CYBER CRIMES By C.Gunasekhar,ECE.
PROLOGUE
Cyber crime is simply as criminal activity involving the information technology infrastructure. Illegal access - unauthorized access by unauthorized people. Illegal interception - technical means of non-public transmissions of computer data to, from or within a computer system. Data interference - illegal damaging, deleting or alteration of computer data. systems interference - interfering with the functioning of a computer by inputting, transmitting or suppressing computer data. Misuse of devices - usage of unauthorized people. Forgeries - ID theft.
CATEGORIES OF CRIMES
Cyber crimes
Mobiles
Banking
Internet
CRIMES RELATED TO MOBILES Chipping and pinning. Usage of mobiles in cinema theatres to take videos. Irritating an unknown person by continuous sms and phone calls. Taking photos without knowledge of that particular person. Mobile robberies. Blue bugging – unknown persons interruption using blue tooth.
CRIMES RELATED TO BANKING
Nigerian money offers. Misusing others credit card in the public. Abusing pin numbers of credit cards. Issuing fake cheques.
CRIMES RELATED TO INTERNET ∗ ∗ ∗ ∗ ∗
Sale of duplications. Misusing the information stored on others personal computer or website. Software piracy. Forgeries such as ID theft. Harmful software - attaches itself to other software.
DISTRESS DUE TO SCAMS
Irritation caused by unknown callers. Great loss in financial status of public. Future of teenagers being spoiled. Child pornography. Corrupting personal informations.
LACK OF CARE
People doesn’t care for couple of dollars. After being scammed people doesn’t care. 80 per cent of the cyber crimes are not reported.
OUTCOMES OF THE CRIMES
CYBER LAWS Reserve Bank of India Act, 1934 . IT act – 2000. Tort law. CAT (Cyber action team)
MODE OF INVESTIGATION
CATEGORIES
CYBER CRIMES
FRAUD COMPLAINTS
IDENTITY THEFT COMPLAINTS
ONLINE SCAMS
identity thefts, 36%
frauds, 64%
frauds
identity thefts
FRAUDS COMPLAINTS Auctions – sale of duplications. Fake cheques – giving blind cheques. Lotteries – printing same numbers. Nigerian money offers – getting money with false properties. General merchandise - goods were never delivered or were misrepresented.
IDENTITY THEFTS Credit cards – usage of others credit cards. Advance free loans – misusing loan offers. Phone fraud. Employment fraud. Loan fraud.
INQUIRY METHODS
Collection of data for evidentiary or verification purpose. Computer files analysis. E-mail tracking and recovery. Detect and prevent intellectual property theft. Recovery of lost or deleted data. Detect sale and distribution of illegal products.
Detection with neural networks
NEURAL NETWORKS As neural networks resembles human brain, the neural fraud management system is completely automated and state-of-the-art integrated system of neural networks helps in detecting the scams.
STEPS INVOLVED
Supervised clustering-uses a mix of traditional clustering and multi-dimensional histogram analysis with a discrete metric. Statistical analysis- it ranks important features based on the joint distribution per transaction pattern. AMS-automatic modeling system, chooses the important inputs and symbols, train and create clustering and neural network models.
BENEFITS
Reduces loses due to fraud. Identify new fraud methods to reduce fraud loses and minimize false positives. It can work in real time, online or batch modes. Reinforce customer trust. Improves operational efficiencies.
STRUCTURED SETTLEMENT A settlement in which the reward is paid to the applicant over a course of time. An annuity or government bond generally guarantees structured settlement. It needs approval from a judge, coz of a recently enacted federal law.
ADVANTAGE Under structured settlement people get money periodically. Structured settlement funding has many advantages over other mode of settlement in terms of managing larger amounts of cash, tax exemption, flexibility and stability.
DISADVANTAGE Major disadvantage of structured settlement funding are the high commissions on the purchases by the companies and in equal payments. Inflation causes reduction in real value of payments. There are possibilities of getting cheated if approached without a lawyer.
REDUCTION METHODS
Never reveal personally – identifiable information online Never share your password with other people. Don’t believe everything you read or see online. Don’t respond to inappropriate messages or emails. Don’t use adult sites. Do not provide photocopies of both the sides of the credit card to anyone. While using a credit card for making payments online, check if the website is secure. Do not give any information to persons seeking credit card information over phone.
CONCLUSION Cyber crime is a crime that ruins people financially, personally, professionally often taking years to recover from it unless we people are aware of it. “Let us take part in developing our INDIA without crimes”
THANK YOU