Report - Cyber Crime
Report - Cyber Crime
CyberCrime
By:
Umair Shabbir (63435)
Taha Aziz
Cryptography
Sir M. Mustaqeem
PAF-KIET
ABSTRACT
In this report, we will first try to establish the agreed upon definition of
cyber-crime, and in which ways it’s different from other types of crime.
We will then discuss a brief history of cybercrime, from ‘Phreakers’
who used to hack telephone lines to the advent of the ARPANET
through the 1970’s and then with time how it evolved and though
1990’s and the initial hackings of the large known enterprises to the
present day.
1|Page
Table of Contents
I. INTRODUCTION ............................................................................................................................... 3
What is CyberCrime? .......................................................................................................................... 3
A Brief History of CyberCrime: ............................................................................................................ 3
II. LITERATURE REVIEW ....................................................................................................................... 5
Categorizing Cybercrime: .................................................................................................................... 5
Violent or Potentially Violent Cybercrime Categories: ....................................................................... 6
1. Cyberterrorism: ....................................................................................................................... 6
2. Assault by threat: .................................................................................................................... 6
3. Cyberstalking:.......................................................................................................................... 7
4. Child Pornography: ................................................................................................................. 7
Nonviolent Cybercrime Categories: .................................................................................................... 7
1. Cybertrespasing: ..................................................................................................................... 7
2. Cybertheft: .............................................................................................................................. 8
3. Cyberfraud: ............................................................................................................................. 9
4. Destructive Cybercrimes: ........................................................................................................ 9
5. Other Nonviolent Cybercrimes: .............................................................................................. 9
III. METHODOLOGY ........................................................................................................................ 10
Fighting Cybercrime: ......................................................................................................................... 10
Determining Who Will Fight Cybercrime: ..................................................................................... 11
Educating Cybercrime Fighters: .................................................................................................... 11
Getting Creative in the Fight Against Cybercrime:........................................................................ 13
IV. SUMMARY ................................................................................................................................. 14
V. REFERENCES ............................................................................................................................. 15
2|Page
I. INTRODUCTION
It is said that when there is vulnerability, someone will exploit that to its own gain.
The cybercrime ought to start with the advent of Internet, for the reason that
without Internet, it would not have existed.
What is CyberCrime?
Many people will find it difficult to define the term precisely, despite the fact that
the word “Cybercrime” has entered into our common usage. Furthermore, there is
no catchall term for the tools and software which are used in the commission of
certain online crimes.
Just like traditional crime, Cybercrime has many different planes and befalls in a
wide range of scenarios and environments. The Council of Europe’s Cybercrime
Treaty uses the term “Cybercrime” to refer to offences ranging from criminal activity
against data to content and copyright infringement. However, Zeviar-Geese propose
that the definition is larger, including activities such as unauthorized access, child
pornography, fraud and cyber-stalking. The United Nations Manual on the
Prevention and Control of Computer Related Crime includes forgery, fraud, and
unauthorized access in cybercrime definition.
3|Page
Cybercrime didn’t spring up as a full-scale problem overnight. In the initial days of
computing and networking, the average criminal didn’t possess either the necessary
hardware or the technical expertise to snatch the digital opportunity of the day. In
reality, there was no real cybercrime until the 1980s. A person hacked another
person’s computer to find, copy or manipulate personal data and information. The
first person found to be guilty of cybercrime was ‘Ian Murphy’, a.k.a. Captain Zap,
and in 1981. He hacked the American telephone company to manipulate its internal
clock, so that users could still make free calls at peak hours. Many of the early
computer hackers began their criminal careers as phone phreakers.
By 1991, e-mail users had begun to consider the chance that their Internet
communications would be intercepted. The first cyberbank, called First Virtual, came
online in 1994, opening up big new opportunities for hackers. Also that year,
scientists began study on IPv6. The main purpose of the new version was to address
the expected shortage of IP addresses using the present IPv4’s 32-bit address space,
but another concern addressed by the new protocol version was to be IP security.
In 1996, Central Intelligence Agency, U.S. Department of Justice and Air Force
computers (among others) were hacked. In the next three years, many more
government agencies and prominent companies had their systems hacked, including
the U.S. Department of Commerce, and the New York Times, UNICEF, eBay,
Microsoft, and the U.S. Senate Web sites also fell victim to hackers.
As we entered the 2000s, a huge, distributed DoS attack shut down major Web sites
such as Yahoo! and Amazon, Apache, RSA Security, and Western Union were hacked,
the Code Red worm attacked thousands of Web servers, and the Sircam virus hit e-
mail accounts all over the world.
The new millennium brought with it the increasing popularity of new and thrilling
technologies, such as wireless networking and low-cost, high-speed “always on”
connectivity options through Digital Subscriber Line (xDSL) and cable modem. These
technologies have become accessible in growing numbers of places. Unfortunately,
these technologies also offer new openings for cybercriminals.
4|Page
II. LITERATURE REVIEW
Cybercrime can be normally defined as a sub-category of computer crime. The term
refers to criminal offenses committed using the Internet or another computer
network as a component of the crime. In many cases, crimes that would be called
cyber-crimes are really just the “same old things,” except that a computer network is
someway involved. In other cases, the crime is distinctive and came into reality with
the arrival of the Internet. Unauthorized access is an example; while it might be
likened to breaking and entering a home or business building, the fundamentals that
cover unauthorized computer access and physical breaking and entering are unlike.
Agencies that deal with cybercrime must formulate their own cybercrimespecific
categories for internal record keeping in order to accurately determine the types of
cybercrimes occurring in their jurisdictions. This is where IT professionals can work
with law enforcement to help more clearly and specifically define the elements of an
offense so that it can be investigated and prosecuted properly. Agencies might need
to hire outside IT security specialists as consultants and/or officers might need to
receive specialized training to understand the technical elements involved in various
cybercrimes.
Categorizing Cybercrime:
There are several ways we can categorize the various cybercrimes. We can start by
dividing them into two very broad categories: one, those crimes committed by
violent or potentially violent criminals, and two, nonviolent crimes.
5|Page
Violent or Potentially Violent Cybercrime
Categories:
Violent or potentially violent crimes that use computer networks are of highest
priority for obvious reasons: these offenses pose a physical danger to some person
or persons. Types of violent or potentially violent cybercrime include:
Cyberterrorism
Assault by threat
Cyberstalking
Child pornography
1. Cyberterrorism:
More ambitiously, it could include sabotaging air traffic control computer systems to
cause planes to collide or crash; infiltrating water treatment plant computer systems
to cause contamination of water supplies; hacking into hospital databases and
changing or deleting information that could result in incorrect, dangerous treatment
of a patient or patients; or disrupting the electrical power grid, which could cause
loss of air conditioning in summer and heat in winter or result in the death of
persons dependent on respirators in private residences if they don’t have generator
backup.
2. Assault by threat:
6|Page
3. Cyberstalking:
4. Child Pornography:
Most cybercrimes are nonviolent offenses, due to the fact that a defining
characteristic of the online world is the ability to interact without any physical
contact. The perceived anonymity and “unreality” of virtual experiences are the
elements that make cyberspace such an attractive “place” to commit crimes.
Cybertrespass
Cybertheft
Cyberfraud
Destructive cybercrimes
Other cybercrimes
1. Cybertrespasing:
7|Page
can”—to hone hacking skills, to prove him- or herself to peers, or because it’s a
personal challenge.
2. Cybertheft:
There are many different types of cybertheft, or ways of using a computer and
network to steal information, money, or other valuables. Because profit is an almost
universal motivator and because the ability to steal from a distance reduces the
thief’s risk of detection or capture, theft is one of the most popular cybercrimes.
8|Page
g. DNS cache poisoning, a form of unauthorized interception in which intruders
manipulate the contents of a computer’s DNS cache to redirect network
transmissions to their own servers.
3. Cyberfraud:
4. Destructive Cybercrimes:
Cybervandalism can be a random act done “just for fun” by bored hackers with a
malicious streak, or it might be a form of computer sabotage for profit (erasing all
the files of a business competitor, for example). In some cases, cybervandalism
might be performed to make a personal or political statement (as in cybergraffiti).
There are many more nonviolent varieties of cybercrime. Again, many of these only
incidentally use the Internet to accomplish criminal acts that have been around
forever (including the world’s oldest profession). Some examples include:
Internet gambling.
9|Page
Cyberlaundering, or using electronic transfers of funds to launder illegally
obtained money.
III. METHODOLOGY
As cybercrime proliferates, it will obviously be impossible for law enforcement
agencies to devote the time and effort required to investigate and prosecute every
instance of Internet-related criminal activity. In dealing with law enforcement
officials on cybercrime cases, it is important for IT professionals to understand how
these factors might cause some cybercrimes to be investigated more enthusiastically
and prosecuted more vigorously than others.
Fighting Cybercrime:
To successfully fight cybercrime, as with any other type of crime, we must first
understand it. Know thine enemy is good advice, regardless of the type of war we
plan to wage. The first step in developing a plan to fight cybercrime is to define it,
both generally and specifically.
Another important element in determining our strategy against cybercrime is to
collect statistical data so that we can perform an analysis to detect patterns and
trends. Without reliable statistics, it is difficult to establish effective prevention and
enforcement policies.
Statistics are the basis for the next step: writing clear, enforceable laws when
needed to address cybercrimes that aren’t covered by existing laws. Finally, an
effective crime-fighting effort must educate all those who deal with or are touched
by cybercrime: those in the criminal system community, those in the IT community,
and those in the community at large.
10 | P a g e
Determining Who Will Fight Cybercrime:
By necessity, the fight against cybercrime must involve more than just the police.
Legislators must make appropriate laws. The IT community and the community at
large must be on the lookout for signs of cybercrime and report it to the
authorities—as well as taking measures to prevent becoming victims of these crimes
themselves. The law enforcement community must investigate, collect evidence, and
build winnable cases against cybercriminals. Jurors must weigh the evidence and
make fair and reasonable determinations of guilt or innocence. Courts must assign
fair and effective penalties. The corrections system must attempt to provide
rehabilitation for criminals who might not fit the standard “criminal profile.”
Judges, too, often have a lack of technical expertise that makes it difficult for them
to do what courts do: interpret the laws. The fact that many computer crime laws
use vague language exacerbates the problem.
The answer to all these dilemmas is the same: education and awareness programs.
These programs must be aimed at everyone involved in the fight against cybercrime,
including:
11 | P a g e
cybercrime. Even potential cybercriminals, with the right kind of education, could be
diverted from criminal behavior.
Those who make, enforce, and carry out the law already understand the basics of
legislation, investigation, and prosecution. They need training in the basics of
information technology: how computers work, how networks work, what can and
cannot be accomplished with computer technology, and most important, how
crimes can be committed using computers and networks.
Finally, we must educate the community at large, especially the subset that consists
of the end users of computer and network systems. These are the people who are
frequently direct victims of cybercrime and who all are ultimately indirect victims in
terms of the extra costs they pay when companies they patronize are victimized and
the extra taxpayer dollars they spend every year in response to computer-related
crimes.
Law enforcement and IT professionals need to work more closely with the
community (including businesses, parents, students, teachers, librarians, and others)
to build a cybercrime-fighting team that has the skills, the means, and the authority
necessary to greatly reduce the instances of crime on the Internet
12 | P a g e
Getting Creative in the Fight Against Cybercrime:
The fight against cybercrime has the best chance for success if we approach it from
many different angles. The legal process is just one way to fight crime. The best
methods are proactive rather than reactive—that is, it’s best to prevent the crime
before it happens. Failing that, this section discusses some creative ways that
businesses and individuals can shield themselves from some of the consequences of
being victims if a cybercrime does occur.
One way to reduce the incidence of Internet crime is to encourage groups to apply
peer pressure to their members. If cybercriminals are shamed rather than admired,
some will be less likely to engage in the criminal conduct. This method is especially
effective when it comes to young people. Many teenage hackers commit network
break-ins in order to impress their friends. If more technology oriented young people
were taught a code of computer ethics early — emphasizing that respect for others’
property and territory in the virtual world is just as important as it is in the physical
world—hackers might be no more admired by the majority of upstanding students
than are the “bad kids” who steal cars or break into houses.
Of course, some people will commit crimes regardless of peer pressure, but this
pressure is a valuable tool against many of those cybercriminals who are otherwise
upstanding members of the community and whose criminal behavior online
erroneously reflects the belief that “everyone does it.”
In the spirit of “fighting fire with fire,” one of our best weapons against technology
crimes is—you guessed it—technology. The computer and network security industry
is hard at work, developing hardware and software to aid in preventing and
detecting network intrusions. Operating system vendors are including more and
more security features built into operating systems.
13 | P a g e
Using Technology to Fight Cybercrime:
IV. SUMMARY
Cybercrime is now a big problem all over the world—and it’s rising fast. The law
enforcement world is scrambling to catch up; legislators are passing new laws to
address this new way of crime, and police organizations are forming special
computer crime units and training their officers to be more technically savvy.
However, the cyber-crime problem is too big and too extensive to leave to only
politicians and police to solve. They often don’t have the technical expertise to pass
effective laws, and the lack sufficient training, manpower, and time—not to mention
the perplexing issue of jurisdiction—to tackle the most egregious of Internet crimes.
Cybercrime, like crime in general, is a social issue as well as a legal one. To effectively
fight it, we must involve people in the IT community (many of whom might be
hesitant to participate) and those in the overall population who are affected, directly
or indirectly, by the criminal activity that has found a friendly haven in the virtual
world.
We can use a number of strategies and techniques, including the legal system, peer
pressure, and existing and emerging technologies, to prevent cybercrime. Failing
that, we can develop formal and informal retorts that will detect cybercrime more
instantly, reducing the harm done and giving us more statistics about the incident,
maximizing the chances of recognizing and successfully prosecuting the
cybercriminal.
We’re all in this ship together. The only way to stop cybercrime is to work together
and share our knowledge and skill in different areas to build a Class ‘A’ cybercrime-
fighting team.
14 | P a g e
V. REFERENCES
Littlejohn Shinder, Debra, and Michael Cross, “Scene of the Cybercrime:
Computer Forensics Handbook.” (2008).
McQuade III, Samuel C., ed. Encyclopedia of cybercrime. ABC-CLIO, 2008.
Malik, Masud Ahmed. "Preventing Cybercrime: A Criminological Perspective."
Alkaabi, Ali Obaid Sultan. Combating computer crime: An international
perspective. Diss. Queensland University of Technology, 2010.
Gordon, Sarah, and Richard Ford. "On the definition and classification of
cybercrime." Journal in Computer Virology 2.1 (2006): 13-20.
Gercke, Marco. "Understanding cybercrime: a guide for developing countries."
International Telecommunication Union (Draft) 89 (2011): 93.
15 | P a g e