Professional Documents
Culture Documents
net/publication/307594049
CITATIONS READS
2 27,390
3 authors, including:
Some of the authors of this publication are also working on these related projects:
Network security, mobile network, cyber security, cyber crime, ADHOC , viruses, security issues in network View project
HCI, face recognition, face detection, emotion recognition, Computer vision, image processing, PCA, cyberspace, cybercrime, network security, phishing View project
All content following this page was uploaded by Ushamary Sharma on 03 September 2016.
Abstract
Today, Cybercrime has caused lot of damages to individuals, organizations and even the Government.
Cybercrime detection methods and classification methods have came up with varying levels of success
for preventing and protecting data from such attacks. Several laws and methods have been introduced
in order to prevent cybercrime and the penalties are laid down to the criminals. However, the study
shows that there are many countries facing this problem even today and United States of America is
leading with maximum damage due to the cybercrimes over the years. According to the recent survey
carried out it was noticed that year 2013 saw the monetary damage of nearly 781.84 million U.S.
dollars. This paper describes about the common areas where cybercrime usually occurs and the
different types of cybercrimes that are committed today. The paper also shows the studies made on e-
mail related crimes as email is the most common medium through which the cybercrimes occur. In
addition, some of the case studies related to cybercrimes are also laid down.
Keywords- financial crimes, cyber stalking, telecommunication frauds, e-mail related crimes, cyber
criminals, email spoofing, email bombing.
copyrighted materials. When the creators of a to the amount of damages and losses it cause,
particular work are not able to gain profit from whereas the penalties of extortion are covered
their own creations, it leads to severe financial by the laws and rules of this type of felony.
loss and a great effect on creative efforts
F. Fraud in Sales and Investments
generally.
[8]The use and development of applications in
C. Dissemination of Offensive Materials
digital technology becomes more fraudulent
[8][10]These are the materials that are thought and is bound to increase as the electronic
to be objectionable and exist in the commerce becomes more and more prevalent.
cyberspace. [8]It includes materials which are Cyberspace has now availed a lot of
of sexually explicit in nature, racist investment opportunities like bonds or stocks,
propaganda, explosive objects and devices, sale and leaseback of automatic teller
and codes for fabrication of the incendiary machines, telephone lotteries etc.
devices. Telecommunication services are also [11]Fraudsters may use a wide variety of tools
commonly used to harass, threaten and intrude to spread their information on the Internet.
the communications from phone calls to They may create fake websites to appear
contemporary manifestation of cyber stalking. legalized. [12]According to U.S. Securities
Computer networks can also prove to be of use and Exchange Commission, some of the
in furtherance-of extortion. [10] The type of investment scams that are targeted on
materials used, the location of the criminal Americans are:
who is disseminating the materials, and the
High-return or “risk –free”
victim’s location all define the amount of fines
investments,
and penalties to be paid.
D. Laundering E-money and Evasion of
Pyramid Schemes and
Taxes “Ponzi” schemes.
[8]For quite a while, electronic funds transfers G. Illegal Interception of Telecoms Signals
have been assisting in hiding and
transportation of crimes. The origin of ill- [5]The great and fast development in
gotten gains will greatly be concealed by the telecommunications allows new opportunities
emerging technologies today. Taxation for electronic eavesdropping. [8] It ranges
authorities may easily conceal those from the activities of surveillance of an
legitimately derived income. Central bank individual to industrial and political espionage.
supervision will be bypassed by the The existing laws today, does not prevent one
development of the informal banking from monitoring a computer radiation from a
institutions or the parallel banking systems. distance.
[11] There is no separate law for this type of H. Fraud in Transfer of Electronic Funds
crime committed using computer and a
[8]Electronic transfer systems are
network, but it falls directly under the laws
proliferating, and the same goes with the risks
which cover these offenses in general.
that such type of transactions may be
E. Extortion, Terrorism and Electronic intercepted or diverted. [13] There is no doubt
Vandalism that the E-fund transfer system has sudden and
[8]Unlike before, the western society of wide acceptance globally. With the usage of
industries is depending upon a complex data electronic fund transfer system, there is no
processing and the telecommunications doubt that this system will enhance the risk.
systems. Hampering or damaging these The transfer of funds over the Internet may be
systems can lead to destructive consequences. diverted by the hackers. E-transfer is highly
[11]Vandalism in general can be considered as vulnerable in terms of crimes such as thefts
the denial of service attacks, bot-nets, or and frauds.
several other harmful network attacks. There is no doubt that the technology in
Extortion is the act of demanding the cease of business service has benefitted both the
an attack or the refrain of initiating an attack business and the consumers to a greater
by means of money. The penalties for
extend. However, there is a darker side of this
computer vandalism differs greatly according
technological advancement as well due to [15] In its further investigation, Symantec was
Cybercrimes. Even though the organizations successfully able to acquire the data including
are aware of the types of cybercrimes; it is the number of bot-infected systems. These
actually very difficult for them to understand systems were meticulously controlled by the
the capacity of cybercriminals. It is indeed cybercriminals.
quite challenging for the organizations to
The higher rate of cybercrime was found to be
understand the cybercriminal’s next target and
in the United States of America. This could be
the value of their target. By the time the
because the country is well facilitated with the
organizations understand they were targeted, it
broadband connection providing uninterrupted
is already late and the damage has already
internet connection.
incurred. Even though, organizations are
taking efforts to prevent such cybercrimes, yet Table 1 shows the countries that had been the
they fall into the hands of the cybercriminals. victims of cybercrimes such as sharing
malicious computer activities, spam messages,
The graph in Fig.1 shows [14] the statistics of
phishing etc. The table 1 shows, the six
the total amount of monetary damage caused
by having cybercrime from 2001 to 2013. This factors;
statistics was reported to IC3. In the year i. Share of malicious computer activity,
2001, the total amount of loss incurred was
17.8 million U.S. dollars. Year 2009 showed a ii. Malicious code rank,
hike of about 559.7 million U.S. dollars and
iii. Spam zombies rank,
later by 2013 the monetary damage grew to
781.84 million U.S. dollars which is certainly iv. Phishing web site hosts rank,
alarming.
v. Bot rank and
vi. Attack origin,
These factors contribute to authenticate its
cybercrime ranking as conducted by Symantec
security organization. [15]
TABLE I. COUNTRY LISTS WITH SIX
CONTRIBUTING FACTORS TO CYBERCRIME [15]
From the pie chart given at Fig. 2, it is quite are exposed to the world and some are hidden
evident that United States of America had until they are perpetrated against someone or
suffered a lot due to cybercrime. The loss that some company-
had incurred has been tremendous other A. E-mail related crimes-
countries as well. China stands at the second Electronic mail has rapidly become the
position. Then the countries like Germany and world’s most preferred means of
Britain stood next, who had to bear the loss, communication. Across the globe, millions of
occurred due to cybercrime. Countries like e-mail messages are sent and received every
Brazil, Spain share almost the same percentage day. E-mail, like any other means of
of cybercrime happening. Similarly, Italy, communication, is also being misused by
criminals. It has become a powerful tool for
France, Turkey and Poland stands with the
criminals due to the ease, the speed of transfer
same percentage of cybercrime caused at their and its relative anonymity.
countries respectively. India share 3% of the
1) E-mail Spoofing: It is found in [8] that
malicious computer activities. Argentina,
an e-mail that appears to originate from one
Australia and Israel share only 1% of the source while it is actually being sent from
malicious computer activities. Mexico has the another source is called e-mail spoofing. E-
highest rank for hosting the phishing websites. mail spoofing is usually committed by
Australia ranks the highest for bot- activities. falsifying the e-mail address of the sender
and/or the name. to send an e-mail, one
usually has to enter the following
informations:
i. The e-mail address of the receiver.
ii. The e-mail addresses of the receivers
(referred to as C for carbon copy).
iii. The e-mail addresses of the persons
who will receive a copy (referred
as CC for carbon copy).
iv. A subject for the message, which is a
short title or a short description of
the message.
Figure 2. Top 20 Countries with Cyber
Crime.[15] 2) E-mail Defamation: Cyber defamation
or cyber slander often proves to be very
IV. CRIMES ON THE INTERNET dangerous and even fatal for anyone with even
[8]Crimes committed on the Internet by using a little knowledge of computers to become
the Internet and by means of the same, are blackmailers often by threatening their victims
mainly called Internet crimes. According to through e-mails.
David Wall [2], the term Cybercrime
3) E-mail Bombing: [8]E-mails account (in
symbolizes to the occurrence of the harmful
case of an individual) or servers (in case of a
activities done with the digital devices mainly
company) crashing due to a large amount of e-
over the Internet. The Cyber crime practically
mails received by a victim is called e-mail
doesn’t refer to the law and it is the concept
bombing. This can easily be done by
that is created by the media to a greater
subscribing the victim’s e-mail address to a
extend. In general term computer crime is a
large number of mailing lists which are the
crime that encompasses crimes such as
special interests group created to share and
phishing, bank robbery, credit card frauds,
exchange data and information on a common
child pornography, kidnapping of children by
topic of with one another through the help of
means of chat rooms, creation or the
e-mails. Mailing lists can generate a sufficient
distribution of viruses and so on. All these are
amount of e-mail traffics daily depending on
facilitated crimes related to computers. Some the list. If a person unknowingly subscribes to
crimes which are committed on the Internet
multiple mailing lists, his incoming e-mail option of having a strike against their
traffic becomes too large and can lead to the employers. But now with the increase in
deletion of his account by his service provider. dependence on computers and automation of
processes, disgruntled employers can do a lot
4) Spreading Malicious Codes: The most
more harm to their employers by committing
common and fastest ways to spread malicious
crimes via computers which can bring their
codes are often e-mails. With the help of e-
entire system down.
mail, a virus called The Love Bug, spread to
millions of computers within the 36 hours of D. Professional Hackers
its release from the Philippines. Trojans,
[8] Extensive computerization has led to the
viruses and worms or other computer
storage of information in electronic form in
contaminations are often binded with e-
business organizations. Hackers are employed
greeting cards which are e-mailed to
by rival organizations to steal other industrial
unsuspecting persons.
information and secrets which can prove to be
5) E-mail Frauds: Financial crimes are beneficial for them. [9]If hacking can retrieve
commonly committed trough e-mail spoofing. the required information from rival companies,
It is becoming easier to assume an identity as the fact that physical presence required to gain
well as to hide one’s own identity. The access is considered unnecessary. This also
criminal knows very well that there is leads to the temptation of companies hiring
minimum chance of his being identified. professional hackers to do their dirty jobs.
6) Threats sent via e-mail: From [3], we VI. CASE STUDY
find that the relative anonymity of e-mails
Several cases of cybercrime have occurred
offers technology savvy criminals a useful
recently in India. Some of these are described
tool. Anyone with little knowledge of how to
as follows:
send an e-mail, can easily blackmail or
threaten someone via e-mail without being A. Case I
identified. An event occurred in April 2014, at Allahabad
V. WHO ARE CYBER CRIMINALS? [16], India, where two under-graduate
students, Vivek Kumar alias Kishan Dubey
Cyber criminals range from a wide variety of
and Anand Mishra, were arrested for online
age groups:
fraud. These two students got hold of the ATM
A. Kids(age group 9-16) password of a man named Mahmood and had
indulged themselves in credit card fraud
[9]Although it is hard to believe, kids can also
amounting to Rs. 1.20 lakhs INR. The students
be cyber criminals knowingly or unknowingly.
were arrested and confessed to several of their
The most amateur hackers comprises of
frauds. According to the Police, the two
teenagers. To these teenagers, it appears to be
students would provide Delhi-based addresses
a matter of pride to be able to hack into a
for delivery of goods they had ordered online.
computer system or to a website. They may
Once the goods were delivered they would sell
also commit the crimes without actually
them to gullible buyers. This case had been
knowing that what they are doing is a crime.
registered under IPC Act, section 419 and 420,
B. Organized Hacktivists and under IT Act, section 66.
[9] Hackers who come together with a B. Case II
particular motive are called hacktivists. These
On the context of Cyber Stalking [17], in
groups mostly operate on a political basis.
2013, Police at Cyderabad arrested a youth, N
While in other cases, [3] their motives may be
Santosh Kumar alias Kiran, from Bangalore
social activism or religious activism or any
after he was charged for creating fake profile
other.
of a woman on Facebook. This youth also
C. Disgruntled Employees threatens the woman after she rejected his love
[9] It is hard to imagine how spiteful proposal.
displeased employees can become. Up until Dejected, he made the fake profile and also
now, these displeased employees have the chat with others in her name. He also made
threat calls and send messages to the victim’s These crimes involve spoofing of mail, e-mail
family. A complaint was lodged by the bombing and spreading malicious codes via e-
victim’s brother on August, 2013 with Cyber mails. Furthermore, we have seen the different
Crime Police and the accused was arrested. cyber criminals, ranging from the most
amateur teenage hackers to the professional
C. Case III
hackers that are often hired by rival
This case is on E-mail Spoofing, [18] of late, organizations for hacking the into other
one of the branch offices of the Global Trust company’s system.
Bank experienced a tough time. Many It is therefore very important for every
customers suddenly decided to withdraw their individual to be aware of these crimes and
money and further close their own bank remain alert to avoid any loss. To ensure
accounts. On investigating, it was discovered justice to the victims and punish the criminals,
that someone had sent spoofed emails to these the judiciary has come up with some laws
known as Cyber Laws. Hence, it is advisable
customers and others too mentioning the bank
to each and every individual to know these
was soon getting closed as it is having tough laws. Besides, the cybercrime cannot be
time financially. simply called as a Technological problem.
Instead, it is an Approach based problem
D. Case IV
because it is not the computers that are
[18] This case is about the E mail bombing harming and attacking the organizations
(DoS); this case speaks about a foreigner; he instead it is the humans who are exploiting the
was staying in Simla, India for many years technology to cause the damage. Therefore, it
almost thirty years. He wanted to benefit from is we who need to be alert to figure out the
different approaches that such criminals can
a scheme introduced by the Simla Housing
take. There is a need to have intellectual
Board to buy land at a lower price. However, mindset to sense such situation that may lead
his application was not accepted as they to such damages. The solution to such crimes
mentioned that the scheme is meant only for cannot be simply based on the technology. The
citizens of India. On this, this man decided to technologies can just be one such weapon to
retaliate. Subsequently, he sent out thousands track and put a break to such activities to some
of mails to the Simla Housing Board and extent.
repeatedly kept sending e-mails till their REFERENCES
servers crashed. [1] .en.wikipedia.org/wiki/Crime
VII. CONCLUSION [2] David Wall, “Cyber crimes and Internet”,
From this study made, it has been found that Crime and the Internet, by David S. Wall.
there are many ways and means through which ISBN 0-203-164504 ISBN 0-203-164504,
an individual can commit crimes on cyber Page no.1
space. Cyber crimes are an offense and are [3] searchsoa.techtarget.com/definition/cyber
punishable by law. In section 2, we have seen
[4] www.merriam-
a brief discussion of the enlarging areas of
webster.com/dictionary/cyber
cyber crimes.
[5]Bela Bonita Chatterjee, “Last of the
In section 3, we have seen the common types
rainmacs? Thinking about pornography in
and areas where cyber crime occurs very
cyber space”, Crime and the Internet, by David
frequently. We have also discussed the
S. Wall. ISBN 0-203-164504, Page no.- 74.
consequences of cyber crime that are causing
tremendous financial losses in many countries, [6]www.webopedia.com/TERM/C/cyber_crim
especially in the areas of sales and e.h ml
investments. Different fines and penalties have
[7]www.britannica.com/EBchecked/topic/130
been laid down for this category of crime.
595/ Cybercrime
Section 4 discusses about the different crimes
[8]http://en.wikipedia.org/wiki/Computer_cri
on the net that are related to electronic mails.
me