Scholarly article on topic 'Exploring and analyzing Internet crimes and their behaviours'

Exploring and analyzing Internet crimes and their behaviours Academic research paper on "Law"

CC BY-NC-ND
0
0
Share paper
Academic journal
Perspectives in Science
OECD Field of science
Keywords
{Cybercrime / "Cybercrime schemes" / "Internet frauds"}

Abstract of research paper on Law, author of scientific article — Bhavna Arora

Summary The world today is experiencing an exponential growth in cyberspace. Nevertheless, India too has witnessed a significant ascend in Internet activities and it is quite assertive to say that such phenomenal growth in access to information on one hand leads to empowered individuals and organization and on the other hand also poses new challenges to government and citizens. To make the cyber world safe is the need of the hour. Putting up deterrent measures against cybercrime is essential to national cyber security in protecting critical infrastructure of the nation as well as for individuals. In this regard, the prime objective of the government is to prevent cyber attacks and to protect the country's critical infrastructure. It also focuses on reducing vulnerability to cyber attacks so as to reduce and minimize damage and recovery time. To prevent the cyber crimes, individuals and governments need to clearly understand the crime schemes in the cyberspace and the contemporary and continuing Internet trends and behaviours of these criminals. This paper gives a brief outline of categories of cybercrimes. These crimes are categorized as crimes against individuals, property, organizations and governments. Various Internet crime scheme are evaluated and behaviour of criminals to perform the cybercrimes has been analyzed. A critical evaluation of report of cybercrime complaints under IT Act 2000 has been presented.

Academic research paper on topic "Exploring and analyzing Internet crimes and their behaviours"

Accepted Manuscript

Title: Cyber Crimes Schemes and Behaviors

Author: Bhavna Arora

PII: DOI:

Reference:

S2213-0209(16)30153-7

http://dx.doi.org/doi:10.1016/j.pisc.2016.06.014 PISC 299

To appear in:

Received date: 20-2-2016

Accepted date: 15-6-2016

Please cite this article as: Arora, B.,Cyber Crimes Schemes and Behaviors, Perspectives in Science (2016), http://dx.doi.org/10.1016/j.pisc.2016.06.014

This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.

'iNMdiidd»!

Cyber Crimes Schemes and Behaviors

Bhavna Arora Central University of Jammu bhavna.aroramakin@gmail.com

Abstract-The world today is experiencing an exponential growth in cyberspace. Nevertheless, India too has witnessed a significant ascend in internet activities and it is quite assertive to say that such phenomenal growth in access to information on one hand leads to empowered individuals and organization and on the other hand also poses new challenges to government and citizens. To make the cyber world safe is the need of the hour. Putting up deterrent measures against cybercrime is essential to national cyber security in protecting critical infrastructure of the nation as well as for individuals. In this regard, the prime objective of the government is to prevent cyber attacks and to protect the country's critical infrastructure. It also focuses on reducing vulnerability to cyber attacks so as to reduce and minimize damage and recovery time. To prevent the cyber crimes, individuals and governments need to clearly understand the crime schemes in the cyberspace and the contemporary and continuing internet trends and behaviors of these criminals. This paper gives a brief outline of categories of cybercrimes. These crimes are categorized as crimes against individuals, property, organizations and governments. Various internet crime scheme are evaluated and behavior of criminals to perform the cybercrimes has been analyzed. A critical evaluation of report of cybercrime complaints under IT Act 2000 has been presented.

I. Introduction- The rising rate of cybercrime with its varied and diverse characteristic features has been a source of concern. Cybercrime is a term that covers a broad scope of criminal activities by means of a computer. Cybercrime is referred to the act of performing criminal act using cyberspace as the communication medium [1]. As a consequence of rapid globalization, low cost of mobile phones and easy access to internet the cyber crime. The cybercrimes like cyber bullying and cyber defamation are common issues and are rapidly increasing. The government is framing policies and laws to prevent the growing number of such crimes. Most of the countries are not fully equipped with the legal infrastructure to handle cybercrimes. Young children and youth are among the most targeted section of the society that is affected by the perilous effects of electronic media. Broadly, the cybercrimes can be of Type I and Type II. Type

I cybercrime is generally a single event from the perspective of the victim. Type II cybercrimes, on the other hand refers to on-going series of events, involving repeated interactions with the target[1], These activities are such as computer related frauds, cyber defamation, cyber harassment, child predation, identity theft, extortion, travel scam, stock market manipulation, complex corporate espionage, planning or carrying out terrorist activities, health care, insurance/bonds frauds, auction frauds, fake escrow scams, blackmail, non-delivery of merchandise, newsgroup scams, credit card frauds, email spoofing, salami attacks, data didling, sabotage web jacking, spamming, DoS, software piracy, forgery etc.

II. Categories of cybercrimes -The role of computer in cybercrime can be classified in narrow or broad sense where computer can be used as an object, a tool or computer as the environment or context. The cybercrimes can be broadly classified as follows:

i. Cybercrime against individuals

In such cybercrimes, individual persons are affected. The goal is to exploit human weakness like greed and naivety. The potential harm of such a crime to humanity is severe. Few of the popular cybercrimes against persons include cyber porn specially child-pornography, violation of privacy, harassment of a person through e-mail spoofing, hacking, cracking, cyber stalking, defamation, cheating, fraud, e-mail spoofing, password sniffing, credit card frauds, gambling etc.

ii. Cybercrime against property

The second category of cybercrimes is against property. Intellectual Property Crimes, cyber squatting, cyber vandalism, transmission of malware that disrupt functions of the system/wipe out data or create malfunctioning of the attached devices, cyber trespassing, internet time thefts are few of the most popular cybercrimes against property.

iii. Cybercrime against government/organizations/society

One of the distinct cybercrimes against government and related organizations is cyber terrorism. The individuals and groups use electronic media and the cyberspace to threaten the international governments and the citizens of a country. This crime manifests itself into terrorism when an government or military websites are hacked and vital information is retrieved. Cybercrime against organization and society mainly includes unauthorized access of computer, password sniffing, denial of service attacks, malware attacks, crimes emanating from usenet group, industrial spying/ espionage, network intrusions, forgery ,web- jacking etc.

III. Internet Crime Schemes- Today the current and ongoing internet trends and schemes in the world can be categorized under the three classifications mentioned in section II. People who carry out these crimes are called as cyber criminals. Depending on the motivation factor the cybercriminals can be classified as under[5]:

Type I Cybercriminals-These include the hobby hackers or the politically motivated hackers who are hungry for recognition.

Type II Cybercriminals-They are not hungry for recognition. These include the psychological perverts, financially motivated hackers or organized criminals.

Type III Cybercriminals- These are the disgruntled or former employees seeking revenge

IV. Behaviors in cyber crimes The cybercriminals mentioned in section III track information in many ways. In this section, the behavior of the cybercriminals to perform cybercrimes is outlined.

• In common fraud scams the criminals gathers the information by phishing and spoofing leading to identity theft. The imposter pretends to be the other person and uses their information without their knowledge to commit theft or fraud. Crimes related to health care, insurances are also performed by hacking and forging identities.

• Cyber harassment and defamation especially the cases of pedophiles and stalkers use false identities to trap the children and teenagers. Social media sites, chat rooms etc. are a major source for harassment and defamation.

• Cybercrimes like the electronic spamming is the abuse of e-messaging system to send unsolicited bulk messages indiscriminately. In this overheads like the lost productivity and frauds are borne by the public and internet service providers, who are then forced to add extra capacity to cope up with the deluge [2].

• In cases like the frauds like auction frauds, non-delivery of existent/non-existent merchandise, the seller responds to the victim of the auction fraud and poses to be in a region outside the place indicating emergency leaving[3].The criminal steals this information from certain unsecured websites or by identity theft.

• Forgery is often achieved by hacking wherein the hacker attack the target computer and retrieve personal information of the victims and use it for their personal monetary gains. The Industrial spying/espionage are achieved through "spying".

ACCEPTED MANUSCRIPT

V. Cyber crime statistics-The Indian government has passed IT ACT 2000 which was amended in 2008 and focused on data privacy, information security, security practices, and inclusion of some additional cybercrimes like child pornography and cyber terrorism. In this paper data is presented from the Cyber Cell Police Station of Jammu, Jammu & Kashmir, India. This cell was established in 2012. Table.1 shows the cybercrimes complaints registered during 2014-2015. The cases have been categorized under -Economics, Face book, Mail and Phone Calls

Cases Type YEAR--^ 2014 2015

Economic

l.Credit Card fraud 09 14

2. ATM On line fraud 141 34

Face book

3. Harassing / Threatening Complaints 24 ^^^^ 23

4. Fake Facebook Account Complaints 46 35

5. Anti-Religious Complaints 06 -

6. Anti-National Complaints 01 -

7. Hacked Complaints 02 19

Mail ^^

8.Hacking / Threatening Complaints 02 03

Phone Calls

9. Harassing / Threatening Complaints 03 02

Table 1. Summary of cyber crimes complaints during 2014 & 2015 The graph presented in fig 2. gives the comparison on total number of complaints reported under the various categories -economic, facebook, mail and phone calls in 2014 and 2015.

Fig 1. Comparison of no. of cyber crime complaints during 2014-2015

Analysis: It is evident that the highest numbers of crimes are the ones that involve monetary frauds. The highest statistics that has been reported is 150 cases under the Economics frauds. However there are very few cases that have been reported under the mail and phone calls. The Graph in Fig 2 represents the percentage of variation in complaints registered in 2014 and 2015.

Fig 2. %age variation in no. of cyber crime complaints during 2014-2015

Analysis: The graph indicates that out of the nine parameters under which the cases are registered, the perecentage variation of six parameter is negative.It implies that the cyber crime under six sub -citerias has declined . However the percentage increased in three parameters cannot be ignored as well.The worst hit is the hacking complaints.There is about 850% increase in the hacking complaints.

VI. Conlcusion. Information and communication technologies (ICTs); doesn't benefit to individuals, organizations and governments; but also widens the scope of criminal activities as well [4]. Presently, the credit card thefts and online money-laundering cases of cyber crimes are on the rise. Harassment and defamation through social media are also a matter of concern to individuals. Cyber-terrorism is the most prominent aspects of cyber crime across countries. It is the lack of cyber crime awareness that leads to cybercrimes. The Cabinet Committee on Security (CCS) approved the National Cyber Security Policy in July 2013 that aims to create a secure computing environment in the country and build capacities to strengthen the current set up with focus on manpower training.

References

[1] Singh D Harpreet et.al, "Cyber Crime - A Threat to Persons, Property, Government and Societies", International Journal of Advanced Research in Computer Science and Software Engineering Research, Vol 3, Issue 5, May 2013 ISSN: 2277 128X

[2]https://en.wikipedia.org/wiki/Spamming

[3] https://www.ic3.gov/crimeschemes.aspx

[4] Srivastava S., "Pessimistic Side of Information & Communication Technology: Cyber Bullying & Legislature Laws", International Journal of Advances in Computer Science and Technology, Vol1 No.1 Nov-Dec 2012 ISSN 2320 2602

[5] Nina Godbole, Sunit Belapur , "Cyber Security", Wiley Publications

Acknowledgement: Sincere acknowledgment to the Cyber Crime Police Station ,Jammu Tawi (J&K) for providing me data for this research.