Cyber Crime at a Glance
The U.S. Department of Justice recognizes three types of cybercrimes: those that use the computer as a weapon, those that use the computer as an accessory to a crime, and those that make the computer a target of a crime.
Cyber-enabled crime is different from Cyber Crime
The hidden part of the Internet where criminals act undetected is called the ‘Darknet’.
The Cyber Crime Police station shall have the jurisdiction in respect of all the offences committed under the Information Technology Act and laws relating to Intellectual property rights and other related offences under any law for the time being in force, COMMITTED IN THE COURSE OF THE SAME TRANSACTION.
As per the amendments to the IT Act 2000 , the minimum rank of investigation of cyber crimes is POLICE INSPECTOR and any jurisdictional police station can register and investigate.
Nature of cases reported at Cyber Crime Police Station:-
- Identity Theft
- Creation of fake e-mail account
- Creation of fake Facebook account
- Hacking of e-mail account / Password etc.
- ATM Fraud
- Credit Card Fraud
- Online Banking Fraud
- Website defacement
- Cyber Pornography:- Posting of nude photograph / Obscene posting
- Child Pornography
- Nigerian Fraud / Lottery Fraud / Advance Fee Fraud/ 419 Fraud
- Cyber Stalking
- Cyber Defamation
- When you visit a website, that particular website site will usually place a cookie [a small script programme] on the user’s computer for tracking purposes. The hackers use cookie technology to steal information that can reveal user`s financial information.
- The hacker penetrates your computer getting into the root file or directory. This controls all the permissions of the device.
- Cyber intelligence, analysis and Digital forensics are being developed for detecting crime.
The mail and the Internet are major routes for fraud against merchants who sell and ship products, as well Internet merchants who provide online services. In this, fraudster presents stolen card information by indirect means, whether by mail, telephone or over the Internet to merchant site and orders the delivery of goods of lower value to avoid suspicion.
• Skimming is the theft of credit card information used in an otherwise legitimate transaction. It is typically an “inside job” by a dishonest employee of a legitimate merchant, and can be as simple as photocopying of receipts. Common scenarios for skimming are restaurants or bars where the skimmer has possession of the victim’s credit card out of their immediate view. The skimmer will typically use a small keypad to unobtrusively transcribe the 3 or 4 digit Card Security Code which is not present on the magnetic strip.
• Carding is a term used for a process to verify the validity of stolen card data. The thief presents the card information on a website that has real-time transaction processing. If the card is processed successfully, the thief knows that the card is still good. The specific item purchased is immaterial, and the thief does not need to purchase an actual product; a Web site subscription or charitable donation would be sufficient. The purchase is usually for a small monetary amount, both to avoid using the card’s credit limit, and also to avoid attracting the bank’s attention.
When credit and financial information is stolen online by a hacker and used in a criminal manner.
Auction Fraud — Romania
Counterfeit Cashier’s Check
Credit Card Fraud
Parcel Courier Email Scheme
Escrow Services Fraud
Nigerian Letter or “419”
Third Party Receiver of Funds
- Illegal Gambling
- Theft of Personal Information and Money
- Storing Illegal Information
- Child pornography
- Digital security breach
- Online black market site
- Ransomware attack