Professional Documents
Culture Documents
Contents
6. Technology Assessment
11.Case study
13. Precautions
14. Conclusion
Crime and Cyber Criminals: A Global Problem
Abstract
the computer and information age. Today, Cybercrime has caused lot of
protecting data from such attacks. However, this context shows that
there are many countries facing this problem even today and United
cybercrime over the years. According to the recent survey carried out it
was noticed that year 2022 saw the monetary damage of nearly 781.84
million U.S. dollars. This paper describes about the common areas
that are committed today. In addition, some of the case studies related
I. INTRODUCTION
The term crime is denoted as an unlawful act which is punishable by a
state. However, certain purposes have no statutory definition provided..
It is harmful not only to some individual but also to the community or
the state. Cyber crime has nothing to do with the law enforced. It
involves computer or computer networks. A computer network is
basically the collection of communicating nodes that helps in
transferring data across. The nodes at any given time could be a
computer, the laptop, smart phones etc. Cybercrime encompasses any
criminal act dealing with computers and networks. It includes crime
conducted through the Internet. The Internet is basically the network of
networks used across for communication and sharing of data.
Cybercrime also known as the computer crime is the use of an
instrument for illegal ends, such as committing fraud, trafficking in
child pornography and intellectual property, stealing identities, or
violating privacy.
2. Geographical challenges-
The act of Cyber Crime takes place in the cyber space and the
criminal who is committing this act is physically outside the cyber
space. Every activity of the criminal while committing that crime is done
over the virtual world.
4. Collection of Evidence-
The Cyber Crime has the potential of causing injury and loss of life
to an extent which cannot be imagined. The offences like cyber
terrorism, cyber pornography etc has wide reach and it can destroy the
websites, steal data of the companies in no time.
A. Financial Crimes
With the increasing demand of the on-line banking the financial crimes
have become very alarming. Financial crimes include credit card frauds,
stealing money from on-line banks etc. The criminals of credit card
fraud get information from their victims often by impersonating a
government official or people from financial organizations asking for
their credit information. The victims fall prey to this without proper
inquiries and give away their credit card information to these criminals.
In these ways, criminals may steal their identity and the consequences
are mostly financially damaging.
B. Cyber Pornography
In the modern world sex sells and sells extremely well, and the fact
is that present pornography industry is larger than any other company
or combination of companies in the world. The advent of internet in the
world has started the new chapter in the porn industry. The porn
industry finds perfect place in internet to spread pornographic material
all over the world.
C. Drug Trafficking
D. Cyber Terrorism
Terrorism acts which are committed in cyberspace are called cyber
terrorism. Cyber terrorism may include a simple broadcast of
information on the Internet about bomb attacks which may happen at a
particular time in the future. Cyber terrorists are people who threaten
and coerce and individual, an organization or even a government by
attacking them through computers and networks for their personal,
political or social benefits.
E. Online Gambling
F. Cyber Stalking
I. Piracy of Telecommunication
These are the materials that are thought to be objectionable and exist in
the cyberspace. It includes materials which are of sexually explicit in
nature, racist propaganda, explosive objects and devices, and codes for
fabrication of the incendiary devices. Telecommunication services are
also commonly used to harass, threaten, and intrude the
communications from phone calls to contemporary manifestation of
cyber stalking.
High-return or “risk-free”Investments,
Pyramid Schemes and
“Ponzi” schemes.
Electronic transfer systems are proliferating and the same goes with the
risks that such type of transactions may be intercepted or diverted.
There is no doubt that the E-fund transfer system has sudden and wide
acceptance globally. With the usage of electronic fund transfer system,
there is no doubt that this system will enhance the risk. The transfer of
funds over the Internet may be diverted by the hackers. E-transfer is
highly vulnerable in terms of crimes such as thefts and frauds.
The graph in Fig. 1 shows the statistics of the total amount of monetary
damage caused by having cybercrime from 2010 to 2022. This statistic
was reported to IC3. In the year 2010, the total amount of loss incurred
was 17.8 million U.S. dollars. Year 2010 showed a hike of about 559.7
million U.S. dollars and later by 2022 the monetary damage grew to
781.84 million U.S. dollars which is certainly alarming.
1.Graph
G
Graph 1.
Table 1 shows the countries that had been the victims of cybercrimes
such as sharing malicious computer activities, spam messages,
phishing etc. The table 1 shows the six factors;
Table
From the pie chart given at Fig. 2, it is quite evident that United States
of America had suffered a lot due to cybercrime. The loss that had
incurred has been tremendous other countries as well. China stands at
the second position. Then the countries like Germany and Britain stood
next, who had to bear the loss, occurred due to cybercrime. Countries
like Brazil, Spain shares almost the same percentage of cybercrime
happening. Similarly, Italy, France, Turkey, and Poland stand with the
same percentage of cybercrime caused at their countries respectively.
India shares 3% of the malicious computer activities. Argentina,
Australia and Israel share only 1% of the malicious computer activities.
Mexico has the highest rank for hosting the phishing websites. Australia
ranks the highest for bot- activities.
Table
The power of the police office and other officers to enter, search etc. is
entailed in Section 80 (1) of the IT Act, which says that, notwithstanding
anything contained in the Code of Criminal Procedure, 1973, any police
officer, not below the rank of the Inspector or any other officer of the
Central Government or State Government authorized by the Central
Government in this regard, may enter any public place, search and
arrest without warrant any person, who is reasonably suspected of
having committed or of committing or about to commit an offence under
the IT Act.
Step 1: Go to https://www.cybercrime.gov.in/Accept.aspx.
Step 5: Register your mobile number and fill in your name and State.
Source: http://www.dynotech.com/articles/images/crimescene.jpg
In case the response has not been appropriate then the complainant
can write to State / UT Nodal Officer and Grievance Officer, the details
of which can be accessed
here: https://www.cybercrime.gov.in/Webform/Crime_NodalGrivanceLi
st.aspx.
(2) Any person who contravenes the provisions of sub-section (1) shall
be punished with imprisonment for a term which may extend to two
years, or with fine which may extend to one lakh rupees, or with both.
I. [Section 74] Publication for fraudulent purpose.-Whoever knowingly
creates, publishes or otherwise makes available a Digital Signature
Certificate for any fraudulent or unlawful purpose shall be punished
with imprisonment for a term which may extend to two years, or with
fine which may extend to one lakh rupees, or with both.
(b) any information which he knows to be false, but for the purpose of
causing annoyance, inconvenience, danger, obstruction, insult, injury,
criminal intimidation, enmity, hatred or ill will, persistently by making
use of such computer resource or a communication device,
(c) any electronic mail or electronic mail message for the purpose of
causing annoyance or inconvenience or to deceive or to mislead the
addressee or recipient about the origin of such messages, shall be
punishable with imprisonment for a term which may extend to three
years and with fine.
(2) For the purposes of sub-section (1), this Act shall apply to an offence
or contravention committed outside India by any person if the act or
conduct constituting the offence or contravention involves a computer,
computer system or computer network located in India.
The figures also revealed that there were around 7 crore cell-
phone users in the state of them, four crore people were
using Smartphone.
B. Organized Hacktivists
C. Disgruntled Employees
D. Professional Hackers
So these are certain precautions which must
be taken by the netizens in order to protect
themselves from becoming a victim of cyber
crimes.
14. CONCLUSION
From this study ,it has been found that Cyber Crime
are the offences that are committed by individuals or
group of individual with a criminal motive to nationally
and Internationally harm the victim using
telecommunication network such as internet.
Today internet has taken the world by storm. With
advancing technology and increasing use of internet
scammers are also following new ways to target people
and real moneys.
(b)Cyber Pornography
(c)Drug
Trafficking
(d)E-mail Spoofing, E-
mail Bombing
REFERENCES
[5]www.merriam-webster.com/dictionary/cyber
[6] David Wall, “Cyber crimes and Internet”, Crime and the
Internet, by David S. Wall. ISBN 0-203-164504
[7] www.webopedia.com/TERM/C/cyber_crime.h ml
[8] http://en.wikipedia.org/wiki/Computer_crime
[10] en.wikipedia.org/wiki/Phishing
[11]www.ehow.com/facts_5144661_types_cybercrime_penalties.html
[13] http://www.statista.com/statistics/267132/total-damage-
caused-by-bycyber-crime-in-the-us/
[14]http://timesofindia.indiantimes.com/city/patna Two-cases-
held-for-cyber-fraud/article show/34304971.cms
[15]http://satheeshgnair.blogspot.in/2009/06/selected-case-
studies-on-cyber-crime.html#Email_spoofing_ 329149830155074