Chapter No - 3
Chapter No - 3
Cybercrime
Learning 0bjectives
After reading this chapter. you will able to:
overview of cybercrime scenario
Leam what cybercrime is and appreciate the Get an
in Indi as well as the overall global
importanae of cybercrime as the topic.
Understand the different types perspective.
of cybercrime. Understand the legal perspective on cyber-
Understand the difference between cybercrime
crime including the
Indian ITA 2000 and
and cyberfraud.
as the ITA
Learn about different ypes of cybercriminals its latest amendment known
and the motives behind them. 2008.
1.1 Introduction
statistics on Indian growth for
Almost everyone is aware of the phenomenal growth of the Internet (the
Internet and mobile usage are indicated through links provided in
Ref. # 26, Additional Useful Web References,
Internet has undeniably openeda new
Further Reading). Given the unrestricted number of free websites, the
way of exploitation known as cybercrime.
These activities involve the use of computers, the Internet, cyber
space (see Box 1.1) and the worldwide web (Www). Interestingly,
cybercrime is not a new phenomena; the
hrst recorded cybercrime took place in the year 1820. It is one
of the most talked about topics in the recent
to Appendix L.
in Australia, shows the cybercrime trend. Also refer
years. Figure 1.1, based on a 2008 survey
While the worldwide scenario on cybercrime looks bleak, the situation in
India is not any better. Indian
2009 (see Ref. #2, Articles and Research Papers, Further Reading).
Similar data for later years is presented in Tables 1.1-1.4; the data in those tables show statistics related
to various cybercrimes and cases registered under cybercrimes by motives and suspects in States and Union
Territories (UTs).
rime is
difhault One
mauldl"This definition
is not universally accepted. It, however, initiatee
ther
didirectscussily oandm
"cybercrime: for example,
for "cyb
we can propose the follnu
defnition for
frhe dehinition
to
narTow
the scope of the
crime:
dehnivons of computer
invesigacion or prosecution.
a
perpeuration,
acquired a di
new of magnitude
2. Any tradiaional crime that
has
because of compurers.
through the aid of
and abuses that havecome into being
a computer,
Here is yet another dehinition: "cybercrime (computer crime) iS any illegal behavior, dirnctod
Neans
eectronic openations, hat hargets the securiy J conmpuier 9ems ana tihe aata processed by them." Note thar
in a
wider sense, "computer-related crime" can be any ilegal behavior committed by means of, or in relationto,
a computer system or nerwork; however, this is not cybercrime.
treary law both reter to "cybercrime. The term cybercrime relates to a number of other term
that may someimes be used interchangeably to describe crimes committed using computers.
Compuer-rdd
crime, Computer crime, Internet crime, E-crime, High-tech crime, etc. are the other
pecihcally can be dehned in a number of ways; a few dehnitions are:
terms. synonymous Cybercime
. A crime commited
using a computer and the Internet tosteal a person's identity (idenity theft) or
sell contraband or stalk victims or
disrupt operations with malevolent programs. Refer to Chapter
witha computer.
Cims ompletedenher
on or
a c c e s to commit
a
criminal act. OPporrunities for oitation ddue to
exploitation
the
weaknesses
newr
of Internet connerr
because of the exponentia growth
(see Ref. #26, infAddiormtaulo
arr multiplying
securiry be internal or external
Further Reading). Cybercrime may
Usehul Web References,
to perpetratre. The term "cybercrime"
has evolved over the past few years since the or
bal scale with hundreds of millions of users. ybercrime refers toadoption
theo f of1Intcme
emet ca
communications vehicle (the term "cybersnae
criminal aca using cyberspace as the is
Some people argue thar a cybercrime is not a crime as it i5 a Crime against sofrware a
pace" explained ierformin,
sofrware and not Box I.
or propery However, while he legal systems around the
world scramble introduce
lawe againt
to
their contents
publidy,
are usually opportuni
istic in ature,
nature. T
files and publiazing
majority of Tigh
a copving technical sateguards, should prevent the vast
Vacr
allied to strong
inrerna securiry, such
inadents
"computer and fraud". hoL
rwo rerms computer crime
There is a very thin line berween the
(harmful acts committed
from or against a compurer r punishable
nerwork
Tables 1.1-14). Cybercrimes differ
trom most terrestrial cnms in four ways: (a) now to commit hem is easier to learn, (b) r h . require
) differ
few
be committed in a jurisdiction
the porential damage they can
caused, (c) tion without bein
resources relztive to
are often not clearly illegal.
physicaly present in it and (d) they artached and is notorious "terrorism" or
due to the word
The rem cbercrime has some stigma
of the term inCyberterrorism is des..oist
box1.).
atached with it, that is. cybererrorism (ser explanacion as
"any
with terrorist intent, utilizes acceses or aias in accessinga computer.
peson, group organizzarion who,
or
electronic sssem or elecronic devvce by any
availabie means, ana DeretOy Rnowingy engages in or ate
neruork or
empts
commits the offence of eyberterrorim. ydercrime, especially through the Interner
o engage in a terroriss a t
has become central to commerce, entertainment and govermmen.
grown in number as the use of computer
The rerm cyber has some interesting synonyms: take, replicated, pretend, imitation, virtual, comniuto
generated. Cyber means combining forms relating to Information lechnology the Internet and Virtual Realiny
This term owes its origin to the word "cybernetics which dealswith information and its use; furthermore
cyberneric is the science that overlaps the helds of neurophysiology, intormation theory, computing
machinery and automation. However, beyond this, there does not seem to beany further connection to the
term cybernetics per other sources searched.
as According to Wikipedia, cybernetics is the interdisci-
plinary study of the structure of regulatory systems.
1.3 Cybercrime and Information Security
9.
Lack of intormation cybercrimes. This subject is explained in greater detail in Chapter
security gives rise to
Let us refer to the amended Indian Information Technology Act (ITA) 2000 in the context of cybercrime.
tocus
From an Indian perspective, the new version of the Act (referred to as /7A 2008) provides a new on
resource, communication device and information stored therein from unauthorized access,
puter, computer
use, disclosure, disruption, modification or destruction. The term incorporates both the physical security ot
devices well as the information stored therein. It covers prorection from unauthorized access, use, disclosure,
as
see Ref. #2, Books,
disruption, modification and destruction. (For a thorough discussion about these aspects,
Further Reading.
Where financial losses to the organization due to insider crimes are concerned (eg. leaking customer data),
often some dificulty is faced in estimating the losses because the hnancial impacts may not be detected by the
victimized organization and no direct costs may be associated with the data theft. The 2008 CSI Survey on
computer crime and security supports this. Cybercrimes occupy an important space in information security
domain because of their impact. For anyone trying to compile data on business impact of cybercrime, there
are number of challenges. One of them comes from the fact that do not explicitly
organizations incorpo-
rate the cost of the vast majority of computer security incidents into their accounting as opposed to, say,
accounting for the "shrinkage"of goodsfrom retail The other challenge comesfrom
stores. the dithcuy
artaching quantihable
a monctary value to the corporaic daa and stolen/s
yet coporatc data get
notalbiy through
los/thct oflaptops. sec th survev conductcd by P'onenon nsitute in Ret. #19,
Nddittona"
setul Web Reterenoes. FurtherRcading). Because of these reasons,reporting of financíal lossesoften remains
PPONIn1arc. In arn attempt to avoid negative publicin, most organizations abstain rom revcalng lacts and
hgures abour security incidents" including cybenrime.
In general.
organizations perccption about "insider
seems to be difterent than
attacks that madc our by security solution vendor. HowevCr, t h s Percc
i7aton
tends
docs seem
not
be low in most
to be true as revealed by
the 20o08 CSI Survey.
Awarcness about "data privacy
too
to
organizations.
1.4 Who are Cybercriminals?
Cybercrime involves such activities child pornography: credit card fraud; cyberstalkings defaming anode
as
onlines gaining unauthorized access computer systems; ignoring copyright, sofrware licensing and un
to
mark protection; overriding encryption make illegal copies; software piracy and stealing anothers idenin
to
discussion
theft) to pertorm criminal acts (see detailed on identity theft inChaprer i
(known as identity
Cybereriminals are those who conduct such They can be categorized into three groups that retea d
acts.
motivation (see Ref. # 2, Books, Further Reading):
Hobby hackers;
IT professionals (social engineering is one of the biggest threat);
politically motivated hackers;
terrorist organizations.
2. Type II: Cybercriminals not interested in recognition
-
.Psychological perverts;
.financially motivated hackers (corporate espionage);
State-sponsored hacking (national cspionayge, sabotagc);
organized criminals.
3. Type Ill: Cybercriminals - the insiders
Disgruntled or former cmplovecs secking revcnge;
and/or thef.
onpcting companics using cniployces to gain cconomic advantage through damage
desire
Lhus. the typical "motives" behind vbenerinme seem to be grecd, desire to gain power and/or publicity,
forbidden infornmation, destructive mindset and
"EC a Sense of adventure. looking for thrill to access
role
desire o sell nenwork seuriy services. This is explaincd in Chaprer 10. Cybercales are known to play
in committing gbercrimes.
1.5 Classifications of Cybercrimes
1able 1.6 presents a scheme for cybercrime classification (broad and narrow classihcatio B com-
forbidden, the omission of u 1uiy har to
as "an act or the commission ofan act that is
or
e is defined punishment by that law" (Webster
Dictionary).
2.
Cybercrime against property
Crmdit card frauds: Refer o Chapter 5 for Phishing and Spear Phishing and Cha0e, ts
Section 11.4 (in CD).
Intelloctal popery (1P) crimo: Basically. IP' crimes includc sofrware piracy, copyrighr intri
ment. trademarks violations, theft of compuer source code, cte. (reter to Chapters 9 and rinp
l
Internet time thefi: It is explaincd in Scction 1.5.4 as well as in Chapter 1I (Mini
Section 11.3.4).
3. Cybercrime against organization
Unaut/orized acroong of computer: Hacking is one method of doing this and hacking is a punishatl,
offense (see point 2 in Box 1.7).
Passwordsnifing It is explained in Section 1.5.19 (also see Table 1.5).
Denial-ofserice attacks (known as DoS attacks): It is explained more in detail in Chaptcr4
Virus attackldissemination of viruses: Refer to Chapter 4 for detailed discussion on this.
E-Mail bombing/mail bombs: lt is explained in Section 1.5.16.
Salami artack/Salami techmique: It is explained in Section 1.5.5.
Logic bomb: It is explained in Section 1.5.15 (Computer Sabotage).
Trojan Horse: It is explained more in detail in Chapter 4.
Data diddling: It is explained in Section 1.5.6. Refer to Section 11.2.6, Chapter 11.
Crimes
emanating from Usenet newgroup: It is explained in Section 1.5.9
Industrial spying/industrial espionage: It is explained in Section 1.5.10.
Computer nerwork intrusions: It is explained in Section 1.5.18.
Software piracy- It is explained in Section 1.5.14. Also refer to Section 9.2.2, Chapter 9.
Cybercrime against Society
Forgery: It is explained in Section 1.5.7 (see Table 1.6 and Box 1.6).
Cyberterrorism: Refer to Box 1.1 and Box 1.7, and Section 1.2 for detailed discussion on th
Web jacking: It is explained in Section 1.5.8.
5. Crimes emanating from Usenet newsgroup: By its very nature, Usener
groups may carry very offensive,
harmhul, inaccurate or otherwise inappropriate material, or in some cases,
labeled or are deceptive in another way. Theretore, it is postings that have been mis-
expected that will use caution and
you common
sense and exercise proper
judgment when using Usenet, 25 well as use the service at your own risk.
Let us take a brief look at some of the cybercrime forms mentioned above.
mailines, Spammers are numerous: the volume of unsolicited mail has become very high because their mass
the harrier
taentry is low. The costs, such as lost productivity and traud, are borne by the public and
Amviders (ISPS), who are forced to add extra cajpacity to cope with the deluge. by Internet secrvice
d has been the subject of legislation in many jurisdictions for cxample, theSpamuming
pr is widely detested,
CAN-SPAM Act of 2003.
Another definition of spamming is in the context ot scarch cngine
spamming." In this context.
shamming is alteration or creation of a document With the intent to deceive an clectronic cataloe or a
flino
ng
srent. Some web authors use "subversive techniques to ensure that their site more appcars
hicher number in returned search results - this is strongly discouraged by search engines and there are fines/ frequently or
nenalties associated with the use of such subversive techniques. Those who continually attempt to subvertor
Snam the search engines may be permanently excluded from the search index. Thercfore, the followine web
be avoided:
publishing techniques should
1. Repeating keywords:
2. use of keywords that do not relate to the content on the site;
3. use of fast meta refresh:
4. redirection;
5. IP Cloaking;
6. use of colored text on the same color background;
7. tiny text usage:
8. duplication of pages with diterent URILs;
9. hidden links;
10. use of different pages that bridge to the same URIL (gateway pages).
Further discussion on each of the above is beyond the scope of this chapter which is meant to be only an
overview of cybercrimes.
1.5.3 Cyberdefamation
makes
"Whoever.by words either spoken or intended to be read, or by signs or by visible representations,
or publishes any impusation concerning any person intending to harm. or knowing or having reason to
believe ihat such imputation will harm, the reputation ofsuch person, is said, except in the cases hereinafier
expected, to defamethat person."
Cyberdefamation happens when the above takes place in an electronic form. In other words, "cyberdefa-
mation' occurs when defamation takes place with the help of computers and/or the Internet, for example,
Someone publishes defamatory matter about someone on a website or sends an E-Mail containing detama-
tory information to all friends of that person. According to the IPC Section 499:
1. It may amount to defamation to impute anything to a deceased person, if the imputation would
ess involving
large
ers. In fact, this is becoming a booming busi
certihcates.
authentic looking
exchange tor these bogus but
the p a s s w o r d .and later
1.5.8 Web Jacking website (by cracking of
o the website
takes
control ofa actual
The
owner
forcefully sniffing.
jacking occurs when s "password
someone
Web crime
involves
this
changing it). Thus, the first stage of what appears
website.
on
that
control o v e r
does have any more
Usenet Newsgrouup
not
from
Emanating excessive
Spam/Crimes taken to mean
usually
1.5.9 Newsgroup Spam
was
The word has made Usenet mare
Spying/Industrial Espionage
1.5.10 Industrial on the enemy. The Internet
Corporations, like governments, often spy
for espionage. "Spies" can get
infor-
Spying is not limited
to governments.
new and better opportunities
or "offensive" material.