1. UK6153 Cyber Law
Cyber Crime in the Social Network
Name
Matrick No.
Date
Lecturers
:
:
:
:
Punithemalar Hariaratnam
GP01285
27 July 2013 (Saturday)
Dr Rizal Rahman
2. Just what do we mean when we say,
Social Network?
3. A social network service focuses on building and reflecting of
social networks or social relations among people, e.g., who
share interests and/or activities
The process of building online communities, often
accomplished both through 'groups' and 'friends lists' that
allow greater interaction on websites.
Interactive communication in which participants in online
communities such as Facebook share thoughts, photos, etc.
with members of their own personal networks in a
controlled way
6. A focus on building social
relationships among people.
Building online communities.
Interactive communication
among participants.
7. • Facebook claims that 50% of active users log into the site each day.
This would mean at least 175 million users every 24 hours
• Twitter now has 75 million user accounts (15 million active)
• LinkedIn has over 50 million members worldwide.
• Facebook currently has in excess of 350 million active users on
global basis. Six months ago, this was 250 million. This is over a
40% growth in less than 6 months.
• More than 35 million Facebook users update their status each day.
• Photo uploads to Facebook have increased by more than 100%.
(2.5 billion)
• More than 250 Facebook applications have over a Million
combined user seach month
8. Cyber Crime
• Crime committed using a computer and the internet
to steal a person’s identity or illegal imports or
malicious programs
• Computer used as object or subject of a crime
• Online activities are Vulnerable to crime and can
compromise personal safety just as common
everyday unless law makers, law enforcement and
individuals need to know how to protect themselves
and the persons for which they are responsible
9. The first recorded cyber crime took place in the
year 1820! That is not surprising considering
the fact that the abacus, which is thought to be
the earliest form of a computer, has been
around since 3500 B.C. in India, Japan and
China. The era of modern computers, however,
began with the analytical engine of Charles
Babbage.
The first spam email took place in 1978 where
it was sent over Arpanet (Advance research
projects agency network)
10. • With the rising popularity of the social
networking websites today, you'll find many
Cyber crimes where adults impersonate
children, becoming friendly, and then coaxing
children to meet face-to-face. This is aserious
problem today with youth as young as
• 13 years having sanctioned access to these
social media and networking sites.
11. Types of cyber crime
• Hacking
– Unauthorised access to computer
• Child pornography
– Paedophilia who are sexually attracted to children and use false identity
• Denial of service attack
– Flooring bandwidth of victim with spam mails
• Virus dissemination
– Malicious software ie; trojan horse etc
• Computer vandalism
– Damaging or destroying data
• Cyber Terrorism
– Hate email
• Software piracy
– Theft of software through illegal copying
• Credit Card Fraud
– Hack and misuse your card
12. •
•
•
•
•
•
•
•
Net extortion
– Copying confidential data and extort for huge amounts
Phishing
– Pulling our confidential info from banks or financial institutions
Spoofing
– Pretend to be in identity of another computer
Cyber Stalking
– Following victim by sending email, entering chatroom etc
Salami Sttack
– Insignificant changes, deducting small amount from individuals account
– Confidential info from banks or financial institutions
Spoofing
– Pretend to be in identity of another computer
Cyber Stalking
– Following victim by sending email, entering chatroom etc
Salami Sttack
– Insignificant changes, deducting small amount from individuals account
13.
14. ‘79 per cent of social media users
victims of cyber crime’
by Lee Ya Yun, April 6, 2013, Saturday
15. Why social media is the target!
• Booming social media popularity
• The obvious social media addiction/lure
• Social media becoming an ideal place for
crime
• The vast transition from emails to social
media Rising usage of social media over
smartphones -
16. Cybercriminals use social media not only to commit crime
online, but also for carrying out real world crime owing to
“over-sharing” across these social platforms.
• A survey of 2,000 home-owners stated that 35% users post
their vacation plans on social networking sites. Availability of
such authentic information helps the criminals achieve their
motives easily. Adding to these reasons, the money
associated with the malware market is also a motivation for
criminals to attack using social media.
• Although social media talks more about individual users, the
cyber criminals not only attack the user as an individual, but
they also use it as a channel to victimise businesses.
17. MURDERED BY A MAN SHE MET ONLINE
.
Ashleigh Hall was groomed by Peter Chapman
via Facebook after her claimed to be a teenager
18. A study by Cyberoam reveals that disclosures over social media highly affect
business. Here is the summary of disclosures in brief:
19. According to Sophos Security
Threat Report 2013, Malaysia is
the sixth most vulnerable to
cyber crime.
Listed among the 10 riskiest countries, Malaysia is
also reported to be highly exposed to Android PC and
devices malware attacks. Remember that in the event
of a cyber crime, victims can lodge a report with
CyberSecurity Malaysia.
20. Just like any other medium, social media can also become a
source of data leakage, intrusions, entry for malicious content,
loss of productivity and so on. A good balance between security
and social networking can help. How? Here are a few pointers
that will help:
• Establish an organizational policy for social networking and
regularly train them on the safety measures
• Monitor access of social networks in your organization
• Use strong passwords for your corporate profile on social
networking sites
21. • Upgrade IT Network Security with a solution that offers
multiple security features and scans HTTPS sites (most
social networking sites today are on HTTPS).
• When signing up for social media sites, ask employees to
avoid using official email address
• Caution employees on clicking the links wisely or when
installing plugins/pop-ups
• Ask them to keep a track on the personal information
they post
22. • Request them to avoid allowing social networking services to
scan their email address book
• Limit the number of persons authorized to blog or tweet on
behalf of the company
• Choose an official spokesperson for Twitter/Facebook
• Ensure that the authorized person knows what can be
communicated, and when?
• Keep a record of all public/employee disclosures
23. Scams
Criminals have been utilizing the scam for centuries. In the
Facebook world, scams are particularly effective at drawing
people in by simply enticing an individual to click on a link that
would interest almost anyone, such as an innocent-looking
notification that you’ve won a free prize like a gift card. Then, in
order to claim the prize, scammers require you to submit some
information, such as a credit card number or Social Security
number. This description may make it seem like scams are easy
to spot, but even the most savvy social media user has to be on
the lookout for illegitimate requests for information.
24. Robbery
It doesn’t take much for a thief to find out where
you live, go to school, work, or hang out if you make
that information readily available on Facebook. If
you use Facebook’s check-in or Google Maps
feature, then you could be in a heap of trouble if a
robber is paying attention. This person isn’t always a
complete stranger either; they may be an old
acquaintance or someone else you’d never expect to
come rob you.
25. Identity theft
With the large amount of personal information
swarming around Facebook these days, it has
become fairly easy for criminals to steal users’
identities. Hackers often break into users’ e-mails
and make fake Facebook accounts. From there they
can access personal and bank information and
cause havoc to your sense of security. Protect
yourself from identity theft on Facebook by keeping
your profile very secure and free of personal
information that a criminal would love to have.
26. Defamation
An individual commits the crime of defamation when
they communicate a false statement to a third party
that paints another individual or entity in a negative
light. Facebook makes communicating defamatory
statements frighteningly easy, and the exposure
Facebook provides makes it more likely that businesses
or individuals will be harmed by the defamatory
statement, and thus more likely to pursue legal
remedies. Be careful what you say on Facebook; you
may be committing a crime without even knowing it.
27. Harassment
Harassment happens all the time on Facebook. From
sexual harassment to assault threats, there has been
a significant increase in the number of harassment
cases happening on Facebook. It’s not uncommon for
sex offenders and sexual predators to prey on
unsuspecting victims on Facebook and even pose as a
teen or college student. Harassing messages,
inappropriate comments, and other persistent
behaviors should be reported to Facebook and your
local police station.
28. Cyberbullying
Cyberbullying is a common occurrence among
teenagers on Facebook and one that can result in
serious criminal charges if it goes far enough.
Cyberbullying on Facebook has contributed to the
deaths of several teens who either committed
suicide or were killed by a peer. Cyberbullying that
involves hacking or password and identity theft may
be punishable under state and federal law. When
adults engage in this kind of online behavior it is
called cyber-harassment or cyberstalking.
29. Stalking
The term “stalking” is thrown around a lot on
Facebook, and it is often meant as a joke for regularly
looking at someone’s profile. However, the actual act
of cyberstalking is a common crime on the social
networking site and can result in a serious offense.
Cyberstalking typically involves harassing a person
with messages, written threats, and other persistent
online behavior that endangers a person’s safety.
Although cyberstalking may seem like nothing more
than annoying behavior, it is a legitimate cause for
concern in many cases and can even lead to in-person
stalking or endangerment if not treated seriously.
30. A good balance between
security and productivity is the
need of the hour for
organisations facing similar
challenges due to their
presence over social media.