Upload
munnap15
View
233
Download
2
Embed Size (px)
Citation preview
8/7/2019 TRACKING CYBER CRIMES
1/61
TRACKING CYBERCRIMES &
perpetratorsY SAI SAKETH
NISHANTH KABRA
Inroduction to
Cyber Crime
The term cyber crime is a term
which is used wrongly. This
term has nowhere been defined
in any Act passed or enacted by
the Indian Parliament. The
concept of cyber crime is not different from the concept of
ordinary crimes. Both include breach of law.Any criminal
activity that uses a computer instrumentality, target or a means
for perpetuating further crimes comes within the ambit of cyber
crime points of similarity and deviance between both these forms
may be discussed.A generalized definition of cyber crime may be unlawful acts wherein the computer is either a tool or target or
both. The computer may be used as a tool in the following kinds
of activity- financial crimes, sale of illegal articles, pornography,
Formatted: Font: (Default) Verdana, 9 pt, BoFont color: Custom Color(RGB(88,89,90)), Ke
at 18 pt
8/7/2019 TRACKING CYBER CRIMES
2/61
online gambling, intellectual property crime, e-mail spoofing,
forgery, cyber defamation, cyber stalking logic bombs, Trojan
attacks, internet time thefts, web jacking, theft of computer
system, physically damaging the computer system.
There is apparently no distinction between cyber and
conventional crime. However on a deep introspection we may say
that there exists a fine line of demarcation between the
conventional and cyber crime, which is appreciable. The
demarcation lies in the involvement of the medium in cases of
cyber crime. The sine qua non for cyber crime is that there should
be an involvement, at any stage, of the virtual cyber medium.
The first recorded cyber crime took place in the year 1820!
That is not surprising considering the fact that the abacus,
which is thought to be the earliest form of a computer, has been
around since 3500 B.C. in India, Japan and China. The era of
modern computers, however, began with the analytical engine
of Charles Babbage. Cyber crime is an evil having its origin in
the growing dependence on computers in modern life. In a day
and age when everything from microwave ovens and
refrigerators to nuclear power plants is being run on
computers, cyber crime has assumed rather sinister
implications. Major cyber crimes in the recent past include theCitibank rip off. US $ 10 million were fraudulently transferred
out of the bank and into a bank account in Switzerland. A
Russian hacker group led by Vladimir Kevin, a renowned
hacker, perpetrated the attack. The group compromised the
bank's security systems. Vladimir was allegedly using his office
computer at AO Saturn, a computer firm in St. Petersburg,
Russia, to break into Citibank computers. He was finally
arrested on Heathrow airport on his way to Switzerland.
8/7/2019 TRACKING CYBER CRIMES
3/61
THE REASONS FOR CYBER CRIMES:
The reasons for the vulnerability of computers may be said to be:
1.Capacity to store data in comparatively small space-The computer has unique characteristic of storing data in a very
small space. This affords to remove or derive information either
through physical or virtual medium makes it much more easier.
2.Easy to access- The problem encountered in guarding a computer system from
unauthorised access is that there is every possibility of breach
not due to human error but due to the complex technology. By
secretly implanted logic bomb, key loggers that can steal access
codes, advanced voice recorders; retina imagers etc. that can
fool biometric systems and bypass firewalls can be utilized to
get past many a security system.
3.Complex-
The computers work on operating systems and these operating
systems in turn are composed of millions of codes. Human
mind is fallible and it is not possible that there might not be a
lapse at any stage. The cyber criminals take advantage of these
and penetrate into the computer system.
4.Negligence-
Negligence is very closely connected with human conduct. It is
therefore very probable that while protecting the computersystem there might be any negligence, which in turn provides a
cyber criminal to gain access and control over the computer
system.
8/7/2019 TRACKING CYBER CRIMES
4/61
5. Loss of evidence-
Loss of evidence is a very common & obvious problem as allthe data are routinely destroyed. Further collection of data
outside the territorial extent also paralyses this system of crime
investigation.
Law enforcers now have an added training space. Indias
third cyber lab, set up through public-private partnership to
train and hone the skills of law enforcement officials in tacklingcyber crimes, began operations in Bangalore.
The cyber lab will be run by Nasscom, the trade body of the
Indian software and services firms, and sponsored by Canara
Bank. The Bangalore cyber lab is expected to train about 1,000
officials of law enforcing agencies operating in the state police
department, law department, defence services, banks,
insurance and allied sectors, annually. The lab is housed at the
Corps of Detectives premises of the Karnataka police, which
also houses the country's first cyber crime police station.
The cyber lab will aim at strengthening the legal infrastructure
and creating an effective enforcement framework.
The lab proposes to train cops on the familiarisation on areas
such as internet use, e-mail and online transactions and
education on what constitutes cyber crime. Post-training, they
would be able to carry out various tasks like analysing and
scrutinizing data on hard disks, e-mail tracking, extracting
evidence using Internet and mobile phones and on cyber crime-related legislation.
The Canara Bank, as part of the bank's social responsibility of
8/7/2019 TRACKING CYBER CRIMES
5/61
an eco-system for checking cyber crimes, especially frauds
taking place in the use of Internet banking, ATMs, credit and
debit cards and e-booking of tickets.
CYBER CRIMINALS:
The cyber criminals constitute of various groups/ category. This
division may be justified on the basis of the object that they have
in their mind. The following are the category of cyber criminals-
1. Children and adolescents between the age group of 6 18
years
The simple reason for this type of delinquent behaviourpattern in children is seen mostly due to the inquisitiveness to
know and explore the things. Other cognate reason may be to
prove themselves to be outstanding amongst other children in
their group. Further the reasons may be psychological even.
2. Organised hackers-
These kinds of hackers are mostly organised together to fulfil
certain objective. The reason may be to fulfil their political
bias, fundamentalism, etc.
3. Professional hackers
Their work is motivated by money. These kinds of hackers are
mostly employed to hack the site of the rivals information.
Further they are employed to crack the system of the employer
basically as a measure to make it safer by detecting the loopholes.
4. Discontented employees-
This group include those people who have been either sacked
by their employer or are dissatisfied with their employer. Toavenge they normally hack the system of their employee.
MODE AND MANNER OF COMMITING CYBER
CRIME:
8/7/2019 TRACKING CYBER CRIMES
6/61
1.Unauthorized access to computer systems or networks /Hacking-
This kind of offence is normally referred as hacking in to avoid
any confusion we would not interchangeably use the word
hacking for unauthorized access as the latter has wide
connotation.
2.Theft of information contained in electronic form- This includes information stored in computer hard disks,
removable storage media etc. Theft may be either by
appropriating the data physically or by tampering them
through the virtual medium.
3.Email bombing- This kind of activity refers to sending large numbers of mail to
the victim, which may be an individual or a company or even
mail servers there by ultimately resulting into crashing.
4.Data diddling- This kind of an attack involves altering raw data just before a
computer processes it and then changing it back after theprocessing is completed. The electricity boardfaced similar
problem of data diddling while the department was being
computerizing.
5. Virus / worm attacks-
Viruses are programs that attach themselves to a computer or
a file and then circulate themselves to other files and to other
computers on a network. They usually affect the data on a
computer, either by altering or deleting it. Worms, unlike
viruses do not need the host to attach themselves to. Theymerely make functional copies of themselves and do this
repeatedly till they eat up all the available space on a
computer's memory.
8/7/2019 TRACKING CYBER CRIMES
7/61
9.Trojan attacks- This term has its origin in the word Trojan horse. In
software field this means an unauthorized programme, which
passively gains control over anothers system by representing
itself as an authorised programme. The most common form of
installing a Trojan is through e-mail. E.g. a Trojan was
installed in the computer of a lady film directorin the U.S. while
chatting. The cyber criminal through the web cam installed in
the computer obtained her nude photographs. He further
harassed this lady.
10. Internet time thefts- Normally in these kinds of thefts the Internet surfing hours of
the victim are used up by another person. This is done by
gaining access to the login ID and the password. E.g. Colonel
Bajwas case- the Internet hours were used up by any other
person. This was perhaps one of the first reported cases related
to cyber crime in India. However this case made the police
infamous as to their lack of understanding of the nature of
cyber crime.
11. Web jacking-
This term is derived from the term hi jacking. In these
kinds of offences the hacker gains access and control over
the web site of another. He may even mutilate or change the
information on the site. This may be done for fulfilling
political objectives or for money.
a. Criminals Can Operate Anonymously Over the Computer
Networks.
1. Be careful about talking to "strangers" on a computer
network. Who are these people anyway? Remember thatpeople online may not be who they seem at first.
8/7/2019 TRACKING CYBER CRIMES
8/61
2. Tell a grown-up right away if you come across any
information that makes you feel uncomfortable.
3. Do not give out any sensitive or personal information about
you or your family in an Internet "chat room."
b. Hackers Invade Privacy
1. Define a hacker - A hacker is someone who breaks into
computers sometimes to read private e-mails and other files.
2. What is your privacy worth?
What information about you or your parents do you think
should be considered private? For example, medical
information, a diary, your grades, how much money your
parents owe, how much money your family has in a savings
account or in a home safe, and your letters to a friend.
Would this kind of invasion of your privacy be any different
than someone breaking into your school locker or yourhouse to get this information about you and your family?
c. Hackers Destroy "Property" in the Form of Computer Files
or Records.
1. Hackers delete or alter files.
2. When you write something, like a term paper or report, how
important is it to be able to find it again? Would this be
different if someone broke into your locker and stole yourterm paper?
3. How important is it that data in computers like your term
paper, a letter, your bank records, and medical records, not
8/7/2019 TRACKING CYBER CRIMES
9/61
be altered? How important is it for a drug company or a
pharmacy to not have its computer files altered or deleted by
hackers? What would happen if a hacker altered the
chemical formulas for prescription drugs, or the flight
patterns and other data in air traffic control computers?
What does the term "tamper" mean? To interfere in a
harmful way or to alter improperly.Is tampering with
computer files different from tampering that occurs on
paper files or records?
d. Hackers Injure Other Computer Users by Destroying
Information Systems
1. Hackers cause victims to spend time and money checking
and re-securing systems after break-in. They also cause
them to interrupt service. They think it's fine to break-in
and snoop in other people's files as long as they don't alter
anything. They think that no harm has been done.
2. Hackers steal telephone and computer time and share
unauthorized access codes and passwords. Much of the
stealing is very low-tech. "Social engineering" is a term used
among crackers for cracking techniques that rely on
weaknesses in human beings rather than on software.
"Dumpster diving" is the practice of sifting refuse from an
office or technical
installation to extract confidential data, especially security
compromising information. Who do you think pays for this?
How much stealing of computer time do you think there is?
For example, there is $2 billion annually in telephone toll
fraud alone. Would you want someone going through your
garbage? Have you ever thrown away private papers orpersonal notes?
3. Hackers crash systems that cause them to malfunction and
not work. How do we use computer information systems in
8/7/2019 TRACKING CYBER CRIMES
10/61
our daily lives? What could happen if computers suddenly
stopped working? For example, would public health and
safety be disrupted and lives be endangered if computers
went down?
e. Computer "Pirates" Steal Intellectual Property
1. Intellectual property is the physical expression of ideas
contained in books, music, plays, movies, and computer
software. Computer pirates steal valuable property when
they copy software, music, graphics/pictures, movies, books
(all available on the Internet).
How is the person who produced or developed these forms of
entertainment harmed? Is this different from stealing a
product (computer hardware) which someone has invented
and manufactured? Who pays for this theft?
2. It may seem simple and safe to copy recordings, movies andcomputer programs by installing a peer-to-peer (P2P) file
sharing software program. However, most material that you
may want to copy is protected by copyright which means
that you are restricted from making copies unless you have
permission to do so. Making copies of intellectual
propertyincluding music, movies and software--without the
right to do so is illegal. P2P software and the files traded on
the P2P networks may
also harm your computer by installing viruses or spy ware, or
allow others to access the files contained on your hard drivebeyond those you intend to share.
8/7/2019 TRACKING CYBER CRIMES
11/61
3. Copyright violations have civil and criminal remedies.
a.) Civil remedy: copyright holder can sue infringer for moneyto cover loss of sales or other loss caused by infringement.
b.) Criminal remedy: jail or fine paid to the government (not
copyright holder) where person infringes a copyright for
commercial advantage or private gain. For example, a
person who makes multiple copies of a video, and sell the
copies.
Defining Cyber Crime
Defining cyber crimes, as "acts that are punishable by the
Information Technology Act" would be unsuitable as the
Indian Penal Code also covers many cyber crimes, such as
email spoofing and cyber defamation, sending threatening
emails etc. A simple yet sturdy definition of cyber crime
would be "unlawful acts wherein the computer is either a
tool or a target or both".
Financial crimes
This would include cheating, credit card frauds.
Sale of illegal articles
This would include sale of narcotics, weapons and wildlife etc.,
Online gambling
There are millions of websites; all hosted on servers abroad,
that offer online gambling. In fact, it is believed that many of
these websites are actually fronts for money laundering.
8/7/2019 TRACKING CYBER CRIMES
12/61
Email spoofing
A spoofed email is one that appears to originate from one
source but actually has been sent from another source.
Forgery
Counterfeit currency notes, postage and revenue stamps, mark
sheets etc can be forged using sophisticated computers,
printers and scanners. Outside many colleges across India,
one finds touts soliciting the sale of fake mark sheets or even
certificates. These are made using computers, and high
quality scanners and printers. In fact, this has becoming a
booming business involving thousands of Rupees being given to
student gangs in exchange for these bogus but authentic
looking certificates.
Cyber Defamation
This occurs when defamation takes place with the help of
computers and / or the Internet. E.g. someone publishes
defamatory matter about someone on a website or sends e-
mails containing defamatory information to all
of that person's friends.
Cyber stalking
8/7/2019 TRACKING CYBER CRIMES
13/61
The Oxford dictionary defines stalking as "pursuing
stealthily". Cyber stalking involves following a person's
movements across the Internet by posting messages
(sometimes threatening) on the bulletin boards frequented
by the victim, entering the chat-rooms frequented by the
victim, constantly bombarding the victim with emails etc.
Frequently Used Cyber Crimes
Unauthorized access to computer systems or networks
This activity is commonly referred to as hacking. The Indian
law has however given a different connotation to the term
hacking, so we will not use the term "unauthorized access"
interchangeably with the term "hacking". Theft of
information contained in electronic form
This includes information stored in computer hard disks,
removable storage media etc
Email bombing
Email bombing refers to sending a large number of emails to
the victim resulting in the victim's email account (in case of
an individual) or mail servers (in case of a company or an
email service provider) crashing.
Some of the major email related crimes are:
1. Email spoofing
2. Sending malicious codes through email
8/7/2019 TRACKING CYBER CRIMES
14/61
3. Email bombing
4. Sending threatening emails
5. Defamatory emails
6. Email frauds
Data diddling
This kind of an attack involves altering raw data just before it
is processed by a computer and then changing it back afterthe processing is completed. Electricity Boards in India have
been victims to data diddling programs inserted when
private parties were computerizing their systems.
Salami attacks
These attacks are used for the commission of financial crimes.
The key here is to make the alteration so insignificant that in
a single case it would go completely unnoticed.
Denial of Service attack
This involves flooding a computer resource with more requests
than it can handle. This causes the resource (e.g. a web
server) to crash thereby denying authorized users the service
offered by the resource. Another variation to a typical denial
of service attack is known as a Distributed Denial of Service
(DDoS) attack wherein the perpetrators are many and are
geographically widespread. It is very difficult to control suchattacks. The attack is initiated by sending excessive demands
to
8/7/2019 TRACKING CYBER CRIMES
15/61
the victim's computer(s), exceeding the limit that the victim's
servers can support and making the servers crash.
Virus / worm attacks
Viruses are programs that attach themselves to a computer or
a file and then circulate themselves to other files and to
other computers on a network. They usually affect the data
on a computer, either by altering or deleting it. Worms,
unlike viruses do not need the host to attach themselves to.
They merely make functional copies of themselves and do
this repeatedly till they eat up all the available space on acomputer's memory
Logic bombs
These are event dependent programs. This implies that these
programs are created to do something only when a certain
event (known as a trigger event) occurs. E.g. even some
viruses may be termed logic bombs because they lie dormant
all through the year and become active only on a particulardate
Trojan attacks
A Trojan as this program is aptly called, is an unauthorized
program which functions from inside what seems to be an
authorized program, thereby concealing what it is actually
doing.
Internet time thefts
8/7/2019 TRACKING CYBER CRIMES
16/61
This connotes the usage by an unauthorized person of the
Internet hours paid for by another person. In a case
reported before the enactment of the Information
Technology Act, 2000 Colonel Bajwa, a resident of New
Delhi, asked a nearby net caf owner to come and set up his
Internet connection. For this purpose, the net caf owner
needed to know his username and password. After having
set up the connection he went away with knowing the
present username and password. He then sold this
information to another net cafe. One week later Colonel
Bajwa found that his Internet hours were almost over. Out
of the 100 hours that he had bought, 94 hours had been used
up within the span of that week. Surprised, he reported theincident to the Delhi police. The police could not believe that
time could be stolen. They were not aware of the concept of
time-theft at all. Colonel Bajwa's report was rejected. He
decided to approach The Times of India, New Delhi. They,
in turn carried a report about the inadequacy of the New
Delhi Police in handling cyber crimes. The Commissioner of
Police, Delhi then took the case into his own hands and the
police under his directions raided and arrested the net cafe
owner under the charge of theft as defined by the Indian
Penal Code. The net caf owner spent several weeks locked
up in Tihar jail before being granted bail.
Web jacking
This occurs when someone forcefully takes control of a website
(by cracking the password and later changing it). The actual
owner of the website does not have any more control over
what appears on that website In a recent incident reported
in the USA the owner of a hobby website for children
received an e-mail informing her that a group of hackershad gained control over her website.
8/7/2019 TRACKING CYBER CRIMES
17/61
Theft of computer system
This type of offence involves the theft of a computer, somepart's of a computer or a peripheral attached to the
computer.
Physically damaging a computer system. This crime is
committed by physically damaging a computer or its
peripherals.
Cyber Criminals
Kids (age group 9-16 etc.)
It seems really difficult to believe but it is true. Most amateur
hackers and cyber criminals are teenagers. To them, who
have just begun to understand what appears to be a lot
about computers, it is a matter of pride to have hacked into
a computer system or a website. There is also that little issue
of appearing really smart among friends. These young rebels
may also commit cyber crimes without really knowing that
they are doing anything wrong.
Organized hacktivists
Hacktivists are hackers with a particular (mostly political)
motive. In other cases this reason can be social activism,
religious activism, etc.The attacks on approximately 200
prominent Indian websites by a group of hackers known as
Pakistani Cyber Warriors are a good example of political
hacktivists at work.
Disgruntled employees
8/7/2019 TRACKING CYBER CRIMES
18/61
One can hardly believe how spiteful displeased employees can
become. Till now they had the option of going on strike
against their bosses. Now, with the increase independence on
computers and the automation of processes, it is easier for
disgruntled employees to do more harm to their employers
by committing computer related crimes, which can bring
entire systems down.
Professional hackers (corporate espionage)
Extensive computerization has resulted in business
organizations storing all their information in electronicform. Rival organizations employ hackers to steal industrial
secrets and other information that could be beneficial to
them. The temptation to use professional hackers for
industrial espionage also stems from the fact that physical
presence required to gain access to important documents is
rendered needless if hacking can retrieve those.
The World's Most Famous Hackers
Vladimir Levin
His claim to fame is that this mathematician who graduated
from St. Petersburg Tekhnologichesky University was the
brain behind the Russian hacker gang that cheated
Citibank's computers into giving out $10 million. Although
his first use of a computer is unknown Vladimir was
allegedly using his office computer at AO Saturn, a
computer firm in St.Petersburg, Russia, to break into
Citibank computers. Vladimir Levin was arrested at the
Heathrow airport in 1995. Tools used by him includedcomputer, computer games and disks, a camcorder, music
speakers and a TV set all of which were found by the
Russian police at his apartment. During his trial, Levin
8/7/2019 TRACKING CYBER CRIMES
19/61
alleged that one of his defence lawyers was actually an FBI
agent.
Johan Helsingius
He was known to run the world's most popular re-mailer
programme called penet.fi. Surprisingly, this re-mailer, the
busiest in the world, was run on an ordinary 486 with a 200-
megabyte hard drive. His other idiosyncrasy was that he
never tried to remain anonymous.The Finnish police raided
Johan in 1995 due to a complaint by the Church of
Scientology that a penet.fi customer was posting the"church's" secrets on the Net. At that time Johan had to
abandon the re-mailer.
Kevin Mitnick
Kevin Mitnick alias on the Net was Condor. As a teenager
Kevin Mitnick could not afford his own computer. He would
therefore go to a Radio Shack store and use the models kept
there for demonstration to dial into other computers.One ofthe unusual things about Mitnick was that he used the
Internet Relay Chat (IRC) to send messages to his friends. A
judge sentenced him
to one year in a residential treatment center. There, Kevin
enrolled in a 12-step program to rid him of what the judge
also termed his "computer addiction". Mitnick was
immortalized when he became the first hacker to have his
face put on an FBI "most wanted" poster. His repeated
offences - and an image of a teenage hacker who refused to
grow up - made him The Lost Boy of Cyberspace.
Robert Morris
8/7/2019 TRACKING CYBER CRIMES
20/61
He was known to the Internet community as "rtm". But he was
distinguished by much more than his fame as a hacker. He
was the son of the chief scientist at the National Computer
Security Center -- part of the National Security Agency
(NSA), USA. In addition, this graduate from Cornell
University rocketed to fame because of the Internet worm,
which he unleashed in 1988, practically maiming the
fledgling Internet. Thousands of computers were infected
and subsequently crashed. Suddenly,
the term "hacker" became common in every household in
America. Surprisingly, Robert's father is to be held
responsible for introducing him to the world of computers.He brought the original Enigma cryptographic machines
home from the NSA. Later, as a teenager, Morris was
recognized as a star user at the Bell Labs network where he
had an account. This recognition was due to his earlier
forays into hacking.
Dennis Ritchie and Ken Thompson
He was also known as dmr and Ken were the legendary coders
who designed the UNIX system for mini-computers in 1969.
They were the creative geniuses behind Bell Labs' computer
science operating group. UNIX really helped users and soon
became a standard language. One of the tools used by them
included Plan 9, the next-generation operating system,
created
after UNIX by Rob Pike, their colleague at bell Labs. Dennis
also has the distinction of being the author of the C
programming language.
Denial of Service Tools
8/7/2019 TRACKING CYBER CRIMES
21/61
Denial-of-service (or DoS) attacks are usually launched to
make a particular service unavailable to someone who is
authorized to use it. These attacks may be launched using
one single computer or many computers across the world. In
the latter scenario, the attack is known as a distributed
denial of service attack. Usually these attacks do not
necessitate the need to get access into anyone's system.
These attacks have been getting decidedly more popular as
more and more people realize the amount and magnitude of
loss, which can be caused through them.
What are the reasons that a hacker may want to resort to a
DoS attack? He may have installed a Trojan in the victim's
computer but needed to have the computer restarted to
activate the Trojan. The other good reason also may be that
a business may want to harm a competitor by crashing his
systems.
Denial-of-service attacks have had an impressive history
having, in the past, blocked out websites like Amazon, CNN,
Yahoo and eBay. The attack is initiated by sending excessive
demands to the victim's computer's, exceeding the limit that
the victim's servers can support and making the servers
crash. Sometimes, many computers are entrenched in this
process
by installing a Trojan on them; taking control of them and
then making them send numerous demands to the targeted
computer. On the other side, the victim of such an attackmay see many such demands (sometimes even numbering
tens of thousands) coming from computers from around the
world. Unfortunately, to be able to gain control over a
8/7/2019 TRACKING CYBER CRIMES
22/61
malicious denial-of-service attack would require tracing all
the computers involved in the attack and then informing the
owners of those systems about the attack. The compromised
system would need to be shut down or then cleaned. This
process, which sounds fairly simple, may prove very difficult
to achieve across national and later organizational borders.
Even when the source(s) of the attack are traced there are
many problems, which the victim may be faced with. He will
need to inform all the involved organizations in control of
the attacking computers and ask them to either clean the
systems or shut them down. Across international boundaries
this may prove to be a titanic task. The staff of the
organization may not understand the language. They may
not be present if the attack were to be launched during the
night or during weekends.
The computers that may have to be shut down may be vital for
their processes and the staff may not have the authority to
shut them down. The staff may not understand the attack,
system administration, network topology, or any number of
things that may delay or halt shutting down the attackingcomputer's. Or, more simply, the organization may not have
the desire to help.
If there are hundreds or even thousands of computers on the
attack, with problems like the ones mentioned above, the
victim may not be able to stop the attack for days by which
time the damage would have been done. His servers would
be completely incapacitated to administer to so many
demands and consequently would crash.
8/7/2019 TRACKING CYBER CRIMES
23/61
It is very simple for anyone to launch an attack because denial-
of-service tools can easily be procured from the Net. The
major versions of distributed denial of service attack tools
are Trinoo (or trin00), TFN, TFN2K and Stacheldraht.
Denial-of-Service tools allow the attackers to automate and
preset the times and frequencies of such attacks so that the
attack is launched and then stopped to be launched once
again later. This makes it very difficult, in fact almost
impossible, to trace the
source of the attack.
These tools also provide another service by which the attacking
computer can change its source address randomly thereby
making it seem as if the attack is originating from many
thousands of computers while in reality there may be only a
few. Distributed denial-of-service attacks are a very
perturbing problem for law enforcement agencies mainly
because they
are very difficult to trace. In addition, usually these attacks are
directed towards very sensitive systems or networks
sometimes even those that are vital to national security.
Sometimes, even when the perpetrators can be traced,
international extradition laws may prove to be a hitch in
bringing them under the authority of the law.
How Can We Prevent Computer Crime?
a. By Educating Everyone.
For example, users and systems operators; people who holdpersonal data and the people about whom it is held; people
who create intellectual property and those who buy it; and
the criminals. We must educate people to:
8/7/2019 TRACKING CYBER CRIMES
24/61
1. Understand how technology can be used to help or hurt
others.
2. Think about what it would be like to be the victim of a
computer hacker or computer pirate.
b. By Practicing Safe Computing.
1. Always ask: Who has or may have access to my log-in
address?
2. Remember: People such as computer hackers and pirates
who hurt others through computer technology are not
"cool." They are breaking the law. backed by someconsideration for it.
8/7/2019 TRACKING CYBER CRIMES
25/61
CLASSIFICATION:
The subject of cyber crime may be broadly classified under the
following three groups. They are-
1. Against Individuals
a. their person &
b. their property of an individual
2. Against Organization
a. Government
c. Firm, Company, Group of Individuals.
3. Against Society at large
8/7/2019 TRACKING CYBER CRIMES
26/61
The following are the crimes, which can be committed against the
followings group
Against Individuals:
i. Harassment via e-mails.
ii. Cyber-stalking.
iii. Dissemination of obscene material.
iv. Defamation.
v. Unauthorized control/access over computer system.
vi. Indecent exposure
vii. Email spoofing
viii. Cheating & Fraud
8/7/2019 TRACKING CYBER CRIMES
27/61
Against Individual Property: -
i. Computer vandalism.
ii. Transmitting virus.
iii. Netrespass
iv. Unauthorized control/access over computer system.
v. Intellectual Property crimes
vi. Internet time thefts
Against Organization: -
i. Unauthorized control/access over computer system
ii. Possession of unauthorized information.
8/7/2019 TRACKING CYBER CRIMES
28/61
iii. Cyber terrorism against the government organization.
iv. Distribution of pirated software etc.
Against Society at large: -
i. Pornography (basically child pornography).
ii. Polluting the youth through indecent exposure.
iii. Trafficking
iv. Financial crimes
v.Sale of illegal articles
vi.Online gambling
vii. Forgery
8/7/2019 TRACKING CYBER CRIMES
29/61
The above mentioned offences may discussed in brief as follows:
1. Harassment via e-mails-
Harassment through e-mails is not a new concept. It is very
similar to harassing through letters. Recently I had received a mail
from a lady wherein she complained about the same. Her former boy
friend was sending her mails constantly sometimes emotionally
blackmailing her and also threatening her. This is a very common type
of harassment via e-mails.
2. Cyber-stalking-
The Oxford dictionary defines stalking as "pursuing stealthily". Cyber
stalking involves following a person's movements across the Internet
by posting messages (sometimes threatening) on the bulletin boards
frequented by the victim, entering the chat-rooms frequented by the
victim, constantly bombarding the victim with emails etc.
3. Dissemination of obscene material/ Indecent exposure/
Pornography (basically child pornography) / Polluting through
indecent exposure-
8/7/2019 TRACKING CYBER CRIMES
30/61
Pornography on the net may take various forms. It may include the
hosting of web site containing these prohibited materials. Use of
computers for producing these obscene materials. Downloading
through the Internet, obscene materials. These obscene matters may
cause harm to the mind of the adolescent and tend to deprave or
corrupt their mind. Two known cases of pornography are the Delhi
Bal Bharati case and the Bombay case wherein two Swiss couple used
to force the slum children for obscene photographs. The Mumbai
police later arrested them.
4. Defamation
It is an act of imputing any person with intent to lower the person in
the estimation of the right-thinking members of society generally or
to cause him to be shunned or avoided or to expose him to hatred,
contempt or ridicule. Cyber defamation is not different from
conventional defamation except the involvement of a virtual medium.
E.g. the mail account of Rohit was hacked and some mails were sentfrom his account to some of his batch mates regarding his affair with a
girl with intent to defame him.
4. Unauthorized control/access over computer system-
8/7/2019 TRACKING CYBER CRIMES
31/61
This activity is commonly referred to as hacking. The Indian law has
however given a different connotation to the term hacking, so we will
not use the term "unauthorized access" interchangeably with the term
"hacking" to prevent confusion as the term used in the Act of 2000 is
much wider than hacking.
5. E mail spoofing-
A spoofed e-mail may be said to be one, which misrepresents its
origin. It shows it's origin to be different from which actually it
originates. Recently spoofed mails were sent on the name of Mr.
Na.Vijayashankar (naavi.org), which contained virus.
Rajesh Manyar, a graduate student at Purdue University in Indiana,
was arrested for threatening to detonate a nuclear device in thecollege campus. The alleged e- mail was sent from the account of
another student to the vice president for student services. However
the mail was traced to be sent from the account of Rajesh Manyar.(15)
6. Computer vandalism-
8/7/2019 TRACKING CYBER CRIMES
32/61
Vandalism means deliberately destroying or damaging property of
another. Thus computer vandalism may include within its purview
any kind of physical harm done to the computer of any person. These
acts may take the form of the theft of a computer, some part of a
computer or a peripheral attached to the computer or by physically
damaging a computer or its peripherals.
7. Transmitting virus/worms-
This topic has been adequately dealt herein above.
8. Intellectual Property crimes / Distribution of pirated software-
Intellectual property consists of a bundle of rights. Any unlawful act
by which the owner is deprived completely or partially of his rights is
an offence. The common form of IPR violation may be said to be
software piracy, copyright infringement, trademark and service mark
violation, theft of computer source code, etc.
8/7/2019 TRACKING CYBER CRIMES
33/61
9. Cyber terrorism against the government organization
At this juncture a necessity may be felt that what is the need to
distinguish between cyber terrorism and cyber crime. Both are
criminal acts. However there is a compelling need to distinguish
between both these crimes. A cyber crime is generally a domestic
issue, which may have international consequences, however cyber
terrorism is a global concern, which has domestic as well as
international consequences. The common form of these terrorist
attacks on the Internet is by distributed denial of service attacks, hatewebsites and hate emails, attacks on sensitive computer networks,
etc. Technology savvy terrorists are using 512-bit encryption, which
is next to impossible to decrypt. The recent example may be cited of
Osama Bin Laden, the LTTE, attack on Americas army deployment
system during Iraq war.
Cyber terrorism may be defined to be the premeditated use of
disruptive activities, or the threat thereof, in cyber space, with theintention to further social, ideological, religious, political or similar
objectives, or to intimidate any person in furtherance of such
objectives (4)
Another definition may be attempted to cover within its ambit every
act of cyber terrorism.
8/7/2019 TRACKING CYBER CRIMES
34/61
A terrorist means a person who indulges in wanton killing of persons
or in violence or in disruption of services or means of
communications essential to the community or in damaging property
with the view to
(1) putting the public or any section of the public in fear; or
(2) affecting adversely the harmony between different religious,
racial, language or regional groups or castes or communities; or
(3) coercing or overawing the government established by law; or
(4) endangering the sovereignty and integrity of the nation
and a cyber terrorist is the person who uses the computer system as a
means or ends to achieve the above objectives. Every act done in
pursuance thereof is an act of cyber terrorism.
10.Trafficking
What is a Computer Crime?
8/7/2019 TRACKING CYBER CRIMES
35/61
a. Criminals Can Operate Anonymously Over the Computer Networks.
1. Be careful about talking to "strangers" on a computer network. Who
are these people anyway? Remember that people online may not be
who they seem at first. Never respond to messages or bulletin board
items that are: Suggestive of something improper or indecent;
Obscene, filthy, or offensive to accepted standards of decency;
Belligerent, hostile, combative, very aggressive; and Threaten to do
harm or danger towards you or another
2. Tell a grown-up right away if you come across any information that
makes you feel uncomfortable.
3. Do not give out any sensitive or personal information about you or
your family in an Internet "chat room." Be sure that you are dealing
with someone you and your parents know and trust before giving out
any personal information about yourself via e-mail.
4. Never arrange a face-to-face meeting without telling your parents
or guardians. If your parent or guardian agrees to the meeting, you
should meet in a public place and have a parent or guardian go with
you.
b. Hackers Invade Privacy
1. Define a hacker - A hacker is someone who breaks into computers
sometimes to read private e-mails and other files.
2. What is your privacy worth?
8/7/2019 TRACKING CYBER CRIMES
36/61
What information about you or your parents do you think should be
considered private? For example, medical information, a diary, your
grades, how much money your parents owe, how much money your
family has in a savings account or in a home safe, and your letters to a
friend.
Would this kind of invasion of your privacy be any different than
someone breaking into your school locker or your house to get this
information about you and your family?
c. Hackers Destroy "Property" in the Form of Computer Files or
Records.
1. Hackers delete or alter files.
2. When you write something, like a term paper or report, how
important is it to be able to find it again? Would this be different ifsomeone broke into your locker and stole your term paper?
3. How important is it that data in computers like your term paper, a
letter, your bank records, and medical records, not be altered? How
important is it for a drug company or a pharmacy to not have its
computer files altered or deleted by hackers? What would happen if a
hacker altered the chemical formulas for prescription drugs, or the
flight patterns and other data in air traffic control computers? What
does the term "tamper" mean? To interfere in a harmful way or to
alter improperly.Is tampering with computer files different fromtampering that occurs on paper files or records?
8/7/2019 TRACKING CYBER CRIMES
37/61
d. Hackers Injure Other Computer Users by Destroying Information
Systems
1. Hackers cause victims to spend time and money checking and re-
securing systems after break-in. They also cause them to interrupt
service. They think it's fine to break-in and snoop in other people's
files as long as they don't alter anything. They think that no harm has
been done.
2. Hackers steal telephone and computer time and share
unauthorized access codes and passwords. Much of the stealing is
very low-tech. "Social engineering" is a term used among crackers forcracking techniques that rely on weaknesses in human beings rather
than on software. "Dumpster diving" is the practice of sifting refuse
from an office or technical
installation to extract confidential data, especially security
compromising information. Who do you think pays for this? How
much stealing of computer time do you think there is? For example,
there is $2 billion annually in telephone toll fraud alone. Would you
want someone going through your garbage? Have you ever thrown
away private papers or personal notes?
3. Hackers crash systems that cause them to malfunction and not
work. How do we use computer information systems in our daily
lives? What could happen if computers suddenly stopped working?
For example, would public health and safety be disrupted and lives be
endangered if computers went down?
e. Computer "Pirates" Steal Intellectual Property
8/7/2019 TRACKING CYBER CRIMES
38/61
1. Intellectual property is the physical expression of ideas contained
in books, music, plays, movies, and computer software. Computer
pirates steal valuable property when they copy software, music,
graphics/pictures, movies, books (all available on the Internet).
How is the person who produced or developed these forms of
entertainment harmed? Is this different from stealing a product
(computer hardware) which someone has invented and
manufactured? Who pays for this theft?
2. It may seem simple and safe to copy recordings, movies and
computer programs by installing a peer-to-peer (P2P) file sharing
software program. However, most material that you may want to copy
is protected by copyright which means that you are restricted from
making copies unless you have permission to do so. Making copies of
intellectual propertyincluding music, movies and software--without
the right to do so is illegal. P2P software and the files traded on the
P2P networks may
also harm your computer by installing viruses or spy ware, or allow
others to access the files contained on your hard drive beyond those
you intend to share.
3. Copyright violations have civil and criminal remedies.
a.) Civil remedy: copyright holder can sue infringer for money to
cover loss of sales or other loss caused by infringement.
8/7/2019 TRACKING CYBER CRIMES
39/61
b.) Criminal remedy: jail or fine paid to the government (not copyright
holder) where person infringes a copyright for commercial advantage
or private gain. For example, a person who makes multipl e copies of a
video, and sell the copies.
Defining Cyber Crime
Defining cyber crimes, as "acts that are punishable by the Information
Technology Act" would be unsuitable as the Indian Penal Code also
covers many cyber crimes, such as email spoofing and cyberdefamation, sending threatening emails etc. A simple yet sturdy
definition of cyber crime would be "unlawful acts wherein the
computer is either a tool or a target or both".
Financial crimes
This would include cheating, credit card frauds, money laund eringetc. To cite a recent case, a website offered to sell Alphonso mangoes
at a throwaway price. Distrusting such a transaction, very few people
responded to or supplied the website with their credit card numbers.
These people were actually sent the Alphonso mangoes. The word
about this website now spread like wildfire. Thousands of people
from all over the country responded and ordered mangoes by
providing their credit card numbers. The owners of what was later
proven to be a bogus website then fled taking the numerous credit
card numbers and proceeded to spend huge amounts of money much
to the chagrin of the card owners.
8/7/2019 TRACKING CYBER CRIMES
40/61
Sale of illegal articles
This would include sale of narcotics, weapons and wildlife etc., by
posting information on websites, auction websites, and bulletin
boards or 167 simply by using email communication. E.g. many of the
auction sites even in India are believed to be selling cocaine in the
name of 'honey'.
Online gambling
There are millions of websites; all hosted on servers abroad, that offer
online gambling. In fact, it is believed that many of these websites are
actually fronts for money laundering.
Intellectual Property crimes
These include software piracy, copyright infringement, trademarksviolations, theft of computer source code etc.
Email spoofing
8/7/2019 TRACKING CYBER CRIMES
41/61
A spoofed email is one that appears to originate from one source but
actually has been sent from another source. E.g. Pooja has an e-mail
address [email protected]. Her enemy, Sameer spoofs her e -mail
and sends obscene messages to all her acquaintances. Since the e-
mails appear to have originated from Pooja, her friends could take
offence and relationships could be spoiled for life. Email spoofing can
also cause monetary damage. In an American case, a teenager made
millions of dollars by spreading false information about certain
companies whose shares he had short sold. This misinformation
was spread by sending spoofed emails, purportedly from news
agencies like Reuters, to share brokers and investors who were
informed that the companies were doing very badly. Even after the
truth came out the values of the shares did not go back to the earlier
levels and thousandsof investors lost a lot of money.
Forgery
Counterfeit currency notes, postage and revenue stamps, mark sheets
etc can be forged using sophisticated computers, printers andscanners. Outside many colleges across India, one finds touts
soliciting the sale of fake mark sheets or even certificates. These are
made using computers, and high quality scanners and printers. In fact,
this has becoming a
booming business involving thousands of Rupees being given to
student gangs in exchange for these bogus but authentic looking
certificates.
Cyber Defamation
8/7/2019 TRACKING CYBER CRIMES
42/61
This occurs when defamation takes place with the help of computers
and / or the Internet. E.g. someone publishes defamatory matter
about someone on a website or sends e-mails containing defamatory
information to all
Cyber stalking
. Cyber stalking involves following a person's movements across the
Internet by posting messages (sometimes threatening) on the bulletin
boards frequented by the victim, entering the chat-rooms frequented
by the victim, constantly bombarding the victim with emails e
Unauthorized access to computer systems or networks
This activity is commonly referred to as hacking. The Indian law has
however given a different connotation to the term hacking, so we will
not use the term "unauthorized access" interchangeably with the term
"hacking". Theft of information contained in electronic form
This includes information stored in computer hard disks, removable
storage media etc
Email bombing
Email bombing refers to sending a large number of emails to the
victim resulting in the victim's email account (in case of an individual)
or mail servers (in case of a company or an email service provider)
crashing.
8/7/2019 TRACKING CYBER CRIMES
43/61
Some of the major email related crimes are:
1. Email spoofing
2. Sending malicious codes through email
3. Email bombing
4. Sending threatening emails
5. Defamatory emails
6. Email frauds
Data diddling
This kind of an attack involves altering raw data just before it is
processed by a computer and then changing it back after the
processing is completed. Electricity Boards in India have been victims
to data diddling programs inserted when private parties were
computerizing their systems.
Viruses are programs that attach themselves to a computer or a file
and then circulate themselves to other files and to other computers on
a network. They usually affect the data on a computer, either by
altering or deleting it. Worms, unlike viruses do not need the host toattach themselves to. They merely make functional copies of
themselves and do this repeatedly till they eat up all the available
space on a computer's memory
8/7/2019 TRACKING CYBER CRIMES
44/61
Logic bombs
These are event dependent programs. This implies that these
programs are created to do something only when a certain event
(known as a trigger event) occurs. E.g. even some viruses may be
termed logic bombs because they lie dormant all through the year and
become active only on a particular date
Trojan attacks
A Trojan as this program is aptly called, is an unauthorized program
which functions from inside what seems to be an authorized program,
thereby concealing what it is actually doing.
Internet time thefts
8/7/2019 TRACKING CYBER CRIMES
45/61
This connotes the usage by an unauthorized person of the Internet
hours paid for by another person. In a case reported before the
enactment of the Information Technology Act, 2000 Colonel Bajwa, a
resident of New Delhi, asked a nearby net caf owner to come and set
up his Internet connection. For this purpose, the net caf owner needed
to know his username and password. After having set up the
connection he went away with knowing the present username and
password. He then sold this information to another net cafe. One week
later Colonel Bajwa found that his Internet hours were almost over.
Out of the 100 hours that he had bought, 94 hours had been used up
within the span of that week. Surprised, he reported the incident to
the Delhi police. The police could not believe that time could be
stolen. They were not aware of the concept of time-theft at all. Colonel
Bajwa's report was rejected. He decided to approach The Times of
India, New Delhi. They, in turn carried a report about the inadequacy
of the New Delhi Police in handling cyber crimes. The Commissioner
of Police, Delhi then took the case into his own hands and the police
under his directions raided and arrested the net cafe owner under the
charge of theft as defined by the Indian Penal Code. The net caf owner
spent several weeks locked up in Tihar jail before being granted bail.
Web jacking
This occurs when someone forcefully takes control of a website (by
cracking the password and later changing it). The actual owner of the
website does not have any more control over what appears on that
website In a recent incident reported in the USA the owner of a hobby
website for children received an e-mail informing her that a group of
hackers had gained control over her website.
Theft of computer system
8/7/2019 TRACKING CYBER CRIMES
46/61
This type of offence involves the theft of a computer, some part's of a
computer or a peripheral attached to the computer.
Physically damaging a computer system. This crime is committed by
physically damaging a computer or its peripherals.
Cyber Criminals
Kids (age group 9-16 etc.)
It seems really difficult to believe but it is true. Most amateur hackers
and cyber criminals are teenagers. To them, who have just begun to
understand what appears to be a lot about computers, it is a matter of
pride to have hacked into a computer system or a website. There is
also that little issue of appearing really smart among friends. These
young rebels may also commit cyber crimes without really knowing
that they are doing anything wrong.
Organized hacktivists
Hacktivists are hackers with a particular (mostly political) motive. In
other cases this reason can be social activism, religious activism,
etc.The attacks on approximately 200 prominent Indian websites by a
group of hackers known as Pakistani Cyber Warriors are a good
example of political hacktivists at work.
Disgruntled employees
8/7/2019 TRACKING CYBER CRIMES
47/61
One can hardly believe how spiteful displeased employees can
become. Till now they had the option of going on strike against their
bosses. Now, with the increase independence on computers and the
automation of processes, it is easier for disgruntled employees to do
more harm to their employers by committing computer related
crimes, which can bring entire systems down.
Professional hackers (corporate espionage)
Extensive computerization has resulted in business organizationsstoring all their information in electronic form. Rival organizations
employ hackers to steal industrial secrets and other information that
could be beneficial to them. The temptation to use professional
hackers for industrial espionage also stems from the fact that physical
presence required to gain access to important documents is rendered
needless if hacking can retrieve those.
The World's Most Famous Hackers
Vladimir Levin
8/7/2019 TRACKING CYBER CRIMES
48/61
His claim to fame is that this mathematician who graduated from St.
Petersburg Tekhnologichesky University was the brain behind the
Russian hacker gang that cheated Citibank's computers into giving out
$10 million. Although his first use of a computer is unknown Vladimir
was allegedly using his office computer at AO Saturn, a computer firm
in St.Petersburg, Russia, to break into Citibank computers. Vladimir
Levin was arrested at the Heathrow airport in 1995. Tools used by
him included computer, computer games and disks, a camcorder,
music speakers and a TV set all of which were found by the Russian
police at his apartment. During his trial, Levin alleged that one of his
defence lawyers was actually an FBI agent.
Johan Helsingius
He was known to run the world's most popular re-mailer programme
called penet.fi. Surprisingly, this re-mailer, the busiest in the world,
was run on an ordinary 486 with a 200-megabyte hard drive. His
other idiosyncrasy was that he never tried to remain anonymous.The
Finnish police raided Johan in 1995 due to a complaint by the Church
of Scientology that a penet.fi customer was posting the "church's"secrets on the Net. At that time Johan had to abandon the re-mailer.
Kevin Mitnick
Kevin Mitnick alias on the Net was Condor. As a teenager Kevin
Mitnick could not afford his own computer. He would therefore go to a
Radio Shack store and use the models kept there for demonstration to
dial into other computers.One of the unusual things about Mitnick was
that he used the Internet Relay Chat (IRC) to send messages to his
friends. A judge sentenced him
8/7/2019 TRACKING CYBER CRIMES
49/61
to one year in a residential treatment center. There, Kevin enrolled in
a 12-step program to rid him of what the judge also termed his
"computer addiction". Mitnick was immortalized when he became the
first hacker to have his face put on an FBI "most wanted" poster. His
repeated offences - and an image of a teenage hacker who refused to
grow up - made him The Lost Boy of Cyberspace.
Robert Morris
He was known to the Internet community as "rtm". But he wasdistinguished by much more than his fame as a hacker. He was the son
of the chief scientist at the National Computer Security Center -- part
of the National Security Agency (NSA), USA. In addition, this graduate
from Cornell University rocketed to fame because of the Internet
worm, which he unleashed in 1988, practically maiming the fledgling
Internet. Thousands of computers were infected and subsequently
crashed. Suddenly,
the term "hacker" became common in every household in America.
Surprisingly, Robert's father is to be held responsible for introducinghim to the world of computers. He brought the original Enigma
cryptographic machines home from the NSA. Later, as a teenager,
Morris was recognized as a star user at the Bell Labs network where
he had an account. This recognition was due to his earlier forays into
hacking.
Dennis Ritchie and Ken Thompson
8/7/2019 TRACKING CYBER CRIMES
50/61
He was also known as dmr and Ken were the legendary coders who
designed the UNIX system for mini-computers in 1969. They were the
creative geniuses behind Bell Labs' computer science operating
group. UNIX really helped users and soon became a standard
language. One of the tools used by them included Plan 9, the next-
generation operating system, created
after UNIX by Rob Pike, their colleague at bell Labs. Dennis also has
the distinction of being the author of the C programming language.
Denial of Service Tools
Denial-of-service (or DoS) attacks are usually launched to make a
particular service unavailable to someone who is authorized to use it.
These attacks may be launched using one single computer or many
computers across the world. In the latter scenario, the attack is
known as a distributed denial of service attack. Usually these attacks
do not necessitate the need to get access into anyone's system.
These attacks have been getting decidedly more popular as more and
more people realize the amount and magnitude of loss, which can be
caused through them.
What are the reasons that a hacker may want to resort to a DoS
attack? He may have installed a Trojan in the victim's computer butneeded to have the computer restarted to activate the Trojan. The
other good reason also may be that a business may want to harm a
competitor by crashing his systems.
8/7/2019 TRACKING CYBER CRIMES
51/61
Denial-of-service attacks have had an impressive history having, in
the past, blocked out websites like Amazon, CNN, Yahoo and eBay. The
attack is initiated by sending excessive demands to the victim's
computer's, exceeding the limit that the victim's servers can support
and making the servers crash. Sometimes, many computers are
entrenched in this process
by installing a Trojan on them; taking control of them and then
making them send numerous demands to the targeted computer. On
the other side, the victim of such an attack may see many suchdemands (sometimes even numbering tens of thousands) coming
from computers from around the world. Unfortunately, to be able to
gain control over a malicious denial-of-service attack would require
tracing all the computers involved in the attack and then informing
the owners of those systems about the attack. The compromised
system would need to be shut down or then cleaned. This process,
which sounds fairly simple, may prove very difficult to achieve across
national and later organizational borders.
Even when the source(s) of the attack are traced there are many
problems, which the victim may be faced with. He will need to inform
all the involved organizations in control of the attacking computers
and ask them to either clean the systems or shut them down. Across
international boundaries this may prove to be a titanic task. The staff
of the organization may not understand the language. They may not
be present if the attack were to be launched during the night or
during weekends.
8/7/2019 TRACKING CYBER CRIMES
52/61
The computers that may have to be shut down may be vital for their
processes and the staff may not have the authority to shut them down.
The staff may not understand the attack, system administration,
network topology, or any number of things that may delay or halt
shutting down the attacking computer's. Or, more simply, the
organization may not have the desire to help.
If there are hundreds or even thousands of computers on the attack,
with problems like the ones mentioned above, the victim may not be
able to stop the attack for days by which time the damage would havebeen done. His servers would be completely incapacitated to
administer to so many demands and consequently would crash.
It is very simple for anyone to launch an attack because denial-of-
service tools can easily be procured from the Net. The major versions
of distributed denial of service attack tools are Trinoo (or trin00),
TFN, TFN2K and Stacheldraht. Denial-of-Service tools allow the
attackers to automate and preset the times and frequencies of suchattacks so that the attack is launched and then stopped to be launched
once again later. This makes it very difficult, in fact almost impossible,
to trace the
source of the attack.
8/7/2019 TRACKING CYBER CRIMES
53/61
These tools also provide another service by which the attacking
computer can change its source address randomly thereby making it
seem as if the attack is originating from many thousands of computers
while in reality there may be only a few. Distributed denial-of-service
attacks are a very perturbing problem for law enforcement agencies
mainly because they
are very difficult to trace. In addition, usually these attacks are
directed towards very sensitive systems or networks sometimes even
those that are vital to national security. Sometimes, even when the
perpetrators can be traced, international extradition laws may prove
to be a hitch in bringing them under the authority of the law.
How Can We Prevent Computer Crime?
a. By Educating Everyone.
For example, users and systems operators; people who hold personal
data and the people about whom it is held; people who create
intellectual property and those who buy it; and the criminals. We
must educate people to:
1. Understand how technology can be used to help or hurt others.
2. Think about what it would be like to be the victim of a computer
hacker or computer pirate.
b. By Practicing Safe Computing.
1. Always ask: Who has or may have access to my log-in address?
8/7/2019 TRACKING CYBER CRIMES
54/61
2. Remember: People such as computer hackers and pirates who hurt
others through computer technology are not "cool." They are
breaking the law.
Trafficking may assume different forms. It may be trafficking in
drugs, human beings, arms weapons etc. These forms of trafficking
are going unchecked because they are carried on under pseudonyms.
A racket was busted in Chennai where drugs were being sold under
the pseudonym of honey.
Fraud & Cheating
Online fraud and cheating is one of the most lucrative businesses that
are growing today in the cyber space. It may assume different forms.
Some of the cases of online fraud and cheating that have come to light
are those pertaining to credit card crimes, contractual crimes,
offering jobs, etc.
Financial Crimes
Cyber pornography
Sale of illegal articles
Online gambling
Intellectual Property crimes
Email spoofing
8/7/2019 TRACKING CYBER CRIMES
55/61
Forgery
Cyber Defamation
Cyber stalking
12. Dynamic form of cyber crime-
Speaking on the dynamic nature of cyber crime FBI Director Louis
Freeh has said, "In short, even though we have markedly improved
our capabilities to fight cyber intrusions the problem is growing even
faster and we are falling further behind. The (de)creativity of human
mind cannot be checked by any law. Thus the only way out is the
liberal construction while applying the statutor
1.to prevent cyber stalking avoid disclosing any information
pertaining to oneself. This is as good as disclosing your identity to
strangers in public place.
2.always avoid sending any photograph online particularly to
strangers and chat friends as there have been incidents of misuse of
the photographs.
8/7/2019 TRACKING CYBER CRIMES
56/61
3.always use latest and up date anti virus software to guard against
virus attacks.
4.always keep back up volumes so that one may not suffer data loss in
case of virus contamination
5.never send your credit card number to any site that is not secured,
to guard against frauds.
6.always keep a watch on the sites that your children are accessing to
prevent any kind of harassment or depravation in children.
7.it is better to use a security programme that gives control over thecookies and send information back to the site as leaving the cookies
unguarded might prove fatal.
8.web site owners should watch traffic and check any irregularity on
the site. Putting host-based intrusion detection devices on servers
may do this.
9.use of firewalls may be beneficial.
8/7/2019 TRACKING CYBER CRIMES
57/61
10. web servers running public sites must be physically separate
protected from internal corporate network.
Adjudication of a Cyber Crime - On the directions of the Bombay High
Court the Central Government has by a notification dated 25.03.03 has
decided that the Secretary to the Information Technology Department
in each state by designation would be appointed as the AO for each
state.
CONCLUSION:
Capacity of human mind is unfathomable. It is not possible to
eliminate cyber crime from the cyber space. It is quite possible to
check them. History is the witness that no legislation has succeeded in
totally eliminating crime from the globe. The only possible step is tomake people aware of their rights and duties (to report crime as a
collective duty towards the society) and further making the
application of the laws more stringent to check crime. Undoubtedly
the Act is a historical step in the cyber world. Further I all together do
not deny that there is a need to bring changes in the Information
Technology Act to make it more effective to combat cyber crime. I
would conclude with a word of caution for the pro-legislation school
that it should be kept in mind that the provisions of the cyber law are
not made so stringent that it may retard the growth of the industry
and prove to be counter-productive.
Hacking
8/7/2019 TRACKING CYBER CRIMES
58/61
Hacking in simple terms means an illegal intrusion into a computer
system and/or network. There is an equivalent term to hacking i.e.
cracking, but from Indian Laws perspective there is no difference
between the term hacking and cracking. Every act committed towards
breaking into a computer and/or network is hacking. Hackers write
or use ready-made computer programs to attack the target computer.
They possess the desire to destruct and they get the kick out of such
destruction. Some hackers hack for personal monetary gains, such as
to stealing the credit card information, transferring money from
various bank accounts to their own account followed by withdrawal of
money. They extort money from some corporate giant threatening
him to publish the stolen information which is critical in nature.
REFERENCES:
GOOGLEENCYCLOPEDIA
AUSTRALIAN CYBER POLICE DEPARTMENT
For the sake of convenience the readers are requested to read sections 43, 65, 66,67 of the
Information Technology Act.
15. Sify News 14.03.03
ACKNOWLEDGES:
I THANK THE ALMIGHTY GOD AND MY PARENTS FOR
SUPPORTING ME.
I WOULD LIKE TO SINCERELY THANK MY COLLEGE FOR
GIVING ME AN OPPUNITY.
8/7/2019 TRACKING CYBER CRIMES
59/61
I ALSO THANK MY LECTURER MR.RAJENDER(EDC) FOR
CHOOSING US AN GIVING US GUIDENCE WITHOUT WHOMTHIS WOULD NEWER HAPPEN AT ALL.
LAST BUT NOT THE LEAST MY FRIEND NISHANTH FOR HIS
STRIVING EFFORTS AND ALL MY FRIENDS WHO ARE PAYING
VALUABLE ATTENTION LISTENING TO US.
THANK YOU
8/7/2019 TRACKING CYBER CRIMES
60/61
8/7/2019 TRACKING CYBER CRIMES
61/61
Formatted: Font: Verdana, 9 pt