Online crime
We are living in a world, where computers and internet are everywhere and they
have major impacts in our life. All of us know that everything has positives and
negatives effects and with the development of internet, the information technology
has posed great network security concern and ethical questions in front of us. This
technology is very beneficial and on the other hand insecure. Online crime
(cyber crime) emerged very rapidly around the world.
Online crime is categorized as a criminal activity that involves the use of computer,
a computer network or a networked device or it targeted the computer and its whole network.
Cyber crime is committed by hackers or by cyber criminals and their main target
is money. Cyber crime is also done by individuals or organizations. Some cyber
criminals used advanced techniques and are highly technically skilled and some
are novice hackers. Cyberspace is defined as the electronic medium of computer
networks and online communication is taking place in it.
Cyber criminals done everything from spreading viruses and worms in
computer networks to stealing money online , hacking into others computer,
stealing intellectual property and damage computers connected to the internet
and committing online frauds.
Is Locard Exchange Principle applied to online crime?
Dr. Edmond Locard (1877-1966), gives the principle that, "Every contact leaves a trace,".
But is it applied to cyber crime because today’s crime scene is located out there in
cyberspace and cybercrimes
leave no physical evidence in to the crime scene.
The principle of Cyber Exchange
When relating to cyber crimes, “Cyber Exchange
Principle" applies. Forensic examination of a computer or server will
uncover many clues. In some cases the investigator found that the crime scene
is not limited to a single computer and it involved another computer that is
half the world away and there is no chance of a latent fingerprints, foot
prints, or traces of physiological fluids. But the electronic activities are
very much valuable in this case (in the bits and bytes). The Locard principle
still be in the minds of digital detectives as they look for clues an invaded
computer holds as well as locating the traces that are still awaiting to discover
out there in cyberspace. So possibility of electronic trace evidence may be
present.
When the investigator access the computers files the possibility that the file was, in fact, accessed, and even that a network transmission followed exists. The examination of the hard drive will uncover network operations. The examiner also checks the access logs of the Internet Service Provider (ISP) to uncover any surreptitious entry. Number of cyber-criminal target private information that a individuals, corporations or governments agencies have. These attacks are in virtual form, never exists in any physical form. These crimes can be easily committed from a remote distance in few seconds and as it require global co-operation, so it becomes very difficult to trace evidence or punish them. With the advancement of technologies criminals very easily hidden their identity physically or virtually over the internet and it becomes very challenging to locate them. Today online crime is a major concern as well as Industrial espionage is becoming commonplace.
What exactly a cyber criminal does-
1) It uses computers to commit other crimes and
2) Targets computers to infect them with viruses and other
types of malware or stop them working. They also use malware to steal or delete
data and spread illegal information or illegal images.
Denial-of-Service (DoS) attack –
Cyber crime that stops
the user for using machine or network or bring down a business from providing
the software service to customers is a Denial-of-Service (DoS) attack.
Distributed-Denial-of-Service (DDos) attack –
It is similar to DoS attack but in it criminals uses numerous
compromised computers to carry it.
Sometimes criminals do both categories of cyber crime at
once. First they target computers with viruses then use it to spread malware to
other machines or throughout a whole network.
A third category is where a computer system is used as an
accessory to crime. For storing the stolen data the use of a computer is an
example of this category.
Some specific examples of online crime (cyber crime) are –
Identity fraud (personal information is stolen and used).
Theft and then sale of corporate data.
Email frauds and internet fraud.
Theft of financial data or card payment data. (Net
Banking/ATM Frauds)
Cyber-extortion (demand money to prevent from a threatened
attack).
Ransomware attacks.
Crypto-jacking (hackers uses cryptocurrency resources they
do not own).
Cyber-espionage (hackers access government or company data).
Crimes related to social media
Mobile App related crimes
Frauds related to fake calls
Insurance Frauds
Scam of lottery
Online Cheating Scams, Online Transactions Frauds, Gift Card
Frauds
Facebook SOS Frauds
Facebook Friendship Frauds
Frauds related to fake Shopping Site
Herbal Oil Frauds
Job Frauds through Call Centers
OLX Company QR Code Frauds
PAYTM KYC Frauds
Sextortion Frauds
Frauds related to fake Government Website
Types of online crime (cyber crime) -
Hacking -
Hacking or Cracking is a form of crime in which hacker
destroy data and steal personal or sensitive information from victim's computer
or organization from a remote location. Installation of a backdoor program on
your machine is a cracking. Criminals used special type of software to do such
activities.
Cyber-Theft -
In all cyber-crimes, cyber-theft is the most common crime
the reason is that it can quickly bring large cash with very little effort and there
is a very little chance that a cyber-criminal will be apprehended by law
enforcement agencies. Cyber-Theft is the stealing of information in electronic
format by the use of computers and communication systems. Hackers transfer
money into their own bank accounts by cracking into the network system of banks.
Fraud related to Credit card is also very common. Due to the fear of losing
customers and shareholders, most of the banks and companies did not forward
this information into the public domain.
Viruses and worms -
Viruses and worms attack is a major threat to users and
companies. Those computer programs which are designed to damage computers are
viruses. They are named virus because they spreads from one computer system to
another system like a biological virus. They enter into the computer by
attaching themselves to some other program or documents. worm exploits loop
holes in the soft-wares or in the operating system. Worms does something else
instead of given command in the system, the system may accept it as one thing,
EX Trojan horse .On execution, it may release a worm, a virus or a logic bomb. Attack
on system, triggered by an event is a logic bomb.
Malware attacks
A computer virus or any other type of malware infected a
computer system or a network is a malware attack. Cyber criminals used this
infected system for stealing confidential data, used it to carry out other
criminal acts, or causes damage to system data.
Copyright Violation –
Plagiarism is also a crime and an illegal activity and it
takes place when someone publishes some content which is owned by another
person. Other activities which come under copyright infringement are
downloading the pirated movies, games and software, music etc.
Cyber Stalking –
The online harassment
of the target by tortured him through a series of online messages, emails etc.
is cyber stalking.
Phishing -
When spam emails or massages sent to an individual or
organization with the intention of tricking them to do something that
undermines their security is a phishing. The motive of the cyber criminal is to
acquire information like username, password and card details to withdraw money.
Phishing messages contain infected attachments or links.
Malicious Software –
It is Malware which
is a computer code and it can give partial or full control of your computer to
criminals once it runs successfully.
Child abuse –
A form of online crimes where criminals force minors via emails or chat for any adult or pornographic act.
Preventative measures of online crime (cybercrime) -
Use of Antivirus and Anti spyware Software -
Antivirus software is a computer programs that attempt to
identify and dissipate computer viruses and other malicious software. To restrict
backdoor program Anti-spywares are used.
Firewalls-
Firewalls may be a software programs or a hardware devices or
a combination of both. To guards internal computer network from malicious
access a firewall is used. It protects unauthorized access from outside the
network.
Cryptography -
Cryptography is associated with the process of encrypting
and decrypting information. Encryption is like storing and sending data in a
particular form which is known only to the sender and the recipient.
Strong Password –
Always use a strong password for your accounts on any site
or for banking transactions and never write it down over a piece of paper.
Regularly change your password.
Protect your personal information –
Always cautious when
you are revealing any personal information over the internet such as your name,
address, phone number or financial information. Prefer secure website for any
online transactions.
Avoid being scammed –
Don’t hastily click any link which asks for any personal
information. First verify the source and don’t reply any fraudulent emails.
Call the right person for help –
Immediately report to local
police or for the safety of your computer system, consult the certified
computer professional.
Online crime helpline (INDIA) -
1) National Cyber Crime Reporting
Portal
Website - https://www.cybercrime.gov.in/Webform/Helpline.aspx
Helpline Number - 155260
Timing - 09:00 AM To 06:00 PM
2) For DELHI Report Cyber Crime at https://www.cybercrime.gov.in