41
Understanding cybercrime: Phenomena, challenges and Legal response Submitted To: Dr. Duru Arun Kumar Submitted By: Rahul Yaduvanshi (332/COE/12) Sukhpreet Singh(369/COE/12) Vipul Khullar(393/COE/12) Department of Computer Engineering Page 1

Report Writing

Embed Size (px)

DESCRIPTION

bbb

Citation preview

Page 1: Report Writing

Understanding cybercrime: Phenomena, challenges and

Legal response

Submitted To: Dr. Duru Arun Kumar

Submitted By: Rahul Yaduvanshi (332/COE/12) Sukhpreet Singh(369/COE/12) Vipul Khullar(393/COE/12)

Department of Computer Engineering Netaji Subhas Institute Of Technology

Page 1

Page 2: Report Writing

CONTENTS

1. Abstract………………………………………………...32. Introduction………………………………………….....43. The phenomena of cybercrime………………………5

3.1. Definition………………………………………53.2. Typology of cybercrime……………………...6

4. Development of cybercrime…………………………..95. Crime statistics………………………………………..12

5.1. Cybercrime statistics in India……………….126. The economic impact of cybercrime………………..15

6.1. Terms of trade and effect on employment7. The challenges of fighting cybercrime……………...18

7.1. The number of users…………………………187.2. The availability of resources…………………197.3. Availability of information…………………….197.4. Independence of location and crime site……20

8. Cyber terrorism…………………………………………219. Anti-cyber-crime strategies……………………………2210. Cyber-crime legalisation……………………………2311. Summary……………………………………………..2412. Conclusion……………………………………………2613. Sources……………………………………………….2714. Glossary………………………………………………28

Page 2

Page 3: Report Writing

ABSTRACT

This report is made by Rahul Yaduvanshi, Sukhpreet Singh and Vipul Khullar which highlights the malicious use of computer and internet technology to affect our life and property.The cyber-crime statistics, their nature, evolution and its effect on the economy, development & employment of India in the past few decades has been discussed in the report.

There are various challenges faced in tackling the cyber crimes. Mainly because this technology is accessible to everyone and also its a part of one's private property. The crimes can be committed by simply sitting in front of a computer without applying any effort. So there are strategies adopted by cyber crime investigation department and the laws stated under Indian legislature to check such crimes which are all discussed in this report.

Page 3

Page 4: Report Writing

INTRODUCTION

In 1960s internet was developed for better communication and research. With advancement of technology and expansion of internet every area becomes easy to access but it also provide a pathway to commit crimes easily without any effort only sitting on a system.

Some human minds of criminal nature use internet as a tool of crime which is now known as cyber crime committed in cyber space. Cyber crime is now the burning issue for all countries to handle because most of data is transferred online even governmental data also. Cyber crime term is used to describe criminal activity in which computer or computer network are a Tool or target of criminal activity to denial of service attack. It Also include traditional crime in which computer are used. Cyber crime mainly consist of unauthorized access to Data and data alteration, data destruction, theft of funds or intellectual property. Due to these online criminal activities cyberspace is most unsafe place to do business. Word cyber space was first used by William Gibson, in his book, Necromancer, written in 1984. Cyberspace can be defined as a virtual world of computers where internet is involved, where individuals can interact, conduct business, do transactions, develop graphics. In this report we will discuss many types of cyber crime commonly committed with some current case happened in various cities. We will also discuss statistics in this report.

Work in cybersecurity is beginning to take off as more researchers and professionals realize the dire need for more effective systems. What direction will cybercrime turn to as the next generation of security measures are implemented and deployed? In turn, how will the good guys respond to novel threats? These are valid questions that need to be asked in order to plan for

Page 4

Page 5: Report Writing

future growth and mitigate the potential for massive crises.

Page 5

Page 6: Report Writing

DEFINITION

Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.[2] Netcrime is criminal exploitation of the Internet. Dr. Debarati Halder and Dr. K. Jaishankar (2011) define Cybercrimes as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nation’s security and financial health. Issues surrounding these types of crimes have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise.

The growing list of cybercrimes includes crimes that have been made possible by computers, such as network intrusions and the dissemination of computer viruses, as well as computer-based variations of existing crimes, such as identity theft, stalking, bullying and terrorism.

Page 6

Page 7: Report Writing

CLASSIFICATION OF CYBER CRIMES

Computer crime encompasses a broad range of activities. Generally, however, it may be divided into two categories:

(1) Crimes that target computers directly

(2) Crimes facilitated by computer networks or devices, the primary target of which is independent of the computer network or device.

Crimes that primarily target computer networks or devices include:

Computer viruses Denial-of-service attacks Malware (malicious code)

Crimes that use computer networks or devices to advance other ends include:

Cyberstalking Fraud and identity theft Information warfare Phishing scams

SpamThe unsolicited sending of bulk email for commercial purposes, is un-lawful in some jurisdictions. While anti-spam laws are relatively new, limits on unsolicited electronic communications have existed for some time.

Fraud & Financial CrimesComputer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. In this context, the fraud will result in obtaining a benefit by:

Page 7

Page 8: Report Writing

Altering in an unauthorized way. This requires little technical expertise and is not an uncommon form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes;

Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions: this is difficult to detect;

Altering or deleting stored data; Altering or misusing existing system tools or software packages, or

altering or writing code for fraudulent purposes.

Other forms of fraud may be facilitated using computer systems, including bank fraud, identity theft, extortion, and theft of classified information.[9]

A variety of Internet scams target direct to consumers.

Obscene or offensive contentThe content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be illegal.

Over 25 jurisdictions within the USA place limits on certain speech and ban racist, blasphemous, politically subversive, libelous or slanderous, seditious, or inflammatory material that tends to incite hate crimes. [citation needed]

The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs.

One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography.

Data interference Computer data are vital for private users, businesses and administrations, all of which depend on the integrity and availability of data. Lack of access to data can result in considerable (financial) damage. Offenders can violate the integrity of data and interfere with them by deleting, suppressing or altering computer data.One common example of the deletion of data is the computer virus.

Page 8

Page 9: Report Writing

Illegal interceptionOffenders can intercept communications between users (such as e-mails) or other forms of data transfers (when users upload data onto webservers or access web-based external storage media) in order to record the information exchanged. In this context, offenders can igeneral target any communication infrastructure (e.g. fixed lines or wireless) any Internet service (e.g. e-mail, chat or VoIP communications).

Illegal data acquisition (data espionage)Sensitive information is often stored in computer systems. If the computer system is connected to the Internet, offenders can try to access this information via the Internet from almost any place in the world. The Internet is increasingly used to obtain trade secrets.The value of sensitive information and the ability to access it remotely makes data espionage highly interesting. In the 1980s, a number of German hackers succeeded in entering US government and military computer systems, obtaining secret information and selling this information to agents from a different country.

Page 9

Page 10: Report Writing

EVOLUTION OF COMPUTER CRIME AND CYBER CRIME

The criminal abuse of information technology and the necessary legal response are issues that have been discussed ever since the technology was introduced. Over the last 50 years, various solutions have been implemented at the national and regional levels. One of the reasons why the topic remains challenging is the constant technical development, as well as the changing methods and ways in which the offences are committed.

The 1960s

In the 1960s, the introduction of transistor-based computer systems, which were smaller and less

expensive than vacuum-tube based machines, led to an increase in the use of computer technology. At this early stage, offences focused on physical damage to computer systems and stored data. Such incidents were reported, for example, in Canada, where in 1969 a student riot caused a fire that destroyed computer data hosted at the university. In the mid 1960s, the United States started a debate on the creation of a central data-storage authority for all ministries. Within this context, possible criminal abuse of databases and the related risks to privacy were discussed.

The 1980s

In the 1980s, personal computers became more and more popular. With this development, the number of computer systems and hence the number of potential targets for criminals again increased. For the first time, the targets included a broad range of critical infrastructure. One of the side effects of the spread of computer systems was an increasing interest in software, resulting in the emergence of the first forms of software piracy and crimes related to patents. The interconnection of computer systems brought about new types of offence. Networks

Page 10

Page 11: Report Writing

enabled offenders to enter a computer system without being present at the crime scene. In addition, the possibility of distributing software through networks enabled offenders to spread malicious software, and more and more computer viruses were discovered. Countries started the process of updating their legislation so as to meet the requirements of a changing criminal environment. International organizations also got involved in the process. OECD and the Council of Europe set up study groups to analyse the phenomena and evaluate possibilities for legal response

The 1990s

The introduction of the graphical interface (“WWW”) in the 1990s that was followed by a rapid growth in the number of Internet users led to new challenges. Information legally made available in one country was available globally – even in countries where the publication of such information was criminalized. Another concern associated with online services that turned out to be especially challenging in the investigation of transnational crime was the speed of information exchange. Finally, the distribution of child pornography moved from physical exchange of books and tapes to online distribution through websites and Internet services. While computer crimes were in general local crimes, the Internet turned electronic crimes into transnational crime. As a result, the international community tackled the issue more intensively. UN General Assembly Resolution 45/121 adopted in 1990 and the manual for the prevention and control of computer-related crimes issued in 1994 are just two examples.

The 21st Century

As in each preceding decade, new trends in computer crime and cybercrime continued to be discovered in the 21st century. The first decade of the new millennium was dominated by new, highly sophisticated methods of committing crimes, such as “phishing”, and “botnet attacks”, and the emerging use of technology that is more difficult for law enforcement to handle and investigate, such as “voice-over-IP (VoIP) communication” and “cloud computing”. It is not only the methods

Page 11

Page 12: Report Writing

that changed, but also the impact. As offenders became able to automate attacks, the number of offences increased. Countries and regional and international organizations have responded to the growing challenges and given response to cybercrime high priority.

Page 12

Page 13: Report Writing

CRIME STATISTICS

As with technology advance criminal minds are also getting activated more and more. According to NCRB report increase percentage in crimes of All type committed in 2011 and committed in 2012 is 60%. A total crime reported under IT act was 1, 791 in 2011 and crimes reported in 2012 are 2,786. Among these 2,876 crimes reported most of the cases are of tampering computer source (1,440) and hacking of data(435). Variation in tempering data over 2011 is 74% and hacking is 177.1% which is almost double and is alarming issue to concentrate. Crime cell is also working its level best as persons arrested in 2011 for hacking crime was 65 and in 2012 are 137 for total 435 cases recorded. But there is also little bit relief because the cases registered under categories of un-authorized attempt to access protected computer system decreases by 40% and decrease in cases registered under publishing false digital signature certificate , fraud digital signature certificate are -66.7% and -16.7% respectively . Although there is decrease in cases registered in above mentioned three categories but offenders are sharper as persons arrested under category of unauthorized attempt to access computer system in 2011 were 15 for 5 cases registered but in 2012 persons arrested for same category were 1 for 3 cases registered. No person was arrested for publishing false digital signature certificate for one case registered under IT act 2000.Total cases registered under IT act 2000 was 2,876 in 2012. When state wise observations was carried out Maharashtra state was on first place where 471 cases was registered followed by Andhra Pradesh(429), Karnataka(412), Kerala(269) and Uttar Pradesh(205) cases was registered.

Page 13

Page 14: Report Writing

Page 14

Page 15: Report Writing

Page 15

Page 16: Report Writing

THE ECONOMIC IMPACT OF CYBERCRIME AND CYBER

ESPIONAGE

Put these together and the cost of cybercrime and cyber espionage to the global economy is probably measured in the hundreds of billions of dollars. To put this in perspective, the World Bank says that global GDP was about $70 trillion in 2011. A $400 billion loss—the high end of the range of probable costs—would be a fraction of a percent of global income. But this begs several important questions about the full benefit to the acquirers and the damage to the victims from the cumulative effect of cybercrime and cyber espionage.

This initial research suggest an upper limit of the cost of cyber espionage and crime somewhere between 0.5% and 1% of national income—for the US, this would be about $70 billion to $140 billion. A lower limit might be $20 billion to $25 billion. This is a very broad range and we hope that our future work can narrow it. A starting point for a better estimate would be to reduce the reliance on anecdotes and surveys, and begin to compile and compare existing estimates, develop better data on value, and refine assumptions about loss. While a precise single figure for the cost of cyber crime and cyber espionage is unattainable, a more accurate estimate of the range of potential losses can be developed, allowing us to better measure the problem. A very crude extrapolation would be to take this range for the US, which accounts for a little more than a fifth of global economic activity, and come up with a range of $100 billion to $500 billion for global losses. This is almost certainly an overestimate. An initial adjustment would be to note that less developed economies rely less on networks and have less intangible property than developed economies. In just the ten leading economies the value of “intangible” goods and services ranges from 50% to 70% of GDP; taking this into account would suggest a range of $80 billion to $400 billion in global losses. This range is so broad we offer them only as a starting point forfurther research on the

Page 16

Page 17: Report Writing

global effect of malicious cyber activity. In the context of a $70 trillion global economy, these losses are small, but that does not mean it is not in the national interest to try to reduce the loss, and the theft of sensitive military technology creates damage whose full cost is not easily quantifiable in monetary terms.

Terms of Trade and the Effect on Employment

Terms of trade refers to how much a country must export in order to pay for its imports. If imports fall in value, the terms of trade shift in favor of the importing country, as it will have to export fewer goods than before to pay its bills. Before we leap to the conclusion that stolen intellectual property will eventually mean lower prices for consumers, we should consider several caveats. First, many people will find it absurd to take account of the “benefits” of criminal acts. Second, cyber espionage reduces the comparative advantage of research, education, and know-how, making it harder for victim nations with advanced economies to produce the goods they need to pay their import bills. Even though the effect of cyber espionage is to“subsidize” foreign production, the benefits to consumers in the victim country are likely to be small. If the workers displaced by cyber espionage

do not find jobs that pay as well or better, the victim country would be worse off. Analysis by the Commerce Department’s International Trade Administration found that in 2011, $1 billion in exports equalled 5,080 jobs.34 Since the total number of workers in the United States ranges between 135 million to 145 million, this means that the high-end estimate of $100 billion in losses from cyber espionage would translate into 508,000 lost jobs and the effect of cyber espionage on employment might be roughly a third of a percent decrease in employment. Rather than the aggregate number of jobs, the real concern might be if the lost jobs are in manufacturing or other high paying sectors. The effect of cyber espionage may be to move US workers from high paying blue collar jobs into lower paying work or even unemployment. More importantly, if our rough estimates of loss and of the cost in jobs are right, and since they are relatively small, it may point to the real damage

Page 17

Page 18: Report Writing

from the theft of intellectual property. The greatest damage and risk from malicious cyber activity may not be in terms of direct damage to the victim country, but the illicit benefit obtained by the acquiring country, whose economic development and ability to compete globally (economically and perhaps militarily) are increased and accelerated through illegitimate means.

Page 18

Page 19: Report Writing

CHALLENGES FACED IN FIGHTING CYBER CRIME

THE NUMBER OF USERS

The popularity of the Internet and its services is growing fast, with over 2 billion Internet users worldwide by 2010. Computer companies and ISPs are focusing on developing countries with the greatest potential for further growth. In 2005, the number of Internet users in developing countries surpassed the number in industrial nations, while the development of cheap hardware and wireless access will enable even more people to access the Internet. The increasing number of Internet users causes difficulties for the law-enforcement agencies because it is relatively difficult to automate investigation processes. While a keyword-based search for illegal content can be carried out rather easily, the identification of illegal pictures is more problematic. Hash-value based approaches are for example only successful if the pictures were rated previously, the hash value was stored in a data base, and the picture that was analysed has not been modified.

Availability of devices and access

Only basic equipment is needed to commit computer crimes. Committing an offence requires hardware, software and Internet access. With regard to hardware, the power of computers is growing continuously. There are a number of initiatives to enable people in developing countries to use ICTs more widely. Criminals can commit serious computer crimes with only cheap or second-hand computer technology – knowledge counts for far more than equipment. The date of the computer technology available has little influence on the use of that equipment to commit cybercrimes. Committing cybercrime can be made easier through specialist software tools. Offenders can download software tools designed to locate open ports or break password protection. Due to mirroring techniques and

Page 19

Page 20: Report Writing

peer-to-peer exchange, it is difficult to limit the widespread availability of such devices.

Availability of information The Internet has millions of webpages of up-to-date information. Anyone who publishes or maintains a webpage can participate. One example of the success of user-generated platforms is Wikipedia, an online encyclopaedia where anybody can publish. The success of the Internet also depends on powerful search engines that enable users to search millions of webpages in seconds. This technology can be used for both legitimate and criminal purposes. “Googlehacking” or “Googledorks” describes the use of complex search-engine queries to filter many search results for information on computer security issues. For example, offenders might aim to search for insecure password protection systems. Reports have highlighted the risk of the use of search engines for illegal purposes. An offender who plans an attack can find detailed information on the Internet that explains how to build a bomb using only chemicals available in regular supermarkets.

Independence of location and presence at the crime site Criminals need not be present at the same location as the target. As the location of the criminal can be completely different from the crime site, many cyber offences are transnational. International cybercrime offences take considerable effort and time. Cybercriminals seek to avoid countries with strong cybercrime legislation. Preventing “safe havens” is one of the key challenges in the fight against cyber-crime. While “safe havens” exist, offenders will use them to hamper investigation. Developing countries that have not yet implemented cybercrime legislation may become vulnerable, as criminals may choose to base themselves in these countries to avoid prosecution. Serious offences affecting victims all over the world may be difficult to stop, due to insufficient legislation in the country where offenders are located. This may lead to pressure on specific countries to pass legislation. One example of this is the “Love Bug” computer worm developed by a suspect in the Philippines in 2000, which infected millions of computers worldwide. Local investigations

Page 20

Page 21: Report Writing

were hindered by the fact that the development and spreading of malicious software was not at that time adequately criminalized in the Philippines. Another example is Nigeria, which has come under pressure to take action over financial scams distributed by e-mail

Resources Modern computer systems that are now coming onto the market are powerful and can be used to extend criminal activities. But it is not just increasing power of single-user computers that poses problems for investigations. Increasing network capacities is also a major issue. One example is the recent attacks against government websites in Estonia. Analysis of the attacks suggests that they were committed by thousands of computers within a “botnet” or group of compromised computers running programs under external control. In most cases, computers are infected with malicious software that installs tools allowing perpetrators to take control. Botnets are used to gather information about targets or for high-level attacks.

Page 21

Page 22: Report Writing

CYBER TERRORISM

Cyber terrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses.

Cyber terrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. By this narrow definition, it is difficult to identify any instances of cyber terrorism.

Cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological since this is a form of terrorism.

There is much concern from government and media sources about potential damages that could be caused by cyber terrorism, and this has prompted official responses from government agencies.

Several minor incidents of cyber terrorism have been documented.

In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat, "you have yet to see true electronic terrorism. This is a promise."

In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers and we're doing this to disrupt your communications." Intelligence authorities characterized it as the first known attack by terrorists against a country's computer systems.

In March 2013, the New York Times reported on a pattern of cyber-attacks against U.S. financial institutions believed to be instigated by Iran as well as incidents affecting South Korean financial institutions that originate with the North Korean government. 

Page 22

Page 23: Report Writing

ANTI-CYBERCRIME STRATERGIES

1. Cybercrime legislation as an integral part of a cybersecurity strategy.2. Implementation of existing strategies3. Relevance of cybercrime issues within the pillars of cybersecurity 4. A cybercrime policy as starting point.5. Responsibility within the government6. Determination of stakeholders.7. Identification of benchmarks.8. Defining legal frameworks that require amendments, updates or

changes .9. Relevance of crime prevention.

10. Models for extension of regulator responsibility.

11.International cooperation

Page 23

Page 24: Report Writing

CYBERCRIME LEGALISATION

In India the Information Technology Act, 2000 is the Mother Legislation that deals with issues related to use of computers, computer systems , computer networks and the Internet. Amended by the Information Technology (Amendment)Act, 2008. Penalties and adjudication for various offences involving computers, computer systems and computer networks. Imprisonment and fine for various Cybercrimes defined.

Penalties for damage to computer, computer system etc. have been fixed as damages by way of compensation not exceeding Rs. 5,00,00,000/- to affected persons.Cyber offences to be investigated only by a Police Officer not below the rank of the Inspector (now), Deputy Superintendent of Police( earlier).

If a person without the permission of owner or any other person in charge of a computer, computer system or computer network, accesses or secures access to such computer, computer system or computer network, the said acts are torts and crimes under the Indian cyberlaw.Tampering with computer source documents – Section 65

Computer related offences - Section 66-Occurs when there is intent to cause or knowledge that one is likely to cause wrongful loss or damage to the public or any person by destroying or deleting or altering any information residing in a computer resource or diminishing its value or utility or affecting it injuriously by any means.

Page 24

Page 25: Report Writing

SUMMARY

Computer crime, or Cybercrime, refers to any crime that involves a computer and a network. Netcrime is criminal exploitation of the Internet.Different types of Cyber Crimes includes cracking, copyright infringement, child pornography, and child grooming, identity theft, stalking, bullying

and terrorism.

According to NCRB report increase percentage in crimes of All type committed in 2011 and committed in 2012 is 60%.The cost of cybercrime and cyber espionage to the global economy is probably measured in the hundreds of billions of dollars.

The increasing number of Internet users causes difficulties for the law-enforcement agencies because it is relatively difficult to automate investigation processes.

Criminals can commit serious computer crimes with only cheap or second-hand computer technology – knowledge counts for far more than equipment.The success of the Internet also depends on powerful search engines that enable users to search millions of webpages in seconds. This technology can be used for both legitimate and criminal purposes.As the location of the criminal can be completely different from the crime site, many cyber offences are transnational.It is not just increasing power of single-user computers that poses problems for investigations. Increasing network capacities is also a major issue.

Cyber offences to be investigated only by a Police Officer not below the rank of the Inspector (now), Deputy Superintendent

Page 25

Page 26: Report Writing

of Police( earlier).In India the Information Technology Act, 2000 is the Mother Legislation that deals with issues related to use of computer systems, computer networks and the Internet.

Page 26

Page 27: Report Writing

CONCLUSION

Cybercrime has captured the attention of not only law enforcement, but also home users, system administrators and even the government. The history of cybercrime has slowly converged into a state in which large amounts of money are responsible for driving crime rather than respect or youthful experimentation.

One such example of its manifestation is through botnets, a scourge to be sure, on the viability and long term success of the Internet. Without successful prevention and recovery from having a computer being taken over, users will find it increasingly difficult to justify the benefits of the Internet, especially if, for example, their identity is stolen every time they connect. Luckily, the burgeoning field of cyber forensics has proved that those who commit such crimes may not escape the reach of the law.

Although much work must be done in the field to standardize processes and procedures, it is clear that the majority of criminals will not remain anonymous forever. With successful forensic investigations, it is then up to the law and government to assign punitive measures. This has and will remain challenging for law and policy makers who traditionally move slowly.

Moreover, international cooperation is increasingly required to successfully resolve crimes, resulting in the need for comprehensive treaties between nations. Finally, any discussion of cybercrime must discuss what directions it seems to be heading in, as preparations must be made for all contingencies. Certainly, criminals will attempt to increase their use of the Internet to perpetrate acts of fraud and other crimes.

The real question though is whether researchers, industry, law enforcement and the government can work together in order to reign in the ability to commit crimes and normalize it to a manageable level. It is still an open debate, though and only time will tell whether cybercrime becomes an unchecked monster or a just another growing pain in a long history of the Internet.

Page 27

Page 28: Report Writing

SOURCES

http://en.wikipedia.org/wiki/Computer_crime https://www.itu.int / http://www.mcafee.com/in/resources/reports/rp-

economic-impact-cybercrime.pdf www.unodc.org/documents/organized-crime/

UNODC_CCPCJ_EG.4_2013/ http://www.gcl.in/ http://www.utica.edu/academic/institutes/ecii/

publications/media/global_threat_crime.pdf http://sysnet.ucsd.edu/~cfleizac/WhiteTeam-

CyberCrime.pdf

REFERENCES

International Journal of Cyber Criminology(VOLUME 7) IJISC – International Journal of Information Security and

Cybercrime International Journal of electronic security and digital forensics

Page 28

Page 29: Report Writing

GLOSSARY

Internet: The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a network of networks that consists of millions of private, public, academic, business networks.

Malware: Malware, short for malicious software, is any software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems. It can appear in the form of code, scripts, active content, and other software. 'Malware' is a general

term used to refer to a variety of forms of hostile or intrusive software.

Copyright infringement: is the use of works protected by copyright law without permission, infringing certain exclusive rights granted to the copyright holder, such as the right to reproduce, distribute, display or perform the protected work, or to make derivative works.

Blasphemous: Blasphemy is the act of insulting or showing contempt or lack of reverence for God, to religious or holy persons or things, or toward something considered sacred or inviolable.

OECD: The Organisation for Economic Co-operation and Development (OECD) (French: Organisation de coopération et de développement économiques, OCDE) is an international economic organisation of 34 countries founded in 1961 to stimulate economic progress and world trade. It is a forum of countries committed to democracy and the market economy.

NCRB: The National Crime Records Bureau, abbreviated to NCRB, is an Indian government agency responsible for collecting and analysing crime data as defined by the Indian Penal Code (IPC). 

GDP: Gross domestic product (GDP) is the market value of all officially recognized final goods and services produced within a country in a year, or other given period of time. GDP per capita is often considered an indicator of a country's standard of living.[2][3]

Page 29