Sie sind auf Seite 1von 3

International Journal on Recent and Innovation Trends in Computing and Communication

Volume: 2 Issue: 7

ISSN: 2321-8169
1900 1902

_______________________________________________________________________________________________

Eliciting an Eye on Cyber Crime through Case Studies


Dr. Manju Kaushik*, Vaibhav Bhatnagar**
*(Department of Computer Science & Engineering, JECRC University, Jaipur, India
Email: manju.kaushik@jecrc.edu.in)
** (Department of Computer Science, JECRC University, Jaipur, India
Email: bhatnagar.vaibhav@ymail.com)
Abstract --In order to achieve success in every field people may divert towards the crime. It also happens in IT sector. Now a days crimes are
increasing day by day in IT field particularly in India. To prevent crimes Cyber Law name as Information Technology Act 2000 comes into
existence. There are so many victims that targeted by different technologies. In this review article we have taken some case studies to elaborate
what are different types of cyber crime & how to avoid them. This review paper is help full for law scholars, software developers & simple
computer user.
Keywords: Case Studies, Cyber Ethics, Cyber Law, cyber Safe, Image Morphing, Phishing.

__________________________________________________*****_________________________________________________
1. Introduction
Information Act 2000 states an act to provide legal
recognition for transactions carried out by means of
electronic data interchange and other means of electronic
communication, commonly referred to as Electronic
Commerce, which involve the use of alternative to paperbased methods of communication and storage of
information, to facilitate electronic filing of document with
the Government agencies and further to amend the Indian
Penal Code, the Indian Evidence Act, 1872, the Bankers
Books Evidence Act, 1891 and the Reserve Bank of India
Act, 1934 and of matters connected therewith or incidental
thereto.[1]
In prcis manner we can say that any crime commit on an
electronic item & crime commit with the help of electronic
item & any unauthorized access of electronic item will be
covered by Cyber Law or IT Act 2000. Electronic items can
not only be computers but also be mobiles, pen drives,
laptops and etc. Crimes commit on electronic items are like
destroying items, deleting any personal data and etc.
Hacking, DOS attacks, Image Morphing are some common
examples of crime commit with the help of electronic item.
2. Case Studies
Here are some basic registered case studies that will be
elaborates what the cyber crimes are and how to avoid them.
2.1 CASE STUDY 1
US $ 3, 50,000 from account of four US customers were
dishonestly transferred to bogus account. This will give a lot
of ammunition to those lobbying against outsourcing in US.
It is a case of source engineering. Some employees gained
the confidence of the customer and obtained their PIN
Number to commit fraud. They got these under the guise of
helping the customers out of difficult situations. Highest

security prevails in the call center in India as they know that


they will lose their business. There was not a breach of
security but of source engineering. The call center
employees are checked when they go in and out so they
cannot copy down numbers and therefore they could not
have noted these down. They must have remembered these
numbers, gone out immediately to a cyber caf and accessed
the Citibank accounts of the customers. All accounts were
opened in Pune and the customers complained that the
money from their accounts was transferred to Pune accounts
and thats how the criminals were traced. Police has been
able to prove the honesty of the call center and has frozen
the accounts where the money was transferred [2].
2.1.1 Analysis
As we analyze this case study we can see that victim shared
his password of his bank account. This case gives the lesson
that we should not disclose our password to anyone even
when asked by the customer care representative. All bank
BPO representatives are only concerned with the account
number, account type and last transaction done. Your
password should contain combination of alphabets,
numerical and special symbols like @, _,.. It should be
minimum eight digits long. Remember your password
should not be your date of birth, date of anniversary or any
related information about yourself. Your password should
be like your tooth brush do not share it to anyone and
change it in every month.
2.2 Case Study II
One financial institute registered a crime stating that some
persons (Perpetrators) have perpetrated certain acts
through misleading emails ostensibly emanating from ICICI
Banks email ID. Such acts have been perpetrated with
intent to defraud the customers. The investigation was
carried out with the help of those emails received by the
1900

IJRITCC | July 2014, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication


Volume: 2 Issue: 7

ISSN: 2321-8169
1900 1902

_______________________________________________________________________________________________
customers of the financial institute and arrested the accused,
the place of offence at Vijaywada was searched for the
evidence. There one Laptop and mobile was seized which
was used for the commission of the crime. The arrested
accused had used open source code email application
software for sending spam emails. He has down loaded the
same software from net and then used it as it is. He used
only VSNL emails to spam the emails to customer of
financial institute because VSNL email service provider do
not have spam box the unsolicited emails. After spamming
emails to financial institute customers he got the response
from around 120 customers of which 80 are genuine and
others are not correct because it do not have debit card
details as required for e-Banking. The financial institute
customers those who have received his email felt that the
email was originated from the financial institute bank. When
they filled the confidential information and submitted that
time said informational was directed to accused. This was
possible because the dynamic link was given in the first
page (Home Page) of the fake website. The dynamic link
means when people click on the link provided in spamming
email that time only the link will be activated. The dynamic
link was coded by handling the Internet Explorer
OnClick() event and the information of the form will be
submitted to the web server (Where the fake site is hosted).
Then server will send the data to configured email was to
the accused email. So on submission of the confidential
information was directed to email ID accused [3].
2.2.1

Analysis

This mechanism is used here is Phishing the website. The


phishing means to try to get personal & sensitive
information such as passwords, PIN number, and access
code etc disguise as a trustworthy in an electronic
communication. The hackers or culprits make the exact copy
of the website of a well known company & redirect the data
to their server. They can also do the spamming emails proxy
from the company. Users have to be attentive while using
any website. Generally any reputed organization or
company never uses emails to request that you reply with
your passwords or any other personal information. Never
reply or click any link which is suspicious or seems to be as
fake link. If you think mail may be illegitimate, go to
companys website & confirm yourself to see if you really
do need to take the action described in the email message.
2.3 CASE STUDY III
Uploading photos on social networking site Facebook
landed a 19 year old girl from Haryanas Fatehabad town in
serious trouble after a youth downloaded one of her picture
and morphed it. The youth, Gautm Kumar, later allegedly
started blackmailing the girl. The girl alleged that she was
abducted by Gautam Kumar, a resident of Sirsa, On April 23

with the help of Sonu & Raju. She added, Gautam who is a
cameraman downloaded one of my photo from my photo
from my Facebook account. He morphed my face on an
obscene photo and started blackmailing me [4].
2.3.2 Analysis
This is a technique of Image Morphing. There are so many
softwares that provide facility of alteration, modification &
edition a photograph like Adobe Photoshop, CorelDraw and
etc. Most often it is used to depict one person turning into
another through technological means or as part of a fantasy
or surreal sequence.
There are some points keep in mind while uploading your
image on social networking site.
1) Make all your post while uploading your image on
social networking site.
2) Set your default privacy setting.
3) Consider enabling the Tag Review features.
4) It is recommended do not share your extreme
private photos.
2.4 CASE STUDY IV
One day a young Software engineer came to State Cyber
police Office and complained that his web portal has been
copied and being used in the other brand name. Cyber police
asked him to demonstrate the same. The engineer opened his
portal and the suspected portal and changed one of the
source codes of his image in the portal. We could easily see
that the image on the suspected portal also changed. After
verifying several similarities Cyber police found the claims
of the engineer from Bhopal was true. After preliminary
investigation a FIR has been lodged against the owner of the
suspected portal for copying the source code of the portal
and using the same after making some for his use. During
investigation the details about the site owner were obtained
from the domain registry sites and profile of the suspect has
been built up. The suspect has been found to be Australian
of Indian origin [5].
2.4.1

Analysis

There is very general & genuine problem with all small


scale developer companies. There templates are easily being
copy by other developer. Front hand designing can easily be
copied by literally copy paste mechanism. Although copying
page source is not a tall crime. Some time in a software
company a staff member theft the code and sell it to another
company for money and other some personal benefits.
The link of the web site can easily be embedded by the
developer using HTML coding like
<a href=url>link of the victims website </a>
There are some online software that can encode the HTML,
CSS & Javascript coding like
1901

IJRITCC | July 2014, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication


Volume: 2 Issue: 7

ISSN: 2321-8169
1900 1902

_______________________________________________________________________________________________
1) www.web2generators.com/html/entities
2) meyerweb.com/eric/tools/dencoder
But they are not so much reliable & easily decodable.
Developer has to be aware about his website.
3. BROACH from the CASES
Every computer user should be aware about different types
of attacks so that he/she can escape from the condition of
cyber crime victim. There are several points to be Cyber
Safe.
1) Never disclose your passwords.
2) Discuss with cyber police if see any bad language or
pictures on the internet, or if anyone writes to you
anything you dont like it.
3) Do not reply to any message or bulletin board items
that are suggestive obscene, aggressive or distressing.
4) Do not accept any offer of money or presents, even free
offer.
But some times to be a good IT user we should maintain
some cyber ethics
1) Do not use vulgar, offensive language on public
networking site.
2) Always ask to your relatives and friends before
uploading a group photo on networking site.

3) Do not copy from internet and claims as if it is yours, if


you are copying it mention in references.
4)

Do not use other laptops, PCs, mobiles without


permission even if it is of your relative or friend.

5) Do not seek if anybody entering password like in


ATM, mobile or laptop. Your intention may not be
wrong but it gives negative impression about you.
4. Conclusion
Now a days cyber crimes are rapidly increasing day by day.
To avoid this Cyber Laws are implemented. Every computer
friendly person should be aware what is cyber crime & how
to be a cyber safe. Information Technology act 2000 plays a
vital role to reduce the cyber crimes, it was amendment
timely as the technology changes. We should adopt some
good habits to avoid to being a victim of cyber crime.
References
[1]
[2]
[3]
[4]
[5]

deity.gov.in/content/preliminary
Singh T, Cyber Law & Information Technology,
E-Journal Delhi District Courts, page 7.
cybercellmumbai.gov.in/html/case-studies
imesofindia.indiatimes.com/city/ChandigarhMay 7,
2014
www.mpcyberpolice.nic.in/casestudies.htm

1902
IJRITCC | July 2014, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

Das könnte Ihnen auch gefallen