Cybercrime
Cybercrime
Crim CDI 9 | 2
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
o Classified information is sensitive information to which access is Sailors analyze, detect and defensively respond to unauthorized activity within U.S.
restricted by law or regulation to particular classes of people. A Navy information systems and computer networks
formal security clearance is required to handle classified The U.S. Department of Defense (DoD) notes that the cyberspace has emerged
documents or access classified data. The operation of assigning as a national-level concern through several recent events of geo-strategic significance.
the level of sensitivity to data is called data classification. Among those are included, the attack on Estonia's infrastructure in 2007, allegedly by
A variety of internet scams, many based on phishing and social Russian hackers. "In August 2008, Russia again allegedly conducted cyberattacks, this time
engineering, target consumers and businesses. in a coordinated and synchronized kinetic and non-kinetic campaign against the country
of Georgia. The December 2015 Ukraine power grid cyberattack has also been attributed
Cyberterrorism to Russia and is considered the first successful cyberattack on a power grid. Fearing that
Government officials and information technology security specialists have such attacks may become the norm in future warfare among nation-states, the concept of
documented a significant increase in Internet problems and server scans since early 2001. cyberspace operations impacts and will be adapted by war fighting military commanders
But there is a growing concern among government agencies such as the Federal Bureau of in the future.
Investigations (FBI) and the Central Intelligence Agency (CIA) that such intrusions are
part of an organized effort by cyberterrorists, foreign intelligence services, or other groups Computer as a target
to map potential holes in critical systems. A cyberterrorist is someone who intimidates or These crimes are committed by a selected group of criminals. Unlike crimes using
coerces a government or an organization to advance security his or her political or social the computer as a tool, these crimes require the technical knowledge of the perpetrators.
objectives by launching a computer. based attack against computers, networks, or the As such, as technology evolves, so too does the nature of the crime. These crimes are
information stored on them. relatively new, having been in existence for only as long as computers have which explains
Cyberterrorism in general can be defined as an act of terrorism committed through how unprepared society and the world in general is towards combating these crimes. There
the use of cyberspace or computer resources (Parker 1983). As such, a simple propaganda are numerous crimes of this nature committed daily on the internet:
piece in the Internet that there will be bomb attacks during the holidays can be considered Crimes that primarily target computer networks or devices include:
cyberterrorism. There are also hacking activities directed towards individuals, families, 1. Computer viruses
organized by groups within networks, tending to cause fear among people, demonstrate 2. Denial-of-service attacks
power, collecting information relevant for ruining peoples' lives, robberies, blackmailing 3. Malware (malicious code)
etc. Computer as a tool
Internet fraud, Spamming, Phishing, and Carding (fraud)
Cyber-extortion When the individual is the main target of cybercrime, the computer can be
Cyber-extortion occurs when a website, e-mail server, or computer system is considered as the tool rather than the target. These crimes generally involve less technical
subjected to or threatened with repeated denial of service or other attacks by malicious expertise. Human weaknesses are generally exploited. The damage dealt is largely
hackers. These hackers demand money in return for promising to stop the attacks and to psychological and intangible, making legal action against the variants more difficult. These
offer "protection". According to the Federal Bureau of Investigation. cyber-crime are the crimes which have existed for centuries in the offline world. Scams, theft, and the
extortionists are increasingly attacking corporate websites and networks, crippling their likes have existed even before the development in high-tech equipment. The same criminal
ability to operate and demanding payments to restore their service. More than 20 cases are has simply been given a tool which increases his potential pool of victims and makes him
reported each month to the FBI and many go unreported in order to keep the victim's all the harder to trace and apprehend.
name out of the public domain. Perpetrators typically use a distributed denial-of-service
attack. What does Spamming mean?
An example of cyberextortion was the attack on Sony Pictures of 2014. Spamming is the use of electronic messaging systems like e-mails and other digital
delivery systems and broadcast media to send unwanted bulk messages indiscriminately.
Cyberwarfare The term spamming is also applied to other media like in internet forums, instant
Crim CDI 9 | 3
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
messaging, and mobile text messaging, social networking spam, junk fax transmissions, through newsgroups, and by sending hate e-mail to interested parties. Harassment on the
television advertising and sharing network spam. internet also includes revenge porn.
Crimes that use computer networks or devices to advance other ends include: There are instances, where committing a crime using a computer can lead to an
✓ Fraud and identity theft (although this increasingly uses malware, hacking or enhanced sentence. For example, in the case of United States v. Neil Scott, Kramer was
phishing, making served an enhanced sentence according to the U.S. Sentencing Guidelines §2G1.3(b) (3)
it an example of both «computer as target» and «computer as tool» crime) for his use of a cell phone to "persuade, induce, entice, coerce, or facilitate the travel of,
✓ Information warfare the minor to engage in prohibited sexual conduct." Kramer argued that this claim was
insufficient because his charge included persuading
✓ Phishing scams through a computer device and his cellular phone technically is not a computer. Although
✓ Spam Kramer tried to argue this point, U.S. Sentencing Guidelines Manual states that the term
✓ Propagation of illegal obscene or offensive content, including harassment and computer "means an electronic, magnetic, optical, electrochemically, or other high speed
threats data processing device performing logical, arithmetic, or storage functions, and includes
Phishing is mostly propagated via email. Phishing emails may contain links to any data storage facility or communications facility directly related to or operating in
other websites that are affected by malware. Or, they may contain links to fake online conjunction with such device.
banking or other websites used to steal private account information. Connecticut was the U.S. state to pass a statute making it a criminal offense to
Phishing is the fraudulent attempt to obtain sensitive information such as harass someone by computer. Michigan, Arizona, Virginia and South Carolina have also
usernames, passwords and credit card details by disguising oneself as a trustworthy entity passed laws banning harassment by electronic means.
in an electronic communication. Typically carried out by email spoofing or instant Harassment as defined in the U.S. computer statutes is typically distinct from
messaging, it often directs users to enter personal information at a fake website which cyberbullying, in that the former usually relates to a person's "use a computer or computer
matches the look and feel of the legitimate site. network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language,
Phishing is an example of social engineering techniques being used to deceive or make any suggestion or proposal of an obscene nature, or threaten any illegal or
users. Users are often lured by communications purporting to be from trusted parties such immoral act," while the latter need not involve anything of a sexual nature.
as social web sites, auction sites, banks, online payment processors or IT administrators. Although freedom of speech is protected by law in most democratic societies (in
the US this is done by the First Amendment it does not include all types of speech. In fact,
Obscene or offensive content spoken or written "true threat" speech/text is criminalized because of "intent to harm or
The content of websites and other electronic communications. may be distasteful, intimidate", that also applies for online or any type of network related threats in written
obscene or offensive for a variety of reasons. In some instance these communications may text or speech. The US Supreme Court definition of "true threat" is "statements where the
be legal. speaker means to communicate a serious expression of an intent to commit an act of
The extent to which these communications are unlawful varies greatly between unlawful violence to a particular individual or group".
countries, and even within nations. It is a sensitive area in which the courts can become
involved in arbitrating between groups with strong beliefs. Drug trafficking
One area of Internet pornography that has been the target of the strongest efforts Darknet markets are used to buy and sell recreational drugs online. Some drug
at curtailment is child pornography, which is illegal in most jurisdictions in the world. traffickers use encrypted messaging tools to communicate with drug mules. The dark web
site Silk Road was a major online marketplace for drugs before it was shut down by law
Online harassment enforcement (then reopened under new management, and then shut down by law
Various aspects needed to be considered when understanding harassment online. enforcement again). After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged.
Whereas content may be offensive in a non-specific way, harassment directs However, it was just an older marketplace named Diabolus Market, that used the name
obscenities and derogatory comments at specific individuals focusing for example on for more exposure from the brand's previous success.
gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms,
Crim CDI 9 | 4
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
CATEGORIES OF CYBER CRIME services and internet access to all kinds of criminal and objectionable
We can categorize cybercrime in two ways. activities, with an individual activity earning up to $150 million in one year.
1. The computer as a target using a computer to attacks other computer, e.g. It specialized in and in some cases monopolized personal identity theft for
Hacking, virus/worms attacks, Dos attack etc. resale. It is the originator of MPack and an alleged operator of the now
2. The computer as a weapon using a computer to commit real world crime e.g. defunct Storm botnet.
cyber terrorism, credit card fraud and pornography etc. • On 2 March 2010, Spanish investigators arrested some personalities in
Documented cases infection of over 13 million computers around the world. The "botnet" of
One of the highest profiled banking computer-crime occurred during a course of infected computers included PCS inside more than half of the Fortune
three years beginning in 1970. The chief teller at the Park Avenue branch of New York's 1000 companies and more than 40 major banks, according to investigators.
Union Dime Savings Bank embezzled over $1.5 million from hundreds of accounts. A • In August 2010 the international investigation Operation Delego,
hacking group called MOD (Masters of Deception), allegedly stole passwords and operating under the aegis of the Department of Homeland Security, shut
technical data from Pacific Bell, Nynex, and other telephone companies as well as several down the international pedophile ring Dreamboard. The website had
big credit agencies and two major universities. The damage caused was extensive, one approximately 600 members, and may have distributed up to 123 terabytes
company, Southwestern Bell suffered losses of $370,000 alone. of child pornography (roughly equivalent to 16,000 DVDs). To date this
In 1983, a nineteen-year-old UCLA student used his PC to break into a Defense is the single largest U.S. prosecution of an international child pornography
Department International Communications system. ring; 52 arrests were made worldwide. In January 2012 Zappos.com
• Between 1995 and 1998 the Newscorp satellite pay to view encrypted experienced a security breach after as many as 24 million customers) credit
SKY-TV service was hacked several times. during an ongoing card numbers, personal information, billing and shipping addresses had
technological arms race between a pan-European hacking group and been compromised. In June 2012 LinkedIn and eHarmony were attacked,
Newscorp. The original motivation of the hackers was to watch Star Trek compromising 65 million password hashes. 30,000 passwords were
re-runs in Germany; which was something which Newscorp did not have cracked and 1.5 million EHarmony passwords were posted online.
the copyright to allow. December 2012 Wells Fargo website experienced a denial-of-service
• On 26 March 1999, the Melissa worm infected a document on a victim's attack. Potentially compromising 70 million customers and 8.5 million
computer, then automatically sent that document and a copy of the virus active viewers. Other banks thought to be compromised: Bank of America,
spread via e-mail to other people. J. P. Morgan U.S. Bank, and PNC Financial Services.
• In February 2000, an individual going by the alias of Mafiaboy began a • April 23, 2013 saw the Associated Press' Twitter accounts hacked the
series denial-of-service attacks against high-profile websites, including hacker posted a hoax tweet about fictitious attacks in the White House that
Yahoo, Dell Inc., E*TRADE, eBay, and CNN. About fifty computers at they claimed left President Obama injured,1311 This hoax tweet resulted
Stanford University, and also computers at the University of California at in a brief plunge of 130 points from the Dow Jones Industrial Average,
Santa Barbara, were amongst the zombie computers sending pings in removal of $136 billion from S&P 500 index, and the temporary
DDoS attacks. On 3 August 2000, Canadian federal prosecutors charged suspension of AP's Twitter account. The Dow Jones later restored its
Mafiaboy with 54 counts of illegal access to computers, plus a total of ten session gains.
counts of mischief to data for his attacks
• The Russian Business Network (RBN) was registered as an internet site in Diffusion of cybercrime
2006. Initially, much of its activity was legitimate. But apparently the The broad diffusion of cybercriminal activities is an issue in computer crimes
founders soon discovered that it was more profitable to host illegitimate detection and prosecution. According to Jean Loup Richet (Research Fellow at ESSEC
activities and started hiring its services to criminals. The RBN has been ISIS), technical expertise and accessibility no longer acts as barriers to entry into
described by VeriSign as «the baddest of the bad»>. It offers web hosting cybercrime. Indeed, hacking is much less complex than it was a few years ago, as hacking
Crim CDI 9 | 5
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
communities have greatly diffused their knowledge through the Internet. Blogs and with this company. Upon completion of the interview, the suspects were arrested outside
communities have hugely contributed to information sharing: beginners could benefit of the building. Clever tricks like this are sometimes a necessary part of catching
from older hackers' knowledge and advice. Furthermore, hacking is cheaper than ever: cybercriminals when weak makes it impossible otherwise President Barack Obama
before the cloud computing era, in order to spam or scam one needed a dedicated server, released in an executive order in April 2015 to combat cybercrime. The executive order
skills in server management, network configuration, and maintenance, knowledge of allows the United States to freeze assets of convicted cybercriminals and block their
Internet service provider standards, etc. By comparison, a mail software-as-a service is a economic activity within the United States. This is some of the first solid legislation that
scalable, inexpensive, bulk, and transactional e-mail sending service for marketing combats cybercrime in this way.
purposes and could be easily set up for spam. Jean-Loup Richet explains that cloud The European Union adopted directive 2013/40/EU. All offenses of the directive,
computing could be helpful for a cybercriminal as a way to leverage his attack - brute and other definitions and procedural institutions are also in the Council of Europe's
forcing a password, improve the reach of a botnet, or facilitating a spamming campaign. Convention on Cybercrime.
Investigation Penalties
A computer can be a source of evidence (see digital forensics). Even when a Penalties for computer related crimes in New York State can range from a fine and
computer is not directly used for criminal purposes, it may contain records of value to a short period of jail time for a Class A misdemeanor such as unauthorized use of a
criminal investigators in the form of a logfile. In most countries are required, by law, to computer up to computer tampering in the first degree which is a Class C felony and can
keep their logfiles for a predetermined amount of time. For example; a European wide carry 3 to 15 years in prison
Data Retention Directive (applicable to all EU member states) states that all E-mail traffic However, some hackers have been hired as information security experts by private
should be retained for a minimum of 12 months. companies due to their inside knowledge of computer crime, a phenomenon which
theoretically could create perverse incentives. A possible counter to this is for courts to
Methodology of cybercrime investigation ban convicted hackers from using the Internet or computers, even after they have been
There are many ways for cybercrime to take place, and investigations tend to start released from prison though as computers and the Internet become more and more central
with an IP Address trace, however that is not necessarily a factual basis upon which to everyday life, this type of punishment may be viewed as more and more harsh and
detectives can solve a case. Different types of high-tech crime may also include elements draconian. However, nuanced approaches have been developed that manage cyber
of low-tech crime, and vice versa, making cybercrime investigators an indispensable part offender behavior without resorting to total computer or Internet bans. These approaches
of modern law-enforcement. Methodology of cybercrime detective work is dynamic and involve restricting individuals to specific devices which are subject to computer monitoring
is constantly improving. whether in closed police units, or in international cooperation or computer searches by probation or parole officers.
framework.
Awareness
Legislation As technology advances and more people rely on the internet to store sensitive
Due to easily exploitable laws, cybercriminals use developing countries in order to information such as banking or credit card information, criminals increasingly attempt to
evade detection and prosecution from law enforcement. In developing countries, such as steal that information. Cybercrime is becoming more of a threat to people across the
the Philippines, laws against cybercrime are weak or sometimes nonexistent. These weak world. Raising awareness about how information is being protected and the tactics
laws allow cybercriminals to strike from international borders and remain undetected. criminals use to steal that information continues to grow in importance. According to the
Even when identified, these criminals avoid being punished or extradited to a country, FBI's Internet Crime Complaint Center in 2014 there were 269,422 complaints filed. With
such as the United States, that has developed laws that allow for prosecution. While this all the claims combined there was a reported total loss of $800,492,073. But cybercrime
proves difficult in some cases, agencies, such as the FBI, have used deception and does yet seem to be on the average person's radar. There are 1.5 million cyber-attacks
subterfuge to catch criminals. For example, two Russian hackers had been evading the FBI annually, that means that there are over 4,000 attacks a day, 170 attacks every hour, or
for some time. The FBI set up a fake computing company based in Seattle, Washington. nearly three attacks every minute, with studies showing us that only 16% of victims had
They proceeded to lure the two Russian men into the United States by offering them work asked the people who were carrying out the attacks to stop. Anybody who uses the internet
Crim CDI 9 | 6
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
for any reason can be a victim, which is why it is important to be aware of how one is combination of any of these occasions. In the example, Carrie has had a combination of
being protected while online. these occasions and is being subjected to several types of stalking.
Crim CDI 9 | 7
INTRODUCTION TO CYBERCRIME AND ENVIRONMENTAL LAWS AND PROTECTION
5. Incompetent Suitor- The incompetent suitor stalker usually has inadequate social
skills. They want a relationship with the victim but do not have the ability to realize he or
she is not meant to be with the victim.
6. Erotomania and Morbidly Infatuated - This type of stalker feels that the victim loves
them even though they may not have had any contact with the victim. The stalker is usually
paranoid, prefers suitors in a higher social class, and will repeatedly approach the victim.
Cyberstalking is the use of the Internet or other electronic means to stalk or
harass an individual, group, or organization. It may include false accusations, defamation,
slander and libel. It may also include monitoring, identity theft, threats, vandalism,
solicitation for sex, or gathering information that may be used to threaten, embarrass or
harass.
Cyberstalking is often accompanied by real time or offline stalking. In many
jurisdictions, such as California, both are criminal offenses. Both are motivated by a desire
to control, intimidate or influence a victim. A stalker may be an online stranger or a person
whom the target knows. They may be anonymous and solicit involvement of other people
online who do not even know the target.
Cyberstalking is a criminal offense under various state anti-stalking, slander and
harassment laws. A conviction can result in a restraining order, probation, or criminal
penalties against the assailant, including jail.
Cyberstalking is a crime in which the attacker harasses a victim using electronic
communication, such as e-mail or instant messaging (IM), or messages posted to a Web
site or a discussion group. A cyber stalker relies upon the anonymity afforded by the
Internet to allow them to stalk their victim without being detected.
Online harassment, sometimes referred to as "cyber harassment," usually pertains
to threatening or harassing emails, instant messages, or website entries. ... To be
considered cyberstalking, the behavior must pose a credible threat of harm to the
victim. All states have anti-stalking laws, but the legal definitions vary.
Crim CDI 9 | 8