Definition of Cyber Crime "Cyber crime encompasses any criminal act dealing with w ith computers and networks (called hacking). Additionally, Additionally, cyber crime also includes traditional crimes conducted through the Internet. For example hate crimes, telemarketing and Internet !raud, identity the!t, and credit card account the!ts are considered to be cyber crimes when the illegal actiities are committed co mmitted through the use o! a computer and the Internet." A generali#ed de!inition de!inition o! cyber crime may ma y be $ unlawful acts wherein the computer is either a tool or target or both” %he computer may be used as a tool in the !ollowing kinds o! actiity& !inancial crimes, .
sale o! illegal articles, pornography, pornography, online gambling, intellectual property crime, e&mail spoo!ing, !orgery, !orgery, cyber de!amation, c yber stalking. %he computer may howeer be target !or unlaw!ul acts in the !ollowing cases& unauthori#ed access to computer' computer system' computer networks, the!t o! in!ormation contained in the electronic !orm, e&mail bombing, data didling, salami attacks, logic bombs, %roan attacks, internet time the!ts, web acking, the!t o! computer system, physically damaging the computer system.
Types of Cyber Crime HACKING
ackers write or use ready&made computer programs to attack the target computer. %hey possess the *uality to enter in to target computer and obtain the data. +ome hackers ha ckers hack !or personal monetary gains, such as to stealing the credit card in!ormation, trans!erring money !rom arious bank accounts to their own account !ollowed by withdrawal o! money. %hey extort money !rom some corporate giant threatening them to publish the stolen in!ormation which is critical in nature. CHILD PORNOGRAPHY
%he Internet is being highly used by b y its abusers to reach and abuse children sexually, worldwide. worldwide. %he easy access to the pornographic p ornographic contents readily and !reely aailable oer the internet lowers the inhibitions o! the children. edophiles lure the children by distributing pornographic material, then they try to meet them !or sex or to take their nude photographs p hotographs including their engagement in sexual positions. +ometimes edophiles contact children in the chat rooms posing as teenagers or a child o! similar age, then they start becoming !riendlier with them and win their con!idence. %hen slowly pedophiles start sexual chat to help children shed their inhibitions about sex and then call them out !or personal interaction. %hen starts actual exploitation o! the children by o!!ering them some money or !alsely promising them good opportunities in li!e. %he pedoph iles then sexually exploit the children either by b y using them as sexual obects or by b y taking their pornographic pictures in order to sell those oer the internet. %he children are adised to not to chat with strangers. CYBER STALKING
Cyber +talking can be de!ined as the repeated acts harassment or threatening behaior o! the cyber criminal towards the ictim by using internet serices. %he +talkers hae desire to control
the ictims li!e. -aority o! the stalkers are the deected loers or ex&loers, who then want to harass the ictim because they !ailed to satis!y their secret desires. -ost o! the stalkers are men and ictim !emale. How o St!"#ers Oper!te
Collect all personal in!ormation about the ictim such as name, !amily background, %elephone umbers o! residence and work place, daily routine o! the ictim, address o! residence and place o! work, date o! birth etc. I! the stalker is one o! the ac*uaintances o! the ictim he can easily get this in!ormation. I! stalker is a stranger to ictim, he collects the in!ormation !rom the internet resources such as arious pro!iles, the ictim may hae !illed in while opening the chat or e&mail account or while signing an account with some website. %he stalker may post this in!ormation on any website related to sex&serices or dating serices, posing as i! the ictim is posting this in!ormation and inite the people to call the ictim on her telephone numbers to hae sexual serices. +talker een uses ery !ilthy and obscene language to inite the interested persons. resently /0123%4 website has become prone with such !ilthy messages being put +talkers on the notice board o! the said site. eople o! all kind !rom nook and corner o! the 5orld, who come across this in!ormation, start calling the ictim at her residence and'or work place, asking !or sexual serices or relationships. +ome stalkers subscribe the e&mail account o! the ictim to innumerable pornographic and sex sites, because o! which ictim starts receiing such kind o! unsolicited e&mails. CREDIT CARD $RA%D
%he unauthori#ed and illegal use o! a credit card to purchase property. In!ormation about the credit card is obtained by using skimmers, the most prone places to such crimes are restaurants, bars etc. In!ormation about the Credit Card is also obtained through hishing. In case o! anyone asking !or the credit card details o! the user on the internet, it is adised to !irst con!irm telephonically !rom that particular organi#ation.
PHISHING
%he act o! sending an e&mail to a user !alsely claiming to be an legitimate enterprise in an attempt to scam the user into surrendering priate in!ormation that will be used !or identity the!t. %he e&mail directs the user to isit a 5eb site where they are asked to update personal in!ormation, such as passwords and credit card, social security, and bank account numbers, that the legitimate organi#ation already has. %he 5eb site, howeer, is bogus and set up only to steal the users in!ormation. hishing is the idea that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting. it is adised that the user should !irst con!irm telephonically !rom that particular organi#ation to whom he thinks he is supplying the in!ormation as genuine. NET E&TORTION
Copying the company6s con!idential data in order to extort said company !or huge amount.
'IR%S DISSE(INATION
-alicious so!tware that attaches itsel! to other so!tware. (irus, worms, %roan orse, %ime bomb, 7ogic 8omb, 1abbit and 8acterium are the malicious SO$T)ARE PIRACY
%he!t o! so!tware through the illegal copying o! genuine programs or the counter!eiting and distribution o! products intended to pass !or the original. IRC CRI(E
Internet 1elay Chat (I1C) serers hae chat rooms in which people !rom anywhere the world can come together and chat with each other. It is re*uested that, a summary o! the aboe mentioned
Cyber related crimes may be published in leading newspapers in ublic Interest, to make the innocent net users aware o! the same to preent them !rom !alling in traps o! cyber criminals. DENIAL O$ SER'ICE ATTACK
%his is an act by the criminal, who !loods the bandwidth o! the ictims network or !ills his e&mail box with spam mail depriing him o! the serices he is entitled to access or proide. 9enial o! +erice attack, is a type o! attack on a network that is designed to bring the network to its knees by !looding it with useless tra!!ic.. For all known 9o+ attacks, there are so!tware that !ixes the system administrators and can be installed to limit the damage caused by the attacks. 8ut, like :irus, new 9o+ attacks are constantly being dreamed up by acker. In case the user !eels that he has become the ictim to denial o! serice he should complain about the same to the police. (!r#e C*rren+y , Def!+e B"!+# C*rren+y , )!s-.w!s- , (oney (*"tip"ier ,B"!+# Do""!r Ni/eri!n A0!n+e $ee $r!* C!s- C"e!nin/ (oney S+!ms .
%he Internet users in such cases usually receies a surprising e&mail in which the sender allures the receier o! getting a ery huge amount o! !oreign currency 0ne aspect o! the igerian Adance Fee Fraud inoles ictims being in!ormed o! the existence o! case loads o! banknotes which are said to hae been coated or stamped in order to disguise their identity !rom the authorities or !or "security purposes". %his may een come as a surprise to the ictim who, a!ter paying untold !ees to hae the money !inally released, discoers it that now it needs to be cleaned by chemical dye remoers be!ore it is useable. +uch a process is accompanied with, o! course, yet more !ees or expenses. ;ach !oreign currency may be said to hae a smudge on its !ace that will preent detection by a scanning deice as it passed through Customs machines, amid claims that the money is only !or oerseas use. It could een be deemed un&cashable !or security purposes while in transit or while being held by the security company. %he alleged money is shown to the ictim, who is told that the black coating or stamps can be
remoed by washing it with a special compound. %he exotic and expensie mix o! secret chemicals !or cleaning money, which could be re!erred to as ++9 +olution, :ectrol aste, 7actima 8ase <=>, microtectine and %ebi&-atonic, is needed to $clean4 a trunk or security case supposedly !ull o! these illicit !oreign currency notes and other millions stored oerseas in a ault. In !act, only a !ew real, blackened !oreign curency bank notes are shown to the ictim, and the special chemical is ordinary cleaning !luid which reacts with the black mixture o! :aseline and iodine. %he remainder o! the material in the case is blank, blackened paper o!ten made simply by photocopying with the lid up and cutting the sheets down to banknote si#e. In some cases the actual currency has been pre&coated with a protectie layer o! common white glue, then dyed with tincture o! iodine. %his is later remoed with a "secret and expensie" solution consisting o! only water and crushed itamin C tablets. In !ront o! the ictim the criminal will appear to randomly select between two and !our notes !rom the case. e will then wash them in a tiny portion o! the solution, which he has with him, returning them to their original !orm as real bank notes. %hey are gien to the ictim who is inited to spend them or get them checked at the bank to con!irm that they are genuine. In reality, the criminal knows per!ectly well which notes he is selecting and selects the only real ones that are there. A really dexterous criminal will inite the ictim to choose notes to clean and, by using a well practiced sleight o! hand similar to a card trick, trick the ictim into selecting the genuine ones. %he ictim is asked to proide between 3+?@, and 3+?B, !or bulk supplies o! the cleaning compound, which the o!!ender o!!ers to procure. 0n some occasions, as a sign o! good !aith, you may be able to keep the suitcase !or a short time, until you obtain the money to buy the solution. %o preent you !rom opening the suitcase you could een be told that exposure to air will cause the black substance to ruin the money. A!ter the adance payment has been receied, the chemicals are not deliered to the ictim, who
is le!t with suitcases !ull o! worthless black paper instead o! the !oreign currenc y notes. %he net users are re*uested to discard such in!ormation i! receied in their mails
$RA%D Computer !raud is any dishonest misrepresentation o! !act intended to let another to do or re!rain !rom doing something which causes loss.citation neededD In this context, the !raud will result in obtaining a bene!it byE Altering computer input in an unauthori#ed way. %his re*uires little technical expertise and is not an uncommon !orm o! the!t by employees altering the data be!ore entry or entering !alse data, or by entering unauthori#ed instructions or using unauthori#ed processes Altering, destroying, suppressing, or stealing output, usually to conceal unauthori#ed transactionsE this is di!!icult to detect Altering or deleting stored data Altering or misusing existing system tools or so!tware packages, or altering or writing code !or !raudulent purposes. 0ther !orms o! !raud may be !acilitated using computer systems, including bank !raud, identity the!t, extortion, and the!t o! classi!ied in!ormation. A ariety o! Internet scams target consumers direct.
Obs+ene or offensi0e +ontent %he content o! websites and other electronic communications may be distaste!ul, obscene or o!!ensie !or a ariety o! reasons. In some instances these communications may be illegal. 0er @ urisdictions place limits on certain speech and ban racist, blasphemous, politically subersie, libelous or slanderous, seditious, or in!lammatory material that tends to incite hate crimes. %he extent to which these communications are unlaw!ul aries greatly between countries, and een within nations. It is a sensitie area in which the courts can become inoled in arbitrating between groups with strong belie!s. 0ne area o! Internet pornography that has been the target o! the strongest e!!orts at curtailment is child pornography.
HARASS(ENT 5hereas content may be o!!ensie in a non&speci!ic way, harassment directs obscenities and derogatory comments at speci!ic indiiduals !ocusing !or example on gender, race, religion, nationality, sexual orientation. %his o!ten occurs in chat rooms, through newsgroups, and by sending hate e&mail to interested parties (see cyber bullying, cyber stalking, harassment by computer, hate crime, 0nline predator, and stalking). Any comment that may be !ound derogatory or o!!ensie is considered harassment. %here are instances where committing a crime, which inoles the use o! a computer, can lead to an enhanced sentence. For example, in the case o! 3nited +tates . eil +cott 2ramer, 2ramer was sered an enhanced sentence according to the 3.+. +entencing Guidelines -anual HGB.(b)()=D !or his use o! a cell phone to $persuade, induce, entice, coerce, or !acilitate the trael o!, the minor to engage in prohibited sexual conduct.4 Connecticut was the !irst state to pass a statute making it a criminal o!!ense to harass someone by computer. -ichigan, Ari#ona, and :irginia hae also passed laws banning harassment by electronic means.
THREATS
Although !reedom o! speech is protected by law in most democratic societies (in 3+ this is done by First Amendment) that does not include all types o! speech. In !act spoken or written "true threat" speech'text is criminali#ed because o! "intent to harm or intimidate", that also applies !or online or any type o! network related threats in written text or speech.BBD %he 3+ +upreme Court de!inition o! "true threat" is "statements where the speaker means to communicate a serious expression o! an intent to commit an act o! unlaw!ul iolence to a particular indiidual or group". DR%G TRA$$ICKING
9rug tra!!ickers are increasingly taking adantage o! the Internet to sell their illegal substances through encrypted e&mail and other Internet %echnology. +ome drug tra!!ickers arrange deals at internet ca!es, use courier 5eb sites to track illegal packages o! pills, and swap recipes !or amphetamines in restricted&access chat rooms. %he rise in Internet drug trades could also be attributed to the lack o! !ace&to&!ace communication. %hese irtual exchanges allow more intimidated indiiduals to more com!ortably purchase illegal drugs. %he sketchy e!!ects that are o!ten associated with drug trades are seerely minimi#ed and the !iltering process that comes with physical interaction !ades away.
CYBER TERRORIS( Goernment o!!icials and In!ormation %echnology security specialists hae documented a signi!icant increase in Internet problems and serer scans since early B. 8ut there is a growing concern among !ederal o!!icialswhoKD that such intrusions are part o! an organi#ed e!!ort by cyberterrorists, !oreign intelligence serices, or other groups to map potential security holes in critical systems. A cyberterrorist is someone who intimidates or coerces a goernment or organi#ation to adance his or her political or social obecties by launching computer&based attack against computers, network, and the in!ormation stored on them. Cyber terrorism in general, can be de!ined as an act o! terrorism committed through the use o! cyberspace or computer resources (arker B<=). As such, a simple propaganda in the Internet, that there will be bomb attacks during the holidays can be considered cyberterrorism. As well there are also hacking actiities directed towards indiiduals, !amilies, organi#ed by groups within networks, tending to cause !ear among people, demonstrate power, collecting in!ormation releant !or ruining peoplesJ lies, robberies, blackmailing etc. Cyberextortion is a !orm o! cyberterrorism in which a website, e&mail serer, or computer system is subected to repeated denial o! serice or other attacks by malicious hackers, who demand money in return !or promising to stop the attacks. According to the Federal 8ureau o! Inestigation, cyberextortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their serice. -ore than cases are reported each month to the F8I and many go unreported in order to keep the
ictimJs name out o! the public domain. erpetrators typically use a distributed denial&o!&serice attack.
CYBER )AR$ARE +ailors analy#e, detect and de!ensiely respond to unauthori#ed actiity within 3.+. ay in!ormation systems and computer networks -ain articleE Cyber war!are %he 3.+. 9epartment o! 9e!ense (9o9) notes that cyberspace has emerged as a national&leel concern through seeral recent eents o! geo&strategic signi!icance. Among those are included the attack on ;stoniaJs in!rastructure in L, allegedly by 1ussian hackers. "In August =, 1ussia again allegedly conducted cyber attacks, this time in a coordinated and synchroni#ed kinetic and non&kinetic campaign against the country o! Georgia. Fearing that such attacks may become the norm in !uture war!are among nation&states, the concept o! cyberspace operations impacts and will be adapted by war!ighting military commanders in the !uture.
DOC%(ENTED CASES 0ne o! the highest pro!iled banking computer crime occurred during a course o! three years beginning in B
well as seeral big credit agencies and two maor uniersities. %he damage caused was extensie, one company, +outhwestern 8ell su!!ered losses o! ?L, alone. In B<=, a nineteen year old 3C7A student used his C to break into a 9e!ense 9epartment international communications system. 8etween B<<@ and B<<= the ewscorp satellite pay to iew encrypted +2M&%: serice was hacked seeral times during an on&going technological arms race between a pan&;uropean hacking group and ewscorp. %he original motiation o! the hackers was to watch +tar %rek re&runs in Germany which was something which ewscorp did not hae the copyright to allow. 0n N -arch B<<<, the -elissa worm in!ected a document on a ictimJs computer, then automatically sent that document and copy o! the irus ia e&mail to other people. In February a indiidual going by the alias o! -a!ia8oy began a series denial&o!&serice attacks against high pro!ile websites, including MahooO, Ama#on.com, 9ell, Inc., ;P%1A9;, e8ay, and C. About !i!ty computers at +tan!ord 3niersity, and also computers at the 3niersity o! Cali!ornia at +anta 8arbara, were amongst the #ombie computers sending pings in 99o+ attacks. 0n August , Canadian !ederal prosecutors charged -a!ia8oy with @Q counts o! illegal access to computers, plus a total o! ten counts o! mischie! to data !or his attacks. %he 1ussian 8usiness etwork (18) was registered as an internet site in N. Initially, much o! its actiity was legitimate. 8ut apparently the !ounders soon discoered that it was more pro!itable to host illegitimate actiities and started hiring its serices to criminals. %he 18 has been described by :eri+ign as "the baddest o! the bad".BND It o!!ers web hosting serices and internet access to all
kinds o! criminal and obectionable actiities, with an indiidual actiities earning up to ?B@ million in one year. It speciali#ed in and in some cases monopoli#ed personal identity the!t !or resale. It is the originator o! -ack and an alleged operator o! the now de!unct +torm botnet. 0n -arch B, +panish inestigators arrested clari!ication neededD in in!ection o! oer B million computers around the world. %he "botnet" o! in!ected computers included Cs inside more than hal! o! the Fortune B companies and more than Q maor banks, according to inestigators. In August B the international inestigation 0peration 9elego, operating under the aegis o! the 9epartment o! omeland +ecurity, shut down the international pedophile ring 9reamboard. %he website had approximately N members, and may hae distributed up to B terabytes o! child pornography (roughly e*uialent to BN, 9:9s). %o date this is the single largest 3.+. prosecution o! an international child pornography ring @ arrests were made worldwide.BLD 0n -arch B, BB at 7assiter igh +chool, two students were accused o! impersonation o! a sta!! member ia cybercrime, but both claimed they were uninoled. %he o!!ense was made a !elony in the Cobb County +chool 9istrict two months a!ter the impersonation had happened. +hortly a!terwards, the head o! the 7+ +chool 8oard said "%he teacher ust wouldnJt do this at all". %he case ended on -ay <, and no eidence was !ound.
CYBER CRI(E SYSTE( RE1%IRE(ENTS IN INDIA In present scenario the cyber crimes are increasing day by day. %his is because o! the bad people who are liing in this world and disturbing the enironment with their bad thinking. 8ecause o! these cyber crimes the girls are getting scared as there are many cases o! !ake id6s which the bad people make !or their bene!it or !or making the girls image bad in public. A!ter introducing the cyber law in our country the cyber crimes are becoming less but now also some o! the cases are their which changes the public mind about the people o! our country. %hrough cyber law many people got arrested and they are now also behind the bar. A!ter seeing so much sa!ety the people are not creating much iolence about this. 8ecause o! cyber crime many people had being su!!ered and mainly the rich people and the girls. %here!ore Cyber crime system re*uirements in India are being increasing day by day as per the crimes are increasing. %oday also there are so many cases o! crimes pending in the court and the people are waiting because o! the de!iciency o! lawyers !or cyber crime. +o there is need o! really good lawyers who can support the people and proide them a good status in the society. -ost o! the cases are o! hacking other6s account, spreading irus in others system through email, etc. and through this many people are su!!ering !rom cyber crime. %here!ore the cyber crime system re*uirements in India are being there as per the cyber crimes are increasing and through this crime the people !eels unsa!ely about their personal accounts and their id6s. As per the system the person gets !ixed years o! ail a!ter getting caught in this crime but between these people many people are intelligent also but they are using
their brain in wrong direction. I! these people use their brain in right direction then they can get good amount o! money with great image also. 8y doing this bad work some people get addicted to this and they make this as their pro!essional carrier. 5hen the cyber crime system re*uirements in India get !ul!illed most o! the people will get their response !rom your side. -any people are waiting to get their case in the court but not getting it, there!ore some people who goes in this !ield try to choose cyber crime as their carrier because through this, many people will get their image back and you will also !eel good about them.
CO(P%TER INSEC%RITY Se+*rity !n systems esi/n
-ost current real&world computer security e!!orts !ocus on external threats, and generally treat the computer system itsel! as a trusted system. +ome knowledgeable obserers consider this to be a disastrous mistake, and point out that this distinction is the cause o! much o! the insecurity o! current computer systems & once an attacker has suberted one part o! a system without !ine&grained security, he or she usually has access to most or all o! the !eatures o! that system. citation neededD 8ecause computer systems can be ery complex, and cannot be guaranteed to be !ree o! de!ects, this security stance tends to produce insecure systems. %he Jtrusted systemsJ approach has been predominant in the design o! many -icroso!t so!tware products, due to the long&standing -icroso!t policy o! emphasi#ing !unctionality and Jease o! useJ oer security. +ince -icroso!t products currently dominate the desktop and home computing markets, this has led to un!ortunate e!!ects. oweer, the problems described here derie !rom the security stance taken by so!tware and hardware endors generally, rather than the !ailing o! a single endor. -icroso!t is not out o! line in this respect, ust !ar more prominent with respect to its consumer marketshare. It should be noted that the 5indows % line o! operating systems !rom -icroso!t contained mechanisms to limit this, such as serices that ran under dedicated user accounts, and 1ole&8ased Access Control (18AC) with user'group rights, but the 5indows <@ line o! products lacked most o! these !unctions. 8e!ore the release o! 5indows -icroso!t has changed their o!!icial stance, taking a more locked
down approach. 0n B@ Ranuary , 8ill Gates sent out a memo on %rustworthy Computing, marking the o!!icial change in company stance. 1egardless, -icroso!tJs operating system 5indows S is still plagued by complaints about lack o! local security and inability to use the !ine&grained user access controls together with certain so!tware (esp. certain popular computer games).
$INANCIAL COST +erious !inancial damage has been caused by computer security breaches, but reliably estimating costs is *uite di!!icult. Figures in the billions o! dollars hae been *uoted in relation to the damage caused by malware such as computer worms like the Code 1ed worm, but such estimates may be exaggerated. oweer, other losses, such as those caused by the compromise o! credit card in!ormation, can be more easily determined, and they hae been substantial, as measured by millions o! indiidual ictims o! identity the!t each year in each o! seeral nations, and the seere hardship imposed on each ictim, that can wipe out all o! their !inances, preent them !rom getting a ob, plus be treated as i! they were the criminal. :olumes o! ictims o! phishing and other scams may not be known. Indiiduals who hae been in!ected with spyware or malware likely go through a costly and time&consuming process o! haing their computer cleaned. +pyware and malware is considered to be a problem speci!ic to the arious -icroso!t 5indows operating systems, howeer this can be explained somewhat by the !act that -icroso!t controls a maor share o! the C market and thus represent the most prominent target.
REASONS
%here are many similarities (yet many !undamental di!!erences) between computer and physical security. Rust like real&world security, the motiations !or breaches o! computer security ary between attackers, sometimes called hackers or crackers. +ome are teenage thrill&seekers or andals (the kind o!ten responsible !or de!acing web sites) similarly, some web site de!acements are done to make political statements. oweer, some attackers are highly skilled and motiated with the goal o! compromising computers !or !inancial gain or espionage. An example o! the latter is -arkus ess who spied !or the 2G8 and was ultimately caught because o! the e!!orts o! Cli!!ord +toll, who wrote an amusing and accurate book, %he CuckooJs ;gg, about his experiences. For those seeking to preent security breaches, the !irst step is usually to attempt to identi!y what might motiate an attack on the system, how much the continued operation and in!ormation security o! the system are worth, and who might be motiated to breach it. %he precautions re*uired !or a home C are ery di!!erent !or those o! banksJ Internet banking system, and di!!erent again !or a classi!ied military network. 0ther computer security writers suggest that, since an attacker using a network need know nothing about you or what you hae on your computer, attacker motiation is inherently impossible to determine beyond guessing. I! true, blocking all possible attacks is the only plausible action to take.
'%LNERABILITIES %o understand the techni*ues !or securing a computer system, it is important to !irst understand the arious types o! "attacks" that can be made against it. %hese threats can typically be classi!ied into one o! these seen categoriesE
E&PLOITS +o!tware !laws, especially bu!!er oer!lows, are o!ten exploited to gain control o! a computer, or to cause it to operate in an unexpected manner. -any deelopment methodologies rely on testing to ensure the *uality o! any code released this process o!ten !ails to discoer extremely unusual potential exploits. %he term "exploit" generally re!ers to small programs designed to take adantage o! a so!tware !law that has been discoered, either remote or local. %he code !rom the exploit program is !re*uently reused in troan horses and computer iruses. In some cases, a ulnerability can lie in certain programsJ processing o! a speci!ic !ile type, such as a non&executable media !ile.