Sridhar Acharya
Sridhar Acharya
Sridhar Acharya
Incumbent
Assumed office
25 July 2017
In office
In office
Personal details
WRITTEN BY:
DEFINING CYBERCRIME
New technologies create new criminal opportunities but few new types of crime.
What distinguishes cybercrime from traditional criminal activity? Obviously, one
difference is the use of the digital computer, but technology alone is insufficient for
any distinction that might exist between different realms of criminal activity.
Criminals do not need a computer to commit fraud, traffic in child pornography and
intellectual property, steal an identity, or violate someone’s privacy. All those
activities existed before the “cyber” prefix became ubiquitous. Cybercrime, especially
involving the Internet, represents an extension of existing criminal behaviour
alongside some novel illegal activities.
00:0003:21
Most cybercrime is an attack on information about individuals, corporations, or
governments. Although the attacks do not take place on a physical body, they do take
place on the personal or corporate virtual body, which is the set of informational
attributes that define people and institutions on the Internet. In other words, in the
digital age our virtual identities are essential elements of everyday life: we are a
bundle of numbers and identifiers in multiple computer databases owned by
governments and corporations. Cybercrime highlights the centrality of networked
computers in our lives, as well as the fragility of such seemingly solid facts as
individual identity
An important aspect of cybercrime is its nonlocal character: actions can occur in
jurisdictions separated by vast distances. This poses severe problems for law
enforcement since previously local or even national crimes now require international
cooperation. For example, if a person accesses child pornography located on a
computer in a country that does not ban child pornography, is that individual
committing a crime in a nation where such materials are illegal? Where exactly does
cybercrime take place? Cyberspace is simply a richer version of the space where a
telephone conversation takes place, somewhere between the two people having the
conversation. As a planet-spanning network, the Internet offers criminals multiple
hiding places in the real world as well as in the network itself. However, just as
individuals walking on the ground leave marks that a skilled tracker can follow,
cybercriminals leave clues as to their identity and location, despite their best efforts to
cover their tracks. In order to follow such clues across national boundaries, though,
international cybercrime treaties must be ratified.
In 1996 the Council of Europe, together with government representatives from the
United States, Canada, and Japan, drafted a preliminary international treaty covering
computer crime. Around the world, civil libertarian groups immediately protested
provisions in the treaty requiring Internet service providers (ISPs) to store information
on their customers’ transactions and to turn this information over on demand.On
November 23, 2001, the Council of Europe Convention on Cybercrime was signed by
30 states. The convention came into effect in 2004. Additional protocols,
covering terrorist activities and racist and xenophobic cybercrimes, were proposed in
2002 and came into effect in 2006. In addition, various national laws, such as the USA
PATRIOT Act of 2001, have expanded law enforcement’s power to monitor and
protect computer networks.
TYPES OF CYBERCRIME
Cybercrime ranges across a spectrum of activities. At one end are crimes that involve
fundamental breaches of personal or corporate privacy, such as assaults on
the integrity of information held in digital depositories and the use of illegally
obtained digital information to blackmail a firm or individual. Also at this end of the
spectrum is the growing crime of identity theft. Midway along the spectrum lie
transaction-based crimes such as fraud, trafficking in child pornography,
digital piracy, money laundering, and counterfeiting. These are specific crimes with
specific victims, but the criminal hides in the relative anonymity provided by
the Internet. Another part of this type of crime involves individuals within
corporations or government bureaucracies deliberately altering data for either profit or
political objectives. At the other end of the spectrum are those crimes that involve
attempts to disrupt the actual workings of the Internet. These range from spam,
hacking, and denial of service attacks against specific sites to acts of cyberterrorism—
that is, the use of the Internet to cause public disturbances and even death.
Cyberterrorism focuses upon the use of the Internet by nonstate actors to affect a
nation’s economic and technological infrastructure. Since the September 11 attacks of
2001, public awareness of the threat of cyberterrorism has grown dramatically.
DID YOU KNOW?
The FBI created a Cyber Most Wanted List in 2014 that grew to include 42 groups and
individuals by 2018.
Cybercriminals are using more advanced and scalable tools to breach user privacy, and they are
getting results. Two billion data records were compromised in 2017, and more than 4.5 billion
records were breached in the first half of 2018 alone.
Here are the most pressing cybersecurity issues in 2019, as well as rising trends into 2020.
Four new malware samples are created every second. Phishing remains one of the most
successful attack vectors due to its speed, as most phishing sites stay online for just four to five
hours. Users only report 17% of phishing attacks, and it is seen as a low-risk type of activity. As
a result, today only 65% of all URLs are considered trustworthy. This puts a strain on both the
consumer and any enterprise with an online presence.
We predict that 2020 will be known for advanced phishing attacks, due to the number of new
phishing kits available on the dark web. These kits enable people with only basic technical
knowledge to run their own phishing attacks. With more tools available, phishing will become an
even more dangerous attack method.
Remote attacks are growing in number, as well as becoming more sophisticated. One of the main
types of remote access attack in 2018 was cryptojacking, which targeted cryptocurrency owners.
Another popular type of attack threatened perimeter devices.
According to our threat intelligence database, remote access attacks are among the most common
attack vectors in a connected home. Hackers target computers, smartphones, internet protocol
(IP) cameras and network attached storage (NAS) devices, since these tools usually need to have
ports open and forwarded to external networks or the internet.
As most people use their phones to manage financial operations or handle sensitive data outside
the security of their home network, this becomes a prominent threat. The fact that users typically
hold all their information on their phone, and that smartphones are now used for two-factor
authentication - one of the most widely used cybersecurity tools - increases the security risk if
the device is lost or stolen.
The consumer Internet of Things (IoT) industry is expected to grow to more than seven billion
devices by the end of 2020, according to Gartner. Many consumers do not see IoT devices as a
vulnerability, because a significant portion of them do not have a user interface. This could lead
to issues understanding what kind of data the device collects or manages.
However, IoT devices are not only collecting valuable user data. They could become an entry
point for an attacker or tool to launch a distributed denial-of-service (DDoS) attack. IoT devices
are not secure by design, because putting a focus on security would significantly increase
manufacturing and maintenance expenses.
According to CUJO AI threat intelligence data, 46% of all attack types that these devices
experience are remote access attempts and 39% are used for detecting behavioural patterns. With
the exponential growth of connected devices at home, these threats are likely to increase.
Most of the biggest industries already use machine learning (ML) and artificial intelligence (AI)
to automate their processes and improve overall performance. Cybersecurity and cybercrime are
no exception.
The majority of AI qualities serve malicious purposes. AI systems are cheap, scalable,
automated, anonymous and they provide physical and psychological distance for the attacker,
diminishing the immediate morality around cybercrime.
- Artificial intelligence for cybersecurity evasion. Cybercriminals are using various evasion
methods to avoid detection, and AI helps to optimize different elements of this process.
- Artificial intelligence in phishing. AI could help to create content that can pass through
typical cybersecurity filters, such as email messages that are indistinguishable from those written
by humans.
- Artificial intelligence in social engineering. While social engineering is one of the most
popular hacking techniques, it takes a lot of time to implement properly. AI could help in not
only collecting information, but also by writing emails or calling potential victims.
With new advances in AI-driven technology, utilizing AI in cyber attacks will become an even
more popular and dangerous trend.
SUBSCRIBE