Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
CYBER CRIME
Table of Contents
Introduction5
Page 2
CYBERCRIME
Classification9
Fraud And Financial Crimes 9
Cyberterrorism 10
Cyberextortion 11
Computer as a target12
Computer as a tool13
Obscene or Offensive content14
Harassment15
Drug Trafficking18
Unauthorized Access & Hacking19
Web Hijacking20
Pornography21
Child Pornography21
Cyber Stocking22
Denial of Service Attack24
Virus Attack25
Software privacy 26
Salami Attacks27
Phishing 27
Sale of Illegal articles28
Online gambling28
Emails Spoofing29
Cyber Defamation30
Forgery30
Page 3
CYBERCRIME
Theft of Information contain in Electronic Form31
Email Bombing31
Internet Time Theft31
Theft of Computer Systems31
Physical Damaging a computer system32
Breach of Privacy & Confidentiality32
Data Diddling33
E- Commerce / Investment Frauds33
Cyber Terrorism33
Counter Measures36
Technical37
Counter terrors – Social Network Analysis & Internet
Recognition39
Economic 42
Legal 43
Conclusion 45
Page 4
CYBERCRIME
INTRODUCTION
Page 5
CYBERCRIME
individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm, or loss, to
the victim directly or indirectly, using modern telecommunication
networks such as Internet (networks including but not limited to
Chat rooms, emails, notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS)". Cybercrime may threaten a person or a
nation's security and financial health. Issues surrounding these types
of crimes have become high-profile, particularly those
surrounding hacking, copyright infringement, unwarranted mass-
surveillance, child pornography, and child grooming. There are also
problems of privacy when confidential information is intercepted or
disclosed, lawfully or otherwise.
Also, Internet brought other new terms, like "cybercrime" and
"net" crime and Other forms include "digital", "electronic",
"virtual", "IT", "High-tech" and Technology-enabled" crime.
However, on the one hand, each of them didn't cover the whole
meaning of cybercrime, because there is no incorporation of
networks. On the other hand, terms such as "high-tech" or
"electronic" crime might be too broad to specify that the crime is the
exact cybercrime, since other fields also have "hi-tech"
developments like nanotechnology and bioengineering. Currently,
although no one term has become totally dominant in use,
"cybercrime" is the term used most pervasively. In general,
cybercrime has three categories:
1. Target cybercrime: the crime in which a computer is the target of
the offense.
2. Tool cybercrime: the crime in which a computer is used as a tool
in committing the offense.
3. Computer incidental: the crime in which a computer plays a
minor role in committing the offense.
Page 6
CYBERCRIME
Debarati Halder and K. Jaishankar further define cybercrime from
the perspective of gender and defined 'cybercrime against women'
as "Crimes targeted against women with a motive to intentionally
harm the victim psychologically and physically, using modern
telecommunication networks such as internet and mobile phones".
The history of cybercrime is short compared with traditional
crimes. The first published report of cybercrime occurred in the
1960s, when computers were large mainframe systems. Since
mainframes were not connected with other ones and only few people
can access them, the cybercrimes were always "insider"
cybercrimes, which means employment allowed them to access into
mainframe computers. Actually, in the 1960s and 1970s, the
cybercrime, which was "computer crime" in fact, was different from
the cybercrime we faced with today, because of no Internet in that
era. In following decades, the increasing of computer network and
personal computers transformed "computer crime" into real
cybercrime. Since Internet was invented, people began to exchange
information based on networks of computers, also keep data in
computer rather than paper. At the same time, the cybercrime was
not only restricted in target cybercrime, but expanded into tool
cybercrime and computer incidental. This process is similar to the
process of learning one language. In childhood, we learn language
itself; then, when we grow up and are good at it, we will use it to
communicate with each other but itself is not a prime element. In
general, current consensus on the classification of cybercrime is to
divide it into three categories that are said in the first paragraph
above. We can set another analogy: target cybercrime is like
crossword, which focuses on the magic of language itself; tool
cybercrime is similar to fraud or harassment on street or in other
face-to-face ways, but the place in which tool cybercrime happens
is not physical environment but cyberspace; computer incidental
Page 7
CYBERCRIME
including some electronic proof is saved in computer or the camera
captures the criminal withdrawing money in a bank. Generally,
these three categories are elaborated in the three following sections
and in each section some latest cases will be studied.
A report (sponsored by McAfee) estimates that the annual
damage to the global economy is at $445 billion; however, a
Microsoft report shows that such survey-based estimates are
"hopelessly flawed" and exaggerate the true losses by orders of
magnitude. Approximately $1.5 billion was lost in 2012 to online
credit and debit card fraud in the US. In 2016, a study by Juniper
Research estimated that the costs of cybercrime could be as high as
2.1 trillion by 2019.
CLASSIFICATION
Page 8
CYBERCRIME
Page 9
CYBERCRIME
data before entry or entering false data, or by entering unauthorized
instructions or using unauthorized processes;
• Altering, destroying, suppressing, or stealing output, usually
to conceal unauthorized transactions. This is difficult to detect;
• Altering or deleting stored data;
Other forms of fraud may be facilitated using computer systems,
including bank fraud, carding, identity theft, extortion, and theft of
classified information.
A variety of internet scams, many based on phishing and social
engineering, target consumers and businesses.
Cyberterrorism
Main article: Cyberterrorism
Government officials and information technology security
specialists have documented a significant increase in Internet
problems and server scans since early 2001. But there is a growing
concern among government agencies such as the Federal Bureau of
Investigations (FBI) and the Central Intelligence Agency (CIA) that
such intrusions are part of an organized effort by cyberterrorists,
foreign intelligence services, or other groups to map potential
security holes in critical systems.[9] A cyberterrorist is someone
who intimidates or coerces a government or an organization to
advance his or her political or social objectives by launching a
Page 10
CYBERCRIME
computer-based attack against computers, networks, or the
information stored on them.
Cyberterrorism in general can be defined as an act of terrorism
committed through the use of cyberspace or computer resources
(Parker 1983). As such, a simple propaganda piece in the Internet
that there will be bomb attacks during the holidays can be
considered cyberterrorism. There are also hacking activities
directed towards individuals, families, organized by groups within
networks, tending to cause fear among people, demonstrate power,
collecting information relevant for ruining peoples' lives,
robberies, blackmailing etc.
Cyberextortion
Main article: Extortion
Cyberextortion occurs when a website, e-mail server, or computer
system is subjected to or threatened with repeated denial of service
or other attacks by malicious hackers. These hackers demand money
in return for promising to stop the attacks and to offer "protection".
Page 11
CYBERCRIME
According to the Federal Bureau of Investigation, cyberextortions
are increasingly attacking corporate websites and networks,
crippling their ability to operate and demanding payments to restore
their service. More than 20 cases are reported each month to the FBI
and many go unreported in order to keep the victim's name out of
the public domain. Perpetrators typically use a distributed denial-of-
service attack.
An example of cyberextortion was the attack on Sony Pictures of
2014.
Main article: Cyberwarfare
The U.S. Department of Defense (DoD) notes that the cyberspace
has emerged as a national-level concern through several recent
events of geo-strategic significance. Among those are included, the
attack on Estonia's infrastructure in 2007, allegedly by Russian
hackers. "In August 2008, Russia again allegedly conducted
cyberattacks, this time in a coordinated and synchronized kinetic
and non-kinetic campaign against the country of Georgia. Fearing
that such attacks may become the norm in future warfare among
nation-states, the concept of cyberspace operations impacts and will
be adapted by warfighting military commanders in the future.
Computer as a target
These crimes are committed by a selected group of criminals. Unlike
crimes using the computer as a tool, these crimes require the
technical knowledge of the perpetrators. As such, as technology
Page 12
CYBERCRIME
evolves, so too does the nature of the crime. These crimes are
relatively new, having been in existence for only as long as
computers have—which explains how unprepared society and the
world in general is towards combating these crimes. There are
numerous crimes of this nature committed daily on the internet:
Crimes that primarily target computer networks or devices
include:
• Computer viruses
• Denial-of-service attacks
• Malware (malicious code)
Computer as a tool
Main articles: Internet fraud, Spamming, Phishing, and Carding
(fraud)
When the individual is the main target of cybercrime, the
computer can be considered as the tool rather than the target. These
crimes generally involve less technical expertise. Human
weaknesses are generally exploited. The damage dealt is largely
psychological and intangible, making legal action against the
variants more difficult. These are the crimes which have existed for
centuries in the offline world. Scams, theft, and the likes have
existed even before the development in high-tech equipment. The
same criminal has simply been given a tool which increases his
Page 13
CYBERCRIME
potential pool of victims and makes him all the harder to trace and
apprehend.
Crimes that use computer networks or devices to advance other
ends include:
• Fraud and identity theft (although this increasingly uses
malware, hacking or phishing, making it an example of both
"computer as target" and "computer as tool" crime)
• Information warfare
• Phishing scams
• Spam
• Propagation of illegal obscene or offensive content,
including harassment and threats
The unsolicited sending of bulk email for commercial purposes
(spam) is unlawful in some jurisdictions.
Phishing is mostly propagated via email. Phishing emails may
contain links to other websites that are affected by malware. Or, they
may contain links to fake online banking or other websites used to
steal private account information.
Harassment
Page 16
CYBERCRIME
or written "true threat" speech/text is criminalized because of
"intent to harm or intimidate", that also applies for online or any
type of network related threats in written text or speech. The US
Supreme Court definition of "true threat" is "statements where the
speaker means to communicate a serious expression of an intent to
commit an act of unlawful violence to a particular individual or
group".
Page 17
CYBERCRIME
Drug trafficking
Darknet markets are used to buy and sell recreational drugs online.
Some drug traffickers use encrypted messaging tools to
communicate with drug mules. The dark web site Silk Road was a
major online marketplace for drugs before it was shut down by law
enforcement (then reopened under new management, and then shut
down by law enforcement again). After Silk Road 2.0 went down,
Silk Road 3 Reloaded emerged. However, it was just an older
marketplace named Diabolus Market, that used the name for more
exposure from the brand's previous success.
Page 18
CYBERCRIME
Page 19
CYBERCRIME
b) Black Hat Hackers- They cause damage after intrusion. They may
steal or modify data or insert viruses or worms which damage the
system. They are also called crackers.
c) Grey Hat Hackers- Typically ethical but occasionally violates
hacker ethics Hackers will hack into networks, stand-alone
computers and software. Network hackers try to gain unauthorized
access to private computer networks just for challenge, curiosity,
and distribution of information. Crackers perform unauthorized
intrusion with damage like stealing or changing of information or
inserting malware (viruses or worms).
Web Hijacking.
Web hijacking means taking forceful control of website of others.
In this case the owner of the website loses control over his website
and its content.
Page 20
CYBERCRIME
Pornography.
Pornography means showing sexual acts in order to cause sexual
excitement. The definition of pornography also includes
pornographic websites, pornographic magazines produced using
computer and the internet pornography delivered over mobile
phones.
Child Pornography.
The Internet is being highly used as a medium to sexually abuse
children. The children are viable victim to the cybercrime.
Computers and internet having become a necessity of every
household, the children have got an easy access to the internet. There
is an easy access to the pornographic contents on the internet.
Page 21
CYBERCRIME
Pedophiles lure the children by distributing pornographic material
and then they try to meet them for sex or to take their nude
photographs including their engagement in sexual positions.
Sometimes pedophiles contact children in the chat rooms posing as
teenagers or a child of similar age and then they start becoming
friendlier with them and win their confidence. Then slowly
pedophiles start sexual chat to help children shed their inhibitions
about sex and then call them out for personal interaction. Then starts
actual exploitation of the children by offering them some money or
falsely promising them good opportunities in life. The pedophiles
then sexually exploit the children either by using them as sexual
objects or by taking their pornographic pictures in order to sell those
over the internet.
Page 22
CYBERCRIME
Cyber Stalking
In general terms, stalking can be termed as the repeated acts of
harassment targeting the victim such as following the victim,
making harassing phone calls, killing the victims pet, vandalizing
victims property, leaving written messages or objects. Stalking may
be followed by serious violent acts such as physical harm to the
victim. Cyber stalking means repeated acts of harassment or
threatening behavior of the cybercriminal towards the victim by
using internet services. Both kinds of stalkers i.e., Online & Offline
have desire to control the victims life. How do Cyber Stalkers
operate?
a) They collect all personal information about the victim such as
name, family background, telephone numbers of residence and work
place, daily routine of the victim, address of residence and place of
work, date of birth etc. If the stalker is one of the acquaintances of
the victim he can easily get this information. If stalker is a stranger
to victim, he collects the information from the internet resources
such as various profiles, the victim may have filled in while opening
the chat or e-mail account or while signing an account with some
website.
b) The stalker may post this information on any website related to
sex-services or dating services, posing as if the victim is posting this
information and invite the people to call the victim on her telephone
numbers to have sexual services. Stalker even uses very filthy and
obscene language to invite the interested persons.
Page 23
CYBERCRIME
c) People of all kind from nook and corner of the World, who come
across this information, start calling the victim at her residence
and/or work place, asking for sexual services or relationships.
d) Some stalkers subscribe the e-mail account of the victim to
innumerable pornographic and sex sites, because of which victim
starts receiving such kind of unsolicited e-mails.
e) Some stalkers keep on sending repeated e-mails asking for
various kinds of favors or threaten the victim.
f) In online stalking the stalker can make third party to harass the
victim.
g) Follow their victim from board to board. They hangout on the
same as their victim, many times posting notes to the victim, making
sure the victim is aware that he/she is being followed. Many times
they will flame their victim (becoming argumentative, insulting) to
get their attention.
h) Stalkers will almost always make contact with their victims
through email. The letters may be loving, threatening, or sexually
explicit. He will many times use multiple names when contacting
the victim.
i) Contact victim via telephone. If the stalker is able to access the
victim telephone, he will many times make calls to the victim to
threaten, harass, or intimidate them.
j) Track the victim to his/her home.
Page 24
CYBERCRIME
Page 25
CYBERCRIME
Virus Attacks.
Viruses are the programs that have the capability to infect other
programs and make copies of it and spread into other program.
Programs that multiply like viruses but spread from computer to
computer are called as worms. These are malicious software that
attaches them to other software. Virus, worms, Trojan horse, Time
bomb, Logic Bomb, Rabbit and Bacterium are the malicious.
Viruses usually affect the data on a computer, either by altering or
deleting it. On the other hand worms merely make functional copies
of them and do this repeatedly till they eat up all the available.
Trojan horse is a program that acts like something useful but do the
things that are quiet damping. Trojans come in two parts, a Client
part and a Server part. When the victim (unknowingly) runs the
server on its machine, the attacker will then use the Client to connect
Page 26
CYBERCRIME
to the Server and start using the Trojan. TCP/IP protocol is the usual
protocol type used for communications, but some functions of the
Trojans use the UDP protocol as well.
Software Piracy.
Salami Attacks.
Phishing.
Phishing is the act of sending an e-mail to a user falsely claiming
to be an established legitimate enterprise in an attempt to scam the
user into surrendering private information that will be used for
identity theft. The e-mail directs the user to visit a web site where
they are asked to update personal information, such as passwords
and credit card, social security, and bank account numbers that the
legitimate organization already has. The Web site, however, is
bogus and set up only to steal the user information. By spamming
large groups of people, the phisher counted on the e-mail being read
by a percentage of people who actually had listed credit card
numbers with legitimately.
Page 28
CYBERCRIME
Sale of illegal articles.
Online gambling.
Email spoofing.
Page 29
CYBERCRIME
Cyber Defamation.
Page 30
CYBERCRIME
Forgery.
Email bombing.
Page 31
CYBERCRIME
Page 32
CYBERCRIME
Breach of Privacy and Confidentiality.
Page 33
CYBERCRIME
Data diddling.
Cyber Terrorism
Page 34
CYBERCRIME
Page 35
CYBERCRIME
COUNTER MEASURES
Page 36
CYBERCRIME
problems of privacy when confidential information is lost or
intercepted, lawfully or otherwise.
On the global level, both governments and non-state actors
continue to grow in importance, with the ability to engage in such
activities as espionage, and other cross-border attacks sometimes
referred to as cyber warfare. The international legal system is
attempting to hold actors accountable for their actions, with the
International Criminal Court among the few addressing this threat.
A cyber countermeasure is defined as an action, process,
technology, device, or system that serves to prevent or mitigate the
effects of a cyber attack against a victim, computer, server, network
or associated device. Recently there has been an increase in the
number of international cyber attacks. In 2013 there was a 91%
increase in targeted attack campaigns and a 62% increase in security
breaches.
A number of countermeasures exist that can be effectively
implemented in order to combat cyber-crime and increase security.
Page 37
CYBERCRIME
Technical.
Page 39
CYBERCRIME
Physical deterrents such as locks, card access keys, or biometric
devices can be used to prevent criminals from gaining physical
access to a machine on a network. Strong password protection both
for access to a computer system and the computer's BIOS are also
effective countermeasures to against cyber-criminals with physical
access to a machine.
Another deterrent is to use a bootable bastion host that executes
a web browser in a known clean and secure operating environment.
The host is devoid of any known malware, where data is never
stored on the device, and the media cannot be overwritten. The
kernel and programs are guaranteed to be clean at each boot. Some
solutions have been used to create secure hardware browsers to
protect users while accessing online banking.
Page 40
CYBERCRIME
Counter-Terror Social Network Analysis and
Intent Recognition.
Page 41
CYBERCRIME
representing terrorism scenarios. Different types of transactions
combine to represent the types of relationships between
individuals.
The final product, or target social network, is a weighted
multiplex graph in which the types of edges (links) are defined by
the types of transactions within the social network. The weights
within these graphs are determined by the content-extraction
algorithm, in which each type of link is thought of as a separate
graph and “is fed into social network algorithms in part or as a
whole.” Links between two individuals can be determined by the
existence of (or lack of) the two people being mentioned within the
same sentence in the compiled multimedia data or in relation to the
same group or event.
The final component in the CT-SNAIR process is Intent
Recognition (IR). The goal of this component is to indicate to an
analyst the threats that a transaction stream might contain. Intent
Recognition breaks down into three subcategories: detection of
“known or hypothetical target scenarios,” prioritization of these
target scenarios, and interpretation “of the resulting detection.”
Economic.
Page 43
CYBERCRIME
Legal.
In the United States a number of legal statutes define and detail
the conditions for prosecution of a cyber-crime and are used not
only as a legal counter-measure, but also functions as a behavioral
check against the commission of a cyber-crime. Many of the
provisions outlined in these acts overlap with each. Namely:
a) The Computer Fraud and Abuse Act.
b) The Digital Millennium Copyright Act.
c) The Electronic Communications Privacy Act.
Page 44
CYBERCRIME
d) The Stored Communications Act.
e) Identity Theft and Aggravated Identity Theft.
f) Identity Theft and Assumption Deterrence Act.
g) Gramm-Leach-Bliley Act.
h) Internet Spyware Prevention Act.
Page 45
CYBERCRIME
Page 46
CYBERCRIME
Page 47
CYBERCRIME
Conclusion
1. The key to protecting yourself is being aware.
2. Not all cybercriminals are “hackers.”
3. There is a whole other world that exists in cyberspace… make
sure that your information travels safely.
4. Technology is destructive only in the hands of people who do
not realize that they are one and the same process as the
Page 48
CYBERCRIME
Page 49