Cyber Crime
Cyber Crime
Cyber Crime
The usage of internet services in India is growing rapidly. It has given rise to new opportunities
in every field we can think of – be it entertainment, business, sports or education. There are
many pros and cons of some new types of technology which are been invented or discovered.
Similarly the new & profound technology i.e. using of INTERNET Service, has also got some
pros & cons. These cons are named CYBER CRIME, the major disadvantages, illegal activity
committed on the internet by certain individuals because of certain loop-holes. The internet,
along with its advantages, has also exposed us to security risks that come with connecting to a
large network.
Computers today are being misused for illegal activities like e-mail espionage, credit card
fraud, spam, and software piracy and so on, which invade our Privacy and offend our senses.
Criminal activities in the cyberspace are on the rise. Computer crimes are criminal activities,
which involve the use of information technology to gain an illegal or an unauthorized access to
a computer system with intent of damaging, deleting or altering computer data. Computer
crimes also include the activities such as electronic frauds, misuse of devices, identity theft and
data as well as system interference.
Computer crimes may not necessarily involve damage to physical property. They rather includ
e the manipulation of confidential data and critical information. Computer crimes involve
activities of software theft, wherein the privacy of the users is hampered. Today, a large
number of rural areas in India and a couple of other nations in there go
on have increasing access to the internet,
particularly broadband. The challenges of information security have also grown manifold.
Defining cyber crimes, as “acts that are punishable by the Information technology Act”
would be unsuitable as the Indian panel code also covers many cyber crimes, such as email
spoofing and cyber defamation, sending threatening emails etc. A simple yet sturdy definition
of cyber crime would be ‘unlawful acts wherein the computers Is either a tool or a target or
both”.
CHAPTER -2
CYBER CRIMES IN BANKS
Banks Frauds
Computer Fraud
Banks are the most Favorite’s destination of hackers. As AN Roy, commissioner of police,
Mumbai, avers, ‘Hacking a website or writing a programmed that will spread virus on
computer will not earn money. By hacking website of a bank or stealing a credit card Pin, a
street – smart program can, besides enfettering himself, cause a lot of dangerous to banks and
their customers alike.
BANK FRAUDS :
In the contractual term as described in the Indian Contract act, sec 17 suggest that a Fraud
means and includes any of the acts by a party to a counter with his convenience or by his
agents with the intention to deceive another party or his agent or to include him to Banking
frauds is a federal crime in many countries, define as planning to obtain property of money
from any federally financial institution. It is sometimes considered a white collar crime.
The number of bank frauds in India is substantial. It is increasing with the passage of time. All
the major operational areas in baking represent a good opportunity for fraudsters with growing
incidence being reported under deposit, loan and inter-branch accounting transactions,
including remittances.
Fraud by Insiders.
Fraud by Others.
FRAUD BY INSIDERS
Rough trader
Fraudulent loans
Wire transfer fraud
Forged or fraudulent documents
Uninsured deposits
Theft of identity
Demand draft fraud
1. Rogue traders
A rogue trader is a trader at a financial institution who engages in unauthorized trading to
recoup the loss he incurred in earlier trades. Out of fear and desperation, he manipulates the
internal controls to circumvent detection to buy more time.
Unfortunately, unauthorized trading activities invariably produce more losses due to time
constraints; most rogue traders are discovered at an early stage with losses ranging from $1
million to $100 million, but a very few working out of institutions with extremely lax
controls were not discovered until the loss had reached well over a billion dollars. The size of
the loss is a reflection of the laxity in controls instituted at the firm and not the trader's greed.
Contrary to the public perception, rogue traders do not have criminal intent to defraud his
employer to enrich himself; he is merely trying to recoup the loss to make his firm whole and
salvage his employment.
2. Fraudulent loans
One way to remove money from a bank is to take out a loan, a practice bankers would be
more than willing to encourage if they knew that the money will be repaid in full with
interest. A fraudulent loan, however, is one in which the borrower is a business entity
controlled by a dishonest bank officer or an accomplice; the "borrower" then declares
bankruptcy or vanishes and the money is gone. The borrower may even be a non-existent
entity and the loan merely an artifice to conceal a theft of a large sum of money from the
bank. This can also seen as a component within mortgage fraud (Bell, 2010)
5. Uninsured deposits
A bank soliciting public deposits may be uninsured or not licensed to operate at all. The
objective is usually to solicit for deposits to this uninsured "bank", although some may also
sell stock representing ownership of the "bank". Sometimes the names appear very official or
very similar to those of legitimate banks.
Regular DD. Since they are insiders, they know the coding and punching of a demand draft.
Such fraudulent demand drafts are usually drawn payable at a distant city without debiting an
Account. The draft is cashed at the payable branch. The fraud is discovered only when the
bank's head office does the branch-wise reconciliation, which normally take six months, by
which time the money is gone.
FRAUDS BY OUTSIDERS
1. Stolen cheques:
Fraudsters may seek access to facilities such as mailrooms, post offices, offices of a tax
authority, a corporate payroll or a social or veterans' benefit office, which process cheques in
large numbers. The fraudsters then may open bank accounts under assumed names and
Deposit the cheques, which they may first alter in order to appear legitimate, so that they can
subsequently withdraw unauthorized funds.
2. Cheque kiting :
Cheque kiting exploits a system in which, when a cheque is deposited to a bank account, the
money is made available immediately even though it is not removed from the account on
which the cheque is drawn until the cheque actually clears.
4. Accounting frauds :
In order to hide serious financial problems, some businesses have been known to use
fraudulent bookkeeping to overstate sales and income, inflate the worth of the company's
assets, or state a profit when the company is operating at a loss. These tampered records are
then used to seek investment in the company's bond or security issues or to make fraudulent
loan applications in a final attempt to obtain more money to delay the inevitable collapse
.Examples of accounting frauds: Enron and worldcom and Ocala Funding. These companies
"cooked the books" in order to appear as though they had profits each quarter, when in fact
they were deeply in debt.
Hart in his work "The Concept of Law" said that 'human beings are vulnerable so rule of law
is required to protect them'. By applying this to the cyberspace we may say that computers
are vulnerable so rule of law is required to protect and safeguard them against cyber crime.
The reasons for the vulnerability of computers may be said to be:
2. Easy to access:-
The problems encountered in guarding a computer system from unauthorized access are that
there is every possibility of unauthorized access not due to human error but due to the
complex technology. By secretly implanted a logic bomb, key loggers that can steal access
codes, advanced voice recorders; retina imagers etc. that can fool biometric systems and
bypass firewalls can be utilized to get past many security systems.
3. Complex-
The computers work on operating systems and these operating systems in turn are composed
of millions of lines of code. The human mind is fallible and it is not possible that there might
not be a lapse at any stage. The cyber criminals take advantage of these lacunas and penetrate
into the computer system using often more sophisticated means than originally anticipated by
the systems engineers.
4. Negligence:-
 Negligence is very closely connected with human conduct. It is therefore very probable
that while protecting the computer system there might be any negligence, which in turn
provides a cyber criminal to gain access and control over the computer system. This
negligence is usually a property of under resourced IT security provisions and the
improvement of security barriers within software packages and network structures could lead
to improved security. Banks should work on improving awareness of the different threats that
currently exist, including e-mail fraud, phishing and malware.
ATM frauds
The traditional and ancient society was devoid of any monetary instruments and the entire
exchange of goods and merchandise was managed by the “barter system”. The use of monetary
instruments as a unit of exchange replaced the barter system and money in various
denominations was used as the sole purchasing power.
The traditional monetary instruments from a paper and metal based currency to“plastic money”
are in the form of credit cards, debit cards, etc. This has resulted in the increasing use of ATM
all over the world. The use of ATM is not only safe but is also convenient. This safety and
convenience, unfortunately, has an evil side as well that do not originate from the use of plastic
money rather by the misuse of the same. This evil side is reflected in the form of
That is a global problem. The use of plastic money is increasing day by day for payment of
shopping bills, electricity bills, school fees, phone bills, insurance premium, travelling bills
and even petrol bills. The world at large is struggling to increase the convenience and safety
on the one hand and to reduce it misuse.
ATM and Debit Card Fraud
ATM fraud is on the rise, Law enforcement officials say, because thrives are becoming more
and more sophisticated. Criminal have become virus clever a finding new ways to access
your funds so consumer needs to pay careful attention to their bank statements in ceases
there’re an authorized withdrawals because it’s more likely that someone has access to your
bank account information.
Methods used by criminals to gain entry to your money accounts include hacking into bank
database, phishing scams and unsolicited email the birching of retailer computer system And
card skimming device placemen ATM machines and gas pupas. There isn’t a lot you can do
About thieves gaining illegal entry into computer system and data base containing your
Financial information besides vigilance and reporting unusual activity but some odd the
methods criminals use of Greek into your bank account are directed right at the customer. I
many cases people are handling crook the keys to their accounts. Knowing something about
the methods used might save consume millions of dollar a year.
Researchers say they have discovered a fundamental weakness in the system that banks use to
keep debit card pin codes undermine the entire debit card system. Using the methods outlined
by the researchers, a hacker could siphon of Thousands of PIN codes and compromises
hundred of banks. Criminals could them print phony debit cards and simultaneously
withdraw vast amounts of cash using ATM’s around the world.
Rarely does the transmission go directly to a customer bank. Instead, it is handed off several
times on a banking network run by several third parties. Each time a Bank passes the data
along, it goes through a switch that contains the hardware. Security modules and the PIN
block is unscrambled and then descrambled. It is at these intermediate points where hackers
could trick the machines into sensational PINs.