0% found this document useful (0 votes)
97 views42 pages

Organized Crime Investigation: Topic No. 3 Types of Transnational Crimes: Cyber Crimes

This document discusses various types of cyber crimes including crimes against individuals such as cyber bullying and cyber stalking, crimes against businesses like hacking and denial of service attacks, and crimes targeting governments like cyber terrorism. It provides examples of different cyber crimes and the laws created to address them, such as the Anti-Bullying Act of 2013 and acts against computer hacking and child pornography. Various types of malware used in cyber crimes are also outlined including viruses, worms, trojans, and bots.

Uploaded by

dan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
97 views42 pages

Organized Crime Investigation: Topic No. 3 Types of Transnational Crimes: Cyber Crimes

This document discusses various types of cyber crimes including crimes against individuals such as cyber bullying and cyber stalking, crimes against businesses like hacking and denial of service attacks, and crimes targeting governments like cyber terrorism. It provides examples of different cyber crimes and the laws created to address them, such as the Anti-Bullying Act of 2013 and acts against computer hacking and child pornography. Various types of malware used in cyber crimes are also outlined including viruses, worms, trojans, and bots.

Uploaded by

dan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 42

Organized Crime

Investigation

Topic No. 3
Types of Transnational Crimes:
Cyber Crimes
CYBER CRIMES/
TECHNOLOGY CRIMES

Any crime accomplished through special


knowledge of computer technology or any
crime where computer is used as a tool or
as a target or incidental to the
commission of a crime it is also known as
Cybercrime.

It also referred as any illegal act in which


knowledge of computer technology is used to
commit the offense.
[email protected] ryantimbalfiles
Scope of Application
Computer or network can be a tool of
crime (use to commit the crime)
Computer or network can be a target of
the crime (the victim)
Computer or network can be used for
incidental purposes related to the crime.
RA 8792
legislated because of I love you virus,
This Act shall be known and cited as the
"Electronic Commerce Act. “ Approved
June 14, 2000.
[email protected] ryantimbalfiles
TYPES OF CYBER CRIME

Cyber Crime refers to all activities done


with criminal intent in cyberspace. These
fall into three slots.

Those Against Person


Against Business and Non-business
Organization
Crime Targeting the Government
[email protected] ryantimbalfiles
The kind of activity usually involves a
modification of a conventional crime by
using computer.
 Financial Claims: This would include cheating,
credit card frauds, money laundering etc.

[email protected] ryantimbalfiles
The Process of Money Laundering
Cyber Pornography: This would include
pornographic websites; pornographic
magazines produced using computer and
the Internet (to down load and transmit
pornographic pictures, photos, writings
etc.)

[email protected] ryantimbalfiles
Child pornography – the use of
computer networks to create,
distribute, or access materials that
sexually exploit children
BUT WHAT ABOUT
THIS???
RA 9775 Anti-Child Pornography Act of
2009
AN ACT DEFINING THE CRIME OF CHILD
PORNOGRAPHY, PRESCRIBING PENALTIES
THEREFOR AND FOR OTHER PURPOSES

Be it enacted by the Senate and House of


Representatives of the Philippines in
Congress .
Online gambling: a gambling game committed
thru the internet.
There are millions of websites, all hosted on
servers abroad, that offer online gambling. In
fact, it is believed that many of these websites are
actually fronts for money laundering.

[email protected] ryantimbalfiles
 Sale of illegal articles: This would include sale
of narcotics, weapons and wildlife etc., by posting
information on websites, bulletin boards or
simply by using e-mail communications

[email protected] ryantimbalfiles
 E-Mail spoofing: A spoofed email is one that
appears to originate from one source but actually
has been sent from another source. This can also
be termed as E-Mail forging.
 Forgery: Counterfeit currency notes, postage and
revenue stamps, mark sheets etc., can be forged
using sophisticated computers, printers and
scanners.

[email protected] ryantimbalfiles
 Cyber Defamation: This occurs when
defamation takes place with the help of
computers and or the Internet e.g. someone
published defamatory matter about someone on a
websites or sends e-mail containing defamatory
information to all of that person’s friends. Also
known as Cyber Bullying.

[email protected] ryantimbalfiles
[email protected] ryantimbalfiles
RA 10627, “Anti-Bullying Act of 2013″. Signed on
December 13 by Bro. Armin A. Luistro, FSC,
Secretary of the Department of Education (DepEd).
- includes “gender-based bullying”, which is “any act
that humiliates or excludes a person on the basis of
perceived or actual sexual orientation and gender
identity.”

[email protected] ryantimbalfiles
 Cyber Stalking: Cyber stalking involves following
a person’s movements across the Internet by
posting messages on the bulletin boards
frequented by the victim, entering the chat-rooms
frequented by the victim.
[email protected] ryantimbalfiles
[email protected] ryantimbalfiles
Cyber terrorism – premeditated,
usually politically-motivated violence
committed against civilians through the
use of, or with the help of, computer
technology.
Acts wherein the computer or computer
Network is the target for an unlawful act.

Unauthorized access to computer


system or network: This activity is
commonly referred to as hacking
Hacking is the practice of modifying the
features of a system, in order to accomplish a goal
outside of the creator's original purpose.
Hacker is the person who is consistently
engaging in hacking activities, and has accepted
hacking as a lifestyle and philosophy of their
choice.
[email protected] ryantimbalfiles
 Theft of information
contained in
electronic devices:
This includes
information stored in
computer hard disks,
removable storage
media etc.

[email protected] ryantimbalfiles
 E-Mail bombing: Email bombing refers to
sending a large amount of e-mails to the victim
resulting in the victims’ the email address is
hosted in a denial of service attack.

[email protected] ryantimbalfiles
Data diddling: This kind of an attack
involves altering the raw data just before it is
processed by a computer and then changing
it back after the processing is completed.

Salami attacks: Those attacks are used for


the commission of financial crimes. The key
here is to make the alteration so insignificant
that in a single case it would go completely
unnoticed.
e.g. A bank employee inserts a program
into bank’s servers, that deducts a small
amount from the account of every
customer.
[email protected] ryantimbalfiles
Denial of Service: This involves flooding
computer resources with more requests
than it can handle. This causes the
resources to crash thereby denying
authorized users the service offered by the
resources.

Worms, unlike viruses don not need the


host to attach themselves to.

[email protected] ryantimbalfiles
MALWARE – a software designed to
interfere with a computer’s normal
functioning.

Derived for the word:


Malicious + software

[email protected] ryantimbalfiles
Classes of Malicious Malware

 Virus: A computer virus is a type of malware that


propagates by inserting a copy of itself into and
becoming part of another program. It spreads from
one computer to another, leaving infections as it
travels. Viruses can range in severity from causing
mildly annoying effects to damaging data or software
and causing denial-of-service (DoS) conditions.
- Viruses spread when the software or document they
are attached to is transferred from one computer
to another using the network, a disk, file
sharing, or infected e-mail attachments.

[email protected] ryantimbalfiles
 Worms Computer worms are similar to viruses
in that they replicate functional copies of
themselves and can cause the same type of
damage. To spread, worms either exploit a
vulnerability on the target system or use some
kind of social engineering to trick users into
executing them. A worm enters a computer
through a vulnerability in the system and takes
advantage of file-transport or information-
transport features on the system, allowing it to
travel unaided.

[email protected] ryantimbalfiles
 Trojans is another type of malware named after
the wooden horse the Greeks used to infiltrate
Troy. It is a harmful piece of software that looks
legitimate. Users are typically tricked into loading
and executing it on their systems.

After it is activated, it can achieve any number of


attacks on the host:
 irritating the user (popping up windows or
changing desktops)
 damaging the host (deleting files, stealing data, or
activating and spreading other malware, such as
viruses)
Trojans are also known to create back doors to
give malicious users access to the system.
[email protected] ryantimbalfiles
Bots is derived from the word "robot" and
is an automated process that interacts with
other network services.

Bots often automate tasks and provide


information or services that would
otherwise be conducted by a human being.

A typical use of bots is to gather


information (such as web crawlers), or
interact automatically with instant
messaging (IM), Internet Relay Chat (IRC),
or other web interfaces. They may also be
used to interact dynamically with websites.
[email protected] ryantimbalfiles
ILOVEYOU virus
In 1999, a student from AMA Computer College Makati
named Onel De Guzman submitted a thesis proposal for
the creation of a computer program that will hack into
computer systems and extract vital information,
particularly Internet Service accounts. The proposal was
unanimously rejected by the College of Computer Studies
academic board. De Guzman was scheduled to complete
his studies in 2000 and an academic subject called
“THESIS” was one of his final requirements before
graduation. After AMA’s graduation day on May 3, 2000, an
email trojan called ILOVEYOU spread all throughout the
globe and caused delays in several online transactions. The
“ILOVEYOU” virus unleashed a flood of e-mail that hit at
least 45 million users in at least 20 countries, according to
one estimate.
[email protected] ryantimbalfiles
The virus started with “ILOVEYOU” in the
subject line, but several variations appeared soon
afterward, including one masquerading as an e-
mail joke and another as a receipt for a Mother’s
Day gift The virus both replicates itself and steals
the user names and passwords of unsuspecting
victims. The e-mail replies from angry virus
recipients to the creator passed through a U.S. e-
mail address, “[email protected]“, which then
forwarded them to the two Access.Net (Philippine
Internet Service Provider) e-mail accounts used by
the virus creator – “[email protected]” and
[email protected]“.
The virus, according to Guinness World
Records, was the most widespread computer virus of
all time. The virus was traced to an apartment room in
downtown Manila. The tenant was Onel De Guzman.
Guzman was invited by the Philippines’ National
Bureau of Investigation for questioning. De
Guzman, in an interview, admitted spreading the virus
“by accident”. In reaction to the news, AMA expelled de
Guzman from AMA Makati and considered him as
“drop-out” for life. The NBI charged De Guzman for
violation of Republic Act 8484 or the Access Devices
Regulation Act on 1998. But due to lack of sufficiency
the Philippine Department of Justice dropped the
charges as there was no clear laws regulating the
World Wide Web. Due to this incident, June 14,
2000, Republic Act 8792 known as Philippine
Electronic Commerce Act of 2000 was signed
DETECTION
Cyber crime is the latest and perhaps the most
specialized and dynamic field in cyber laws. Some
of the Cyber Crimes like network Intrusion are
difficult to detect and investigation even though
most of crimes against individual like cyber
stalking, cyber defamation, cyber pornography can
be detected and investigated through following
steps:

[email protected] ryantimbalfiles
 After receiving such type of mail
(1) Give command to computer to show full header of mail.
(2) In full header find out the IP number and time of delivery
of number and this IP number always different for every mail.
From this IP number we can know who was the Internet
service provider for that system from which the mail had
come.
(3) To know about Internet Service Provider from IP number
take the service of search engine like nic.com,
macffvisualroute. Com, apnic.com, arin.com.
(4) After opening the website of any of above mentioned
search engine, feed the IP number and after some time name
of ISP can be obtained.
(5) After getting the name of ISP we can get the information
about the sender from the ISP by giving them the IP number,
date and time of sender.
(6) ISP will provide the address and phone number of the
system, which was used to send the mail with bad intention.

[email protected] ryantimbalfiles
End of topic..

You might also like