Wednesday, December 11, 2019

Cyber Crime free essay sample

Chapter I Introduction When did this new and insidious variety of crime actually come into being? One may say that the concept of the computer came with the invention of the first abacus, hence it can be said that â€Å"cybercrime†. It has been around ever since people used calculating machines for wrong purposes. However, cybercrime has shown itself as a serious threat to society for less than a decade. Before we plunge into the world of cybercrime, it is necessary to have some basic understanding of how the cyber world evolved. In 1981 Ian Murphy, aka â€Å"Captain Zap†, became first felon convicted of a computer crime. Murphy broke into ATT’s computers and changed the billing clock so that people receive discounted rates during normal business hours, Ian Murphy was greeted with 1,000 hours of community service and 21/2 years probation. Cybercrime refers to any crime that involves a  computer  and a  network, where the computers may or may not have played an instrumental part in the commission of a  crime. In its most simple form, cyber-crime can be defined as any illegal activity that uses a computer as its primary means of function. The U.S. Department of Justice broadens this definition to include any illegal activity that uses a computer for the storage of evidence. The term cyber-crime can refer to offenses including criminal activity against data, infringement of content and copyright, fraud, unauthorized access, child pornography and cyber-stalking. The United Nations Manual on the Prevention and Control of Computer Related Crime includes fraud, forgery and unauthorized access in its definition of cyber-crime. Cyber-crime in effect covers a wide range of attacks on individuals and organizations alike. These crimes may include anything from an individuals emotional or financial state to a nations security. There are two main categories that define the make up of cyber-crimes. Firstly those that target computer networks or devices such as viruses, malware, or denial of service attacks. The second category relate to crimes that are facilitated by computer networks or devices like cyber-stalking, fraud, identity-theft, extortion, phishing (spam) and theft of classified information. Defining cybercrime: New technologies create new criminal opportunities but few new types of crime. What distinguishes cybercrime from traditional criminal activity? Obviously, one difference is the use of the digital computer, but technology alone is insufficient for any distinction that might exist between different realms of criminal activity. Criminals do not need a computer to commit fraud, traffic in child pornography and intellectual property, steal an identity, or violate someone’s privacy. All those activities existed before the â€Å"cyber† prefix became ubiquitous. Cybercrime, especially involving the Internet, represents an extension of existing criminal behaviour alongside some novel illegal activities. Most cybercrime is an attack on information about individuals, corporations, or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of informational attributes that define people and institutions on the Internet. Types of cybercrime: Cybercrime ranges across a spectrum of activities. At one end are crimes that involve fundamental breaches of personal or corporate privacy, such as assaults on the integrity of information held in digital depositories and the use of illegally obtained digital information to blackmail a firm or individual. Also at this end of the spectrum is the growing crime of identity theft. These are specific crimes with specific victims, but the criminal hides in the relative anonymity provided by the Internet. Another part of this type of crime involves individuals within corporations or government bureaucracies deliberately altering data for either profit or political objectives. At the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet. These range from spam, hacking, and denial of service attacks against specific sites to acts of cyber terrorism—that is, the use of the Internet to cause public disturbances and even death. Cyber terrorism focuses upon the use of the Internet by nonstate actors to affect a nation’s economic and technological infrastructure. Since the September 11 attacks of 2001, public awareness of the threat of cyber terrorism has grown dramatically. ATM fraud: Computers also make more mundane types of fraud possible. Take the automated teller machine (ATM) through which many people now get cash. In order to access an account, a user supplies a card and personal identification number (PIN). Criminals have developed means to intercept both the data on the card’s magnetic strip as well as the user’s PIN. In turn, the information is used to create fake cards that are then used to withdraw funds from the unsuspecting individual’s account. For example, in 2002 the New York Times reported that more than 21,000 American bank accounts had been skimmed by a single group engaged in acquiring ATM information illegally. A particularly effective form of fraud has involved the use of ATMs in shopping centres and convenience stores. These machines are free-standing and not physically part of a bank. Criminals can easily set up a machine that looks like a legitimate machine; instead of dispensing money, however, the machine gathers information on users and only tells them that the machine is out of order after they have typed in their PINs. Given that ATMs are the preferred method for dispensing currency all over the world, ATM fraud has become an international problem. Hacking: While breaching privacy to detect cybercrime works well when the crimes involve the theft and misuse of information, ranging from credit card numbers and personal data to file sharing of various commodities—music, video, or child pornography—what of crimes that attempt to wreak havoc on the very workings of the machines that make up the network? The story of hacking actually goes back to the 1950s, when a group of phreaks (short for â€Å"phone freaks†) began to hijack portions of the world’s telephone networks, making unauthorized long-distance calls and setting up special â€Å"party lines† for fellow phreaks. With the proliferation of computer bulletin board systems (BBSs) in the late 1970s, the informal phreaking culture began to coalesce into quasi-organized groups of individuals who graduated from the telephone network to â€Å"hacking† corporate and government computer network systems. Spam: E-mail has spawned one of the most significant forms of cybercrime—spam, or unsolicited advertisements for products and services, which experts estimate to comprise roughly 50 percent of the e-mail circulating on the Internet. Spam is a crime against all users of the Internet since it wastes both the storage and network capacities of ISPs, as well as often simply being offensive. Yet, despite various attempts to legislate it out of existence, it remains unclear how spam can be eliminated without violating the freedom of speech in a liberal democratic polity. Unlike junk mail, which has a postage cost associated with it, spam is nearly free for perpetrators—it typically costs the same to send 10 messages as it does to send 10 million. Trichy gets cyber crime cell at police commissioners office: TRICHY: To bring down cyber crimes in Trichy, the city police commissioner, Shailesh Kumar Yadav, inaugurated a cyber crime cell at the commissioners office on Friday. Following the inauguration, the cyber crime cell received three complaints so far. The complaints included online lottery, pornographic messages through SMS to a woman and a life threatening message to another. The cell will function at the ground floor at the office of the commissioner of police. A team of policemen comprising an inspector, a sub-inspector and four from other ranks will initially look after complaints. Further, the number will go up according to the increase in rate of crime. At present, an SI will take care of things until an inspector is appointed. Cyber crime cells were already set up in Chennai and Coimbatore and have been functional so far. Later, Madurai and Tirunelveli will get cyber crime cells. The government has sanctioned Rs 16. 5 lakh to set up a cyber lab in Trichy. As of now, the Trichy police have come across a number of cyber crime cases that mainly include harassment of women through SMS, ATM fraud, online-lottery and online-multi level marketing (MLM) scams. Prior to setting up the cell in Trichy, such cases were being dealt with by the respective police stations. As dealing with cyber crime cases needed a long time and expertise, policemen were struggling with breakthroughs. There was a government order to set up a cyber crime cell in Trichy already. But it was not implemented. So, I took the initiative and inaugurated the cell in  the city, said Yadav. Conclusion: It can be seen that the threat of computer crime is not as big as the authority claim. This means that the method s that they introducing to combat it represents an unwarranted attack on human rights and is not proportionate to the threat posed by cyber-criminals. Part of the problem is that there are no reliable statistics on the problem; this means that it is hard to justify the increased powers that the Regulation of Investigatory Powers Act has given to the authorities. These powers will also be ineffective in dealing with the problem of computer. The international treaties being drawn up to deal with it are so vague that they are bound to be ineffective in dealing with the problem. It will also mean the civil liberties will be unjustly affected by the terms of the treaties since they could, conceivably, imply that everybody who owns a computer fitted with a modem could be suspected of being a hacker. The attempts to outlaw the possession of hacking software could harm people who trying to make the internet more secure as they will not be able to test there systems; therefore the legislation could do more harm than good.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.