Sunteți pe pagina 1din 37

SIR SYED UNIVERSITY OF ENGINEERING & TECHNOLOGY

CYBER CRIME & FALL SEMESTER 2019


SECTION: B
ELECTRONIC ENGINEERING DEPARTMENT
THEFT REPORTING DATED: AUGUST 22, 2019

Submitted To: MISS TAZEEN

TECHNICAL REPORT WRINTING & PRESENTATION SKILLS


CYBER CRIME & THEFT REPORTING

1
CYBER CRIME & THEFT REPORTING

GROUP MEMBERS:
1. WAJAHAT ROLL NUMBER: 2017-EE-051
2. SAAD AHMED ROLL NUMBER: 2017-EE-061
3. KASHAN IQBAL ROLL NUMBER: 2017-EE-067
4. ISMAIL BIN ASAD ROLL NUMBER: 2017-EE-068
5. SYED UMAMA RATEEB ROLL NUMBER: 2017-EE-070
6. AAZIB AHMED ANSARI ROLL NUMBER: 2017-EE-078
7. MIRZA HAMZA UMER ROLL NUMBER: 2017-EE-079

2
CYBER CRIME & THEFT REPORTING

CYBER CRIME
&
THEFT REPORTING

3
CYBER CRIME & THEFT REPORTING

CONTENTS:
 INTRODUCTION TO CYBER CRIME.

 TYPES OF CYBER CRIME AND THEFT.

 FRAUD & PREVENTION.

 IDENTITY THEFT.

 BOTNET & RANSOMWARE.

 CYBER BULLYING & CYBER BULLYING IN PAKISTAN & ITS


PREVENTIONS.

 COMPUTER VIRUSES & ITS TYPES , HOW TO PREVENT ?.

 SOCIAL ENGINEERING.

 CYBERSTALKING.

 SCAMMING.

 SOFTWARE PIRACY & ITS TYPES, HOW DO COMPANIES


PREVENT.

4
CYBER CRIME & THEFT REPORTING

ACKNOWLEDGMENT:
In performing my assignment, we had to take the help and
guideline of some respected persons, who deserve our greatest gratitude.
The completion of this assignment gives us much Pleasure. We would
like to show our gratitude to ENGINEER TAZEEN, Technical Report
Writing & Presentation Skills Teacher, of SIR SYED UNIVERSITY
OF ENGINEERING & TECHNOLOGY

In addition, a thank you to ENGINEER TAZEEN, who


introduced us to the Methodology of work, and whose passion for the
“underlying structures” had lasting effect. we also thank the SIR SYED
UNIVERSITY OF ENGINEERING & TECHNOLOGY.

5
CYBER CRIME & THEFT REPORTING

INTRODUCTION OF CYBER CRIME:

 Cybercrime is any criminal activity that takes place in the cyberspace.


 It roughly started in the 1960s. It involves stealing identities and important
information, violating privacy, and committing fraud, among others,
common type is hacking.
 The global cost of cybercrime is expected to hit $6 trillion by 2021. 30 to
40% of businesses are affected by cybercrime.
 Cybercrime involves the use of computer and network in attacking
computers and networks as well.
 Cybercrime is obviously a criminal offense and is penalized by the law,
accordingly to the law of their states.

6
CYBER CRIME & THEFT REPORTING

TYPES OF CYBER CRIME THEFTS:


These are the most common types of cybercrime acts:

FRAUD:

Fraud is a general term used to describe a cybercrime that intends to deceive


a person in order to gain important data or information. Fraud can be done by
altering, destroying, stealing, or suppressing any information to secure unlawful
or unfair gain.
Accessing unauthorized computers.
Engaging in data mining via spyware and malware.
Hacking into computer systems to illegally access personal information,
such as credit cards or Social Security numbers.
Sending computer viruses or worms with the intent to destroy or ruin
another party's computer.

FRAUD PREVENTION:
It is vital to an organization, large or small, to have a fraud prevention plan
in place. The fraud cases studied in the ACFE 2014 Report revealed that the
fraudulent activities studied lasted an average of 18 months before being
detected. Imagine the type of loss your company could suffer with an employee
committing fraud for a year and a half. Luckily, there are ways you can
minimize fraud occurrences by implementing different procedures and controls.

7
CYBER CRIME & THEFT REPORTING

1. KNOW YOUR EMPLOYEES:

Fraud perpetrators often display behavioral traits that can indicate the
intention to commit fraud. Observing and listening to employees can help you
identify potential fraud risk. It is important for management to be involved with
their employees and take time to get to know them. Often, an attitude change
can clue you into a risk. This can also reveal internal issues that need to be
addressed. For example, if an employee feels a lack of appreciation from the
business owner or anger at their boss, this could lead him or her to commit
fraud as a way of revenge. Any attitude change should cause you to pay close
attention to that employee. This may not only minimize a loss from fraud but
can make the organization a better, more efficient place with happier
employees. Listening to employees may also reveal other clues. Consider an
employee who has worked for your company for 15 years that is now working
65 hours a week instead of 40 because two co-workers were laid off. A
discussion with the employee reveals that in addition to his new, heavier
workload, his brother lost his job and his family has moved into the employee’s
house. This could be a signal of potential fraud risk. Very often and
unfortunately, it’s the employee you least expect that commits the crime. It is
imperative to know your employees and engage them in conversation.

2. MAKE EMPLOYEES AWARE/SET UP REPORTING


SYSTEM:

Awareness affects all employees. Everyone within the organization should


be aware of the fraud risk policy including types of fraud and the consequences
associated with them. Those who are planning to commit fraud will know that

8
CYBER CRIME & THEFT REPORTING

management is watching and will hopefully be deterred by this. Honest


employees who are not tempted to commit fraud will also be made aware of
possible signs of fraud or theft. These employees are assets in the fight against
fraud. According to the ACFE 2014 Report, most occupational fraud (over
40%) is detected because of a tip. While most tips come from employees of the
organization, other important sources of tips are customers, vendors,
competitors, and acquaintances of the fraudster. Since many employees are
hesitant to report incidents to their employers, consider setting up an
anonymous reporting system. Employees can report fraudulent activity through
a website keeping their identity safe or by using a tip hotline.

3. IMPLEMENT INTERNAL CONTROLS:

Internal controls are the plans and/or programs implemented to safeguard


your company’s assets, ensure the integrity of its accounting records, and deter
and detect fraud and theft. Segregation of duties is an important component of
internal control that can reduce the risk of fraud from occurring. For example, a
retail store has one cash register employee, one salesperson, and one manager.
The cash and check register receipts should be tallied by one employee while
another prepares the deposit slip and the third brings the deposit to the bank.
This can help reveal any discrepancies in the collections.

Documentation is another internal control that can help reduce fraud.


Consider the example above; if sales receipts and preparation of the bank
deposit are documented in the books, the business owner can look at the
documentation daily or weekly to verify that the receipts were deposited into
the bank. In addition, make sure all checks, purchase orders and invoices are
numbered consecutively. Use “for deposit only” stamps on all incoming checks,
require two signatures on checks above a specified dollar amount and avoid
using a signature stamp. Also, be alert to new vendors as billing-scheme
embezzlers setup and make payments to fictitious vendors, usually mailed to a
P.O. Box.

Internal control programs should be monitored and revised on a consistent


basis to ensure they are effective and current with technological and other
advances. If you do not have an internal control process or fraud prevention
program in place, then you should hire a professional with experience in this
area. An expert will analyze the company’s policies and procedures,
recommend appropriate programs and assist with implementation

9
CYBER CRIME & THEFT REPORTING

4. MONITOR VACATION BALANCES:

You might be impressed by the employees who haven’t missed a day of


work in years. While these may sound like loyal employees, it could be a sign
that these employees have something to hide and are worried that someone will
detect their fraud if they were out of the office for some time. It is also a good
idea to rotate employees to various jobs within a company. This may also reveal
fraudulent activity as it allows a second employee to review the activities of the
first.

5. HIRE EXPERTS:

Certified Fraud Examiners (CFE), Certified Public Accountants


(CPA)and CPAs who are Certified in Financial Forensics (CFF) can help you
in establishing antifraud policies and procedures. These professionalscan
provide a wide range of services from complete internal control audits and
forensic analysis to general and basic consultations.

6. LIVE THE CORPORATE CULTURE:

A positive work environment can prevent employee fraud and theft. There
should be a clear organizational structure, written policies and procedures and
fair employment practices. An open-door policy can also provide a great fraud
prevention system as it gives employees open lines of communication with
management. Business owners and senior management should lead by example
and hold every employee accountable for their actions, regardless of position.

IDENTITY THEFT:

10
CYBER CRIME & THEFT REPORTING

Identify theft is a specific form of fraud in which cybercriminals steal


personal data, including passwords, data about the bank account, credit cards,
debit cards, social security, and other sensitive information. Through identity
theft, criminals can steal money. According to the U.S. Bureau of Justice
Statistics (BJS), more than 1.1 million Americans are victimized by identity
theft.
Identity theft is the crime of obtaining the personal or financial information of
another person for the sole purpose of assuming that person's name
or identity to make transactions or purchases. Identity theft is committed in
many different ways.

Take note of these eight types of identity theft and protect yourself.

1. FINANCIAL IDENTITY THEFT:


When people hear the words “identity theft,” often times they immediately
think of this type. Financial identity theft can mean two things. First, the
victim’s bank accounts and credit cards are accessed and used illegally. The
thief can withdraw money or max out credit cards. Second, the victim’s identity
is used to take on loans and get new credit cards. The effect of this type of theft
on a person’s credit report, for example, can be devastating and difficult to
remedy. The Federal Trade Commission offers a website that provides the steps
that you can take, however, to recover from identity theft .

2. DRIVER’S LICENSE IDENTITY THEFT:


This type requires very little sophistication. Once a person’s driver’s license
is stolen, the criminals can find ways to use the ID. It may even be sold off to
someone who looks passably similar to the real ID owner. If the criminal is
caught for a traffic violation, drunk driving charge or drug-related charged, they
will give the stolen ID name. Now they don't have to show up in court and the

11
CYBER CRIME & THEFT REPORTING

police will be looking for the name of the person on the driver's license. The
victim's driving record now includes these driving-related offenses, which can
lead to having a revoked or suspended driver’s license. These offenses can affect
current car insurance rates, or any attempt to obtain new car insurance.

3. CRIMINAL IDENTITY THEFT:


Obviously, the instance with the driver’s license is just the tip of the iceberg,
and traffic violations are just the beginning. If the “new” owner of the ID
commits a crime and is cited or arrested, he or she can make use of the stolen ID
to give policemen a fake identity, resulting in a criminal record being created in
that person's name. When that happens, the victim of criminal identity theft can
have problems with law enforcement or be unable to gain employment.

4. SOCIAL SECURITY IDENTITY THEFT:


Your Social Security Number (SSN) is very important, and people should
learn not to be cavalier about this information. Identity thieves can make use of
the SSN to defraud the government and steal off benefits meant for the victim.
Another thing to take note of is that your SSN contains valuable personal
information. A thief can make use of this information to falsify documents (such
as getting a passport, for example) or to take out loans and credit cards.

5. MEDICAL IDENTITY THEFT:


Why would anyone want to steal someone else’s medical identity? The
simple answer is that this can be used to commit fraud involving health
insurance and medical coverage. Thieves can use the victim’s identity to make
false claims. The hidden danger of medical identity theft, as the World Health
Organization (WHO) points out, is that this could lead to incorrect entries in the

12
CYBER CRIME & THEFT REPORTING

victim’s medical history. Erroneous entries could lead to incorrect diagnosis and
other complications.

6. INSURANCE IDENTITY THEFT:


This is related to the medical identity theft. Once the crime is committed, the
victim is left holding the bag. Effects of identity insurance include difficulties in
settling payments, potentially higher insurance premiums, and quite possibly
trouble in acquiring medical coverage later on. Ironically, there are identity theft
insurance policies to protect against this and many other kinds of ID theft.

7. CHILD IDENTITY THEFT:


Children are not likely to be concerned about their credit reports. What most
parents don’t realize is that their child’s information and SSN can be used by
thieves to defraud the government, create documents, commit crimes, and apply
for loans.

8. SYNTHETIC IDENTITY THEFT:


In this type of identity theft, the thieves use information from several
different victims to create a new identity. Although the primary victim here is
the lender, it can still negatively affect the person whose name or Social Security
ID is used. For example, the thieves will use one person's Social Security
number and combine it with a different name, address, and phone number. They
can then open new accounts, acquire credit cards, cellphones and other goods
and services.

BOTNETS:

13
CYBER CRIME & THEFT REPORTING

Botnets are networks from compromised computers that are controlled


externally by remote hackers. The remote hackers then send spam or attack
other computers through these botnets. Botnets can also be used to act as
malware and perform malicious tasks. OR is a network of computers infected
by malware that are under the control of a single attacking party, known as
the “bot-herder.” Each individual machine under the control of the bot-herder
is known as a bot. From one central point, the attacking party can command
every computer on its botnet to simultaneously carry out a coordinated
criminal action. The scale of a botnet (many comprised of millions of bots)
enable the attacker to perform large-scale actions that were previously
impossible with malware. Since botnets remain under control of a remote
attacker, infected machines can receive updates and change their behavior on
the fly. As a result, bot-herders are often able to rent access to segments of
their botnet on the black market for significant financial gain.
Common botnet actions include:

1. EMAIL SPAM:
Though email is seen today as an older vector for attack, spam botnets are
some of the largest in size. They are primarily used for sending out spam
messages, often including malware, in towering numbers from each bot. The
Cutwail botnet for example, can send up to 74 billion messages per day.
They are also used to spread bots to recruit more computers to the botnet.

2. DDOS ATTACKS:
Leverages the massive scale of the botnet to overload a target network or
server with requests, rendering it inaccessible to its intended users. DDoS
attacks target organizations for personal or political motives or to extort
payment in exchange for ceasing the attack.

14
CYBER CRIME & THEFT REPORTING

3. FINANCIAL BREACH:
Includes botnets specifically designed for the direct theft of funds from
enterprises and credit card information. Financial botnets, like the ZeuS
botnet, have been responsible for attacks involving millions of dollars stolen
directly from multiple enterprises over very short periods of time.

4. TARGETED INTRUSIONS:
Smaller botnets designed to compromise specific high-value systems of
organizations from which attackers can penetrate and intrude further into the
network. These intrusions are extremely dangerous to organizations as
attackers specifically target their most valuable assets, including financial
data, research and development, intellectual property, and customer
information.

RANSOMWARE:
Ransom malware, or ransomware, is a type of malware that prevents users
from accessing their system or personal files and demands ransom payment in
order to regain access. The earliest variants of ransomware were developed in
the late 1980s, and payment was to be sent via snail mail. Today, ransomware
authors order that payment be sent via cryptocurrency or credit card.

TYPES OF RANSOMWARE:
There are three main types of ransomware, ranging in severity from mildly
off-putting to Cuban Missile Crisis dangerous. They are as follows:

1. SCAREWARE:
Scareware, as it turns out, is not that scary. It includes rogue security
software and tech support scams. You might receive a pop-up message claiming
that malware was discovered and the only way to get rid of it is to pay up. If

15
CYBER CRIME & THEFT REPORTING

you do nothing, you’ll likely continue to be bombarded with pop-ups, but your
files are essentially safe.
A legitimate cybersecurity software program would not solicit customers in this
way. If you don’t already have this company’s software on your computer, then
they would not be monitoring you for ransomware infection. If you do have
security software, you wouldn’t need to pay to have the infection removed—
you’ve already paid for the software to do that very job.

2. SCREEN LOCKERS:
Upgrade to terror alert orange for these guys. When lock-screen ransomware
gets on your computer, it means you’re frozen out of your PC entirely. Upon
starting up your computer, a full-size window will appear, often accompanied
by an official-looking FBI or US Department of Justice seal saying illegal
activity has been detected on your computer and you must pay a fine. However,
the FBI would not freeze you out of your computer or demand payment for
illegal activity. If they suspected you of piracy, child pornography, or other
cybercrimes, they would go through the appropriate legal channels.

3. ENCRYPTING RANSOMWARE:
This is the truly nasty stuff. These are the guys who snatch up your files and
encrypt them, demanding payment in order to decrypt and redeliver. The reason
why this type of ransomware is so dangerous is because once cybercriminals
get ahold of your files, no security software or system restore can return them to
you. Unless you pay the ransom—for the most part, they’re gone. And even if
you do pay up, there’s no guarantee the cybercriminals will give you those files
back.

CYBERBULLYING:

16
CYBER CRIME & THEFT REPORTING

Cyberbullying is one of the most rampant crimes committed in the


virtual world.`It is a form of bullying carried over to the internet.
Cyberbullying is bullying that takes place over digital devices like cell
phones, computers, and tablets. Cyberbullying can occur through SMS,
Text, and apps, or online in social media, forums, or gaming where people
can view, participate in, or share content. Cyberbullying includes sending,
posting, or sharing negative, harmful, false, or mean content about
someone else. It can include sharing personal or private information about
someone else causing embarrassment or humiliation. Some cyberbullying
crosses the line into unlawful or criminal behavior.

The most common places where cyberbullying occurs are:

 Social Media, such as Facebook, Instagram, Snapchat, and Twitter


 SMS (Short Message Service) also known as Text Message sent through
devices
 Instant Message (via devices, email provider services, apps, and social
media messaging features)
 Email

CYBERBULLYING IN PAKISTAN:

17
CYBER CRIME & THEFT REPORTING

6 Ways to Report Cyber Harassment In


Pakistan.

With over 100 million users of smart phones in Pakistan, Pakistan has been
included in the list of the fastest growing countries that are using internet which
only open the doors for the fact that cyber bullying is increasing as well, yet
there isn’t any legislation for cyber crimes in Pakistan. However, if you know
someone being bullied online or are a victim yourself, here’s what you need to
do.

1. Register a complaint through FIA


2. Lodge a report via IC3
3. CPLC to the rescue!
4. Snapshot on Snapchat
5. Madadgaar National Helpline
6. Fake Instagram account? No more tears.

18
CYBER CRIME & THEFT REPORTING

1. REGISTER A COMPLAINT THROUGH FIA:

Simply write down your application (in English or in Urdu), narrate your
complete problem, provide as much evidences, details as you can and send it to
FIA National Response Center for Cyber Crimes(NR3C).

2. LODGE A REPORT VIA IC3:

19
CYBER CRIME & THEFT REPORTING

The IC3 accepts online Internet crime complaints from either the actual
victim or from a third party to the complainant. Check out their website to see
how to report.

3. CPLC TO THE RESCUE:The Citizens-Police Liaison


Committee (CPLC) has set up a women complaint cell aimed at
dealing with women harassment issues across the
country. Complaints can be made on these numbers: 021-35662222,

20
CYBER CRIME & THEFT REPORTING

021-35682222.

4. SNAPSHOT ON SNAPCHAT:
If your account is being misused or hacked, you can submit a report by
filling in the harassment form available on the official website. It’s that simple!

5. MADADGAAR NATIONAL HELPLINE:


From psychological counselling to legal aid, this is the organization you
should look up to for help. Cherry on top, its cost effective too!

21
CYBER CRIME & THEFT REPORTING

6. FAKE INSTAGRAM ACCOUNT? NO MORE TEARS:


The Instagram’s ‘abuse form’ actually works. Even if you don’t have an
official account, you can still fill out the form. Cheers!
`

22
CYBER CRIME & THEFT REPORTING

SOCIAL ENGINEERING:
In order to replicate itself, a virus must be permitted to execute code and
write to memory. For this reason, many viruses attach themselves to executable
files that may be part of legitimate programs .If a user attempts to launch an
infected program, the virus' code may be executed simultaneouslyThis makes it
possible to create a file that is of a different type than it appears to the user. For
example, an executable may be created and named "picture.png.exe", in which
the user sees only "picture.png" and therefore assumes that this file is a digital
image and most likely is safe, yet when opened, it runs the executable on the
client machine.

COMPUTER VIRUSES:
A COMPUTER VIRUS is a type of malware that, when
executed, replicates itself by modifying other computer programs and inserting
its own code. When this replication succeeds, the affected areas are then said to
be "infected" with a computer virus.
A virus is a computer program that can copy itself and infect a computer.
Viruses can be transmitted through internal networks, the internet or through a
usb drive.

Virus writers use social engineering deceptions and exploit detailed


knowledge of security vulnerabilities to initially infect systems and to spread
the virus. The vast majority of viruses target systems running Microsoft
Windows.

The term "virus" is also misused by extension to refer to other types


of malware. "Malware" encompasses computer viruses along with many other
forms of malicious software, such as computer
"worms", ransomware, spyware, adware, trojan
horses, keyloggers, rootkits, bootkits, malicious Browser Helper
Object (BHOs), and other malicious software. The majority of active malware
threats are actually trojan horse programs or computer worms rather than
computer viruses.

23
CYBER CRIME & THEFT REPORTING

TYPES OF COMPUTER VIRUSES:


Here are some Computer Viruses that you should know about:

1. BOOT SECTOR VIRUS:


Even though this virus has now become obsolete, it still pops out in one way
or the other. This virus got attention when floppy disks were used to boot a
computer. In modern computers, this virus could appear on the “Master Boot
Record”. In the partitioned storage device of your computer, it is the first sector
to take place.
However, thanks to the fact evolution of Internet, the threat of this virus is
now mitigated.

2. WEB SCRIPTING VIRUS:


Similar to the hyperlinks that we used in Microsoft Word, many websites
rest on codes to provide engaging content to their users. For example, since the
trends of watching videos online have now become very popular – more than 2
Billion Videos are streamed on Facebook every day, these videos also execute a
specific code.

3. BROWSER HIJACKER:
Ever faced a problem where the homepage of your web page gets
automatically directed to a particular site? Well, that is the most common way
by which this ransomware hijacks your browser.

4. RESIDENT VIRUS:
After inserting itself directing into the memory of your system, this virus has
the capability to take a number of actions. One of its more troublesome features

24
CYBER CRIME & THEFT REPORTING

is its ability to run away. Leaving behind the file which was originally infected,
this virus has the ability to run on its own.

5. DIRECT ACTION VIRUS:


Similar to the Vienna virus which shocked computers in 1998, this virus
comes into action after you have executed the file. The load is delivered to your
computer and the virus becomes active.
However, this virus has a limitation. It takes no action unless the file which
is infected gets implemented again.

6. FILE INFECTOR VIRUS:


Although the word “file” in its name might suggest otherwise, this virus
does not take the help of files every time. In fact, the file is only the starting
point as the file infector dwarfs the first file after which it re-writes the file.

7. MACRO VIRUS:
Appearing in the form of a word document which seemingly links the user to
pop up ads websites, Melissa is one of the most known Micro Virus. Going one
step further, this virus not only exploits the user but also his/her friends by
mailing the copies of the infected virus document to the contact list.

HOW TO PREVENT COMPUTER VIRUSES ?

1. KEEP YOUR COMPUTER UP TO DATE:


We encourage our clients to enable automatic updates on their Windows
computers in addition to running updates for programs such as Adobe and
Java. Many of these updates include security patches that will fill security
holes in the Windows system. We know that updates are a bit of a pain.

25
CYBER CRIME & THEFT REPORTING

2. BACK UP YOUR COMPUTER:


This should be obvious, but it’s not obvious to everyone. If you have a
quality backup strategy, a virus will not be as much of a problem for you.
There are times when a virus removal will cause damage to the operating
system. At these times, we might suggest a re-install of the operating system.
If you have your data backed up, it makes the process quicker and more
affordable.

3. ANTI-VIRUS BASICS:
It’s important to have a quality anti-virus installed on your Windows
computer. While a good anti-virus is important, having more than one is a very
bad idea. Anti-virus applications are only effective when they have up-to-date
definitions of what a virus is. For this reason, be sure your anti-virus program
updates automatically and at a reasonable time (not 3am on Wednesday
nights…. not likely that your computer will be turned on during that time).

4. AVOID SUSPICIOUS WEB SITES:


There are over a trillion web pages out there right now. We spend lots of
time ‘researching’ information on the web. Be careful. Sometimes it’s
impossible to know whether a photo will contain malicious content. Be sure to
notice the url of the web site. For example: microsoft.tisur.com is not
microsoft.com.

5. ALWAYS SCAN EMAIL ATTACHMENTS:

26
CYBER CRIME & THEFT REPORTING

Some people send viruses to their friends and not even know that they did
it. At Altitude Integrations, we encounter many situations where our clients
have had their email accounts hacked. Once hacked, the hacker will sometimes
use that account to send malicious content to the entire address book list.

6. USE A MALWARE SCANNER:


Malware scanners are different than anti-virus programs. Many of these
applications are free to use. Just like anti-virus, it’s recommended that you
schedule the scans to happen weekly.

WHAT IS CYBERSTALKING ?
Cyberstalking is the use of the Internet or other electronic means to stalk or
harass an individual, group, or organization.

 It may include false accusations, defamation, slander and libel. It may also
include monitoring, identity theft, threats, vandalism, solicitation for sex, or
gathering information that may be used to threaten, embarrass or harass.

 Cyberstalking is often accompanied by realtime or offline stalking.

In many jurisdictions, such as California, both are criminal offenses.[3] Both


are motivated by a desire to control, intimidate or influence a victim.[4] A
stalker may be an online stranger or a person whom the target knows. They may
be anonymous and solicit involvement of other people online who do not even
know the target.

27
CYBER CRIME & THEFT REPORTING

CYBERSTALKING AN OFFENCE ?
Cyberstalking is a criminal offense under various state anti-stalking, slander
and harassment laws. A conviction can result in a restraining order, probation,
or criminal penalties against the assailant, including jail.

HOW TO AVOID CYBERSTALKING?


As with many things in life, it’s better to be proactive than reactive when it
comes to cyberstalking. Becoming a victim will be far less likely if you follow
our five simple tips below. These guidelines will enable you to enjoy all the
benefits of online communication while remaining completely safe.

1. KEEP A LOW PROFILE:


Keeping a subdued online existence is tough for some people, especially
those who need to use online platforms for self-promotion or business-related
activities. However, many users could benefit from toning things down a little.
You should always avoid posting personal details such as your address and
phone number, and think carefully about revealing real-time information such
as where you are and who you’re with.
In an ideal world, you would avoid using your real name in online profiles.
While this is difficult for anything work-related, it’s quite feasible for things
like forums, message boards and certain social media accounts. For example,
you can use a nickname on Instagram or Twitter.
If you must maintain your real name and photo, be very wary about who you
accept connection requests and messages from. If it’s not a friend, relative or
colleague, do some checks before moving forward.
In some cases, it’s almost impossible to avoid revealing personal
information and connecting with people you don’t know, for example, on dating
websites. Unfortunately, these are popular with scammers, and you may even
end up chatting with a potential cyberstalker. For this reason, it’s best to stick
with reputable sites, do some research about a suitor before revealing personal

28
CYBER CRIME & THEFT REPORTING

information or meeting in person and report any activity that makes you feel
uncomfortable to the site’s administrators.

2. UPDATE YOUR SOFTWARE:


Keeping your software up-to-date may not be the first thing that springs to
mind when you think about cyberstalking prevention. However, regular
software updates are crucial when it comes to preventing information leaks.
Many updates are developed to patch security vulnerabilities and help ensure
your information remains safe.
They are especially important for mobile devices which contain valuable
data and track your exact location. There are numerous cases in which
cyberstalking begins when an attacker pays someone to hack your email or
phone and uses the gathered information against you. A such, protecting
yourself from hackers is key to cyberstalking prevention.

3. HIDE YOUR IP ADDRESS:


Many applications and services reveal your IP address to the person with
whom you’re communicating. This may seem unimportant, but this information
is directly related to your personal data. For example, your IP address is linked
to the internet bill that is sent to your home and which you pay with your credit
card. Cyberstalkers can begin with your IP address and use it to find your credit
card data and physical address.
To mask your IP address you can use a Virtual Private Network (VPN). This
hides your real IP address and replaces it with from a location of your choice,
so you could even appear to be in a different country. It also encrypts all of your
internet traffic, keeping it safe from the prying eyes of hackers.

29
CYBER CRIME & THEFT REPORTING

Another option is to use the Tor browser. This also encrypts your traffic,
although it may raise flags for law enforcement agencies as it’s commonly used
by criminals themselves. For the ultimate in privacy and anonymity, you
can combine Tor and a VPN. Note that it’s not recommended you use a web
proxy or a free VPN service, as these can often harm your online security more
than they help it.

4. MAINTAIN GOOD DIGITAL HYGIENE:


‘Digital hygiene’ is a new term but represents a very important topic,
especially with regard to social networks. Maintaining good digital hygiene
helps protect you from cyber harassment, cyberbullying and cyberstalking.
Adjusting privacy settings is one of the first steps you can take to “clean up”
your accounts. Most social media platforms and some other types of online
accounts will let you adjust who can see your profile and contact you.
It’s also a good idea to keep things like your timelines, feeds and message
threads free from negative comments. Aside from potentially fueling more
negativity from others, these can have a significant emotional impact when you
re-read them. For example, psychological support is regularly provided to
website moderators, as they seriously suffer from reading aggressive messages,
even those that aren’t sent to them personally.
Social media hygiene is especially important for girls and women. Studies
show that although the majority of internet attacks are aimed at men,
cyberstalking, in particular, is mostly aimed at women.

5. AVOID DISCLOSING SENSITIVE INFORMATION:


Surprisingly, many people constantly share personal information about
themselves, even outside of social media platforms. By filling out
questionnaires or submitting applications for coupons, you are increasing the
likelihood of someone getting their hand on your personal data and possibly
making cyberstalking more accessible.

30
CYBER CRIME & THEFT REPORTING

WHAT IS SCAMMING?
“a confidence game or other fraudulent scheme, especially for making
a quick profit; swindle.”

 Scams occur regularly when someone tries to gain access to your personal
information or get money from you.
 Scammers will use certain tools to try and trick you, and they often do so
through the mail, online, in person, or over the phone.

HOW TO AVOID SCAMS:

Identifying Scams

1. EXAMINE COMMON PRACTICES:


A majority of scams follow similar types of fact patternsFirst, scammers will
use fear to try and get you to do something. For example, some scammers might
say that a relative has been arrested and needs money. Second, scammers will
try to rush you to make a decision quickly. The longer you think about what is
happening, the more likely it is that you will not become a victim.

31
CYBER CRIME & THEFT REPORTING

2. IDENTIFY POPULAR SCAMS INVOLVING MONEY:


Just as scammers use common practices like fear and panic, they will also
use the same scams over and over again. If you can learn what types of
common scams are out there, it will be easier to identify them and avoid them.
Scams can take place online, over the phone, through the mail, and even in
person.

3. RECOGNIZE POSSIBLE PHISHING SCAMS:


Phishing scams occur when individuals contact you claiming there is a
problem with some account you might have (e.g., credit card accounts and loan
accounts). They will tell you they can fix the problem, but they need to verify
your personal information. Once they have your personal info`rmation, they use
it to steal your identity.

32
CYBER CRIME & THEFT REPORTING

33
CYBER CRIME & THEFT REPORTING

SOFTWARE PIRACY:
Software piracy is the illegal copying, distribution, or use of software. It is
such a profitable "business" that it has caught the attention of organized crime
groups in a number of countries. According to the Business Software Alliance
(BSA), about 36% of all software in current use is stolen. Software piracy
causes significant lost revenue for publishers, which in turn results in higher
prices for the consumer.

TYPES OF SOFTWARE PIRACY INCLUDE:

1. SOFTLIFTING:
Borrowing and installing a copy of a software application from a colleague.

2. CLIENT-SERVER OVERUSE:
Installing more copies of the software than you have licenses for.

3. HARD-DISK LOADING:
Installing and selling unauthorized copies of software on refurbished or new
computers.

4. COUNTERFEITING:
Duplicating and selling copyrighted programs.

5. ONLINE PIRACY:
Typically involves downloading illegal software from peer-to-peer network,
Internet auction or blog.

34
CYBER CRIME & THEFT REPORTING

HOW DO COMPANIES PREVENT SOFTWARE


PIRACY?

Software piracy is a major issue affecting companies and developers today.


Consequently, companies need to implement anti-piracy protection systems on
their software-based products.

1. LEGAL PROTECTION:
Most companies make sure their software is protected legally by a user
agreement. Letting consumers know that making unauthorized copies is against
the law will help prevent people from unknowingly breaking piracy laws.

2. PRODUCT KEY:
The most popular anti-piracy system is a product key, a unique combination
of letters and numbers used to differentiate copies of the software. A product
key ensures that only one user can use the software per purchase.

35
CYBER CRIME & THEFT REPORTING

3. TAMPERPROOFING:
Some software programs have built-in protocols that cause the program to
shut down and stop working if the source code is tampered with or modified.
Tamperproofing prevents people from pirating the software through the
manipulation of the program's code.

4. WATERMARKING:
Company logos, or names are often placed on software interfaces to indicate
that products are legitimately obtained, and are not illegal copies.

CONCLUSION:
Though not all people are victims to cyber crimes, they are still at risk.
Crimes by computer vary, and they don’t always occur behind the computer,
but they executed by computer. The hacker’s identity is ranged between 12
years young to 67years old. The hacker could live three continents away from
its victim, and they wouldn’t even know they were being hacked. Crimes done
behind the computer are the 21st century’s problem. With the technology
increasing, criminals don’t have to rob banks, nor do they have to be outside in
order to commit any crime. They have everything they need on their lap. Their
weapons aren’t guns anymore; they attack with mouse cursors and passwords.

36

S-ar putea să vă placă și