Cybercrime in The Society Problems and Preventions
Cybercrime in The Society Problems and Preventions
Cybercrime in The Society Problems and Preventions
Abstract: The world of internet today has become a parallel form of life
and living. Public are now capable of doing things which were not
imaginable few years ago. The Internet is fast becoming a way of life for
millions of people and also a way of living because of growing
dependence and reliance of the mankind on these machines. Internet has
enabled the use of website communication, email and a lot of anytime
anywhere IT solutions for the betterment of human kind.
Cyberc rime is emerging as a serious threat. Worldwide
governments, police departments and intelligence units have started to
react. Initiatives to curb cross border cyber threats are taking shape.
Indian police have initiated special cyber cells across the country and
have started educating the personnel. This article is an attempt to
provide a glimpse on cybercrime in society. This article is based on
various reports from news media and news portal.
1. Introduction
2. Computer as a Tool
When the individual is the main target of Cybercrime,
the computer can be considered as the tool rather than the
target. These crimes generally involve less technical expertise
as the damage done manifests itself in the real world.
Human weaknesses are generally exploited. The damage
dealt is largely psychological and intangible, making legal
action against the variants more difficult. These are the
crimes which have existed for centuries in the offline. Scams,
theft, and the likes have existed even before the development
in high-tech equipment. The same criminal has simply been
given a tool which increases his potential pool of victims and
makes him all the harder to trace and apprehend.
3. Computer as a Target
These crimes are committed by a selected group of
criminals. Unlike crimes using he computer as a tool, these
crimes requires the technical knowledge of the perpetrators.
These crimes are relatively new, having been in existence for
only as long as computers have - which explains how
Cyber Crime in the Society: Problems and Preventions
4. Conventional Crime
5. Cybercrime
8. Cyber Criminals
2. Organised hackers
These kinds of hackers are mostly organized together to fulfil
certain objective. The reason may be to fulfil their political
bias, fundamentalism, etc. The Pakistanis are said to be one
of the best quality hackers in the world. They mainly target
the Indian government sites with the purpose to fulfil their
political objectives. Further the NASA as well as the
Microsoft sites is always under attack by the hackers.
4. Discontented employees
This group include those people who have been either
sacked by their employer or are dissatisfied with their
employer. To avenge they normally hack the system of their
employee.
Trojan attacks: This term has its origin in the word ‘Trojan
horse’. In software field this means an unauthorized
programme, which passively gains control over another’s
system by representing itself as an authorised programme.
The most common form of installing a Trojan is through e-
mail. E.g. a Trojan was installed in the computer of a lady
film director in the U.S. while chatting. The cyber criminal
through the web cam installed in the computer obtained her
nude photographs. He further harassed this lady.
10. Classification
1. Against Individuals
a. their person &
b. their property of an individual
2. Against Organization
a. Government
c. Firm, Company, Group of Individuals.
Against Individuals: –
i. Harassment via e-mails.
ii. Cyber-stalking.
iii. Dissemination of obscene material.
iv. Defamation.
v. Unauthorized control/access over computer system.
vi. Indecent exposure
vii. Email spoofing
viii. Cheating & Fraud
Against Organization: -
i. Unauthorized control/access over computer system
ii. Possession of unauthorized information.
iii. Cyber terrorism against the government organization.
iv. Distribution of pirated software etc.
11. Fraud & Cheating: Online fraud and cheating is one of the
most lucrative businesses that are growing today in the
cyber space. It may assume different forms. Some of the
cases of online fraud and cheating that have come to light
are those pertaining to credit card crimes, contractual
crimes, offering jobs, etc.Recently the Court of Metropolitan
Magistrate Delhi found guilty a 24-year-old engineer working
in a call centre, of fraudulently gaining the details of
Campa's credit card and bought a television and a cordless
phone from Sony website. Metropolitan magistrate Gulshan
Kumar convicted Azim for cheating under IPC, but did not
send him to jail. Instead, Azim was asked to furnish a
personal bond of Rs 20,000, and was released on a year's
probation.
11. Statutory Provisions
• professional criminals;
• cyberterrorists.
Advantages:
Penalizes offenders of cybersex and child
pornography. Offenders of these crimes are now subjected
to punishment under the provisions of the law. The rights
of the children, especially the victims of this law, are
further protected due to the Cybercrime Law.
Protects the people from cyberbullying. Provisions in
the Cybercrime Law are meant to protect individuals and
groups from libellous claims that are meant to attack
them. The law concerns not only incidents of
cyberbullying, but also other instances similar to that.
Disadvantages:
Ambiguous Terms. Important terms in the law are
not clearly defined. This is dangerous as it may have various
degrees of interpretation. For example, online libel does not
define, as to whether or not certain situations are
considered libellous. Ambiguous terms may also be found in
the provision for Real time collection of data, etc.
Threatens Freedom of Speech. The ambiguity of the
provisions, particularly the online libel, can cause people to
be wary of what they say online. The exposition of the truth
may be seen as libellous, depending on the way it is treated.
In short, people are subconsciously being restrained by the
law. Even if the freedom of speech is not unlimited, the law
still inhibits somehow, those individuals that want to speak
out. There is a fear that any negative comment and criticism
may be seen as an “attack,” and can be used against them.
Maintenance of the Law. The implementation and
execution of the Cybercrime Law would alone cost the
Philippines P 50,000,000 a year. Not to mention the actual
prosecution of it. The Cybercrime law, deals with delicate
subject matters, and must be handled with balance and
objectivity in order to make it work.
24. Conclusion
In recent years, internet has very quickly changed
starting with education, startups, and sports to
entertainment medium. So internet is the knowledge
hub for each and every person having little knowledge
about operating the web browser or mobile devices. The
use of internet also contains both advantages and
disadvantages. The worst disadvantage of internet is
Cyber-Crime. Now-a-days Cybercrime is an emerging
threat to all the internet and computer users as well as
society in general. Therefore, various countries
government, police departments and other intelligence
departments are now being strict and reactionary to
these emerging cyber threats and spreading of cyber-
crimes.
Capacity of human mind is unfathomable. It is
not possible to eliminate cyberc rime from the cyber
space. It is quite possible to check them. History is the
witness that no legislation has succeeded in eliminating
crime from the globe. The only possible step is to
make people aware of their rights and duties (to report
crime as a collective duty towards the society) and
further making the application of the laws more
stringent to check crime. Undoubtedly the Act is a
historical step in the cyber world. Further I all
together do not deny that there is a need to bring
changes in the Information Technology Act to make it
more effective to combat cybercrime. I would conclude
with a word of caution for the pro-legislation school
that it should be kept in mind that the provisions of
the cyber law are not made so stringent that it may
retard the growth of the industry and prove to be
counter-productive.
References
Cyber Crimes on the rise in state - Kerala: The Hindu Monday Oct 30,
2006.
Suhas Shetty Cyber Crime Case, First conviction in India under ITA-2000.
Tamil Nadu to come out with IT security policy soon, The Hindu,
Saturday, Oct 27, 2007.
Youth in jail for sending email threat, The Hindu Friday August 10, 2007.