<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <HTML><HEAD><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1"> <TITLE>ERROR: The requested URL could not be retrieved</TITLE> <STYLE type="text/css"><!--BODY{background-color:#ffffff;font-family:verdana,sans-serif}PRE{font-family:sans-serif}--></STYLE> </HEAD><BODY> <H1>ERROR</H1> <H2>The requested URL could not be retrieved</H2> <HR noshade size="1px"> <P> While trying to process the request: <PRE> TEXT http://www.scribd.com/titlecleaner?title=CyberCrime+Report.docx HTTP/1.1 Host: www.scribd.com Proxy-Connection: keep-alive Accept: */* Origin: http://www.scribd.com X-CSRF-Token: ea5b3d74fc35283c15ef440947b36a61b715cffd User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.64 Safari/537.31 X-Requested-With: XMLHttpRequest Referer: http://www.scribd.com/upload-document Accept-Encoding: gzip,defl
<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN" "http://www.w3.org/TR/html4/loose.dtd"> <HTML><HEAD><META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=iso-8859-1"> <TITLE>ERROR: The requested URL could not be retrieved</TITLE> <STYLE type="text/css"><!--BODY{background-color:#ffffff;font-family:verdana,sans-serif}PRE{font-family:sans-serif}--></STYLE> </HEAD><BODY> <H1>ERROR</H1> <H2>The requested URL could not be retrieved</H2> <HR noshade size="1px"> <P> While trying to process the request: <PRE> TEXT http://www.scribd.com/titlecleaner?title=CyberCrime+Report.docx HTTP/1.1 Host: www.scribd.com Proxy-Connection: keep-alive Accept: */* Origin: http://www.scribd.com X-CSRF-Token: ea5b3d74fc35283c15ef440947b36a61b715cffd User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.64 Safari/537.31 X-Requested-With: XMLHttpRequest Referer: http://www.scribd.com/upload-document Accept-Encoding: gzip,defl
CERTIFICATE
The Seminar Report entitled Information Technology Act submitted by Uttam kumar (09EARCS123) have been examined by us and is hereby approved for presenting the seminar leading to the award of Degree Bachelor of Technology in Computer Science. By this approval the undersigned does not necessarily endorse or approve any statement made, opinion expresses or conclusion withdrawn therein, but approve the pursuance of seminar only for the above mentioned purpose.
ACKNOWLEDGEMENT
I would like to express our sincere thanks to Er. Akhil Pandey, Head of Department (Computer Science Engineering), Arya College of Engineering & I.T, Jaipur and all the faculty members for extending their valuable suggestions and their encouragement and cooperation have been a source of great inspiration. I am also very thankful to our seminar coordinator Mr. Ashish Sharma for his constant guidance right from the inception till the successful completion of the presentation of the seminar. I sincerely acknowledge him for extending his valuable guidance, support for literature, critical reviews of seminar and the report and above all the moral support to present the seminar. I would like to thank all those people who have helped us in some way or the other during the seminar presentation.
ABSTRACT
Cybercrimes are defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)". Such crimes may threaten a nations security and financial health.Issues surrounding this type of crime have become high-profile, particularly those surrounding cracking, copyright infringement, child pornography, and child grooming. There are also problems of privacy when confidential information is lost or intercepted, lawfully or otherwise. So, in order to keep an account of these cyber attacks, the government of India has passed the law ie Information Technology Act 2000 which was further amended in 2008. This act helps in punishing the person that is found guilty. To let cyber crime not to effect you 5 Ps must be taken care of which are as followsPrecaution, Prevention, Protection, Preservation and Perseverance.
TABLE OF CONTENTS
S. No. 1 2 3 4 5 6 Topic Chapter 1: Introduction Chapter 2: Literature Survey Chapter 3: Existing work in the field Chapter 4: Proposed work Chapter 5: Conclusion and future work References Page No. 1 17 20 24 29 30
terrorism, publishing sexually explicit content in electronic form and video voyeurism. The need for a comprehensive amendment was consistently felt and after sufficient debate and much deliberation, the I.T. Amendment Act 2008 was passed. The ITAA 2008 got the Presidents assent in February 2009 and was notified with effect from 27.10.2009. The new IT Amendment Act 2008 has brought a large number of cyber crimes under the ambit of the law. Some of the significant points in the Amendment Act include introduction of corporate responsibility for data protection with the concept of reasonable security practices (Sec.43A), recognition of Computer Emergency Response Team India (CERT-In) as the national nodal agency empowered to monitor and even block web-sites under specific circumstances, introduction of technological neutrality replacing digital signatures with electronic signatures etc. Besides, the CERT-In will also assist members of the Indian Community in implementing proactive measures to reduce the risks of computer security incidents. The IT Act provides legal recognition for transactions carried out by means of electronic data interchange, and other means of electronic communication, commonly referred to as "electronic commerce", involving the use of alternatives to paper-based methods of communication and storage of information. The IT Act facilitates electronic filing of documents with the Government agencies. Cyber Crimes - Three categories : Against Property Financial crimes cheating on-line illegal funds transfer. Against Persons On-line harassment, Cyber Stalking, Obscenity. Against Nations Cyber Terrorism Damaging critical information infrastructures.
insulting, misleading, defaming) i. SMS SMS of above nature may be sent using mobile phone of ones own identity or by acquiring a fade identity.
Such SMS may be forwarded amongst groups and communities (inter/intra) in which case the actual source could not be fixed. Few SMSs had been circulated affecting public tranquility, Ex: False Tsunami warning, false alarm as target of explosion ii. MMS Multimedia messages often defaming or obscene are sent among small groups using mobile phones Bluetooth. If there had been a sharing in many mobile equipments the first source couldnt be fixed. Ex., Arrest of the Managing Director of bazee.com in a school MM scandal in Delhi. Often captured in private places
unknowingly for future exploitation. iii. Web based SMS SMS can be sent by logging onto sites like way2sms.com by becoming a member of the site typing the message of choice and choosing destination to be sent anywhere in the world by concealing ones identity Way2sms never share the IP logs with law enforcement agencies. iv. Chat room messages Chat room messages in internet relay chats happens by direct connection between each others machines in which the IP logs are stored neither by Yahoo nor Google and so
information shared in Chat rooms maybe saved but can never be traced retrospectively to its origin. II OFFENSIVE CALLS (Offender calls either by his/her own name
or by acquiring false identity- Landline calls/mobile calls, web based calls, VOIP calls, Skype, Yahoo messenger, Chat room calls, overseas calls etc.) i. Landline/mobile calls Many landlines still have no caller Ids Difficulty if the connection is in a nonexistent fictitious address ii. Web based calls Calls can be made by spoofing the mobile number using the sites like
http://www.phonetrick.net/www.prankdial.com/ iii. Overseas calls Landline/mobile For overseas landline/mobiles the details of the subscribers are not available without the cooperation of international agencies. iv. Chatroom calls VOIPCalls Skype In VOIP it is difficult to ascertain the source as it passes through various international gateways before it enters the country to get terminated in an Indian operators subscriber III Deceptive messages (Lottery, cheating, job racket) (SMS of lottery cheating, emails of prize Greed of the victim is the main reason why cyber frauds are successful. SMS/Email messages of winning a lottery of
money, articles, false promise of jobs, false prize money or articles, alluring people to mail for admission to a reputed University) deposit money. Clues available are email IDs and sometimes few mobile phone numbers. Live.com, Yahoo.co.uk domains IP which are frequently used never share the login IPs and it provides a conducive climate for commission of crimes. To the extent it was made available, the IP log sin variably had shown some Nigerian, Mediterranean, Middle East and American
countries. Hence user details are not available. The mobile numbers are often fictitious and seasonal. The Bank accounts are invariably bogus and have transient life; sometimes an innocent gets allured for commission by stating false reasons for the source of money. The following awareness messages have been propagated: Do not believe emails or SMS that say that you have won a million dollar lottery. Be aware of strangers who promise to transfer crores of rupees to your bank account. Similar cheating can be for prize of cars, for an employment to a job fetching high income, admission to a course in a reputed university abroad. Sometimes Nigerians use the tool of threat of an insider staying inside star hotels waiting for instructions to ignite an explosive if not parted with the ransom money by negotiations. Occasionally criminals hide behind proxy servers bycon cealing their real location of logins. (Threat to critical infrastructures and vital installations and public places) E-mails of threatening nature often with an intention to mislead or to deceive or to implicate another person by wielding threat to critical
infrastructures.
(Theft of proprietary information causing organizations is targeted by rivals, criminals breach of confidentiality and integrity and thereby altering its utility value. More due to disharmony in and sometimes even by disgruntled employees. Disharmony in work place often makes the
employee/employer ex-employees to take away the valuable data or design or client information. Sometimes they damage it; delete it; or sell it to a competitor. Many a times the employers become suspicious about their ex-employees and
attribute instances of data theft which the exemployee was holding in his possession to carryout his official duties at the time of his employment. Frequently breach of Non Disclosure of Agreement(NDA) and Memorandum of terms of employment are often attributed to criminal activity by employers which in truth may be a civil violation. V. IDENTITY THEFT Identity dishonest signature, theft use of involves fraudulent or someones or other electronic unique
password
identification feature. It is the first step towards credit card fraud, online share trading scams and e-banking crimes. VI. COPY RIGHTS (Internet violation of INTERNETVIOLATIONS OF Posting of features films, part of the films, causing loss to the revenue and criminal violations of Copy Right Act, 1957 often copyrighted challenges the film industries and law
Uploading happening in Indian servers can be deleted. If it is an International server, deletion happens by request. Despite that if persisting, deletion becomes at ask of chance and persons behind the activity may not surface at all.
This is a wide term that includes credit card fraud, online share trading scams and e-banking crimes. In todays highly digitalized world, almost
bank or anyorganization in the guise everyone is affected by financial crimes. ofenhancing their security orupdating the services, confidentialinformation stagesand forcausing abuses wrongful the Phishing usually involves spoofed emails that
collectspersonal contain links to fake websites. at various Spoofing becomes a pre-requisite for causing
information deceptive belief and it follows phishing of vital loss,fraudulent information. Spoofing of the sites normally happens in bank pages if the intention is for a financial fraud. Other sites get spoofed for misleading the viewer or for causing embarrassment. A spoofed page becomes difficult to be distinguished by normal viewers. Phishing normally happens for credit card related information or for password details of internet banking. Internet Banking requires unique
authentication. Forgotten PIN or password option generates new onesif answers to the questions match. New PIN or Passwords reach as mobile SMS, mobile phone security if compromised, criminals then know the precious
PIN or Password. Fund transfer normally goes to bogus fictitious accounts within the country but far apart in Geography. Quick withdrawal happens through short living accounts and the offender manages to open further bogus accounts as a preparation for his future crimes. Withdrawal happens mostly in ATMs by concealing the identity. Banking systems and mobile phone systems provide facilities without proportionate security breeding vulnerabilities. The system now is not immune for account opening or for activating a new SIM card by producing forged ID cards and non-existence characters or by impersonation. Sheer non-compliance of the KYC norms of RBI and verification norms of TRAI opens wide scope for criminal activities ranging from a disturbance call to afraudulent fund transfer culminating even as a mean for anti-national activities. The following awareness message have been Propagated: Never respond to unsolicited emails asking for financial information VIII. WEB PAGE HACKING The primary objective in web page hacking
(The page gets defaced by altering the is to deface and embarrass an organization or an content of the file and appearance causing embarrassment and denial of service) institute. The intention may extend from causing a
denial of service to bringing down a business competitor. Government sites get hacked and hackers sometimes claim responsibility for hacking; the intention being to cause defamation and damage to the dignity of the institution. IX. SPAM/MALWARE/ESPIONAGE Spam is the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. E-mail spam, known as junk mail, is the practice of sending unwanted email messages, frequently with commercial content, in large quantities to anindiscriminate set of recipients. Malware is software designed to infiltrate or damage a computer system without the owners informed consent. Malware is a wide term that includes viruses, worms, Trojans, rootkits, backdoors, spyware, botnets , keystroke loggers and dialers. Cyber espionage is the act of obtaining personal, sensitive proprietary or classified information without permission. Also known as cyber spying, it involves the use of cracking techniques and malicious software including Trojans and spyware. X. MOBILE DEVICEATTACKS Threats to the security of mobile devices include unauthorized access, stolen, handsets, data theft, malware, phishing etc. Mobile devices are getting more computing power and are becoming increasingly feature rich. This increases the likelihood of attacks
This involves flooding a computer with more requests than it can handle, causing it to crash. In a Distributed Denial of Service (DDoS) attack, the perpetrators are many and are geographically widespread.
XII. SOCIAL
A social engineering attack tricks people into revealing passwords or other confidential information by making people believe an unanticipated situation. Training the personnel for handling such situations and effectively ensuring the need to know basis may be aviable solution.
(Capturing and publishing the images, the posting of pictures with an attachment of an pictures and videos of individuals often unwanted message, often with the phone without the knowledge and concurrence number to cause incessant disturbance by calls and thereby passing humiliation and from international strangers. Social networking sites like Orkut have fairly responded to Police requests by furnishing the IP addresses and log details. Face book has proved to be a nonresponsive, despite requests not withstanding even if addressed to any of the International organizations like Child Exploitation On-line Protection forums. Social networking sites like face book have maintain edits unbroken silence if requests for deletion of posted pictures were addressed.
embarrassment)
Cyber terrorism involves the use or threat of disruptive cyber activities for ideological, religious or political objectives. Cyber terrorism can weaken a countrys economy and even make it more vulnerable to military attack.
lascivious Rapidshare, megaupload and various sites have causing provided a nurturing platform for the
propagation and transmission: abusing cultivation, propagation and transmission of the children and uploading of images of such menace of pornography including children. abuse) Surprisingly sites like Paypal and other online payment sites have been hand in glove with such sites prompting one to infer that there might be a sharing of the proceeds of income by the propagation of pornography. Blocking of porno-sites had been a challenge both in technical and legal means because the content can be hosted in a different domain names or in different IP addresses from different geographies of the world.
The investigation of cyber crimes is complex. The evidence is often in an intangible form. Its collection, appreciation, analysis and preservation present unique challenges to the Investigator. The increased use of networks and the growth of the Internet have added to this complexity. Using the Internet, it is possible for a person sitting in India to steal a computer resource in Brazil using a computer situated in USA as a launch pad for his attack. Distributed attacks are also not unheard of. The challenges in such cases are not only technological, but also jurisdictional. Of late, we are experiencing more and more of cyber crimes, since many of us have switched over to the fourth mode of communication i.e. Internet from the previous modes viz. gestures, speech and writing. The internet has opened up avenues of commerce, trade and communication like never before. It is the network that
deals in billions of transactions each day. These transactions are usually transactions of money, pictures, information and videos. The magnitude of transactions the sheer volume makes internet not just an easy tool for information exchange, but also an ideal hotbed of crimes. Internet provides anonymity and safety. Unlike other forms of crimes wherein the person undertakes considerable risk, cyber crime provides the criminal with a cover. He leaves no physical foot-prints, finger-prints or other tangible traces making it extremely difficult to track cyber criminals down. Cyber crime being technology driven evolves continuously and ingeniously making it difficult for investigators to cope up with changes. Criminals are always one step ahead in the sense that they create technology or come up with technique to perpetrate a particular crime and the law enforcers then counter such techniques or technologies.
1. As far as Tamil Nadu State is concerned, Tamil Nadu Police formed two Cyber Crime Cells in the year 2002 one in the Central Crime Branch, Eg more for Chennai City and the another in the CBCID Headquarters, Chennai, for the entire state of Tamilnadu. Recently another Cyber Crime cell has been sanctioned for Coimbatore city. It is learnt that Dr. M. Sudhakar, Additional Deputy Commissioner of Police, Central Crime Branch, Chennai, is rendering commendable service in respect of registration of cases in cyber crime as well as its investigation. 2. Year wise reported cases Reporting of cases to Cyber Crime Cell has increased due to awareness spread among the Net users regarding the existence of separate investigation agency and a special Act. In particular, cases of Identity theft and cheating through Internet have increased.
Investigation and Computer Forensics : 1. In cyber crime cases, the investigators challenge is to establish the crime beyond reasonable doubt using digital evidence that exist in cyber space. This requires Computer or Cyber Forensics special skills, equipments, lab and capabilities far different from conventional crime detection. 2. Computer forensics is extremely important to track and establish proof in all computer related offences. According to Section 79A of the Information Technology Act, 2000, "electronic form evidence" means any information of probative value that is either stored or transmitted in electronic form and includes computer evidence, digital audio, digital video, cell phones, digital fax machines. The computer forensic field has developed techniques to improve the detection, connection, and classification of digital information. Thus the field includes a multitude of systems to extract useful information from computer media and involves the application of varied tools. 3. The stages in computer forensic investigation are usually as follows: a. Identifying the doer of the crime b. Locating the means and equipment through which the crime was committed c. Collection and extraction of the physical evidence d. Correlating the evidence to the crime and facilitating the arrest of the wrong doer. Chain-of-custody is one of the controls used by courts to satisfy admissibility standards. Chain-of-custody is a process consisting of methodical checklists and procedures during the
collection, preservation and analysis of evidence for the purpose of establishing authenticity and reliability of evidence. In other words, the evidence offer or tries to prove the chain-ofcustody in order to rebut or minimize charges that evidence may be tainted or altered. 4. Thus the authenticity of physical evidence is shown by accounting for who, what, when, where and how a given piece of evidence was transferred from its initial discovery, through its collection, access, handling, storage and eventual presentation at trial. Chain-of-custody has been institutionalized as a procedure for the seizure of physical evidence by law enforcement, as well as for the handling of digital evidence by computer forensic examiners as a measure of evidence integrity. 5. The Cyber Crime Investigating Officers are enhancing their technical knowledge by undergoing periodical training organized by Central Bureau of Investigation Academy (CBI), Ghaziabad, Tamil Nadu Police Academy (TNPA), Chennai, (Tamil Nadu Police Officers), Government Examiner of Questioned Documents (GEQD), Hyderabad, Centre for Development of Advanced Computing(C-DAC), Thiruvananthapuram, National Association of Software and Services Companies (NASSCOM), Chennai, Anna University, Chennai and Computer Emergency Response Team-India (CERT-IN), New Delhi.
Chapter 3 :Existing work in this field Various Case Studies on cyber crime:
Case Study- 01: Source Code Theft Computer source code is the most important asset of software companies. Simply put, source code is the programming instructions that are compiled into the executable files that are sold by software development companies. As is expected, most source code thefts take place in software companies. Some cases are also reported in banks, manufacturing companies and other organisations who get original software developed for their use.
The scenario Scenario 1: The suspect (usually an employee of the victim) steals the source code and sells it to a business rival of the victim. Scenario 2: The suspect (usually an employee of the victim) steals the source code and uses it as a base to make and sell his own version of the software.
The law Scenario 1: Sections 43, 65 and 66 of the Information Technology Act, section 63 of the Copyright Act. Scenario 2: Sections 43, 65 and 66 of the Information Technology Act, section 63 of the Copyright Act.
Who is liable? Scenario 1: The persons who steal the source code as well as the persons who purchase the stolen source code. Scenario 2: The persons who steal the source code.
Modus Operandi Scenario 1: If the suspect is an employee of the victim, he would usually have direct or indirect access to the source code. He would steal a copy of the source code and hide it using a virtual or physical storage device. Cyber Crime & Digital Evidence Indian Perspective 2008 Rohas Nagpal. All rights reserved. - 139 - If the suspect is not an employee of the victim, he would hack into the victims servers to steal the source code. Or he would use social engineering to get unauthorised access to the code. He would then contact potential buyers to make the sale.
Scenario 2: If the suspect is an employee of the victim, he would usually have direct or indirect access to the source code. He would steal a copy of the source code and hide it using a virtual or physical storage device. If the suspect is not an employee of the victim, he would hack into the victims servers to steal the source code. Or he would use social engineering to get unauthorised access to the code. He would then modify the source code (either himself or in association with other programmers) and launch his own software.
Case Study 02: Software Piracy Many people do not consider software piracy to be theft. They would never steal a rupee from someone but would not think twice before using pirated software. There is a common perception amongst normal computer users to not consider software as property. This has led to software piracy becoming a flourishing business.
The scenario Scenario 1: The software pirate sells the pirated software in physical media (usually CD ROMs) through a close network of dealers. Scenario 2: The software pirate sells the pirated software through electronic downloads through websites, bulletin boards, newsgroups, spam emails etc.
The law Scenario 1: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Scenario 2: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act.
Who is liable? Scenario 1: The software pirate as well as the persons who buy the pirated software from him. Scenario 2: The software pirate as well as the persons who buy the pirated software from him.
The motive Scenario 1: Illegal financial gain. Scenario 2: Illegal financial gain.
Modus Operandi Scenario 1: The suspect uses high speed CD duplication equipment to create multiple copies of the pirated software. This software is sold through a network of computer hardware and software vendors. Scenario 2: The suspect registers a domain name using a fictitious name and then hosts his website using a service provider that is based in a country that does not have cyber laws. Such service providers do not divulge client information to law enforcement officials of other countries. Case Study 03: Music Piracy Many people do not consider music piracy to be theft. They would never steal a rupee from someone but would not think twice before buying or using pirated music. There is a common perception amongst people users to not consider music as property. There is a huge business in music piracy. Thousands of unscrupulous businessmen sell pirated music at throw away prices.
The scenario Scenario 1: The music pirate sells the pirated music in physical media (usually CD ROMs) through a lose network of dealers. Scenario 2: The music pirate sells the pirated music through electronic downloads through websites, ulletin boards, newsgroups, spam emails etc.
The law Scenario 1: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act. Scenario 2: Sections 43 and 66 of the Information Technology Act, section 63 of Copyright Act.
Who is liable? Scenario 1: The music pirate as well as the persons who buy the pirated software from him. Scenario 2: The music pirate as well as the persons who buy the pirated software from him.
The motive Scenario 1: Illegal financial gain. Scenario 2: Illegal financial gain.
Modus Operandi Scenario 1: The suspect uses high speed CD duplication equipment to create multiple copies of the pirated music. This music is sold through a network of dealers. Case Study 04: Email Scams Emails are fast emerging as one of the most common methods of communication in the modern world. As can be expected, criminals are also using emails extensively for their illicit activities. The scenario In the first step, the suspect convinces the victim that the victim is going to get a lot of money (by way of winning a lottery or from a corrupt African bureaucrat who wants to transfer his ill gotten gains out of his home country). In order to convince the victim, the suspect sends emails (some having official looking documents as attachments). Once the victim believes this story, the suspect asks for a small fee to cover legal expenses or courier charges. If the victim pays up the money, the suspect stops all contact.
Modus Operandi The suspect creates email accounts in fictitious names and sends out millions of fraudulent emails using powerful spam software.
Reporting Computer Hacking, Fraud and Other Internet-Related Crime The primary federal law enforcement agencies that investigate domestic crime on the Internet include: the Federal Bureau of Investigation (FBI), the United States Secret Service, the United States Immigration and Customs Enforcement (ICE) , the United States Postal Inspection Service, and the Bureau of Alcohol, Tobacco and Firearms (ATF). Each of these agencies has offices conveniently located in every state to which crimes may be reported. Contact information regarding these local offices may be found in local telephone directories. In general, federal crime may be reported to the local office of an appropriate law enforcement agency by a telephone call and by requesting the "Duty Complaint Agent." Each law enforcement agency also has a headquarters (HQ) in Washington, D.C., which has agents who specialize in particular areas. For example, the FBI and the U.S. Secret Service both have headquarters-based specialists in computer intrusion (i.e., computer hacker) cases. To determine some of the federal investigative law enforcement agencies that may be appropriate for reporting certain kinds of crime, please refer to the following table:
Type of Crime
Appropriate
federal
investigative
law
Password trafficking
FBI local office U.S. Secret Service Internet Crime Complaint Center U.S. Secret Service
Internet Crime Complaint Center U.S. Postal Inspection Service Internet Crime Complaint Center FBI local office U.S. Secret Service(Financial Crimes Division)
Child Exploitation and Internet Fraud matters that have a mail nexus Internet fraud and SPAM
if securities fraud or investmentrelated SPAM e-mails, Securities and Exchange complaint) Commission (online
FBI local office FBI local office ATF local office FBI local office ATF local office
Trafficking
in
explosive
or
incendiary
The Internet Crime Complaint Center (IC3) is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). IC3's mission is to serve as a vehicle to receive, develop, and refer criminal complaints regarding the rapidly expanding arena of cyber crime. The IC3 gives the victims of cyber crime a convenient and easy-to-use reporting mechanism that alerts authorities of suspected criminal or civil violations. For law enforcement and regulatory agencies at the federal, state, and local level, IC3 provides a central referral mechanism for complaints involving Internet related crimes. The Internet Crime Complaint Center
Department of Homeland Security's National Infrastructure Coordinating Center: (202) 282-9201 (report incidents relating to national security and infrastructure issues)
U.S. Computer Emergency Readiness Team (U.S. CERT) (online reporting for technician)
National Association of Attorney General's Computer Crime Point of Contact List(all state-related cyber questions)
Reporting Intellectual Property Crime Appropriate federal investigative law enforcement agencies
FBI local field office U.S. Immigration and Customs Enforcement (ICE) Internet Crime Complaint Center
"Reporting Intellectual Property Crime: A Guide for Victims of Counterfeiting, Copyright Infringement, and Theft of Trade Secrets"(PDF)
This guide is contained in Appendix C of the Report of the Department of Justice's Intellectual Property Task Force(October 2004) (PDF). The guide also contains the following checklists for reporting intellectual property crime to law enforcement:
o
The stopfakes.govwebsite provides information to consumers and businesses on intellectual property, including information on how to report trade in fake goods.
o
Coordinating U.S. government domestic and international law enforcement activities involving IPR issues.
Serving as a collection point for intelligence provided by private industry, as well as a channel for law enforcement to obtain
Integrating domestic and international law enforcement intelligence with private industry information relating to IPR crime, and disseminating IPR intelligence for appropriate investigative and tactical use.
4. Always keep back up volumes so that one may not suffer data loss in case ofvirus contamination. 5. Never send your credit card number to any site that is not secured, to guardagainst frauds. 6. Always keep a watch on the sites that your children are accessing to preventany kind of harassment or depravation in children. 7. It is better to use a security program that gives control over the cookiesand send information back to the site as leaving the cookies unguarded mightprove fatal. 8. Web site owners should watch traffic and check any irregularity on the site.Putting hostbased intrusion detection devices on servers may do this. 9. Use of firewalls may be beneficial.
References
1. Moore, R. (2005) "Cybercrime: Investigating High-Technology Computer Crime," Cleveland, Mississippi: Anderson Publishing. 2. Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison-Wesley. p. 392. ISBN 0201707195. 3. Cyber Crime and Digital Evidence Indian Perspective authored by Rohas Nagpal