Cyber Crimes Research Paper - Southeastern Louisiana University

advertisement
Cyber Crimes: An Overview
Phyllis Babin, Christy Bourgeois, Kristin Dupuy, and Rebecca Templet
Department of Education
Southeastern Louisiana University,
Hammond, LA 70402
ABSTRACT
Cyber crime is a serious threat that continues to plague the Internet. It is defined
as any criminal act involving a computer or network. Every year billions of dollars are
lost due to cyber crimes, and it is one of the fastest growing areas of crime. This is due in
part to the speed, convenience, and anonymity technology provides in order to commit
such a wide variety of criminal activities. Although there are many types of cyber
crimes, four of these cyber crimes include malware, identity theft, cyber stalking, and
spam. This paper will provide a concise explanation of cyber crimes. It will focus on
four common cyber crimes and address various methods to protect against such crimes.
The paper concludes with a discussion about the shift in technology and cyber crimes that
Internet users, primarily, are now experiencing because of the simplicity of programs and
availability of resources to enable misusers in becoming predators.
Keywords: cyber crime, malware, malware analysis and firewall, identity theft,
cyber stalking, and spam.
WHAT IS CYBER CRIME
As Internet usage continues to increase, crimes using the Internet become more
prevalent. Cyber crime is any criminal act that involves a computer and/or network.
Cyber crime can occur in several different forms, and four common computer crimes
include: malware, identity theft, cyber stalking, and spam. The average cost of cyber
crimes to organizations is almost $12 million in a ten-month period, which is a 78 percent
increase from four years ago (2). United States incurs the highest average cost of cyber
crimes compared to United Kingdom, Germany, Australia, Japan, and France. Although
cyber crimes are serious and often cause substantial monetary damage, many victims,
including most victimized businesses, do not report offenses to law enforcement (7).
MALWARE, MALWARE ANALYSIS, & FIREWALLS
Malware is the term used to describe viruses, Trojans spywares, and other
invasive code. It can be described as a program whose purpose is malevolent; to
intentionally cause harm or subvert the intended function of the system, and it ultimately
has malicious intent (9). Throughout the years of computers becoming more prevalent,
steps have been taken to battle malware. There is development with malware analysis to
combat the malware, with various techniques in place to battle; however, those malware
programmers are also capable of detecting such analysis and have techniques of
avoidance. This has made the job of avoiding malware a huge task.
The two main types of malware analysis include static and dynamic, but there is a
third one, code, that is also available. Static analysis performs a detailed analysis of the
malware code and provides an internal view of the malware’s functionality. This type
uses as many antivirus detection engines as possible to assist classification and it searches
the body of the malware for strings (9). The other main analysis tool is dynamic, which
runs the malware and observes the interaction o the running malware with the computer
from a behavioral point of view. Dynamic analysis tools work to monitor a suspicious
program with the purpose of locating the execution points where the application makes
the control flow decisions (9). Code is another analysis tool, where the purpose is to
disassemble and debug.
Although there is a battle existing with the analysis tools fighting malware, there
are, unfortunately, analysis avoidance tools within malware to help them escape
detection. The attackers are capable of using packers, protectors or cryptors to obstruct
the forensic analyst. Thus the analyst must be aware of the limits within the analysis
tools and be able to employ further analysis techniques to reveal the aim of the malware.
In addition, modern malware has stealth techniques, or anti-forensics, which assists in
avoiding modern analysis methods (9).
The maliciousness in malware attacks and cyber attacks is increasing more
rapidly in current times, and sadly networks are becoming more at risk to these attacks.
Both singular systems, such as PC, and network systems are inescapable from these
sabotages, therefore making the investigation into fighting such vital (9). Research has
found a 20.6% rise in attacks just in this past year and it is believed that 92% of large
firms have experienced a security breach at some point (4). Cyber crime can be very well
organized and can target obtaining specific sensitive company information such as
employee data, financial accounts, and customer details. One of these attacks that has
been well known was Operation Aurora, which affected Google, Adobe and Microsoft
and is thought to have originated in China and was aimed at obtaining intellectual
property. Another attack involved street banks in the UK that were troubled by the Zeus
Trojan virus. This particular virus is undetectable by traditional firewalls and security
software and large amounts of money was stolen. Although new securities are available
and there is a resistance against the malware and cyber crimes, Dr. Fafinski (4) says “The
problem is that new vulnerabilities are being created all the time and there will always be
a window of opportunity for cyber criminals.”
IDENTITY THEFT & FRAUD
Identity theft occurs when someone steals a victim’s personal information and
uses it without his/her permission to commit fraud or other crimes. Identity theft includes
tax-related identity theft, child identity theft, and medical identity theft. The Federal
Trade Commission estimates that nine million Americans are victims of identity theft
every year (4). The most common type of identity theft is credit-card fraud rather than
full-blown identity theft. Credit-card fraud occurs when a thief uses someone else’s card
to make purchases. More serious cases of identity theft include using other’s personal
information (social security number) to open accounts and/or take out loans which can
wreak havoc on personal finances, credit history, and can take time, money, and patience
to resolve. According to a national survey of prosecutors, credit card fraud and identity
theft are the most frequently prosecuted cyber crimes (7).
There are many things that one can do in order to protect themselves against
identity theft and/or fraud. Guarding your information online is especially important to
prevent theft or fraud. One way that criminals try to obtain personal information is
through a technique known as phishing. Phishing is a trick in which spam or pop-ups
mimic legitimate banks or businesses to obtain personal information, which can be used
to fraudulently access your accounts (4). Another key to protection is regularly
monitoring bank statements, credit card statements, and credit reports. There are also
many businesses and/or firms that provide identity theft protection at a cost (i.e.,
LifeLock and TrustedID). Federal law limits your liability in the event of theft or fraud
but depends on how quickly you report the loss or theft.
CYBER STALKING
A new form of computer related crime that is occurring in our society is cyber
stalking. Cyber stalking is when a person is followed and pursued online, their privacy is
invaded, and it involves harassment that can make a victim feel threatened. This is a
growing problem and can be partially credited to simplicity involved in accessing the
Internet and other tools of technology as a weapon. This harassment occurs via websites,
chat rooms, discussion forums, open publishing websites, and email (5).
The types of cyber stalking include email stalking, Internet stalking, and
computer stalking. Email stalking is most closely related to the traditional stalking
patterns that we are familiar with. It involves the speed of a phone call and includes the
separation of that may be associated with a letter. A second type is Internet stalking,
which is a way for victims to experience slander and endangerment by the perpetrator.
This is the most likely type of cyber stalking that could spill over into a victim’s personal
space because it is often associated with traditional stalking behaviors. The third type of
cyber stalking is computer stalking and this involves a victim’s computer being under the
control of an unauthorized individual. The use of the Internet and Windows operating
systems are misused and allow the stalker to communicate directly with the victim (5).
Because of the increase in the crimes involved with cyber stalking, the justice
system has been at work. Within the US, 17 states have passed laws against online cyber
stalking. The study of these criminals has revealed that they can be categorized and have
various intents. Some of the types include rejected stalkers, intimacy seekers,
incompetent suitors, resentful, and predatory stalkers. Their motivations may include
sexual harassment, obsession for love, revenge and hate, as well as ego and power trips.
The US Department of Justice suggests that victims do several things to protect
themselves in the event of cyber stalking. Some suggestions include telling parents of
harassment (if under age 18), sending the stalker a clear written warning that the contact
is unwanted, save copies of communications, file reports with local law enforcement, as
well as changing contact information such as email, Internet provider, and phone number.
To Internet users disappointment, because of the Internets continued growth, the
problems of cyber stalking will likely continue to grow, and legal actions are now in
place to protect the victims of these crimes (5).
SPAM
Spam is any unsolicited email in which the sender is attempting to gain an
advantage and which the recipient neither asked for nor wanted. The Controlling the
Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003 was the
first-ever federal protection against unwanted commercial emails (6). Most opponents of
the CAN-SPAM Act argue that it imposes on freedom of speech; regardless, most
jurisdictions have some form of legislation against spam emailing. Like identity theft and
fraud, there are programs available to protect against spam. MailWasher, Spam Sleuth,
and Spam Subtract Pro are some of the most reputable programs, but there are many
other spam-fighting software programs available. Most Internet service providers (ISP)
offer built-in spam filters without any additional cost. Therefore, spam can be stopped
before it ever reaches your inbox.
CONCLUSION
Over time, the technology available has grown to be something of amazement.
The Internet, specifically, has developed rapidly to levels that are well above anyone’s
expectations, but along with the positive, exists the negative, as evidenced in the detail of
just four of the most well-known, experienced cyber crimes (malware, identity theft,
cyber stalking, and spam).
These individuals that are partaking in the crimes involving the Internet are being
combatted through the justice system as new laws and protections become available to
victims. As users, we should always be aware of the protection services available to
users as well as being educated on the various forms of cyber crimes that exist; therefore,
we can be well-informed users and be conscious of what crimes lurk in the wells of the
Internet.
REFERENCES
(1) Burgard, A. & Schlembach, C., (2013). Frames of Fraud: A
Qualitative Analysis of the Structure and Process of Victimization on the Internet.
International Journal of Cyber Criminology. 7 (2), pp.112-124
(2) Greenberg, A. (2013). The Cost of Cyber Crime Continues to Rise. In
SCMagazine.com. Retrieved April 2, 2014, from
http://www.scmagazine.com/study-the-cost-of-cyber-crime-continues-torise/article/315397/.
(3) Hamid, T. (October 5, 2010). Playing with Firewalls. In The Wall Street
Journal. Retrieved April 11, 2014, from
http://online.wsj.com/news/articles/SB10001424052748703453804575479632855
718318.
(4) (2008). Identity Theft & Credit Card Fraud - How to Protect Yourself. In WSJ.com.
Retrieved March 27, 2014, from
http://guides.wsj.com/personal-finance/credit/how-to-protect-yourself-fromidentity-theft/.
(5) Jaishankar, K. & Sankary, V., (2005). Cyber Stalking: A Global Menace in the
Information Super Highway. European Research Group. 3 (2), pp.1-12
(6) Lanza, S. Spam Spam Spam Spam. Lovely Spam! Wonderful Spam! Database
Professional. Retrieved date April 15, 2014, from
www.infotoday.com/searcher.
(7) Marcum, C. & Higgins, G., (2011). Doing Time for Cyber
Crime: An Examination of the Correlates of Sentence Length in the United States.
International Journal of Cyber Criminology. 5 (2), pp.824-835
(8) Verma, A. & Rao, M., (2013). A Literature Review on Malware and Its Analysis.
International Journal of Current Research and Review. 5 (16), pp.71-82
Download