Computer Crime Problems Research Center

Vasiliy Polivanjuk

Crime-research.org

 

CRIMINAL CHARACTERISTIC OF CRIMES COMMITTED IN THE BANKING SYSTEM
BY USING UP-TO-DATE INFORMATION TECHNOLOGIES

 

Government vital activity banking system which deals with accumulating, dividing and using governmental and private funds is the most attractive for individual criminals and especially organized criminal groups. The most financial swindles of different kinds accomplished more often during various bank operations are committed now in this system.

To function normally economy needs to have a reliable, stable and developed banking system where banks will implement payments, extend credits to their clients in proper time, provide with services in securities operations and so on, and so forth. If the bank financial position is swayed, the financial standing of hundreds of bank clients can give a lurch as well.

The annual growth in the bank offense amount increases the size of loss caused by these crimes. Data for 1997-1998 prove that more than 75% of all losses inflicted by the financial criminality only fall on the commerce bank field of business. (1)

Offenses committed in the banking system or by using it can be attributed to the most dangerous economic crimes since their negative influence is not only reflected on the bank itself but also the many other subjects of the economical activity and the financial system of the government at large.

Sums that are drawn from the banking accounts of the depositors and the resources of the banks themselves by applying computer systems reach especially great extents. Crime, which covers corpus delicti provided by the Criminal Code of Ukraine in Clauses 190 Fraud, 200 Illegal act with transfer bills, payment cards and other means of access to the banking accounts, equipment for their manufacture, 361 Illegal interference with the work of electronic computers, systems and computer nets, 362 Larceny, misappropriation, extortion or possession of the computer information by swindling or abusing official position, 363 Violation of operating rules for electronic systems, can be attributed to this kind of criminal activity.

Early 90-s the global society computerization was initiated in Ukraine that did not become only a factor of the scientific-and-technological progress but also entered work, everyday life, science, education and culture. Computers became indispensable man help.

Today our country has sufficiently developed system of electronic communication, which cannot be absolutely reliable and protected. Such a situation gives criminals a possibility to get an access to the computer information systems to conduct illegal manipulations with mercenary motives. The society computerization results in increasing the amount of computer crimes and their weight depending on the sums used in the total part of the material costs in comparison with the ordinary offenses.

The object of the criminal trespass depending on the kind of a crime is not the same. The criminal trespasses in the bank sphere are determined by the criminal-and-legal indication depending on the circumstances by the clauses of different chapters from the Criminal Code of Ukraine: 1.Offenses against property Fraud (190); 2.Offenses in the sphere of economic activity Illegal acts with transfer bills, payment cards, equipment for their manufacture and other means of access to the banking accounts (200); 3.Offenses in the sphere of using electronic computers, systems and computer nets Illegal interference with the work of the electronic computers, systems and computer nets (361); Larceny, misappropriation, extortion and possession of the computer information by swindling or abusing official position (362); Violation of the operating rules for automated electronic systems(363); (2). Funds of the government or private firms, enterprises and persons in the Ukrainian or foreign currency, goods and property as well are the object of these criminal trespasses.

The methods of committing banking offenses are very different. Let us examine the crimes committed by using modern information technologies: counterfeit and application of the plastic payments cards and computer banking information.

For the last years the Ukrainian market of the bank technologies traversed a path from the initial stage of computerization realizing the most simple banking operations on the base of the personal computers, to the valuable automated banking systems, which meet the most exacting modern requirements. The international systems of payment are being introduced.

The modern state of the information systems and electronic technique allows introducing the most delicate and interesting technologies. One of them is so called "e-money".

The mutual interest of the government and the owners of the plastic cards stipulated the appearance and spread of plastic payments means. It is one of the ways for the government to reduce the needs in ready money mass.

The emitters recurrently inform the organizations, which accept cards, about the numbers of cards declared null and void, stolen, lost or forged. The list of the numbers of such cards is called stop-list. When using a card, it is checked for the validity of its details by the stop-list and with the reading unit. (3)

Hackers are a real danger for the bank industry of plastic payment means. When using special software they can determine and then sell the numbers of valid accounts of the credit cards and also extend passwords, identification numbers, credit and other personal information through computer nets, thereby helping criminals to obtain illegal access to the credit offices and computer systems of the financial establishments.

But counterfeit is the most dangerous threat for the payment systems with using bank plastic cards. This kind of offenses is developed the most dynamically and creates great difficulties when researching and calculating losses. Criminals use the numbers of the valid cards and their owners even do not guess it.

Theft in the bank activity with using electronic computers or computer nets is broadly extended now. This kind of theft is characterized with that the criminals abused their official position to get unlawful access to the computer information of the financial character, concentrated in the electronic centers of the banking establishments, revealed the flaws in the activity of the inspection services and carry out the criminal operations with the information obtained from the electronic computers and data carriers.

Today there are four groups of principal means of committing computer crimes:

1.Information piracy: direct and electromagnetic

2.Unauthorized access to information: computer boarding, mystification, disguising, changeable choice, by tail, emergency, after fool, breakthrough, hatch, storehouse without walls, system gawks.

3.Manipulation with information: Trojan hobbled hoarse, Trojan wooden doll, data substitution, code replacement, computer virus, salami, logical bomb, asynchronous attack, modeling, kite, trap with bite.

4.Obtaining and using information with criminal purpose: larceny of software, equipment by means of computer operations, theft of money by means of gaining confidential codes, computer remittance, manipulation with computer or introducing alterations to the program. (4)

Commitment of these crimes is preceded by the certain preparation, the character of which depends on the level of connection of the wrongdoers with the activity of the bank electronic center. The unauthorized persons think over the ways of access to the computer systems, try to find out the program passwords and keys. The programmers, operators and other officials of the computer center and other bank departments who prepare such a swindle choose the most favorable circumstance to commit it and can set up a false firm with the settlement account to transfer drawn money, etc.

In the main, criminal action consists of conducting contact operations of the wrongdoers with the electronic computers or machine carriers, drawing necessary information or money from the e-accounts of the bank clients, possessing it or transferring it to the accounts of the false organizations.

Restoring the initial program that underwent some changes in the process of criminal access to the bank computer information conceals such an offense. Highly skilled experts who may breach the bank software depending on its level of access can do this.

Situation created by criminals to commit these crimes first of all is formed under the influence of different misunderstanding, contradictory, undeveloped regulations in our legislation, some insufficiently considered decisions and inadequately elaborated mechanism of realizing decisions in the field of bank activity.

The circumstance is favorable for swindlers who use plastic payments cards when stop-lists are not send in time to the organizations which accept these cards and the persons who take and check these cards at the commercial and other facilities are careless.

The situation of the lax control for maintaining the established order of professional work in the electronic bank nets and the insufficient protection of computer systems favor the mercenary crimes dealing with using information electronic systems. Here criminals apply favorable conditions already objectively formed for them more often than those specially created by them. Even the insufficiently considered organizational-and-administrative decisions can favor such plundering.

Criminal. Psychology of profit-seekers, dealers, liking for profit, striving for quick accumulation of wealth by any means without taking into consideration that their actions can cause at times serious losses to the economy of Ukraine is peculiar to most of them.

Persons who commit these crimes have comparatively high level of education.

Persons who commit theft by means of using computer bank systems should be referred to the specific category of these wrongdoers.

Defining persons who commit computer offenses it is necessary to mark the main distinction, and namely: very many people ranged from highly skilled specialists to amateurs are involved in the electronic criminality.

Home and foreign researches make it possible to paint a portrait of a typical computer, electronic criminal, that is a proper profile of this social type: he is average 30 years old, by education an engineer in the field of electronics and mathematics, or programmer, but there are some cases when the criminals never had any technical experience. Besides they are not on the books at IAA and do not have criminal past at all.

According to Computer Criminality Research Center males are five times oftener the subjects of crimes committed by means of using high technologies. The most criminals have full or incomplete higher technical education (53,7%), another full or incomplete higher education (19,2%). Persons aged from 30 to 45 (46,5%) and from 16 to 30 (37,8%) as well prevail among them. (5)

From a position of human psychophysical characteristics it is a desired official, a bright, thinking, creative person, who knows his business and is ready to accept a technical challenge. They always occupy senior posts and are equipped with special knowledge and the newest technologies, have an access to the banking computer systems.

At the same time they are afraid of losing their authority or certain status within the limits of a social group, or being mocked at the work.

It should be taken into consideration that at this stage the computer crimes in the bank system are committed mostly in an organized way. It is explained by that the organized criminal groups, which have wide influence, can transfer money to the foreign bank accounts without any problems, or launder it through false firms in order to legalize and bring it into circulation later on.

These criminals are notable for concentration and diligence, their actions are refined, cunning and accompanied with excellent disguising. Outwardly the behavior of those people do not differ from the social rules established in the society. More frequently they do not only have special skills in making use of electronic computers, their devices but also can apply bank program passwords and keys, use their expert knowledge to falsify programs by means of altering correct output data. They are usually operation officials who occupy various posts, programmers and computer operators. Computer crimes with mercenary motives are also committed by so called hackers (possessed programmers) who are chiefly young people well technically and professionally trained to work with electronic computers and draw up computer programs. (3)

Researches show that mainly bank officials: programmers, engineers, and operators who are users or service personal of electronic computers (41,9%) can obtain a direct unauthorized access to the electronic computers, systems or computer nets. Almost twice less the other bank officials (20,2%) can gain such an access, and in 8,6% of cases the crime was committed by the officials that had been dismissed, 22,5% - an unauthorized access is obtained by a stranger. (5)

Hackers computer rowdies who enjoy penetrating into smb. elses computer. They are capital experts on information technology. By means of telephones and home computers they are connected to the nets, which transmit information linked nearly with all big computers that operate in the field of economy and banking activity.

First hackers aim can be only a sporting interest, connected with solving a difficult problem of breaking protection of program product or creating computer virus only to please their self-admiration or just make a fun. Hackers are notable for a high professionalism in combination with specific computer fanaticism. It is necessary to underline that the lack of evident unlawful intents features the criminals of this group. Practically all their actions are taken to show their intellectual faculties.

Professional criminals who act with obvious mercenary motive and have steady criminal experience are the most dangerous threat for the sphere of banking activity. Crimes that bear serial, continuous character are always concealed. More often the members of the organized criminal groups are highly skilled experts with higher mathematical, engineering and technical or economical education who are equipped with special technique. Most of the especially unsafe crimes in public offices such as misappropriation of money means to the particularly large extents committed by applying computing machinery fall on the share of this group of criminals.

They work either at the offices against which they act or outside them, alone or with accomplices. Some of them are weakly equipped and other have expensive, prestige and powerful computer systems.

Revealing traces. The biggest difficulty is to establish a fact of committing a computer crime in the banking system. It is explained by that outwardly the fact of committing a computer crime and its display in the environment is more modest than when burglarizing a grocery store or quite insignificant. Outwardly you cannot see an obvious loss of property inflicted by the electronic criminal. For example, unlawful copying out information more often remains entirely unrevealed, introducing a virus into computer is more often put down to the unintentional error of the user who could not reveal it when contacting with inner computer world.

Mechanism of committing offenses connected with automated systems of processing information is often hidden from the victims. Besides the fact of the information leakage can be disguised by means of electronic devices at the normal course of events before it is revealed.

Very often executive officers obliged to ensure computer security are not interesting in revealing fact of crime commitment. Acknowledgement of the fact of unauthorized access to the system, which is under their jurisdiction, puts under doubt their professional proficiency; weakness of computer security measures undertaken by the administration can result in serious internal complications.

As for the suffered banks their officials are not interesting at all in registration of those crimes but on the contrary try to conceal them studiously. Since making public the fact of committing criminal actions against bank computer will be negatively reflected on the authority of the establishment and can result in losing clients (only in 8,2% of cases the victims appeal to the law-enforcement agencies, and in other cases there are only internal investigations). (5)

The result of it is that the reluctance to inform about a crime, deliberately concealing it, favors putting obstacles in the way of revealing criminal traces which are insufficient enough as they are. But if the damaged party informs the law-enforcement bodies about committed crime the team of inquiry arrives on site of an accident and inspects it to reveal traces of the offense.

In particular all the computers of the banking establishments are equipped with the unauthorized access warning systems which fix all the attempts of this kind. Suffice it to enter a proper command and computer will display all the information. But a criminal can penetrate into another computer by finding weak points in the system protection; in this case the unauthorized access will not be fixed. In spite of prudence when working with information sometimes there remain traces: accidentally erased information or program confusion, which could occur when improper command is used. If money were drawn from the bank, making more detailed inspection will reveal the inflicted loss of property.

The officials, persons who know operating conditions very well and can use the possibilities of this system with mercenary purposes, mainly commit the lions share of computer crimes in the bank system. There are very few those people in every establishment so crime traces can remain on their working places. They are CD-ROMs, floppies where the criminal save necessary information, copies, notes on sheets of paper (passwords, codes).

Unfortunately electronic criminals commit nearly all the crimes in the daytime at the work when they are engaged in their official activity and you can do nothing with it. The only way out is to improve the protection system and restrict an access to the information on the system operating conditions. The less informed, the less suspected.

Circumstances that are subject to specifying in a process of investigating banking crimes, independently of their type are mainly determined on the base of their criminal characteristic and by taking into consideration an evidential matter.

The first group of these circumstances is connected with establishing all the main circumstances of the crime case to be investigated: an object of criminal trespass; means of commitment and mechanism (all stages) of criminal action, situation of committing it (place, time, specification of financial operations, conditions for performing and checking them, other local and surrounding conditions that accompany actions to be investigated), other circumstances that influence on the motives of actions; character and extent of the caused losses (harmful consequences); individual peculiarities of the suspected; availability or lack of indications of the organized criminal group activity (if it is determined and the suspected are its members). It is important to ascertain (if a crime had some episodes) the whole period during which the crimes were committed, and all the circumstances of committing it. Revealing the enumerated circumstances usually creates the necessary factual base for bringing an accusation.

The second group of circumstances combines facts that confirm guilt of the accused, and motives of committing a crime, including determining extent and nature of circumstances that aggravate or mitigate the punishment.

The third group of circumstances conditions that favor committing a crime (imperfection of legal regulation of applicable operations, shortcomings of applicable rules of conducting operations, poor automation of payment transactions, etc.)

The fourth group of circumstances bears largely a criminal character and is aimed to reveal data that help to determine sources of main and additional information on the case. The process of determining circumstances of the group includes: verification of investigation versions, which have arisen; verification and assessment of actual data that formed the basis for criminal assessment of the action to be investigated (information about means, mechanism and circumstance of committing a crime), and also revealing and assessing the extent of the inflicted loss, means of disposal of stolen property and valuables purchased with drawn money.


Home | What's New | Articles | Links
Library | Staff | Contact Us
Copyright Computer Crime Research Center, 2001-2002 All Rights Reserved.
Contact the CCRC Office at 380-612-735-907
contacts@crime-research.org