SlideShare a Scribd company logo
History of Computer Crime
Prepared by:
Kushagra Ganeriwal(130010111009)
Sweetu Ratnani(130010111048)
Guided by:
Prof.Kiran Macwan (CP Dept.)
Introduction & Traditional Problems
• Criminals have proven to be remarkably innovative.
• The question of vicinage has not been resolved by the court. Thus,
both investigative units and prosecutorial teams have not been
effective.
• Anonymizer sites – those sites which are designed to mask the
identity of a user
Recognizing & Defining Computer Crime
• First computer crime
• really unknown – as no written or formal communications were en vogue at
the time
• certainly had to be the theft or destruction of an abacus
• First documented case:
• early 19th Century – the sabotage of a computer system developed by textile
manufacturer, Joseph Jacquard.
• This machine, designed to introduce automated tasks, was attacked by
individuals fearful of losing employment to computers.
Three Incidents
• Prior to the 1980s, computer crime was considered a non-issue.
• However, three incidents shook American complacency to its core.
1) Compromising of Milnet
2) The Morris Worm
3) Crash of AT&T
Compromising of Milnet (1986)
• Berkley – maintained sensitive military info as part of Arpanet
• Soviet employed German hacker hacks and steals sensitive
information
• Discovered by a bean counter
who investigated the loss of less than one dollar!
• Immediately after discovery, Internet security
and data protection became a top priority
The Morris Worm (1988)
• Robert Morris – Cornell University student – son of a government
agent
• Created a worm to impress his friends, but did not recognize the
potentiality for destruction
• Attempted to warn victims – instructing them on how to remove the
worm prior to massive destruction
• Too late – caused millions of dollars in damage and crippled 10% of all
computers connected to the Internet
• First person convicted under the new Computer Fraud and Abuse Act
AT&T Crash(1989)
• AT&T crashes due to their own failures
• Blame shifted to Legion of Doom
• LEGION OF DOOM
• Named after fictional circle of super-villians
• Shamelessly promote themselves, brag of their exploits, and decry the use of
force by government
Categorizing Computer Crime – while exhaustive,
the categories are not mutually exclusive
• Means or Instrument
• Target
• Incidental
Computer as a means
• Phreaking and Telecom Crime
• Web-cramming
• ISP Jacking
• Internet Scams
• Non-phreaking, neo-traditional crime
Phreaking
• the manipulation of telecommunications carriers to gain knowledge of telecommunications,
and/or theft of applicable services – OR – any activity that incorporates the illegal use or
manipulation of access codes, access tones, PBX’s, or switches
• initially perpetrated by individuals drawn to the challenge of cracking systems, especially those
which claimed to be impenetrable, like DOD
• Became a counterculture – in which conferences and bulletin boards were developed as
platforms for braggarts (www.defcon.org) (www.Phrack.org)
• Would build global telecommunications systems using other’s resources
• Law enforcement was helpless to react due to an increase in predatory crime and inadequate
resources
Types of Phreaking
• Theft of access codes
• Manipulation of switches
• Manipulation of PBX’s
(Private Branch Exchanges)
Web-cramming
• Accomplished when criminals develop new Web pages for small businesses and
non-profit groups for “little” or “no expense”. While advertising their service as
free, these criminals actually engage in unauthorized phone charges on their
victims’ accounts.
• Most common approach involves the use of “rebate checks.”
• These checks, when cashed, transferred the consumer’s ISP, placing monthly
service charges on their telephone bill.
• This activity is possible because telephone companies contract to provide billing
and collection services for other companies that sell telecommunications-related
services.
ISP-Jacking
• Involves disconnecting individuals users from their selected Internet Service
providers and redirecting them to illegitimate servers
• In these cases, users are lured into downloading software which surreptitiously
disconnects their chosen Internet service providers, silences their modem, and
reconnects them to a remote server..
• 1999 – RCMP uncovered a complicated scam in which Canadian users were
rerouted through Moldova (a republic in the Soviet Union) and other
international locations to Dallas, Texas resulting in thousands of dollars in long
distance charges.
• The success of these scams is largely attributed to the fact that no identifying or
credit card information is requested – remember – charges are charged to the
victim’s telephone bill.
Nigerian Advance Fee Scam
• 6 steps to 4-1-9 scams
• are identified and targeted through sources ranging from trade journals, professional directories,
newspapers, etc.
• individual or company receives e-mail from a “government or agency official” (such as a senior
civil servant in one of the Nigerian ministries, like the Nigerian National Petroleum Corporation)
• e-mail informs recipient that this government or agency is willing to transfer millions of dollars in
“over invoiced contracts”, if:
• recipient provides blank copies of letterhead, banking account information, and telephone/fax
information (these letters, in turn, are used to seduce other victims – these are often used to
obtain a travel visa from the American embassy
• as the scam involves cultivating the trust of the recipient, more official documentation is received
from the “government or agency” (i.e., authentication letters with official looking stamps,
government seals, or logos which support the claims)
• once trust is obtained, up-front fees are requested for taxes, government bribes, attorney fees, or
the like (Grennan, Britz, Rush & Barker, 2000).
Non-phreaking, neo-traditional crime (i.e.
non-Internet crime)
• Not all technologically advanced crime involves the use of the
Internet or electronic communications!
Printing technologies, software capabilities, digital cameras, and the
like have increased the sophistication of non-Internet criminal activity.
Traditional methods of counterfeiting currency, defrauding financial
institutions, viewing child pornography, and the like, have all been
supplanted by more advanced approaches.
IP Spoofing
• IP Spoofing – successfully mimic a victim’s computer identity
• May also be used to redirect Internet traffic
• Domain name hijacking is accomplished by spoofing messages to
domain name registrars like Network Solutions.
• Has been used against Nike
Cybersquatting
• Cybersquatting - the practice of infringing on trademarked property via electronic means
• Purchase of domain names consistent with established companies or businesses. (i.e.
www.toysrus.com , etc.)
• Purchase of domain names which represent common misspellings or typographical errors of same
(i.e. www.toysareus.com
• Outlawed by the Anti-Cybersquatting Consumer Protection Act of 1997 – has been characterized
as the epitome of techno-capitalism by some, but branded criminal by government authorities
• Effectively used against John Zuccarini who purchased thousands of domain names which
represented common misspellings of popular businesses and mousetrapped accidental visitors
(opening ad boxes which require users to click on, and therefore look at, the ads to make them go
away).
THANK YOU

More Related Content

What's hot

Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
Prof. (Dr.) Tabrez Ahmad
 
Advance database systems (part 1)
Advance database systems (part 1)Advance database systems (part 1)
Advance database systems (part 1)
Abdullah Khosa
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
Perry Slack
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
Aung Thu Rha Hein
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
Somya Johri
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
grahamwell
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
MyAssignmenthelp.com
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
One97 Communications Limited
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
Dr Raghu Khimani
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic toolsSonu Sunaliya
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
Cleverence Kombe
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
Devyani Vasistha
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
edwardbel
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
Carl Ceder
 
Iot forensics
Iot forensicsIot forensics
Iot forensics
Abeis Ab
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
Sweta Kumari Barnwal
 

What's hot (20)

Cybercrime investigation
Cybercrime investigationCybercrime investigation
Cybercrime investigation
 
Advance database systems (part 1)
Advance database systems (part 1)Advance database systems (part 1)
Advance database systems (part 1)
 
Presentation on Information Privacy
Presentation on Information PrivacyPresentation on Information Privacy
Presentation on Information Privacy
 
Identity Theft ppt
Identity Theft pptIdentity Theft ppt
Identity Theft ppt
 
Digital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research ChallengeDigital Forensic: Brief Intro & Research Challenge
Digital Forensic: Brief Intro & Research Challenge
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Data protection ppt
Data protection pptData protection ppt
Data protection ppt
 
Digital Forensic Case Study
Digital Forensic Case StudyDigital Forensic Case Study
Digital Forensic Case Study
 
Computer Forensics
Computer ForensicsComputer Forensics
Computer Forensics
 
Data integration
Data integrationData integration
Data integration
 
Digital Evidence by Raghu Khimani
Digital Evidence by Raghu KhimaniDigital Evidence by Raghu Khimani
Digital Evidence by Raghu Khimani
 
cyber security and forensic tools
cyber security and forensic toolscyber security and forensic tools
cyber security and forensic tools
 
Computer Forensics ppt
Computer Forensics pptComputer Forensics ppt
Computer Forensics ppt
 
Digital Forensic
Digital ForensicDigital Forensic
Digital Forensic
 
IOT - Design Principles of Connected Devices
IOT - Design Principles of Connected DevicesIOT - Design Principles of Connected Devices
IOT - Design Principles of Connected Devices
 
E-mail Investigation
E-mail InvestigationE-mail Investigation
E-mail Investigation
 
Legal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information SecurityLegal, Ethical, and Professional Issues In Information Security
Legal, Ethical, and Professional Issues In Information Security
 
Iot forensics
Iot forensicsIot forensics
Iot forensics
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 

Similar to History of computer crime

Mis chapter 9
Mis chapter 9Mis chapter 9
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
Dr. Arun Verma
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Cybercrime
CybercrimeCybercrime
Cybercrime
JazAphrodite
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
Varshil Patel
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
Dr. Prashant Vats
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
Dr. Prashant Vats
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
Navjyotsinh Jadeja
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
Alexander Zhuravlev
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
Roshan Mastana
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Dubai 1
Dubai 1Dubai 1
Dubai 1
mmavis
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
Clichesin
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
Anshuman Tripathi
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
Chaya Sorir
 
Computer crime
Computer crimeComputer crime
Computer crime
Vinil Patel
 
Cybercrime
CybercrimeCybercrime
Cybercrime
neelima27
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law Center
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
Malobe Lottin Cyrille Marcel
 

Similar to History of computer crime (20)

Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
L Scope
L ScopeL Scope
L Scope
 
Dubai 1
Dubai 1Dubai 1
Dubai 1
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 

More from Kushagra Ganeriwal

Fm generation
Fm generationFm generation
Fm generation
Kushagra Ganeriwal
 
7 segment interface with avr microcontroller
7 segment interface with avr microcontroller7 segment interface with avr microcontroller
7 segment interface with avr microcontroller
Kushagra Ganeriwal
 
Mci ppt
Mci pptMci ppt
Conductors
ConductorsConductors
Conductors
Kushagra Ganeriwal
 
Curl
CurlCurl
Coulomb's law and its applications
Coulomb's law and its applicationsCoulomb's law and its applications
Coulomb's law and its applications
Kushagra Ganeriwal
 
Wireshark
WiresharkWireshark
Noise
NoiseNoise
Interfacing ultrasonic rangefinder with avr mc us
Interfacing ultrasonic rangefinder with avr mc usInterfacing ultrasonic rangefinder with avr mc us
Interfacing ultrasonic rangefinder with avr mc us
Kushagra Ganeriwal
 
electronic mixer
electronic mixerelectronic mixer
electronic mixer
Kushagra Ganeriwal
 
auditorium
auditoriumauditorium
auditorium
Kushagra Ganeriwal
 
Prac3 LOUDSPEAKER
Prac3 LOUDSPEAKERPrac3 LOUDSPEAKER
Prac3 LOUDSPEAKER
Kushagra Ganeriwal
 

More from Kushagra Ganeriwal (12)

Fm generation
Fm generationFm generation
Fm generation
 
7 segment interface with avr microcontroller
7 segment interface with avr microcontroller7 segment interface with avr microcontroller
7 segment interface with avr microcontroller
 
Mci ppt
Mci pptMci ppt
Mci ppt
 
Conductors
ConductorsConductors
Conductors
 
Curl
CurlCurl
Curl
 
Coulomb's law and its applications
Coulomb's law and its applicationsCoulomb's law and its applications
Coulomb's law and its applications
 
Wireshark
WiresharkWireshark
Wireshark
 
Noise
NoiseNoise
Noise
 
Interfacing ultrasonic rangefinder with avr mc us
Interfacing ultrasonic rangefinder with avr mc usInterfacing ultrasonic rangefinder with avr mc us
Interfacing ultrasonic rangefinder with avr mc us
 
electronic mixer
electronic mixerelectronic mixer
electronic mixer
 
auditorium
auditoriumauditorium
auditorium
 
Prac3 LOUDSPEAKER
Prac3 LOUDSPEAKERPrac3 LOUDSPEAKER
Prac3 LOUDSPEAKER
 

Recently uploaded

Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
veerababupersonal22
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
Vijay Dialani, PhD
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
AmarGB2
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
Kamal Acharya
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
ydteq
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
bakpo1
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
ChristineTorrepenida1
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Soumen Santra
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
ssuser7dcef0
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
ongomchris
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
SamSarthak3
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Dr.Costas Sachpazis
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
Massimo Talia
 

Recently uploaded (20)

Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERSCW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
CW RADAR, FMCW RADAR, FMCW ALTIMETER, AND THEIR PARAMETERS
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
ML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptxML for identifying fraud using open blockchain data.pptx
ML for identifying fraud using open blockchain data.pptx
 
Investor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptxInvestor-Presentation-Q1FY2024 investor presentation document.pptx
Investor-Presentation-Q1FY2024 investor presentation document.pptx
 
Student information management system project report ii.pdf
Student information management system project report ii.pdfStudent information management system project report ii.pdf
Student information management system project report ii.pdf
 
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
一比一原版(UofT毕业证)多伦多大学毕业证成绩单如何办理
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
一比一原版(SFU毕业证)西蒙菲莎大学毕业证成绩单如何办理
 
Unbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptxUnbalanced Three Phase Systems and circuits.pptx
Unbalanced Three Phase Systems and circuits.pptx
 
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTSHeap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
 
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
NUMERICAL SIMULATIONS OF HEAT AND MASS TRANSFER IN CONDENSING HEAT EXCHANGERS...
 
space technology lecture notes on satellite
space technology lecture notes on satellitespace technology lecture notes on satellite
space technology lecture notes on satellite
 
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdfAKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
AKS UNIVERSITY Satna Final Year Project By OM Hardaha.pdf
 
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
Sachpazis:Terzaghi Bearing Capacity Estimation in simple terms with Calculati...
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024Nuclear Power Economics and Structuring 2024
Nuclear Power Economics and Structuring 2024
 

History of computer crime

  • 1. History of Computer Crime Prepared by: Kushagra Ganeriwal(130010111009) Sweetu Ratnani(130010111048) Guided by: Prof.Kiran Macwan (CP Dept.)
  • 2. Introduction & Traditional Problems • Criminals have proven to be remarkably innovative. • The question of vicinage has not been resolved by the court. Thus, both investigative units and prosecutorial teams have not been effective. • Anonymizer sites – those sites which are designed to mask the identity of a user
  • 3. Recognizing & Defining Computer Crime • First computer crime • really unknown – as no written or formal communications were en vogue at the time • certainly had to be the theft or destruction of an abacus • First documented case: • early 19th Century – the sabotage of a computer system developed by textile manufacturer, Joseph Jacquard. • This machine, designed to introduce automated tasks, was attacked by individuals fearful of losing employment to computers.
  • 4. Three Incidents • Prior to the 1980s, computer crime was considered a non-issue. • However, three incidents shook American complacency to its core. 1) Compromising of Milnet 2) The Morris Worm 3) Crash of AT&T
  • 5. Compromising of Milnet (1986) • Berkley – maintained sensitive military info as part of Arpanet • Soviet employed German hacker hacks and steals sensitive information • Discovered by a bean counter who investigated the loss of less than one dollar! • Immediately after discovery, Internet security and data protection became a top priority
  • 6. The Morris Worm (1988) • Robert Morris – Cornell University student – son of a government agent • Created a worm to impress his friends, but did not recognize the potentiality for destruction • Attempted to warn victims – instructing them on how to remove the worm prior to massive destruction • Too late – caused millions of dollars in damage and crippled 10% of all computers connected to the Internet • First person convicted under the new Computer Fraud and Abuse Act
  • 7. AT&T Crash(1989) • AT&T crashes due to their own failures • Blame shifted to Legion of Doom • LEGION OF DOOM • Named after fictional circle of super-villians • Shamelessly promote themselves, brag of their exploits, and decry the use of force by government
  • 8. Categorizing Computer Crime – while exhaustive, the categories are not mutually exclusive • Means or Instrument • Target • Incidental
  • 9. Computer as a means • Phreaking and Telecom Crime • Web-cramming • ISP Jacking • Internet Scams • Non-phreaking, neo-traditional crime
  • 10. Phreaking • the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services – OR – any activity that incorporates the illegal use or manipulation of access codes, access tones, PBX’s, or switches • initially perpetrated by individuals drawn to the challenge of cracking systems, especially those which claimed to be impenetrable, like DOD • Became a counterculture – in which conferences and bulletin boards were developed as platforms for braggarts (www.defcon.org) (www.Phrack.org) • Would build global telecommunications systems using other’s resources • Law enforcement was helpless to react due to an increase in predatory crime and inadequate resources
  • 11. Types of Phreaking • Theft of access codes • Manipulation of switches • Manipulation of PBX’s (Private Branch Exchanges)
  • 12. Web-cramming • Accomplished when criminals develop new Web pages for small businesses and non-profit groups for “little” or “no expense”. While advertising their service as free, these criminals actually engage in unauthorized phone charges on their victims’ accounts. • Most common approach involves the use of “rebate checks.” • These checks, when cashed, transferred the consumer’s ISP, placing monthly service charges on their telephone bill. • This activity is possible because telephone companies contract to provide billing and collection services for other companies that sell telecommunications-related services.
  • 13. ISP-Jacking • Involves disconnecting individuals users from their selected Internet Service providers and redirecting them to illegitimate servers • In these cases, users are lured into downloading software which surreptitiously disconnects their chosen Internet service providers, silences their modem, and reconnects them to a remote server.. • 1999 – RCMP uncovered a complicated scam in which Canadian users were rerouted through Moldova (a republic in the Soviet Union) and other international locations to Dallas, Texas resulting in thousands of dollars in long distance charges. • The success of these scams is largely attributed to the fact that no identifying or credit card information is requested – remember – charges are charged to the victim’s telephone bill.
  • 14. Nigerian Advance Fee Scam • 6 steps to 4-1-9 scams • are identified and targeted through sources ranging from trade journals, professional directories, newspapers, etc. • individual or company receives e-mail from a “government or agency official” (such as a senior civil servant in one of the Nigerian ministries, like the Nigerian National Petroleum Corporation) • e-mail informs recipient that this government or agency is willing to transfer millions of dollars in “over invoiced contracts”, if: • recipient provides blank copies of letterhead, banking account information, and telephone/fax information (these letters, in turn, are used to seduce other victims – these are often used to obtain a travel visa from the American embassy • as the scam involves cultivating the trust of the recipient, more official documentation is received from the “government or agency” (i.e., authentication letters with official looking stamps, government seals, or logos which support the claims) • once trust is obtained, up-front fees are requested for taxes, government bribes, attorney fees, or the like (Grennan, Britz, Rush & Barker, 2000).
  • 15. Non-phreaking, neo-traditional crime (i.e. non-Internet crime) • Not all technologically advanced crime involves the use of the Internet or electronic communications! Printing technologies, software capabilities, digital cameras, and the like have increased the sophistication of non-Internet criminal activity. Traditional methods of counterfeiting currency, defrauding financial institutions, viewing child pornography, and the like, have all been supplanted by more advanced approaches.
  • 16. IP Spoofing • IP Spoofing – successfully mimic a victim’s computer identity • May also be used to redirect Internet traffic • Domain name hijacking is accomplished by spoofing messages to domain name registrars like Network Solutions. • Has been used against Nike
  • 17. Cybersquatting • Cybersquatting - the practice of infringing on trademarked property via electronic means • Purchase of domain names consistent with established companies or businesses. (i.e. www.toysrus.com , etc.) • Purchase of domain names which represent common misspellings or typographical errors of same (i.e. www.toysareus.com • Outlawed by the Anti-Cybersquatting Consumer Protection Act of 1997 – has been characterized as the epitome of techno-capitalism by some, but branded criminal by government authorities • Effectively used against John Zuccarini who purchased thousands of domain names which represented common misspellings of popular businesses and mousetrapped accidental visitors (opening ad boxes which require users to click on, and therefore look at, the ads to make them go away).