Anda di halaman 1dari 64

Presented By Ms. VEENA Asst. Prof.

Faculty of Law IFHE, Hyderabad

Trust A Paradox

People are happy to surrender a credit card to unknown waiter but reluctant to enter details on an encrypted website.

Computers store huge amounts of data in small spaces Ease of access Complexity of technology Human error One of the key elements that keeps most members of any society honest is fear of being caught the deterrence factor.

Cyberspace, firstly, offers the criminal an opportunity of attacking his victims from the remoteness of a different continent and secondly, the results of the crime are not immediately apparent. The anonymity of cyberspace makes identity tracing a significant problem which hinders investigations.

Business attacks Financial attacks Terrorist attacks Grudge attacks Fun attacks

Computer used to commit a crime

Child porn, threatening email, assuming someones identity, sexual harassment, defamation, spam, phishing

Computer as a target of a crime


Viruses, worms, industrial espionage, software piracy,

Hacking/cracking, network intrusion Harassment and cyberstalking insider crimes Employee misconduct Child porn Pirated software

Basically, any crime that is aided or abetted by a computer

Crime against Government

Crime against property

Crime against persons

Cyber crimes
Web jacking

Hacking

Information Theft

E-mail bombing

Salami attacks

Denial of Service attacks

Trojan attacks

Any crime in which computer-related technology is encountered. The commission of illegal acts through the use of a computer or against a computer system.

unlawful acts wherein the computer is either a tool or target or both

Cybercrime has shown itself as a serious threat to society for less than a decade. The first recorded cyber crime took place in the year 1820! The era of modern computers, however, began with the analytical engine of Charles Babbage

In 1820, Joseph-Marie Jacquard, a textile manufacturer in France, produced the loom. This device allowed the repetition of a series of steps in the weaving of special fabrics. This resulted in a fear amongst Jacquard's employees that their traditional employment and livelihood were being threatened. They committed acts of sabotage to discourage Jacquard from further use of the new technology. This is the first recorded cyber crime!

Credit card frauds Cyber pornography Sale of illegal articles-narcotics, weapons, wildlife Online gambling Intellectual Property crimes- software piracy, copyright infringement, trademarks violations, theft of computer source code Cyber stalking (section 509 IPC) Phishing Email spoofing Forgery Defamation

A thief somehow breaks into an eCommerce server and gets hold of credit numbers and related info The thief then uses that info to order stuff on the Internet Alternatively, the thief may auction the credit card info on certain Web sites setup just for that purpose
Defense: Use single-use credit card numbers for your Internet transactions

Software piracy, copyright infringement, trademarks violations, theft of computer source code etc for e.g Email spoofing Email spoofing: A spoofed email is one that appears to originate from one source but actually has been sent from another source. Defense: Various authentication schemes. They, however, are seldom used as they generally annoy the genuine users Bharti Cellular Ltd. filed a case in the Delhi High Court that some cyber squatters had registered domain names such as barticellular.com and bhartimobile.com with Network solutions under different fictitious names. The court directed Network Solutions not to transfer the domain names in question to any third party and the matter is sub-judice.

This occurs when defamation takes place with the help of computers and / or the Internet. E.g. someone publishes defamatory matter about someone on a website or sends emails containing defamatory information to all of that person's friends. Indias first case of cyber defamation was reported when a companys employee started sending derogatory, defamatory and obscene e-mails about its Managing Director. The emails were anonymous and frequent, and were sent to many of their business associates to tarnish the image and goodwill of the company. The company was able to identify the employee with the help of a private computer expert and moved the Delhi High Court. The court granted an ad-interim injunction and restrained the employee from sending, publishing and transmitting e-mails, which are defamatory or derogatory to the plaintiffs.

Identity theft occurs when somebody steals a personal name and other personal information for fraudulent purposes. Identity theft is a form of identity crime where somebody uses a false identity to commit a crime. It involves stealing victims personal information and credentials, often to make purchases. It is an act of impersonating another by means of using the persons information, such as birth date, Social Security number, address, name, and bank account information.

"Phishing is a form of online identity theft that employs both social engineering and technical subterfuge to steal consumers' personal identity data and financial account credentials. Socialengineering schemes use 'spoofed' e- mails to lead consumers to counterfeit websites designed to trick recipients into divulging financial data such as account usernames and passwords. Hijacking brand names of banks, e-retailers and credit card companies, phishers often convince recipients to respond.

A fake Web store (e.g. an online bookstore) is built Customers somehow find that Website and place their orders, giving away their credit card info in the process
The collected credit card info is either auctioned on the Web or used to buy goods and services on the Web

Lack of understanding Lack of physical evidence Lack of recognition of assets Lack of political impact Complexity of case Juveniles

Multinational activity Complexity

No international laws for computer crimes

Networked attacks hard to trace

Internet does not know any geographical boundaries, therefore jurisdiction is a key issue when prosecuting the cyber-criminal

Technological measures-Public key cryptography, Digital signatures ,Firewalls, honey pots Cyber investigationComputer forensics is the process of identifying, preserving, analyzing and presenting digital evidence in a manner that is legally acceptable in courts of law.

These rules of evidence include admissibility (in courts), authenticity (relation to incident), completeness, reliability and believability. Legal framework-laws & enforcement

Criminals dont use their own computers


Floppy disks Zip/Jazz disks Tapes Digital cameras Memory

sticks Printers CDs PDAs Game boxes Networks Hard drives

You pay for Spam, not Spammers


Email costs are paid by email recipients

Spam can be dangerous


Never click on the opt-out link!
May take you to hostile web site where mouse-over downloads an .exe

Tells spammers they found a working address They wont take you off the list anyway

What should you do?


Filter it out whenever possible Keep filters up to date If you get it, just delete the email

Different types of ailments Viruses

software that piggybacks on other software and runs when you run something else Macro in excel, word An .exe, .com file in your email
Transmitted through sharing programs on bulletin boards Passing around floppy disks

Worms

software that uses computer networks to find security holes to get in to your computer usually in Microsoft OS!! But worm for MAC was recently written

Self-replicating SW that eludes detection and is designed to attach itself to other files
Infects files on a computers through:
Floppy disks, CD-ROMs, or other storage media The Internet or other networks

Viruses cause tens of billions of dollars of damage each year One such incident in 2001 the LoveBug virus had an estimated cleanup/lost productivity cost of US$8.75 billion The first virus that spread world-wide was the Brain virus, and was allegedly designed by someone in Lahore

Malicious

The type that grabs most headlines May destroy or broadcast private data May clog-up the communication channels May tie-up the uP to stop it from doing useful work

Neutral Helpful

May display an annoying, but harmless message

May hop from one computer to another while searching for and destroying malicious viruses

Unlike viruses, they are stand-alone programs The look like what they are not
They appear to be something interesting and harmless (e.g. a game) but when they are executed, destruction results

Logic bomb - A logic bomb is an attack triggered by an event, like computer clock reaching a certain date. Chernobyl and Melissa viruses are the recent examples

It executes its payload when a predetermined event occurs Example events:


A particular word or phrase is typed

A particular date or time is reached

Harmless in the sense that they only make copies of themselves on the infected computer
Harmful in the sense that it can use up available computer resources (i.e. memory, storage, processing), making it slow or even completely useless

Root kit: set of programs designed to allow an adversary to surreptitiously gain full control of a targeted system while avoiding detection and resisting removal, with the emphasis being on evading detection and removal Botnet: set of compromised computers ("bots" or "zombies") under the unified command and control of a "botmaster;" commands are sent to bots via a command and control channel (bot commands are often transmitted via IRC, Internet Relay Chat). Spyware: assorted privacy-invading/browserperverting programs Malware: an inclusive term for all of the above -"malicious software"

Stealing data

Deleting data for fun


To commit crimes Take down networks Distribute porn Harass someone

Industrial Espionage Identity theft Defamation

Turning computers into zombies

A lot of bored 16 year olds late at night

Ethical/white hat hackers exist too

Help break into networks to prevent crimes

Hacking has been defined as "Deliberately gaining unauthorized access to an information system." Includes offences related to:
Illegal access Illegal interception Data interference System interference Misuse of devices

A number of Internet credit card schemes involve computer hacking as the means of accessing the numbers

Obscenity in electronic form

Obscenity in physical form

Vs

Ingredients

Punishment is stringent under I T Act 2000 Recent Indian incidents revolving around cyber pornography include the Air Force Balbharati School case. In the first case of this kind, the Delhi Police Cyber Crime Cell registered a case under section 67 of the IT act, 2000. A student of the Air Force Balbharati School, New Delhi, was teased by all his classmates for having a pockmarked face.

Publishing or transmitting or causing to be published in the electronic form, Obscene mater

He decided to get back at his tormentors. He created a website at the URL www.amazinggents.8m.net. The website was hosted by him on free web space. It was dedicated to Air Force Bal Bharti School and contained text material. On this site, lucid, explicit, sexual details were given about various sexy girls and teachers of the school. Girls and teachers were also classified on the basis of their physical attributes and perceived sexual preferences. The website also became an adult boys joke amongst students.

This continued for sometime till one day, one of the boys told a girl, featured on the site, about it. The father of the girl, being an Air Force officer, registered a case under section 67 of the IT Act, 2000 with the Delhi Police Cyber Crime Cell. The police picked up the concerned student and kept him at Timarpur (Delhi) juvenile home. It was almost after one week that the juvenile board granted bail to the 16- yearold student.

In another incident, in Mumbai a Swiss couple would gather slum children and then would force them to appear for obscene photographs. They would then upload these photographs to websites specially designed for pedophiles. The Mumbai police arrested the couple for pornography.

This connotes the usage by an unauthorized person of the Internet hours paid for by another person. In May 2000, the economic offences wing, IPR section crime branch of Delhi police registered its first case involving theft of Internet hours. In this case, the accused, Mukesh Gupta an engineer with Nicom System (p) Ltd. was sent to the residence of the complainant to activate his Internet connection. However, the accused used Col. Bajwas login name and password from various places causing wrongful loss of 100 hours to Col. Bajwa. Delhi police arrested the accused for theft of Internet time.

On further inquiry in the case, it was found that Krishan Kumar, son of an ex army officer, working as senior executive in M/s Highpoint Tours & Travels had used Col Bajwas login and passwords as many as 207 times from his residence and twice from his office. He confessed that Shashi Nagpal, from whom he had purchased a computer, gave the login and password to him.

The police could not believe that time could be stolen. They were not aware of the concept of time-theft at all. Colonel Bajwas report was rejected. He decided to approach The Times of India, New Delhi. They, in turn carried a report about the inadequacy of the New Delhi Police in handling cyber crimes. The Commissioner of Police, Delhi then took the case into his own hands and the police under his directions raided and arrested Krishan Kumar under sections 379, 411, 34 of IPC and section 25 of the Indian Telegraph Act.

This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website. In a recent incident reported in the USA the owner of a hobby website for children received an e-mail informing her that a group of hackers had gained control over her website. They demanded a ransom of 1 million dollars from her. The owner, a schoolteacher, did not take the threat seriously. She felt that it was just a scare tactic and ignored the e-mail.

It was three days later that she came to know, following many telephone calls from all over the country, that the hackers had web jacked her website. Subsequently, they had altered a portion of the website which was entitled How to have fun with goldfish. In all the places where it had been mentioned, they had replaced the word goldfish with the word piranhas. Piranhas are tiny but extremely dangerous flesheating fish. Many children had visited the popular website and had believed what the contents of the website suggested. These unfortunate children followed the instructions, tried to play with piranhas, which they bought from pet shops, and were very seriously injured!

Online auction fraud typically involves several recurring approaches. The most common approach appears to be the offering of some valuable item, such as computers, highpriced watches, or collectible items, through a known online auction site. The individuals who are informed that they are successful bidders send their money to the seller, but never receive the promised merchandise

These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the banks servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizeable amount of money every month.

Use anti-virus software and firewalls - keep them up to date Keep your operating system up to date with critical security updates and patches Don't open emails or attachments from unknown sources Use hard-to-guess passwords. Dont use words found in a dictionary. Remember that password cracking tools exist Back-up your computer data on disks or CDs often

Don't share access to your computers with strangers

If you have a wi-fi network,


password protect it Disconnect from the Internet when not in use Reevaluate your security on a regular basis Make sure your employees and family members know this info.

You should always look out for a padlock symbol located on the bottom bar of your browser before transmitting your card details. Clicking on the icon will indicate the page is secure, preventing your confidential details being seen by anyone else. Be wary of websites that require your card details up front before you actually place an order and find a mailing address for the company. Ask friends, family and work colleagues what sites they have found to be good and bad. Shop with names you know you can trust, major high street names have a duty to protect the security of their customers.

To stop getting junk mail or spam as it is otherwise known be careful to make sure you tick or untick the appropriate boxes when filling out forms. Information and anti-spam software that can be used to stop junk e-mails can be found by searching the Internet. Common unsubscribe requests are often a ploy to get your e-mail address and then send on more spam. Do not pass the mail on to friends and ignore chain letters

Although the rise of ID fraud is very alarming, there are steps you can take to try to protect yourself. Carelessly discarding personal details is an easy way to become a victim. Criminal gangs have been known to employ homeless people to search through rubbish bins for financial records and identity documents.

Identity fraud is not only committed using stolen paper documents, it also operates over the internet. If you receive an e-mail purporting to be from your bank or credit card provider which asks you to update your details, it is likely to be a "phishing" scam. If customers fall for the scam, the fraudsters can gain access to their bank accounts or use them to launder money.

More cyber criminals than cyber cops Criminals feel safe committing crimes from the privacy of their own homes Brand new challenges facing law enforcement

to existing laws

Most not trained in the technologies Internet crimes span multiple jurisdictions Need to retrofit new crimes

forensic scientist Lawyers Computer security professional law enforcement agencies SETTING UP A CYBER CRIME INVESTIGATION CELL To prevent the various cyber crimes that take place every day it is essential to establish a dedicated cell. Need for a Cyber Forensic Cell

The employment of a set of predefined procedures to thoroughly examine a computer system using software and tools to extract and preserve evidence of criminal activity. --The SANS (SysAdmin, Audit,
Network, Security) Institute

The application of computer investigation and analysis techniques in the interests of determining potential legal evidence." -- Judd Robbins (Computer
Forensics Investigator)

The science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media.

The Federal Bureau of Investigation

An autopsy of a computer or network to uncover digital evidence of a crime Evidence must be preserved and hold up in a court of law

Growing field Many becoming computer forensic savvy

FBI, State and Local Police, IRS, Homeland Security Defense attorneys, judges and prosecutors Independent security agencies White hat or Ethical Hackers Programs offered at major universities

Criminals Hide Evidence

Not obvious.its most likely hidden on purpose or needs to be unearthed by forensics experts

Delete their files and emails Hide their files by encryption, password protection, or embedding them in unrelated files (dll, os etc) Use Wi-Fi networks and cyber cafes to cover their tracks

Forensics Uncover Evidence


Restore deleted files and emails they are still really there!
Find the hidden files through complex password, encryption programs, and searching techniques Track them down through the digital trail - IP addresses to ISPs to the offender

Similar to traditional crime scenes

Must acquire the evidence while preserving the integrity of the evidence
No damage during collection, transportation, or storage Document everything Collect everything the first time

Establish a chain of custody

But also different.


Can perform analysis of evidence on exact copy! Make many copies and investigate them without touching original Can use time stamping/hash code techniques to prove evidence hasnt been compromised

All existing data in the computer's directory structure. Any deleted files which have not yet been overwritten by the operating system. Deleted emails. Pages recently printed on the suspect's printer. Renamed files. Application software. Specific words, numbers, etc. Recently accessed web sites. Passwords to commonly used programs/websites. Password protected files.

Never mishandle the evidence Never work on the original evidence Never trust the SUBJECTS operating system Document all the findings. Results should be repeatable, reproducible and verifiable by third party.

To prevent cyber stalking avoid disclosing any information pertaining to oneself. Always avoid sending any photograph online Always use latest and up date anti virus software to guard against virus attacks. Always keep back up volumes so that one may not suffer data loss in case of virus contamination Never send your credit card number to any site that is not secured, to guard against frauds.

Always keep a watch on the sites that your children are accessing It is better to use a security programme that gives control over the cookies web site owners should watch traffic and check any irregularity on the site. Use Almost all hackers can be deterred with commonsense policies. Although the largest threat is often from within an organization i.e. - employees / students, it is essential that any computer network has properly configured firewall protection as well as intrusion detection and other filtering software. of firewalls may be beneficial

Is the email from someone that you know? Have you received email from this sender before? Were you expecting email with an attachment from this sender? Does email from the sender with the contents as described in the Subject line and the name of the attachment(s) make sense? Does this email contain a virus? To determine this, you need to install and use an anti-virus program.

Designing, writing, or propagating malicious code


or participating in any of the fore-mentioned activities

can result in
criminal prosecution, which in turn, may lead to jail terms and fines!

The recently reported case of a Bank Fraud in Pune in which some ex employees of BPO arm of MPhasis Ltd MsourcE, defrauded US Customers of Citi Bank to the tune of RS 1.5 crores has raised concerns of many kinds including the role of "Data Protection

The complainant has received a threatening email demanding protection from unknown person claiming to be the member of Halala Gang, Dubai. Police registered a case u/s. 384/506/511 IPC.
The sender of the email used the email ID xyz@yahoo.com & abc@yahoo.com and signed as Chengez Babar

Mumbai Cyber lab is a joint initiative of Mumbai police and NASSCOM more exchange and coordination of this kind amendments to the IT Act,2000-new provisions for child pornography, cyber terrorism, cyber cafeetc More Public awareness campaigns Training of police officers to effectively combat cyber crimes More Cyber crime police cells set up across the country Effective E-surveillance Websites aid in creating awareness and encouraging reporting of cyber crime cases. Specialised Training of forensic investigators and experts Active coordination between police and other law enforcement agencies and authorities is required.

Make sure you have a good anti-virus software which regularly runs scanning programmes for spy ware, a personal firewall and a spam filter Never keep passwords stored on your computer, or disclose them to anybody If you are accessing banking details from a computer that is used by other people, ensure you do not click on "save" password, as another user could gain access Check your bank statements and receipts carefully to ensure there are no fraudulent transactions

Obviously computer crime is on the rise, but so is the awareness and ability to fight it. Law enforcement realizes that it is happening more often than it is reported and are doing there best to improve existing laws and create new laws as appropriate. The problem is not with the awareness or the laws, but with actually reporting that a crime has occurred. Hopefully people will begin to realize that unless they report these crimes and get convictions, those committing computer crimes will continue to do so. Need new laws and upgraded technology to combat cyber crimes Cyber crime has become one of the major security issues for the law enforcement community.
CYBERSPACE IS SAFE TO USE AND UNSAFE TO MISUSE

Anda mungkin juga menyukai