Lecture 22-Lecture 23 PDF
Lecture 22-Lecture 23 PDF
11.1 Introduction
h rough Chapters 1–9, readers are exposed to various categories of cybercrimes, the tools and techniques used by cybercriminals as well as
the forensics and legal aspects involved. We learned about the psychological and ethical dimensions and organizational implications in terms
of cybersecurity (Chapter 10).
In Section 1.5 of Chapter 1, we presented classifications of cybercrime and explained the crimes under each category. Chapters 2–5
provide detailed discussion on cybercrimes – cyberstalking and harassment (Chapter 2); Vishing and Smishing (Chapter 3); and
Phishing and Spear Phishing (Chapter 5). For the illustrations/case studies on digital forensics investigations, the background and
reference chapters are Chapters 8 and 9. For the reasons of confidentiality and privacy, real names (individuals and/or organizations) are masked
in some of the illustrations. h ough the names are masked, the situations are real. If the hypothetical names match with actual names of any living or
dead person, it is purely a coincidence. A number of cases/illustrations are based on the information released in the public domain; those URLs are
mentioned. Neither authors nor the publisher is responsible for false/inaccurate information posted on those public weblinks.
Cybercrime knows no geographical boundaries! Figure 11.1 illustrates this point effectively. Criminals, the means for the crimes and
the impacted victims can be anywhere on the globe! In most cases, however,
Offender/
crim inal
Open w ireless
network E-Mail service (no formal
registration)
Tracing challenges
Anonymous communication
service
15 “Justice” vs. “Justice”: Software Developer Arrested for Launching Website DoS (Denial-of- service Chapters 1 and 4
Attacks attack)
16 CAN-SPAM Act Violation through E-Mail Stock Fraud SPAM, Wire fraud Chapters 1, 5 and 6
22 Killers take Tips from “26/11 Attack” to Use VOIP Cyberterrorism using VOIP, E- Chapters 1 and 7
Mail forensics
23 Robertson Brothers Caught for Selling Pirated Software IPR theft, software piracy Chapters 1 and 9
Figure 11.2
| (source: http://sunnytalkstech.blogspot.com/2007/09/mpsc-website-defaced.html 22 July 2010).
Maharashtra state website hacked.
investigators off their trail. For those who are not familiar with the term “red herring,” it refers to the tactic of diverting attention away from an item of
significance.
h e State Government website contained detailed information about government departments, circulars, reports and several other topics. IT experts, who were
assigned to work on restoration of the website, told Arab News that they feared that the hackers may have destroyed all of the website’s contents. h e worrisome
part was that according to a senior official from the State Government’s IT department, the official website has been affected by viruses on several occasions in the
past, but was never hacked. h e official added that the website had no firewall. However, state officials denied there being any data loss or any serious damage to the
website. h e officials saidthat the hacker could only manage to damage the homepage.
Point to note here is that the website was hacked for the second time in the past two weeks, the fourth time since July 2007. h e previous attack took place
on 5 September 2007. h is incidence of repeated attack on the website underscores the need for security measures being in place (intrusion detection system –
IDS, intrusion prevention system – IPS and firewalls).
this apparently minor sounding “find-and-replace” cyberprank was terrible. Many children who visited the popular website believed what the contents of the website
suggested. h ese unfortunate children did not realize what would be in their fate. h ey followed the instructions to try playing with piranhas, which they bought from
pet shops and were very seriously injured!
was located in a corner of her bedroom. She had the habit of never powering off her computer. Unknown to her, the Trojan would activate her web camera and
microphone even when the Internet was switched off. A year later she realized that hundreds of her “private” pictures were posted on pornographic sites around the world!
Her fiancé broke the engagement and the young lady was thrown into suicidal depression.
of the total of 302 cases in the said period. Similarly, a total of 41 incidents – 38 under IPC crime and 3 under IT Act – were reported in Chhattisgarh for
cyberfrauds and 75 persons – 72 under IPC crime and 3 under IT Act – were arrested. A total of 59 people were also arrested in Andhra Pradesh, 36 in
Punjab, 16 in Andaman and Nicobar Island and 4 in Delhi in connection with cheating-related incidents in 2007. h e amount lost to cyberfrauds during April
2007 and March 2008 were ` 5.58 crore (` 5,58,00,000) and 374 people were arrested in this connection.
This example breaks the misconception that BPOs in India are not covered under the Information Technology Act and Amendments thereof.
BPOs in India, irrespective whether captive/independent/subsidiary, irrespective whether inbound/ outbound, are covered under the Indian IT Act.
Indian BPO organizations must understand this: As per Indian IT Act, every business process outsourcing (BPO) organization is an “INTERMEDIARY” –
Section 1 (2w) of the Act defines “Intermediary.” Indian BPOs must take cognizance of Sections 43A (Compensation for failure to protect data), 67C (Preservation
and retention of information by intermediaries), 69B (Power to authorize to monitor and collect traffic data or information through any computer resource for cyber
security), 70B (Indian Computer Emergency Response Team to serve as national agency for incident response), 72A (Punishment for disclosure of information in breach of
lawful contract), 79 (Exemption from liability of intermediary in certain cases) and 85 (Offences by companies) of the Indian IT Act.
11.2.14 Example 14: Man Goes Behind Bars for Computer Fraud Offense
Here is another example similar to the previous one (Example 13). h is example shows the hazards of not monitoring remote access permissions and the
consequences of perhaps too much faith placed in the “insiders” with a naive belief that the “insiders” would never bring harm to their organizations (remember the
discussion in Chapter 9). h e ill use of administrator account and password also comes to the fore. h ere are tremendous learning implications for organizational
information security practices. Noteworthy is the nature of punishment given to the guilty thereby creating an opportunity for remorse and also to morally guide
others to avoid his wrong-doing. Read on for further details on this case.
Jeffrey H. Sloman, US Acting Attorney for the Southern District of Florida, and Jonathan
I. Solomon, Special Agent in Charge (from FBI, Miami Field Office) announced that defendant, Lesmany Nunez, on 14 July 2009, was sentenced by Chief US
District Judge Federico A. Moreno to 12 months and 1 day imprisonment after pleading guilty to computer fraud, in violation of Title 18, United States Code, Section
1030(a)(5)(A)(ii). Upon his release from prison, Nunez was ordered to serve 3 years of supervised release, with a special condition that he performs 100 hours of
community service by lecturing young people on the implications of hacking into other people’s computers and networks. Nunez was also ordered to pay $31,560 in
restitution.
As per the facts revealed during in-court statements, Nunez, aged 30, was a former computer support technician at Quantum Technology Partners (QTP),
located in Miami-Dade County. QTP provides ser- vices such as data storage, E-Mail communication and scheduling for their client companies. Late Saturday night,
Nunez remotely accessed QTP’s network without authorization, using an administrator account and password. He first changed the passwords of all of the IT
system administrators and then he shut down almost all of the QTP servers. What is more, Nunez also deleted files. Had he not done that, it would have been
possible to re-install the data from backup tapes much easily and in less time. As a result of Nunez’s malformed acts, QTP and their clients could not perform their
normal business functions for a number of days, suffering a tremendous business loss.
As a result of the unauthorized access to the system and the deletion of data, QTP suffered over $30,000 in damages. h is included the cost of responding to the
offense; conducting a damage assessment; restoring the data, system and information to their previous condition; and other costs incurred due to the interruption of
network services. h rough forensics investigations, Nunez was identified as the perpetrator. Investigators found that the activity on QTP’s computer could be traced to
his home network. Additional evidence was also found subsequently when they performed a search of his computer.
Source: www.cybercrime.gov; posted on 14 July 2009.
11.2.15 Example 15: “Justice” vs. “Justice” – Software Developer Arrested for Launching Website Attacks
Denial-of-service attack (DoS) was mentioned in Chapters 1 and 2. It is explained in Chapter 4 (Section 4.9). Hacking and website defacement were addressed
in Section 1.5.11 of Chapter 1. Screen shots of hacked websites were presented in Figs. 1.6–1.10. h is real-life example shows the crime by a young software
engineer who launched a series of “denial-of-service attacks” on various websites. It shows what misled/ confused youth can do and in turn, how they become
cybercriminals by embracing false motives. It is a reflection of rapidly changing values in our society. Forensics comes the fore in the example.
Bruce Raisley, aged 47, was a software developer from Monaca, Pennsylvania, when he was charged with the offense of computer fraud and abuse. He quietly
surrendered to the FBI on 1 July 2009. More specifically, Bruce was charged with the unauthorized access of protected computers with the intention of causing denial-of-service
and/or losses to the websites. A number of websites were impacted – among them were, RollingStone.com and the website of Rick A. Ross Institute of New
Jersey (Rick Ross Institute), based in Hudson County, NJ, who run the Internet archive service “for the study of destructive cults, controversial groups and
movement” and “Perverted Justice,” a Portland, Oregon-based organization (operated by X. E.). Perverted Justice is an organization that seeks to identify and
expose pedophiles and sexual predators targeting minors.
Around 2004, Bruce had volunteered for “Perverted Justice.” Perverted-Justice.com. mentioned before, is a loosely organized group of computer gamers,
students and the occasional well-meaning but misguided “reactionary” who claimed that their primary purpose was to bring about the complete destruction of
the lives of anyone they believe is guilty of chatting with one of their “baiters.” h eir baiters troll Internet chat rooms pretending to be young teen-aged
girls in the hopes of entrapping men into sexually suggestive conversations. Once targeted, members of “Perverted Justice” organization search the Internet for
all avail- able information to publicly identify the “target,” along with complete information about the target – the family, target’s employer, friends, associates,
neighbors, etc. Next, they launch a brutal harassment campaign against anyone listed on their site via phone calls, Internet messages, E-Mails, neighborhood
flyers, etc.
Another impacted organization was Corrupted-Justice.com – a civil rights advocacy organization. It is a group of like-minded people who are dedicated to
bringing about an end, using legal means, to the harass- ment and terrorism being perpetrated by the vigilante group. In this case, host of attacks were mounted
on Corrupted Justice, an organization whose stated purpose is claimed to educate the public on the actions of various purported cybervigilante groups,
including perverted Justice. In year 2006 or around that time, Bruce had become a member of “Corrupted Justice,” after becoming disenchanted with Perverted
Justice!
According to the criminal complaints received, in September 2006 and July 2007, Radar Magazine and the Rolling Stone published two separate articles
(“Strange Bedfellows” and “To Catch a Predator”: h e New American Witch Hunt for Dangerous Pedophiles). Both articles presented positive and negative
views on the activities conducted by “Perverted Justice” and its volunteers. h e articles described what was termed as “questionable tactics” by Perverted Justice to
silence critics. One of these tactics was an episode between X.E. and Bruce. In or about 2007, Strange Bedfellows was reprinted on numerous websites.
Around 25 September 2007, the Rick Ross Institute experienced a distributed denial-of-Service (DDoS) attack. One of the attacking computers was found
to be that of the Academic and Research Network of Slovenia (ARNES). Upon examination, they found a malicious program on their network.
Around 20 November 2007, the Slovenian Computer Emergency Response Team (SI-CERT) further determined that the DDOS program downloaded
instructions from two locations, dosdragon.com and n9zle.com. h ese locations instructed the program to repeatedly target the victim websites.
Victim Rolling Stone was subjected to multiple DDOS attacks directed specifically at the webpage which hosted “ h e New American Witch Hunt.” During
the height of the DDOS attacks, the page requests for the article escalated from a few requests per day to millions of page requests per day, causing the
web- site to experience significant slowdown. On 7 March 2008, the US Computer Emergency Response Team (US-CERT) confirmed SI-CERT ’s findings.
On 16 January 2008 and 8 February 2008, Internet Service Provide records showed that Bruce controlled both command and control systems.
“Corrupted Justice” was the victim of a similar attack on 25 July 2007. As a result of this particular attack, their website was shut down for 4 days. h ey were
attacked again on or about 2 November 2007 and on or about 10 March 2008, resulting in additional 7 days without service. As per the complaint lodged,
Bruce had contacted Corrupted Justice to show off that he had again taken down their servers. h e complaint also states that Bruce told Corrupted Justice
that he “unleashed a virus that could never be stopped,” that [Corrupted Justice] could “kiss goodbye to their website because nothing could protect their
servers against this attack.” During a search of his home on 27 March 2008, Bruce admitted to contacting both Rick Ross Institute and Corrupted Justice, asking
them to take the articles off from their websites. Additionally, Bruce
stated that he wrote the programs on a memory stick – it was seized by FBI as part of the search. Bruce also admitted that he used these programs to attack
the Perverted Justice, Corrupted Justice and Rick Ross Institute websites. A forensics review of the seized electronic media confirmed that it contained copies of
programs used in conjunction with the DDoS attack.
h is case was prosecuted in the District of New Jersey. Bruce was scheduled for an initial appearance on 1 July 2009 before the Honorable Patty Schwartz, US
Magistrate. Upon being convicted, Bruce received a maximum of up to 10 years imprisonment along with the fine of $250,000. As would be known to readers/
students well-versed with law, criminal complaint is merely an accusation. Despite this accusation, every defendant is presumed innocent unless and until
proven guilty beyond a reasonable doubt. Special Agent in charge of this case stated that in this situation, this type of “cyberbullying” (the term was introduced
in Chapter 2, Box 2.8) was used as a way to silence the media and deny them of their constitutional rights to the freedom of press. h e Agent further stated that
“cyberbullying” is not acceptable. He thanked all the team members involved for a job well done. h is real-life example shows that technology works both ways
and the criminal will get caught.
Source: http://www.cybercrime.gov; posted on 1 July 2009.
11.2.16 Example 16: CAN-SPAM Act Violation through E-Mail Stock Fraud
Spamming is explained in Chapter 1 (Section 1.5 and Box 1.5). Anti-Spam Laws in Canada are explained in Section 6.2.3 of Chapter 6. Here is a real life
happening on that. h is example involves the CAN-SPAM Act – for those who are not aware of it, refer to the links about this Act in Ref. #30, Additional Useful
Web References, Further Reading. h e full form of CAN-SPAM Act is “Controlling the Assault of Non-Solicited Pornography And Marketing Act of 2003.” Five
individuals pleaded guilty on 23 June 2009 in the federal court in Detroit for their involvement in a wide-ranging international stock fraud scheme that had the
illegal use of bulk commercial E-Mails or “spamming.” Considering the advanced age of one of the fraudsters in this example, we can say that just like
cybercrime knows no national boundaries, criminals seem to have no heed to their age!
Alan M. Ralsky, aged 64, and Scott K. Bradley, aged 38; both pleaded guilty to conspiring to commit wire fraud, mail fraud and of violating the CAN-
SPAM Act. h is act defines a “commercial electronic mail message” as “any electronic mail message the primary purpose of which is the commercial
advertisement or promotion of a commercial product or service (including content on an Internet website operated for a commercial purpose).” It exempts
“transactional or relationship messages.” Ralsky and Bradley also pleaded guilty to “wire fraud” and “money laundering” apart from the violation of CAN-
SPAM Act. Under the terms of his plea agreement, Ralsky acknowledged facing up to 87 months in prison and a $1 million fine under the federal sentencing
guidelines while Bradley acknowledged facing up to 78 months in prison and a
$1 million fine under the federal sentencing guidelines.
For some time, Alan Ralsky was the world’s most notorious illegal spammer. In fact he was the self- proclaimed “Godfather of Spam.” Today Ralsky, his son-
in-law Scott Bradley and three of their co-conspirators stand convicted for their roles in running an international spamming operation that sent billions of illegal
E-Mail advertisements to pump up Chinese “penny” stocks and then reap profits by causing trades in these same stocks while others bought at the inflated prices.
Using the Internet to manipulate the stock market through Spam E-Mail campaigns is a serious crime. h is case shows that federal law enforcement has the
both the capability and the will to successfully investigate, prosecute and punish such cybercrimes.
h e CAN-SPAM Act was passed by Congress in 2003 to address Spam E-Mails. h e Act has certain provisions (criminal provisions) to prohibit
falsification of certain information used in E-Mail transmission. John S. Bown, 45, of Fresno, California, pleaded guilty to conspiracy to commit wire fraud, mail
fraud and
to violate the CAN-SPAM Act. He also pleaded guilty to conspiring to commit computer fraud by creating a Botnet and violating the CAN-SPAM Act. A Botnet
is a network of computers that have been infected by malicious software. Under the terms of his plea agreement, Bown acknowledges he is facing up to 63 months
in prison and a $75,000 fine under the federal sentencing guidelines.
Yet another person, William C. Neil, aged 46, of Fresno, admitted that he had conspired to violate the CAN-SPAM Act. Under the terms of his plea
agreement, Neil acknowledged facing up to 37 months in prison and a $30,000 fine under the federal sentencing guidelines. James E. Fite, aged 36, of Culver
City, California, pleaded guilty to conspiracy to commit wire fraud, mail fraud and to violate the CAN-SPAM Act. Apart from this, he also pleaded guilty of
making false statements to FBI agents. Under the terms of his plea agreement, Fite acknowledged that he was to face up to 2 years in prison and a $30,000 fine
under the federal sentencing guidelines. Finally, Spam King Alan Ralsky got 4 years in jail.
Assistant Attorney General said “We will not allow criminals to use E-Mail as a conduit for fraud. h is prosecution, the Department’s largest to date under the
CAN-SPAM Act, underscores our strong and stead- fast commitment to ridding our financial markets and cyberspace of E-Fraudsters looking to prey on inno-
cent victims.” Special Agent in Charge mentioned that cybercrime investigations are a top priority of the FBI who is known to aggressively investigate those
individuals who exploit computers for committing vari- ous crimes. In today’s aggressive international business world, there will always be a select few who
illegally manipulate the system for their own profit. According to Special Agent in Charge, Internal Revenue Service Criminal Investigation (IRS-CI), they, that is,
IRS CI, diligently follows the money frauds and assists in the seizure and penalty for any illegal gains from their illegal business practices.
According to court records, from January 2004 through September 2005, Ralsky, Bradley, Judy Devenow, Bown, William Neil, Anki Neil, James Bragg, Fite,
Peter Severa, Wai John Hui, Francis Tribble, and others engaged in a related set of conspiracies designed to use Spam E-Mails to manipulate thinly traded
stocks and profit by trading in those stocks once their share prices increased after recipients of the Spam E-Mails traded in the stocks being promoted. h e
defendants were indicted in the Eastern District of Michigan in December 2007.
Ralsky served as the Chief Executive Officer and primary deal maker for the Spam E-Mail operation. Bradley, Ralsky’s son-in-law, served as the Chief
Financial Officer and Director of operations for the Spam E-Mail operation. Bown, who was Chief Executive Officer of an Internet services company called
“GDC Layer One,” served as the Chief Technology Officer for the Spam E-Mail operation. William Neil, who was an employee of GDC Layer One, built and
maintained a computer network used to transmit Spam E-Mails as part of the conspiracy. Fite was a contract spammer who hired others to send Spam E-Mails as
part of the conspiracy. Devenow, Hui and Tribble previously pleaded guilty for their roles in the conspiracy.
Devenow managed the Spam E-Mail operation and also sent Spam E-Mails. Tribble took charge of planning and directing the stock trading to further the
conspiracy. Hui, CEO of China World Trade, served as the lead dealmaker to represent the companies whose stocks were being promoted via Spam E-Mail.
Court documents revealed that many of the Spam E-Mails promoted thinly traded “pink sheet” stocks for US companies owned and controlled by individuals in
Hong Kong and China. h e Spam E-Mails contained significantly false and deceptive information or omissions. h ose E-Mails were created and sent using some
peculiar software programs to make it difficult to trace them back to the conspirators. According to the indictment, the conspirators used wire
communications, the US mail and common carriers to further their frauds. h e conspirators also participated in money laundering involving millions of
dollars generated by their manipulative stock trading.
h e defendants were indicted to have used several illegal methods in order to maximize the amount of Spam that evaded Spam-blocking devices and tricked
recipients into opening, and acting on, the advertise- ments in the Spam. h ese included using falsified “headers” in the E-Mail messages, using proxy computers to
relay the Spam, using falsely registered domain names to send the Spam, and also making misrepresentations in the advertising content of some of the underlying E-
Mail messages. An accusation is merely an indictment and defendants are presumed innocent until and unless proven culpable at trial beyond a reasonable doubt.
h e charges arose after a 3-year investigation, led by the FBI with assistance from the US Postal Inspection Service and IRS-CI exposed a sophisticated and
widespread spamming operation. h e case is being pros- ecuted by US Attorney Terrence Berg and Trial Attorneys h omas Dukes and Mona Sedky Spivack of
the Criminal Division’s Computer Crime and Intellectual Property Section.
Source: www.usdoj.gov
17. Example 17: Business Liability through Misuse of Organization’s Information Processing Assets
In Chapter 2, Box 2.7 explains how criminals can create false E-Mail IDs. h is example is a real-life scenario of that. In one bank, a management trainee of the bank
was engaged with a girl working in the same bank. h ey were to get married in due course of time. During the post-engagement period, the couple exchanged many
E-Mails; however, the boy and the girl used to write the mails during work hours using the company computers. Unfortunately, after some time the relationship
went sore and the two broke up. h e girl created fraudulent E-Mail IDs such as “indianbarassociations.” She used that ID to send E-Mails to the boy’s foreign clients.
h e girl used the bank’s computer for sending these mails. h e mails had negative publicity about the bank. h e boy lost a large number of clients assigned in his
portfolio. Moreover, those clients sued the bank. h e bank was held accountable for the E-Mails sent using the bank’s system. h is small example is a lesson –
organizations must have well-established computing guidelines (this is addressed in Chapter 9 – Section 9.8) and strict vigilance on how organizations computing
and communication facilities are being used.
It so happened that a computer user in China obtained the source code of a popular game “Lineage I” from an unprotected website. h is proprietary code
was then sold to several people in 2004. One of those people set up a website, www.l2extreme.com, to offer the “Lineage” game at a discount. After noticing this,
the South Korean company that owned the Lineage source code sent legal warnings. However, in spite of those warnings, the suspect did not shut down the
site. He rented powerful servers – enough to accom- modate 4,000 simultaneous gamers and solicited donations from users to help defray the costs. h e loss in
potential revenues for the South Korean company was estimated at $750,000 a month. h e US FBI arrested the suspect and the website was shut down.
Even after this action, the source code stealing of this kind did not stop. In 2007, a prominent Korean Newspaper “Chsun IIbo” had reported that the source
code for upcoming MMORPG Lineage III may have been stolen and sold to an undisclosed “major Japanese game company.” It was suspected that this could be
an “insider” job. h e Seoul Metropolitan Police investigated seven former NCSoft employees in conjunction with this crime. NCSoft estimated a damage value for
the lost data at over 1 billion dollars US. h is sub- stantial figure was supposedly a projection based off the combined worth of the Lineage IP and its current
subscriber value. At present, Lineage has over 1.5 million subscribers worldwide (mainly in Asia) and its current sales is over 1.6 billion dollars (1.5 trillion
Korean won) spread across both titles.
“Insider attacks” (they could be by disgruntled employees or even by un-instigated employees with malicious minds) are worse because, when exposed,
they can considerably dampen employee spirit, as happened in this case too. Morale at the impacted company NCsoft was in its worst stage even before word of
the theft hit mainstream news. h e company experienced serious turnover since the sacking of one of its senior game developers for “poor leadership skills.”
Since the layoff, most of the 90-person development team has, likewise, decided to follow their chief elsewhere.
Police reported that the data theft may actually have occurred during a job interview! In the interview, one or more ex-NCsoft programmers demonstrated
the code for external review. Roots of the problem may actually go all the way back to when program designs for Lineage III were reputedly leaked via E-Mail and/
or portable disk.
story. Like many hackers, he wants recognition for his hacking skills even as he values anonymity to remain un-detected. h e New York Times found him
through another well-known hacker who belongs to a hacker group and who vouched that Xiao Chung is too skilled. On condition that he should not be
identified by his real name, Xiao agreed to allow a reporter to visit his modest home in a poor town outside Changsha, and watch him work.
It is quite eerie – just a few quick keystrokes and Xiao Chung proudly brings up a screen displaying his latest victims. He says with a quite a wicked smile,
“Here’s a list of the people who’ve been infected with my Trojan Horse, and they don’t even know what’s gone wrong with them!” You may think that Xiao
may be earning a lot from his craft; but that is not true. For all the seemingly terrific power in his hand to “affect” so many people, the hacker has a modest living
- he works from a dingy apartment on the outskirts of this city in central China (Fig. 11.3).
Although Xiao Chung’s technical cyberattack claims cannot be verified, he is happy to demonstrate his hacking skills. He met a journalist at a cafe one
night in February 2010, and invited him to his home, where he showed how he hacked into the website of a Chinese company. Once the website popped up
on his screen, he created additional pages and typed the word “hacked” onto one of them. Further, he goes on to explain that it is an online “trapdoor”
which he created just over a week ago, and has already lured 2,000 people from China and overseas – people who clicked on something they should not
have, inad- vertently spreading a virus that allows him to take control of their computers and steal numerous bank account passwords. It is hard to believe
that Xiao Chung, a soft-spoken college graduate in his early 20s, is a cyberthief! He operates secretly and illegally, as part of a community of hackers who
exploit flaws in computer software to break into websites, steal valuable data and sell it for a profit. Recall the Zero Day attacks mentioned in Chapter 2,
Box 2.10).
According to Internet security experts, China has legions of hackers just like Xiao Chung, and the experts say that they are the culprits for an escalating number
of global attacks launched to steal credit card numbers, commit corporate espionage and even wage online warfare on other nations. In some cases, these attacks
have
been traced back to China. In addition to independent criminals like Xiao Chung, computer security specialists say there are so-called patriotic hackers (i.e., “Hacktivists”)
who focus their attacks on political targets.
h e People’s Liberation Army has got intelligence-oriented hackers. It is said that there are also more shady groups who are believed to work with the State
Government. It is said that in China, as well as in parts of Eastern Europe and Russia, computer hacking has become something of a “national sport,” and a lucrative one.
It is being done with all the professional aplomb; for example, there are hacker conferences, hacker training academies and magazines with names like Hacker X
Files and Hacker Defense, which offer tips on how to break into computers or build a Trojan Horse, step by step. Refer to Ref. #5, Additional Useful Web References,
Further Reading.
It is getting easy for hackers; for less than $6, one can even purchase the Hacker’s Penetration Manual. Books on hacking are also sold, to a lesser extent, in the
US and elsewhere. With 380 million web users in China and a sizzling online gaming market, analysts say it is no wonder that Chinese youths are so skilled at
hacking. Many Chinese hackers are interviewed to get them inducted into a loosely defined commu- nity of computer devotees working independently. h ey are
also selling services to corporations and even the military! Because it is difficult to trace hackers, exactly who is behind any specific attack and how and where they
operate remains to a large extent a mystery. And that is just the way Xiao Chung, the young Chinese hacker, wants it.
Xiao Chung’s story is like most young hackers who fall in love with hacking in college. Xiao, too, took to hacking after friends showed him how to break into
computer systems during his first year in the college. After earning a degree in engineering, he took a job with a government agency, largely to please his parents, just
to show them a “regular” job. However, hacking remains his “passion”! At the end of his work at the “regular” job, Xiao turns to his passion: hacking. He admits
that he does it for the lure of money. Many hackers make a lot of money, he says, and he seems to be charting his own path. Exactly how much he has earned, he
would not like to disclose. But he does admit to selling Malicious Code to others, and boasts of being able to tap into people’s bank accounts by remotely operating
their computers.
Xiao is consumed by the challenges it presents. He reads hacker magazines, swaps information with a small circle of hackers and writes Malicious Code. He
uses Trojan Horses to sneak into people’s computers and infect them, so he can take control. “Most hackers are lazy,” he says, smugly seated in front of a computer in his
spare bedroom, overlooking a dilapidated apartment complex. According to Xiao “Only a few of us can actually write code. h at’s the hard part.”
Computer hacking is illegal in China. Last year, Beijing revised and stiffened a law that makes hacking a crime, with punishments of up to 7 years in prison.
Xiao Chung does not seem bothered by the law, largely because he thinks it is not strictly enforced. However, he is clever enough to cover his tracks. Financial
incentives motivate many young Chinese hackers like Xiao Chung. Scott J. Henderson, author of “ h e Dark Visitor: Inside the World of Chinese Hackers,” had
spent years tracking Chinese hackers, sometimes with financial help from the US Government. One Chinese hacker who broke into a US Government site
later lectured on hacking at a leading university and worked for China’s security ministry. According to Henderson, recently many Chinese hackers have been
seeking to profit from stealing data from big corporations or teaching others how to hijack computers. h ey make a lot of money selling viruses and Trojan Horses to
infect other people’s computers. h ey also break into online gaming accounts and sell the virtual characters. It’s big money for these hackers.
“Hack-star” Xiao Chung lives with his parents, and his bedroom has little more than a desktop computer, a high-speed Internet connection and a large closet. h e
walls are bare. Most of his socializing occurs online; his “after regular job” hours range from about 6:30 p.m. to 12:30 a.m., starting every evening by perusing
computer websites like cnBeta.com. Xiao values his freedom and that is one strong reason he puts forth for not working for any major Chinese technology
company. He even claims to know details of the
Google attack. “ h at Trojan Horse on Google was created by a foreign hacker,” he says, indicating that the virus was then altered in China. “A few weeks before
Google was hijacked, there was a similar virus. If you opened a particular page on Google, you were infected.” Oddly, Xiao’s parents did not know that he does the
“hack-job” at night. One day, however, he explained the intricacies of computer hacking and stealing data while his mother stood nearby, listening silently. Xiao
and his fellow hackers keep secret their knowledge of certain so-called “zero-day vulnerabilities” – software flaws – for future use. When asked whether hackers
work for the government, or the military, he says “yes.”
11.2.22 Example 22: Killers Take Tips from 26/11 Attack to Use VOIP
h e term “cyberterrorism” was explained in Chapter 1 (Box 1.1 and Section 1.2) and here is a real-life incidence involving cyberterrorism in the countrythat
has just about settled from the shock of 26/11 attacks on Mumbai. h ose attacks revealed the wireless communication technology used by the terrorists. h is
real-life example comes from that background. In Chapter 7, E-Mail forensics is explained – fully aware that electronic mails can be traced, cybercriminals as well
as terrorists adopt a technique whereby they do not send attack-related mail and yet they communicate with their counterparts. h is real-life example showshow
that technique was used.
Investigations in the murder of criminal lawyer Shahid Azmi revealed that the killers had used communication techniques similar to the ones used by
terrorists during the 26/11 terror attacks and the 11/7 train blasts. According to crime branch sources, gangster Bharat Nepali, who had hired men to eliminate
Azmi, had used Voice over Internet Protocol (VoIP) system to communicate with the killers. During the investigations it was revealed that at least six calls
were made, before and after Azmi’s murder, using VoIP service from Hong Kong, Los Angeles, London and Israel. h e usage of VoIP for criminal activity came
to light during the 26/11 terror attacks in Mumbai. Handlers of the terrorists, who attacked the city on the night of 26 November 2008, were found to be using
VoIP service to communicate with the 10 men who laid siege at various locations in the city.
Use of draft E-Mail system was another communication technique used by Azmi’s killers. h e same technique was used by terrorists in the 11/7 train
blasts that rocked Mumbai city in 2006. According to a crime branch official, a person from Bangkok attached photographs of Azmi in a mail and saved it
as a draft in an E-Mail account. h e killers, Devendra Jagtap and Hasmukh Solanki, who knew the password of the E-Mail account opened the draft mail and
thus identified Azmi.
Azmi’s killing (on 11 February 2010) had shocked the city’s legal fraternity. It was scary – the three men had barged into Azmi’s Kurla office to shoot him
dead and then they ran away from the scene. Azmi was defence lawyer in the 26/11 trial for Faheem Ansari, who was recently acquitted by the court due to
lack of evidence. h e first round of investigations revealed that it was a contract killing undertaken for ` 1 lakh (` 1,00,000) at the command of Nepali, a former
aide of infamous Chhota Rajan.
Later on crime branch officials detained Devendra Jagtap, Pintu Dagle and Vinod Vichare from Mulund, while the fourth accused, Hasmukh
Solanki, was taken into custody on 9 March 2010. h e police also seized four weapons that were used in the killing, three rounds of live cartridges and
five mobile phones from the group. Of the 10 accused, six, including Nepali, his close aide Vijay Shetty, Santosh Shetty, Rajiv Tiwari and two others,
were absconding. According to Public Prosecutor Kalpana Chavan, Nepali had given contract to kill Azmi because he believed that the lawyer was defending
those who according to him are anti-nationals. h e shooting was part of Nepali’s efforts to establish his suprem- acy in the underworld.
23. Example 23: “Robberson” Brothers Caught for Selling Pirated Software
Investigation of Maurice A. Robberson and his brother h omas Robberson was commenced by BSA (Business Software Alliance).
In early 2002, BSA had received complaints from software publishers and that was the basis for the investigation. After reviewing
the reported websites, BSA made undercover purchases and determined that the software sold was pirated. After this, BSA referred
the case to the Federal Bureau Washington Field Office. h e FBI Field Office conducted independent investigation and subsequently
shut the operation down in October 2005. h e investigation determined that starting in late 2002 the Robberson brothers sold more than
$5 million of counterfeit software products. In addition to running four for-profit websites, the Robberson brothers were also co-
conspirators with Danny Ferrer in the operation of www.BbuysUSusA.com.
It turned out from the investigations that, during the operation of the websites, h omas Robberson grossed more than $150,000 by selling
software with a retail value of nearly $1 million. Maurice Robberson amassed more than $855,000 through sales of software with a retail
value of nearly $5.6 million. In March 2008, Maurice Robberson was sentenced to 36 months in prison, whereas his brother h omas was
sentenced to 30 months. Both were also ordered to undergo an additional 3 years of supervisedrelease and pay restitution.
a Visa and an air ticket. During the correspondence, receipts with fake stamps (as it turned out later) and signatures of the British High Commissioner were
sent to victim. When victim (Arjun) reached the airport, he found that there was no such person waiting for him. h at is when the victim realized that he had
been cheated. Arjun returned to Pune and tried to contact the concerned person but the concerned person never replied to his mails. Arjun then decided to
approach the police.
Inspector (Crime Branch) Solankar said “After receiving the complaint, we started investigating the accounts in which Arjun had deposited the
requested amounts of money. We identified an account in the name Shailendra Soni in the Shivajinagar branch of Axis Bank. We sent a team to Govandi and
laid a trap for him.” After the inquiry, the Police discovered that Soni was asked by someone called “Sharma” for permission to use his account. Police
nabbed Sharma in Mira-Bhayandar. h e investigation revealed that someone hailing from Nigeria asked them to commit the crime. He offered 7 of the
total amount to Sharma. Sharma, in turn, got Soni’s help by offering him a 5 commission. Sharma had met the suspected foreign national several times and
they had been running this racket for many years. Sharma has various cheating crimes registered to his name. h e Police took up the investigation aimed at
finding out other crimes committed by this gang.
11.3 Mini-Cases
In this section, we have provided real-life cases involving cyberpornography, cyberdefamation, Salami attack, Internet time theft, etc. Table 11.2 lists the Mini-
Cases of this section.
Table 11.2 | List of Mini-Cases in Section 11.3
Topic Chapter Cross-
Mini-Case Title No.
Reference
1 Cyberpornography Involving a Juvenile Criminal Cyberpornography Chapters 1 and 2
Indian Cyberdefamation Case of a Young Couple
2 Cyberdefamation, Chapters 1 and 7
spoofed mails with
ulterior motive
3 h e Zyg-Zigler Case Chapter 1
Salami attack, logic
4 Internet Time Stealing bomb
5 NewYork Times Company vs. Sullivan Case of Cyber Cybertheft Chapter 1
Defamation Cyberdefamation
6 Online gambling Chapter 1
h e Indian Case of Online Gambling IPR h e ft,
7 Chapters 1, 9 and 10
An Indian Case of Intellectual Property Crime Cybersquatting
8 h e SlumDog Millionaire Movie Piracy Case Chapters 1, 2, 4 and 9
Malicious Hacking Case – Organ Donation Database IPR theft
9 Chapters 1, 2, 4 and 9
Deleted Hacking of computer
10 network, insider attack
h e Case of Counterfeit Computer Hardware
— (Continued )
his parents were very upset and he felt they were justified in getting upset; after all, Sujata was going to be their daughter-in-law soon. Sudesh told
Sujata that his parents were considering breaking off the engagement. Sujata was shocked obviously, but fortunately, Sudesh was able to convince his
parents and other elders of his house to approach police instead of blindly believing the mails. During investigation, it was revealed that the person
sending those E-Mails was none other than Sujata’s stepfather. Sujata was the main source of income in the family after her mother expired; the father
was a drunkard and had no means of livelihood. Sujata’s father (when he gave in during the police enquiries) admitted that he had sent those E-Mails to
break the engagement. He wanted Sujata to remain with him to continue providing him financial support. He admitted that Sujata’s marriage would have
caused him to lose control of her property of which he was the guardian till she got married. Sujata’s mother had bequeathed her all the propery
through a registered will because she was not sure if the property would be safe in the hand of her chronic alcoholic husband.
Section 49 of the Indian Penal Code is mentioned in reference to cyberdefamation in Chapter 1 (Section 1.5.3). Readers may like to note that
copy of the IPC (Indian Penal Code) is available in Appendix P.
Cyberdefamation is a cognizable offense. Chapter XXI of the Indian Penal Code (IPC) is about DEFAMATION. In Section 499 of Chapter XXI of
IPC, regarding “defamation” there is a mention that “Whoever, by words either spoken or intended to be read, or by signs or by visible
representations, makes or publishes any imputation concerning any person intending to harm, or knowing or having reason to believe that such
imputation will harm, the reputation of such person, is said, except in the cases hereinafter expected, to defame that person.”
h e investigation traced the perpetrators through E-Mail forensics (refer to Section 7.6 of Chapter 7).
Another famous case of cyberdefamation occurred in America. Friends and relatives of a lady were inundated with obscene E-Mail messages
appearing to originate from her account. h ese mails gave the lady a bad name and made her an object of ridicule. h e lady was an activist against
pornography. In reality, a group of people displeased with her views and angry with her for opposing them, had decided to get back at her by using such
underhanded methods. In addition to sending spoofed obscene E-Mails, they also launched websites about her basically meant to malign her character.
the southern US. It is one of the key decisions supporting the freedom of the press. h e actual standard for malice requires that the publisher is aware whether the
statement is false or acts in an irresponsible manner without regard of the truth. h e decision established that for a plaintiff to win a libel ruling against a
newspaper, “actual malice” or “reckless negligence” must be proved on the part of the paper if the statement in question is about a public official or a public figure.
In the case of a private figure, the petitioner must merely prove carelessness. h e background for this case is described below.
On 29 March 1960, the New York Times carried a full-page advertisement titled “Heed h eir Rising Voices,” which solicited funds to defend Martin Luther
King, Jr. against an Alabama perjury indictment. In the advertisement there was description about actions against civil rights protesters and activists – some was
inaccurate and some involved the police force of Montgomery, Alabama. h e inaccurate criticism of the actions by the police was considered as defamation
against Commissioner L.B. Sullivan, whose duties included supervision of the police department. h ough he was not named in the advertisement but he held the
position of commissioner.
Alabama law denied a public officer recovery of punitive damages in a libel action brought on account of a publication concerning their official conduct unless
they first make a written demand for a public retraction and the defendant fails or refuses to comply, so Sullivan sent such a request. h e Times did not publish a
retraction in response to the demand. Instead it wrote a letter stating, among other things, that “we ... are somewhat puzzled as to how you think the statements in
any way reflect on you,” and “you might, if you desire, let us know in what respect you claim that the statements in the advertisement reflect on you.” Sullivan
didn’t respond but instead filed this suit a few days later. He also sued four black ministers mentioned in the ad, specifically Ralph Abernathy, S.S. Seay, Sr., Fred
Shuttlesworth and Joseph Lowery. Sullivan won $500,000 in an Alabama court judgment.
Eventually, h e Times did, however, publish a withdrawal of the advertisement upon the demand of Governor John Patterson of Alabama, who asserted that
the publication charged him with “grave misbe- havior and ... inappropriate actions and omissions as Governor of Alabama and Ex-Officio Chairman of the State
Board of Education of Alabama.” When asked to explain why there had been a retraction for the Governor but not for Sullivan, the Secretary of h e Times
testified: “We did that because we didn’t want anything that was published by h e Times to be a reflection on the State of Alabama and the Governor was, as far as we
could see, the embodiment of the State of Alabama and the proper representative of the State and, furthermore, we had by that time learned more of the actual
facts which the ad purported to recite and, finally, the ad did refer to the action of the State authorities and the Board of Education presumably of which the
Governor is the ex-officio chairman ... .” On the other hand, he testified that he did not think that “any of the language in there referred to Mr. Sullivan.” h e court
decision was decreed as described below.
h ere was the rule of law that was applied by the Alabama courts; however, it was found to be constitutionally deficient. h is was seen in the failure to
provide the safeguards for freedom of speech and of the press that are required by the First and Fourteenth Amendments in a libel action brought by a public official
against critics of his official conduct. h e decision further ruled that under the appropriate safeguards, the evidence presented in this case was not constitutionally
sufficient to support the judgment for Sullivan.
heard about this informal system of transferring money). It is not yet fully known if these sites have any rela- tionship with drug trafficking. Recent Indian case
about cyber lotto is very interesting. Kola Mohan was the man who invented the story of winning the Euro Lottery. He created a website and an E-Mail address on
the Internet with the address “[email protected].” Whenever accessed, the site would declare him as the recipi- ent of the 12.5 million pound. A Telgu newspaper
published this as news after confirmation. Meanwhile, Kola Mohan collected large sums of money from the public as well as from some banks for mobilization of
the deposits in foreign currency. He could have gone on merrily. h e fraud, however, got exposed when a discounted cheque from Kola Mohan with the Andhra
Bank for ` 1.73 million bounced. Kola Mohan had pledged with Andhra Bank the copy of a bond certificate purportedly issued by Midland Bank, Sheffields,
London stating that a term deposit of 12.5 million was held in his name.
Another case: In first week of July 2009, a Ventura County man who obtained Academy Award screeners of “h e Curious Case of Benjamin
Button” and “Australia” pleaded guilty to uploading the films to the Internet. Derek Hawthorne, aged 21, of Moorpark, pleaded guilty to uploading a
copy- righted work being prepared for commercial distribution. He was sentenced by the US District Judge
R. Gary Klausner on 28 September 2009. h e US Secret Service was involved in the investigation of cases running against Moody and Hawthorne.
disgruntled employees do have the potential to cause damage to their organizations. Systems Administrators as professionals possess tremendous amount of
technical knowledge about how computer systems perform and, as this example shows, it can get put to malignant use with their motive to settle their personal
scores!
Source: www.usdoj.gov (12 May 2010).
11. Mini-Case 11: The Chinese Case of Trade Secret Stealing Involving an E-Waste Company
h is case was published in September 2009 by the US Department of Justice. A citizen of the People’s Republic of China was charged in connection with
the scheme devised to steal trade secrets and proprietary information relating to computer systems and software with environmental applications from his New
Jersey employer, Acting US Attorney Ralph J. Marra, Jr., announced. h e indictment charges Yan Zhu, aged 31,
a.k.a. “Wesley ZHU,” a.k.a. “Westerly Zhu,” who resides in Lodi, with conspiracy to steal trade secrets and wire fraud. On the morning of 9 April 2009, FBI
Special Agents arrested Zhu at his residence while he was in the US on a work visa. Later that day, the defendant Zhu made an initial appearance in federal
court in front of US Magistrate Tonianne J. Bongiovanni. h e Magistrate released the defendant Zhu on a $200,000 secured bond. Zhu was later arrested on
the accusation in Federal Court after the case was assigned to a US District Judge.
h e indictment describes a scheme in which Zhu, along with other unindicted co-conspirators, used his employment with a business, which is identified in
the indictment only as “Company A,” to obtain access to the
company’s trade secrets and proprietary and confidential information relating to computer software developed for the Chinese market. According to the charges made
against Zhu, he (i.e., Zhu) worked with Company A as a senior environmental engineer from May 2006 until his termination in July 2008. Company A is a software
development and consulting company with its principal office in Mercer County. h e company is in the business of developing supporting, and implementing software
and computer systems for ecological applications.
While in the services of Company A, Zhu worked on a comprehensive hazardous waste information management system that Company A developed for
the Chinese market. h e purpose of this product was to allow a Company A customer, such as an environmental regulatory agency, as well as entities that interact with
the environmental regulatory agency, such as hazardous waste producers and shippers, to enter, organize and view certain data regarding pollution and hazardous
waste within that agency’s jurisdiction. In addition, it was alleged that Zhu worked on Company Adatabase application that was related to this software system.
h e allegation further stated that Zhu operated his scheme with at least two co-conspirators, identified only as Co-conspirators 1 (CC-1) and 2 (CC-2), both
Chinese nationals residing in China. According to the indictment, CC-1 had been introduced to Company A through Zhu and hired as Company A’s sales repre-
sentative in the Science and Technology High-Tech Zone in Xian City, Shanxi Province, China. Company A rented office space in Xian City. From this office CC-1
represented Company A and hosted the subject soft- ware on his/her own computer system. h e charges filed allege that Zhu, CC-2 and CC-1, were all associated
with a company known only as “Company X,” an environment-related software company in China.
It is further alleged that Zhu and his co-conspirators exploited the trust placed in Zhu by Company Aby stealing Company A’s trade secrets and proprietary
and confidential business information, and exploit- ing an opportunity for Company A to market its product to the Chinese government. h e indictment also
alleges that, as early as January 2008, Zhu began sending Company A’s computer software source code to CC-2 in China. Eventually, the Indictment alleges,
the co-conspirators used this computer source code to develop a modified version of the Mercer County company’s software in China, which was marketed under
the Company X banner. It is further alleged that the co-conspirators took control of the Mercer County company’s office in China, and used that space to
conduct business for Company X. According to the indictment, Zhu was terminated on 17 July 2008, in part because Company A became aware that Zhu had
sent Company A trade secret and confidential and proprietary information to his personal E-Mail account. h e charge of conspiracy to steal trade secrets carries a
maximum penalty of 10 years in prison and a fine of
$250,000 or twice the aggregate loss to the victims or gain to the defendants. Each count of wire fraud carries a maximum penalty of 20 years in prison and a fine of
$250,000 or twice the aggregate loss to the victims or gain to the defendants. Despite the accusation, the defendant is presumed innocent unless proven guilty beyond
a reasonable doubt. Marra credited Special Agents of the FBI’s Trenton Resident Agency, under the direction of Special Agent in Charge Weysan Dun in Newark, with
the investigation leading to the indictment. h e govern- ment was represented by Assistant US Attorney Eric M. Schweiker of the Criminal Division in Trenton.
committed suicide. h is case shows that social networking sites, though popular, can result in someone losing his/her precious life, as this real-life case reveals. h is
case, (a real-life story) was reported in New York Times and posted on 26 November 2008. It is a sad story of the family members and friends of the teenaged
girl who lost her life. She was a victim of social networking. Megan Meier, aged 13, committed suicide in October 2008. Apparently, the suicide was caused by
cruel messages she received on the social networking site “Myspace.” h is incidence, in a way, is also sad reality in a “boyfriend-oriented culture.”
Readers, who have not yet read previous chapters, may like to read about cyberbullying in Box 2.8 of Chapter 2. According to the legal experts in the US,
this was country’s first cyberbullying verdict, in which a Missouri woman was convicted of three misdemeanor charges of computer fraud for her involvement in cre-
ating a phony account on MySpace to trick a teenager, who later committed suicide. h e accused, Ms. Lori Drew went through a 5-day trial. During the trial,
prosecutors portrayed Ms. Lori Drew had worked in col- lusion with her daughter, Sarah, aged 13 at that time, along with Ms. Ashley Grills, a young family
friend and also an employee of Ms. Lori Drew’s magazine coupon business in Dardenne Prairie. h e testimony showed that they “created” a teenage boy, “Josh
Evans,” as an identity on MySpace. h e conspiracy was to make this pseudo character (created on MySpace) to communicate with Sarah’s rival, Megan Meier, who
was also 13 years old then. Megan was known to have a history of depression and suicidal impulses. According to testimony at the trial there were weeks of online
courtship with “Josh.” Megan was distressed one afternoon in October 2006, when she received an E-Mail message from “Josh” saying that “h e world would be a
better place without you.”
Ms. Ashley Grills, who is now 20, testified (under an immunity agreement) that shortly after that message was sent, Megan wrote back, “You’re the kind of boy a
girl would kill herself over.” Totally depressed having such a message from her boyfriend (in reality only a pseudo character on MySpace) Megan hanged herself
that same afternoon in her bedroom. h e jury appeared to reject the government’s contention that Ms. Lori Drew had intended to harm Megan. However, the
convictions signaled the 12-member Jury’s belief that she had, nonetheless, violated federal laws that prohibit gaining access to a computer without
authorization. Readers will recall that in Chapter 1, there is discussion about “unauthorized access to computer” (Sections 1.3–1.5 and Table 1.5). Specifically, the
jury found Ms. Lori Drew culpable of illegally accessing a computer system on three occasions, in reference to the fraudulent postings on MySpace in the name of
“Josh Evans.” h e federal Computer Fraud and Abuse Act was passed in 1986 in the US and has been amended several times since then. According to legal and
computer fraud experts, the application of the law appeared to be expanding with technology and the growth of social networking on the Internet. In general,
prosecutions under the act have been associated with people who are computer systems hackers. Until recently, social networking sites such as MySpace did not
exist. h erefore, this case would be simply another important step in the expanded use of this statute to protect the public from computer crime. Although it was
unclear how severely Ms. Lori Drew would be punished, the jury reduced the charges to misdemeanors from felonies, and no sentencing date was set. According to
computer fraud experts, the conviction was highly significant as it was the first time that a federal statute designed to combat computer crimes was used to
prosecute what were
essentially abuses of a user agreement on a social networking site.
Under federal sentencing guidelines, Ms. Lori Drew could face up to 3 years in prison and $300,000 in fines, even though she had no previous criminal record.
Her lawyer asked for a new trial. While this is a case from another country, it is a lesson for all of us. h is case sends an overwhelming message to users of the
Internet and social networking sites.
11.3.14 Mini-Case 14: State of Tamil Nadu vs. Suhas Katti Case
Cyberdefamation was addressed in Chapter 1 and that is the concept reference in this fairly well-known and a truly landmark case. It is considered to be
India’s First cybercrime conviction. People’s perception is
that conviction takes a very long time in the jurisdiction. However there are exceptions as seen in this case. h is well-known case of Suhas Katti (year 2004) is
available in the public domain. It is noteworthy for the fact that the conviction was achieved successfully within a relatively short time of 7 months from the
date of filing of the FIR (First Information Report). h e case illustrates how the Indian IT was used to file the case. Similar cases have been awaiting judgment
in other states for a much longer time. h is case had a relatively more efficient handling in the sense that this was the first case of the Chennai Cybercrime Cell
going to trial. h erefore, it deserves a special mention.
h is case involves posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also sent to the victim
for information by the accused. However, this was done through a false E-Mail account opened by him in the name of the victim. h e posting of the message
resulted in annoying phone calls to the lady in the belief that she was soliciting.
Based on a complaint made by the victim in February 2004, the Police traced the accused to Mumbai and arrested him within the next few days. h e
accused was a known family friend of the victim and was said to be interested in marrying her. She, however, married another person. Later, the wedding
ended in a divorce, and the accused once again started making contacts with the lady. On her reluctance to marry him, the accused took up the harassment
through the Internet. On 24 March 2004, a charge sheet was filed under Section 67 of IT Act 2000, 469 and 509 IPC before h e Hon’ble Addl. CMM Egmoreby
citing 18 wit- nesses and 34 documents and material objects. Prosecution examined 12 witnesses and complete documents were marked as “Exhibits.”
h e Defense argued that the offending mails would have been given either by ex-husband of the complainant or the complainant herself to implicate
the accused as accused alleged to have turned downthe request of the complainant to marry her.
Further, the Defense Counsel argued that some of the documentary evidence was not sustainable under Section 65B of the Indian Evidence Act.
However, the court relied upon the expert witnesses and other evidence produced before it, including the witnesses of the cybercafe owners and came to the
conclusion that the crime was conclusively proved. h e judgment was submitted in May 2004 as stated below:
“ h e accused is found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused is convicted and is sentenced for the offence to
undergo rigorous imprisonment for 2 years under 469 IPC and to pay fine of Rs. 500/- and for the offence under Section 509 IPC sentenced to undergo 1 year
simple imprisonment and to pay fine of Rs. 500/- and for the offence under Section 67 of IT Act 2000 to undergo rigorous imprisonment for 2 years and to pay
fine of Rs. 4000/-.”
h e accused paid the fine amount and waslodged at Central Prison, Chennai. h is is considered as the first case convicted under Section 67 of ITA 2000 in India.
IMPORTANT NOTE – h e information contained in this case is meant for informational purpose only and is based on material available in public domain. Authors
do not make any claim about its accuracy or authenticity. h e name of the victim is masked to protect identity. h e information provide here is based on the extracts
from the Judgment pronounced in the First Cybercrime Conviction in India.
lobbying against outsourcing of work from the US to other countries; especially to India. Such cases are not uncommon but media likes to focus on them
when it happens in India. It is a case of sourcing engineering, also known as “social engineering.” Some employees gained customer confidence and
obtained their PIN numbers to commit fraud. h ey got these under the disguise of helping the customers out of difficult situ- ations. Highest security
prevails in the call centers in India as they know that they will lose their business. h ere was not as much of breach of security but of sourcing
engineering/social engineering.
As an industry practice in security, the call center employees are checked when they go in and out of the work place. h is is done to ensure that they do
not copy down numbers or any other business confidential information. However, in this case, the employees of the call center must have remembered
these numbers, gone out immediately to a cybercafe and accessed the Citibank accounts of the customers. All accounts were opened at Pune. h e customers
lodged a complaint that the funds from their accounts were transferred to Pune accounts. h is is how the criminals were traced. Police were able to prove
the honesty of the call center and has frozen the accounts where the money was transferred.
h e ISO 27001 standard for information security recommends many controls and one such control is about HR checks. As a best practice, there
should be strict background check of the call center executives. However, even the best of background checks cannot fully eliminate the bad elements from
coming in and breaching security. We must still ensure such checks when a person is hired. h ere is need for a national ID and a national database
where a name can be referred to. In this case first round of investigations did not disclose that the criminals had any criminal history. Customer education
is crucial so that customers are not taken for a ride. Most consumers may feel that banks are guilty of not doing this.
from using the trade name or any other name deceptively similar to NASSCOM. h e court further ordered the defendants not to hold themselves out as being
associates or a part of NASSCOM. For readers not savvy with legal terms – “Ex–parte” means on behalf of only one party, without notice to any other party.
For example, a request for a search warrant is an ex parte proceeding, since the person subject to the search is not notified of the proceeding and is not present at the
hearing.
h e court appointed a commission to conduct a search at the defendants’ premises. Two hard disks of the computers, from which the fraudulent E-Mails were
sent by the defendants to various parties, were taken into custody by the local commissioner appointed by the court. h e offending E- Mails were then down-
loaded from the hard disks and presented as evidence in court. During the progress of the case, it became clear that the defendants, in whose names the
offending E-Mails were sent, were fictitious identities created by an employee on defendants’ instructions, to avoid recognition and legal action.
On discovery of this fraudulent act, the fictitious names were deleted from the array of parties as defendants in the case. Later, the defendants admitted
their criminal acts and the parties settled the matter through the recording of conciliation in the suit proceedings. According to the terms of compromise, the
defendants agreed to pay a sum of ` 1.6 million to the plaintiff as damages for violation of the plaintiff’s trademark rights. h e court also ordered the hard disks
seized from the defendants’ premises to be handed over to the plaintiff who would be the owner of the hard disks.
h is case achieves clear milestones (a) It brings the act of “Phishing” into the ambit of Indian laws even in the absence of specific legislation. (b) It
demonstrates a point – the perception that there is no “damages culture” in India for violation of IP rights is not true. h is case reaffirms Intellectual Property
owners’ faith in the Indian judicial system’s ability and willingness to protect intangible property rights and send a strong message to IP owners that they can do
business in India without sacrificing their IP rights.
defendant is under a duty not to send the aforesaid E-Mails. After the claimant company made a discovery that the said worker of their organization was
possibly involved in the act of sending offensive E-Mails, the claimant terminated the services of the defendant.
After hearing detailed arguments of the lawyer, Honorable Justice J.D. Kapoor of the Delhi High Court passed an ex-parte ad interim injunction
observing that a prima facie case had been made out by the plaintiff. As a result, the Delhi High Court stopped the defendant from sending defamatory
obscene derogatory, humiliating, vulgar and abusive E-Mails either to the plaintiffs or to its associate companies and/or sister concerns all over the world
including their Managing Directors and their Sales and Marketing departments. In addition, Honorable Justice J.D. Kapoor also stopped the defendant from
transmitting, publishing, or causing to be published any information in the physical world as well as in cyberspace which is deprecating or slanderous or
offensive to the plaintiffs.
h e matter was posted for 4 October 2001. h is decree by Delhi High Court has remarkable meaning because this is for the first time that an
Indian Court assumes authority in a matter concern- ing cyberdefamation and grants an ex-parte injunction restraining the defendant from defaming
the plaintiffs by sending derogatory, defamatory, abusive and obscene E-Mails either to the plaintiffs or their subsidiaries.
SBI Cards and Payment Services Private Limited vs. Domain Active Pty. Limited
h is is the case that involved SBI Cards and Payment Services Private Limited vs. Domain Active Pty. Limited. Sbicards.com was ordered by the World Intellectual
Property Organization (WIPO) to be trans- ferred to the Indian Company from an Australian entity, which hijacked the domain name hoping to later sell it for a hefty
sum to the State Bank of India subsidiary. h e panel accepted SBI Card counsels argument that the Australian company was in the business of buying and selling domain
name through its website.
If not, we recommend readers to refer to the said chapter of the book mentioned. To know about Indian Trademark Law, we have provided links in Ref. #71,
Additional Useful Web References, Further Reading. h e various statues dealing with Intellectual Property Laws in India are as follows:
1. Trademarks Act 1999 (see Appendix S).
2. Copyright Act 1957 (see Appendix T).
3. Patents Act 1970 as amended by Patents (Amendments) Act 2005 (see Appendix R).
4. Designs Act 2005.
5. Code of Civil Procedures 1908.
6. Indian Penal Code 1860 (see Appendix P).
7. Geographical Indication of Goods (Registration & Protection) Act 1999.
8. Semiconductor, Integrated Circuit Layout Design Act 2000.
9. Plants Varieties Protection and Farmers’Rights Act 2001.
10. Information Technology Act 2000 (see Appendix O).
From the cybersquatting examples described so far, note the following points:
1 . h e trademark law has been drastically broadened to accommodate domain name disputes. However, in author’s opinion, the trademark law should
not be too widely broadened to confer upon trademark owners the rights that they otherwise are not entitled to. h e tricky question is whether the law will
eventually give large trademark owners property rights in domain names, that is, the ability to exclude others from using them. In deciding how far the
trademark laws should reach, it may become essential to revisit the rationale behind trademark protections. Trademark protection is meant to provide
consumers with exact information about the merchandise and services presented by the mark, and to provide incentives to companies so that they become
interested in investing in their marks and also to enhance quality control. Trademarks, therefore, lower consumer search costs and promote the economic
functioning of the market. “Marks” themselves are not protected, but the law protects the goodwill the marks embody.
2. Allowing exclusive rights in domain names will put off companies from using names that are already used. Conventional financial explanation for trademark
law rests on the premise that there is an countless number of marks available. However, there are only a limited number of domain names available.
3. One more area of concern with such a right is that it would allow trademark owners to preclude others from using not only one but several marks. It is
now a general practice for companies to register all possible domain names they can think of, that contain their company name. For example, Exxon
currently holds the rights of over more than 120 domain names incorporating the word “EXXON.”
4 . h e current law seems to endorse protection of large companies more, that is, those who want rights in every possible variations of their name.
5. From a realistic point of view, the current expansion in law gives trademark owners a significant amount of leverage. For example, often people with
genuine interests in their domain names cannot pay for fighting with trademark owners. Naturally, this will force many to simply turn over their rights in
order to avoid corporate bullying.
Do refer to the “Intellectual Property in the Cyberspace” discussion in Section 10.2 of Chapter 10 – that discussion will provide greater details of IP.
19. Mini-Case 19: Swedish Case of Hacking and Theft of Trade Secrets
Stealing of IPR/trade secrets is one of the major threats to industries and individuals in the modern era. Here is a real-life scenario on that. Two well-known
organizations co-operated with Government for the investigation of this case.
Philip Gabriel Pettersson, a.k.a. Stakkato, aged 21, a Swedish national, was indicted on 17 May 2009 on the grounds of intrusion and trade secret theft
charges. h is was announced by the US Attorney for the Northern District of California and the Justice Department’s Criminal Division.
h e charges included one intrusion attempt and two attempts of trade secret misappropriation involv- ing Cisco Systems Inc. (Cisco), San Jose, CA, a
provider of computer network equipment and producer of Internet routers. As per allegations in the condemnation, Pettersson purposely committed an
intrusion between 12 May 2004 and 13 May 2004 into the computer system and network of Cisco. It was alleged that during the suspected intrusion, some Cisco
Inter-network operating system code was misappropriated. h e accusation also included two intrusion attempts involving the National Aeronautics and Space
Administration (NASA), including computers at the Ames Research Center and the NASA Advanced Supercomputing Division, located at Moffett Field,
CA. h e accusation alleges Pettersson committed these intrusions on 19 May 2004, 20 May 2004 and 22 October 2004.
Cisco and NASA cooperated in the government’s investigation. Following the incident, Cisco reported that they could not believe that any customer information,
partner information or financial systems were affected. h e Department of Justice worked in cooperation with the Swedish authorities on this case. From legal per-
spective, it is to be noted that an indictment is merely an accusation. All defendants are presumed innocent until proven guilty at trial beyond a reasonable doubt.
h e maximum penalty for each charge of intrusion and theft of trade secrets is 10 years in prison, a 3-year term of supervisedrelease, and a fine of $250,000.
h e prosecution was the result of an investigation by the FBI; US Secret Service; NASA Office of Inspector General, Office of Investigations,
Computer Crimes Division; and numerous additional federal agencies. A senior officer at the Criminal Division’s Computer Crime and Intellectual
Property Section (CCIPS) prosecuted the case with assistance from other officers. CCIPS Senior Counsel also assisted in the prosecution. h e Criminal
Division’s Office of International Affairs assisted on international coordination issues in the case.
Source: www.cybercrime.gov
video gaming machine computer programs, placing counterfeit labels bearing IGT’s registered trademark on the computer programs, installing the counterfeit computer
programs in IGT gaming machine cabinets and then sell the counterfeit computer programs and gaming machines through their respective companies. h ey did all this without
the permission of the trademark and copyright owner, IGT.
h e charge against Cabrera and Mantilla indicated that they were involved with a conspiracy of traffick- ing in counterfeit goods, trafficking in counterfeit labels and
criminal copyright infringement. If convicted of all charges, each defendant faces a maximum of up to 45 years in prison and $5.25 million in fines. h e accusation also
contains 13 penalty allegations that require the defendants, if convicted, to forfeit any and all counterfeit items and to forfeit up to $5 million in proceeds from their alleged
criminal activity.
h e case was investigated by the FBI and prosecuted by Assistant US Attorney of the US Attorney’s Office for the District of Nevada and Trial Attorney of the Criminal
Division’s Computer Crime and Intellectual Property Section (CCIPS). Significant assistance came in this case from the Central Criminal Police Department of the
Latvian Ministry of Interior; Latvia’s Office of the Prosecutor General, International Cooperation Division; and Senior Trial Attorney Deborah Gaynus of the Criminal
Division’s Office of International Affairs. CCIPS Trial Attorney also assisted with the prosecution. IGT also provided assistance in this matter. An indictment is merely a
formal charge by the grand jury. As legal professionals know, a defendant is assumed to be innocent unless and until proven guilty in a court of law.
Source: www.usdoj.gov
11.3.21 Mini-Case 21: Indian E-Mail Spoofing Case
h is is a case registered by the Indian police as the first case of cyberstalking in Delhi. To maintain confiden- tiality and privacy of the entities involved, we have masked their
names. Mrs. Joshi received almost 40 calls in 3 days mostly at odd hours from as far away as Kuwait, Cochin, Bombay and Ahmedabad. h ese calls created havoc in the
personal life destroying mental peace of Mrs. Joshi. She decided to register a complaint with Delhi Police. A person was using her ID to chat over the Internet at the website
www.mirc.com, mostly in the Delhi channel for 4 consecutive days. h e person was chatting on the Internet, using her name and giving her address, talking in profane
language. h e same person was also deliberately giving her telephone number to other chatters encouraging them to call Mrs. Joshi at odd hours.
While “cyberstalking” does not have a standard definition, it means threatening, unwarranted behavior or advances directed by one person toward another person
using Internet and other forms of online communication channels as medium.
h is ends all the mini-cases of this section and now we move on to illustrations of financial crimes in the banking domain including the credit card frauds.
so, DarkMarket’s 2,000 members could never meet JiLsi in real life – he truly was a “shadow operator”! Somehow, DarkMarket was finicky about banning
“rippers” who would deceive other criminals. Honor among thieves was paramount. Subramaniam was one of the top administrators. He stored his operating
system on memory sticks. But when one of his memory sticks was stolen, it cost him £100,000 in losses. It also resulted in compromising the site’s security.
With this mishap, Subramaniam was downgraded to merely a reviewer. Surveillance officers trapped him logging on to the website when JiLsi was unaware that
the fellow criminal MasterSplyntr whom he trusted was, in fact, an FBI agent called Keith Mularski.
Total cases
Reported
Investigated
Brought to court
Sentenced
and/or
MasterCard
is a member of is a member of
Acquirer
Issuer
may or may not
provides be the same as issues cards to
processing
services to
Cardholder
Merchant uses card to
buy from
Figure 11.5
| Source: Author’s presentation in PCI-DSS awareness sessions for industry professionals.
Entities involved in credit card transactions.
punishment was handed: 30 years in prison, a fine of $1,000,000 or both – and that is what the law could provide as a maximum sentence. As per
Federal Sentencing Guidelines, the actual sentence imposed was based on the gravity of the offense and the previous criminal history, if any, of the accused.
Many agencies were involved in inquiry of Max’s illegal activities – Computer Crime and Intellectual Property Section (CCIPS) of the Department of
Justice; the Federal Bureau of Investigation; the Vancouver Police Department, Vancouver, Canada; the Newport Beach Police Department, Newport Beach,
California; and the Orange County Sheriff’s Department, Orange County, California; and the US Attorney’s Office for the Northern District of California.
If we wonder what happens to the “stolen” credit card data, the following “dark market” price information below is shocking as well as an eye opener. One
can well imagine how this information must be rapidly exchanging hands in the global black market (this information is as current at the time of writing
this; authors by no means have any validation responsibility here):
1. Data Dumps from magnetic stripes on batches of 10 cards are sold.
2. Standard cards: $50. Gold/platinum: $80. Corporate: $180.
3. Card verification values information needed for online transactions: $3–$10 depending on quality.
4. Complete information/change of billing information needed for opening or taking over account details – $150 for account with $10,000 balance;
$300 for one with $20,000 balance.
5. Skimmer device to read card data – up to $7,000.
6. Bank log-ins 2 of available balance.
7. Hire of Botnet Software robots used in Spam attacks – $50 a day (“Botnets” are explained in Section
2.6 of Chapter 2).
8. Credit card images: Both sides of card – $30 each.
As known to law professionals, an indictment is only a charge and is not an evidence of guilt. A defendant is presumed innocent and is entitled to a fair trial at
which the government must prove guilt beyond a reason- able doubt.
Source: www.cybercrime.gov
Application Lost/ fraud Special Merchant ATM ROC Altered Skimming Multiple card
stolen frauds collusion fraud pumping imprints
fraud
Hit and Trapping Validity
run date
Operational Card Terminal
fraud number
take-over
Carding
Fake Signature fraud
ATMs panel
Phishing
Shoulder Magnetic
surfing* strip
Figure 11.6
| *Shoulder surfing is explained in Chapter 2 (Section 2.3.1).
Credit card fraud classification.
Original connection
Victim ’s
Web
m achine MITM
server
connection
Attacker’s machine
presented for payment, the card holder disputes the charge by claiming that the transactions are fradulent and refuses to pay. Meanwhile, the merchant has
already recovered his sale due amount. Because the card holder refuses to pay the Issuer (typically the bank), it is the Issuer who has to bear the loss. h e
problem is that it is difficult to “prove” such collusion. Until and unless the same card holder keeps appearing in many such cases of frauds, tracing becomes
difficult. It is said that the card issuers assume a certain small percent of their overall transactions volume, as “bad debt” and levy it across their base of card
holders (which runs in thousands and thousands). h ey present it in the charge statement as a line item.
Carding Frauds
It was mentioned that “carding” involves acquisition, utilization and sale of credit card account information. When a credit card is stolen, the thief does not know
whether the card is valid. So the thief wants to find out about the status of the card (active, cancelled, etc.). From the thief ’s perspective, there are many possibilities
– the card holder may have immediately reported the loss of the card or the card limit may have been com- pletely used up. In such cases, the card is of no use
to the thief. h e smart thief uses the Internet to ascertain if the stolen card is still “good” for use. h e thief could use the stolen card to make a small amount
purchase using the online purchase facility on the Internet. However, that would involve the “shipping address” and that would expose the thief. So the smart
thief uses the stolen card for making a charity donation! h at way,
the thief does not have to waste time in searching items on the product catalogues on the sale portal of any online seller. h e thief makes
the donation amount relatively small so that the card limit is not used up. He does this for one more reason – a large amount would make
the transaction immediately noticeable. Carding fraud is also used when the credit card is obtained fraudulently through card “skimming”
(explained next) or when a Phishing attack is done on the card.
This number is printed on your Master Card & Visa cards in the signature area of the back of the card. (it is the last 3
digits AFTER the credit card number in the signature area of the card).
You can find your four-digit card verification number on the front of
your American Express credit card above the credit card number on
either the right or the left side of your credit card.
Figure 11.9
| Source: http://www.sti.nasa.gov/cvv.html
Credit card security code.
does not have the capability to record the data on the magnetic strip of the card. Now comes the criminal act – the fraudulent merchant or the fraudster
working at the Merchant’s PoS (Point of Sale) terminal, swipes your credit card twice – of course without you realizing it; even if you notice it and bring it
to his notice, he will give you one explanation or the other why he swiped your credit card more than once. Now, the card is swiped once across
bank-provided swiping equipment and second time on the fraudster’s terminal. h e security code (CVV, CCV, etc.) which is encoded on the magnetic
strip on the back side of the credit card (see the top right object in Fig. 11.9), and is decoded on the terminal, gets recorded on the fraudster’s terminal.
He now gets the genuine card information (card holder name, card number, date of validity) along with the security code! His job is done and he is ready
to use that information for creating fake credit card (in Ref. #2, Video Clips, Further Reading, we have provided a link to the video clip that explains
this). See the credit card skimming video clip provided there.
It may so happen that in some restaurants, a waiter could have a collusion with a fraudster gang – he could hide the skimmer device in his socks. As
you stand near the payment counter for your credit card to be swiped, after taking the card from you, the waiter may pretend to drop it. h en waiter will
bend down to pick up the card – on its way up, the card would get swiped across the skimmer device in his socks and you may never even realize it as this
may happen in less than minute! In another variant of this scenario, the skimmer device (with a slit type – see Fig. 11.8) could be located next to the
actual card swiping device authorized to the merchant by the Acquirer. If you are not carefully watching, the fraudster colluding with the merchant (he
could very well be the PoS staff of the merchant) after swiping the card with the actual credit card swip- ing machine (see Fig. 11.10), will swipe your
credit card also through the skimmer device to read the confi- dential card details (card number, date of validity and most important the credit card
security code – CCV, CVV, etc.) to his benefit! You can watch one such video clip demo by visiting the link mentioned in Ref. #2, Video Clips, Further
Reading.