//
home

Latest Post

Cyber Crime

Cyber crime, according to Dr. Debarati Halder and Dr. K. Jaishankar (2011), may be defined as “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm to the victim directly or indirectly, using modern telecommunication networks such as Internet (Chat rooms, emails, notice boards and groups) and mobile phones (SMS/MMS)”.

Cyber crimes “may include espionage, financial theft, cross-border crimes, cyber warfare, frauds, and scams. The international legal system is attempting to hold actors accountable for their actions through the International Criminal Court. Cybercrime in the United States is estimated to cost $100 billion annually.

Netcrime refers to “criminal exploitation of the Internet.”

Computer crime refers to “any crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target.”
Crimes that primarily target computer networks or devices include:
computer viruses
worms
trojan horses
rootkits
– denial-of-service attacks
scareware
ransomware
malware
– other malicious code

Crimes that use computer networks or devices to advance other ends include:
– Cyber stalking, cyber bullying and cyber defamation
Identity theft
– Information warfare
Spam, forum spamming
– Scams like email scams, bogus tradesman doorstep fraud, courier fraud, short firm and long firm fraud, CryptoLocker ransomware, VAT fraud, money transfer fraud, energy saving devices scam, pump-and-dump fraud, Ponzi and pyramid schemes, letter of credit fraud, prime bank note fraud, redemption/strawman/bond fraud, health care fraud or health insurance fraud, advance fee scam schemes, identity theft, Nigerian letter or “419” fraudtelemarketing fraud, social networking scams, Internet investment fraud, Internet business scam, fiddle game scam, clip joint scam, chain letter scam, green goods scam, miracle cars scam, Thailand airport scam, Spanish prisoner scam, badger game scam, black money scam, pigeon drop scam, Jamaican switch scam, poetry scam, mystery shopping scam, Father’s Day shopping scam, internet clearinghouse scam, computer finance scam, romance scam and various other scams.

Fraud
Computer fraud is “any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss”. In this context, the fraud will result in obtaining a benefit by:
– Altering in an unauthorized way. This requires little technical expertise and is a common form of theft by employees altering the data before entry or entering false data, or by entering unauthorized instructions or using unauthorized processes;
– Altering, destroying, suppressing, or stealing output, usually to conceal unauthorized transactions;
– Altering or deleting stored data;
– Altering or misusing existing system tools or software packages, or altering or writing code for fraudulent purposes.
Other forms of fraud may also take place using computer systems. Researchers have found a fraud triangle and a way of breaking it.

Obscene or offensive content
The content of websites and other electronic communications may be distasteful, obscene or offensive for a variety of reasons. In some instances these communications may be illegal. The extent to which these communications are unlawful varies greatly between countries, and even within nations. It is a sensitive area in which the courts can become involved in arbitrating between groups with strong beliefs. One area of Internet pornography that has been the target of the strongest efforts at curtailment is child pornography.

Harassment
Whereas content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail. Any comment that may be found derogatory or offensive is considered harassment. Harassment as defined in the U.S. computer statutes is typically distinct from cyberbullying, in that the former usually relates to a person’s “use a computer or computer network to communicate obscene, vulgar, profane, lewd, lascivious, or indecent language, or make any suggestion or proposal of an obscene nature, or threaten any illegal or immoral act,” while the latter need not involve anything of a sexual nature.

Threats
Although freedom of speech is protected by law in most democratic societies, it does not include all types of speech. In fact spoken or written “true threat” speech/text is criminalized because of “intent to harm or intimidate”, that also applies for online or any type of network related threats in written text or speech. The US Supreme Court definition of “true threat” is “statements where the speaker means to communicate a serious expression of an intent to commit an act of unlawful violence to a particular individual or group”.

Combating cyber crimes
A computer can be a source of evidence. Even where a computer is not directly used for criminal purposes, it may contain records of value to criminal investigators in the form of a logfile. In many countries Internet Service Providers may be required, by law, to keep their logfiles for a pre-determined amount of time. Generally, all e-mail traffic may be retained for a specified minimum period of time, which may range from one year to several years. Penalties for computer related crimes may involve a fine or any period of jail time, or both.

Cyber crimes, computer crimes, netcrimes, and such crimes may threaten a nation’s security and financial health, may harm individuals and organizations, and thus, these are actively combated all over the world.”

REFERENCES:
1. Halder, D., & Jaishankar, K. (2011) Cyber crime and the Victimization of Women: Laws, Rights, and Regulations. Hershey, PA, USA: IGI Global. ISBN 978-1-60960-830-9. http://www.igiglobal.com/bookstore/titledetails.aspx?titleid=50518&detailstype=description
2. Moore, R. (2005) “Cyber crime: Investigating High-Technology Computer Crime,” Cleveland, Mississippi: Anderson Publishing.
3. Warren G. Kruse, Jay G. Heiser (2002). Computer forensics: incident response essentials. Addison-Wesley. p. 392. ISBN 0-201-70719-5.
4. David Mann And Mike Sutton (2011-11-06). “Netcrime”. Bjc.oxfordjournals.org. http://bjc.oxfordjournals.org/cgi/content/abstract/38/2/201
5. Annual U.S. Cybercrime Costs Estimated at $100 Billion; Study Casts Doubt on Previous, Higher Figures July 22, 2013 Wall Street Journal. http://online.wsj.com/article/SB10001424127887324328904578621880966242990.html
6. “Cyberbullying / Stalking and Harassment”. https://www.wiredsafety.org/subjects/cyberbullying.php
7. Susan W. Brenner, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, 2010, pp. 91. http://books.google.co.uk/books?id=gsWQ-xgbLbUC&lpg=PA130&ots=RgwCYAMetX&dq=%22threats%20to%20harm%22%20cybercrime&pg=PA91#v=onepage&q=harm&f=false
8. Cyberextortion. http://www.ere-security.ca/PDF/Cyberextortion%20by%20DoS,%20Risk%20Magazine%20June%202006.pdf
9. Data Retention (EC Directive) Regulations SI 2007/2199.
10. Computer crime. Wikipedia. http://en.wikipedia.org/wiki/Computer_crime
11. Kenniff, Raiser. “New York Internet Crimes Laws”. http://raiserkenniff.com/nyc-criminal-defense/internet-crimes/
12. Computer fraud charges in New York. May 2011. Bukh Law Firm, PC – 14 Wall St, New York NY 10005 – (212) 729-1632. New York computer fraud lawyer. http://www.nyccriminallawyer.com/white-collar-crimes/computer-and-internet-fraud/
13. 2011 U.S. Sentencing Guidelines Manual § 2G1.3(b)(3)”. http://www.ussc.gov/Guidelines/2011_Guidelines/Manual_HTML/2g1_3.htm

Clean Internet Charity Foundation President’s Desk

The Internet has become an essential part of our daily lives and thus, has a far-reaching impact on our global society. Deceptive, misleading, or outright fraudulent online activities, harms all aspects of all our lives in order to gain their selfish, petty ends.

It is our responsibility to take a stand and attempt to clean up the Internet, without encroaching on its freedoms. The responsibility becomes greater as children and adolescents, who are the future of humanity, are the most vulnerable targets. They are manipulated, duped, or deceived by unscrupulous elements, who undertake such harmful online activities.

Clean Internet Charity Foundation has taken a stand and we seek your valuable co-operation, in whatever way you can. Together we can achieve, what we cannot alone. Let us together make the Internet a cleaner, a safer, and a responsible place. For everyone.

Join us and make a difference. Thank you.

Enter your email address to follow this blog and receive notifications of new posts by email.

Join 8,492 other subscribers

Blog Stats

  • 104,278 hits
Text is available under the Creative Commons Attribution-ShareAlike License http://creativecommons.org/licenses/by-sa/3.0/; additional terms may apply.