Sunteți pe pagina 1din 52

Types of Cyber

Crimes
Syed Shahid Hassan
Deputy Director
Cyber Crimes Circle
FIA Punjab Lahore

Sequence
Introduction
About National Response Centre for
Cyber Crimes (NR3C), FIA
Cyber Crime Laws in Pakistan
Categories of Cyber Crimes
Explanation of each category using
definition of Crime with Examples.
How Law Enforcement Agencies track
Cyber Criminals
2

About NR3C
National Response Centre for Cyber Crimes
(NR3C) is a Public Sector Development Project
(PSDP).
National Response Centre for Cyber Crimes
(NR3C) was established in Year-2007 (August
2007).
Responsible for enforcement of Electronic/Cyber
Crime laws in Pakistan.
Currently there are five notified cyber crime
police stations located
at Lahore, Karachi,
Peshawar, Quetta and Rawalpindi/Islamabad.
Notified Digital Forensic Laboratories.
Notified Special Public Prosecutors.

Cyber Pakistan
Laws
The

in Pakistan
Telecommunication

(Reorganization) Act, 1996 was the first law


regulating internet in Pakistan and addressing
its criminal aspects.
Electronic Transactions Ordinance-2002 (ETO2002).
Prevention

of

Electronic

Crimes

Ordinance

(PECO-2007) (Repealed in 2009).


Prevention of Electronic Crimes Act 2016 (Bill
Passed by National Assembly & Pending with
Senate).

Current Status
of
Cyber Crime Legislation in
Pakistan
Prevention of Electronic Crimes Ordinance (PECO) is ineffective
since 7th Nov, 2009.

Since PECO has become ineffective, NR3C FIA is currently


registering cases under Section 36 & 37 of ETO and Pakistan
Telecommunication (reorganization) Act, 1996

Categories of Cyber Crimes


Cyber/Electronic Crimes in Pakistan can be
broadly
divided into following categories:
Cyber Stalking
Electronic /Online Frauds
Electronic /Computer Forgery
Hacking
System Damage
Misuse of Electronic System
Cyber Terrorism
6

Cyber Stalking

Cyber Stalking
General Definition:
Cyberstalkingis the use of theInternetor other
electronic means tostalkor harass an
individual, a group of individuals, or an
organization. It may include false accusations,
monitoring, making threats, identity theft,
impersonation, damage to data or equipment,
indecent proposal, or gathering information in
order to harass.

Real Life Examples of Cyber Stalking

Threatening Email messages, SMS Messages


Threatening Calls
Creating fake profile of someone on any social networking
website, pasting in humiliating information and personal
information of the victim like his/her real mobile number,
home phone number, address, personal pictures.
In many cases, forged porn pictures of female victims were
being uploaded on the internet.
Uploading stolen personal video of the victim on youtube.
Sending porn pictures to female colleagues through
anonymous email address.
Creating website or blog to make false allegation against
the victim.
Blackmailing
someone
by
using
any
electronic
communication system.
9

Social Networks

10

Electronic /Online Fraud

11

Electronic / Online Fraud


Electronic / Online fraudrefers to
the use ofTelecommunication or
Internetservices
to
present
fraudulent
solicitations
to
prospective victims, to conduct
fraudulent
transactions,
or
to
transmit the proceeds of fraud to
financial institutions or to others
connected with the scheme.
12

Electronic /Online Frauds


Electronic / Online Frauds can further be
divided into
following sub-categories.
Email / SMS Lottery Scams
Employment Scams
Phishing
Goods never delivered Fraud
Cultus Fraud (through Mobile Phone
Calls)
Prize Winner Scam (through Mobile
Phone Calls)
13

Email / SMS / BISP Lottery Scams

Payment is required to get your huge


unsolicited
lottery
winnings
transferred into your country/bank
account. If you are told you have won
some random email lottery, or a
lottery that you don't remember
entering, you are probably being set
up for a Lottery Scam.
14

Examples of Lottery Scam

15

Example of Lottery Scams

16

Lottery Scams
The people who receive the scam emails and fall
for them are asked to make advance payments in
the following heads one after another.

Legal Fees (for a Lawyer: as some kind of lawyer is always


involved)
Insurance Fee (Before transferring the actual amount to
victims account)
Shipping Charges (As they inform that the money will be
sent through parcel!!!)
Wire Transfer Charges
Drug Free Certificate Charges
Anti-Money Laundering Certificate Charges
Terrorist Free Certificate Charges
Non-Inspection Fee at Airport
17
Bribes

Employment / Job Scams


Employment scams, also
known asjob scams, are a
form
ofadvance
fee
fraudscamming
where
certain
unscrupulous
persons
posing
as
recruitersoremployersoffe
r
attractiveemploymentopp
ortunities which require the
job seeker to pay them
money in advance, usually
under
theguiseofwork
visas,travelexpenses,
andout-of-pocket expenses.

18

Employment / Job Scams


People usually look and apply for job overseas but
they dont remember where they applied.
Job Scammers search for there email addresses
on such websites and respond them by asking
more information about the victim and finally
offering job of handsome amount.
Job Scammers make use of fake websites and real
looking email addresses to put reality in their
scams stories.
Then they tell you to pay 50 $ as an application
processing fee. If the victim pays money, they ask
for 120 $ more for visa processing fee. If paid,
they ask for more money on and on under
different heads.
19
Their objective is squeeze the victims as much as

Phishing

Phishing is a type of deception designed to steal


your valuable personal data, such as credit card
numbers, passwords, account data, or other
information.

Con artists might send millions of fraudulent email messages that appear to come from Web
sites you trust, like your bank or credit card
company, and request that you provide personal
information.
20

Real Life Example of Phishing

21

Real Life Example of Phishing

22

Real Life Example of Phishing


This one
is
Easy!
This is
not
eBay site
but a
fake
One.

23

Electronic /Computer Forgery


Examples:
Creating forged Documents using
computer and other electronic
equipment.
Creating forged Credit Cards/Debit
Cards

24

Hacking

25

Hacking
Generic Definition:
Illegal access into another party's
computer or Internet site carried out
for malevolent or fraudulent
purposes or to make unauthorised
amendments or just for fun
(Computers);

26

Hacking
Legal Definition:
Section 36 & 37 of ETO 2002 Covers
Hacking.
(The punishment for Hacking is
imprisonment up to 7 Years or Fine
not exceeding 1 Million rupees or
both).

27

Hacking
Section 36 of ETO 2002 defines Hacking under head
Violation of Privacy of information:
Any person who gains or attempts to gain access to any
information system with or without intent to acquire the
information contained therein or to gain knowledge of such
information, whether or not he is aware of the nature or
contents of such information, when he is not authorised to
gain access, as aforesaid, shall be guilty of an offence
under this Ordinance punishable with either description of a
term not exceeding seven years, or fine which may extend
to one million rupees, or with both.

28

Examples of Hacking
Breaking in to Universitys information
system to steal or alter information.
Hacking Email Accounts
Website Defacement
Stealing or altering any information from
any information system by any means.
Stealing information from information
system also includes looking over the
shoulder when you are not authorised.
Breaking in to Banks information system
to add/change the amount in your Bank
account.
29

System Damage

Legal Definition (Section 6 of


PECO 2009 and Section 37 of ETO
2002):
6. System Damage: Whoever with intent to cause damage to the
public or any person interferes with or interrupts or obstructs the
functioning, reliability or usefulness of an electronic system or
electronic device by inputting, transmitting, damaging, deleting,
altering, tempering, deteriorating or suppressing any data or
services or halting electronic system or choking the networks shall
be punished with imprisonment of either description for a term
which may extend to three years, or
with fine, or with both.

30

Examples of System Damage


Distributed Denial of Service Attacks
Physically Shutting down the power
of any computer running information
system when one is not authorized.
Creating fake profile on social
websites.
E-mail hacking
Cheating through websites.
31

Examples of Misuse of Electronic


System

ATM
Skimmer
Device

32

Another Picture of Skimmer


Device

With and Without Skimmer device


33

Examples of Misuse of Electronic


System

Magnetic
Stripe Read &
Writer (MSRW)
Device

34

Keyloggers
A keylogger can be either specialized
hardware fitted to a keyboard or
keyboard cable or a software
program. Keyloggers are used to
record and log each and every
keystroke on a personal computer.

35

Types of Keyloggers
Generally, there are two types of
Keyloggers:
1. Software Based Keyloggers
2. Hardware Based Keyloggers

National Response Centre for


Cyber Crimes, FIA

36

Hardware Based
Keylogger

PS/2 Based Keylogger

National Response Centre for


Cyber Crimes, FIA

37

Hardware Based
Keyloggers

USB Based Keylogger


National Response Centre for
Cyber Crimes, FIA

38

Hardware Based
Keyloggers

USB Based
Keyloggers
National Response Centre for
Cyber Crimes, FIA

39

Hardware Based
Keylogger

Before
National Response Centre for
Cyber Crimes, FIA

After
40

Hardware Based
Keylogger

National Response Centre for


Cyber Crimes, FIA

41

Software Based
Keylogger
Typical Features:
Keystroke recording
Screen Shots (e.g. on every mouse
click, after every 5 mins)
Username & Password Monitoring
Chat monitoring (MSN, Yahoo, ICQ,
AOL, etc)
Sending monitored data to remote
FTP server or email address.
National Response Centre for
Cyber Crimes, FIA

42

Examples of Cyber Terrorism


Cyber terrorism takes many forms:
Extort money by threatening/unleashing Denial of
Service (DOS) attacks.
Terrorism can also come in the form of
disinformation. (e.g., defacement of frequently
visited websites and disinformation about some
terrorist threat)
cyber-terrorism
can
be
used
for
an
assassination!!!! (e.g. changing the medication
record system)
Disabling critical information infrastructure of the
government. (e.g., DDOS attacks on government
websites, hacking into NADRAs information
system or physical terrorist acts etc.)

Examples of Cyber Terrorism


Cyber attack alters processing control system of
cereal manufacture, introducing lethal levels of
iron
Cyber attack on air traffic control system causes
planes to collide
Cyber attack alters drug formulas of
pharmaceutical manufactures, resulting in
unfathomable loss of life
Cyber attack changes pressure in gas lines,
causing valve failure, and then explosions (similar
attack against electrical grid)

Examples of Cyber Terrorism


Cyber attack disrupts banks, international
financial transactions, and stock exchanges
results in lost confidence in economic system
Deployed
bombs
communicate
through
cyberspace when one stops transmitting, the
rest explode
Use of hacking techniques for fund raising by
terrorist groups.
Utilization of Internet for communication,
recruitment and trainings.
Monitoring and gaining access to classified
information for further terrorist attacks.

Other Categories

Obscene calls
Obscene SMS
Threatening calls
Threatening SMS
Malicious code (Computer virus,
Worm, Trojan Horse, Root Kit, Botnet,
Sypware, Malware)

46

Malicious code

Computer virus: program which can copy itself and


surreptitiously infect another computer, often via shared
media such as a floppy disk, CD, thumb drive, shared
directory, etc. Viruses are always embedded within another
file or program.
Worm: self-reproducing program which propagates via the
network.
Trojan horse: program which purports to do one thing, but
secretly does something else; example: free screen saver
which installs a backdoor
Root kit: set of programs designed to allow an adversary to
surreptitiously gain full control of a targeted system while
avoiding detection and resisting removal, with the
emphasis being on evading detection and removal
Botnet: set of compromised computers ("bots" or
"zombies") under the unified command and control of a
"botmaster;" commands are sent to bots via a command
and control channel (bot commands are often transmitted
via IRC, Internet Relay Chat).
47
Spyware:
assorted
privacy-invading/browser-perverting

How do LEAs Track Cyber


Criminals?

Have you ever noticed, when you


visit some websites, you get
advertisements from Pakistani
Companys!!!!!

How Come they know that which


country are you from?
Because of your:
IP Address
(which can get LEAs to the
criminals house )
48

How do LEAs Track Cyber


Criminals?

Whenever criminals make access to


any system, some traces of their
identification are left behind.
Forensic Investigators in LEAs
identify those traces and track back
the identity of the criminals step by
step.
Once suspects physical location is
identified, through search and seize
warrants, the computer system
under his control can be confiscated
49

How do

LEAs Track Cyber Criminals?

The Forensic analysis and


examination can reconstruct
computer events even if the data
was deleted by criminals before
arrival of LEA official.
Nothing gets deleted actually when
you delete a file. If you have
managed to securely delete the data
somehow even than traces of
criminal activity can be found from
so many places on your hard disk
50

How do LEAs Track Cyber


Criminals?

The computer systems which LEAs


can not directly examine due to
jurisdiction and other issues, they
obtain records from the operators of
these systems through court orders /
subpeona. (e.g., Google Inc.
Facebook, Microsoft, Yahoo etc).
These companies are bound by US
laws to keep track of access logs of
their users for the period of last 180
days.
51

Question & Answers

52

S-ar putea să vă placă și