Académique Documents
Professionnel Documents
Culture Documents
Table of Contents
1972
1973
1978
1981
1982
1983
1984
1985
1986:
1987
1988
• Kevin Mitnick secretly monitors the e-mail of MCI and DEC security
officials. He is convicted and sentenced to a year in jail.
• Kevin Poulsen is indicted on phone-tampering charges. He goes on the
run and avoids capture for 17 months.
• First National Bank of Chicago is the victim of $70-million computer
theft.
• Robert T. Morris, Jr., graduate student at Cornell University and son of
a chief scientist at the NSA, launches a self-replicating worm (the
Morris Worm) on the government's ARPAnet (precursor to the
Internet). The worm gets out of hand and spreads to over 6000
networked computers, clogging government and university systems.
Morris is dismissed from Cornell, sentenced to three years' probation,
and fined $10K.
1989
1990
1991
1992
1993
1994
1995
• Russian crackers steal $10 million from Citibank. Vladimir Levin, the
ringleader, uses his work laptop after hours to transfer the funds to
accounts in Finland and Israel. He is tried in the US and sentenced to
3 years in prison. All but $400K of the money is recovered.
• The French Defence Ministry admits Hackers succeeded in stealing
acoustic codes for aircraft carriers and submarines
• Movies ‘The Net’ and ‘Hackers’ released.
• Hackers deface federal web sites.
• Macro viruses appear.
• Kevin Mitnik arrested again for stealing credit card numbers. He is
jailed on charges of wire fraud and illegal possession of computer files
stolen from Motorola and SUN. He remains in jail for 4 years without
trial.
1996
1997
1998
• Hacking group Cult of the Dead Cow releases a Trojan horse program
called Back Orifice at Defcon. Once installed a Windows 9x machine the
program allows for unauthorized remote access.
• Timothy Lloyd is indicted for planting a logic bomb on the network of
Omega Engineering, causing millions in damage.
• Hackers alter The New York Times Web site, renaming it HFG (Hacking
for Girlies).
• During heightened tensions in the Persian Gulf, hackers break-in to
unclassified Pentagon computers and steal software programs.
• Information Security publishes its first annual Industry Survey, finding
that nearly three-quarters of organizations suffered a security incident
the prior year.
• L0pht testifies to the senate that it could shut down nationwide access
to the Internet in less than 30 mins.
1999
• The Melissa worm is released and becomes the most costly malware
outbreak to date (Mar).
• US Defense Dept. acknowledges 60-80 attacks per day (Mar)
• Kevin Mitnick, detained since 1995 on charges of computer fraud, signs
plea agreement (Mar).
• The April 26 CIH virus strikes individual PC users around the world.
Less common than Melissa, CIH was intended to overwrite hard drives,
erasing everything on them (Apr)
2000:
2001
2002
• Bill Gates decrees that Microsoft will secure its products and services,
and kicks off a massive internal training and quality control campaign
(trustworthy computing) (Jan)
• An Information Security survey finds that most security practitioners
favor full disclosure since it helps them defend against hacker exploits
and puts pressure of software vendors to improve their products.
• Roger Duronio, UBS PaineWebber sys-admin, plants a logic bomb
which costs $3M+ in losses/repairs (Mar)
• The Klez.H worm becomes the biggest malware outbreak in terms of
machines infected, but causes little monetary damage (May).
2003
2004
2005
2006
2007
2008
The usage of information technology has posed great security challenges and
ethical questions in front of us. Just as every thing has positives and
negatives, usage of information technology is beneficial as well as insecure.
With the growth of the internet, network security has become a major
concern. Cyber crimes have emerged rapidly in the last few years and have
major consequences. Cyber criminals are doing every thing from stealing
money, hacking into others computer, stealing intellectual property, spreading
viruses and worms to damage computers connected on the internet and
committing frauds. Stoppage of cyber crimes is a major concern today.
Cyber criminal make use of the vulnerabilities in computer soft wares and
networks to their advantage.
Hacking:
Cyber-Theft:
Many newsletters on the internet provide the investors with free advice
recommending stocks where they should invest. Sometimes these
recommendations are totally bogus and cause loss to the investors. Credit
card fraud is also very common.
Most of the companies and banks don’t reveal that they have been the
victims of cyber -theft because of the fear of loosing customers and share
holders. Cyber-theft is the most common and the most reported of all cyber-
crimes. Cyber-theft is a popular cyber-crime because it can quickly bring
experienced cyber-criminal large cash resulting from very little effort.
Furthermore, there is little chance a professional cyber-criminal will be
apprehended by law enforcement.
Viruses and worms is a very major threat to normal users and companies.
Viruses are computer programs that are designed to damage computers. It is
named virus because it spreads from one computer to another like a
biological virus. A virus must be attached to some other program or
documents through which it enters the computer. A worm usually exploits
loop holes in soft wares or the operating system. Trojan horse is dicey. It
appears to do one thing but does something else. The system may accept it
as one thing. Upon execution, it may release a virus, worm or logic bomb. A
logic bomb is an attack triggered by an event, like computer clock reaching a
certain date. Chernobyl and Melissa viruses are the recent examples.
Solutions
An important question arises that how can these crimes be prevented. A
number of techniques and solutions have been presented but the problems
still exists and are increasing day by day.
Firewalls:
Cryptography:
Cyber ethics and cyber laws are also being formulated to stop cyber crimes.
It is a responsibility of every individual to follow cyber ethics and cyber laws
so that the increasing cyber crimes shall reduce. Security softwares like anti
viruses and anti spy wares should be installed on all computers, in order to
remain secure from cyber crimes. Internet Service Providers should also
provide high level of security at their servers in order to keep their clients
secure from all types of viruses and mallicious programs.
In Pakistan, leading international and local banks have suffered huge losses
from credit card fraud, despite the expensive and extensive security
measures they have in place. Victims include Citibank, American Bank, Union
Bank, Askari Bank, the Muslim Commercial Bank.
Cyber criminals often attack official government websites, hack into security
systems, send obnoxious e-mails, damage information systems and send
viruses. These days, even terrorists use the Internet to collect information on
targets and build worldwide contacts and sympathisers.
The new wing will also regulate Internet cafés in the country as the terrorist
use these café’s for communication. However, very few people and officials
know about the existence of this wing. Even the Islamabad police official
deputed at the police exchange inquiry (9203333) expressed ignorance about
the existence of this wing. “I do not know if there is a cyber crime wing
working in Pakistan,” said Muhammad Farooq, sub-inspector, when contacted
to get the cyber crime wing’s number. Given this limited police awareness,
members of the public should know about common Internet scams in order to
protect themselves, their money and their personal information.
The IT Ministry has also finalised a draft bill for the ‘Electronic Crime Act
2004’ which is an important legislation to give legal cover to the anti-cyber
crime efforts.
One of the most common frauds involves distance selling. If you are going to
buy something from the Internet, you should make sure that the seller
provides the price of the item, arrangements for delivery, contact information
so questions can be asked and the terms of cancellation. Anyone who fails to
provide this basic information is probably trying to run a scam.
Another common fraud is the Nigerian Advance Fee Scam, also known
internationally as the 4-1-9 fraud. The sender claims to be a government
official who needs to move a large sum of money. For some reason, they
need you to pay a fee and claim the money on their behalf. They say they will
pay you a percentage of the total sum for your help.
They request personal and banking details from you and a ‘goodwill’ or
‘advance fee’ payment. Your information is used for illegal activities and the
money you submit is never seen again.
Online auction frauds are also becoming common. These include the advance
lottery fee scams, business opportunities, work from home scams and
international modem dialling schemes. Another common scam invites people
to claim prizes by calling a hotline number. Usually, the hotlines charge a high
fee per minute and the calls last many minutes.
agreement that forces you to pay exorbitantly high prices for ‘deals’. Many of
these scams do not allow you to cancel once you have signed on.
The Crimes wing is an important part of FIA, which deals with organized
crimes other than terrorism and human trafficking. This wing is headed by a
senior police officer as Additional Director General at the HQ who is
responsible for assisting the Director General and coordinating operations of
the zonal directors. Under the Zonal Directors are Crime Circles who have
the following core functions:
• Books piracy
• Internet piracy
• Digital piracy [LAN file sharing, mobile, digital stream ripping]
• Fake consumer products, etc
2. Anti-Corruption
3. Economic Crime
4. Spurious Drugs
5. Cyber Crimes
6. Counterfeit Currencies
7. Foreign Exchange Crimes
8. PPC and other Special Laws
46
Copyright Ordinance came onto the schedule of FIA in April 2005. FIA
registered 34 cases [subjudice in the courts]; sealed six illegal manufacturing
units of CDs/DVDs in Karachi; and seized over a million pirated optical discs
in the year 2005 & 2006. FIA’s one-year performance has been lauded at
national and global levels.
“…Pakistan’s Federal Investigation Agency (FIA) this week made nine arrests
for copyright violations, seized over 1,000,000 pirated CDs and video and
audio cassettes, and, most importantly, shut down six factories illegally
producing optical media. Steps like these no doubt help Pakistan attract
greater investment in innovative industries.” [Deputy USTR, Josette Sheeran
Shiner]
“The United States is pleased with the recent progress Pakistan has
demonstrated in fighting optical disc piracy.” [USTR, Rob Portman]
Spurious Drugs
The illicit trade of production/ supply, distribution, and sale of drugs are
posing a serious threat to the lives of the innocent citizens and has serious
ramifications such as:
FIA’s crime wing has taken up the challenge to eradicate the illicit trade in
drugs and has recovered spurious drugs valuing over Rs.416 million and
seized eight illegal manufacturing units. Special drug units have been
established in the provincial headquarters. The FIA has registered 67 cases
in the years 2005 & 2006.
Cyber Crimes
Counterfeit Currencies
"The purpose of establishing the National Response Center for Cyber Crimes
is to stop misuse of the Internet and trace those involved in cyber-related
crimes," Iftikhar Ahmad, spokesman for Pakistan's Interior Ministry, told the
Associated Press on Wednesday.
"The importance of this special wing was felt when Daniel Pearl was
kidnapped, and his captors started sending e-mails to newspapers," he said.
The Wall Street Journal correspondent disappeared on Jan. 23, 2002, from
Pakistan's southern city of Karachi.
On Jan. 27, 2002, the Journal and other media received an e-mail from a
group calling itself the National Movement for the Restoration of Pakistani
Sovereignty. The e-mail contained a photo of Pearl, 38, with a gun to his
head.
The FBI traced the e-mails, and police captured those who allegedly sent
them to the newspapers, but, on Feb. 21, 2002, the U.S. Embassy received a
videotape showing Pearl was dead.
"The National Response Center for Cyber Crimes will play a key role in the
days to come in tracing those terrorists who often use the Internet or prepaid
telephone cards to communicate messages to their associates for carrying
out acts of terrorism and other purposes," Ahmad said.
The bill deals with the electronic crimes included, cyber terrorism, criminal
access, criminal data access, data damage electronic fraud, electronic
forgery, misuse of electronic system or electronic device, unauthorised access
to code, misuse of encryption, misuse of code, cyber stalking and suggest
stringent punishment for offences involving sensitive electronic crimes.
Following the passage of the mentioned bill, the Minister for Information
Technology Awais Ahmad Khan Leghari stated that the e-crime law would
require the internet companies maintain their traffic data for at least six
months to enable the agencies to investigate cases involving data stored by
them. He said the law would enable the government to seek extradition of
foreign nationals through Interpol for their involvement in criminal activities
punishable under the law.
With its worldwide popularity, the risk of Internet crime has also risen
considerably. Precaution has always been better then cure so it's in our hands
to safeguard our personal information when we make any online transaction.
With every bit of information you transmit through the Internet or store
online, the risk of falling victim to the Internet crime also rises. Identity theft
is at its all time high! Some of the various gullible trends that have been
rising through the Internet include hacking, stalking, fraud, phishing, theft,
spreading Malware and harassment! This not only causes a financial distress
but more then often leads to the psychological stress.
Some of the ways that can help you to guard your safety in the Internet
world and help you escape from falling prey to Cyber Crime are listed below.
Do remember, your safety is at your own hands!
Awareness: Before you start the campaign to safeguards yourself from cyber
crime, keep in mind that you know about the risks you are going to face! The
right knowledge equips you to fight with a right mindset! Awareness is the
most important weapon that will come to your rescue at the most difficult
times!
Be Vigilant: These days most of the people who surf online are the members
of social networking sites. Being social is nice but trusting everyone regarding
your personal information can drown you into deep waters! Most of the cyber
criminals maintain a good relationship at the start and at later stages they
exploit that information for their own good. Do not let them exploit your
trust! Be conscientious of the information you share with others online.
Don't pass your Password: If any link in your email asks for your personal
information or your password, quickly mark it as Spam and report it! Most of
these emails are used to phish for your personal information. They will allure
you with schemes such as " Congrats! You've been chosen winner for a trip to
Switzerland", all excited you may give your information but in the end you'll
realize the big loss you made for yourself! Keep in mind, if you are dealing
with a valid organization, it will never ask you for your password. Another
way to keep your personal information secure is by changing passwords at
some regular intervals. Though make it easy for yourself to remember!
We all enjoy using the Internet. It has been a valuable source of information
since almost a decade now! Do not let anyone make it a bad experience for
you by making you prey to their bad motives. So, to prevent yourself from
becoming a victim to cyber crime keep in mind these basic tips, be vigilant
and conscious of the information you share through the intranet connection.
References
• http://www.google.com
• http://www.fia.gov.pk
• http://archive.pakcon.org/post-pc-2004/pc-khi-04-jawad-electronic-
commerceand-cyber-crime.pdf
• http://www.crime-research.org/analytics/cyber_crimes0108
• http://ezinearticles.com/?Cyber-Crimes-And-Solutions&id=204167
• www.wikipedia.com
• www.scribd.com