SlideShare une entreprise Scribd logo
1  sur  18
History of Computer Crime
Prepared by:
Kushagra Ganeriwal(130010111009)
Sweetu Ratnani(130010111048)
Guided by:
Prof.Kiran Macwan (CP Dept.)
Introduction & Traditional Problems
• Criminals have proven to be remarkably innovative.
• The question of vicinage has not been resolved by the court. Thus,
both investigative units and prosecutorial teams have not been
effective.
• Anonymizer sites – those sites which are designed to mask the
identity of a user
Recognizing & Defining Computer Crime
• First computer crime
• really unknown – as no written or formal communications were en vogue at
the time
• certainly had to be the theft or destruction of an abacus
• First documented case:
• early 19th Century – the sabotage of a computer system developed by textile
manufacturer, Joseph Jacquard.
• This machine, designed to introduce automated tasks, was attacked by
individuals fearful of losing employment to computers.
Three Incidents
• Prior to the 1980s, computer crime was considered a non-issue.
• However, three incidents shook American complacency to its core.
1) Compromising of Milnet
2) The Morris Worm
3) Crash of AT&T
Compromising of Milnet (1986)
• Berkley – maintained sensitive military info as part of Arpanet
• Soviet employed German hacker hacks and steals sensitive
information
• Discovered by a bean counter
who investigated the loss of less than one dollar!
• Immediately after discovery, Internet security
and data protection became a top priority
The Morris Worm (1988)
• Robert Morris – Cornell University student – son of a government
agent
• Created a worm to impress his friends, but did not recognize the
potentiality for destruction
• Attempted to warn victims – instructing them on how to remove the
worm prior to massive destruction
• Too late – caused millions of dollars in damage and crippled 10% of all
computers connected to the Internet
• First person convicted under the new Computer Fraud and Abuse Act
AT&T Crash(1989)
• AT&T crashes due to their own failures
• Blame shifted to Legion of Doom
• LEGION OF DOOM
• Named after fictional circle of super-villians
• Shamelessly promote themselves, brag of their exploits, and decry the use of
force by government
Categorizing Computer Crime – while exhaustive,
the categories are not mutually exclusive
• Means or Instrument
• Target
• Incidental
Computer as a means
• Phreaking and Telecom Crime
• Web-cramming
• ISP Jacking
• Internet Scams
• Non-phreaking, neo-traditional crime
Phreaking
• the manipulation of telecommunications carriers to gain knowledge of telecommunications,
and/or theft of applicable services – OR – any activity that incorporates the illegal use or
manipulation of access codes, access tones, PBX’s, or switches
• initially perpetrated by individuals drawn to the challenge of cracking systems, especially those
which claimed to be impenetrable, like DOD
• Became a counterculture – in which conferences and bulletin boards were developed as
platforms for braggarts (www.defcon.org) (www.Phrack.org)
• Would build global telecommunications systems using other’s resources
• Law enforcement was helpless to react due to an increase in predatory crime and inadequate
resources
Types of Phreaking
• Theft of access codes
• Manipulation of switches
• Manipulation of PBX’s
(Private Branch Exchanges)
Web-cramming
• Accomplished when criminals develop new Web pages for small businesses and
non-profit groups for “little” or “no expense”. While advertising their service as
free, these criminals actually engage in unauthorized phone charges on their
victims’ accounts.
• Most common approach involves the use of “rebate checks.”
• These checks, when cashed, transferred the consumer’s ISP, placing monthly
service charges on their telephone bill.
• This activity is possible because telephone companies contract to provide billing
and collection services for other companies that sell telecommunications-related
services.
ISP-Jacking
• Involves disconnecting individuals users from their selected Internet Service
providers and redirecting them to illegitimate servers
• In these cases, users are lured into downloading software which surreptitiously
disconnects their chosen Internet service providers, silences their modem, and
reconnects them to a remote server..
• 1999 – RCMP uncovered a complicated scam in which Canadian users were
rerouted through Moldova (a republic in the Soviet Union) and other
international locations to Dallas, Texas resulting in thousands of dollars in long
distance charges.
• The success of these scams is largely attributed to the fact that no identifying or
credit card information is requested – remember – charges are charged to the
victim’s telephone bill.
Nigerian Advance Fee Scam
• 6 steps to 4-1-9 scams
• are identified and targeted through sources ranging from trade journals, professional directories,
newspapers, etc.
• individual or company receives e-mail from a “government or agency official” (such as a senior
civil servant in one of the Nigerian ministries, like the Nigerian National Petroleum Corporation)
• e-mail informs recipient that this government or agency is willing to transfer millions of dollars in
“over invoiced contracts”, if:
• recipient provides blank copies of letterhead, banking account information, and telephone/fax
information (these letters, in turn, are used to seduce other victims – these are often used to
obtain a travel visa from the American embassy
• as the scam involves cultivating the trust of the recipient, more official documentation is received
from the “government or agency” (i.e., authentication letters with official looking stamps,
government seals, or logos which support the claims)
• once trust is obtained, up-front fees are requested for taxes, government bribes, attorney fees, or
the like (Grennan, Britz, Rush & Barker, 2000).
Non-phreaking, neo-traditional crime (i.e.
non-Internet crime)
• Not all technologically advanced crime involves the use of the
Internet or electronic communications!
Printing technologies, software capabilities, digital cameras, and the
like have increased the sophistication of non-Internet criminal activity.
Traditional methods of counterfeiting currency, defrauding financial
institutions, viewing child pornography, and the like, have all been
supplanted by more advanced approaches.
IP Spoofing
• IP Spoofing – successfully mimic a victim’s computer identity
• May also be used to redirect Internet traffic
• Domain name hijacking is accomplished by spoofing messages to
domain name registrars like Network Solutions.
• Has been used against Nike
Cybersquatting
• Cybersquatting - the practice of infringing on trademarked property via electronic means
• Purchase of domain names consistent with established companies or businesses. (i.e.
www.toysrus.com , etc.)
• Purchase of domain names which represent common misspellings or typographical errors of same
(i.e. www.toysareus.com
• Outlawed by the Anti-Cybersquatting Consumer Protection Act of 1997 – has been characterized
as the epitome of techno-capitalism by some, but branded criminal by government authorities
• Effectively used against John Zuccarini who purchased thousands of domain names which
represented common misspellings of popular businesses and mousetrapped accidental visitors
(opening ad boxes which require users to click on, and therefore look at, the ads to make them go
away).
THANK YOU

Contenu connexe

Tendances

Encapsulating security payload in Cryptography and Network Security
Encapsulating security payload in Cryptography and Network SecurityEncapsulating security payload in Cryptography and Network Security
Encapsulating security payload in Cryptography and Network SecurityKoushil Mankali
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signaturejolly9293
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptographyanusachu .
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganographyJishnu Grandhi
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureAdarsh Patel
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security ArchitectureBharathiKrishna6
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentationKudzai Rerayi
 

Tendances (20)

Cyber Law And Ethics
Cyber Law And EthicsCyber Law And Ethics
Cyber Law And Ethics
 
Types of attacks
Types of attacksTypes of attacks
Types of attacks
 
Encapsulating security payload in Cryptography and Network Security
Encapsulating security payload in Cryptography and Network SecurityEncapsulating security payload in Cryptography and Network Security
Encapsulating security payload in Cryptography and Network Security
 
Security tools
Security toolsSecurity tools
Security tools
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Email Forensics
Email ForensicsEmail Forensics
Email Forensics
 
Seminar ppt on digital signature
Seminar ppt on digital signatureSeminar ppt on digital signature
Seminar ppt on digital signature
 
Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Cryptography and steganography
Cryptography and steganographyCryptography and steganography
Cryptography and steganography
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
 
CMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signatureCMACs and MACS based on block ciphers, Digital signature
CMACs and MACS based on block ciphers, Digital signature
 
Network security - OSI Security Architecture
Network security - OSI Security ArchitectureNetwork security - OSI Security Architecture
Network security - OSI Security Architecture
 
Chapter 5
Chapter 5Chapter 5
Chapter 5
 
Digital Signature ppt
Digital Signature pptDigital Signature ppt
Digital Signature ppt
 
intruders types ,detection & prevention
intruders types ,detection & preventionintruders types ,detection & prevention
intruders types ,detection & prevention
 
Network security at_osi_layers
Network security at_osi_layersNetwork security at_osi_layers
Network security at_osi_layers
 
Forensics Analysis and Validation
Forensics Analysis and Validation  Forensics Analysis and Validation
Forensics Analysis and Validation
 
Security incident
Security incidentSecurity incident
Security incident
 
Network security presentation
Network security presentationNetwork security presentation
Network security presentation
 

Similaire à History of computer crime

Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newDr. Arun Verma
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and CybercrimePravir Karna
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsDr. Prashant Vats
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it startedNavjyotsinh Jadeja
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issuesRoshan Mastana
 
L Scope
L ScopeL Scope
L ScopeCTIN
 
Dubai 1
Dubai 1Dubai 1
Dubai 1mmavis
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptxClichesin
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Anshuman Tripathi
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYChaya Sorir
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law Center
 

Similaire à History of computer crime (20)

Mis chapter 9
Mis chapter 9Mis chapter 9
Mis chapter 9
 
Historical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes newHistorical genesis and evolution of cyber crimes new
Historical genesis and evolution of cyber crimes new
 
Cyberlaw and Cybercrime
Cyberlaw and CybercrimeCyberlaw and Cybercrime
Cyberlaw and Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
CYBERFORENSICS
CYBERFORENSICSCYBERFORENSICS
CYBERFORENSICS
 
Obstacles to Cybercrime Investigations
Obstacles to Cybercrime InvestigationsObstacles to Cybercrime Investigations
Obstacles to Cybercrime Investigations
 
what is cyber crime and how it started
what is cyber crime and how it startedwhat is cyber crime and how it started
what is cyber crime and how it started
 
Types Of Computer Crime
Types Of Computer CrimeTypes Of Computer Crime
Types Of Computer Crime
 
Cyber crime and issues
Cyber crime and issuesCyber crime and issues
Cyber crime and issues
 
L Scope
L ScopeL Scope
L Scope
 
Dubai 1
Dubai 1Dubai 1
Dubai 1
 
Presentation.pptx
Presentation.pptxPresentation.pptx
Presentation.pptx
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
Computer crime
Computer crimeComputer crime
Computer crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Internet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP InstituteInternet Law 2014 - Presentation at CalBar IP Institute
Internet Law 2014 - Presentation at CalBar IP Institute
 
Chap 2 computer forensics investigation
Chap 2  computer forensics investigationChap 2  computer forensics investigation
Chap 2 computer forensics investigation
 

Plus de Kushagra Ganeriwal (12)

Fm generation
Fm generationFm generation
Fm generation
 
7 segment interface with avr microcontroller
7 segment interface with avr microcontroller7 segment interface with avr microcontroller
7 segment interface with avr microcontroller
 
Mci ppt
Mci pptMci ppt
Mci ppt
 
Conductors
ConductorsConductors
Conductors
 
Curl
CurlCurl
Curl
 
Coulomb's law and its applications
Coulomb's law and its applicationsCoulomb's law and its applications
Coulomb's law and its applications
 
Wireshark
WiresharkWireshark
Wireshark
 
Noise
NoiseNoise
Noise
 
Interfacing ultrasonic rangefinder with avr mc us
Interfacing ultrasonic rangefinder with avr mc usInterfacing ultrasonic rangefinder with avr mc us
Interfacing ultrasonic rangefinder with avr mc us
 
electronic mixer
electronic mixerelectronic mixer
electronic mixer
 
auditorium
auditoriumauditorium
auditorium
 
Prac3 LOUDSPEAKER
Prac3 LOUDSPEAKERPrac3 LOUDSPEAKER
Prac3 LOUDSPEAKER
 

Dernier

lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxsomshekarkn64
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptJasonTagapanGulla
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 

Dernier (20)

lifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptxlifi-technology with integration of IOT.pptx
lifi-technology with integration of IOT.pptx
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes  examplesPOWER SYSTEMS-1 Complete notes  examples
POWER SYSTEMS-1 Complete notes examples
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Solving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.pptSolving The Right Triangles PowerPoint 2.ppt
Solving The Right Triangles PowerPoint 2.ppt
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 

History of computer crime

  • 1. History of Computer Crime Prepared by: Kushagra Ganeriwal(130010111009) Sweetu Ratnani(130010111048) Guided by: Prof.Kiran Macwan (CP Dept.)
  • 2. Introduction & Traditional Problems • Criminals have proven to be remarkably innovative. • The question of vicinage has not been resolved by the court. Thus, both investigative units and prosecutorial teams have not been effective. • Anonymizer sites – those sites which are designed to mask the identity of a user
  • 3. Recognizing & Defining Computer Crime • First computer crime • really unknown – as no written or formal communications were en vogue at the time • certainly had to be the theft or destruction of an abacus • First documented case: • early 19th Century – the sabotage of a computer system developed by textile manufacturer, Joseph Jacquard. • This machine, designed to introduce automated tasks, was attacked by individuals fearful of losing employment to computers.
  • 4. Three Incidents • Prior to the 1980s, computer crime was considered a non-issue. • However, three incidents shook American complacency to its core. 1) Compromising of Milnet 2) The Morris Worm 3) Crash of AT&T
  • 5. Compromising of Milnet (1986) • Berkley – maintained sensitive military info as part of Arpanet • Soviet employed German hacker hacks and steals sensitive information • Discovered by a bean counter who investigated the loss of less than one dollar! • Immediately after discovery, Internet security and data protection became a top priority
  • 6. The Morris Worm (1988) • Robert Morris – Cornell University student – son of a government agent • Created a worm to impress his friends, but did not recognize the potentiality for destruction • Attempted to warn victims – instructing them on how to remove the worm prior to massive destruction • Too late – caused millions of dollars in damage and crippled 10% of all computers connected to the Internet • First person convicted under the new Computer Fraud and Abuse Act
  • 7. AT&T Crash(1989) • AT&T crashes due to their own failures • Blame shifted to Legion of Doom • LEGION OF DOOM • Named after fictional circle of super-villians • Shamelessly promote themselves, brag of their exploits, and decry the use of force by government
  • 8. Categorizing Computer Crime – while exhaustive, the categories are not mutually exclusive • Means or Instrument • Target • Incidental
  • 9. Computer as a means • Phreaking and Telecom Crime • Web-cramming • ISP Jacking • Internet Scams • Non-phreaking, neo-traditional crime
  • 10. Phreaking • the manipulation of telecommunications carriers to gain knowledge of telecommunications, and/or theft of applicable services – OR – any activity that incorporates the illegal use or manipulation of access codes, access tones, PBX’s, or switches • initially perpetrated by individuals drawn to the challenge of cracking systems, especially those which claimed to be impenetrable, like DOD • Became a counterculture – in which conferences and bulletin boards were developed as platforms for braggarts (www.defcon.org) (www.Phrack.org) • Would build global telecommunications systems using other’s resources • Law enforcement was helpless to react due to an increase in predatory crime and inadequate resources
  • 11. Types of Phreaking • Theft of access codes • Manipulation of switches • Manipulation of PBX’s (Private Branch Exchanges)
  • 12. Web-cramming • Accomplished when criminals develop new Web pages for small businesses and non-profit groups for “little” or “no expense”. While advertising their service as free, these criminals actually engage in unauthorized phone charges on their victims’ accounts. • Most common approach involves the use of “rebate checks.” • These checks, when cashed, transferred the consumer’s ISP, placing monthly service charges on their telephone bill. • This activity is possible because telephone companies contract to provide billing and collection services for other companies that sell telecommunications-related services.
  • 13. ISP-Jacking • Involves disconnecting individuals users from their selected Internet Service providers and redirecting them to illegitimate servers • In these cases, users are lured into downloading software which surreptitiously disconnects their chosen Internet service providers, silences their modem, and reconnects them to a remote server.. • 1999 – RCMP uncovered a complicated scam in which Canadian users were rerouted through Moldova (a republic in the Soviet Union) and other international locations to Dallas, Texas resulting in thousands of dollars in long distance charges. • The success of these scams is largely attributed to the fact that no identifying or credit card information is requested – remember – charges are charged to the victim’s telephone bill.
  • 14. Nigerian Advance Fee Scam • 6 steps to 4-1-9 scams • are identified and targeted through sources ranging from trade journals, professional directories, newspapers, etc. • individual or company receives e-mail from a “government or agency official” (such as a senior civil servant in one of the Nigerian ministries, like the Nigerian National Petroleum Corporation) • e-mail informs recipient that this government or agency is willing to transfer millions of dollars in “over invoiced contracts”, if: • recipient provides blank copies of letterhead, banking account information, and telephone/fax information (these letters, in turn, are used to seduce other victims – these are often used to obtain a travel visa from the American embassy • as the scam involves cultivating the trust of the recipient, more official documentation is received from the “government or agency” (i.e., authentication letters with official looking stamps, government seals, or logos which support the claims) • once trust is obtained, up-front fees are requested for taxes, government bribes, attorney fees, or the like (Grennan, Britz, Rush & Barker, 2000).
  • 15. Non-phreaking, neo-traditional crime (i.e. non-Internet crime) • Not all technologically advanced crime involves the use of the Internet or electronic communications! Printing technologies, software capabilities, digital cameras, and the like have increased the sophistication of non-Internet criminal activity. Traditional methods of counterfeiting currency, defrauding financial institutions, viewing child pornography, and the like, have all been supplanted by more advanced approaches.
  • 16. IP Spoofing • IP Spoofing – successfully mimic a victim’s computer identity • May also be used to redirect Internet traffic • Domain name hijacking is accomplished by spoofing messages to domain name registrars like Network Solutions. • Has been used against Nike
  • 17. Cybersquatting • Cybersquatting - the practice of infringing on trademarked property via electronic means • Purchase of domain names consistent with established companies or businesses. (i.e. www.toysrus.com , etc.) • Purchase of domain names which represent common misspellings or typographical errors of same (i.e. www.toysareus.com • Outlawed by the Anti-Cybersquatting Consumer Protection Act of 1997 – has been characterized as the epitome of techno-capitalism by some, but branded criminal by government authorities • Effectively used against John Zuccarini who purchased thousands of domain names which represented common misspellings of popular businesses and mousetrapped accidental visitors (opening ad boxes which require users to click on, and therefore look at, the ads to make them go away).