Cyber Crimes - Punjab Judicial Academy

Cyber Crimes
An Overview
IMRAN MUJADDID RABBANI
M. Phil Computer Science
Instructor IT.
Punjab Judicial Academy
What is ?.

All crimes performed or resorted to by
abuse of electronic media or otherwise,
with the purpose of influencing the
functioning of computer or computer
system.
COMPUTER CRIME is any crime
where
Computer is a target.
 Computer is a tool of crime
 Computer is incidental to crime

Why?





Everybody is using COMPUTERS..
From white collar criminals to terrorist organizations
And from Teenagers to Adults
Conventional crimes like Forgery,, extortion,
kidnapping etc.. are being committed with the help
of computers
New generation is growing up with computers
MOST IMPORTANT - Monetary transactions are
moving on to the INTERNET
Profile of Cyber Criminal
Disgruntled employees..
 Teenagers..
 Political Hacktivist
 Professional Hackers..
 Business Rival..
 Ex-Boy / Girl Friend..
 Divorced ... etc

Victims
Gullible
 Desperados and greedy people
 Unskilled & Inexperienced
 Unlucky people

40,000,000,000,000,000,000
Bytes of information
goes online
each year
Information Sources
News
The US has twice as many
shopping centers as High
Schools
“In
each of past 8 years, more
Americans
have
declared
bankruptcy than graduated from
college”
Authors, Affluenza (2005)
The most infamous unsolved
Computer Crimes
(that we know about)
1. The WANK Worm (October 1989)
WANK worm hit NASA offices in
Greenbelt, Maryland. WANK (Worms
Against Nuclear Killers) ran a banner
(pictured) across system computers as
part of a protest to stop the launch of the
plutonium-fueled, Jupiter-bound Galileo
probe.
Conti…




Ministry of Defense Satellite Hacked (February
1999)
CD Universe Credit Card Breach
(January 2000)
Military Source Code Stolen
(December 2000)
Anti-DRM Hack (October 2001)
Criminal Devices
CREDIT CARD FRAUD
Types
Types of Cyber Crimes
Email bombing
 Data diddling
 Salami Attack
 Denial of Service attack
 Virus / worm attacks
 [ Love Bug / ILOVEYOU]


Dear Friend,

This message might meet you in utmost surprise, however,
it’s just my urgent need for foreign partner that made me to
contact you for this transaction. I am a banker by profession
from Burkina Faso in West Africa and currently holding the
post of Director Auditing and Accounting unit of the bank.
I have the opportunity of transferring the left over funds
($7.2million) of one of my bank clients who died along with
his entire family on 31 July 2000 in a plane crash. You can
confirm the geniuses of the deceased death by clicking on
this web site
http://news.bbc.co.uk/1/hi/world/europe/859479.stm
Hence, I am inviting you for a business deal where this
money can be shared between us in the ratio of 60/40.
send your private phone number to call you, If you agree to
my business proposal. Further details of the transfer will be
forwarded to you as soon as I receive your return mail.
Have a great day.
Your Faithfully
Mr Maher Akoula
Age :58 years.
Home Address:10-12/avenue.Kanazoe.
B:P 1508
Ouaga. Burkina-faso
+ 226 78 34 79 49.
+ 226 78 73 24 34
Yearly Dollar Loss (in millions)
10 most common Complaints Categories
Hacker?
The best criminal hacker is the
one that isn't caught—or even
identified.
Hacking
Hacking in simple terms means illegal
intrusion into a computer system without the
permission of the computer owner/user.
What is Virus?

The virus is basically malevolent computer
program which has the capability to cause
havoc in several ways. The greatest chaos
of computer virus is the loss of precious
information stored on your computer hard
rive.
Virus
Computer virus have become today’s
headline news
 With the increasing use of the Internet, it
has become easier for virus to spread
 Virus show us loopholes in software
 Most virus are targeted at the MS
Windows OS

Trojan / Trojan Horse

Has the ability to reproduce infected files
with same or relatively same format.
Areas to Infect
Binary Executable files
 Boot Sector
 Master Boot Record
 Auto run Script Files

How Hacker Works?
Hit & Trial
 Stolen
 Social Engineering

Social Engineering
First Name
 Last Name
 Sur Name
 Nick Name
 Wife Name
 Beloved Name
 Favorite Place
 Date of Birth

Date of Wedding
 Vehicle Number
 Mobile Number
 Last four Digits of
Phone Number
 Favorite word
 Favorite Phrase
 Etc.

Imprisonment
The penalty for illegally accessing a computer system
ranges from 6 months to 5 years.
The penalty for the unofficial modification on a computer
ranges from 5 to 10 years.
The individual who hacks the computer or computer
devices will get an imprisonment up to 3 years or a fine.
Reference:
www.spamlaws.com