Online crime:- Forensic Fingerprint


 Online crime


We are living in a world, where computers and internet are everywhere and they

 have major impacts in our life. All of us know that everything has positives and 

negatives effects and with the development of internet, the information technology

 has posed great network security concern and ethical questions in front of us. This

 technology is very beneficial and on the other hand insecure. Online crime 

(cyber crime) emerged very rapidly around the world.

Online crime is categorized as a criminal activity that involves the use of computer,

 a computer network or a networked device or it targeted the computer and its whole network.  

Cyber crime is committed by hackers or by cyber criminals and their main target

 is money. Cyber crime is also done by individuals or organizations. Some cyber

 criminals used advanced techniques and are highly technically skilled and some 

are novice hackers. Cyberspace is defined as the electronic medium of computer 

networks and online communication is taking place in it.

Cyber criminals done everything from spreading viruses and worms in 

computer networks  to stealing money online , hacking into others computer,

 stealing intellectual property and damage computers connected to the internet 

and committing online frauds.

Is Locard Exchange Principle applied to online crime?

Dr. Edmond Locard (1877-1966), gives the principle that, "Every contact leaves a trace,". 

But is it applied to cyber crime because today’s crime scene is located out there in 

cyberspace and cybercrimes leave no physical evidence in to the crime scene.

The principle of Cyber Exchange

When relating to cyber crimes, “Cyber Exchange Principle" applies. Forensic examination of a computer or server will uncover many clues. In some cases the investigator found that the crime scene is not limited to a single computer and it involved another computer that is half the world away and there is no chance of a latent fingerprints, foot prints, or traces of physiological fluids. But the electronic activities are very much valuable in this case (in the bits and bytes). The Locard principle still be in the minds of digital detectives as they look for clues an invaded computer holds as well as locating the traces that are still awaiting to discover out there in cyberspace. So possibility of electronic trace evidence may be present.

When the investigator access the computers files the possibility that the file was, in fact, accessed, and even that a network transmission followed exists. The examination of the hard drive will uncover network operations. The examiner also checks the access logs of the Internet Service Provider (ISP) to uncover any surreptitious entry. Number of cyber-criminal target private information that a individuals, corporations or governments agencies have. These attacks are in virtual form, never exists in any physical form. These crimes can be easily committed from a remote distance in few seconds and as it require global co-operation, so it becomes very difficult to trace evidence or punish them. With the advancement of technologies criminals very easily hidden their identity physically or virtually over the internet and it becomes very challenging to locate them. Today online crime is a major concern as well as Industrial espionage is becoming commonplace.

What exactly a cyber criminal does-

1) It uses computers to commit other crimes and

2) Targets computers to infect them with viruses and other types of malware or stop them working. They also use malware to steal or delete data and spread illegal information or illegal images.

Denial-of-Service (DoS) attack –

 Cyber crime that stops the user for using machine or network or bring down a business from providing the software service to customers is a Denial-of-Service (DoS) attack.

Distributed-Denial-of-Service (DDos) attack –

It is similar to DoS attack but in it criminals uses numerous compromised computers to carry it.

Sometimes criminals do both categories of cyber crime at once. First they target computers with viruses then use it to spread malware to other machines or throughout a whole network.

A third category is where a computer system is used as an accessory to crime. For storing the stolen data the use of a computer is an example of this category.

Some specific examples of online crime (cyber crime) are –

Identity fraud (personal information is stolen and used).

Theft and then sale of corporate data.

Email frauds and internet fraud.

Theft of financial data or card payment data. (Net Banking/ATM Frauds)

Cyber-extortion (demand money to prevent from a threatened attack).

Ransomware attacks.

Crypto-jacking (hackers uses cryptocurrency resources they do not own).

Cyber-espionage (hackers access government or company data).

Crimes related to social media

Mobile App related crimes

Frauds related to fake calls

Insurance Frauds

Scam of lottery

Online Cheating Scams, Online Transactions Frauds, Gift Card Frauds

Facebook SOS Frauds

Facebook Friendship Frauds

Frauds related to fake Shopping Site

Herbal Oil Frauds

Job Frauds through Call Centers

OLX Company QR Code Frauds

PAYTM KYC Frauds

Sextortion Frauds

Frauds related to fake Government Website

Types of online crime (cyber crime) -

Hacking -

Hacking or Cracking is a form of crime in which hacker destroy data and steal personal or sensitive information from victim's computer or organization from a remote location. Installation of a backdoor program on your machine is a cracking. Criminals used special type of software to do such activities.

Cyber-Theft -

In all cyber-crimes, cyber-theft is the most common crime the reason is that it can quickly bring large cash with very little effort and there is a very little chance that a cyber-criminal will be apprehended by law enforcement agencies. Cyber-Theft is the stealing of information in electronic format by the use of computers and communication systems. Hackers transfer money into their own bank accounts by cracking into the network system of banks. Fraud related to Credit card is also very common. Due to the fear of losing customers and shareholders, most of the banks and companies did not forward this information into the public domain.

Viruses and worms -

Viruses and worms attack is a major threat to users and companies. Those computer programs which are designed to damage computers are viruses. They are named virus because they spreads from one computer system to another system like a biological virus. They enter into the computer by attaching themselves to some other program or documents. worm exploits loop holes in the soft-wares or in the operating system. Worms does something else instead of given command in the system, the system may accept it as one thing, EX Trojan horse .On execution, it may release a worm, a virus or a logic bomb. Attack on system, triggered by an event is a logic bomb.

Malware attacks

A computer virus or any other type of malware infected a computer system or a network is a malware attack. Cyber criminals used this infected system for stealing confidential data, used it to carry out other criminal acts, or causes damage to system data.

Copyright Violation –

Plagiarism is also a crime and an illegal activity and it takes place when someone publishes some content which is owned by another person. Other activities which come under copyright infringement are downloading the pirated movies, games and software, music etc.

Cyber Stalking –

 The online harassment of the target by tortured him through a series of online messages, emails etc. is cyber stalking.

Phishing -

When spam emails or massages sent to an individual or organization with the intention of tricking them to do something that undermines their security is a phishing. The motive of the cyber criminal is to acquire information like username, password and card details to withdraw money. Phishing messages contain infected attachments or links.

Malicious Software –

 It is Malware which is a computer code and it can give partial or full control of your computer to criminals once it runs successfully.

Child abuse –

A form of online crimes where criminals force minors via emails or chat for any adult or pornographic act.

Preventative measures of online crime (cybercrime) -

Use of Antivirus and Anti spyware Software -

Antivirus software is a computer programs that attempt to identify and dissipate computer viruses and other malicious software. To restrict backdoor program Anti-spywares are used.

Firewalls-

Firewalls may be a software programs or a hardware devices or a combination of both. To guards internal computer network from malicious access a firewall is used. It protects unauthorized access from outside the network.

Cryptography -

Cryptography is associated with the process of encrypting and decrypting information. Encryption is like storing and sending data in a particular form which is known only to the sender and the recipient.

Strong Password –

Always use a strong password for your accounts on any site or for banking transactions and never write it down over a piece of paper. Regularly change your password.

Protect your personal information –

Always cautious when you are revealing any personal information over the internet such as your name, address, phone number or financial information. Prefer secure website for any online transactions.

Avoid being scammed –

Don’t hastily click any link which asks for any personal information. First verify the source and don’t reply any fraudulent emails.

Call the right person for help –

Immediately report to local police or for the safety of your computer system, consult the certified computer professional.

Online crime helpline (INDIA) -

1) National Cyber Crime Reporting Portal

Website - https://www.cybercrime.gov.in/Webform/Helpline.aspx

Helpline Number - 155260

Timing - 09:00 AM To 06:00 PM

2) For DELHI Report Cyber Crime at https://www.cybercrime.gov.in

Previous
Next Post »