Crimes that use computer networks or devices to advance other ends include: Fraud and identity theft (although this increasingly uses malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime) Information warfare. AND Money laundering is the process of creating the appearance that large amounts of money obtained
1. Cyber Crime & Money
Laundering Group no. 5
( Roll no.21 to 25)
2. What is Cyber Crime?
• U s e of a computer/internet to do something that would be a crime in any case.
•
Dictionary definition is
“Criminal activity or a crime that involves the Internet, a
computer system or computer technology; identity theft, phishing
and other kinds of cyber crime”
•CREDIT
CARDFRAUD
•IDENTITY
THEFT
•S PA M •VIRUSES
3. HISTORY OF CYBER CRIME
• The first recorded cyber crime took place in 1820.
• That is not surprising considering the fact that the abacus, which is thought
to be the earliest from of a computer, has been around since 3500 B.C.
• In India, Japan and China, the era of modern computer, however, began with
the analytical engine of Charles Babbage.
• The first spam email took place in 1976 when it was sent out over the
ARPANT.
• The first virus was installed on an Apple computer in 1982 when a high
school student, Rich skrenta, developed the EIK Cloner.
4. Categories of Cyber Crime
The computer as a target
• using a computer to attacks
other computer, e.g. Hacking,
virus/worms attacks, Dos
attack etc.
The computer as a weapon
• using a computer to commit
real world crime e.g. cyber
terrorism, credit card fraud
and pornography etc.
6. CYBER CRIMES THREATENS NATIONAL SECURITY IN INDIA
Likewise Union home minister Rajnath Singh said that the rising level of cyber crime is an
indication of enormous threat to national security. On Google’s social networking site
Facebook, Twitter have been perplexing authorities . Fan clubs of Underworld Dons like
Dawood Ibrahim and Chhota Shakeel and other wanted underworld dons are also doing
the rounds on twitter. There is huge potential for damage to national security through
cyber attacks. The internet is a means for money bounding and funding terrorist attacks in
an organized manner.
7. CYBER SECURITY
• Cyber Security
• Privacy Policy
• Keep Software Up to Date
• DISABLE REMOTE CONNECTIVITY
8. ADVANTAGES OF CYBER SECURITY
• The cyber security will defend us from critical attacks.
• It helps us to browse the site, website.
• Internet Security process all the incoming and outgoing
data on your computer.
• It will defend us from hacks and virus.
• Application of cyber security used in our PC needs update
every week
10. CYBER LAW OF INDIA
•Information
Technology
Act, 2000
•Indian
Penal Code
11. How much of a problem is Cybercrime?
Cybercrime is a global plague
New and evolving technologies provide almost complete anonymity to
criminals seeking to exploit this arena.
40% of the world population (2.5 billion) use the internet
Forecast that another 1.5 billion people will get access to the internet over
the next four years.
The number of connected devices will almost triple by 2020 from 13.4
billion to 38.5 billion
Global losses inflicted by cybercrime exceeds US$400 Billion
12. Why is cybercrime so difficult to detect?
• Cybercrime can be committed from anywhere in the world
• Relatively easy and cost effective crime. All you need is a computer and
access to the Internet
• Difficult to trace identities
• There are criminal organisations that exist whose sole job is to commit
cyber offences – Hacktivists
• Those who are the victims of cybercrime do not always want to disclose
the fact to investigating authorities
14. What is Money Laundering ?
Money laundering is any
transaction which seeks to
conceal or disguise
proceeds from illegal
activities.
15. 2. PLACEMENT
3.
LAYERING
4.
INTEGRATION
•The last stage in the laundering
process.
•Occurs when the laundered
proceeds are distributed back to
the criminal.
•Creates appearance of legitimate
wealth.
• Involves distancing the money
from its criminal source:
• movements of $ into different
accounts
• movements of money to
different countries
• Increasingly difficult to detect
• Initial introduction of criminal
proceeds into the stream of
commerce
• Most vulnerable stage of
money laundering process
1.Crimes
• Corruption and Bribery
• Fraud
• Organized crime
• Drug and human
trafficking
• Environmental crime
• Terrorism
Money LaunderingCycle
17. Simple Bribe and Money LaunderingTransaction
Company A
• Needs to generate 10
million for bribe to
Finance Minister.
• Uses invoices from
company in Country 2
Country 1
Country 2
Company BankAccount
Country 3
Company owned by Minister’s cousin
Country 4
10.0,00,000 - Purchase
of Real Estate
50,0,00,000 - Purchase
of Bearer Share
18. Money laundering, why should we care?
Is a global
threat;
Is fuel to
expand
criminal
enterprise;
Helps hide
corrupt
payments;
Uneven
playing field
for honest
business;
• Economic:
• Deters private investment
• Destroys competition
• Revenue impact
• Financial:
• Perpetuates corruption, obstructs good
governance
• Erodes confidence
• Destabilizes financial institutions
19. Cybercrime is indeed getting the recognition it deserves. However, it is not going to
restricted that easily . In fact , it is highly likely that cyber crime and its hackers will
continue developing and upgrading to stay ahead of the law.
So, to make us a safer we must need cyber security.
1) Wikipedia
2) Google.com
3) www.legalindia.com
4) Times of India