Cybercrime involves using computers or networks to commit illegal acts. This document defines and discusses various types of cybercrime such as hacking, bank fraud, sextortion, child pornography, cyberbullying, and cyber terrorism. It also outlines how cybercrime can be combated through diffusion, investigation, legislation, penalties, awareness, and intelligence efforts. As an example, the document discusses a case in Pakistan where a woman was arrested for blackmailing a man on social media in violation of the country's cybercrime laws.
Role Of Transgenic Animal In Target Validation-1.pptx
Brief Discussion of Cyber Crime issues
1. 4/23/2019 CYBERCRIME
Submitted by
Muhammad Fahad Saleem 1-FMS/BSAF/F15
Arbaz Babar 3-FMS/BSAF/F15
Submitted To
Sir Zaheer Akbar
BS Accounting and Finance
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FORENSIC ACCOUNTING
2. 1 |C Y B E R C R I M E
Cybercrime
Definition
Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target. Cybercrimes can
be defined as: "Offences that are committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm,
or loss, to the victim directly or indirectly, using modern telecommunication networks such as
Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS). Cybercrime may threaten a person or a nation's security and financial health.
Types of Cybercrime
1. Hacking: A security hacker is someone who seeks to breach defences and exploit
weaknesses in a computer system or network. Hackers may be motivated by a multitude of
reasons, such as profit, protest, information gathering, challenge, recreation, or to evaluate
system weaknesses to assist in formulating defences against potential hackers.
2. Bank Fraud: Bank fraud is an emerging technique of frauds. In bank fraud, an employee of
bank sends emails (appear to be from the bank) to their clients for sharing of their personal
information such as Credit Cards and Debit Cards information, which he uses for his personal
benefit including unauthorized purchases and cause loss to the client for his trust upon the
bank employee. Whereas, client considers it, that the employee is seeking information on
behalf of bank.
3. Sextortion: Sextortion is a form of sexual exploitation that employs non-physical forms of
coercion to extort money or sexual favours from the victim. Sextortion refers to the broad
category of sexual exploitation in which abuse of power is the means of coercion, as well as
to the category of sexual exploitation in which threatened release of sexual images or
information is the means of coercion.
As used to describe an abuse of power, sextortion is a form of corruption in which people
entrusted with power such as government officials, judges, educators, law enforcement
personnel, and employers seek to extort sexual favour in exchange for something within their
authority to grant or withhold. Examples of such abuses of power include:
3. 2 |C Y B E R C R I M E
a. Government officials who request sexual favours to obtain licenses or permits,
b. Teachers who trade good grades for sex with students,
c. Employers who make providing sexual favour a condition of obtaining a job.
4. Child pornography: Child pornography is pornography that exploits children for sexual
stimulation. It may be produced with the direct involvement or sexual assault of a child (also
known as child sexual abuse images) or it may be simulated child pornography. Abuse of the
child occurs during the sexual acts or lascivious exhibitions of genitals or pubic areas which
are recorded in the production of child pornography. Child pornography may use a variety of
media, including writings, magazines, photos, sculpture, drawing, cartoon, painting,
animation, sound recording, film, video, and video games.
5. Child grooming: Child grooming is befriending and establishing an emotional connection
with a child, and sometimes the family, to lower the child's inhibitions with the objective of
sexual abuse. Child grooming is also regularly used to lure minors into various illicit
businesses such as child trafficking, child prostitution, or the production of child
pornography.
6. Financial Fraud crimes: Computer fraud is any dishonest misrepresentation of fact
intended to let another to do or refrain from doing something which causes loss. Other forms
of fraud may be facilitated using computer systems, including bank fraud, carding, identity
theft, extortion, and theft of classified information. These types of crime often result in the
loss of private information or monetary information.
7. Cyber Terrorism: Government officials and information technology security specialists
have documented a significant increase in Internet problems and server scans since early
2001. But there is a growing concern among government agencies such as the Federal Bureau
of Investigations (FBI) and the Central Intelligence Agency (CIA) that such intrusions are
part of an organized effort by cyberterrorists, foreign intelligence services, or other groups to
map potential security holes in critical systems. A cyberterrorist is someone who intimidates
or coerces a government or an organization to advance his or her political or social objectives
by launching a computer-based attack against computers, networks, or the information stored
on them.
8. Cyber Extortion: Cyberextortion occurs when a website, e-mail server, or computer system
is subjected to or threatened with repeated denial of service or other attacks by malicious
hackers. These hackers demand money in return for promising to stop the attacks and to offer
"protection". According to the Federal Bureau of Investigation, cybercrime extortionists are
increasingly attacking corporate websites and networks, crippling their ability to operate and
demanding payments to restore their service. More than 20 cases are reported each month to
the FBI and many go unreported to keep the victim's name out of the public domain.
9. Computer as a target: These crimes are committed by a selected group of criminals.
Unlike crimes using the computer as a tool, these crimes require the technical knowledge of
the perpetrators. As such, as technology evolves, so too does the nature of the crime. These
crimes are relatively new, having been in existence for only if computers have which explains
4. 3 |C Y B E R C R I M E
how unprepared society and the world in general is towards combating these crimes. There
are numerous crimes of this nature committed daily on the internet. Crimes that primarily
target computer networks or devices include:
Computer viruses
Denial-of-service attacks
Malware (malicious code)
10.Computer as a tool: When the individual is the main target of cybercrime, the computer
can be considered as the tool rather than the target. These crimes generally involve less
technical expertise. Human weaknesses are generally exploited. The damage dealt is largely
psychological and intangible, making legal action against the variants more difficult. These
are the crimes which have existed for centuries in the offline world. Scams, theft, and the
likes have existed even before the development in high-tech equipment. The same criminal
has simply been given a tool which increases their potential pool of victims and makes them
all the harder to trace and apprehend.
Crimes that use computer networks or devices to advance other ends include:
Fraud and identity theft (although this increasingly use malware, hacking or phishing,
making it an example of both "computer as target" and "computer as tool" crime)
Information warfare
Phishing scams
Spam
Propagation of illegal obscene or offensive content, including harassment and threats.
11.Online Harassment: In harassment content may be offensive in a non-specific way,
harassment directs obscenities and derogatory comments at specific individuals focusing for
example on gender, race, religion, nationality, sexual orientation. This often occurs in chat
rooms, through newsgroups, and by sending hate e-mail to interested parties. Harassment on
the internet also includes revenge porn.
12.Drug trafficking: Darknet markets are used to buy and sell recreational drugs online. Some
drug traffickers use encrypted messaging tools to communicate with drug mules. The dark
web site Silk Road was a major online marketplace for drugs before it was shut down by law
enforcement (then reopened under new management, and then shut down by law enforcement
again). After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged. However, it was just
an older marketplace named Diablos Market, that used the name for more exposure from the
brand's previous success.
5. 4 |C Y B E R C R I M E
Combating computer crimes
1. Diffusion of cybercrime
2. Investigation
3. Legislation
4. Penalties
5. Awareness
6. Intelligence
Departments of Cybercrime Investigation
Federal Investigation Agency (FIA)
National Response centre for Cybercrime
Cybercrime Prevention Tips
o What you put online will always remain there
o Never trust any free online content
o Don’t provide personal information online to get something free
o Don’t click on links inside e-mails or messages
Cybercrime Investigation Case
The Federal Investigation Agency (FIA) has reportedly arrested a woman in Sialkot for blackmailing a man on
social media. Sadia Mirza, a resident of Sialkot, has been booked under Cyber Crime Law for blackmailing
Ahsan Rana, a resident of London. The complaint was registered by the victim’s brother, Hassan Raza, who
alleged that Sadia had sent messages to Ahsan over social networking website Facebook, demanding money.
This is a unique case, several people have been arrested under the new Cyber Law but this is the first incident
that has come to the light of a woman doing a deed of cybercrime. According to the FIR, Sadia has been
charged with “sending threatening, abusive, and lewd messages.” A case has been registered according to the
Prevention of Electronic Crimes Act, 2016 – clauses 20 (1) and 24(b)(c).
Clause 20- Offences against dignity of a natural person
6. 5 |C Y B E R C R I M E
(1) “Whoever intentionally and publicly exhibits or displays or transmits any information through any
information system, which he knows to be false, and intimidates or harms the reputation or privacy of a natural
person, shall be punished with imprisonment for a term which may extend to three years or with fine which
may extend to one million rupees or with both…”
Clause 24- Cyber Stalking
“A person commits the offence of cyber stalking who, with the intent to coerce or intimidate or harass any
person, uses information system, information system network, the internet, website, electronic mail or any
other similar means of communication to
(b) monitor the use by a person of the internet, electronic mail, text message or any other form of electronic
communication;
(c) watch or spy upon a person in a manner that results in fear of violence or serious alarm or distress, in the
mind of such person;
A team headed by Inspector Humaira Kanwal conducted a raid in Sialkot and detained the accused who was
then shifted to the local police station for further investigation.
Pakistan National Assembly passed the controversial Cyber Crime Bill in August last year after making
various amendments to Prevention of Electronic Crimes Bill (PECB) 2015. The bill faced the severe
opposition of many. The first offender of the bill was arrested in KPK for blackmailing women in August, just
weeks after the bill was passed. Another cyber-criminal was fined Rs. 30,000 and jailed for two years for
photoshopping and uploading the pictures of girls on the internet in Lahore.
***************