Computer Crimes
Computer Crimes
A computer crime is any illegal action where the data on a computer is accessed
without permission. This access doesn't have to result in loss of data or even data
modifications. Arguably the worst computer crime occurs when there are no
indications that data was accessed.
Computer crime is often attributed to rogue hackers and crackers, but increasingly
organized crime groups have realized the relative ease of stealing data with
relative low-level of risk. Government organizations are also rumored to be
involved with hacking in to computer systems, but the legality of such actions is
far too grey an area to be discussed here.
• Phishing: This is a common computer crime is the United States. Here emails are
sent to gullible users that make them believe that the emails are from authentic
sites. The users are passed onto fake websites where they enter their confidential
data like usernames, passwords and credit card details. The fake websites look
and feel real and that is why many people get fooled into entering sensitive
information.
• Computer Viruses: These are actually computer programs that are capable of
replicating themselves and harming computer systems present in a network.
These viruses work without the knowledge of the users and spread from one
computer to another through the network, Internet or removable devices like CDs
and USB drives. Writing computer virus is a criminal activity and is punishable by
law.
• Identity Theft: This one of the most serious frauds in today's word. It involves
stealing money and getting benefits by using an identity of another person. This
also includes the use of someone else's credit card details to purchase good and
services. It has been seen that blackmail and terrorism often employ identity theft.
• Cyber stalking: This is using the Internet to stalk a person just like someone
world do in the real world. Here the stalker sends emails, spreads false
information or issues threats using the Internet. Cyber stalking is also used to prey
on unsuspecting children and women.
Spam
Fraud
Other forms of fraud may be facilitated using computer systems, including bank
fraud, identity theft, extortion, and theft of classified information(Csonka, 2000)
Many jurisdictions place limits on certain speech and ban racist, blasphemous,
politically subversive, libelous or slanderous, seditious, or inflammatory material
that tends to incite hate crimes.
The extent to which these communications are unlawful varies greatly between
countries, and even within nations. It is a sensitive area in which the courts can
become involved in arbitrating between groups with entrenched beliefs.
One area of Internet pornography that has been the target of the strongest efforts
at curtailment is child pornography.
Harassment
Drug trafficking
Drug traffickers are increasingly taking advantage of the Internet to sell their
illegal substances through encrypted e-mail and other Internet Technology. Some
drug traffickers arrange deals at internet cafes, use courier Web sites to track
illegal packages of pills, and swap recipes for amphetamines in restricted-access
chat rooms.
The rise in Internet drug trades could also be attributed to the lack of face-to-face
communication. These virtual exchanges allow more intimidated individuals to
more comfortably purchase illegal drugs. The sketchy effects that are often
associated with drug trades are severely minimized and the filtering process that
comes with physical interaction fades away. Furthermore, traditional drug recipes
were carefully kept secrets. But with modern computer technology, this
information is now being made available to anyone with computer access.
Cyber terrorism
PIRACY
The term “warez” describes commercial software, movies and games that has
been modified by a cracker and made freely available to the public on the
Internet. The word came from the word “wares” but, as with “phishing”, the
hacker/cracker community altered the original word just enough to claim it as its
own.
Modern day piracy may be less dramatic or exciting but is far subtler and more
extensive in terms of the monetary losses the victim faces. This particular form of
cybercrime may be the hardest of all to curb as the common man also seems to be
benefiting from the crime. A typical Africa person would stop at nothing to
download “free software, musicals, movie” or related items. The reason is that,
the taxation system in most African countries is ineffective and people grow up to
believe paying tax and other bills are a way the government use to oppress the
poor citizens.
Documented cases
1. The Gullible
There is no doubt that cybercriminals are most fond of people who
are easy to deceive. During the period of this research, I interviewed
some cyber criminals in four cyber cafes in Nigeria and what I was
told was this “yahoo-yahoo business is all about deceipt, if you are
gullible, then you become my mahi..” On a more obvious level,
phishers are best able to fool such people into buying their scams or
being drawn into legal traps. Spammers send multiple e-mail
messages to harvested email addresses and the gullible fall prey to
the contents of the email. Usually older people are prone to being
scammed as they are more trusting and helpful towards others.
On a more dangerous level, however, many especially children
believe that the people they meet on the net are as friendly and
worthy of trust as real people. Almost all victims of cyberstalkers are
prone to trusting people and making friends easily.
4. Unlucky people
There are also people who fulfill none of these categories but are just
unlucky enough to be at the wrong place at the wrong time, in
cyberspace that is. These categories of victims believe they are
meeting legitimate business associates only to be deceived by the
variants. Also, a full-scale of attack or a self-replicating and highly
advanced virus can cause great damage to networks or PCs and the
individual may not in anyway be blame.
PREVENTION
Apart from his own mentality and the strength of his motivations, the
criminal also needs to see the path of crime ahead of him clear of
obstacles. If every single individual were to put up obstacles of their
own, no matter how small, the crime path will seem to be far less
lucrative in the eyes of even the most desperate criminal. The fight
against cybercrime must start with preventing it in the first place.
Users
The individual should be proactive, not reactive. You do not have to
remain at the receiving end of crime forever. The fight against
cybercrime starts in your very own home. Individuals should not reply
any e-mail from unknown persons, they should learn to report spam
mails to the e-mail server or any know cybercrime research sites. If
there is one thing that makes committing cybercrime lucrative, it is
the fact that victims rarely have the required knowledge or presence
of mind to handle the situation.