SlideShare a Scribd company logo
1 of 32
CONTENTS
• Definition
• First Occurrence of cyber crime
• Evolution of cyber crimes
• Categories of Cyber Crime
• Types of Cyber Crime
• Target of cyber crime
• Cyber Security
• Safety tips to avoid Cyber Crime
• Concluding remarks
Cyberspace is the electronic medium
of computer networks in which
online communication takes place.
Cyber Crime refers to all activities
done with criminal intent in
cyberspace.
 The Computer as a Target
 The computer as a weapon
Categories of cyber crime
• Computer as a target
• Computer used as a target in which we use
computer to attack other computers.
E.g ,hack someone computer ,virus launching
and worm attack
• Computer as a weapon
• Computer used a weapon means using
computer to commit real crime of world
• pornography, cyber terrorism and credit card
fraud.
Target Of Cyber Crime
• Cyber crimes against persons.
• Cyber crimes against property.
• Cyber crimes against government
• Cyber crimes against society.
CYBER CRIMES AGAINST PERSONS
Harassment via E-Mails
Hacking
E-Mail bombing
Assault by Threat
CYBER CRIMES AGAINST PROPERTY
Cyber Vandalism
Transmitting Virus
Thefts data ,records ,
files etc.
Cyber crimes against government
large-scale disruption of computer
networks, and use computer in terrorism
activities
Examples of Cyber Terrorism
• Hacking into computer systems.
• Introducing viruses to vulnerable
networks.
• Website Defacing.
• Terroristic threats made via e-mail.
History of cyber crime
• Internet origin in 1969 with USA government
experiment .
• 1st cyber crime is spam email took place in
1976 when it was sent out over the Arpanet
(Advanced Research Projects Agency
Network).
• 2nd cyber-crime occurs in 1982 when virus
installed in Apple computer
Evolution of cyber crime
Cyber Threat Evolution
Virus
Breaking
Web Sites
Malicious
Code
(Melissa)
Advanced Worm /
Trojan (I LOVE
YOU)
Identity Theft
(Phishing)
Organised Crime
Data Theft, DoS /
DDoS
1995 2000 2003-04 2005-06 2007-081977
Evolution of cyber threat
• 1969 internet origin and within
next 7 year a 1st cyber crime occur
• 1st cyber-crime that was spam email
that was sent in 1976
• top 3 countries that is most popular
in spam email crime are involved is
USA ,UK ,INDIA
• 2nd cyber-crime occurs in
1982 when a virus installed in
apple computer
• In 1993 1st website developed
and then internet used become
friendly
• 1996 website was hacked
• In 2000 coding started
through which we can apply
code and password to all kind
of data
• 2001 code cracking started
• Advanced worm launched in
2003
• Phishing crime started in
2005.
• Child Pornography
• Virus Dissemination
• Computer Vandalism
• Cyberterrorism
• Software Piracy
• Credit Card Fraud
• Mobile Hacking
Different Types of Cybercrimes
Cyber crimes
Hacking
Information
Theft
E-mail
bombing
Salami
attacks
Phishing
Trojan
attacks
Web jacking
• Email bombing
It refers to sending large numbers of mail
to the victim, which may be an individual
or a company by ultimately resulting into
crashing.
• Trojan attacks /Trojan horse
In software field this means an
unauthorized program, which passively
gains control over another’s computer by
representing itself as an authorized
program. The most common form of
installing a Trojan is through e-mail.
• Web jacking
This term is derived from the term hi
jacking. In these kinds of offences the
hacker gains access and control over the
website of another. He may even
manipulate or change the information of
the website. This may be done for
fulfilling political objectives or for
• Virus Attacks
Viruses are programs that attach themselves
to a computer or a file and then circulate
themselves to other files and to other
computers on a network. They usually affect
the data on a computer, either by altering or
deleting it.
Worm Attacks
Worms unlike viruses do not need the host to
attach themselves to. They merely make
functional copies of themselves and do this
repeatedly till they eat up all the available
space on the computer’s memory.
– Salami attacks
This kind of crime is normally prevalent in
the financial institutions or for the purpose of
committing financial crimes. An important
feature of this type of offence is that the
alteration is so small that it would normally
go unnoticed.
• Phishing
Unsolicited emails by
customers of Financial
Institutions, requesting them to
enter their Username,
Password or other personal
information to access their
Account for some reason..
Spamming
Electronic spamming is the use
of electronic messaging
systems to send unsolicited
bulk messages (spam),
VIRUS DISSEMINATION
• Malicious software that attaches
itself to other software. (virus,
worms, Trojan Horse, web jacking,
e-mail bombing etc.)
HACKING
• Hacking in simple terms means an illegal
intrusion into a computer system and/or
network.
COMPUTER VANDALISM
• Damaging or destroying data rather
than stealing.
• Transmitting virus
SOFTWARE PIRACY
• Theft of software through the illegal
copying of genuine programs.
Use of Internet based attacks
in terrorist activities.
Theft of software through the illegal copying of
genuine programs.
Distribution of products intended to pass for the
original.
 Cyber security is a branch of computer security
specifically related to the Internet.
 It's objective is to establish rules and measure to use
against attacks over the Internet.
1.Install OS/Software Updates
2.Run Anti-virus Software
3. Prevent Identity Theft
5. Avoid Spyware/Adware
7. Back up Important Files
6. Turn on Personal Firewalls
4. Protect Passwords
An Instance of Cyber terrorism
 Ahmedabad Bomb Blast(26-07-08)
o A mail with id alarbi_gujrat@
yahoo.com was being sent by a group of
Terrorists.
o Person named Kenneth Haywood’s
unsecured WIFI router in his house was
being misused by terrorists.
o 3 more mails were sent after the blast
with the same misuse of unsecured WIFI
routers.
aashir980@gmail.com

More Related Content

What's hot (20)

Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Indian it act 2000
Indian it act 2000Indian it act 2000
Indian it act 2000
 
Different Types of Phishing Attacks
Different Types of Phishing AttacksDifferent Types of Phishing Attacks
Different Types of Phishing Attacks
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Phishing and hacking
Phishing and hackingPhishing and hacking
Phishing and hacking
 
Cyber Crime and Security
Cyber Crime and SecurityCyber Crime and Security
Cyber Crime and Security
 
Identity theft
Identity theftIdentity theft
Identity theft
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
State of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and SolutionsState of Cyber Crime in Banking Sector Today: Threats and Solutions
State of Cyber Crime in Banking Sector Today: Threats and Solutions
 
cyber crime
cyber crimecyber crime
cyber crime
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
Final cyber crime and security
Final cyber crime and securityFinal cyber crime and security
Final cyber crime and security
 
Phising a Threat to Network Security
Phising a Threat to Network SecurityPhising a Threat to Network Security
Phising a Threat to Network Security
 
Cyber crime and Security
Cyber crime and SecurityCyber crime and Security
Cyber crime and Security
 
Internet Fraud
Internet FraudInternet Fraud
Internet Fraud
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Research paper on cyber security.
Research paper on cyber security.Research paper on cyber security.
Research paper on cyber security.
 

Similar to Cyber crime (20)

cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crime and security 1
Cyber crime and security 1Cyber crime and security 1
Cyber crime and security 1
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Introduction to cybercrime
Introduction to cybercrimeIntroduction to cybercrime
Introduction to cybercrime
 
Cybercrimes
CybercrimesCybercrimes
Cybercrimes
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)Cyber crime-140128140443-phpapp02 (1)
Cyber crime-140128140443-phpapp02 (1)
 
Ppt on cyber security
Ppt on cyber securityPpt on cyber security
Ppt on cyber security
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
CYBER CRIME AND SECURITY
CYBER CRIME AND SECURITYCYBER CRIME AND SECURITY
CYBER CRIME AND SECURITY
 
pravallika chowdary
pravallika chowdarypravallika chowdary
pravallika chowdary
 
Cyper crime
Cyper crimeCyper crime
Cyper crime
 
Cyber crime
Cyber  crimeCyber  crime
Cyber crime
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Cyber crimes
Cyber crimesCyber crimes
Cyber crimes
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxcallscotland1987
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Association for Project Management
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Cyber crime

  • 1.
  • 2. CONTENTS • Definition • First Occurrence of cyber crime • Evolution of cyber crimes • Categories of Cyber Crime • Types of Cyber Crime • Target of cyber crime • Cyber Security • Safety tips to avoid Cyber Crime • Concluding remarks
  • 3. Cyberspace is the electronic medium of computer networks in which online communication takes place. Cyber Crime refers to all activities done with criminal intent in cyberspace.
  • 4.  The Computer as a Target  The computer as a weapon
  • 5. Categories of cyber crime • Computer as a target • Computer used as a target in which we use computer to attack other computers. E.g ,hack someone computer ,virus launching and worm attack • Computer as a weapon • Computer used a weapon means using computer to commit real crime of world • pornography, cyber terrorism and credit card fraud.
  • 6. Target Of Cyber Crime • Cyber crimes against persons. • Cyber crimes against property. • Cyber crimes against government • Cyber crimes against society.
  • 7. CYBER CRIMES AGAINST PERSONS Harassment via E-Mails Hacking E-Mail bombing Assault by Threat
  • 8. CYBER CRIMES AGAINST PROPERTY Cyber Vandalism Transmitting Virus Thefts data ,records , files etc.
  • 9. Cyber crimes against government large-scale disruption of computer networks, and use computer in terrorism activities Examples of Cyber Terrorism • Hacking into computer systems. • Introducing viruses to vulnerable networks. • Website Defacing. • Terroristic threats made via e-mail.
  • 10. History of cyber crime • Internet origin in 1969 with USA government experiment . • 1st cyber crime is spam email took place in 1976 when it was sent out over the Arpanet (Advanced Research Projects Agency Network). • 2nd cyber-crime occurs in 1982 when virus installed in Apple computer
  • 12. Cyber Threat Evolution Virus Breaking Web Sites Malicious Code (Melissa) Advanced Worm / Trojan (I LOVE YOU) Identity Theft (Phishing) Organised Crime Data Theft, DoS / DDoS 1995 2000 2003-04 2005-06 2007-081977
  • 13. Evolution of cyber threat • 1969 internet origin and within next 7 year a 1st cyber crime occur • 1st cyber-crime that was spam email that was sent in 1976 • top 3 countries that is most popular in spam email crime are involved is USA ,UK ,INDIA
  • 14. • 2nd cyber-crime occurs in 1982 when a virus installed in apple computer • In 1993 1st website developed and then internet used become friendly • 1996 website was hacked
  • 15. • In 2000 coding started through which we can apply code and password to all kind of data • 2001 code cracking started
  • 16. • Advanced worm launched in 2003 • Phishing crime started in 2005.
  • 17. • Child Pornography • Virus Dissemination • Computer Vandalism • Cyberterrorism • Software Piracy • Credit Card Fraud • Mobile Hacking
  • 18. Different Types of Cybercrimes Cyber crimes Hacking Information Theft E-mail bombing Salami attacks Phishing Trojan attacks Web jacking
  • 19. • Email bombing It refers to sending large numbers of mail to the victim, which may be an individual or a company by ultimately resulting into crashing. • Trojan attacks /Trojan horse In software field this means an unauthorized program, which passively gains control over another’s computer by representing itself as an authorized program. The most common form of installing a Trojan is through e-mail. • Web jacking This term is derived from the term hi jacking. In these kinds of offences the hacker gains access and control over the website of another. He may even manipulate or change the information of the website. This may be done for fulfilling political objectives or for
  • 20. • Virus Attacks Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worm Attacks Worms unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on the computer’s memory. – Salami attacks This kind of crime is normally prevalent in the financial institutions or for the purpose of committing financial crimes. An important feature of this type of offence is that the alteration is so small that it would normally go unnoticed.
  • 21. • Phishing Unsolicited emails by customers of Financial Institutions, requesting them to enter their Username, Password or other personal information to access their Account for some reason.. Spamming Electronic spamming is the use of electronic messaging systems to send unsolicited bulk messages (spam),
  • 22. VIRUS DISSEMINATION • Malicious software that attaches itself to other software. (virus, worms, Trojan Horse, web jacking, e-mail bombing etc.)
  • 23. HACKING • Hacking in simple terms means an illegal intrusion into a computer system and/or network.
  • 24. COMPUTER VANDALISM • Damaging or destroying data rather than stealing. • Transmitting virus
  • 25. SOFTWARE PIRACY • Theft of software through the illegal copying of genuine programs.
  • 26. Use of Internet based attacks in terrorist activities.
  • 27. Theft of software through the illegal copying of genuine programs. Distribution of products intended to pass for the original.
  • 28.
  • 29.  Cyber security is a branch of computer security specifically related to the Internet.  It's objective is to establish rules and measure to use against attacks over the Internet.
  • 30. 1.Install OS/Software Updates 2.Run Anti-virus Software 3. Prevent Identity Theft 5. Avoid Spyware/Adware 7. Back up Important Files 6. Turn on Personal Firewalls 4. Protect Passwords
  • 31. An Instance of Cyber terrorism  Ahmedabad Bomb Blast(26-07-08) o A mail with id alarbi_gujrat@ yahoo.com was being sent by a group of Terrorists. o Person named Kenneth Haywood’s unsecured WIFI router in his house was being misused by terrorists. o 3 more mails were sent after the blast with the same misuse of unsecured WIFI routers.