Computer Crime The Crime of The Future: Itab Term Paper
Computer Crime The Crime of The Future: Itab Term Paper
Submitted to:
Mrs. Ch. Jyothi
Submitted by:
1. C.V. Vedavyas (10207)
2. K. Chaitanya (10208)
3. C.S.N. Rao (10209)
4. K. Deepak (10210)
5. Dibya Ranjan (10211)
6. Reena Julie (10212)
Computer crime is an issue rapidly increasing in size as computers become more widespread and
interconnected. One reason computer crime seems so important is because it can involve the
displacement of large amounts of money virtually instantaneously, simply because so many
records exist only or primarily on computers. However, this is again too narrow a view of the
effects of computer crime. As we define computer crime to be any crime in which the computer
is the primary factor, we see that not only our money, but also our children and our privacy are at
risk. Recently, a radical anti-abortionist web site was found guilty of threatening the life of
doctors who performed abortions. This constitutes a new way of using computers to commit a
crime that falls outside of many older definitions, but it is clearly an activity that is extremely
important to prevent in the future but Computer Crime Is Connected to Everything
Here are no precise, reliable statistics on the amount of computer crime and the economic loss to
victims, partly because many of these crimes are apparently not detected by victims, many of
these crimes are never reported to authorities, and partly because the losses are often difficult to
calculate. Nevertheless, there is a consensus among both law enforcement personnel and
computer scientists who specialize in security that both the number of computer crime incidents
and the sophistication of computer criminals is increasing rapidly
Cyber stalking is the use of the Internet or other electronic means to stalk or harass an
individual, a group of individuals, or an organization. It may include false accusations,
monitoring, making threats, identity theft, and damage to data or equipment, the solicitation of
minors for sex, or gathering information in order to harass. The definition of "harassment" must
meet the criterion that a reasonable person, in possession of the same information, would regard
it as sufficient to cause another reasonable person distress.
When identifying cyber stalking "in the field," and particularly when considering whether to
report it to any kind of legal authority, the following features or combination of features can be
considered to characterize a true stalking situation: malice, premeditation, repetition, distress,
obsession, vendetta, no legitimate purpose, personally directed, disregarded warnings to stop,
harassment, and threats. A number of key factors have been identified.
False accusations: Many cyber stalkers try to damage the reputation of their victim and
turn other people against them. They post false information about them on websites. They
may set up their own websites, blogs or user pages for this purpose. They post allegations
about the victim to newsgroups, chat rooms or other sites that allow public contributions,
such as Wikipedia or Amazon.com.
Attempts to gather information about the victim: Cyber stalkers may approach their
victim's friends, family and work colleagues to obtain personal information. They may
advertise for information on the Internet, or hire a private detective. They often will
monitor the victim's online activities and attempt to trace their IP address in an effort to
gather more information about their victims.
Encouraging others to harass the victim: Many cyber stalkers try to involve third
parties in the harassment. They may claim the victim has harmed the stalker or his/her
family in some way, or may post the victim's name and telephone number in order to
encourage others to join the pursuit.
False victimization: The cyber stalker will claim that the victim is harassing him/her.
Suggestions:
1) Not to sharing personal information online.
2) Not to filling out profiles on websites
3) Not to using gender specific or provocative screen names or e-mail addresses
4) Not to flirting or arguing online
Internet Defamation is a negative false statement of material fact published on the Internet.
With the Internet, defamatory statements can be published online to a worldwide audience,
making Internet Defamation potentially disastrous to your reputation and to your business. It
takes the expertise and experience of an Internet Defamation Lawyer to assist you in protecting
your good name. Internet business competition is unforgiving. Your competitors may attempt to
engage in Internet business defamation
Internet libel or online libel by posting defamatory posts to gain a competitive advantage.
Defamatory forum posts, blog posts, or online articles could ruin your business. Once the
Internet defamation is circulated on the Internet, recovering from Internet defamation may be
difficult and time consuming. Your business may not be able to recover its lost customers and
the business opportunities lost because of Internet defamation. An Internet defamation lawyer
with our firm is an expert in removing defamatory posts on the Internet and in prosecuting legal
action against those who defame your business online, even cyber-gripers
As an individual, a defamatory post may keep you from obtaining your dream job or from
growing your own business. As a professional, Internet defamation may cause you to lose your
clients and be questioned by your peers. Our Internet defamation attorneys can assist you to
protect your good name. Internet defamation laws may vary by jurisdiction. An Internet
defamation lawyer with experience in cyber libel, cyber slander, Internet defamation law, and in-
depth knowledge of the technical aspects of the Internet can effectively assist you to defend your
name from cyber defamation.
Separate your email addresses. For example if you buy and sell on Craigslist or Ebay than
make one email, address for them. Keep a separate email address just for employment
related purposes because potential employers WILL google it. This way if one of your
email addresses gets compromised, you are still safe.
NEVER give out your complete name in forums, blogs, and article postings. This allows
Google to not cache your name and store it for upcoming searches for years and years.
Also, if you have a unique first name, do not use it either but instead use an alias.
Do not give out your telephone numbers when posting articles, blogs, forum postings,
and classifieds. Instead just use your made up email address for contact purposes.
Try to keep online transactions as much on email as possible. When you share phone
numbers then people can easily compromise your identity and defame you if needed.
Intellectual property (IP) theft is defined as theft of material that is copyrighted, the theft of trade
secrets, and trademark violations. A copyright is the legal right of an author, publisher,
composer, or other person who creates a work to exclusively print, publish, distribute, or perform
the work in public. The United States leads the world in the creation and selling of IP products to
buyers nationwide and internationally. Examples of copyrighted material commonly stolen
online are computer software, recorded music, movies, and electronic games.
Theft of trade secrets means the theft of ideas, plans, methods, technologies, or any sensitive
information from all types of industries including manufacturers, financial service institutions,
and the computer industry. Trade secrets are plans for a higher speed computer, designs for a
highly fuel-efficient car, a company's manufacturing procedures, or the recipe for a popular salad
dressing, cookie mix, or barbeque sauce. These secrets are owned by the company and give it a
competitive edge. Theft of trade secrets damages the competitive edge and therefore the
economic base of a business.
A trademark is the registered name or identifying symbol of a product that can be used only by
the product's owner. A trademark violation involves counterfeiting or copying brand name
products such as well-known types of shoes, clothing, and electronics equipment and selling
them as the genuine or original product.
In the twenty-first century software, music, and trade secret pirates operate through the Internet.
Anything that can be digitized reduced to a series of zeroes and ones can be transmitted rapidly
from one computer to another. There is no reduction of quality in second, third, or fourth
generation copies. Pirated digital copies of copyrighted work transmitted over the Internet
Recommendations:
Review and amend existing intellectual property rights (IPR) related legislation to ensure
better enforcement in the country.
Provide Jordan’s National Library with adequate financial and technical resources to
ensure improved law enforcement.
Credit Card Fraud is one of the biggest threats to business establishments today. However, to
combat the fraud effectively, it is important to first understand the mechanisms of executing a
fraud. Credit card fraudsters employ a large number of techniques to commit fraud.
Credit card frauds are committed in the following ways:
1. An act of criminal deception (mislead with intent) by use of unauthorized account and/or
personal information.
2. Illegal or unauthorized use of account for personal gain.
3. Misrepresentation of account information to obtain goods and/or services.
Lost or stolen card is the most common type of fraud; others include identity theft, skimming,
counterfeit card, mail intercept fraud and others.
Amongst the high-risk countries facing Credit Card Fraud menace, Ukraine tops the list with
staggering 19% fraud rate closely followed by Indonesia at 18.3% fraud rate. Also in the list of
high risk countries are Yugoslavia (17.8%), Turkey (9%) and Malaysia (5.9%). Surprisingly
United States, with its high number Credit Card transactions, has a minimum fraud rate.
Fraudsters execute a credit card fraud in many ways.
As technology changes, so do the technology of fraudsters, and thus the way in which they go
about carrying out fraudulent activities. Frauds can be broadly classified into three categories,
i.e., traditional card related frauds, merchant related frauds and internet frauds.
Recommendations
1 .The Card Verification Method3 (CVM) consists of a 3- or 4-digit numeric code printed on the
card but it is not embossed on the card and is not available in the magnetic stripe, fraudsters who
have temporary possession of a card could, in principle, read and copy the CVM code.
2. Biometrics, which provides a means to identify an individual through the verification of
unique physical or behavioral characteristics, seems to super cede PIN as a basis for the next
generation of personal identity verification systems. There are many types of biometrics systems
under development such as finger print verification, hand based verification, retinal and iris
scanning and dynamic signature verification.
Cyber terrorism is a phrase used to describe the use of Internet based attacks in terrorist
activities, including acts of deliberate, large-scale disruption of computer networks, especially of
personal computers attached to the Internet, by the means of tools such as computer viruses.
There are an almost uncountable number of ways that the terrorist can use the computer as a tool.
Facilitating identity theft, computer viruses, hacking, and use of malware, destruction or
manipulation of data all fall under this category. These uses of the computer, when combined
with ‘computer as target’ form the ‘traditional’ picture of cyber terrorism. These will be
discussed in more detail later in the section Computers: The Weapon of the Cyber terrorist.
The new terrorism
New terrorist organizations are highly funded, technologically articulate groups capable of
inflicting devastating damage to a wide range of targets. While most published work in the
computer industry has focused on the impact of the computer as target (pure cyberterrorism) it is
our belief that the real danger posed by the synthesis of computers and terrorism is not only the
insertion of computer as target in the terrorism matrix, but in many of the other areas, too.
The most deadly and destructive consequence of this helplessness is the emergence of the
concept of “cyber terrorism”. The traditional concepts and methods of terrorism have taken new
dimensions, which are more destructive and deadly in nature. In the age of information
technology, the terrorists have acquired an expertise to produce the most deadly combination of
weapons and technology, which if not properly safeguarded in due course of time, will take its
own toll. The damage so produced would be almost irreversible and most catastrophic in nature.
Cyber terrorism is the premeditated, politically motivated attack against information, computer
systems, computer programs, and data which result in violence against noncombatant targets by
sub national groups or clandestine agents.”
Computers — the weapons of the cyber terrorism
It becomes obvious that the most likely ‘weapon’ of the cyber terrorist is the computer. Thus,
one might ask, are we arguing that one should restrict access to computers, just as access to
explosives is restricted? Not quite, but close. We believe that the stockpile of connected
computers needs to be protected. There are many laws that define how one should protect a
Money laundering refers to the process of concealing financial transactions. Various laundering
techniques can be employed by individuals, groups, officials and corporations. The goal of a
money laundering operation is usually to hide either the source or the destination of money.
Money laundering happens in almost every country in the world, and a single scheme typically
involves transferring money through several countries in order to obscure its origins. In this
article, we will learn exactly what money laundering is and why it's necessary, who launders
money and how they do it and what steps the authorities are taking to try to foil money-
laundering operations.
The most common types of criminals who need to launder money are drug traffickers,
embezzlers, corrupt politicians and public officials, mobsters, terrorists and con artists. Drug
traffickers are in serious need of good laundering systems because they deal almost exclusively
in cash, which causes all sorts of logistics problems. Not only does cash draw the attention of
law-enforcement officials, but it's also really heavy.
1. Placement - At this stage, the launderer inserts the dirty money into a legitimate financial
institution. This is often in the form of cash bank deposits. This is the riskiest stage of the
laundering process because large amounts of cash are pretty conspicuous, and banks are
required to report high-value transactions
2. Layering - Layering involves sending the money through various financial transactions
to change its form and make it difficult to follow. Layering may consist of several bank-
to-bank transfers, wire transfers between different accounts in different names in different
countries, making deposits and withdrawals to continually vary the amount of money in
the accounts, changing the money's currency, and purchasing high-value items (boats,
houses, cars, and diamonds) to change the form of the money. This is the most complex
step in any laundering scheme, and it's all about making the original dirty money as hard
to trace as possible.
Computer hacking is when someone modifies computer hardware or software in a way that alters
the creators original intent. Hacker is a person who uses a computer system without a specific,
constructive purpose or without proper authorization. He is a person who gains unauthorized
access to a computer system and makes amendments.
Hackers Technique
Foot printing
Scanning
Enumeration
Gaining Access
Escalating Privilege
Covering Tracks
Creating Backdoors
Denial of Service
Foot printing: To learn as much as you can target system, it’s remote access capabilities, it’s
port and services, and the aspects of its services.
Scanning: Bulk target assessment and identification of listing services focuses the attention on
the most promising avenues of entry.
Gaining Access: Enough data has been gathered at this point to make an informed attempt to
access the target.
Escalating Privileges: If only user level access was obtained in the last step, the attacker will
now seek to gain the complete control of the system.
Covering Tracks: Once total ownership of the target is secured, hiding this from system
administrators become paramount, lest they quickly end the romp.
Creating Backdoors: Trapdoors will be laid in various parts of the system to ensure that
privileged access is easily regained at the whim if the intruder.
Denial of Service: If an attacker is unsuccessful in gaining access, they may use readily
available exploit code to disable a target as a last resort.
SIGNIFANT HACKS
2003 Two hackers who broke into Riverside County, California court computers and
electronically dismissed a variety of pending cases plead guilty to the crime. Both William
Grace, 22, and Brandon Wilson, 28, were sentenced to nine years in jail after pleading guilty to
72 counts of illegally entering a computer system and editing data, along with seven counts of
conspiracy to commit extortion
2002 Italian police arrest 14-suspected hackers who are accused of thousands of computer
intrusions, including attacks on the U.S. Army and Navy and the National Aeronautics and
Space Administration. They were all members of two hacking groups, called Mentor and
Reservoir Dogs.
2002 Hacker Vasily Gorshkov, 27, of Chelyabinsk, Russia, is sentenced to three years in prison
for convictions on 20 counts of conspiracy, fraud and related computer crimes. Gorshkov is also
ordered to pay restitution of nearly $700,000 for losses he caused to Speakeasy Network of
Seattle and the online credit card payment company PayPal.
Identity theft is a form of fraud in which someone pretends to be someone else by assuming that
person's identity, typically in order to access resources or obtain credit and other benefits in that
person's name. The victim of identity theft can suffer adverse consequences if he or she is held
accountable for the perpetrator's actions. Organizations and individuals who are duped or
defrauded by the identity thief can also suffer adverse consequences and losses, and to that extent
are also victims.
Shoulder Surfing
Skimming
Dumpster Diving
Phishing
Shoulder Surfing: This is where the thief nuzzles up to you, sometimes holding a hidden video
camera that is usually in a cell phone and tries to tell what your account number and PIN is while
you are performing a transaction at an ATM or on a telephone. This is why it is always a good
idea to keep an eye on who is around you when you are doing credit card transactions in public.
Shoulder surfing can even take place while you are in a store using a hand held debit device so it
is always a good idea to conceal the numeric pad as you punch your numbers in.
Skimming: This type of fraud usually happens in a place where you are required to give an
employee your card (such as a restaurant.) The employee disappears with your card to process it
but also puts it through a bit of extra processing by using a device that can copy the encrypted
information on the black magnetic stripe in your card. This information is then replicated to
create a copy of your original credit card so charges can be rung up on it.
The Fraudulent E-mail: A very common way of obtaining passwords, account numbers, social
security numbers and other information is for the thief to send you an email under the guise of a
company that you trust. Very often, they pose as your credit card company, bank or another
institution that you hold an account with. They will tell you that there has been "fraud" suspected
on your account and that they need you to confirm your account number. Sometimes they will
ask you to change your password that is if they already have your account number. This is a
great way of getting your personal data. Some criminals even have advanced computer
technology that can obtain large amounts of personal data once you provide them with just one
or two important bits of information such as your social security number.
Phishing: This is where criminals posing as a credit consolidation company make you an offer
to obtain your credit report or fix your credit. In order to this they of course need your financial
information and some kind of fee. Once you pay the fee the company of course disappears.
Cyber crime is an evil having its origin in the growing dependence on computers in modern
life. Defining cyber crimes, as “acts that are punishable by the information Technology Act”
would be unsuitable as the Indian Penal Code also covers many cyber crimes, such as e-mail
spoofing, cyber defamation, etc.
Cybercrime in a narrow sense (computer crime): Any illegal behavior directed by means of
electronic operations that targets the security of computer systems and the data processed by
them.
Cybercrime in a broader sense (computer-related crime): Any illegal behavior committed by
means of, or in relation to, a computer system or network, including such crimes as illegal
possession offering or distributing information by means of a computer system or network.
Sale of illegal articles: This would include sale of narcotics, weapons and wild life etc., by
posting information on website, bulletin or simply by using email communication
The international Trade in wildlife is a serious problem now days. Globally, illegal wildlife
trade is said to be the second largest illegal trade in volume.
The international illegal wildlife trade is sometimes differentiated from the geographic scale and
commercialization. Interpol has estimated the extent of the illegal wildlife trade between $10
billion and $20 billion per year. While the trade is a global one, with routes extending to every
continent, conservationists say the problem is most acute in Southeast Asia.
Illegal Drug: The illegal drug trade is a global black market. A UN report said the global drug
trade generated an estimated US$321.6 billion in 2003. With a world GDP of US$36 trillion in
the same year, the illegal drug trade may be estimated as slightly less than 1% of total global
commerce. Consumption of illegal drugs is widespread globally.
Viruses: A computer virus is a computer program that can copy itself and infect a computer
without permission or knowledge of the user. “A program that replicates by “infecting” other
programs, so that they contain a copy of the virus”
Worms: Worms are a subset of viruses .The differ in the the method of attachment; rather than
attaching to a file like a virus a worm copies itself across the network without attachment. Infects
the environment rather than specific objects.
In the past, PCs were mainly under threat from viruses and worms. The main purpose of these
programs was to spread; however, some programs were also designed to cause damage to files
and PCs. Such malicious software, or “malware”, could be described as ‘cyber vandalism’. In the
majority of cases, the goal of viruses and worms was to spread as much as possible, with a high
infection rate leading to fame for that program. But in recent years, the situation has changed
drastically. Today, the biggest threat faced by computers is crime ware. This malicious software
is written by cybercriminals with the purpose of making money illegally. Crime ware may take
the form of viruses, worms, Trojans or other malicious programs.
Data theft is a growing problem primarily perpetrated by office workers with access to
technology such as desktop computers and hand-held devices capable of storing digital
information such as flash drives, iPods and even digital cameras. Since employees often spend a
considerable amount of time developing contacts and confidential and copyrighted information
for the company they work for they often feel they have some right to the information and are
inclined to copy and/or delete part of it when they leave the company, or misuse it while they are
still in employment.
The damage caused by data theft can be considerable with today's ability to transmit very large
files via e-mail, web pages, USB devices, DVD storage and other hand-held devices. Removable
media devices are getting smaller with increased hard drive capacity, and activities such as pod
slurping are becoming more and more common. It is now possible to store more than 160 GB of
data on a device that will fit in an employee's pocket, data that could contribute to the downfall
of a business.
The moniker is derived from the act of downloading, or "sucking", data from a network endpoint
onto a USB flash drive or similar storage device.
A USB flash drive was allegedly used to remove without authorization highly classified
documents about the design of U.S. nuclear weapons from a vault at Los Alamos.
Over the past 10 years, crime has been moving away from stealing physical goods, towards
obtaining information. First the means of robbery changed to keep up with an age where people
carry identity information in the form of credit cards and ATM cards instead of cash. However,
these are just the modern equivalents to common mugging.
Recently though, whole new information markets have opened up as playing fields for computer
criminals. Much of the internet economy revolves around advertising. In addition, much of this
advertising is targeted by using databases of personal information. This information is extremely
valuable, and could be stolen, and a black market of information created. Information such as
medical records, HIV test results, grocery purchase histories, and personal emails could all be
stolen and sold to advertisers and other information-based companies. This could lead to
anything from annoying marketing ploys to illegal discrimination in the job market.
Meanwhile, other possible malicious uses of computers have become available. One of the most
worrying is the likelihood of terrorists moving online, and engaging in what is called cyber-
terrorism. These methods of producing terror, destruction, mayhem, and fear can be much more
destructive online than conventional methods in the real world
Over the past ten years, crime (traditionally based in the world of physical goods) has been
increasingly making its way into the world of information. Crime is evolving; since the days
when goods were transported by stagecoach, robbery has changed to keep up, even to our
modern-day equivalent-credit and debit cards. Internet credit card number theft has become a
well-recognized danger. Recently though, completely new information markets have opened up
as playing fields for computer criminals. However, only a small fraction of computer break- ins
are detected, and, additionally, statistics on computer crime are mostly unavailable. Thus, the
amount of damage caused by computer crime is, although recognized to be increasing
dramatically, unknown. The most common forms of computer crime reported to InterGOV
include child pornography, fraud, and e-mail abuse. Even more disturbing are new forms of
cyber-terrorism made possible by the large amount of the physical machinery now operated by
computers. The government has been looking into ways of curbing all these types of crimes;
there are some laws on the books and more being considered. Punishment aside, preventing
computer crime is important. Safeguards against computer crime may come in the form of
limiting access to the information to be protected, using encryption to ensure privacy and
integrity, and educating the public about security issues. After all, it is impossible to eliminate all
technical loopholes.
1. http://www.crime-research.org/articles/Future-of-crime-is-computer-oriented/
2. http://www-cs-faculty.stanford.edu/~eroberts/cs201/projects/computer-crime/future.html
3. http://www.google.co.in/
4. http://en.wikipedia.org/wiki/Computer_crime
5. http://en.wikipedia.org/wiki/Credit_card_fraud
6.