Cyber Crimes: An Overview Phyllis Babin, Christy Bourgeois, Kristin Dupuy, and Rebecca Templet Department of Education Southeastern Louisiana University, Hammond, LA 70402 ABSTRACT Cyber crime is a serious threat that continues to plague the Internet. It is defined as any criminal act involving a computer or network. Every year billions of dollars are lost due to cyber crimes, and it is one of the fastest growing areas of crime. This is due in part to the speed, convenience, and anonymity technology provides in order to commit such a wide variety of criminal activities. Although there are many types of cyber crimes, four of these cyber crimes include malware, identity theft, cyber stalking, and spam. This paper will provide a concise explanation of cyber crimes. It will focus on four common cyber crimes and address various methods to protect against such crimes. The paper concludes with a discussion about the shift in technology and cyber crimes that Internet users, primarily, are now experiencing because of the simplicity of programs and availability of resources to enable misusers in becoming predators. Keywords: cyber crime, malware, malware analysis and firewall, identity theft, cyber stalking, and spam. WHAT IS CYBER CRIME As Internet usage continues to increase, crimes using the Internet become more prevalent. Cyber crime is any criminal act that involves a computer and/or network. Cyber crime can occur in several different forms, and four common computer crimes include: malware, identity theft, cyber stalking, and spam. The average cost of cyber crimes to organizations is almost $12 million in a ten-month period, which is a 78 percent increase from four years ago (2). United States incurs the highest average cost of cyber crimes compared to United Kingdom, Germany, Australia, Japan, and France. Although cyber crimes are serious and often cause substantial monetary damage, many victims, including most victimized businesses, do not report offenses to law enforcement (7). MALWARE, MALWARE ANALYSIS, & FIREWALLS Malware is the term used to describe viruses, Trojans spywares, and other invasive code. It can be described as a program whose purpose is malevolent; to intentionally cause harm or subvert the intended function of the system, and it ultimately has malicious intent (9). Throughout the years of computers becoming more prevalent, steps have been taken to battle malware. There is development with malware analysis to combat the malware, with various techniques in place to battle; however, those malware programmers are also capable of detecting such analysis and have techniques of avoidance. This has made the job of avoiding malware a huge task. The two main types of malware analysis include static and dynamic, but there is a third one, code, that is also available. Static analysis performs a detailed analysis of the malware code and provides an internal view of the malware’s functionality. This type uses as many antivirus detection engines as possible to assist classification and it searches the body of the malware for strings (9). The other main analysis tool is dynamic, which runs the malware and observes the interaction o the running malware with the computer from a behavioral point of view. Dynamic analysis tools work to monitor a suspicious program with the purpose of locating the execution points where the application makes the control flow decisions (9). Code is another analysis tool, where the purpose is to disassemble and debug. Although there is a battle existing with the analysis tools fighting malware, there are, unfortunately, analysis avoidance tools within malware to help them escape detection. The attackers are capable of using packers, protectors or cryptors to obstruct the forensic analyst. Thus the analyst must be aware of the limits within the analysis tools and be able to employ further analysis techniques to reveal the aim of the malware. In addition, modern malware has stealth techniques, or anti-forensics, which assists in avoiding modern analysis methods (9). The maliciousness in malware attacks and cyber attacks is increasing more rapidly in current times, and sadly networks are becoming more at risk to these attacks. Both singular systems, such as PC, and network systems are inescapable from these sabotages, therefore making the investigation into fighting such vital (9). Research has found a 20.6% rise in attacks just in this past year and it is believed that 92% of large firms have experienced a security breach at some point (4). Cyber crime can be very well organized and can target obtaining specific sensitive company information such as employee data, financial accounts, and customer details. One of these attacks that has been well known was Operation Aurora, which affected Google, Adobe and Microsoft and is thought to have originated in China and was aimed at obtaining intellectual property. Another attack involved street banks in the UK that were troubled by the Zeus Trojan virus. This particular virus is undetectable by traditional firewalls and security software and large amounts of money was stolen. Although new securities are available and there is a resistance against the malware and cyber crimes, Dr. Fafinski (4) says “The problem is that new vulnerabilities are being created all the time and there will always be a window of opportunity for cyber criminals.” IDENTITY THEFT & FRAUD Identity theft occurs when someone steals a victim’s personal information and uses it without his/her permission to commit fraud or other crimes. Identity theft includes tax-related identity theft, child identity theft, and medical identity theft. The Federal Trade Commission estimates that nine million Americans are victims of identity theft every year (4). The most common type of identity theft is credit-card fraud rather than full-blown identity theft. Credit-card fraud occurs when a thief uses someone else’s card to make purchases. More serious cases of identity theft include using other’s personal information (social security number) to open accounts and/or take out loans which can wreak havoc on personal finances, credit history, and can take time, money, and patience to resolve. According to a national survey of prosecutors, credit card fraud and identity theft are the most frequently prosecuted cyber crimes (7). There are many things that one can do in order to protect themselves against identity theft and/or fraud. Guarding your information online is especially important to prevent theft or fraud. One way that criminals try to obtain personal information is through a technique known as phishing. Phishing is a trick in which spam or pop-ups mimic legitimate banks or businesses to obtain personal information, which can be used to fraudulently access your accounts (4). Another key to protection is regularly monitoring bank statements, credit card statements, and credit reports. There are also many businesses and/or firms that provide identity theft protection at a cost (i.e., LifeLock and TrustedID). Federal law limits your liability in the event of theft or fraud but depends on how quickly you report the loss or theft. CYBER STALKING A new form of computer related crime that is occurring in our society is cyber stalking. Cyber stalking is when a person is followed and pursued online, their privacy is invaded, and it involves harassment that can make a victim feel threatened. This is a growing problem and can be partially credited to simplicity involved in accessing the Internet and other tools of technology as a weapon. This harassment occurs via websites, chat rooms, discussion forums, open publishing websites, and email (5). The types of cyber stalking include email stalking, Internet stalking, and computer stalking. Email stalking is most closely related to the traditional stalking patterns that we are familiar with. It involves the speed of a phone call and includes the separation of that may be associated with a letter. A second type is Internet stalking, which is a way for victims to experience slander and endangerment by the perpetrator. This is the most likely type of cyber stalking that could spill over into a victim’s personal space because it is often associated with traditional stalking behaviors. The third type of cyber stalking is computer stalking and this involves a victim’s computer being under the control of an unauthorized individual. The use of the Internet and Windows operating systems are misused and allow the stalker to communicate directly with the victim (5). Because of the increase in the crimes involved with cyber stalking, the justice system has been at work. Within the US, 17 states have passed laws against online cyber stalking. The study of these criminals has revealed that they can be categorized and have various intents. Some of the types include rejected stalkers, intimacy seekers, incompetent suitors, resentful, and predatory stalkers. Their motivations may include sexual harassment, obsession for love, revenge and hate, as well as ego and power trips. The US Department of Justice suggests that victims do several things to protect themselves in the event of cyber stalking. Some suggestions include telling parents of harassment (if under age 18), sending the stalker a clear written warning that the contact is unwanted, save copies of communications, file reports with local law enforcement, as well as changing contact information such as email, Internet provider, and phone number. To Internet users disappointment, because of the Internets continued growth, the problems of cyber stalking will likely continue to grow, and legal actions are now in place to protect the victims of these crimes (5). SPAM Spam is any unsolicited email in which the sender is attempting to gain an advantage and which the recipient neither asked for nor wanted. The Controlling the Assault of Non-Solicited Pornography and Marketing (CAN-SPAM) Act of 2003 was the first-ever federal protection against unwanted commercial emails (6). Most opponents of the CAN-SPAM Act argue that it imposes on freedom of speech; regardless, most jurisdictions have some form of legislation against spam emailing. Like identity theft and fraud, there are programs available to protect against spam. MailWasher, Spam Sleuth, and Spam Subtract Pro are some of the most reputable programs, but there are many other spam-fighting software programs available. Most Internet service providers (ISP) offer built-in spam filters without any additional cost. Therefore, spam can be stopped before it ever reaches your inbox. CONCLUSION Over time, the technology available has grown to be something of amazement. The Internet, specifically, has developed rapidly to levels that are well above anyone’s expectations, but along with the positive, exists the negative, as evidenced in the detail of just four of the most well-known, experienced cyber crimes (malware, identity theft, cyber stalking, and spam). These individuals that are partaking in the crimes involving the Internet are being combatted through the justice system as new laws and protections become available to victims. As users, we should always be aware of the protection services available to users as well as being educated on the various forms of cyber crimes that exist; therefore, we can be well-informed users and be conscious of what crimes lurk in the wells of the Internet. REFERENCES (1) Burgard, A. & Schlembach, C., (2013). Frames of Fraud: A Qualitative Analysis of the Structure and Process of Victimization on the Internet. International Journal of Cyber Criminology. 7 (2), pp.112-124 (2) Greenberg, A. (2013). The Cost of Cyber Crime Continues to Rise. In SCMagazine.com. Retrieved April 2, 2014, from http://www.scmagazine.com/study-the-cost-of-cyber-crime-continues-torise/article/315397/. (3) Hamid, T. (October 5, 2010). Playing with Firewalls. In The Wall Street Journal. Retrieved April 11, 2014, from http://online.wsj.com/news/articles/SB10001424052748703453804575479632855 718318. (4) (2008). Identity Theft & Credit Card Fraud - How to Protect Yourself. In WSJ.com. Retrieved March 27, 2014, from http://guides.wsj.com/personal-finance/credit/how-to-protect-yourself-fromidentity-theft/. (5) Jaishankar, K. & Sankary, V., (2005). Cyber Stalking: A Global Menace in the Information Super Highway. European Research Group. 3 (2), pp.1-12 (6) Lanza, S. Spam Spam Spam Spam. Lovely Spam! Wonderful Spam! Database Professional. Retrieved date April 15, 2014, from www.infotoday.com/searcher. (7) Marcum, C. & Higgins, G., (2011). Doing Time for Cyber Crime: An Examination of the Correlates of Sentence Length in the United States. International Journal of Cyber Criminology. 5 (2), pp.824-835 (8) Verma, A. & Rao, M., (2013). A Literature Review on Malware and Its Analysis. International Journal of Current Research and Review. 5 (16), pp.71-82