SlideShare uma empresa Scribd logo
1 de 89
UNIVERSITY OF LUCKNOW
PROJECT ON
CYBERCRIMEINBANKINGSECTOR
SUBMITTED BY
PRAVEENSINGHPOKHARIA
PROJECT GUIDE
Dr.KRISHNA ROHIT MISHRA
MASTER IN VOCATIONAL STUDIES
BANKING AND STOCK INSURANCE
SEMESTER I (2016-17)
NATIONAL POST GRADUATE COLLEGE
LUCKNOW – 226001
1
Declaration
I Praveen Singh Pokharia Student of Master in
Vocational Studies (Banking and Stock Insurance)
Semester Ist
here by declare that I have competed this
project on Cyber Crime in Banking Sector.
The information submitted is true and original to the
best of my knowledge.
………………..
Student signature
Student Name
(Praveen Singh Pokharia)
ACKNOWLEDGEMENT
2
I am using this opportunity to express my gratitude to everyone who
supported me throughout the course of this M. Voc (B.S.I)project. I am
thankful for their aspiring guidance, invaluably constructive criticism and
friendly advice during the project work. I am sincerely grateful to them for
sharing their truthful and illuminating views on a number of issues related to
the project.
I express my warm thanks to my project external guide Dr. Krishna
Rohit Mishra who has given an opportunity to work on such an interesting
project. He proved to be a constant source of inspiration to me and provided
constructive comments on how to make this report better. Credit also goes to
my friends whose constant encouragement kept me in good stead. Lastly
without fail I would thank all my faculties for providing all explicit and
implicit support to me during the course of my project.
EXCECUTIVESUMMARY
3
Cyber crimes are any illegal activities committed using computer target of
the criminal activity can be either a computer, network operations. Cyber crimes
are genus of crimes, which use computers and networks for criminal
activities. The difference between traditional crimes and cyber crimes is the
cyber crimes can be transnational in nature. Cyber crime is a crime that is
committed online in many areas using e-commerce. A computer can be
the target of an offence w h e n u n a u t h o r i z e d a c c e s s o f c o m p u t e r
n e t w o r k o c c u r s a n d o n o t h e r h a n d i t a f f e c t s E - COMMERCE.
Cyber crimes can be of various types such as Telecommunications
Piracy, Electronic Money Laundering and Tax Evasion, Sales and
Investment Fraud, Electronic Funds Transfer Fraud and so on…
Online banking or e-banking refers to the banking facility through
information and communication technology. Traditionally, banking
required a customer to stand in a long queue even to withdraw his money
or to perform other ancillary functions. Now banking facility is available
24×7 through ATMs (Automated Teller Machines), internet banking,
transfer through NEFT and RTGS etc., which has narrowed down the gap
between the bank and the customer. E-banking is not only limited to
banking facility through computer related systems. In the modern era,
with the increase of users of smartphones e-banking covers mobile
banking also. Because of liberalization, privatization and globalization it
became necessary for the banks to start with e-banking facility.
The term "Internet fraud" refers generally to any type of fraud
scheme that uses one or more components of the Internet - such as chat rooms,
e-mail, message boards, or Web sites - to present fraudulent solicitations to
prospective victims, to conduct fraudulent transactions, or to transmit the
4
proceeds of fraud to financial institutions or to other connected with the
scheme.
Some forms of Internet fraud, include:Spam ,Scams, Spyware,Identity
theft ,Phishing,Internet banking fraud.
"The modern thief can steal more with a computer than with a gun.
Tomorrow's terrorist may beable to do more damage with a keyboard than with a
bomb".
– National Research Council, "Computers at Risk", 1991.
5
INDEX
SR.NO. TOPICS PEGE NO.
1. CYBER CRIME 1-10
2. TYPES OF CYBER CRIME 11-28
3. CLASSIFICATION OF CYBER CRIME 29-31
4. REASONS OF CYBER CRIME 32-33
5. CYBER CRIMINALS 34-35
6. MODE AND MANNER OF COMMITING CYBER CRIME 36-38
7. BANKING SECTOR 39-40
8. CYBER CRIME IN BANKING SECTOR
A). A.T.M FRUD
B).MONEY LAUNDERING
C).CREDIT CARD FRUD
41-70
9. CASE STUDY 71-72
10. GENERAL TIPS ON AVOIDING POSSIBLE INTERNET
FRAUD SCHEEMS
73-74
11. RECENT CASES 75-76
12. CONCLUSION 77-78
13. BIBLOGRAPHY 79
6
CYBER CRIME
INTRODUCTION
The usage of internet services in India is growing
rapidly. It has given rise to new opportunities in every field we can
think of – be it entertainment, business, sports or education.
There are many pros and cons of some new types of technology
which are been invented or discovered. Similarly the new & profound
technology i.e. using of INTERNET Service, has also got some pros &
cons. These cons are named CYBER CRIME, the major
disadvantages, illegal activity committed on the internet by certain
individuals because of certain loop-holes. The internet, along with
its advantages, has also exposed us to security risks that come with
connecting to a large network. Computers today are being misused
for illegal activities like e-mail espionage, credit card fraud,
spams, and software piracy and so on, which invade
7
our privacy and offend our senses. Criminal activities in the cyberspace are
on the rise.
Computer crimes are criminal activities, which involve the use of
information technology to gain an illegal or an unauthorized
access to a computer system with intent of damaging, deleting
or altering computer data. Computer crimes also include the activities such
as electronic frauds, misuse of devices, identity theft and data as
well as system interference. Computer crimes may not
necessarily involve damage to physical property. They rather
include the manipulation of confidential data and critical information.
Computer crimes involve activities software theft, wherein the privacy
of the users is hampered. These criminal activities involve the
breach of human and information privacy, as also the theft and
illegal alteration of system critical information. The different types
of computer crimes have necessitated the introduction and use of
newer and more effective security measures.
In recent years, the growth and penetration of internet
across Asia Pacific has been phenomenal. Today, a large number
of rural areas in India and a couple of other nations in the region
have increasing access to the internet—particularly
broadband. The challenges of information security have also
grown manifold. This widespread nature of cyber crime
is beginning to show negative impact on the economic growth
opportunities in each of the countries.
It is becoming imperative for organizations to take both preventive
and corrective actions if their systems are to be protected from any kind of
compromise by external malicious elements. According to the latest
statistics, more than a fifth of the malicious activities in the
8
world originate from the Asia Pacific region. The malicious attacks
included denial-of-service attacks, spam, and phishing and both attacks.
In view of this, various governmental and non-
governmental agencies are working towards reducing cyber crime
activities.
Computer crime, cyber crime, e-crime, hi-tech crime or electronic
crime generally refers to criminal activity where a computer or network is
the source, tool, target, or place of a crime. These categories are not
exclusive and many activities can be characterized as falling in one
or more category. Additionally, although the terms computer
crime and cyber crime are more properly restricted to
describing criminal activity in which the computer or network
is a necessary part of the crime, these terms are also sometimes
used to include traditional crimes, such
as fraud, theft, blackmail, forgery, and embezzlement, in which computers
or networks are used. As the use of computers has grown, computer crime
has become more important.
Computer crime can broadly be defined as criminal activity involving
an information technology infrastructure, including illegal access
(unauthorized access), illegal interception (by technical means of non-public
transmissions of computer data to, from or within a computer system), data
interference (unauthorized damaging, deletion, deterioration, alteration
or suppression of computer data), systems interference (interfering with the
functioning of a computer system by inputting, transmitting, damaging,
deleting, deteriorating, altering or suppressing computer data), misuse of
devices, forgery (ID theft), and electronic fraud (Taylor,1999)
9
In the last three years, public sector banks (PSBs) in India have lost a
total of Rs. 22,743 crore, on account of various banking frauds. With various
measures initiated by the RBI, numbers of banking fraud cases have
declined, but amount of money lost has increased in these years. Prima
facie, an initial investigation in these cases has revealed involvement of not
only mid-level employees, but also of the senior most management as was
reflected in the case of Syndicate Bank and Indian Bank. This raises serious
concern over the effectiveness of corporate governance at the highest
echelons of these banks. In addition, there has been a rising trend of non-
performing assets (NPAs), especially for the PSBs, thereby severely
impacting their profitability. Several causes have been attributed to risky
NPAs, including global and domestic slowdown, but there is some evidence
of a relationship between frauds and NPAs as well.
CYBER CRIMES IN INDIA
10
As India become the fourth highest number of Internet users in the world,
cyber crimes in India has also increased 50 percent in 2007 over the previous
year. According to the Information Technology (IT) Act, the majority of
offenders were under 30 years of age. Around 46 percent of cyber
crimes were related to incidents of cyber pornography,
followed by hacking. According to recent published 'Crime in 2007
report', published by the National Crime Record Bureau
(NCRB), in over 60 percent of these cases, offenders
were between 18 and 30. These cyber-crimes are punishable under
two categories; the IT Act 2000and the Indian Penal Code (IPC).
According to the report, 217 cases of cyber-crime were
registered under the IT Act in 2007, which is an increase of 50
percent from the previous year. Under the IPC section, 339 cases were
recorded in 2007 compared to 311 cases in 2006. Out of 35 mega cities, 17
cities have reported around 300 cases of cyber-crimes under both categories
that is an increase of 32.6 percent in a year. The report also shows
that cyber crime is not only limited to metro cities but it also moved
to small cities like Bhopal. According to the report, Bhopal, the
capital of Madhya Pradesh has reported the highest incidence of cyber
crimes in the country. In order to tackle with cyber crime, Delhi
Police have trained 100 of its officers in handling cyber crime
and placed them in its Economic Offences Wing. These officers
were trained for six weeks in computer hardware and software,
computer networks comprising data communication networks, network
protocols, wireless networks and network security.
11
CRIME STATISTICS
As per the National Crime Records Bureau statistics, during
the year 2005, 179 cases were registered under the IT Act as
compared to 68 cases during the previous year, there by reporting a
significant increase of 163.2% in 2005 over 2004. During 2005, a total of
302 cases were registered under IPC sections as compared to
279 such cases during 2004, there by reporting an increase of 8.2%
in 2005 over 2004. In fact, the National Crime Records Bureau data reveals
that in the three years up to 2013, registered cases of cyber crime were up
350%, from 966 to 4356. Dubious distinctions both, and give banks and the
financial sector in India cause for worry.
Keeping in mind the dramatic swell in online economic crimes,
India’s central bank – Reserve Bank of India (RBI) – issued a
comprehensive circular in mid-2016 to all banks in India urging them to
implement a cybersecurity framework. It prescribes the ideal approach for
banks on taking concrete measures to combat cybercrime, fraudulent
activities online and thereby retain customer confidence, reduce financial
losses and ensure business continuity.
However, actual numbers continue to include, considering the fact
that a majority of the cases go unreported. Most victims, especially the
corporate, continue to downplay on account of the fear of negative publicity
thereby failing to give a correct picture of the cyber crime scene in the
country. It is difficult to measure the growth of Cyber Crimes by
any statistics, the reason being that a majority of cyber crimes
don't get reported. "If we, therefore, focus on the number of cases
registered or number of convictions achieved, we only get diverted
from real facts," With increasing internet penetration, cyber crimes have
12
also increased in the last few years. Between 2011 and 2015, the number of
cyber crimes registered in the country has gone up 5 times. Maharashtra &
Uttar Pradesh alone accounted for 1/3rd
of these crimes.
With increasing mobile and internet penetration in the country, cyber
crimes have also increased proportionately. Between 2011 and 2015, more
than 32000 cyber crimes were reported across the country. More than 24000
of these cases are registered under the IT Act and the remaining under the
various sections of IPC and other State Level Legislations (SLL).
CHANGING FACE OF CRIME
13
In past few years it has seen a quantum jump not only in the
quantity and quality but also the very nature of cyber crime activities. A
perceptible trend being observed is that cyber crimes are moving from
'Personal Victimization' to 'Economic Offences'. SD Mishra, ACP, IPR and
Cyber Cell, Economic Offences Wing, Delhi Police concurs that the cases
that are now coming up are more related to financial frauds. As
opposed to obscenity, pornography, malicious emails that were more
prevalent in the past, now credit card frauds, phishing attacks ,online share
trading, etc. are becoming more widespread. As Seth points out, initially,
when the Internet boom began, certain crimes were noticeable and cyber
stalking was one of the first ones."However, with the little offences came the
larger ones involving huge money and one has seen this sudden jump from
smaller crimes to financial crimes in previous years".
CYBERSPACE
14
As the cases of cyber crime grow; there is a growing need to prevent
them. Cyberspace belongs to everyone. There should be electronic
surveillance which means investigators tracking down hackers often want to
monitor a cracker as he breaks into a victim's computer system. The two
basic laws governing real-time electronic surveillance in other criminal
investigations also apply in this context, search warrants which means that
search warrants may be obtained to gain access to the premises where
the cracker is believed to have evidence of the crime. Such
evidence would include the computer used to commit the crime, as well as
the software used to gain unauthorized access and other evidence of the
crime.
Researchers must explore the problems in greater detail to learn the
origins, methods, and motivations of this growing criminal group. Decision-
makers in business, government, and law enforcement must react to
this emerging body of knowledge. They must develop
policies, methods, and regulations to detect incursions, investigate
and prosecute the perpetrators, and prevent future crimes. In addition,
Police Departments should immediately take steps to protect their own
information systems from intrusions (Any entry into an area not previously
occupied).
Internet provides anonymity: This is one of the reasons why
criminals try to get away easily when caught and also give them a chance
to commit the crime again. Therefore, we users should be careful. We should
not disclose any personal information on the internet or use credit cards
and if we find anything suspicious in e-mails or if the system
is hacked, it should be immediately reported to the Police
officials who investigate cyber-crimes rather than trying to fix the
problem by our selves.
15
Computer crime is a multi-billion dollar problem. Law
enforcement must seek ways to keep the drawbacks from overshadowing
the great promise of the computer age. Cyber crime is a menace that has to
be tackled effectively not only by the official but also by the users
by co-operating with the law. The founding fathers of internet
wanted it to be a boon to the whole world and it is upon us to keep this
tool of modernization as a boon and not make it a bane to the society.
TYPES OF CYBER CRIME
1. Theft of Telecommunications Services:
16
The "phone phreakers" of three decades ago set a precedent for what has
become a major criminal industry. By gaining access to an
organization’s telephone switchboard (PBX)individuals or criminal
organizations can obtain access to dial-in/dial-out circuits and then make their
own calls or sell call time to third parties (Gold 1999). Offenders may
gain access to the switch board by impersonating a technician, by
fraudulently obtaining an employee's access code, or by using software
available on the internet. Some sophisticated offenders loop between PBX
systems to evade detection. Additional forms of service theft include
capturing "calling card" details and on-selling calls charged to the calling card
account, and counterfeiting or illicit reprogramming of stored value telephone
cards.
I t h a s b e e n s u g g e s t e d t h a t a s l o n g a g o a s 1 9 9 0 ,
s e c u r i t y f a i l u r e s a t o n e m a j o r telecommunications carrier cost
approximately £290 million, and that more recently, up to 5% of total industry
turnover has been lost to fraud (Schieck 1995: 2-5). Costs to individual subscriber
scan also be significant in one case; computer hackers in the United
States illegally obtained access to Scotland Yard's telephone network and made
£620,000 worth of international calls for which Scotland Yard was responsible
(Tendler and Nuttall 1996).
2. Communications in Furtherance of Criminal Conspiracies:
Just as legitimate organizations in the private and public sectors
rely upon information s y s t e m s f o r c o m m u n i c a t i o n s a n d r e c o r d
k e e p i n g , s o t o o a r e t h e a c t i v i t i e s o f c r i m i n a l organizations
enhanced by technology.
There is evidence of telecommunications equipment being used to
facilitate organized drug trafficking, gambling, prostitution, money
laundering, child pornography and trade in weapons (in those
jurisdictions where such activities are illegal). The use of
encryption technology may place criminal communications beyond the reach of
law enforcement.
17
The use of computer networks to produce and distribute child
pornography has become the subject of increasing attention. Today,
these materials can be imported across national borders at the speed of
light. The more overt manifestations of internet child pornography entail a
modest degree of organization, as required by the infrastructure of IRC
and WWW, but the activity appears largely confined to individuals.
By contrast, some of the less publicly visible traffic in child pornography
activity appears to entail a greater degree of organization. Although knowledge is
confined to that conduct which has been the target of successful police
investigation, there appear to have been a number of networks which
extend cross-nationally, use sophisticated technologies of concealment,
and entail a significant degree of coordination.
Illustrative of such activity was the Wonderland Club, an
international network with members in at least 14 nations ranging from
Europe, to North America, to Australia. Access to the group was password
protected, and content was encrypted. Police investigation of the
activity, codenamed "Operation Cathedral" resulted in approximately
100 arrests around the world, and the seizure of over 100,000 images in
September, 1998.
3. Telecommunications Piracy
Digital technology permits perfect reproduction and easy
dissemination of print, graphics, sound, and multimedia
combinations. The temptation to reproduce copyrighted material
for personal use, for sale at a lower price, or indeed, for free
distribution, has proven irresistible to many.
This has caused considerable concern to owners of copyrighted
material. Each year, It has been estimated that losses of between US$15 and
US$17 billion are sustained by industry by reason of copyright infringement
(United States, Information Infrastructure Task Force 1995,131).
The Software Publishers Association has estimated that $7.4
billion worth of software was lost to piracy in 1993 with $2 billion of
that being stolen from the Internet (Meyer and Underwood 1994).
18
Ryan (1998) puts the cost of foreign piracy to American industry at more
than $10 billion in 1996, including $1.8 billion in the film industry, $1.2 billion in
music, $3.8 billion in business application software, and $690 million in book
publishing.
According to the Straits Times (8/11/99) A copy of the most recent James Bond
Film The World is Not Enough, was available free on the internet before its
official release. When creators of a work, in whatever medium, are unable to profit
from their creations, there can be a chilling effect on creative effort generally, in
addition to financial loss.
4. Dissemination of Offensive Materials
Content considered by some to be objectionable exists in abundance in
cyberspace. This includes, among much else, sexually explicit materials,
racist propaganda, and instructions for the fabrication of incendiary and
explosive devices. Telecommunications systems can also be used for
harassing, threatening or intrusive communications, from the
traditional obscene telephone call to its contemporary
manifestation in "cyber-stalking", in which persistent messages are
sent to an unwilling recipient.
One man allegedly stole nude photographs of his former girlfriend and her new
boyfriend and posted them on the Internet, along with her name,
address and telephone number. The unfortunate couple, residents of
Kenosha, Wisconsin, received phone calls and e-mails from s t r a n g e r s
a s f a r a w a y a s D e n m a r k w h o s a i d t h e y h a d s e e n t h e p h o t o s
o n t h e I n t e r n e t . Investigations also revealed that the suspect
was maintaining records about the woman's movements and compiling
information about her family (Spice and Sink 1999).
In another case a rejected suitor posted invitations on the Internet under the
name of a 28-year-old woman, the would-be object of his affections that said that
she had fantasies of rape and gang rape. He then communicated via email with
19
men who replied to the solicitations and gave out personal information about the
woman, including her address, phone number, details of her physical appearance
and how to bypass her home security system. Strange men turned up at her home
on six different occasions and she received many obscene phone calls.
While the woman was not physically assaulted, she would not answer the phone,
was afraid to leave her home, and lost her job (Miller 1999; Miller and Maharaj
1999).
One former university student in California used email to harass 5
female students in1998. He bought information on the Internet about the women
using a professor's credit card and then sent 100 messages including death
threats, graphic sexual descriptions and references to their daily
activities. He apparently made the threats in response to perceived
teasing about his appearance (Associated Press 1999a).
Computer networks may also be used in furtherance of extortion. The
Sunday Times (London) reported in 1996 that over 40 financial institutions in
Britain and the United States had been attacked electronically over the previous
three years. In England, financial institutions were reported to have paid
significant amounts to sophisticated computer criminals who threatened to wipe
out computer systems. (The Sunday Times, June 2, 1996). The article cited
four incidents between 1993 and 1995 in which a total of 42.5 million
Pounds Sterling were paid by senior executives of the organizations
concerned, who were convinced of the extortionists' capacity to crash their
computer systems (Denning 1999 233-4).
5. Electronic Money Laundering and Tax Evasion
20
For some time now, electronic funds transfers have assisted in concealing and
in moving the proceeds of crime. Emerging technologies will greatly assist in
concealing the origin of ill-gotten gains. Legitimately derived income may
also be more easily concealed from taxation authorities. Large financial
institutions will no longer be the only ones with the ability to achieve
e l e c t r o n i c f u n d s t r a n s f e r s t r a n s i t i n g n u m e r o u s j u r i s d i c t i o n s
a t t h e s p e e d o f l i g h t . T h e development of informal banking
institutions and parallel banking systems may permit central bank
supervision to be bypassed, but can also facilitate the evasion of cash transaction
reporting requirements in those nations which have them. Traditional
underground banks, which have flourished in Asian countries for
centuries, will enjoy even greater capacity through the use
of telecommunications.
With the emergence and proliferation of various technologies of
electronic commerce, one can easily envisage how traditional
countermeasures against money laundering and tax evasion may soon be
of limited value. I may soon be able to sell you a quantity of heroin, in
return for an untraceable transfer of stored value to my "smart-card",
which I then download anonymously to my account in a financial institution
situated in an overseas jurisdiction which protects the privacy of banking
clients. I can discreetly draw upon these funds as and when I may require,
downloading them back to my stored value card (Wahlert 1996).
6. Electronic Vandalism, Terrorism and Extortion
As never before, western industrial society is dependent upon
complex data processing and telecommunications systems. Damage to, or
interference with, any of these systems can lead to catastrophic
consequences. Whether motivated by curiosity or vindictiveness
electronic intruders cause inconvenience at best, and have the potential for
inflicting massive harm While this potential has yet to be realized, a number of
individuals and protest groups have hacked the official web pages of various
governmental and commercial organizations for e.g.: (Rathmell1997).
http://www.2600.com/hacked_pages/ (visited 4 January 2000). This may
also operate in reverse: early in 1999 an organized hacking incident was
apparently directed at a server which hosted the Internet domain for East
Timor, which at the time was seeking its independence from Indonesia (Creed
1999).
21
Defence planners around the world are investing substantially in
information warfare -means of disrupting the information technology
infrastructure of defence systems (Stix 1995).Attempts were made to disrupt
the computer systems of the Sri Lankan Government (Associated Press 1998), and
of the North Atlantic Treaty Organization during the 1999 bombing of
Belgrade(BBC 1999). One case, which illustrates the transnational reach
of extortionists, involved a number of German hackers who compromised
the system of an Internet service provider in S o u t h F l o r i d a ,
d i s a b l i n g e i g h t o f t h e I S P s t e n s e r v e r s . T h e o f f e n d e r s
o b t a i n e d p e r s o n a l information and credit card details of 10,000
subscribers, and, communicating via electronic mail through one of the
compromised accounts, demanded that US$30,000 be delivered to a mail drop in
Germany. Co-operation between US and German authorities resulted in the arrest
of the extortionists (Bauer 1998).
7. Sales and Investment Fraud
As electronic commerce becomes more prevalent, the application of digital
technology to fraudulent endeavors will be that much greater. The use of
the telephone for fraudulent sales pitches, deceptive charitable
solicitations, or bogus investment overtures is increasingly
common. Cyberspace now abounds with a wide variety of
investment opportunities, from traditional securities such as stocks
and bonds, to more exotic opportunities such as coconut farming, the sale
and leaseback of automatic teller machines, and worldwide telephone lotteries
(Cella and Stark 1997 837-844). Indeed, the digital age has been accompanied by
unprecedented opportunities for misinformation. Fraudsters now enjoy direct
access to millions of prospective victims around the world, instantaneously and at
minimal cost.
Classic pyramid schemes and "Exciting, Low-Risk Investment
Opportunities" are not uncommon. The technology of the World Wide Web is
ideally suited to investment solicitations. In the words of two SEC staff "At very
little cost, and from the privacy of a basement office or living room, the fraudster
can produce a home page that looks better and more sophisticated than that of a
Fortune 500 company" (Cella and Stark 1997, 822).
22
8. Illegal Interception of Telecommunications
D e v e l o p m e n t s i n t e l e c o m m u n i c a t i o n s p r o v i d e n e w
o p p o r t u n i t i e s f o r e l e c t r o n i c eavesdropping. From activities as time-
honoured as surveillance of an unfaithful spouse, to the newest forms of
political and industrial espionage, telecommunications
interception has increasing applications. Here again, technological
developments create new vulnerabilities. The electromagnetic signals emitted by a
computer may themselves be intercepted. Cables may act as broadcast antennas.
Existing law does not prevent the remote monitoring of computer radiation.
It has been reported that the notorious American hacker Kevin Poulsen was
able to gain access to law enforcement and national security wiretap data prior to
his arrest in 1991 (Littman1997). In 1995, hackers employed by a criminal
organization attacked the communications s y s t e m o f t h e A m s t e r d a m
P o l i c e . T h e h a c k e r s s u c c e e d e d i n g a i n i n g p o l i c e o p e r a t i o n a l
intelligence, and in disrupting police communications (Rathmell 1997).
9. Electronic Funds Transfer Fraud
Electronic funds transfer systems have begun to proliferate, and so has the risk
that such transactions may be intercepted and diverted. Valid credit card
numbers can be intercepted e l e c t r o n i c a l l y , a s w e l l a s p h y s i c a l l y ;
t h e d i g i t a l i n f o r m a t i o n s t o r e d o n a c a r d c a n b e counterfeited.
Of course, we don't need Willie Sutton to remind us that banks are
where they keep the money. In 1994, a Russian hacker Vladimir Levin,
operating from St Petersburg, accessed the computers of Citibank's
central wire transfer department, and transferred funds from large
corporate accounts to other accounts which had been opened by his
accomplices in The United States, the Netherlands, Finland,
23
Germany, and Israel. Officials from one of the corporate victims,
located in Argentina, notified the bank, and the suspect accounts,
located in San F r a n c i s c o , w e r e f r o z e n . T h e a c c o m p l i c e w a s
a r r e s t e d . A n o t h e r a c c o m p l i c e w a s c a u g h t attempting to
withdraw funds from an account in Rotterdam. Although Russian law
precluded Levin's extradition, he was arrested during a visit to the
United States and subsequently imprisoned. (Denning 1999, 55).
The above forms of computer-related crime are not necessarily mutually
exclusive, and need not occur in isolation. Just as an armed robber might
steal an automobile to facilitate a quick getaway, so too can one steal
telecommunications services and use them for purposes of vandalism,
fraud, or in furtherance of a criminal conspiracy.1 Computer-related
crime may be compound in nature, combining two or more of the generic forms
outlined above.
24
OTHER TYPES OF CYBER CRIME
1. HACKING
Hacking in simple terms means an illegal intrusion into a
computer system and/or network. There is an equivalent term to hacking i.e.
cracking, but from Indian Laws perspective there is no difference between the
term hacking and cracking. Every act committed towards breaking into a
computer and/or network is hacking. Hackers write or use ready-made
computer programs to attack the target computer. They possess the desire to
destruct and they get the kick out of such destruction. Some hackers hack for
personal monetary gains, such as to stealing the credit card information,
transferring money from various bank accounts to their own account
followed by withdrawal of money. They extort money from some
corporate giant threatening him to publish the stolen information which is
critical in nature.
Government websites are the hot targets of the hackers due
to the press coverage, it receives. Hackers enjoy the media coverage.
Motive Behind The Crime
a) Greed
b) Power
c) Publicity
d) Revenge
e) Adventure
f) Desiretoaccessforbiddeninformation
g) Destructivemindset
h) Wantstoselln/wsecurity services
2. Child Pornography
25
The Internet is being highly used by its abusers to reach and abuse
children sexually, worldwide. The internet is very fast becoming a household
commodity in India. Its explosion has made the children a viable victim to
the cyber crime. As more homes have access to internet, more children
would be using the internet and more are the chances of falling victim to
the aggression of pedophiles.
The easy access to the pornographic contents readily and
freely available over the internet lower the inhibitions of the
children. Pedophiles lure the children by distributing pornographic
material, and then they try to meet them for sex or to take their nude photographs
including their engagement in sexual positions. Sometimes Pedophiles
contact children in the chat rooms posing as teenagers or a child of similar age,
then they start becoming friendlier with them and win their confidence. Then
slowly pedophiles start sexual chat to help children shed their inhibitions
about sex and then call them out for personal interaction. Then starts
actual exploitation of the children by offering them some money
or falsely promising them good opportunities in life. The pedophiles
then sexually exploit the children either by using them as sexual objects or
by taking their pornographic pictures in order to sell those over the internet.
In physical world, parents know the face of dangers and they know how to
avoid & face the problems by following simple rules and accordingly they advice
their children to keep away from dangerous things and ways. But in
case of cyber world, most of the parents do not themselves know
about the basics in internet and dangers posed by various services offered over the
internet. Hence the children are left unprotected in the cyber
world. Pedophiles take advantage of this situation and lure the children, who
are not advised by their parents or by their teachers about what is wrong and what
is right for them while browsing the internet.
How Do They Operate
26
a) Pedophiles use false identity to trap the children/teenagers.
b) Pedophiles contact children/teens in various chat rooms which are
used by children/teen to interact with other children/teen.
c) B e f r i e n d t h e c h i l d / t e e n .
d) Extract personal information from the child/teen by winning his
confidence.
e) Gets the e-mail address of the child/teen and starts making contacts on the
victim e-mail address as well.
f) S t a r t s s e n d i n g p o r n o g r a p h i c i m a g e s / t e x t t o t h e v i c t i m
i n c l u d i n g c h i l d p o r n o g r a p h i c images in order to help
child/teen shed his inhibitions so that a feeling is created in the
mind of the victim that what is being fed to him is normal and that
everybody does it.
g) Extract personal information from child/teen.
h) At the end of it, the pedophile set up a meeting with the
child/teen out of the house and then drag him into the net to further
sexually assault him or to use him as a sex object.
In order to prevent your child/teen from falling into the trap of pedophile,
read the tips under Tips & Tricks heading.
3. Cyber Stalking
Cyber Stalking can be defined as the repeated acts harassment or
threatening behavior of the cyber criminal towards the victim by using internet
services. Stalking in General terms can be referred to as the repeated acts of
harassment targeting the victim such as following the victim, making
harassing phone calls, killing the victims pet, vandalizing victims
property, leaving written messages or objects. Stalking may be followed
by serious violent acts such as physical harm to the victim and the same
has to be treated and viewed seriously. It all depends on the course of
conduct of the stalker.
27
Both kind of Stalkers Online & Offline – have desire to control the victims
life. Majority of the stalkers are the dejected lovers or ex-lovers, who then
want to harass the victim because they failed to satisfy their secret desires.
Most of the stalkers are men and victim female.
How Do They Operate
a) Collect all personal information about the victim such as
name, family background, Telephone Numbers of residence and
work place, daily routine of the victim, address of residence and place of
work, date of birth etc. If the stalker is one of the acquaintances of the
victim he can easily get this information. If stalker is a stranger to victim,
he collects the information from the internet resources such as various
profiles, the victim may have filled in while opening the chat or e-mail
account or while signing an account with some website.
b) The stalker may post this information on any website related
to sex-services or dating services, posing as if the victim is
posting this information and invite the people to call the victim on
her telephone numbers to have sexual services. Stalker even uses
very filthy and obscene language to invite the interested persons.
c) People of all kind from nook and corner of the World, who come
across this information, start calling the victim at her residence
and/or work place, asking for sexual services or relationships.
d) Some stalkers subscribe the e-mail account of the victim to
innumerable pornographic and sex sites, because of which victim
starts receiving such kind of unsolicited e-mails.
e) Some stalkers keep on sending repeated e-mails asking for
various kinds of favors or threaten the victim.
f) In online stalking the stalker can make third party to harass the
victim.
28
g) Follow their victim from board to board. They “hangout” on
the same BB’s as their victim, many times posting notes to the
victim, making sure the victim is aware that h e / s h e i s b e i n g
f o l l o w e d . M a n y t i m e s t h e y w i l l “ f l a m e ” t h e i r v i c t i m
( b e c o m i n g argumentative, insulting) to get their attention.
h) Stalkers will almost always make contact with their victims
through email. The letters may be loving, threatening, or sexually
explicit. He will many times use multiple names when contacting the
victim.
i) Contact victim via telephone. If the stalker is able to access the
victim’s telephone, he will many times make calls to the victim to
threaten, harass, or intimidate them.
j) T r a c k t h e v i c t i m t o h i s / h e r h o m e .
Definition of Cyber stalking
Although there is no universally accepted definition of cyber stalking, the
term is used in this report to refer to the use of the Internet, e-mail, or other
electronic communications devices to stalk another person. Stalking
generally involves harassing or threatening behavior that an individual
engages in repeatedly, such as following a person, appearing at a
person’s home or place of business, making harassing phone calls,
leaving written messages or objects, or vandalizing a person’s property.
Most stalking laws require that the perpetrator make a credible threat of
violence against the victim; others include threats against the victim’s
immediate family; and still others require only that the alleged stalker’s
course of conduct constitute an implied threat. (1) While some conduct
involving annoying or menacing behavior might fall short of illegal
stalking, such behavior may be a prelude to stalking and violence and should be
treated seriously.
29
Nature and Extent of Cyber stalking
An existing problem aggravated by new technology. Although
online harassment and threats can take many forms, cyber stalking shares
important characteristics with offline stalking. Many stalkers – online or offline –
are motivated by a desire to exert control over their victims and engage in
similar types of behavior to accomplish this end. As with offline
stalking, the available evidence (which is largely anecdotal) suggests
that the majority of cyber stalkers are men and the majority of their
victims are women, although there have been reported cases of women
cyber stalking men and of same-sex cyber stalking. In many cases, the cyber
stalker and the victim had a prior relationship, and the cyber stalking
begins when the victim attempts to break off the relationship. However,
there also have been many instances of cyber stalking by strangers. Given
the enormous amount of personal information available through the Internet, a
cyber stalker can easily locate private information about a potential
victim with a few mouse clicks or key strokes.
The fact that cyber stalking does not involve physical contact may create the
misperception that it is more benign than physical stalking. This is not
necessarily true. As the Internet becomes an ever more integral part of our
personal and professional lives, stalkers can take advantage of the ease of
communications as well as increased access to personal information. In
addition, the ease of use and non-confrontational, impersonal, and sometimes
anonymous nature of Internet communications may remove disincentives to
cyber stalking. Put another way, whereas a potential stalker may be unwilling
or unable to confront a victim in person or on the telephone, he or she may
have little hesitation sending harassing or threatening electronic
communications to a victim. Finally, as with physical stalking, online
harassment and threats may be a prelude to more serious behavior, including
physical violence.
30
Phishing
In the field of computer security, Phishing is the criminally
fraudulent process of attempting to acquire sensitive information such as
usernames, passwords and credit card details by masquerading as a
trustworthy entity in an electronic communication.
Communications purporting to be from popular social web sites, auction
sites, online payment processors or IT Administrators are commonly used to
lure the unsuspecting public. Phishing is typically carried out by e-mail or
instant messaging, and it often directs users to enter details at a fake
website w h o s e l o o k a n d f e e l a r e a l m o s t i d e n t i c a l t o t h e
l e g i t i m a t e o n e . E v e n w h e n u s i n g s e r v e r authentication, it may
require tremendous skill to detect that the website is fake. Phishing is an example
of social engineering techniques used to fool users, and exploits the poor
usability of current web security technologies. Attempts to deal
with the growing number of reported phishing incidents include
legislation, user training, public awareness, and technical security
measures.
Phishing, also referred to as brand spoofing or carding, is a
variation on "fishing," the idea being that bait is thrown out with the hopes that
while most will ignore the bait, some will be tempted into biting.
A phishing technique was described in detail in 1987, and the first
recorded use of the term "phishing" was made in 1996.
Phishing email
From: *****Bank [mailto:support@****Bank.com]
Sent: 08 June 2004 03:25
To: IndiaSubject:
Official information from ***** Bank
Dear valued ***** Bank Customer!
For security purposes your account has been
31
randomly chosen for verification. To verify
your account information we are asking you to
provide us with all the data we are requesting.
Otherwise we will not be able to verify your identity
and access to your account will be denied. Please click
on the link below to get to the bank secure
page and verify your account details. Thank you.
https://infinity.*****bank.co.in/Verify.jsp
****** Bank Limited
Spam
Spam is a generic term used to describe electronic 'junk mail' or unwanted
messages sent to your email account or mobile phone. These messages vary, but
are essentially commercial and often annoying in their sheer volume. They may try
to persuade you to buy a product or service, or visit a website where you can make
purchases; or they may attempt to trick you into divulging your bank account or
credit card details.More information about spam is available from the
Australian Communications and Media Authority (ACMA website).
Scams
The power of the Internet and email communication has made it all
too easy for email scams to flourish. These schemes often arrive uninvited by
email. Many are related to the well-documented Nigerian Scam or Lotto Scams
and use similar tactics in one form or another. While the actual amount of money
lost by businesses and the community is unknown, the number of people claiming
to have been defrauded by these scams is relatively low. More information
about scams is available from the Australian Competition and
Consumer Commission (ACCC)SCAM watch website a n d t h e
Australian Securities and Investments Commission FIDO website.
32
Spyware
Spyware is generally considered to be software that is secretly
installed on a computer and takes things from it without the permission
or knowledge of the user. Spyware may take personal information, business
information, bandwidth; or processing capacity and secretly gives it to someone
else. It is recognized as a growing problem. More information about taking
care of spyware is available from the Department of Broadband,
Communication, and the Digital Economy (DBCDE) website.
4. Denial Of Service Attack
This is an act by the criminal, who floods the bandwidth of the victim’s
network or fills his email box with spam mail depriving him of the services he is
entitled to access or provide.
5. Virus Dissemination
Malicious software that attaches itself to other software (Virus,, worms,,
Trojan Horse,, Time bomb,, Logic Bomb,, Rabbit and Bacterium are the malicious
software’s).
6. Software Piracy
Theft of software through the illegal copying of genuine programs or the
counterfeiting and distribution of products intended to pass for the original.
Retail revenue losses worldwide are ever increasing due to this crime.
It can be done in various ways- End user copying, Hard disk
loading,, Counterfeiting,, Illegal downloads from the internet etc.
7. Spoofing
33
Getting one computer on a network to pretend to have the identity
of another computer, usually one with special access privileges, so as to
obtain access to the other computers on the network..
8. Net Extortion
Copying the company’s confidential data in order to extort
said company for huge amount.
9. S A L A M I A T T A C K
In such crime criminal makes insignificant changes in such
a manner that such changes would go unnoticed. Criminal makes such
program that deducts small amount like Rs. 2.50 per month from the account of all
the customer of the Bank and deposit the same in his account. In this case no
account holder will approach the bank for such small amount but
criminal gains huge amount.
10. SALE OF NARCOTICS
• Sale & Purchase through net.
•There are web sites which offer sale and shipment off contrabands drugs.
• They may use the techniques off stenography for hiding the messages.
34
CLASSIFICATION OF CYBER CRIME
1. Cybercrimes Against Persons
Cybercrimes committed against persons include various crimes
like transmission of child-pornography, harassment of any one with
the use of a computer such as e-mail. The trafficking, distribution,
posting, and dissemination of obscene material including pornography and
indecent exposure, constitutes one of the most important Cybercrimes
35
Classification of
Cyber Crime
Cyber Crime
Against Person
Cyber Crime
Against Property
Cyber Crime
Against Government
known today. The potential harm of such a crime to humanity can hardly
be amplified. This is one Cybercrime which threatens to undermine the
growth of the younger generation as also leave irreparable scars and injury
on the younger generation, if not controlled.
A minor girl in Ahmadabad was lured to a private place through
cyber chat by a man, who, along with his friends, attempted to gang-rape
her. As some passersby heard her cry, she was rescued.
Another example wherein the damage was not done to a person but
to the masses is the case of the Melissa virus. The Melissa virus first
appeared on the internet in March of 1999. It spread rapidly throughout
computer systems in the United States and Europe. It is estimated that the virus
caused 80 million dollars in damages to computers worldwide.
In the United States alone, the virus made its way through 1.2
million computers in one-fifth of the country's largest businesses. David Smith
pleaded guilty on Dec. 9, 1999 to state and federal charges associated with his
creation of the Melissa virus. There are numerous examples of such computer
viruses few of them being "Melissa" and "love bug".
2. Cybercrimes Against Property
The second category of Cybercrimes is that of Cybercrimes against all
forms of property. These crimes include computer vandalism (destruction
of others' property), transmission of harmful programmers.
A Mumbai-based upstart engineering company lost a say and
much money in the business when the rival company, an industry
major, stole the technical database from their computers with the help of a
corporate cyber spy.
3. Cybercrimes Against Government
The third category of Cybercrimes relate to Cybercrimes against
Government. Cyber terrorism is one distinct kind of crime in this category. The
36
growth of internet has shown that the medium of Cyberspace is being used by
individuals and groups to threaten the international governments as
also to terrorize the citizens of a country. This crime manifests
itself into terrorism when an individual "cracks" into a government or military
maintained website.
The Parliament of India passed its first Cyber law, the Information
Technology Act in2000. It not only provides the legal infrastructure for
E-commerce in India but also at the same time, gives draconian powers to the
Police to enter and search, without any warrant, any public place for the
purpose of nabbing cybercriminals and preventing cybercrime. Also,
the Indian C y b e r l a w t a l k s o f t h e a r r e s t o f a n y p e r s o n
w h o i s a b o u t t o c o m m i t a c y b e r c r i m e .
The Act defines five cybercrimes damage to computer source code,
hacking, publishing electronic information which is lascivious or prurient, breach
of confidentiality and publishing false digital signatures. The Act also
specifies that cybercrimes can only be investigated by anofficial holding
no less a rank than that of Dy. Superintendent of Police (Dy.SP).
It is common that many systems operators do not share
information when they are victimized by crackers. They don't
contact law enforcement officers when their computer systems are
invaded, preferring instead to fix the damage and take action to keep crackers from
gaining access again with as little public attention as possible.
According to Sundari Nanda, SP, CBI, "most of the times the
victims do not complain, may be because they are aware of the extent of
the crime committed against them, or as in the case of business houses, they
don't want to confess their system is not secure".
As the research shows, computer crime poses a real threat. Those who
believe otherwise simply have not been awakened by the massive losses
and setbacks experienced by companies worldwide. Money and intellectual
37
property have been stolen, corporate operations impeded, and jobs lost as a result
of computer crime.
S i m i l a r l y , i n f o r m a t i o n s y s t e m s i n g o v e r n m e n t a n d
b u s i n e s s a l i k e h a v e b e e n compromised. The economic impact
of computer crime is staggering (great difficulty).
REASONS FOR CYBER CRIME
Hart in his work “The Concept of Law” has said ‘human beings are
vulnerable so rule of law is required to protect them’. Applying this to the
cyberspace we may say that computers are vulnerable (capable of attack)
so rule of law is required to protect and safeguard them against cyber
crime. The reasons for the vulnerability of computers may be said to be:
38
1. Capacity To Store Data In Comparatively Small Space-
The computer has unique characteristic of storing data in a very
small space. This affords to remove or derive information either through
physical or virtual medium makes it much easier.
2. E a s y T o A c c e s s
The problem encountered in guarding a computer system from
unauthorized access is that there is every possibility of breach not due to
human error but due to the complex technology. By secretly implanted
logic bomb, key loggers that can steal access codes, advanced voice recorders;
retina imagers etc. that can fool biometric systems and bypass firewalls
can be utilized to get past many a security system.
3. C o m p l e x
The computers work on operating systems and these operating systems in
turn are composed of millions of codes. Human mind is fallible and it is not
39
possible that there might not be a lapse at any stage. The cyber criminals
take advantage of these lacunas and penetrate into the computer system.
4. N e g l i g e n c e
Negligence is very closely connected with human conduct. It is
therefore very probable that while protecting the computer system there
might be any negligence, which in turn provides a cyber criminal to gain
access and control over the computer system.
5. Loss Of Evidence
Loss of evidence is a very common & obvious problem as all the data are
routinely destroyed. Further collection of data outside the territorial extent also
paralyses this system of crime investigation.
CYBER CRIMINALS
40
The cyber criminals constitute of various groups/ category. This division
may be justified on the basis of the object that they have in their mind. The
following are the category of cyber criminals-
1. Children And Adolescents Between The Age Group Of 6 – 18
Years:
The simple reason for this type of delinquent (A young offender) behavior
pattern in children is seen mostly due to the inquisitiveness to know and explore
the things. Other cognate reason may be to prove themselves to be
outstanding amongst other children in their group. Further the reasons
may be psychological even. E.g. the Bal Bharati(Delhi) case was the outcome of
harassment of the delinquent by his friends.
2. Organized Hackers
These kinds of hackers are mostly organized together to fulfill certain
objective. The reason may be to fulfill their political bias, fundamentalism, etc.
The Pakistanis are said to be one of the best quality hackers in the world. They
mainly target the Indian government sites with the purpose to fulfill
their political objectives. Further the NASA as well as the Microsoft sites is
always under attack by the hackers.
3. Professional Hackers / Crackers
Their work is motivated by the colour of money. These kinds of hackers are
mostly employed to hack the site of the rivals and get credible, reliable and
valuable information. Further they are even employed to crack the
system of the employer basically as a measure to make it safer by
detecting the loopholes.
4. Discontented Employees
41
This group includes those people who have been either
sacked by their employer or are dissatisfied with their employer. To
avenge they normally hack the system of their employee.
MODE AND MANNER OF COMMITING CYBER CRIME
42
1. Unauthorized Access To Computer Systems Or Networks
/Hacking
This kind of offence is normally referred as hacking in the generic sense.
However the framers of the Information Technology Act 2000 have no where used
this term so to avoid any confusion we would not interchangeably use the word
hacking for ‘unauthorized access’ as the latter has wide connotation.
2. Theft Of Information Contained In Electronic Form
This includes information stored in computer hard disks,
removable storage media etc. Theft may be either by appropriating the data
physically or by tampering them through the virtual medium.
3. E m a i l B o m b i n g
This kind of activity refers to sending large numbers of mail to the
victim, which may be an individual or a company or even mail servers
there by ultimately resulting into crashing.
4. D a ta Diddling
This kind of an attack involves altering raw data just before a
computer processes it and then changing it back after the processing is
completed. The electricity board faced similar problem of data diddling
while the department was being computerized.
5. S a l a m i A t t a c k s
This kind of crime is normally prevalent in the financial
institutions or for the purpose of committing financial crimes. An
important feature of this type of offence is that the alteration is so small
that it would normally go unnoticed. E.g. the Ziegler case wherein a
logic bomb was introduced in the bank’s system, which deducted 10
cents from every account and deposited it in a particular account.
43
6. Denial of Service Attack
The computer of the victim is flooded with more requests than it
can handle which cause it to crash. Distributed Denial of Service (DDS) attack
is also a type of denial of service attack, in which the offenders are wide in number
and widespread. E.g. Amazon, Yahoo.
7. Virus / Worm Attacks
Viruses are programs that attach themselves to a computer or a file and then
circulate themselves to other files and to other computers on a network. They
usually affect the data on a computer, either by altering or deleting it. Worms,
unlike viruses do not need the host to attach themselves to. They merely make
functional copies of themselves and do this repeatedly till they eat up all the
available space on a computer's memory. E.g. love bug virus, which affected at
least 5 % of the computers of the globe. The losses were accounted to be $ 10
million. The world's most famous worm was the Internet worm let loose on the
Internet by Robert Morris sometime in 1988. Almost brought
development of Internet to a complete halt.
8. L o g i c B o m b s
These are event dependent programs. This implies that these
programs are created to do something only when a certain event (known as
a trigger event) occurs. E.g. even some viruses may be termed logic bombs
because they lie dormant all through the year and become active only on a
particular date (like the Chernobyl virus).
44
9. T r o j a n A t t a c k s
This term has its origin in the word ‘Trojan horse’. In software field this
means an unauthorized programme, which passively gains control over another’s
system by representing itself as an authorized programme. The most common
form of installing a Trojan is through e-mail. E.g. a Trojan was installed in the
computer of a lady film director in the U.S. while chatting. The cyber criminal
through the webcam installed in the computer obtained her personal data. He
further harassed this lady.
10. Internet Time Thefts
Normally in these kinds of thefts the Internet surfing hours of the victim are
used up by another person. This is done by gaining access to the login ID and the
password. E.g. Colonel Bajwa’s case- the Internet hours were used up by any
other person. This was perhaps one of the first reported cases related to cyber
crime in India. However this case made the police infamous as to their lack of
understanding of the nature of cyber crime.
11. Web Jacking
This term is derived from the term hi jacking. In these kinds of offences the
hacker gains access and control over the web site of another. He may even
mutilate or change the information on the site. This may be done for
fulfilling political objectives or for money. E.g. recently the site of MIT (Ministry
of Information Technology) was hacked by the Pakistani hackers and some
obscene matter was placed therein. Further the site of Bombay crime branch
was also web jacked. Another case of web jacking is that of the ‘ gold
fish’ case. In this case the site was hacked and the information pertaining to gold
fish was changed. Further a ransom of US $ 1 million was demanded as
45
ransom. Thus web jacking is a process where by control over the site of
another is made backed by some consideration for it.
BANKING SECTOR
The Banking Industry was once a simple and reliable business that
took deposits from investors at a lower interest rate and loaned it out to
borrowers at a higher rate.
However deregulation and technology led to a revolution in the Banking
Industry that saw it transformed. Banks have become global industrial
powerhouses that have created ever more complex products that use risk.
Through technology development, banking services have become
available 24 hours a day, 365 days a week, through ATMs, at online
banking, and in electronically enabled exchanges where everything from stocks
to currency futures contracts can be traded.
The Banking Industry at its core provides access to credit. In the
lenders case, this includes access to their own savings and investments, and
46
interest payments on those amounts. In the case of borrowers, it includes access to
loans for the creditworthy, at a competitive interest rate.
Banking services include transactional services, such as verification of account
details, account balance details and the transfer of funds, as well as advisory
services that help individuals and institutions to properly plan and manage their
finances. Online banking channels have become a key in the last 10 years.
The collapse of the Banking Industry in the Financial Crisis, however,
means that some of the more extreme risk-taking and complex
securitization activities that banks increasingly engaged in since 2000 will
be limited and carefully watched, to ensure that there is not another banking
system meltdown in the future.
Banking in India originated in the last decades of the 18th century.
The oldest bank inexistence in India is the State Bank of India, a
government-owned bank that traces its origins back to June 1806 and that is
the largest commercial bank in the country. Central banking is the
r e s p o n s i b i l i t y o f t h e R e s e r v e B a n k o f I n d i a , w h i c h i n 1 9 3 5
f o r m a l l y t o o k o v e r t h e s e responsibilities from the then
Imperial Bank of India, relegating it to commercial banking
functions. After India's independence in 1947, the Reserve Bank was
nationalized and given broader powers. In 1969 the government
nationalized the 14 largest commercial banks; the government nationalized
the six next largest in 1980.Currently, India has 88 scheduled commercial
banks (SCBs) - 27 public sector banks(that is with the Government of
India holding a stake), 31 private banks (these do not have
government stake; they may be publicly listed and traded on stock
exchanges) and 38 foreign banks. Total numbers of ATMs in India have
increased to 189,189 by the end of August’15 and are further expected to double
over the next few years, thereby taking the number of ATMs per million
population from 105 in 2012, to about 300 in 2017. In 2015,with the Financial
Inclusion Plan, 390387 villages were covered with 14207 branches. In April 2014,
47
after 12 years of its last issuance of bank license, RBI granted in-principle licenses
to IDFC and Bandhan Microfinance to promote rural expansion.
CYBER CRIME IN BANKING SECTOR
AUTOMATED TELLER MACHINE
The traditional and ancient society was devoid of any monetary
instruments and the entire exchange of goods and merchandise was
managed by the “barter system”. The use of monetary instruments as a
unit of exchange replaced the barter system and money in various
denominations was used as the sole purchasing power. The
modern contemporary era has replaced these traditional monetary
instruments from a paper and metal based currency to “plastic
money” in the form of credit cards, debit cards, etc. This has resulted in the
48
increasing use of ATM all over the world. The use of ATM is not only
safe but is also convenient. This safety and convenience, unfortunately, has an
evil side as well that do not originate from the use of plastic money rather
by the misuse of the same. This evil side is reflected in the form
of “ATM FRAUDS” that is a global problem. The use of plastic money is
increasing day by day for payment of shopping bills, electricity bills,
school fees, phone bills, insurance premium, travelling bills and even petrol
bills. The convenience and safety that credit cards carry with its use has been
instrumental in increasing both credit card volumes and usage. This
growth is not only in positive use of the same but as well as the negative use of
the same. The world at large is struggling to increase the convenience and safety
on the one hand and to reduce it misuse on the other.
WAYS TO CARD FRAUDS
Some of the popular techniques used to carry out ATM crime are:
1. T h r o u g h C a r d J a m m i n g A T M ’ s c a r d r e a d e r i s t a m p e r e d w i t h
i n o r d e r t o t r a p a customer’s card. Later on the criminal removes the card.
2. Card Skimming, is the illegal way of stealing the card’s security
information from the card’s magnetic stripe.
3. Card Swapping, through this customer’s card is swapped for another card
without the knowledge of cardholder.
4. Website Spoofing, here a new fictitious site is made which looks
authentic to the user and customers are asked to give their card number. PIN
and other information, which are used to reproduce the card for use at an ATM.
5. Physical Attack. ATM machine is physical attacked for removing the cash.
49
HOW TO USE CASH MACHINE
Be aware of others around you. If someone close by the cash
machine is behaving suspiciously or makes you feel
uncomfortable, choose another .Make sure you check the machine
before you use it for any signs of tampering. Examine the machine for stick on
boxes, stick on card entry slots etc. If you find it difficult to get your card into the
slot, do not use it, go to another machine. Anything unusual about the cash
machine report it to the bank and police or the owner of the premises
immediately. Under no circumstances should members of the public attempt to
remove a device as it’s possible the offender may be nearby.
50
HOW TO USE A CASH MACHINE
1. Give other users space to enter their personal identity number (PIN) in
private.
2. Be aware of your surroundings. If someone is crowding or
watching you, cancel thetransaction and go to another machine. Take your
card with you.
3. D o n o t a c c e p t h e l p f r o m " w e l l m e a n i n g " s t r a n g e r s a n d n e v e r
a l l o w y o u r s e l f t o b e distracted.
4. Stand close to the cash machine and always shield the keypad to avoid
anyone seeing you enter your PIN.
51
What Precaution Should Be Taken While Leaving Cash Machine
52
Once you have completed a transaction, discreetly put your money and card
away before leaving the cash machine.
If you lose your card in a cash machine, cancel the card
immediately with the card issuer’s 24-hour emergency line, which can be
found on your last bank statement. Do not assume that your bank automatically
knows that the machine has withheld your card. Again, beware of help offered by
"well meaning strangers".
Dispose of your cash machine receipt, mini-statement or balance enquiry
slip with care. Tear up or preferably shred these items before discarding them.
Card Fraud Also Happens In The Home:
Cardholders should also be warned of the risks of verifying
bank details at home in unsolicited telephone conversations. Always call the
person back using the advertised customer telephone number, not the telephone
number they may give you.
i. Do Not Click On Hyperlinks Sent To You By Email Asking You To Confirm
Your Bank Details Online:
Hyperlinks are links to web pages that have been sent to you by
email and may open a dummy website designed to steal your personal
details. Phone your bank instead on their main customer number or access
your account using the bank's main website address. Use good antivirus and
firewall protection.
ii. NEVERWriteDownYourPin:
People make life very easy for pickpockets if they write down their
PIN and keep it in their purse or wallet. Do not write down your PIN. If
you have been given a number that you find difficult to remember, take your
card along to a cash machine and change the number to onethat you will be able to
remember without writing it down.
PREVENTION FOR ATM CARDS
53
Most ATM frauds happen due to the negligence of customers
in using, and more importantly, negligence of banks in educating their
customers about the matters that should betaken care of while at an ATM.
The number of ATM frauds in India is more in regard to
negligence of the Personal Identification Number (PIN), than by
sophisticated crimes like skimming. Banks need to develop a fraud policy – the
policy should be written and distributed to all employees, borrowers and
depositors.
The most important aspect for reducing ATM related fraud is to educate the
customer. Here is a compiled list of guidelines to help your customer from being
an ATM fraud victim:
1. Look for suspicious attachments. Criminals often capture
information through ATM skimming – using devices that steal
magnetic strip information. At a glance, the skimmer looks just like a
regular ATM slot, but it‘s an attachment that captures ATM
card numbers. To spot one, the attachment slightly protrudes from
the machine and may not be parallel with the inherent grooves.
Sometimes, the equipment will even cut off the printed labels on the
ATM. The skimmer will not obtain PIN numbers, however. To get that,
fraudsters place hidden cameras facing the ATM screen. There‘s
also the helpful bystander (the criminal) who may be standing by to
kindly inform you the machine has had problems and offer to help. If you
do not feel safe at any time, press the ATM cancel button, remove your
card and leave the area immediately.
2. Minimize your time at the ATM. The more time you spend
at the ATM, the more vulnerable you are. If you need to update your
records after a transaction, one is advised do it at home or office, but not
while at the ATM. Even when depositing a cheque at the ATM, on should
not make/sign the cheque at the ATM. After the transaction, if you
54
think you are being followed, go to an area with a lot of people and call the
police.
3. Make smart deposits. Some ATMs allow you to directly deposit
checks and cash into your accounts without stuffing envelopes. As for
the envelope-based deposits, make sure they go through – if it gets
jammed and it doesn‘t fully go into the machine, the next person
can walk up and take it out. After having made the ATM deposit,
compare your records with the account statements or online banking
records.
INDIAN SCENARIO
In India, where total number of installed ATM’s base is far less
than many developed countries. ATM-related frauds are very less. But they
could increase as more and more ATM’s will penetrate in the country, the bank
should create awareness among customers about the card-related frauds to reduce
the number of frauds in future. In India, Indian Banks Association (IBA)can take
lead to kick started.
The ATM fraud is not the sole problem of banks alone. It is a big threat and
it requires a coordinated and cooperative action on the part of the bank,
customers and the law enforcement machinery. The ATM frauds not only
cause financial loss to banks but they also undermine customers’
confidence in the use of ATMs. This would deter a greater use of ATM for
monetary transactions. It is therefore in the interest of banks to prevent ATM
frauds. There is thus a need to take precautionary and insurance
measures that give greater “protection” to the ATMs, particularly
those located in less secure areas. The nature and the ext ent of
precautionary measures to be adopted will, however, depend upon the
requirements of the respective banks.
55
CYBER MONEY LAUNDERING
During the past three decades, IT and Internet technologies have
reached every nook and corner of the world. E-commerce has come into
existence due to the attributes of Internet like ease of use, speed, anonymity
and its International nature. Internet has converted the world into a boundary less
market place that never sleeps. Drug peddlers and organized criminals
found a natural and much sought after ally in Internet. Computer
networks and Internet, in particular, permit transfer of funds electronically
between trading partners, businesses and consumers. This transfer can be done in
many ways. They include use of credit cards, Internet banking, e-cash, e-wallet
etc. for example, smart cards like Visa Cash, Mondex card, whose use is
growing can store billions of dollars. At present, there is an upper limit
imposed by the card issuers but technically there is no limit. In some other
forms of computer-based e-money, there is no upper limit. Mobile banking
and mobile commerce are growing and these technologies have
the capability to transfer any amount of money at the touch of a bottom
or click of a mouse. They can be effective tools in the hands of
money launderers. First and foremost, the anonymity offered by
internet and cyber payment systems is being exploited to the hilt by the
criminal elements.
As cyber payment systems eliminate the need for face to face
interactions, transfer of funds can be done between two trading partners
directly. Two individuals also can transfer funds directly using e- wallets. This
problem is further compounded by the fact that, in many countries, non-financial
institutions are also permitted to issue e-money. Monitoring the activities of these
institutions in a traditional manner is not possible. Earlier, cross-
border transactions were controlled by the central banks of respective
countries. With the entry of Internet commerce, the jurisdictional technicalities
56
come into play and it is another area that is being exploited by the
money launderers. The capacity to transfer unlimited amounts of money
without having to go through strict checks makes cyber money laundering an
attractive proposition. From the point of view of law enforcing agencies, all the
above advantages cyber payments provide to consumers and trading partners, turn
out to be great disadvantages while investigating the crimes.
WHY MONEY LAUNDERING?
The most important aim of money laundering is to conceal
the origin of the money, which, in almost all cases, is from illegal
activity. Criminal resort to this practice to avoid detection of the
money by law enforcement which will lead to its confiscation and also
may provide leads to the illegal activity. By laundering the money the
criminals are trying to close their tracks. Further, their aims could be to
increase the profits by resorting to illegal money transfer etc. and also of
course, to support new criminal ventures. Money laundering from
the point of view of the criminal increases the profits and, at the same time,
reduces the risk. While indulging in money laundering process, the launderers also
attempt to safeguard their interests. They conceal the origin and ownership of
the proceeds, maintain control over proceeds and change the form of
proceeds.
57
MONEY LAUNDERING PROCESS
Money laundering is normally accomplished by using a three-stage
process. The three steps involved are Placement, Layering and
Integration. E-money and cyber payment systems come in handy in all the
three stages of the process.
1 . P L A C E M E N T
The first activity is placement. Illegal activities like drug trafficking,
extortion, generate very volumes of money. People involved in these activities
cannot explain the origin and source of these funds to the authorities. There
is a constant fear of getting caught. So the immediate requirement is to
send this money to a different location using all available means. This stage is
characterized by facilitating the process of inducting the criminal money into the
legal financial system. Normally, this is done by opening up bank accounts in the
names of non-existent people or commercial organizations and depositing
the money. Online banking and Internet banking make it very easy for a
launderer to open and operate a bank account. Placement in cyber space occurs by
depositing the illegal money with some legitimate financial institutions or
58
businesses. This is done by breaking up the huge cash into smaller chunks.
Launderers are very careful at this stage because the chances of getting caught
are considerable here. Cyber payment system scan come in handy during this
process.
2 . L A Y E R I N G
Layering is the second sub process. In this complex layers of
financial transaction are created to disguise the audit trail and provide
anonymity. This is used to distance the money from the sources. This is
achieved by moving the names from and to offshore bank accounts in the names
of shell companies or front companies by using Electronic Funds
Transfer (EFT) or by other electronic means. Every day trillions of
dollars are transferred all over the world by other legitimate business and
thus it is almost impossible ton as certain whether some money is legal or
illegal. Launderers normally make use of commodity brokers, stock
brokers in the layering process. Launderers were also found to purchase high
value commodities like diamonds etc. and exporting them to a different
jurisdiction. During this process, they make use of the banks wherever
possible as in the legal commercial activity.
3. I N T E G R A T I O N
Integration is the third sub process. This is the stage in which the
‘cleaned’ money is ploughed back. This is achieved by making it
appear as legally earned. This is normally accomplished by the
launderers by establishing anonymous companies in countries
where secrecy is guaranteed. Anyone with access to Internet can start an e-
business. This can look and function like any other e-business as far as the
outside world is concerned. This anonymity is what makes Internet very
attractive for the launderers. They can then take loans from these
companies and bring back the money. This way they not only convert their money
59
this way but also can take advantages associated with loan servicing in terms of
tax relief. Another way can be by placing false export import invoices and over
valuing goods.
The entire process can be explained with the help of an example. The
money launderer’s first activity is to set up an online commerce company
which is legal. Normally, the launderer sets up the website for his
company and accepts online payments using credit cards for
the purchases made from his company’s website. As a part of the whole scheme,
launderers obtain credit cards from some banks or financial institutions located in
countries with lax rules, which are known as safe havens. The launderer
sitting at home, then, ‘makes purchases’ using this credit card from his own
website. As in normal transactions, the Web-based system then sends an invoice to
the customer’s (who happens to the launderer himself) bank, in the safe haven.
The bank then pays the money into the account of the company. Cyber
space provides a secure and anonymous opportunity to the criminals in money
laundering operations. It has come to light that many gangs are opening up the
front companies and hiring information technology specialists for
nefarious activities. Incidents have also come to light where the
criminals are using cryptography for hiding their transaction.
BUSINESS AREAS THAT SUPPORT OR ARE PRONE TO
MONEYLAUNDERING
The banks and other financial institution are the most important
intermediaries in the money laundering chain. As far as the banks are
concerned the countries that are considered safe for launderers are Cayman
Islands, Cyprus, Luxembourg, and Switzerland. The offshore
accounts of these banks are popular because they offer anonymity and also help in
tax evasion. Other financial institution like fund managers and those facilitating
Electronic Fund Transfer are also being manipulated by the launderers. Banking
60
obviously is the most affected sector by the money laundering operations. In
fact, Berltlot Brecht said, ‘If you want to steal, then buy a bank.’
Multinational banks are more vulnerable to money laundering operations.
When BCCI bank was investigated it came to light that there were 3,000
criminal customers and they were involved in offenses ranging from financing
nuclear weapon programs to narcotics. The second area is underground
banking or parallel banking. This is practiced by different countries by
different names. China follows a system called ‘Fic Chin’.
Under this system, money is deposited in one country and the
depositor is handed a chit or chop. The money is paid back in another
place on production of the chit. Similar systems known as Hundi, Hawallah are
practiced in India. It is much easier to launder the money using these
methods as there is no physical movement of money. These practices
mostly work on trust and mostly controlled by mafia in many countries.
Futures and commodity markets are another area which is found to
be facilitating the money laundering. The other areas include
professional advisers, financing housing schemes, casinos, antique dealers
and jewelers. Casinos are another business areas that is actively involved in
money laundering process. In all the cases the underlying factor is
paperless transactions. It was also found that launderers do take
advantages of privatization in various countries by investing in them.
This was observed in UK, India and Columbia. In Columbia, when the banks
were privatized the ‘Carli Cartel’ was reported to have invested
heavily and Italian mafia reportedly purchased shares in Italian banks. This
only shows the extent of the problem and also that the banks and financial
institutions are the primary target of the launderers. In some
countries, even political parties organizations are known to be using laundered
money for their campaigns.
EFFECTS ON BANKS
61
Almost all the banks trade in foreign exchange Money
laundering in any country or economy affects the foreign exchange market
directly. The money laundering reduces the legal volume of the banks
business. It also causes fluctuations in the exchange rate. Further, money
laundering can undermine the credibility of the banking system.
Facilitating the activities of launderers even inadvertently can push the banks
into problems with law enforcement agencies and also governments. In some
reported cases, the banks survival has come under threat. It is not difficult to see
what effect it has on the profitability of banks.
OTHER EFFECTS
In one incident, an Indian national in one year handled US 81.5 bn
illegal transactions, before his arrest during 1993. This incident also shows how
the national economy gets affected. A few years before that, the Indian
Government was so short of foreign exchange that it had to pledge gold in the
London bank. One needs not be an economist understand the impact of money
laundering on economies of developing countries. The low regulation by
central banks will become difficult and consequently, there will be
rise in inflation. Further, overall income distribution in an economy
is likely to get affected. Money laundering can help in spread of parallel
economy, which will result in loss to national income due to reduced tax
collections and lost jobs. On the social plane, this can result in increased
crime rate, violence in society. There may be attempts to gain political
power either directly or indirectly like Coli Cocoine Cartel’s attempt in
supporting Columbian President, Samper in 1996 elections. Because
cyber money laundering can be done from anywhere in the world without
any jurisdiction, the effects are much severe.
62
PREVENTION
Because of the nature of Cyber money laundering, no country can
effectively deal with it in isolation. Cyber money laundering has to be dealt
with at organizational [Bank or Financial Institution], national and
international levels.
63
AT ORGANIZATIONAL [BANK] LEVEL
T h e b a n k i n g a n d o t h e r f i n a n c i a l o r g a n i z a t i o n s c a n
r e d u c e t h e q u a n t u m o f m o n e y laundering by following the
guidelines issued by central banks of respective countries in letter and
spirit. The old principle of ‘Knowing the customer’ well will help a great
64
deal. It is very important to keep the records of the customer for a
sufficient time, at least for 8 to 10 years. Having an eye on suspicious
deals can give early warnings on the impending trouble. Any
suspicious activities must be reported to law enforcement
authorities. Developing internal control mechanisms is very essential
in this regard. Further, working in close association with other banks
and exchange of information and intelligence in this regard will
be definitely helpful. Law enforcement agencies have details of criminal
elements and their transactions. By working in close conjunction with
them, bank can have early warning on such activities. However,
banks must keep in mind the legal provisions regarding privacy of individuals.
AT NATIONAL LEVEL
Some countries liken UK have taken proactive steps to control this crime,
which could be cumulated by others. In UK, deposit taking institutions (including
banks) are expected to report suspicious transactions to the law
enforcement authorities. The legal provisions regarding ‘knowing
65
the customer’ brought down the crime to a great extent. They
empowered their customs officials to seize cash consignments of
10,000 pounds or more. Courts also permit confiscation of cash, if the
investigating authorities have strong evidence that the money has come
from illegal activities of drug trafficking. Issue of electronic money by
private parties is another factor, as in some countries regulation of these people
is not effective. Slowly, different countries are realizing the importance of this
issue and enacting suitable rules aimed at providing transparency in
transactions carried out by these institutions. The most important issues
at national level are establishing legal framework and training law
enforcing officials. The major weapon to combat this crime is
controlling financial transactions including e-transactions, through
legislation. Many countries have enacted some stringent laws to control this crime.
UK,US have stringent laws in dealing with Cyber money laundering.
Many other countries are following suit. The Council of Europe has passed
Criminal Justice Act. Hong Kong has passed similar laws. The single most
important issue is harmonizing the terrestrial laws with cyber laws.
AT INTERNATIONAL LEVEL
The UN has taken the lead and during 1995 international
community meeting signed a convention known as ‘UN Convention against
Illicit Traffic in Narcotic Drugs and Psychotropic Substances’. Further, this
convention made money laundering a crime and provided a model.
During 2000, the UN also organized another convention against
transnational organized crime. As a result of UN the efforts, the group of
seven industrialized nations established ‘Financial Action Task Force’
(FATF). The biggest source of money laundering funds comes from drug
trade and the volume of money is large. In order to cover this vast
amount of money they need financial services industry. They eye
financial institutions that are in the business of accepting deposits from
66
customers. After studying this phenomenon, Financial Action Task Force
(FATF)had noticed some critical points in the modus operandi of
criminals which are difficult for the launderers to avoid. They are points of
entry of cash into financial system, transfers to and from financial system and
cross-border flows of cash. Paying attention to these issues can help in
controlling cyber laundering to a considerable extent. According to financial
crimes enforcement network of US, less than 1% money laundered in
cyber space is ever detected or criminals prosecuted. Prevention of
money laundering in cyber space is proving to be really a daunting task.
Some of the suggested measures are putting an upper limit on the amount
of payment and frequency of using e-money in peer to peer transfers. The
second is making it mandatory for e-money organization to identify their
clients and also to keep a track of money movement. The third is
ensuring that Internet service providers keep a log of files
involving finances for a number of years. The fourth is making
audit compulsory for all electronic merchants and ensuring that they
keep transaction records for a certain period of time. The fifth is training law
e n f o r c e m e n t a g e n c i e s i n d e a l i n g e f f e c t i v e l y w i t h t h i s
c r i m e . L a s t b u t n o t t h e l e a s t , i s international co-operation and
harmonizing the national cyber and terrestrial laws with
international can help in dealing with this crime effectively.
CREDIT CARDS FRAUDS
INTRODUCTION TO CREDIT CARDS
67
Credit was first used in Assyria, Babylon and Egypt 3000 years ago. The
bill of exchange- the forerunner of banknotes - was established in the 14th
century. Debts were settled by one-third cash and two-thirds bill of exchange.
Paper money followed only in the 17th century. The first advertisement for credit
was placed in 1730 by Christopher Thornton, who offered furniture that could be
paid off weekly.
From the 18th century until the early part of the 20th, tallymen sold clothes
in return for small weekly payments. They were called "tallymen" because they
kept a record or tally of what people had bought on a wooden stick. One
side of the stick was marked with notches to represent the amount
of debt and the other side was a record of payments. In the 1920s,
a shopper's plate - a "buy now, pay later" system - was introduced in the
USA. It could only be used in the shops which issued it.
In 1950, Diners Club and American Express launched their charge cards in
the USA, the first "plastic money". In 1951, Diners Club issued the first credit card
to 200 customers who could use it at 27 restaurants in New York. But it was
only until the establishment of standards for the magnetic strip in 1970 that
the credit card became part of the information age. The first use of
magnetic stripes on cards was in the early 1960's, when the London
68
Transit Authority installed a magnetic stripe system. San Francisco Bay Area
Rapid Transit installed a paper based ticket the same size as the credit cards
in the late 1960's. The word credit comes from Latin, meaning “TRUST”.
CREDIT CARD FRAUD
INTRODUCTION
Credit card fraud is a wide-ranging term for theft and fraud
committed using a credit card or any similar payment mechanism as a
fraudulent source of funds in a transaction. The purpose may be to
obtain goods without paying, or to obtain unauthorized funds
from an account. Credit card fraud is also an adjunct to identity theft.
According to the Federal Trade Commission, while identity theft had
been holding steady for the last few years, It here has been an annual
increase of more than 40% in Credit Card fraud cases registered in the country
during the past two-three years, a Home Ministry official said. However, credit
card fraud, that crime which most people associate with ID theft, decreased
as a percentage of all ID theft complaints for the sixth year in a row. The fraud
begins with either the theft of the physical card or the compromise of
data associated with the account, including the card account number or other
information that would routinely and necessarily be available to a
merchant during a legitimate transaction. The compromise can
occur by many common routes and can usually be conducted without
tipping off the card holder, the merchant or the bank, at least until the
account is ultimately used for fraud. A simple example is that of a store
clerk copying sales receipts for later use. The rapid growth of credit card
use on the Internet has made database security lapses particularly costly; in some
cases, millions of accounts have been compromised.
69
IF CARD IS STOLEN
When a credit card is lost or stolen, it remains usable until the
holder notifies the bank that the card is lost; most banks have toll-
free telephone numbers with 24-hour support to encourage prompt
reporting. Still, it is possible for a thief to make unauthorized purchases
on that card up until the card is cancelled. In the absence of other
security measures, a thief could potentially purchase thousands of dollars in
merchandise or services before the card holder or the bank realize that the card is
in the wrong hands.
In the United States, federal law limits the liability of card holders to $50 in
the event of theft, regardless of the amount charged on the card; in practice, many
banks will waive even this small payment and simply remove the fraudulent
charges from the customer's account if the customer signs an affidavit
confirming that the charges are indeed fraudulent. Other countries
generally have similar laws aimed at protecting consumers from physical theft of
the card.
The only common security measure on all cards is a signature
panel, but signatures are relatively easy to forge. Many merchants will
demand to see a picture ID, such as a driver's license, to verify the identity
of the purchaser, and some credit cards include the holder's picture on the card
itself. However, the card holder has a right to refuse to show additional
verification, and asking for such verification may be a violation of the
merchant's agreement with the credit card companies.
Self-serve payment systems (gas stations, kiosks, etc.) are common
targets for stolen cards, as there is no way to verify the card holder's
identity. A common countermeasure is to require the user to key in some
identifying information, such as the user's ZIP or postal code. This
method may deter casual theft of a card found alone, but if the card holder's wallet
is stolen, it may be trivial for the thief to deduce the information by
70
looking at other items in the wallet. For instance, a U.S. driver license
commonly has the holder's home address and ZIP code printed on it.
Banks have a number of countermeasures at the network level,
including sophisticated real-time analysis that can estimate the
probability of fraud based on a number of factors. For example, a large
transaction occurring a great distance from the card holder's home might
be flagged as suspicious. The merchant may be instructed to call
the bank for verification, to decline the transaction, or even to hold the
card and refuse to return it to the customer.
Stolen cards can be reported quickly by card holders, but a compromised
account can be hoarded by a thief for weeks or months before any fraudulent use,
making it difficult to identify the source of the compromise. The card holder may
not discover fraudulent use until receiving a billing statement, which may be
delivered infrequently.
Compromised Accounts:
Card account information is stored in a number of formats.
Account numbers are often embossed or imprinted on the card, and a
magnetic stripe on the back contains the data in machine readable
format. Fields can vary, but the most common include:
• Name of card holder
•Account number
•Expiration date
•Verification
Many Web sites have been compromised in the past and theft of
credit card data is a major concern for banks. Data obtained in a
theft, like addresses or phone numbers, can be highly useful to a thief
as additional card holder verification.
71
Mail/Internet Order Fraud
The mail and the Internet are major routes for fraud against merchants who
sell and ship products, as well Internet merchants who provide online services.
The industry term for catalog order and similar transactions is "Card
Not Present" (CNP), meaning that the card is not physically
available for the merchant to inspect. The merchant must rely on
the holder (or someone purporting to be the holder) to present the
information on the card by indirect means, whether by mail, telephone or
over the Internet when the cardholder is not present at the point of sale.
It is difficult for a merchant to verify that the actual card holder is indeed
authorizing the purchase. Shipping companies can guarantee delivery to a location,
but they are not required to check identification and they are usually
are not involved in processing payments for the merchandise. A
common preventive measure for merchants is to allow shipment only to
an address approved by the cardholder, and merchant banking systems
offer simple methods of verifying this information.
Additionally, smaller transactions generally undergo less scrutiny, and are
less likely to be investigated by either the bank or the merchant, since the
cost of research and prosecution usually far outweighs the loss due to
fraud. CNP merchants must take extra precaution against fraud
exposure and associated losses, and they pay higher rates to
merchant banks for the privilege of accepting cards. Anonymous scam artists
bet on the fact that many fraud prevention features do not apply in this
environment.
Merchant associations have developed some prevention measures, such as
single use card numbers, but these have not met with much success.
Customers expect to be able to use their credit card without any hassles, and
have little incentive to pursue additional security due to laws limiting customer
72
liability in the event of fraud. Merchants can implement these prevention
measures but risk losing business if the customer chooses not to use the measures.
Account Takeover
There are two types of fraud within the identity theft category:
1. Application Fraud
2. Account Takeover
1. Application Fraud
Application fraud occurs when criminals use stolen or fake
documents to open an account in someone else's name. Criminals may
try to steal documents such as utility bills and bank statements to
build up useful personal information. Alternatively, they may
create counterfeit documents.
2. Account Takeover
Account takeover involves a criminal trying to take over another
person's account, first by gathering information about the intended victim, then
contacting their bank or credit issuer — masquerading as the genuine
cardholder — asking for mail to be redirected to a new address. The
criminal then reports the card lost and asks for a replacement to be sent.
The replacement card is then used fraudulently. Some merchants added a
new practice to protect consumers and self reputation, where they ask the
buyer to send a copy of the physical card and statement to ensure the
legitimate usage of a card.
Skimming
73
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime
Cyber crime

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Computer crime
Computer crimeComputer crime
Computer crime
 
Cyber Security of Nepal - Press Release
Cyber Security of Nepal - Press ReleaseCyber Security of Nepal - Press Release
Cyber Security of Nepal - Press Release
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Security A Challenges For Mankind
Cyber Security A Challenges For MankindCyber Security A Challenges For Mankind
Cyber Security A Challenges For Mankind
 
introduction to cyber security
introduction to cyber securityintroduction to cyber security
introduction to cyber security
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CyberCrime
CyberCrimeCyberCrime
CyberCrime
 
Introduction to cyber security
Introduction to cyber security Introduction to cyber security
Introduction to cyber security
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security in pakistan
Cyber crime and security in pakistanCyber crime and security in pakistan
Cyber crime and security in pakistan
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security law in Bangladesh
Cyber Security law in Bangladesh Cyber Security law in Bangladesh
Cyber Security law in Bangladesh
 
Cyber crime - What is and types.
Cyber crime - What is and types.Cyber crime - What is and types.
Cyber crime - What is and types.
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
Cyber crime ✔
Cyber  crime  ✔Cyber  crime  ✔
Cyber crime ✔
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime ppt new
Cyber crime ppt newCyber crime ppt new
Cyber crime ppt new
 

Semelhante a Cyber crime

Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineIRJET Journal
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...IJCSIS Research Publications
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber CrimeJody Sullivan
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingIJSRED
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseRohit Revo
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in IraqAyub Nuri
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!amit_shanu
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)Priyatham Kanigarla
 
E0334035040
E0334035040E0334035040
E0334035040theijes
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information SecurityMichele Thomas
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptxnivi55
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crimehomeworkping8
 
Cybercrime – an uncontrollable evil
Cybercrime – an uncontrollable evilCybercrime – an uncontrollable evil
Cybercrime – an uncontrollable evilfinlawassociates1
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problemijbuiiir1
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 

Semelhante a Cyber crime (20)

CYBER CRIME
CYBER CRIMECYBER CRIME
CYBER CRIME
 
Cyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social DeclineCyber Crime: Youth in Social Decline
Cyber Crime: Youth in Social Decline
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
State of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in BankingState of Cyber Crime Safety and Security in Banking
State of Cyber Crime Safety and Security in Banking
 
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offenseAspects of Cyber Crime theory | Criminal or a Noncriminal offense
Aspects of Cyber Crime theory | Criminal or a Noncriminal offense
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber crime in Pakistan
Cyber crime in PakistanCyber crime in Pakistan
Cyber crime in Pakistan
 
UNIT 5.docx
UNIT 5.docxUNIT 5.docx
UNIT 5.docx
 
E0334035040
E0334035040E0334035040
E0334035040
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime127027205 selected-case-studies-on-cyber-crime
127027205 selected-case-studies-on-cyber-crime
 
Cybercrime – an uncontrollable evil
Cybercrime – an uncontrollable evilCybercrime – an uncontrollable evil
Cybercrime – an uncontrollable evil
 
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global ProblemA Study on the Cyber-Crime and Cyber Criminals: A Global Problem
A Study on the Cyber-Crime and Cyber Criminals: A Global Problem
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 

Último

Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...Call Girls in Nagpur High Profile
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfGale Pooley
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptxFinTech Belgium
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptxFinTech Belgium
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignHenry Tapper
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Pooja Nehwal
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptxFinTech Belgium
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfGale Pooley
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Delhi Call girls
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...ssifa0344
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfGale Pooley
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceanilsa9823
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escortsranjana rawat
 

Último (20)

Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...Booking open Available Pune Call Girls Talegaon Dabhade  6297143586 Call Hot ...
Booking open Available Pune Call Girls Talegaon Dabhade 6297143586 Call Hot ...
 
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
VIP Call Girls Service Dilsukhnagar Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Shivane  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Shivane 6297143586 Call Hot Indian Gi...
 
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
05_Annelore Lenoir_Docbyte_MeetupDora&Cybersecurity.pptx
 
Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024Commercial Bank Economic Capsule - April 2024
Commercial Bank Economic Capsule - April 2024
 
The Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdfThe Economic History of the U.S. Lecture 30.pdf
The Economic History of the U.S. Lecture 30.pdf
 
00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx00_Main ppt_MeetupDORA&CyberSecurity.pptx
00_Main ppt_MeetupDORA&CyberSecurity.pptx
 
03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx03_Emmanuel Ndiaye_Degroof Petercam.pptx
03_Emmanuel Ndiaye_Degroof Petercam.pptx
 
Log your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaignLog your LOA pain with Pension Lab's brilliant campaign
Log your LOA pain with Pension Lab's brilliant campaign
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
Dharavi Russian callg Girls, { 09892124323 } || Call Girl In Mumbai ...
 
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
(INDIRA) Call Girl Mumbai Call Now 8250077686 Mumbai Escorts 24x7
 
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
02_Fabio Colombo_Accenture_MeetupDora&Cybersecurity.pptx
 
The Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdfThe Economic History of the U.S. Lecture 25.pdf
The Economic History of the U.S. Lecture 25.pdf
 
Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024Veritas Interim Report 1 January–31 March 2024
Veritas Interim Report 1 January–31 March 2024
 
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
Best VIP Call Girls Noida Sector 18 Call Me: 8448380779
 
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
TEST BANK For Corporate Finance, 13th Edition By Stephen Ross, Randolph Weste...
 
The Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdfThe Economic History of the U.S. Lecture 19.pdf
The Economic History of the U.S. Lecture 19.pdf
 
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual serviceCALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
CALL ON ➥8923113531 🔝Call Girls Gomti Nagar Lucknow best sexual service
 
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsHigh Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
High Class Call Girls Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 

Cyber crime

  • 1. UNIVERSITY OF LUCKNOW PROJECT ON CYBERCRIMEINBANKINGSECTOR SUBMITTED BY PRAVEENSINGHPOKHARIA PROJECT GUIDE Dr.KRISHNA ROHIT MISHRA MASTER IN VOCATIONAL STUDIES BANKING AND STOCK INSURANCE SEMESTER I (2016-17) NATIONAL POST GRADUATE COLLEGE LUCKNOW – 226001 1
  • 2. Declaration I Praveen Singh Pokharia Student of Master in Vocational Studies (Banking and Stock Insurance) Semester Ist here by declare that I have competed this project on Cyber Crime in Banking Sector. The information submitted is true and original to the best of my knowledge. ……………….. Student signature Student Name (Praveen Singh Pokharia) ACKNOWLEDGEMENT 2
  • 3. I am using this opportunity to express my gratitude to everyone who supported me throughout the course of this M. Voc (B.S.I)project. I am thankful for their aspiring guidance, invaluably constructive criticism and friendly advice during the project work. I am sincerely grateful to them for sharing their truthful and illuminating views on a number of issues related to the project. I express my warm thanks to my project external guide Dr. Krishna Rohit Mishra who has given an opportunity to work on such an interesting project. He proved to be a constant source of inspiration to me and provided constructive comments on how to make this report better. Credit also goes to my friends whose constant encouragement kept me in good stead. Lastly without fail I would thank all my faculties for providing all explicit and implicit support to me during the course of my project. EXCECUTIVESUMMARY 3
  • 4. Cyber crimes are any illegal activities committed using computer target of the criminal activity can be either a computer, network operations. Cyber crimes are genus of crimes, which use computers and networks for criminal activities. The difference between traditional crimes and cyber crimes is the cyber crimes can be transnational in nature. Cyber crime is a crime that is committed online in many areas using e-commerce. A computer can be the target of an offence w h e n u n a u t h o r i z e d a c c e s s o f c o m p u t e r n e t w o r k o c c u r s a n d o n o t h e r h a n d i t a f f e c t s E - COMMERCE. Cyber crimes can be of various types such as Telecommunications Piracy, Electronic Money Laundering and Tax Evasion, Sales and Investment Fraud, Electronic Funds Transfer Fraud and so on… Online banking or e-banking refers to the banking facility through information and communication technology. Traditionally, banking required a customer to stand in a long queue even to withdraw his money or to perform other ancillary functions. Now banking facility is available 24×7 through ATMs (Automated Teller Machines), internet banking, transfer through NEFT and RTGS etc., which has narrowed down the gap between the bank and the customer. E-banking is not only limited to banking facility through computer related systems. In the modern era, with the increase of users of smartphones e-banking covers mobile banking also. Because of liberalization, privatization and globalization it became necessary for the banks to start with e-banking facility. The term "Internet fraud" refers generally to any type of fraud scheme that uses one or more components of the Internet - such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the 4
  • 5. proceeds of fraud to financial institutions or to other connected with the scheme. Some forms of Internet fraud, include:Spam ,Scams, Spyware,Identity theft ,Phishing,Internet banking fraud. "The modern thief can steal more with a computer than with a gun. Tomorrow's terrorist may beable to do more damage with a keyboard than with a bomb". – National Research Council, "Computers at Risk", 1991. 5
  • 6. INDEX SR.NO. TOPICS PEGE NO. 1. CYBER CRIME 1-10 2. TYPES OF CYBER CRIME 11-28 3. CLASSIFICATION OF CYBER CRIME 29-31 4. REASONS OF CYBER CRIME 32-33 5. CYBER CRIMINALS 34-35 6. MODE AND MANNER OF COMMITING CYBER CRIME 36-38 7. BANKING SECTOR 39-40 8. CYBER CRIME IN BANKING SECTOR A). A.T.M FRUD B).MONEY LAUNDERING C).CREDIT CARD FRUD 41-70 9. CASE STUDY 71-72 10. GENERAL TIPS ON AVOIDING POSSIBLE INTERNET FRAUD SCHEEMS 73-74 11. RECENT CASES 75-76 12. CONCLUSION 77-78 13. BIBLOGRAPHY 79 6
  • 7. CYBER CRIME INTRODUCTION The usage of internet services in India is growing rapidly. It has given rise to new opportunities in every field we can think of – be it entertainment, business, sports or education. There are many pros and cons of some new types of technology which are been invented or discovered. Similarly the new & profound technology i.e. using of INTERNET Service, has also got some pros & cons. These cons are named CYBER CRIME, the major disadvantages, illegal activity committed on the internet by certain individuals because of certain loop-holes. The internet, along with its advantages, has also exposed us to security risks that come with connecting to a large network. Computers today are being misused for illegal activities like e-mail espionage, credit card fraud, spams, and software piracy and so on, which invade 7
  • 8. our privacy and offend our senses. Criminal activities in the cyberspace are on the rise. Computer crimes are criminal activities, which involve the use of information technology to gain an illegal or an unauthorized access to a computer system with intent of damaging, deleting or altering computer data. Computer crimes also include the activities such as electronic frauds, misuse of devices, identity theft and data as well as system interference. Computer crimes may not necessarily involve damage to physical property. They rather include the manipulation of confidential data and critical information. Computer crimes involve activities software theft, wherein the privacy of the users is hampered. These criminal activities involve the breach of human and information privacy, as also the theft and illegal alteration of system critical information. The different types of computer crimes have necessitated the introduction and use of newer and more effective security measures. In recent years, the growth and penetration of internet across Asia Pacific has been phenomenal. Today, a large number of rural areas in India and a couple of other nations in the region have increasing access to the internet—particularly broadband. The challenges of information security have also grown manifold. This widespread nature of cyber crime is beginning to show negative impact on the economic growth opportunities in each of the countries. It is becoming imperative for organizations to take both preventive and corrective actions if their systems are to be protected from any kind of compromise by external malicious elements. According to the latest statistics, more than a fifth of the malicious activities in the 8
  • 9. world originate from the Asia Pacific region. The malicious attacks included denial-of-service attacks, spam, and phishing and both attacks. In view of this, various governmental and non- governmental agencies are working towards reducing cyber crime activities. Computer crime, cyber crime, e-crime, hi-tech crime or electronic crime generally refers to criminal activity where a computer or network is the source, tool, target, or place of a crime. These categories are not exclusive and many activities can be characterized as falling in one or more category. Additionally, although the terms computer crime and cyber crime are more properly restricted to describing criminal activity in which the computer or network is a necessary part of the crime, these terms are also sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and embezzlement, in which computers or networks are used. As the use of computers has grown, computer crime has become more important. Computer crime can broadly be defined as criminal activity involving an information technology infrastructure, including illegal access (unauthorized access), illegal interception (by technical means of non-public transmissions of computer data to, from or within a computer system), data interference (unauthorized damaging, deletion, deterioration, alteration or suppression of computer data), systems interference (interfering with the functioning of a computer system by inputting, transmitting, damaging, deleting, deteriorating, altering or suppressing computer data), misuse of devices, forgery (ID theft), and electronic fraud (Taylor,1999) 9
  • 10. In the last three years, public sector banks (PSBs) in India have lost a total of Rs. 22,743 crore, on account of various banking frauds. With various measures initiated by the RBI, numbers of banking fraud cases have declined, but amount of money lost has increased in these years. Prima facie, an initial investigation in these cases has revealed involvement of not only mid-level employees, but also of the senior most management as was reflected in the case of Syndicate Bank and Indian Bank. This raises serious concern over the effectiveness of corporate governance at the highest echelons of these banks. In addition, there has been a rising trend of non- performing assets (NPAs), especially for the PSBs, thereby severely impacting their profitability. Several causes have been attributed to risky NPAs, including global and domestic slowdown, but there is some evidence of a relationship between frauds and NPAs as well. CYBER CRIMES IN INDIA 10
  • 11. As India become the fourth highest number of Internet users in the world, cyber crimes in India has also increased 50 percent in 2007 over the previous year. According to the Information Technology (IT) Act, the majority of offenders were under 30 years of age. Around 46 percent of cyber crimes were related to incidents of cyber pornography, followed by hacking. According to recent published 'Crime in 2007 report', published by the National Crime Record Bureau (NCRB), in over 60 percent of these cases, offenders were between 18 and 30. These cyber-crimes are punishable under two categories; the IT Act 2000and the Indian Penal Code (IPC). According to the report, 217 cases of cyber-crime were registered under the IT Act in 2007, which is an increase of 50 percent from the previous year. Under the IPC section, 339 cases were recorded in 2007 compared to 311 cases in 2006. Out of 35 mega cities, 17 cities have reported around 300 cases of cyber-crimes under both categories that is an increase of 32.6 percent in a year. The report also shows that cyber crime is not only limited to metro cities but it also moved to small cities like Bhopal. According to the report, Bhopal, the capital of Madhya Pradesh has reported the highest incidence of cyber crimes in the country. In order to tackle with cyber crime, Delhi Police have trained 100 of its officers in handling cyber crime and placed them in its Economic Offences Wing. These officers were trained for six weeks in computer hardware and software, computer networks comprising data communication networks, network protocols, wireless networks and network security. 11
  • 12. CRIME STATISTICS As per the National Crime Records Bureau statistics, during the year 2005, 179 cases were registered under the IT Act as compared to 68 cases during the previous year, there by reporting a significant increase of 163.2% in 2005 over 2004. During 2005, a total of 302 cases were registered under IPC sections as compared to 279 such cases during 2004, there by reporting an increase of 8.2% in 2005 over 2004. In fact, the National Crime Records Bureau data reveals that in the three years up to 2013, registered cases of cyber crime were up 350%, from 966 to 4356. Dubious distinctions both, and give banks and the financial sector in India cause for worry. Keeping in mind the dramatic swell in online economic crimes, India’s central bank – Reserve Bank of India (RBI) – issued a comprehensive circular in mid-2016 to all banks in India urging them to implement a cybersecurity framework. It prescribes the ideal approach for banks on taking concrete measures to combat cybercrime, fraudulent activities online and thereby retain customer confidence, reduce financial losses and ensure business continuity. However, actual numbers continue to include, considering the fact that a majority of the cases go unreported. Most victims, especially the corporate, continue to downplay on account of the fear of negative publicity thereby failing to give a correct picture of the cyber crime scene in the country. It is difficult to measure the growth of Cyber Crimes by any statistics, the reason being that a majority of cyber crimes don't get reported. "If we, therefore, focus on the number of cases registered or number of convictions achieved, we only get diverted from real facts," With increasing internet penetration, cyber crimes have 12
  • 13. also increased in the last few years. Between 2011 and 2015, the number of cyber crimes registered in the country has gone up 5 times. Maharashtra & Uttar Pradesh alone accounted for 1/3rd of these crimes. With increasing mobile and internet penetration in the country, cyber crimes have also increased proportionately. Between 2011 and 2015, more than 32000 cyber crimes were reported across the country. More than 24000 of these cases are registered under the IT Act and the remaining under the various sections of IPC and other State Level Legislations (SLL). CHANGING FACE OF CRIME 13
  • 14. In past few years it has seen a quantum jump not only in the quantity and quality but also the very nature of cyber crime activities. A perceptible trend being observed is that cyber crimes are moving from 'Personal Victimization' to 'Economic Offences'. SD Mishra, ACP, IPR and Cyber Cell, Economic Offences Wing, Delhi Police concurs that the cases that are now coming up are more related to financial frauds. As opposed to obscenity, pornography, malicious emails that were more prevalent in the past, now credit card frauds, phishing attacks ,online share trading, etc. are becoming more widespread. As Seth points out, initially, when the Internet boom began, certain crimes were noticeable and cyber stalking was one of the first ones."However, with the little offences came the larger ones involving huge money and one has seen this sudden jump from smaller crimes to financial crimes in previous years". CYBERSPACE 14
  • 15. As the cases of cyber crime grow; there is a growing need to prevent them. Cyberspace belongs to everyone. There should be electronic surveillance which means investigators tracking down hackers often want to monitor a cracker as he breaks into a victim's computer system. The two basic laws governing real-time electronic surveillance in other criminal investigations also apply in this context, search warrants which means that search warrants may be obtained to gain access to the premises where the cracker is believed to have evidence of the crime. Such evidence would include the computer used to commit the crime, as well as the software used to gain unauthorized access and other evidence of the crime. Researchers must explore the problems in greater detail to learn the origins, methods, and motivations of this growing criminal group. Decision- makers in business, government, and law enforcement must react to this emerging body of knowledge. They must develop policies, methods, and regulations to detect incursions, investigate and prosecute the perpetrators, and prevent future crimes. In addition, Police Departments should immediately take steps to protect their own information systems from intrusions (Any entry into an area not previously occupied). Internet provides anonymity: This is one of the reasons why criminals try to get away easily when caught and also give them a chance to commit the crime again. Therefore, we users should be careful. We should not disclose any personal information on the internet or use credit cards and if we find anything suspicious in e-mails or if the system is hacked, it should be immediately reported to the Police officials who investigate cyber-crimes rather than trying to fix the problem by our selves. 15
  • 16. Computer crime is a multi-billion dollar problem. Law enforcement must seek ways to keep the drawbacks from overshadowing the great promise of the computer age. Cyber crime is a menace that has to be tackled effectively not only by the official but also by the users by co-operating with the law. The founding fathers of internet wanted it to be a boon to the whole world and it is upon us to keep this tool of modernization as a boon and not make it a bane to the society. TYPES OF CYBER CRIME 1. Theft of Telecommunications Services: 16
  • 17. The "phone phreakers" of three decades ago set a precedent for what has become a major criminal industry. By gaining access to an organization’s telephone switchboard (PBX)individuals or criminal organizations can obtain access to dial-in/dial-out circuits and then make their own calls or sell call time to third parties (Gold 1999). Offenders may gain access to the switch board by impersonating a technician, by fraudulently obtaining an employee's access code, or by using software available on the internet. Some sophisticated offenders loop between PBX systems to evade detection. Additional forms of service theft include capturing "calling card" details and on-selling calls charged to the calling card account, and counterfeiting or illicit reprogramming of stored value telephone cards. I t h a s b e e n s u g g e s t e d t h a t a s l o n g a g o a s 1 9 9 0 , s e c u r i t y f a i l u r e s a t o n e m a j o r telecommunications carrier cost approximately £290 million, and that more recently, up to 5% of total industry turnover has been lost to fraud (Schieck 1995: 2-5). Costs to individual subscriber scan also be significant in one case; computer hackers in the United States illegally obtained access to Scotland Yard's telephone network and made £620,000 worth of international calls for which Scotland Yard was responsible (Tendler and Nuttall 1996). 2. Communications in Furtherance of Criminal Conspiracies: Just as legitimate organizations in the private and public sectors rely upon information s y s t e m s f o r c o m m u n i c a t i o n s a n d r e c o r d k e e p i n g , s o t o o a r e t h e a c t i v i t i e s o f c r i m i n a l organizations enhanced by technology. There is evidence of telecommunications equipment being used to facilitate organized drug trafficking, gambling, prostitution, money laundering, child pornography and trade in weapons (in those jurisdictions where such activities are illegal). The use of encryption technology may place criminal communications beyond the reach of law enforcement. 17
  • 18. The use of computer networks to produce and distribute child pornography has become the subject of increasing attention. Today, these materials can be imported across national borders at the speed of light. The more overt manifestations of internet child pornography entail a modest degree of organization, as required by the infrastructure of IRC and WWW, but the activity appears largely confined to individuals. By contrast, some of the less publicly visible traffic in child pornography activity appears to entail a greater degree of organization. Although knowledge is confined to that conduct which has been the target of successful police investigation, there appear to have been a number of networks which extend cross-nationally, use sophisticated technologies of concealment, and entail a significant degree of coordination. Illustrative of such activity was the Wonderland Club, an international network with members in at least 14 nations ranging from Europe, to North America, to Australia. Access to the group was password protected, and content was encrypted. Police investigation of the activity, codenamed "Operation Cathedral" resulted in approximately 100 arrests around the world, and the seizure of over 100,000 images in September, 1998. 3. Telecommunications Piracy Digital technology permits perfect reproduction and easy dissemination of print, graphics, sound, and multimedia combinations. The temptation to reproduce copyrighted material for personal use, for sale at a lower price, or indeed, for free distribution, has proven irresistible to many. This has caused considerable concern to owners of copyrighted material. Each year, It has been estimated that losses of between US$15 and US$17 billion are sustained by industry by reason of copyright infringement (United States, Information Infrastructure Task Force 1995,131). The Software Publishers Association has estimated that $7.4 billion worth of software was lost to piracy in 1993 with $2 billion of that being stolen from the Internet (Meyer and Underwood 1994). 18
  • 19. Ryan (1998) puts the cost of foreign piracy to American industry at more than $10 billion in 1996, including $1.8 billion in the film industry, $1.2 billion in music, $3.8 billion in business application software, and $690 million in book publishing. According to the Straits Times (8/11/99) A copy of the most recent James Bond Film The World is Not Enough, was available free on the internet before its official release. When creators of a work, in whatever medium, are unable to profit from their creations, there can be a chilling effect on creative effort generally, in addition to financial loss. 4. Dissemination of Offensive Materials Content considered by some to be objectionable exists in abundance in cyberspace. This includes, among much else, sexually explicit materials, racist propaganda, and instructions for the fabrication of incendiary and explosive devices. Telecommunications systems can also be used for harassing, threatening or intrusive communications, from the traditional obscene telephone call to its contemporary manifestation in "cyber-stalking", in which persistent messages are sent to an unwilling recipient. One man allegedly stole nude photographs of his former girlfriend and her new boyfriend and posted them on the Internet, along with her name, address and telephone number. The unfortunate couple, residents of Kenosha, Wisconsin, received phone calls and e-mails from s t r a n g e r s a s f a r a w a y a s D e n m a r k w h o s a i d t h e y h a d s e e n t h e p h o t o s o n t h e I n t e r n e t . Investigations also revealed that the suspect was maintaining records about the woman's movements and compiling information about her family (Spice and Sink 1999). In another case a rejected suitor posted invitations on the Internet under the name of a 28-year-old woman, the would-be object of his affections that said that she had fantasies of rape and gang rape. He then communicated via email with 19
  • 20. men who replied to the solicitations and gave out personal information about the woman, including her address, phone number, details of her physical appearance and how to bypass her home security system. Strange men turned up at her home on six different occasions and she received many obscene phone calls. While the woman was not physically assaulted, she would not answer the phone, was afraid to leave her home, and lost her job (Miller 1999; Miller and Maharaj 1999). One former university student in California used email to harass 5 female students in1998. He bought information on the Internet about the women using a professor's credit card and then sent 100 messages including death threats, graphic sexual descriptions and references to their daily activities. He apparently made the threats in response to perceived teasing about his appearance (Associated Press 1999a). Computer networks may also be used in furtherance of extortion. The Sunday Times (London) reported in 1996 that over 40 financial institutions in Britain and the United States had been attacked electronically over the previous three years. In England, financial institutions were reported to have paid significant amounts to sophisticated computer criminals who threatened to wipe out computer systems. (The Sunday Times, June 2, 1996). The article cited four incidents between 1993 and 1995 in which a total of 42.5 million Pounds Sterling were paid by senior executives of the organizations concerned, who were convinced of the extortionists' capacity to crash their computer systems (Denning 1999 233-4). 5. Electronic Money Laundering and Tax Evasion 20
  • 21. For some time now, electronic funds transfers have assisted in concealing and in moving the proceeds of crime. Emerging technologies will greatly assist in concealing the origin of ill-gotten gains. Legitimately derived income may also be more easily concealed from taxation authorities. Large financial institutions will no longer be the only ones with the ability to achieve e l e c t r o n i c f u n d s t r a n s f e r s t r a n s i t i n g n u m e r o u s j u r i s d i c t i o n s a t t h e s p e e d o f l i g h t . T h e development of informal banking institutions and parallel banking systems may permit central bank supervision to be bypassed, but can also facilitate the evasion of cash transaction reporting requirements in those nations which have them. Traditional underground banks, which have flourished in Asian countries for centuries, will enjoy even greater capacity through the use of telecommunications. With the emergence and proliferation of various technologies of electronic commerce, one can easily envisage how traditional countermeasures against money laundering and tax evasion may soon be of limited value. I may soon be able to sell you a quantity of heroin, in return for an untraceable transfer of stored value to my "smart-card", which I then download anonymously to my account in a financial institution situated in an overseas jurisdiction which protects the privacy of banking clients. I can discreetly draw upon these funds as and when I may require, downloading them back to my stored value card (Wahlert 1996). 6. Electronic Vandalism, Terrorism and Extortion As never before, western industrial society is dependent upon complex data processing and telecommunications systems. Damage to, or interference with, any of these systems can lead to catastrophic consequences. Whether motivated by curiosity or vindictiveness electronic intruders cause inconvenience at best, and have the potential for inflicting massive harm While this potential has yet to be realized, a number of individuals and protest groups have hacked the official web pages of various governmental and commercial organizations for e.g.: (Rathmell1997). http://www.2600.com/hacked_pages/ (visited 4 January 2000). This may also operate in reverse: early in 1999 an organized hacking incident was apparently directed at a server which hosted the Internet domain for East Timor, which at the time was seeking its independence from Indonesia (Creed 1999). 21
  • 22. Defence planners around the world are investing substantially in information warfare -means of disrupting the information technology infrastructure of defence systems (Stix 1995).Attempts were made to disrupt the computer systems of the Sri Lankan Government (Associated Press 1998), and of the North Atlantic Treaty Organization during the 1999 bombing of Belgrade(BBC 1999). One case, which illustrates the transnational reach of extortionists, involved a number of German hackers who compromised the system of an Internet service provider in S o u t h F l o r i d a , d i s a b l i n g e i g h t o f t h e I S P s t e n s e r v e r s . T h e o f f e n d e r s o b t a i n e d p e r s o n a l information and credit card details of 10,000 subscribers, and, communicating via electronic mail through one of the compromised accounts, demanded that US$30,000 be delivered to a mail drop in Germany. Co-operation between US and German authorities resulted in the arrest of the extortionists (Bauer 1998). 7. Sales and Investment Fraud As electronic commerce becomes more prevalent, the application of digital technology to fraudulent endeavors will be that much greater. The use of the telephone for fraudulent sales pitches, deceptive charitable solicitations, or bogus investment overtures is increasingly common. Cyberspace now abounds with a wide variety of investment opportunities, from traditional securities such as stocks and bonds, to more exotic opportunities such as coconut farming, the sale and leaseback of automatic teller machines, and worldwide telephone lotteries (Cella and Stark 1997 837-844). Indeed, the digital age has been accompanied by unprecedented opportunities for misinformation. Fraudsters now enjoy direct access to millions of prospective victims around the world, instantaneously and at minimal cost. Classic pyramid schemes and "Exciting, Low-Risk Investment Opportunities" are not uncommon. The technology of the World Wide Web is ideally suited to investment solicitations. In the words of two SEC staff "At very little cost, and from the privacy of a basement office or living room, the fraudster can produce a home page that looks better and more sophisticated than that of a Fortune 500 company" (Cella and Stark 1997, 822). 22
  • 23. 8. Illegal Interception of Telecommunications D e v e l o p m e n t s i n t e l e c o m m u n i c a t i o n s p r o v i d e n e w o p p o r t u n i t i e s f o r e l e c t r o n i c eavesdropping. From activities as time- honoured as surveillance of an unfaithful spouse, to the newest forms of political and industrial espionage, telecommunications interception has increasing applications. Here again, technological developments create new vulnerabilities. The electromagnetic signals emitted by a computer may themselves be intercepted. Cables may act as broadcast antennas. Existing law does not prevent the remote monitoring of computer radiation. It has been reported that the notorious American hacker Kevin Poulsen was able to gain access to law enforcement and national security wiretap data prior to his arrest in 1991 (Littman1997). In 1995, hackers employed by a criminal organization attacked the communications s y s t e m o f t h e A m s t e r d a m P o l i c e . T h e h a c k e r s s u c c e e d e d i n g a i n i n g p o l i c e o p e r a t i o n a l intelligence, and in disrupting police communications (Rathmell 1997). 9. Electronic Funds Transfer Fraud Electronic funds transfer systems have begun to proliferate, and so has the risk that such transactions may be intercepted and diverted. Valid credit card numbers can be intercepted e l e c t r o n i c a l l y , a s w e l l a s p h y s i c a l l y ; t h e d i g i t a l i n f o r m a t i o n s t o r e d o n a c a r d c a n b e counterfeited. Of course, we don't need Willie Sutton to remind us that banks are where they keep the money. In 1994, a Russian hacker Vladimir Levin, operating from St Petersburg, accessed the computers of Citibank's central wire transfer department, and transferred funds from large corporate accounts to other accounts which had been opened by his accomplices in The United States, the Netherlands, Finland, 23
  • 24. Germany, and Israel. Officials from one of the corporate victims, located in Argentina, notified the bank, and the suspect accounts, located in San F r a n c i s c o , w e r e f r o z e n . T h e a c c o m p l i c e w a s a r r e s t e d . A n o t h e r a c c o m p l i c e w a s c a u g h t attempting to withdraw funds from an account in Rotterdam. Although Russian law precluded Levin's extradition, he was arrested during a visit to the United States and subsequently imprisoned. (Denning 1999, 55). The above forms of computer-related crime are not necessarily mutually exclusive, and need not occur in isolation. Just as an armed robber might steal an automobile to facilitate a quick getaway, so too can one steal telecommunications services and use them for purposes of vandalism, fraud, or in furtherance of a criminal conspiracy.1 Computer-related crime may be compound in nature, combining two or more of the generic forms outlined above. 24
  • 25. OTHER TYPES OF CYBER CRIME 1. HACKING Hacking in simple terms means an illegal intrusion into a computer system and/or network. There is an equivalent term to hacking i.e. cracking, but from Indian Laws perspective there is no difference between the term hacking and cracking. Every act committed towards breaking into a computer and/or network is hacking. Hackers write or use ready-made computer programs to attack the target computer. They possess the desire to destruct and they get the kick out of such destruction. Some hackers hack for personal monetary gains, such as to stealing the credit card information, transferring money from various bank accounts to their own account followed by withdrawal of money. They extort money from some corporate giant threatening him to publish the stolen information which is critical in nature. Government websites are the hot targets of the hackers due to the press coverage, it receives. Hackers enjoy the media coverage. Motive Behind The Crime a) Greed b) Power c) Publicity d) Revenge e) Adventure f) Desiretoaccessforbiddeninformation g) Destructivemindset h) Wantstoselln/wsecurity services 2. Child Pornography 25
  • 26. The Internet is being highly used by its abusers to reach and abuse children sexually, worldwide. The internet is very fast becoming a household commodity in India. Its explosion has made the children a viable victim to the cyber crime. As more homes have access to internet, more children would be using the internet and more are the chances of falling victim to the aggression of pedophiles. The easy access to the pornographic contents readily and freely available over the internet lower the inhibitions of the children. Pedophiles lure the children by distributing pornographic material, and then they try to meet them for sex or to take their nude photographs including their engagement in sexual positions. Sometimes Pedophiles contact children in the chat rooms posing as teenagers or a child of similar age, then they start becoming friendlier with them and win their confidence. Then slowly pedophiles start sexual chat to help children shed their inhibitions about sex and then call them out for personal interaction. Then starts actual exploitation of the children by offering them some money or falsely promising them good opportunities in life. The pedophiles then sexually exploit the children either by using them as sexual objects or by taking their pornographic pictures in order to sell those over the internet. In physical world, parents know the face of dangers and they know how to avoid & face the problems by following simple rules and accordingly they advice their children to keep away from dangerous things and ways. But in case of cyber world, most of the parents do not themselves know about the basics in internet and dangers posed by various services offered over the internet. Hence the children are left unprotected in the cyber world. Pedophiles take advantage of this situation and lure the children, who are not advised by their parents or by their teachers about what is wrong and what is right for them while browsing the internet. How Do They Operate 26
  • 27. a) Pedophiles use false identity to trap the children/teenagers. b) Pedophiles contact children/teens in various chat rooms which are used by children/teen to interact with other children/teen. c) B e f r i e n d t h e c h i l d / t e e n . d) Extract personal information from the child/teen by winning his confidence. e) Gets the e-mail address of the child/teen and starts making contacts on the victim e-mail address as well. f) S t a r t s s e n d i n g p o r n o g r a p h i c i m a g e s / t e x t t o t h e v i c t i m i n c l u d i n g c h i l d p o r n o g r a p h i c images in order to help child/teen shed his inhibitions so that a feeling is created in the mind of the victim that what is being fed to him is normal and that everybody does it. g) Extract personal information from child/teen. h) At the end of it, the pedophile set up a meeting with the child/teen out of the house and then drag him into the net to further sexually assault him or to use him as a sex object. In order to prevent your child/teen from falling into the trap of pedophile, read the tips under Tips & Tricks heading. 3. Cyber Stalking Cyber Stalking can be defined as the repeated acts harassment or threatening behavior of the cyber criminal towards the victim by using internet services. Stalking in General terms can be referred to as the repeated acts of harassment targeting the victim such as following the victim, making harassing phone calls, killing the victims pet, vandalizing victims property, leaving written messages or objects. Stalking may be followed by serious violent acts such as physical harm to the victim and the same has to be treated and viewed seriously. It all depends on the course of conduct of the stalker. 27
  • 28. Both kind of Stalkers Online & Offline – have desire to control the victims life. Majority of the stalkers are the dejected lovers or ex-lovers, who then want to harass the victim because they failed to satisfy their secret desires. Most of the stalkers are men and victim female. How Do They Operate a) Collect all personal information about the victim such as name, family background, Telephone Numbers of residence and work place, daily routine of the victim, address of residence and place of work, date of birth etc. If the stalker is one of the acquaintances of the victim he can easily get this information. If stalker is a stranger to victim, he collects the information from the internet resources such as various profiles, the victim may have filled in while opening the chat or e-mail account or while signing an account with some website. b) The stalker may post this information on any website related to sex-services or dating services, posing as if the victim is posting this information and invite the people to call the victim on her telephone numbers to have sexual services. Stalker even uses very filthy and obscene language to invite the interested persons. c) People of all kind from nook and corner of the World, who come across this information, start calling the victim at her residence and/or work place, asking for sexual services or relationships. d) Some stalkers subscribe the e-mail account of the victim to innumerable pornographic and sex sites, because of which victim starts receiving such kind of unsolicited e-mails. e) Some stalkers keep on sending repeated e-mails asking for various kinds of favors or threaten the victim. f) In online stalking the stalker can make third party to harass the victim. 28
  • 29. g) Follow their victim from board to board. They “hangout” on the same BB’s as their victim, many times posting notes to the victim, making sure the victim is aware that h e / s h e i s b e i n g f o l l o w e d . M a n y t i m e s t h e y w i l l “ f l a m e ” t h e i r v i c t i m ( b e c o m i n g argumentative, insulting) to get their attention. h) Stalkers will almost always make contact with their victims through email. The letters may be loving, threatening, or sexually explicit. He will many times use multiple names when contacting the victim. i) Contact victim via telephone. If the stalker is able to access the victim’s telephone, he will many times make calls to the victim to threaten, harass, or intimidate them. j) T r a c k t h e v i c t i m t o h i s / h e r h o m e . Definition of Cyber stalking Although there is no universally accepted definition of cyber stalking, the term is used in this report to refer to the use of the Internet, e-mail, or other electronic communications devices to stalk another person. Stalking generally involves harassing or threatening behavior that an individual engages in repeatedly, such as following a person, appearing at a person’s home or place of business, making harassing phone calls, leaving written messages or objects, or vandalizing a person’s property. Most stalking laws require that the perpetrator make a credible threat of violence against the victim; others include threats against the victim’s immediate family; and still others require only that the alleged stalker’s course of conduct constitute an implied threat. (1) While some conduct involving annoying or menacing behavior might fall short of illegal stalking, such behavior may be a prelude to stalking and violence and should be treated seriously. 29
  • 30. Nature and Extent of Cyber stalking An existing problem aggravated by new technology. Although online harassment and threats can take many forms, cyber stalking shares important characteristics with offline stalking. Many stalkers – online or offline – are motivated by a desire to exert control over their victims and engage in similar types of behavior to accomplish this end. As with offline stalking, the available evidence (which is largely anecdotal) suggests that the majority of cyber stalkers are men and the majority of their victims are women, although there have been reported cases of women cyber stalking men and of same-sex cyber stalking. In many cases, the cyber stalker and the victim had a prior relationship, and the cyber stalking begins when the victim attempts to break off the relationship. However, there also have been many instances of cyber stalking by strangers. Given the enormous amount of personal information available through the Internet, a cyber stalker can easily locate private information about a potential victim with a few mouse clicks or key strokes. The fact that cyber stalking does not involve physical contact may create the misperception that it is more benign than physical stalking. This is not necessarily true. As the Internet becomes an ever more integral part of our personal and professional lives, stalkers can take advantage of the ease of communications as well as increased access to personal information. In addition, the ease of use and non-confrontational, impersonal, and sometimes anonymous nature of Internet communications may remove disincentives to cyber stalking. Put another way, whereas a potential stalker may be unwilling or unable to confront a victim in person or on the telephone, he or she may have little hesitation sending harassing or threatening electronic communications to a victim. Finally, as with physical stalking, online harassment and threats may be a prelude to more serious behavior, including physical violence. 30
  • 31. Phishing In the field of computer security, Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, online payment processors or IT Administrators are commonly used to lure the unsuspecting public. Phishing is typically carried out by e-mail or instant messaging, and it often directs users to enter details at a fake website w h o s e l o o k a n d f e e l a r e a l m o s t i d e n t i c a l t o t h e l e g i t i m a t e o n e . E v e n w h e n u s i n g s e r v e r authentication, it may require tremendous skill to detect that the website is fake. Phishing is an example of social engineering techniques used to fool users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Phishing, also referred to as brand spoofing or carding, is a variation on "fishing," the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting. A phishing technique was described in detail in 1987, and the first recorded use of the term "phishing" was made in 1996. Phishing email From: *****Bank [mailto:support@****Bank.com] Sent: 08 June 2004 03:25 To: IndiaSubject: Official information from ***** Bank Dear valued ***** Bank Customer! For security purposes your account has been 31
  • 32. randomly chosen for verification. To verify your account information we are asking you to provide us with all the data we are requesting. Otherwise we will not be able to verify your identity and access to your account will be denied. Please click on the link below to get to the bank secure page and verify your account details. Thank you. https://infinity.*****bank.co.in/Verify.jsp ****** Bank Limited Spam Spam is a generic term used to describe electronic 'junk mail' or unwanted messages sent to your email account or mobile phone. These messages vary, but are essentially commercial and often annoying in their sheer volume. They may try to persuade you to buy a product or service, or visit a website where you can make purchases; or they may attempt to trick you into divulging your bank account or credit card details.More information about spam is available from the Australian Communications and Media Authority (ACMA website). Scams The power of the Internet and email communication has made it all too easy for email scams to flourish. These schemes often arrive uninvited by email. Many are related to the well-documented Nigerian Scam or Lotto Scams and use similar tactics in one form or another. While the actual amount of money lost by businesses and the community is unknown, the number of people claiming to have been defrauded by these scams is relatively low. More information about scams is available from the Australian Competition and Consumer Commission (ACCC)SCAM watch website a n d t h e Australian Securities and Investments Commission FIDO website. 32
  • 33. Spyware Spyware is generally considered to be software that is secretly installed on a computer and takes things from it without the permission or knowledge of the user. Spyware may take personal information, business information, bandwidth; or processing capacity and secretly gives it to someone else. It is recognized as a growing problem. More information about taking care of spyware is available from the Department of Broadband, Communication, and the Digital Economy (DBCDE) website. 4. Denial Of Service Attack This is an act by the criminal, who floods the bandwidth of the victim’s network or fills his email box with spam mail depriving him of the services he is entitled to access or provide. 5. Virus Dissemination Malicious software that attaches itself to other software (Virus,, worms,, Trojan Horse,, Time bomb,, Logic Bomb,, Rabbit and Bacterium are the malicious software’s). 6. Software Piracy Theft of software through the illegal copying of genuine programs or the counterfeiting and distribution of products intended to pass for the original. Retail revenue losses worldwide are ever increasing due to this crime. It can be done in various ways- End user copying, Hard disk loading,, Counterfeiting,, Illegal downloads from the internet etc. 7. Spoofing 33
  • 34. Getting one computer on a network to pretend to have the identity of another computer, usually one with special access privileges, so as to obtain access to the other computers on the network.. 8. Net Extortion Copying the company’s confidential data in order to extort said company for huge amount. 9. S A L A M I A T T A C K In such crime criminal makes insignificant changes in such a manner that such changes would go unnoticed. Criminal makes such program that deducts small amount like Rs. 2.50 per month from the account of all the customer of the Bank and deposit the same in his account. In this case no account holder will approach the bank for such small amount but criminal gains huge amount. 10. SALE OF NARCOTICS • Sale & Purchase through net. •There are web sites which offer sale and shipment off contrabands drugs. • They may use the techniques off stenography for hiding the messages. 34
  • 35. CLASSIFICATION OF CYBER CRIME 1. Cybercrimes Against Persons Cybercrimes committed against persons include various crimes like transmission of child-pornography, harassment of any one with the use of a computer such as e-mail. The trafficking, distribution, posting, and dissemination of obscene material including pornography and indecent exposure, constitutes one of the most important Cybercrimes 35 Classification of Cyber Crime Cyber Crime Against Person Cyber Crime Against Property Cyber Crime Against Government
  • 36. known today. The potential harm of such a crime to humanity can hardly be amplified. This is one Cybercrime which threatens to undermine the growth of the younger generation as also leave irreparable scars and injury on the younger generation, if not controlled. A minor girl in Ahmadabad was lured to a private place through cyber chat by a man, who, along with his friends, attempted to gang-rape her. As some passersby heard her cry, she was rescued. Another example wherein the damage was not done to a person but to the masses is the case of the Melissa virus. The Melissa virus first appeared on the internet in March of 1999. It spread rapidly throughout computer systems in the United States and Europe. It is estimated that the virus caused 80 million dollars in damages to computers worldwide. In the United States alone, the virus made its way through 1.2 million computers in one-fifth of the country's largest businesses. David Smith pleaded guilty on Dec. 9, 1999 to state and federal charges associated with his creation of the Melissa virus. There are numerous examples of such computer viruses few of them being "Melissa" and "love bug". 2. Cybercrimes Against Property The second category of Cybercrimes is that of Cybercrimes against all forms of property. These crimes include computer vandalism (destruction of others' property), transmission of harmful programmers. A Mumbai-based upstart engineering company lost a say and much money in the business when the rival company, an industry major, stole the technical database from their computers with the help of a corporate cyber spy. 3. Cybercrimes Against Government The third category of Cybercrimes relate to Cybercrimes against Government. Cyber terrorism is one distinct kind of crime in this category. The 36
  • 37. growth of internet has shown that the medium of Cyberspace is being used by individuals and groups to threaten the international governments as also to terrorize the citizens of a country. This crime manifests itself into terrorism when an individual "cracks" into a government or military maintained website. The Parliament of India passed its first Cyber law, the Information Technology Act in2000. It not only provides the legal infrastructure for E-commerce in India but also at the same time, gives draconian powers to the Police to enter and search, without any warrant, any public place for the purpose of nabbing cybercriminals and preventing cybercrime. Also, the Indian C y b e r l a w t a l k s o f t h e a r r e s t o f a n y p e r s o n w h o i s a b o u t t o c o m m i t a c y b e r c r i m e . The Act defines five cybercrimes damage to computer source code, hacking, publishing electronic information which is lascivious or prurient, breach of confidentiality and publishing false digital signatures. The Act also specifies that cybercrimes can only be investigated by anofficial holding no less a rank than that of Dy. Superintendent of Police (Dy.SP). It is common that many systems operators do not share information when they are victimized by crackers. They don't contact law enforcement officers when their computer systems are invaded, preferring instead to fix the damage and take action to keep crackers from gaining access again with as little public attention as possible. According to Sundari Nanda, SP, CBI, "most of the times the victims do not complain, may be because they are aware of the extent of the crime committed against them, or as in the case of business houses, they don't want to confess their system is not secure". As the research shows, computer crime poses a real threat. Those who believe otherwise simply have not been awakened by the massive losses and setbacks experienced by companies worldwide. Money and intellectual 37
  • 38. property have been stolen, corporate operations impeded, and jobs lost as a result of computer crime. S i m i l a r l y , i n f o r m a t i o n s y s t e m s i n g o v e r n m e n t a n d b u s i n e s s a l i k e h a v e b e e n compromised. The economic impact of computer crime is staggering (great difficulty). REASONS FOR CYBER CRIME Hart in his work “The Concept of Law” has said ‘human beings are vulnerable so rule of law is required to protect them’. Applying this to the cyberspace we may say that computers are vulnerable (capable of attack) so rule of law is required to protect and safeguard them against cyber crime. The reasons for the vulnerability of computers may be said to be: 38
  • 39. 1. Capacity To Store Data In Comparatively Small Space- The computer has unique characteristic of storing data in a very small space. This affords to remove or derive information either through physical or virtual medium makes it much easier. 2. E a s y T o A c c e s s The problem encountered in guarding a computer system from unauthorized access is that there is every possibility of breach not due to human error but due to the complex technology. By secretly implanted logic bomb, key loggers that can steal access codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and bypass firewalls can be utilized to get past many a security system. 3. C o m p l e x The computers work on operating systems and these operating systems in turn are composed of millions of codes. Human mind is fallible and it is not 39
  • 40. possible that there might not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate into the computer system. 4. N e g l i g e n c e Negligence is very closely connected with human conduct. It is therefore very probable that while protecting the computer system there might be any negligence, which in turn provides a cyber criminal to gain access and control over the computer system. 5. Loss Of Evidence Loss of evidence is a very common & obvious problem as all the data are routinely destroyed. Further collection of data outside the territorial extent also paralyses this system of crime investigation. CYBER CRIMINALS 40
  • 41. The cyber criminals constitute of various groups/ category. This division may be justified on the basis of the object that they have in their mind. The following are the category of cyber criminals- 1. Children And Adolescents Between The Age Group Of 6 – 18 Years: The simple reason for this type of delinquent (A young offender) behavior pattern in children is seen mostly due to the inquisitiveness to know and explore the things. Other cognate reason may be to prove themselves to be outstanding amongst other children in their group. Further the reasons may be psychological even. E.g. the Bal Bharati(Delhi) case was the outcome of harassment of the delinquent by his friends. 2. Organized Hackers These kinds of hackers are mostly organized together to fulfill certain objective. The reason may be to fulfill their political bias, fundamentalism, etc. The Pakistanis are said to be one of the best quality hackers in the world. They mainly target the Indian government sites with the purpose to fulfill their political objectives. Further the NASA as well as the Microsoft sites is always under attack by the hackers. 3. Professional Hackers / Crackers Their work is motivated by the colour of money. These kinds of hackers are mostly employed to hack the site of the rivals and get credible, reliable and valuable information. Further they are even employed to crack the system of the employer basically as a measure to make it safer by detecting the loopholes. 4. Discontented Employees 41
  • 42. This group includes those people who have been either sacked by their employer or are dissatisfied with their employer. To avenge they normally hack the system of their employee. MODE AND MANNER OF COMMITING CYBER CRIME 42
  • 43. 1. Unauthorized Access To Computer Systems Or Networks /Hacking This kind of offence is normally referred as hacking in the generic sense. However the framers of the Information Technology Act 2000 have no where used this term so to avoid any confusion we would not interchangeably use the word hacking for ‘unauthorized access’ as the latter has wide connotation. 2. Theft Of Information Contained In Electronic Form This includes information stored in computer hard disks, removable storage media etc. Theft may be either by appropriating the data physically or by tampering them through the virtual medium. 3. E m a i l B o m b i n g This kind of activity refers to sending large numbers of mail to the victim, which may be an individual or a company or even mail servers there by ultimately resulting into crashing. 4. D a ta Diddling This kind of an attack involves altering raw data just before a computer processes it and then changing it back after the processing is completed. The electricity board faced similar problem of data diddling while the department was being computerized. 5. S a l a m i A t t a c k s This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed. E.g. the Ziegler case wherein a logic bomb was introduced in the bank’s system, which deducted 10 cents from every account and deposited it in a particular account. 43
  • 44. 6. Denial of Service Attack The computer of the victim is flooded with more requests than it can handle which cause it to crash. Distributed Denial of Service (DDS) attack is also a type of denial of service attack, in which the offenders are wide in number and widespread. E.g. Amazon, Yahoo. 7. Virus / Worm Attacks Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. E.g. love bug virus, which affected at least 5 % of the computers of the globe. The losses were accounted to be $ 10 million. The world's most famous worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988. Almost brought development of Internet to a complete halt. 8. L o g i c B o m b s These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus). 44
  • 45. 9. T r o j a n A t t a c k s This term has its origin in the word ‘Trojan horse’. In software field this means an unauthorized programme, which passively gains control over another’s system by representing itself as an authorized programme. The most common form of installing a Trojan is through e-mail. E.g. a Trojan was installed in the computer of a lady film director in the U.S. while chatting. The cyber criminal through the webcam installed in the computer obtained her personal data. He further harassed this lady. 10. Internet Time Thefts Normally in these kinds of thefts the Internet surfing hours of the victim are used up by another person. This is done by gaining access to the login ID and the password. E.g. Colonel Bajwa’s case- the Internet hours were used up by any other person. This was perhaps one of the first reported cases related to cyber crime in India. However this case made the police infamous as to their lack of understanding of the nature of cyber crime. 11. Web Jacking This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the web site of another. He may even mutilate or change the information on the site. This may be done for fulfilling political objectives or for money. E.g. recently the site of MIT (Ministry of Information Technology) was hacked by the Pakistani hackers and some obscene matter was placed therein. Further the site of Bombay crime branch was also web jacked. Another case of web jacking is that of the ‘ gold fish’ case. In this case the site was hacked and the information pertaining to gold fish was changed. Further a ransom of US $ 1 million was demanded as 45
  • 46. ransom. Thus web jacking is a process where by control over the site of another is made backed by some consideration for it. BANKING SECTOR The Banking Industry was once a simple and reliable business that took deposits from investors at a lower interest rate and loaned it out to borrowers at a higher rate. However deregulation and technology led to a revolution in the Banking Industry that saw it transformed. Banks have become global industrial powerhouses that have created ever more complex products that use risk. Through technology development, banking services have become available 24 hours a day, 365 days a week, through ATMs, at online banking, and in electronically enabled exchanges where everything from stocks to currency futures contracts can be traded. The Banking Industry at its core provides access to credit. In the lenders case, this includes access to their own savings and investments, and 46
  • 47. interest payments on those amounts. In the case of borrowers, it includes access to loans for the creditworthy, at a competitive interest rate. Banking services include transactional services, such as verification of account details, account balance details and the transfer of funds, as well as advisory services that help individuals and institutions to properly plan and manage their finances. Online banking channels have become a key in the last 10 years. The collapse of the Banking Industry in the Financial Crisis, however, means that some of the more extreme risk-taking and complex securitization activities that banks increasingly engaged in since 2000 will be limited and carefully watched, to ensure that there is not another banking system meltdown in the future. Banking in India originated in the last decades of the 18th century. The oldest bank inexistence in India is the State Bank of India, a government-owned bank that traces its origins back to June 1806 and that is the largest commercial bank in the country. Central banking is the r e s p o n s i b i l i t y o f t h e R e s e r v e B a n k o f I n d i a , w h i c h i n 1 9 3 5 f o r m a l l y t o o k o v e r t h e s e responsibilities from the then Imperial Bank of India, relegating it to commercial banking functions. After India's independence in 1947, the Reserve Bank was nationalized and given broader powers. In 1969 the government nationalized the 14 largest commercial banks; the government nationalized the six next largest in 1980.Currently, India has 88 scheduled commercial banks (SCBs) - 27 public sector banks(that is with the Government of India holding a stake), 31 private banks (these do not have government stake; they may be publicly listed and traded on stock exchanges) and 38 foreign banks. Total numbers of ATMs in India have increased to 189,189 by the end of August’15 and are further expected to double over the next few years, thereby taking the number of ATMs per million population from 105 in 2012, to about 300 in 2017. In 2015,with the Financial Inclusion Plan, 390387 villages were covered with 14207 branches. In April 2014, 47
  • 48. after 12 years of its last issuance of bank license, RBI granted in-principle licenses to IDFC and Bandhan Microfinance to promote rural expansion. CYBER CRIME IN BANKING SECTOR AUTOMATED TELLER MACHINE The traditional and ancient society was devoid of any monetary instruments and the entire exchange of goods and merchandise was managed by the “barter system”. The use of monetary instruments as a unit of exchange replaced the barter system and money in various denominations was used as the sole purchasing power. The modern contemporary era has replaced these traditional monetary instruments from a paper and metal based currency to “plastic money” in the form of credit cards, debit cards, etc. This has resulted in the 48
  • 49. increasing use of ATM all over the world. The use of ATM is not only safe but is also convenient. This safety and convenience, unfortunately, has an evil side as well that do not originate from the use of plastic money rather by the misuse of the same. This evil side is reflected in the form of “ATM FRAUDS” that is a global problem. The use of plastic money is increasing day by day for payment of shopping bills, electricity bills, school fees, phone bills, insurance premium, travelling bills and even petrol bills. The convenience and safety that credit cards carry with its use has been instrumental in increasing both credit card volumes and usage. This growth is not only in positive use of the same but as well as the negative use of the same. The world at large is struggling to increase the convenience and safety on the one hand and to reduce it misuse on the other. WAYS TO CARD FRAUDS Some of the popular techniques used to carry out ATM crime are: 1. T h r o u g h C a r d J a m m i n g A T M ’ s c a r d r e a d e r i s t a m p e r e d w i t h i n o r d e r t o t r a p a customer’s card. Later on the criminal removes the card. 2. Card Skimming, is the illegal way of stealing the card’s security information from the card’s magnetic stripe. 3. Card Swapping, through this customer’s card is swapped for another card without the knowledge of cardholder. 4. Website Spoofing, here a new fictitious site is made which looks authentic to the user and customers are asked to give their card number. PIN and other information, which are used to reproduce the card for use at an ATM. 5. Physical Attack. ATM machine is physical attacked for removing the cash. 49
  • 50. HOW TO USE CASH MACHINE Be aware of others around you. If someone close by the cash machine is behaving suspiciously or makes you feel uncomfortable, choose another .Make sure you check the machine before you use it for any signs of tampering. Examine the machine for stick on boxes, stick on card entry slots etc. If you find it difficult to get your card into the slot, do not use it, go to another machine. Anything unusual about the cash machine report it to the bank and police or the owner of the premises immediately. Under no circumstances should members of the public attempt to remove a device as it’s possible the offender may be nearby. 50
  • 51. HOW TO USE A CASH MACHINE 1. Give other users space to enter their personal identity number (PIN) in private. 2. Be aware of your surroundings. If someone is crowding or watching you, cancel thetransaction and go to another machine. Take your card with you. 3. D o n o t a c c e p t h e l p f r o m " w e l l m e a n i n g " s t r a n g e r s a n d n e v e r a l l o w y o u r s e l f t o b e distracted. 4. Stand close to the cash machine and always shield the keypad to avoid anyone seeing you enter your PIN. 51
  • 52. What Precaution Should Be Taken While Leaving Cash Machine 52
  • 53. Once you have completed a transaction, discreetly put your money and card away before leaving the cash machine. If you lose your card in a cash machine, cancel the card immediately with the card issuer’s 24-hour emergency line, which can be found on your last bank statement. Do not assume that your bank automatically knows that the machine has withheld your card. Again, beware of help offered by "well meaning strangers". Dispose of your cash machine receipt, mini-statement or balance enquiry slip with care. Tear up or preferably shred these items before discarding them. Card Fraud Also Happens In The Home: Cardholders should also be warned of the risks of verifying bank details at home in unsolicited telephone conversations. Always call the person back using the advertised customer telephone number, not the telephone number they may give you. i. Do Not Click On Hyperlinks Sent To You By Email Asking You To Confirm Your Bank Details Online: Hyperlinks are links to web pages that have been sent to you by email and may open a dummy website designed to steal your personal details. Phone your bank instead on their main customer number or access your account using the bank's main website address. Use good antivirus and firewall protection. ii. NEVERWriteDownYourPin: People make life very easy for pickpockets if they write down their PIN and keep it in their purse or wallet. Do not write down your PIN. If you have been given a number that you find difficult to remember, take your card along to a cash machine and change the number to onethat you will be able to remember without writing it down. PREVENTION FOR ATM CARDS 53
  • 54. Most ATM frauds happen due to the negligence of customers in using, and more importantly, negligence of banks in educating their customers about the matters that should betaken care of while at an ATM. The number of ATM frauds in India is more in regard to negligence of the Personal Identification Number (PIN), than by sophisticated crimes like skimming. Banks need to develop a fraud policy – the policy should be written and distributed to all employees, borrowers and depositors. The most important aspect for reducing ATM related fraud is to educate the customer. Here is a compiled list of guidelines to help your customer from being an ATM fraud victim: 1. Look for suspicious attachments. Criminals often capture information through ATM skimming – using devices that steal magnetic strip information. At a glance, the skimmer looks just like a regular ATM slot, but it‘s an attachment that captures ATM card numbers. To spot one, the attachment slightly protrudes from the machine and may not be parallel with the inherent grooves. Sometimes, the equipment will even cut off the printed labels on the ATM. The skimmer will not obtain PIN numbers, however. To get that, fraudsters place hidden cameras facing the ATM screen. There‘s also the helpful bystander (the criminal) who may be standing by to kindly inform you the machine has had problems and offer to help. If you do not feel safe at any time, press the ATM cancel button, remove your card and leave the area immediately. 2. Minimize your time at the ATM. The more time you spend at the ATM, the more vulnerable you are. If you need to update your records after a transaction, one is advised do it at home or office, but not while at the ATM. Even when depositing a cheque at the ATM, on should not make/sign the cheque at the ATM. After the transaction, if you 54
  • 55. think you are being followed, go to an area with a lot of people and call the police. 3. Make smart deposits. Some ATMs allow you to directly deposit checks and cash into your accounts without stuffing envelopes. As for the envelope-based deposits, make sure they go through – if it gets jammed and it doesn‘t fully go into the machine, the next person can walk up and take it out. After having made the ATM deposit, compare your records with the account statements or online banking records. INDIAN SCENARIO In India, where total number of installed ATM’s base is far less than many developed countries. ATM-related frauds are very less. But they could increase as more and more ATM’s will penetrate in the country, the bank should create awareness among customers about the card-related frauds to reduce the number of frauds in future. In India, Indian Banks Association (IBA)can take lead to kick started. The ATM fraud is not the sole problem of banks alone. It is a big threat and it requires a coordinated and cooperative action on the part of the bank, customers and the law enforcement machinery. The ATM frauds not only cause financial loss to banks but they also undermine customers’ confidence in the use of ATMs. This would deter a greater use of ATM for monetary transactions. It is therefore in the interest of banks to prevent ATM frauds. There is thus a need to take precautionary and insurance measures that give greater “protection” to the ATMs, particularly those located in less secure areas. The nature and the ext ent of precautionary measures to be adopted will, however, depend upon the requirements of the respective banks. 55
  • 56. CYBER MONEY LAUNDERING During the past three decades, IT and Internet technologies have reached every nook and corner of the world. E-commerce has come into existence due to the attributes of Internet like ease of use, speed, anonymity and its International nature. Internet has converted the world into a boundary less market place that never sleeps. Drug peddlers and organized criminals found a natural and much sought after ally in Internet. Computer networks and Internet, in particular, permit transfer of funds electronically between trading partners, businesses and consumers. This transfer can be done in many ways. They include use of credit cards, Internet banking, e-cash, e-wallet etc. for example, smart cards like Visa Cash, Mondex card, whose use is growing can store billions of dollars. At present, there is an upper limit imposed by the card issuers but technically there is no limit. In some other forms of computer-based e-money, there is no upper limit. Mobile banking and mobile commerce are growing and these technologies have the capability to transfer any amount of money at the touch of a bottom or click of a mouse. They can be effective tools in the hands of money launderers. First and foremost, the anonymity offered by internet and cyber payment systems is being exploited to the hilt by the criminal elements. As cyber payment systems eliminate the need for face to face interactions, transfer of funds can be done between two trading partners directly. Two individuals also can transfer funds directly using e- wallets. This problem is further compounded by the fact that, in many countries, non-financial institutions are also permitted to issue e-money. Monitoring the activities of these institutions in a traditional manner is not possible. Earlier, cross- border transactions were controlled by the central banks of respective countries. With the entry of Internet commerce, the jurisdictional technicalities 56
  • 57. come into play and it is another area that is being exploited by the money launderers. The capacity to transfer unlimited amounts of money without having to go through strict checks makes cyber money laundering an attractive proposition. From the point of view of law enforcing agencies, all the above advantages cyber payments provide to consumers and trading partners, turn out to be great disadvantages while investigating the crimes. WHY MONEY LAUNDERING? The most important aim of money laundering is to conceal the origin of the money, which, in almost all cases, is from illegal activity. Criminal resort to this practice to avoid detection of the money by law enforcement which will lead to its confiscation and also may provide leads to the illegal activity. By laundering the money the criminals are trying to close their tracks. Further, their aims could be to increase the profits by resorting to illegal money transfer etc. and also of course, to support new criminal ventures. Money laundering from the point of view of the criminal increases the profits and, at the same time, reduces the risk. While indulging in money laundering process, the launderers also attempt to safeguard their interests. They conceal the origin and ownership of the proceeds, maintain control over proceeds and change the form of proceeds. 57
  • 58. MONEY LAUNDERING PROCESS Money laundering is normally accomplished by using a three-stage process. The three steps involved are Placement, Layering and Integration. E-money and cyber payment systems come in handy in all the three stages of the process. 1 . P L A C E M E N T The first activity is placement. Illegal activities like drug trafficking, extortion, generate very volumes of money. People involved in these activities cannot explain the origin and source of these funds to the authorities. There is a constant fear of getting caught. So the immediate requirement is to send this money to a different location using all available means. This stage is characterized by facilitating the process of inducting the criminal money into the legal financial system. Normally, this is done by opening up bank accounts in the names of non-existent people or commercial organizations and depositing the money. Online banking and Internet banking make it very easy for a launderer to open and operate a bank account. Placement in cyber space occurs by depositing the illegal money with some legitimate financial institutions or 58
  • 59. businesses. This is done by breaking up the huge cash into smaller chunks. Launderers are very careful at this stage because the chances of getting caught are considerable here. Cyber payment system scan come in handy during this process. 2 . L A Y E R I N G Layering is the second sub process. In this complex layers of financial transaction are created to disguise the audit trail and provide anonymity. This is used to distance the money from the sources. This is achieved by moving the names from and to offshore bank accounts in the names of shell companies or front companies by using Electronic Funds Transfer (EFT) or by other electronic means. Every day trillions of dollars are transferred all over the world by other legitimate business and thus it is almost impossible ton as certain whether some money is legal or illegal. Launderers normally make use of commodity brokers, stock brokers in the layering process. Launderers were also found to purchase high value commodities like diamonds etc. and exporting them to a different jurisdiction. During this process, they make use of the banks wherever possible as in the legal commercial activity. 3. I N T E G R A T I O N Integration is the third sub process. This is the stage in which the ‘cleaned’ money is ploughed back. This is achieved by making it appear as legally earned. This is normally accomplished by the launderers by establishing anonymous companies in countries where secrecy is guaranteed. Anyone with access to Internet can start an e- business. This can look and function like any other e-business as far as the outside world is concerned. This anonymity is what makes Internet very attractive for the launderers. They can then take loans from these companies and bring back the money. This way they not only convert their money 59
  • 60. this way but also can take advantages associated with loan servicing in terms of tax relief. Another way can be by placing false export import invoices and over valuing goods. The entire process can be explained with the help of an example. The money launderer’s first activity is to set up an online commerce company which is legal. Normally, the launderer sets up the website for his company and accepts online payments using credit cards for the purchases made from his company’s website. As a part of the whole scheme, launderers obtain credit cards from some banks or financial institutions located in countries with lax rules, which are known as safe havens. The launderer sitting at home, then, ‘makes purchases’ using this credit card from his own website. As in normal transactions, the Web-based system then sends an invoice to the customer’s (who happens to the launderer himself) bank, in the safe haven. The bank then pays the money into the account of the company. Cyber space provides a secure and anonymous opportunity to the criminals in money laundering operations. It has come to light that many gangs are opening up the front companies and hiring information technology specialists for nefarious activities. Incidents have also come to light where the criminals are using cryptography for hiding their transaction. BUSINESS AREAS THAT SUPPORT OR ARE PRONE TO MONEYLAUNDERING The banks and other financial institution are the most important intermediaries in the money laundering chain. As far as the banks are concerned the countries that are considered safe for launderers are Cayman Islands, Cyprus, Luxembourg, and Switzerland. The offshore accounts of these banks are popular because they offer anonymity and also help in tax evasion. Other financial institution like fund managers and those facilitating Electronic Fund Transfer are also being manipulated by the launderers. Banking 60
  • 61. obviously is the most affected sector by the money laundering operations. In fact, Berltlot Brecht said, ‘If you want to steal, then buy a bank.’ Multinational banks are more vulnerable to money laundering operations. When BCCI bank was investigated it came to light that there were 3,000 criminal customers and they were involved in offenses ranging from financing nuclear weapon programs to narcotics. The second area is underground banking or parallel banking. This is practiced by different countries by different names. China follows a system called ‘Fic Chin’. Under this system, money is deposited in one country and the depositor is handed a chit or chop. The money is paid back in another place on production of the chit. Similar systems known as Hundi, Hawallah are practiced in India. It is much easier to launder the money using these methods as there is no physical movement of money. These practices mostly work on trust and mostly controlled by mafia in many countries. Futures and commodity markets are another area which is found to be facilitating the money laundering. The other areas include professional advisers, financing housing schemes, casinos, antique dealers and jewelers. Casinos are another business areas that is actively involved in money laundering process. In all the cases the underlying factor is paperless transactions. It was also found that launderers do take advantages of privatization in various countries by investing in them. This was observed in UK, India and Columbia. In Columbia, when the banks were privatized the ‘Carli Cartel’ was reported to have invested heavily and Italian mafia reportedly purchased shares in Italian banks. This only shows the extent of the problem and also that the banks and financial institutions are the primary target of the launderers. In some countries, even political parties organizations are known to be using laundered money for their campaigns. EFFECTS ON BANKS 61
  • 62. Almost all the banks trade in foreign exchange Money laundering in any country or economy affects the foreign exchange market directly. The money laundering reduces the legal volume of the banks business. It also causes fluctuations in the exchange rate. Further, money laundering can undermine the credibility of the banking system. Facilitating the activities of launderers even inadvertently can push the banks into problems with law enforcement agencies and also governments. In some reported cases, the banks survival has come under threat. It is not difficult to see what effect it has on the profitability of banks. OTHER EFFECTS In one incident, an Indian national in one year handled US 81.5 bn illegal transactions, before his arrest during 1993. This incident also shows how the national economy gets affected. A few years before that, the Indian Government was so short of foreign exchange that it had to pledge gold in the London bank. One needs not be an economist understand the impact of money laundering on economies of developing countries. The low regulation by central banks will become difficult and consequently, there will be rise in inflation. Further, overall income distribution in an economy is likely to get affected. Money laundering can help in spread of parallel economy, which will result in loss to national income due to reduced tax collections and lost jobs. On the social plane, this can result in increased crime rate, violence in society. There may be attempts to gain political power either directly or indirectly like Coli Cocoine Cartel’s attempt in supporting Columbian President, Samper in 1996 elections. Because cyber money laundering can be done from anywhere in the world without any jurisdiction, the effects are much severe. 62
  • 63. PREVENTION Because of the nature of Cyber money laundering, no country can effectively deal with it in isolation. Cyber money laundering has to be dealt with at organizational [Bank or Financial Institution], national and international levels. 63
  • 64. AT ORGANIZATIONAL [BANK] LEVEL T h e b a n k i n g a n d o t h e r f i n a n c i a l o r g a n i z a t i o n s c a n r e d u c e t h e q u a n t u m o f m o n e y laundering by following the guidelines issued by central banks of respective countries in letter and spirit. The old principle of ‘Knowing the customer’ well will help a great 64
  • 65. deal. It is very important to keep the records of the customer for a sufficient time, at least for 8 to 10 years. Having an eye on suspicious deals can give early warnings on the impending trouble. Any suspicious activities must be reported to law enforcement authorities. Developing internal control mechanisms is very essential in this regard. Further, working in close association with other banks and exchange of information and intelligence in this regard will be definitely helpful. Law enforcement agencies have details of criminal elements and their transactions. By working in close conjunction with them, bank can have early warning on such activities. However, banks must keep in mind the legal provisions regarding privacy of individuals. AT NATIONAL LEVEL Some countries liken UK have taken proactive steps to control this crime, which could be cumulated by others. In UK, deposit taking institutions (including banks) are expected to report suspicious transactions to the law enforcement authorities. The legal provisions regarding ‘knowing 65
  • 66. the customer’ brought down the crime to a great extent. They empowered their customs officials to seize cash consignments of 10,000 pounds or more. Courts also permit confiscation of cash, if the investigating authorities have strong evidence that the money has come from illegal activities of drug trafficking. Issue of electronic money by private parties is another factor, as in some countries regulation of these people is not effective. Slowly, different countries are realizing the importance of this issue and enacting suitable rules aimed at providing transparency in transactions carried out by these institutions. The most important issues at national level are establishing legal framework and training law enforcing officials. The major weapon to combat this crime is controlling financial transactions including e-transactions, through legislation. Many countries have enacted some stringent laws to control this crime. UK,US have stringent laws in dealing with Cyber money laundering. Many other countries are following suit. The Council of Europe has passed Criminal Justice Act. Hong Kong has passed similar laws. The single most important issue is harmonizing the terrestrial laws with cyber laws. AT INTERNATIONAL LEVEL The UN has taken the lead and during 1995 international community meeting signed a convention known as ‘UN Convention against Illicit Traffic in Narcotic Drugs and Psychotropic Substances’. Further, this convention made money laundering a crime and provided a model. During 2000, the UN also organized another convention against transnational organized crime. As a result of UN the efforts, the group of seven industrialized nations established ‘Financial Action Task Force’ (FATF). The biggest source of money laundering funds comes from drug trade and the volume of money is large. In order to cover this vast amount of money they need financial services industry. They eye financial institutions that are in the business of accepting deposits from 66
  • 67. customers. After studying this phenomenon, Financial Action Task Force (FATF)had noticed some critical points in the modus operandi of criminals which are difficult for the launderers to avoid. They are points of entry of cash into financial system, transfers to and from financial system and cross-border flows of cash. Paying attention to these issues can help in controlling cyber laundering to a considerable extent. According to financial crimes enforcement network of US, less than 1% money laundered in cyber space is ever detected or criminals prosecuted. Prevention of money laundering in cyber space is proving to be really a daunting task. Some of the suggested measures are putting an upper limit on the amount of payment and frequency of using e-money in peer to peer transfers. The second is making it mandatory for e-money organization to identify their clients and also to keep a track of money movement. The third is ensuring that Internet service providers keep a log of files involving finances for a number of years. The fourth is making audit compulsory for all electronic merchants and ensuring that they keep transaction records for a certain period of time. The fifth is training law e n f o r c e m e n t a g e n c i e s i n d e a l i n g e f f e c t i v e l y w i t h t h i s c r i m e . L a s t b u t n o t t h e l e a s t , i s international co-operation and harmonizing the national cyber and terrestrial laws with international can help in dealing with this crime effectively. CREDIT CARDS FRAUDS INTRODUCTION TO CREDIT CARDS 67
  • 68. Credit was first used in Assyria, Babylon and Egypt 3000 years ago. The bill of exchange- the forerunner of banknotes - was established in the 14th century. Debts were settled by one-third cash and two-thirds bill of exchange. Paper money followed only in the 17th century. The first advertisement for credit was placed in 1730 by Christopher Thornton, who offered furniture that could be paid off weekly. From the 18th century until the early part of the 20th, tallymen sold clothes in return for small weekly payments. They were called "tallymen" because they kept a record or tally of what people had bought on a wooden stick. One side of the stick was marked with notches to represent the amount of debt and the other side was a record of payments. In the 1920s, a shopper's plate - a "buy now, pay later" system - was introduced in the USA. It could only be used in the shops which issued it. In 1950, Diners Club and American Express launched their charge cards in the USA, the first "plastic money". In 1951, Diners Club issued the first credit card to 200 customers who could use it at 27 restaurants in New York. But it was only until the establishment of standards for the magnetic strip in 1970 that the credit card became part of the information age. The first use of magnetic stripes on cards was in the early 1960's, when the London 68
  • 69. Transit Authority installed a magnetic stripe system. San Francisco Bay Area Rapid Transit installed a paper based ticket the same size as the credit cards in the late 1960's. The word credit comes from Latin, meaning “TRUST”. CREDIT CARD FRAUD INTRODUCTION Credit card fraud is a wide-ranging term for theft and fraud committed using a credit card or any similar payment mechanism as a fraudulent source of funds in a transaction. The purpose may be to obtain goods without paying, or to obtain unauthorized funds from an account. Credit card fraud is also an adjunct to identity theft. According to the Federal Trade Commission, while identity theft had been holding steady for the last few years, It here has been an annual increase of more than 40% in Credit Card fraud cases registered in the country during the past two-three years, a Home Ministry official said. However, credit card fraud, that crime which most people associate with ID theft, decreased as a percentage of all ID theft complaints for the sixth year in a row. The fraud begins with either the theft of the physical card or the compromise of data associated with the account, including the card account number or other information that would routinely and necessarily be available to a merchant during a legitimate transaction. The compromise can occur by many common routes and can usually be conducted without tipping off the card holder, the merchant or the bank, at least until the account is ultimately used for fraud. A simple example is that of a store clerk copying sales receipts for later use. The rapid growth of credit card use on the Internet has made database security lapses particularly costly; in some cases, millions of accounts have been compromised. 69
  • 70. IF CARD IS STOLEN When a credit card is lost or stolen, it remains usable until the holder notifies the bank that the card is lost; most banks have toll- free telephone numbers with 24-hour support to encourage prompt reporting. Still, it is possible for a thief to make unauthorized purchases on that card up until the card is cancelled. In the absence of other security measures, a thief could potentially purchase thousands of dollars in merchandise or services before the card holder or the bank realize that the card is in the wrong hands. In the United States, federal law limits the liability of card holders to $50 in the event of theft, regardless of the amount charged on the card; in practice, many banks will waive even this small payment and simply remove the fraudulent charges from the customer's account if the customer signs an affidavit confirming that the charges are indeed fraudulent. Other countries generally have similar laws aimed at protecting consumers from physical theft of the card. The only common security measure on all cards is a signature panel, but signatures are relatively easy to forge. Many merchants will demand to see a picture ID, such as a driver's license, to verify the identity of the purchaser, and some credit cards include the holder's picture on the card itself. However, the card holder has a right to refuse to show additional verification, and asking for such verification may be a violation of the merchant's agreement with the credit card companies. Self-serve payment systems (gas stations, kiosks, etc.) are common targets for stolen cards, as there is no way to verify the card holder's identity. A common countermeasure is to require the user to key in some identifying information, such as the user's ZIP or postal code. This method may deter casual theft of a card found alone, but if the card holder's wallet is stolen, it may be trivial for the thief to deduce the information by 70
  • 71. looking at other items in the wallet. For instance, a U.S. driver license commonly has the holder's home address and ZIP code printed on it. Banks have a number of countermeasures at the network level, including sophisticated real-time analysis that can estimate the probability of fraud based on a number of factors. For example, a large transaction occurring a great distance from the card holder's home might be flagged as suspicious. The merchant may be instructed to call the bank for verification, to decline the transaction, or even to hold the card and refuse to return it to the customer. Stolen cards can be reported quickly by card holders, but a compromised account can be hoarded by a thief for weeks or months before any fraudulent use, making it difficult to identify the source of the compromise. The card holder may not discover fraudulent use until receiving a billing statement, which may be delivered infrequently. Compromised Accounts: Card account information is stored in a number of formats. Account numbers are often embossed or imprinted on the card, and a magnetic stripe on the back contains the data in machine readable format. Fields can vary, but the most common include: • Name of card holder •Account number •Expiration date •Verification Many Web sites have been compromised in the past and theft of credit card data is a major concern for banks. Data obtained in a theft, like addresses or phone numbers, can be highly useful to a thief as additional card holder verification. 71
  • 72. Mail/Internet Order Fraud The mail and the Internet are major routes for fraud against merchants who sell and ship products, as well Internet merchants who provide online services. The industry term for catalog order and similar transactions is "Card Not Present" (CNP), meaning that the card is not physically available for the merchant to inspect. The merchant must rely on the holder (or someone purporting to be the holder) to present the information on the card by indirect means, whether by mail, telephone or over the Internet when the cardholder is not present at the point of sale. It is difficult for a merchant to verify that the actual card holder is indeed authorizing the purchase. Shipping companies can guarantee delivery to a location, but they are not required to check identification and they are usually are not involved in processing payments for the merchandise. A common preventive measure for merchants is to allow shipment only to an address approved by the cardholder, and merchant banking systems offer simple methods of verifying this information. Additionally, smaller transactions generally undergo less scrutiny, and are less likely to be investigated by either the bank or the merchant, since the cost of research and prosecution usually far outweighs the loss due to fraud. CNP merchants must take extra precaution against fraud exposure and associated losses, and they pay higher rates to merchant banks for the privilege of accepting cards. Anonymous scam artists bet on the fact that many fraud prevention features do not apply in this environment. Merchant associations have developed some prevention measures, such as single use card numbers, but these have not met with much success. Customers expect to be able to use their credit card without any hassles, and have little incentive to pursue additional security due to laws limiting customer 72
  • 73. liability in the event of fraud. Merchants can implement these prevention measures but risk losing business if the customer chooses not to use the measures. Account Takeover There are two types of fraud within the identity theft category: 1. Application Fraud 2. Account Takeover 1. Application Fraud Application fraud occurs when criminals use stolen or fake documents to open an account in someone else's name. Criminals may try to steal documents such as utility bills and bank statements to build up useful personal information. Alternatively, they may create counterfeit documents. 2. Account Takeover Account takeover involves a criminal trying to take over another person's account, first by gathering information about the intended victim, then contacting their bank or credit issuer — masquerading as the genuine cardholder — asking for mail to be redirected to a new address. The criminal then reports the card lost and asks for a replacement to be sent. The replacement card is then used fraudulently. Some merchants added a new practice to protect consumers and self reputation, where they ask the buyer to send a copy of the physical card and statement to ensure the legitimate usage of a card. Skimming 73