Thursday, January 17, 2019

Cyber crime Essay

The proliferation of the custom of mesh technology for whatever time without delay has seen the growth of abominations that be committed over the net which is also referred to as the cyberspace. These horrors ar referred to as cyber- aversion. Basic each(prenominal)y cyber-crime is part of electronic crime and it is a criminal activity that is executed through reck iodiner network (Balkin, 2007). traditionally the term espouses such(prenominal) crimes as fraud, theft, forgery, blackmail, and other illicit activities that be through over the network.However as the use of computer networks have change magnitude and more sheaths of computer crimes have come up and the definition of the crimes has also become expounded. The web is a foundingwide thing in which materials atomic number 18 posted and accessed from all corners of the innovation. This worldwide coverage of the net give ways rise to a diversity of affirmation that is found in the net and it follows that cyb er-crimes argon a worldwide crimes. The nature of the differences in cultures in the world for practice session give rise to a need make sure the net is an verifiable platform of information dissemination, be it religious, social, or policy-making material.The growth of caper over the internet e-business has also brought in another type of cyber crime whereby people may defraud potential customers of their money by advertisement goods, services or even jobs that argon non existent. Other types of cyber crimes exist, and they shall be looked at in the following discussion. According to the USAs Department of Justice, on that point have been very more cases of cyber-crime that are reported annually. This made the US government to join hands with the European councils Convention against Cyber crime in 2006.Look more the issues concerning identity theft essayTypes of cyber-crimes The crimes that are common in the cyber are fraud. Fraud is a dishonest falsifying of facts that is intended to cause loss for somebody else and benefit the fraud doer. This includes changing inputs in internet in unauthorized manner, altering or deleting entropy that is already stored in the net, altering existing system tools, manipulating bank systems so as to make unauthorized access to bank ATMs (Shinder, 2002). Offensive content is another form of cyber crime. Harmful contents of websites are considered as cases of cyber crime.Also distasteful or offensive the information carried in a cyber sites is not allowed. All materials that have the potential of inciting hate crimes in societies, materials that encourage political rebellion, or blasphemous material are not allowed also as they are basically offensive in authoritative manner. If these kinds of materials are found posted on the web their owners are accuse of cyber crime. The reason for the restriction of these materials is that they lead to hostilities establish on faith, race, etc that the modern world does not have a place for. Harassment is another type of crime that occurs over the net.It includes the circulation of derogatory comments, and obscenities that are directed at definite individuals that are based on their aspects of gender, religion, race, sexual orientation or bailiwick identity. This is mainly feigne through news groups, e mails with hate messages, and confer rooms. Another crime that is supported by the net is drug trafficking. medicate trafficking is done through the net in that the nefarious substance sellers use encrypted e-mail and other available internet technologies. The substances themselves are delivered to the buyer after they make payments.This crime leads to more sales for the drug sellers since the trade is curtail in most countries and the intimidated users of the drugs resort to this option as a save haven. Cyber terrorism is another kind of cyber crime. This crime is the coercion or intimidation of organizations or the government to advance a ce rtain persons political or social goals. This is done by launching onsets on their computer networks, and the information stored there using computer. This vice can be be as an act of terrorism that is committed via the use of computer resources or cyberspace.It ranges from simple propaganda to the use of the internet to commit a serious terrorist attack (Blane, 2003). Hacking activities are classified as acts of cyber terrorism. This activity is the attacking of websites of families, individuals, and groups within a network, in order to collect information that is useful for criminal activities such as blackmailing, robberies, or ruining the activities of the web owners. A Canada case in 2000, which involved a Mafia boy who had committed 54 counts of illegal access to computers, is a classical case of cyber crime.The defendant also go about ten counts for mischievous data attacks on dell computer, yahoo, among other companies websites. on that point are m each let downs in the fight against cyber crime. Many countries about the world lack systems and constabularys that are aimed at combating the crime. In extreme cases there are nations that condone or encourage some cyber crimes. In many of the countries the burden of battle cyber-crime is left to corporations that are affected in one way or the other by the vice. Some of the countries have laws against the crime but the law is not implemented while others have proposals for the law but they have not made the law.Nigeria here serves as an example of such a boorish which has a good plan for fighting the crime only that the proposals have not been made into law. The bill addressing the crime is in the national assembly waiting to be discussed. If the bill were passed, cyber criminals would be prosecuted and duly punished. This go slow attitude is seen in many countries that dont seem to realize the danger that cyber-crimes pose to the victims. In any case government agencies like the police force, and crime investigation departments are among the leading victims of cyber crimes.Also politicians get lots of cyberspace blackmail and thusly they should be in the forefront of finding a solution to the worry. again cyberspace crimes are an image destroying affair. For instance a cyber-criminal operating from a country A to injure a victim in country B destroys the overall image of their country and this may translate to less(prenominal) trust for his country in the eyes of other countries. The result of this may be economical loss of for the country that hosts the cyber-criminals as web based companies refrain from investing in the country (Yar, 2006). trade protections against cyber-crimes The enactment of laws against cyber crime by the governments has been a move in the right direction. In US there are such laws as Computer Abuse and Fraud constitute that address issues of fraud that is related to computers, SPAM act that is intended to at controlling assaults of non solicited p ornography. Other laws address extortion threats, identity theft, wire fraud, electronic communications privacy, and secrets of trade (Thomas, 2000). Legal frameworks that address each emergent form of cyber-crime should be made.The laws that are made should be implemented and avoid the situations from the past where some of the laws have not been put into practice. There should be cooperation with among the stakeholders concerned in the cyber-crime inclusive of all operators and technical solution providers in the sector. Such cooperation is a fast way to eliminating cyber criminals as their life in the community lead be made difficult. The operators of cybercafes should not involve themselves with people who abuse the internet and commit the crimes. Public awareness on the crimes should be instituted.This campaign should inform the public about the dangers involved in the crimes. Awareness about cyber-crime should be created among members of the society so as to cut the number of cases that are apparent to occur if the people are not aware. The structure of the Europes pattern against cyber-crime is that nations who become signatories of it harmonize their national laws, improve their investigative subject on the matter and cooperate with other nations in the fight against the crimes. If this convention is adopted internationally it is able to stop the problem to a not bad(p) extent.This is due to the trans-border nature of the problem. Since the net is used and violated worldwide and so a workable solution to the problem should be worldwide. If the convention is not adopted in all countries, and cyber-criminals continue to operate freely there still will be effects on those countries that have formalise the convention (Shinder, 2002). On top of all this, victims of cyber-crimes should report the cases to the authorities for actions to be taken. Cyber criminals should be named and shamed so that they may cease from the practice. ConclusionCyber crimes are very prevalent in todays world and all actions that is required should be done to curb them. The current actions taken against the crimes are not enough and more should be done to address the problem as it posses a grave danger to the entire population of the world as it has the potential to influence political, social and economical wellbeing of communities, individuals and institutions. Protection of the selfs interest can only be guaranteed through the concerted efforts of all stakeholders and nations in fighting the crime. ReferencesBalkin, J. (2007). Cybercrime Digital Cops in a Networked Environment NYU Press Blane, J. (2003). Cybercrime and Cyberterrorism. Nova Publishers Shinder, D. (2002). Scene of the Cybercrime Computer Forensics Handbook. Syngress Thomas, D. (2000). Cybercrime Law Enforcement, Security and watch in the entropy Age. Routledge Yar, M. (2006). Cybercrime and Society Crime and Punishment in the Information Age. SAGE http//www. usdoj. gov/criminal/cybe rcrime/ http//computerworld. co. ke/articles/2008/11/10/nigerian-govt-rated-low-curbing-cybercrime

No comments:

Post a Comment