. Even the

    inventors of Internet could not have really anticipated the scope and far reaching

    consequences of cyberspace. The growth rate of cyberspace has been enormous.

    Internet is growing rapidly and with the population of Internet doubling roughly every

    100 days, Cyberspace is becoming the new preferred environment of the world.

    With the spontaneous and almost phenomenal growth of cyberspace, new and

    ticklish issues relating to various legal aspects of cyberspace began cropping up. In

    response to the absolutely complex and newly emerging legal issues relating to

    cyberspace, CYBERLAW or the law of Internet came into being. The growth of

    Cyberspace has resulted in the development of a new and highly specialised branch of

    law called CYBERLAWS- LAWS OF THE INTERNET AND THE WORLD WIDE

    WEB.

    There is no one exhaustive definition of the term "Cyberlaw". However,

    simply put, Cyberlaw is a term which refers to all the legal and regulatory aspects of

    Internet and the World Wide Web. Anything concerned with or related to, or

    emanating from, any legal aspects or issues concerning any activity of netizens and

    others, in Cyberspace comes within the ambit of Cyberlaw .

    DEFINITION OF CYBER LAW:

    Cyber law (also referred to as Cyberlaw) describes the legal issues related to

    use of inter-networked information technology. It is less a distinct field of law in the

    way that property or contract are, as it is a domain covering many areas of law and

    regulation. Some leading topics include intellectual property, privacy, freedom of

    expression, and jurisdiction.

    Simplified definition of cyber law is that it is the law governing cyber space.

  • 7/29/2019 2. CYBERCRIME

    9/10

    IMPORTANCE OF CYBER LAW:

    Cyberlaw is important because it touches almost all aspects of transactions and

    activities on and concerning the Internet, the World Wide Web and Cyberspace.

    Initially it may seem that Cyberlaws is a very technical field and that it does not have

    any bearing to most activities in Cyberspace. But the actual truth is that nothing could

    be further than the truth. Whether we realize it or not, every action and every reaction

    in Cyberspace has some legal and Cyber legal perspectives.

    ADVANTAGES OF CYBER LAW:

    The IT Act 2000 attempts to change outdated laws and provides ways to deal with

    cyber crimes. We need such laws so that people can perform purchase transactions

    over the Net through credit cards without fear of misuse. The Act offers the much-

    needed legal framework so that information is not denied legal effect, validity or

    enforceability, solely on the ground that it is in the form of electronic records.

    In view of the growth in transactions and communications carried out through

    electronic records, the Act seeks to empower government departments to accept

    filing, creating and retention of official documents in the digital format. The Act has

    also proposed a legal framework for the authentication and origin of electronic

    records / communications through digital signature.

    From the perspective of e-commerce in India, the IT Act 2000 and its

    provisions contain many positive aspects. Firstly, the implications of these

    provisions for the e-businesses would be that email would now be a valid and

    legal form of communication in our country that can be duly produced and

    approved in a court of law.

    Companies shall now be able to carry out electronic commerce using the legal

    infrastructure provided by the Act.

    Digital signatures have been given legal validity and sanction in the Act.

    The Act throws open the doors for the entry of corporate companies in the

    business of being Certifying Authorities for issuing Digital Signatures

    Certificates.

  • 7/29/2019 2. CYBERCRIME

    10/10

    The Act now allows Government to issue notification on the web thus

    heralding e-governance.

    The Act enables the companies to file any form, application or any other

    document with any office, authority, body or agency owned or controlled by

    the appropriate Government in electronic form by means of such electronic

    form as may be prescribed by the appropriate Government.

    DISADVANTAGES OF CYBER LAW:

    Implementation is not the only problem. Domain name issues are presently

    covered by legal norms applicable to intellectual properties, including

    trademarks.

    Abuse of chat rooms, cyber stalking, misappropriation and misuse of credit

    card numbers are just a few of the many other loopholes which are still not

    addressed by IT Act.

    Many corporates resist filing cases because there is no clear understanding of

    the legal implications.

    PURPOSE AND OBJECT OF CYBERLAW:

    To introduce the cyber world and cyber law in general

    To explain about the various facets of cyber crimes

    To enhance the understanding of problems arising out of online transactions

    and provoke them to find solutions

    To clarify the Intellectual Property issues in the cyber space and the growth

    and development of the law in this regard

    To educate about the regulation of cyber space at national and international

    level