CS
CS
INTRODUCTION TO CYBERCRIME
2. Introduction Cybercrime:
3. Definition and Origins of the Word
4. Cybercrime and Information Security
5. Who are Cybercriminals?
**Cybercriminals** are individuals or groups who engage in illegal activities
using computers and the internet to commit crimes.
The motivation behind their actions can vary widely, from personal
recognition to financial gain or revenge.
Each type of cybercriminal poses unique risks, and their actions can have far-reaching
consequences for individuals, businesses, and even governments. Would you like to
know more about any particular type or crime?
6. Classifications of Cybercrimes
Crime is defined as an act or the commission of an act that is forbidden
Cybercrimes can be broadly classified into different categories depending on the
target of the criminal activity. Below are the primary classifications:
1. Cybercrime Against Individuals:
These crimes are targeted towards specific individuals with the aim of causing harm
or committing fraud. Examples include:
o E-Mail Spoofing: Sending an email that appears to come from a trusted
source but is actually from a malicious actor, often to harm relationships or
trick the recipient.
o Online Fraud: Phishing(Phishing is the process of collecting your personal
information through e-mails or websites claiming to be legitimate. This
information can include usernames, passwords, credit card numbers, social
security numbers, etc. Often times the e-mails directs you to a website where
you can update your personal information. Because these sites often look
“official,” they hope you’ll be tricked into disclosing valuable information that
you normally would not reveal. This often times, results in identity theft and
financial loss.)
, spyware, viruses,( Spyware and viruses are both malicious programs that are
loaded onto your computer without your knowledge. The purpose of these
programs may be to capture or destroy information, to ruin computer
performance or to overload you with advertising. Viruses can spread by
infecting computers and then replicating. Spyware disguises itself as a
legitimate application and embeds itself into your computer where it then
monitors your activity and collects information) and other forms of fraud
aimed at stealing personal information or financial assets.
o Spamming: (Spamming
Spamming refers to the practice of sending unsolicited, bulk messages across
various electronic communication platforms, primarily for advertising
purposes. People who engage in this activity are known as spammers. Spam is
an abuse of electronic messaging systems and can occur in various forms
across multiple platforms, not just email.
Common Forms of Spam:
Email Spam: The most widely recognized form, where spammers send bulk
messages to email addresses without consent, often for advertising or
malicious purposes.
Instant Messaging Spam: Unsolicited messages sent via platforms like
WhatsApp, Facebook Messenger, or other chat services.
Usenet Newsgroup Spam: Excessive posting in newsgroups, disrupting
discussions with unrelated or irrelevant content.
Search Engine Spam: Manipulating search engine results by using deceptive
techniques to increase a website’s ranking for specific keywords.
Blog and Wiki Spam: Posting irrelevant comments or links to unrelated
products on blogs or wikis to generate traffic or backlinks.
Social Media Spam: Unsolicited promotions or phishing messages posted on
social media platforms, including Twitter, Instagram, and Facebook.
Forum Spam: Mass-posting irrelevant content or links to online forums.
Mobile Messaging Spam: Unrequested bulk SMS or multimedia messages
sent to mobile phone users.
File Sharing Network Spam: Uploading fake or malicious files to file-sharing
platforms.
Video Sharing Spam: Posting irrelevant or promotional comments or videos
on platforms like YouTube.
Junk Fax and Spam over Internet Fax: Sending unwanted promotional
content via fax machines.
Why Spamming is Difficult to Control:
Economic Viability: Spammers incur minimal costs since electronic messaging
systems are generally free or low-cost. Managing mailing lists and sending
bulk messages are inexpensive, making it easy for spammers to profit with
little upfront investment.
Low Barrier to Entry: Due to the ease and low cost of setting up spam
campaigns, almost anyone can start spamming. There is little accountability
or regulation that effectively prevents it.
Volume of Spam: With millions of spammers operating globally, the volume
of unrequested mail or messages becomes overwhelming, further
complicating efforts to curb the practice.
Techniques Often Used by Spammers (and Best Avoided):
To make spam harder to detect and to manipulate web traffic or search
engine rankings, spammers employ various deceptive techniques. These
include:
Repeating Keywords: Overloading a page with the same keyword in hopes of
improving search rankings.
Irrelevant Keywords: Using popular but unrelated keywords to draw traffic to
the page.
Fast Meta Refresh: Automatically redirecting users to a different page shortly
after loading.
Redirection: Sending users to a different URL than what was clicked on.
IP Cloaking: Serving different content to search engine crawlers than to
regular users to manipulate rankings.
Coloured Text on the Same Colour Background: Hiding keywords from users
but making them visible to search engines.
Tiny Text: Using very small font sizes to hide text full of keywords from the
user while search engines index them.
Duplicate Pages: Creating multiple pages with identical content but different
URLs to flood search engine results.
Hidden Links: Inserting links that are not visible to users but can be indexed
by search engines.
Gateway Pages: Using different pages that all lead to the same destination
URL, often in an attempt to boost search engine rankings artificially.
Impact of Spamming:
User Experience: Spam clutters inboxes, search results, social media feeds,
and forums, making it harder for users to find relevant and useful
information.
System Overload: Excessive spamming can overwhelm email servers,
networks, and websites, reducing their performance.
Security Risks: Spam is often used as a vector for phishing attacks, malware
distribution, and other cybercrimes.)
o Cyber Defamation: (
Definition of Defamation:
According to legal definitions, defamation occurs when someone makes or
publishes a statement, whether through spoken words, written text, signs, or
visible representations, intending to harm, or knowing that the statement
could harm, the reputation of another person. Cyber defamation occurs when
these defamatory actions take place through computers or the internet.
Cyber Defamation in Practice:
Online Publications: A person may post defamatory statements on blogs, websites,
or social media platforms, intending to harm someone’s reputation. This could
include spreading false accusations or damaging opinions about an individual or
organization.
Emails and Messages: Sending defamatory content through emails or messages to
third parties is also considered cyber defamation. For instance, an email containing
false allegations sent to an individual’s employer or social circle can lead to
reputational damage.
Social Media Defamation: Defamatory statements on platforms like Facebook,
Twitter, or Instagram can spread quickly and widely, making them particularly
harmful. The rapid sharing nature of these platforms amplifies the effects of such
content.
Discussion Forums: Posting defamatory material in online discussion forums or
newsgroups can also constitute cyber defamation.
Example Scenarios:
1. Website Posting: Someone publishes false, damaging content about an individual or
company on a website or blog. This could be a review or article that accuses the
target of illegal or immoral activities that are untrue.
2. Email Defamation: An individual sends an email to multiple people, falsely claiming
that a person has engaged in criminal activity or unethical behavior, thereby
damaging the recipient's perception of that person.
3. Social Media Slander: A person posts unsubstantiated, harmful claims about
someone on a social media platform, which is then seen by hundreds or even
thousands of people, tarnishing the reputation of the target.
Legal Considerations:
Cyber defamation is a cognizable offense, meaning it can be reported to law
enforcement and investigated as a criminal act. Many countries have laws
specifically addressing cyber defamation or include it within their broader
defamation and cybercrime laws.
Intent: For cyber defamation to be actionable, it must be shown that the individual
responsible for the defamatory statement intended to cause harm or had reason to
believe that the statement would harm the person’s reputation.
Exceptions: Some exceptions apply to defamation claims, including statements made
in good faith, fair criticism, or privileged communications (such as in court or
government proceedings).
Impact:
Cyber defamation can have severe consequences, including:
Reputational Damage: The victim may suffer personal or professional harm, leading
to job loss, strained relationships, or public embarrassment.
Emotional Distress: Being the target of online defamation can cause significant
emotional and psychological harm.
Legal and Financial Ramifications: Both the person responsible for cyber defamation
and the platforms that host the defamatory content may face legal action, resulting
in fines, compensation to the victim, or even criminal penalties in some jurisdictions.
)
Cybercrime against property 1. Credit Card Frauds: Credit card fraud is an inclusive
term for fraud committed using a payment card, such as a credit card or debit card.
The purpose may be to obtain goods or services, or to make payment to another
account which is controlled by a criminal. The Payment Card Industry Data Security
Standard (PCI DSS) is the data security standard created to help businesses process
card payments securely and reduce card fraud. Credit card fraud can be authorised,
where the genuine customer themselves processes a payment to another account
which is controlled by a criminal, or unauthorised, where the account holder does
not provide authorisation for the payment to proceed and the transaction is carried
out by a third party. Credit cards are more secure than ever, with regulators, card
providers and banks taking considerable time and effort to collaborate with
investigators worldwide to ensure fraudsters aren't successful. Cardholders' money is
usually protected from scammers with regulations that make the card provider and
bank accountable. The technology and security measures behind credit cards are
becoming increasingly sophisticated making it harder for fraudsters to steal money.
2. Intellectual Property (IP) Crimes: With the growth in the use of internet these days
the cybercrimes are also growing. Cyber theft of Intellectual Property (IP) is one of
them. Cyber theft of IP means stealing of copyrights, software piracy, trade secrets,
patents etc., using internet and computers. Copyrights and trade secrets are the two
forms of IP that is frequently stolen. For example, stealing of software, business
strategies etc. Generally, the stolen material is sold to the rivals or others for further
sale of the product. This may result in the huge loss to the company who originally
created it. Downloaded by Sriram Kuriseti (sriramkuriseti@gmail.com) lOMoARcPSD|
45814754 Another major cyber theft of IP faced by India is piracy. These days one
can get pirated version of movies, software etc. The piracy results in a huge loss of
revenue to the copyright holder. It is difficult to find the cyber thieves and punish
them because everything they do is over internet, so they erase the data
immediately and disappear within fraction of a second. Internet time theft: Such a
theft occurs when an unauthorized person uses the Internet hours paid for by
another person. Basically, Internet time theft comes under hacking because the
person who gets access to someone else’s ISP user ID and password, either by
hacking or by gaining access to it by illegal means, uses it to access the Internet
without the other person’s knowledge. However, one can identify time theft if the
Internet time has to be recharged often, even when one’s own use of the Internet is
not frequent. The issue of Internet time theft is related to the crimes conducted
through identity theft. Cybercrime against Organization 1. Unauthorized accessing of
Computer: Hacking is one method of doing this and hacking is punishable offense.
Unauthorized computer access, popularly referred to as hacking, describes a criminal
action whereby someone uses a computer to knowingly gain access to data in a
system without permission to access that data. 2. Password Sniffing: Password
Sniffers are programs that monitor and record the name and password of network
users as they login, jeopardizing security at a site. Whoever installs the Sniffer can
then impersonate an authorized user and login to access restricted documents. Laws
are not yet set up to adequately prosecute a person for impersonating another
person online. Laws designed to prevent unauthorized access to information may be
effective in apprehending crackers using Sniffer programs. 3. Denial-of-service Attacks
(DoS Attacks): It is an attempt to make a computer resource (i.e.., information
systems) unavailable to its intended users. In this type of criminal act, the attacker
floods the bandwidth of the victim’s network or 昀椀 lls his E-Mail box with spam mail
depriving him of the services he is entitled to access or provide. The goal of DoS is
not to gain unauthorized access to systems or data, but to prevent intended users
(i.e., legitimate users) of a service from using it. A DoS attack may do the following: 1.
Flood a network with traffic, thereby preventing legitimate network traffic. 2. Disrupt
connections between two systems, thereby preventing access to a service. 3. Prevent
a particular individual from accessing a service. 4. Disrupt service to a specifi c
system or person. 4. Virus attacks/dissemination of Viruses: Computer virus is a
program that can “infect” legitimate (valid) programs by modifying them to include a
possibly “evolved” copy of itself. Viruses spread themselves, without the knowledge
or permission of the users, to potentially large numbers of programs on many
machines. A computer virus passes from computer to computer in a similar manner
as a biological virus passes from person to person. Viruses may also contain malicious
instructions that may cause damage or annoyance; the combination of possibly
Malicious Code with the ability to spread is what makes Downloaded by Sriram
Kuriseti (sriramkuriseti@gmail.com) lOMoARcPSD|45814754 viruses a considerable
concern. Viruses can often spread without any readily visible symptoms. Viruses can
take some typical actions: 1. Display a message to prompt an action which may set of
the virus 2. Delete files inside the system into which viruses enter 3. Scramble data
on a hard disk 4. Cause erratic screen behavior 5. Halt the system (PC) 6. Just
replicate themselves to propagate further harm 5. E-Mail bombing/Mail bombs: E-
Mail bombing refers to sending a large number of E-Mails to the victim to crash
victim’s E-Mail account (in the case of an individual) or to make victim’s mail servers
crash (in the case of a company or an E-Mail service provider). Computer program
can be written to instruct a computer to do such tasks on a repeated basis. In recent
times, terrorism has hit the Internet in the form of mail bombings. By instructing a
computer to repeatedly send E-Mail to a specified person’s E-Mail address, the
cybercriminal can overwhelm the recipient’s personal account and potentially shut
down entire systems. This may or may not be illegal, but it is certainly disruptive. 6.
Salami Attack/Salami technique: These attacks are used for committing financial
crimes. The idea here is to make the alteration so insignificant that in a single case it
would go completely unnoticed; For example a bank employee inserts a program,
into the bank’s servers, that deducts a small amount of money (say Rs. 2/- or a few
cents in a month) from the account of every customer. No account holder will
probably notice this unauthorized debit, but the bank employee will make a sizable
amount every month. 7. Logic Bomb: A Logic Bomb is a piece of often-malicious code
that is intentionally inserted into software. It is activated upon the host network only
when certain conditions are met. Some viruses may be termed as logic bombs
because they lie dormant all through the year and become active only on a particular
date. 8. Trojan Horse: A Trojan Horse, Trojan for short, is a term used to describe
malware that appears, to the user, to perform a desirable function but, in fact,
facilitates unauthorized access to the user’s computer system. 9. Data Diddling: A
data diddling (data cheating) attack involves altering raw data just before it is
processed by a computer and then changing it back after the processing is
completed. Electricity Boards in India have been victims to data diddling programs
inserted when private parties computerize their systems. 10. Newsgroup
Spam/Crimes emanating from Usenet newsgroup: This is one form of spamming. The
word “Spam” was usually taken to mean Excessive Multiple Posting (EMP). The
advent of Google Groups, and its large Usenet archive, has made Usenet more
attractive to spammers than ever. Spamming of Usenet newsgroups actually predates
E-Mail Spam. 11.Industrial spying/Industrial espionage: Spying is not limited to
governments. Corporations, like governments, often spy on the enemy. The Internet
and privately networked systems provide new and better opportunities for
espionage. “Spies” can get Downloaded by Sriram Kuriseti
(sriramkuriseti@gmail.com) lOMoARcPSD|45814754 information about product
finances, research and development and marketing strategies, an activity known as
“industrial spying.” However, cyberspies rarely leave behind a trail. Industrial spying
is not new; in fact it is as old as industries themselves. The use of the Internet to
achieve this is probably as old as the Internet itself. Traditionally, this has been the
reserved hunting field of a few hundreds of highly skilled hackers, contracted by high-
profile companies or certain governments via the means of registered organizations
(it is said that they get several hundreds of thousands of dollars, depending on the
“assignment”). With the growing public availability of Trojans and Spyware material,
even low-skilled individuals are now inclined to generate high volume profit out of
industrial spying. This is referred to as “Targeted Attacks” (which includes “Spear
Phishing”). 12. Computer network intrusions: “Crackers” who are often misnamed
“Hackers can break into computer systems from anywhere in the world and steal
data, plant viruses, create backdoors, insert Trojan Horses or change user names and
passwords. Network intrusions are illegal, but detection and enforcement are
difficult. Current laws are limited and many intrusions go undetected. The cracker
can bypass existing password protection by creating a program to capture logon IDs
and passwords. The practice of “strong password” is therefore important. 13.
Software piracy: This is a big challenge area indeed. Cybercrime investigation cell of
India defines “software piracy” as theft of software through the illegal copying of
genuine programs or the counterfeiting and distribution of products intended to pass
for the original. There are many examples of software piracy: 1. end-user copying:
friends loaning disks to each other, or organizations under reporting the number of
software installations they have made, or organizations not tracking their software
licenses; 2. hard disk loading with illicit means: hard disk vendors load pirated
software; 3. counterfeiting: large-scale duplication and distribution of illegally copied
software; 4. Illegal downloads from the Internet: by intrusion, by cracking serial
numbers, etc. Beware that those who buy pirated software have a lot to lose: getting
untested software that may have been copied thousands of times over, the
software, if pirated, may potentially contain hard-drive-infecting viruses, there is no
technical support in the case of software failure, that is, lack of technical product
support available to properly licensed users, there is no warranty protection, there is
no legal right to use the product, etc. Cybercrime against Society 1. Forgery:
Counterfeit currency notes, postage and revenue stamps, marksheets, etc. can be
forged using sophisticated computers, printers and scanners. Outside many colleges
there are miscreants soliciting the sale of fake mark-sheets or even degree
certificates. These are made using computers and high quality scanners and printers.
In fact, this is becoming a booming business involving large monetary amount given
to student gangs in exchange for these bogus but authentic looking certificates.
Downloaded by Sriram Kuriseti (sriramkuriseti@gmail.com) lOMoARcPSD|45814754
2. Cyberterrorism: Cyberterrorism is a controversial term. Cyberterrorism is the use
of the Internet to conduct violent acts that result in, or threaten, loss of life or
significant bodily harm, in order to achieve political or ideological gains through
threat or intimidation. It is also sometimes considered an act of Internet terrorism
where terrorist activities, including acts of deliberate, large-scale disruption of
computer networks, especially of personal computers attached to the Internet by
means of tools such as computer viruses, computer worms, phishing, and other
malicious software and hardware methods and programming scripts. Web Jacking:
Web jacking occurs when someone forcefully takes control of a website (by cracking
the password and later changing it). Thus, the 昀椀 rst stage of this crime involves
“password sni 昀케 ng”. The actual owner of the website does not have any more
control over what appears on that website. Crimes emanating from Usenet
newsgroup: By its very nature, Usenet groups may carry very offensive, harmful,
inaccurate or otherwise inappropriate material, or in some cases, postings that have
been mislabelled or are deceptive in another way. Therefore, it is expected that you
will use caution and common sense and exercise proper judgment when using
Usenet, as well as use the service at your own risk. Usenet is a popular means of
sharing and distributing information on the Web with respect to specific topic or
subjects. Usenet is a mechanism that allows sharing information in a many to-many
manner. The newsgroups are spread across 30,000 different topics.
Usenet newsgroups, one of the oldest forms of online discussion, allow users to
share and distribute information on a wide range of topics. However, due to its
decentralized and unregulated nature, several risks and crimes are associated with
these groups:
5. **Illegal Activities**: Due to the anonymity and ease of access, Usenet has
sometimes been used to distribute illegal materials, such as pirated software,
unauthorized media content, or even more nefarious content like hacked data or
malware.
In summary, while Usenet is a powerful tool for information sharing, it comes with
inherent risks, and users need to be aware of potential dangers when engaging with
its content.
7. Cybercrime: The Legal Perspectives And Indian Perspective
8. Cybercrimes: Cybercrime and the Indian ITA 2000
### 7. **Cybercrime: The Legal Perspectives and Indian Perspective**
Cybercrime refers to illegal activities carried out using computers, digital devices, or
networks as the primary tools. These crimes can range from identity theft to hacking and
cyberterrorism. With the rapid digital transformation globally, cybercrimes have become
increasingly common and more complex, necessitating robust legal frameworks to combat
them. Below are key points on cybercrime from both global and Indian legal perspectives:
#### **Global Legal Perspectives on Cybercrime:**
- **Legal Frameworks**: Many countries have developed cybercrime laws to prosecute
offenders and safeguard citizens. The **Budapest Convention on Cybercrime** (2001), also
known as the Convention on Cybercrime, is one of the most important international legal
frameworks aimed at harmonizing cybercrime laws globally, fostering international
cooperation, and improving investigative techniques.
- **Common Types of Cybercrime**:
- **Hacking**: Unauthorized access to computer systems to steal or manipulate data.
- **Phishing and Identity Theft**: Fraudulent attempts to obtain sensitive information.
- **Cyber Espionage**: The act of stealing confidential or classified information from
individuals, governments, or corporations for political, financial, or strategic advantage.
- **Cyberterrorism**: The use of digital tools to carry out terrorist attacks, disrupt services,
or threaten national security.
- **Financial Crimes**: Online fraud, money laundering, and cryptocurrency-related
crimes.
- **Challenges**: The global nature of the internet complicates jurisdictional issues, and
cybercrimes often cross national borders. This makes international cooperation crucial for
enforcement and prosecution.
- **Recent Developments**:
- India has also established **CERT-In (Indian Computer Emergency Response Team)** to
monitor and respond to cyber threats.
- With the rise of digital payments, there has been increased focus on strengthening
cybersecurity frameworks, including the introduction of guidelines by the **Reserve Bank of
India (RBI)** to protect banking infrastructure from cyber fraud.
- **Cybercrime Units**: Several states have dedicated cybercrime units to handle online
fraud, identity theft, and digital crime investigations.
- **Challenges in India**:
- **Jurisdictional Issues**: Since cybercrimes can be committed from anywhere in the
world, determining jurisdiction is challenging.
- **Lack of Awareness**: Many citizens are not aware of their rights or the legal remedies
available to them in case of cybercrime.
- **Low Conviction Rates**: Despite growing cybercrime rates, conviction rates remain low
due to the technical complexity of investigations and evidence gathering.
---
The **Information Technology Act, 2000 (ITA 2000)** is the cornerstone legislation
governing cybercrime and electronic commerce in India. It was enacted to provide legal
recognition to electronic transactions, digital signatures, and protect data privacy. Over time,
it has evolved to cover a wide range of cybercrimes as the digital landscape and threat
vectors expanded.
5. **Cyberterrorism**:
- **Section 66F** addresses acts of cyber terrorism, such as hacking into government
systems or spreading fear and chaos through cyber means. Cyberterrorism is punishable by
life imprisonment.
6. **Child Pornography**:
- **Section 67B** makes it illegal to publish, share, or transmit child pornography
electronically. Offenders can face imprisonment up to 5 years for the first conviction and 7
years for subsequent convictions.
- **2008 Amendment**: This significantly enhanced the scope of the IT Act, covering newer
forms of cybercrimes like identity theft, cyber terrorism, and phishing. The amendment also
lowered penalties for some offenses and introduced safeguards for intermediaries, including
internet service providers (ISPs).
---
The Indian ITA 2000 continues to be a crucial tool in combating cybercrime, but there is an
ongoing need to adapt to new cyber threats through legal amendments and improved cyber
literacy among law enforcement and the public.
The 5P Netizen mantra for online security is: a. Precaution b. Prevention c. Protection d.
Preservation e. Perseverance
For ensuring cyber safety, the motto for the “Netizen” should be “Stranger is Danger!” If
you protect your customer’s data, your employee’s privacy and your own company, then
you are doing your job in the grander scheme of things to regulate and enforce rules on
the Net through our community. NASSCOM urges that cybercrime awareness is
important, and any matter should be reported at once. This is the reason they have
established cyberlabs across major cities in India More importantly, users must try and
save any electronic information trail on their computers. That is all one can do until laws
become more stringent or technology more advanced. Some agencies have been
advocating for the need to address protection of the Rights of Netizens. There are
agencies that are trying to provide guidance to innocent victims of cybercrimes.
However, these NGO like efforts cannot provide complete support to the victims of
cybercrimes and are unable to get the necessary support from the Police. There are also
a few incidents where Police have pursued false cases on innocent IT professionals. The
need for a statutorily empowered agency to protect abuse of ITA 2000 in India was,
therefore, a felt need for quite some time.