Organized Crime Investigation: Topic No. 3 Types of Transnational Crimes: Cyber Crimes
Organized Crime Investigation: Topic No. 3 Types of Transnational Crimes: Cyber Crimes
Investigation
Topic No. 3
Types of Transnational Crimes:
Cyber Crimes
CYBER CRIMES/
TECHNOLOGY CRIMES
[email protected] ryantimbalfiles
The Process of Money Laundering
Cyber Pornography: This would include
pornographic websites; pornographic
magazines produced using computer and
the Internet (to down load and transmit
pornographic pictures, photos, writings
etc.)
[email protected] ryantimbalfiles
Child pornography – the use of
computer networks to create,
distribute, or access materials that
sexually exploit children
BUT WHAT ABOUT
THIS???
RA 9775 Anti-Child Pornography Act of
2009
AN ACT DEFINING THE CRIME OF CHILD
PORNOGRAPHY, PRESCRIBING PENALTIES
THEREFOR AND FOR OTHER PURPOSES
[email protected] ryantimbalfiles
Sale of illegal articles: This would include sale
of narcotics, weapons and wildlife etc., by posting
information on websites, bulletin boards or
simply by using e-mail communications
[email protected] ryantimbalfiles
E-Mail spoofing: A spoofed email is one that
appears to originate from one source but actually
has been sent from another source. This can also
be termed as E-Mail forging.
Forgery: Counterfeit currency notes, postage and
revenue stamps, mark sheets etc., can be forged
using sophisticated computers, printers and
scanners.
[email protected] ryantimbalfiles
Cyber Defamation: This occurs when
defamation takes place with the help of
computers and or the Internet e.g. someone
published defamatory matter about someone on a
websites or sends e-mail containing defamatory
information to all of that person’s friends. Also
known as Cyber Bullying.
[email protected] ryantimbalfiles
[email protected] ryantimbalfiles
RA 10627, “Anti-Bullying Act of 2013″. Signed on
December 13 by Bro. Armin A. Luistro, FSC,
Secretary of the Department of Education (DepEd).
- includes “gender-based bullying”, which is “any act
that humiliates or excludes a person on the basis of
perceived or actual sexual orientation and gender
identity.”
[email protected] ryantimbalfiles
Cyber Stalking: Cyber stalking involves following
a person’s movements across the Internet by
posting messages on the bulletin boards
frequented by the victim, entering the chat-rooms
frequented by the victim.
[email protected] ryantimbalfiles
[email protected] ryantimbalfiles
Cyber terrorism – premeditated,
usually politically-motivated violence
committed against civilians through the
use of, or with the help of, computer
technology.
Acts wherein the computer or computer
Network is the target for an unlawful act.
[email protected] ryantimbalfiles
E-Mail bombing: Email bombing refers to
sending a large amount of e-mails to the victim
resulting in the victims’ the email address is
hosted in a denial of service attack.
[email protected] ryantimbalfiles
Data diddling: This kind of an attack
involves altering the raw data just before it is
processed by a computer and then changing
it back after the processing is completed.
[email protected] ryantimbalfiles
MALWARE – a software designed to
interfere with a computer’s normal
functioning.
[email protected] ryantimbalfiles
Classes of Malicious Malware
[email protected] ryantimbalfiles
Worms Computer worms are similar to viruses
in that they replicate functional copies of
themselves and can cause the same type of
damage. To spread, worms either exploit a
vulnerability on the target system or use some
kind of social engineering to trick users into
executing them. A worm enters a computer
through a vulnerability in the system and takes
advantage of file-transport or information-
transport features on the system, allowing it to
travel unaided.
[email protected] ryantimbalfiles
Trojans is another type of malware named after
the wooden horse the Greeks used to infiltrate
Troy. It is a harmful piece of software that looks
legitimate. Users are typically tricked into loading
and executing it on their systems.
[email protected] ryantimbalfiles
After receiving such type of mail
(1) Give command to computer to show full header of mail.
(2) In full header find out the IP number and time of delivery
of number and this IP number always different for every mail.
From this IP number we can know who was the Internet
service provider for that system from which the mail had
come.
(3) To know about Internet Service Provider from IP number
take the service of search engine like nic.com,
macffvisualroute. Com, apnic.com, arin.com.
(4) After opening the website of any of above mentioned
search engine, feed the IP number and after some time name
of ISP can be obtained.
(5) After getting the name of ISP we can get the information
about the sender from the ISP by giving them the IP number,
date and time of sender.
(6) ISP will provide the address and phone number of the
system, which was used to send the mail with bad intention.
[email protected] ryantimbalfiles
End of topic..