Advertisement

How To Prevent And Respond To Cyber-Crime Globally

SHARE:

This article provides readers with a brief overview of cyber-crime , a topic that has gripped the world of cybernetics , law enforcement age...

This article provides readers with a brief overview of cyber-crime, a topic that has gripped the world of cybernetics, law enforcement agencies and Justice Departments of late in the wake of hacking of high profile websites across the globe.

A friend of mine once dubbed the internet as the '1st wonder of modern civilization' and its obvious he is not far from the truth.

The internet has come to stay and as mankind evolves through his evolutionary pathway, it is going to play a crucial role in all facets of human endeavor.

Presently the internet is mainly used for issues of commerce and communication.

Prevent And Respond To Cyber-Crime
In future, the healthcare sector is likely to take a bigger share of internet activities as 'e-lab and e-diagnostics protocols' allow DIY screening of illnesses through portable communication gadgets such as the cell-phone or electronic tablets.

As the use of the internet becomes ubiquitous so would the prevalence of cyber-crime increase exponentially!

Before we get down to the nitty-gritty of the topic, let's define cyber-crime.

Cyber-crime includes all crimes committed in any computer network infrastructures or environments.
Let's have a roller coaster ride through types, motives, culprits and victims of cyber-crime. How would you report issues pertaining to cyber-crime, where to report cyber-crime and how to prevent cyber-crime?

Types of cyber-crime


  •  Computer intrusion or Hacking, Password trafficking.
  •  Counterfeiting of currency.
  •  Child Exploitation and Internet Pornography.
  •  Internet fraud and Spam mailing.
  •  Internet harassment.
  •  Internet bomb threats and terrorism.
  •  Trafficking in explosive or incendiary devices or firearms over the Internet.
  •  Pyramid schemes.
  •  Fake lotto and gambling sites.
  •  Fake immigration assistance sites.
  •  Fake foreign employment sites.
  •  Phony online dating partners.
  •  Copyright piracy.
  •  Trademark Counterfeiting.
  •  Theft of Trade Secrets.
  •  Hacker-maniacs, Pranksters.
  •  Connection disruption by uploading and sending worms, viruses and botnets.
  •  Extortion and International Money Laundering, Identity Theft.
  •  Committing fraud on security funds, inside trading via the web.
  •  Unauthorized hacking into computer systems, selling counterfeit computer equipment.
  •  Uploading, running or hosting phony domain websites.
  •  Phishing and identity theft.
  •  Online impersonation of individuals or business firms(identity theft)
  •  Computer programmer in unauthorized computer access.
  •  Creating and disseminating fake documents, selling counterfeit goods.
  •  Illegally accessing government computer or bringing it down.
  •  Domain name theft, illegal gambling offences, sending international botnet to create massive breakdown of computer systems or paralyzing computer networks
  •  Copyright infringement, trafficking in counterfeit goods or human beings
  •  Selling counterfeit software.
  •  Using malicious advertisement to lure people into disclosing their personal information,
  •  illegal access, illegal interception, data interference, system interference, misuse of devices, computer-related forgery, computer-related fraud, offences related to child pornography and offences related to copyright and neighboring rights.
  •  Fraud on social networking sites relating with use of false identity.

Motives for cyber-crime


  •  Staff disgruntled due to low remuneration, infighting within rank and file of work force because of parochial interests.
  •  Identity thieves and cyber-stalkers trying to make some money.
  •  Hacking activists or advocacy groups hoping to score political points.
  •  Hacker-maniacs, pranksters, erring dilettante, malicious users sending viruses, worms or botnet to infect people's computer for the fun and adrenaline boost.
  •  Cybernetic expert wishing to cash in on vulnerable and lucrative computer networks.
  •  International cyber-spymasters engaged in espionage and cyber-wars.
  •  Troubleshooting cybernetic gurus or staff belonging to the Intelligence community.
  •  Renegade law enforcement staff wishing to cash in on a loophole or sabotage the database for capricious reasons.
  •  Pranksters and deranged individuals (hacker-maniacs) who love destabilizing any vulnerable computer network.
  •  Fraudsters who steal money from gullible individuals.
  •  Inquisitive and adventurous computer nerds wishing to try something new.
  •  Unemployed techno geek trying to make a living.

The culprits


  •  Cyber-hoodlums Hackers, fraudsters, cyber-bully, cyber-hypnotist, Internet Pedophiles, cyber-dissidents, disseminators of racists and xenophobic materials, cyber-gangsters and homicide criminals, internet human organ racketeers, internet dating sites scammers, unemployed youth and pranksters.
  •  Cybernetic insider, phishing group, cyber-extortionist, cyber-blackmailer, cyber-defamer, cyber-stalker and spammers.
  •  Spymasters, renegade computer experts.

The victims

  •  Unemployed people.
  •  Institutions with vulnerable computer networks.
     Lonely individuals who live reclusively.
     Internet dilettante.
     Individuals wishing to get involved in pyramid schemes.
     Public or Private firms that are engaged in eCommerce.
     Public or Private firms with a treasure trove of vital information.
     Governments running databanks with priceless sensitive information.

Where to report cyber-crime


Depending on the type of cyber-crime committed, you can report the matter to any of the following agencies,

  •  The Federal Bureau of Investigation (FBI)
  •  The United States Secret Service
  •  The Internet Crime Complaint Center (IC3)
  •  The United States Immigration and Customs Enforcement (ICE)
  •  The United States Postal Inspection Service
  •  The Bureau of Alcohol, Tobacco and Firearms (ATF)
  •  Internet Crime Complaint Center
  •  The National White Collar Crime Center (NW3C)
  •  United States Department of Justice
  •  Stopfakes.gov
  •  DMCA agents of various firms and institutions
  •  Department of Homeland Security's National Infrastructure Coordinating Center
  •  Attorney's of firms and institutions
  •  U.S. Computer Emergency Readiness Team (U.S. CERT)
  •  Your individual government bureau or its appropriate law enforcement agencies and Justice Departments

How to prevent cyber-crime


Governments and citizens must be proactive in the quest to prevent the underworld from taking over the internet to create the same chaos and anarchy they have wrecked on civilization in the real world. This could be achieved by implementing the following suggestions.

  •  Elucidate international strategies aimed at combating computer and intellectual property crimes worldwide.
  •  Create a name and shame cyber-crime map website, follow UK example.
  •  Monitor all ISP transmitting audio-visual messages via the web.
  •  Remunerate your staff well but snoop on them.
  •  Form an alliance with national or foreign competitors to share anti-cyber-crime information.
  •  Conventions and Agreements should have a global outreach and not limited by the parochial interest of a few affluent nations.
  •  Need for a global attempt at archiving all information of the internet by ISPs so that data could easily be traced. Such services rendered by the ISPs should be paid for by the secret service of the nation under whose jurisdiction the activity took place or where the cloud computing workstation is located.
  •  Verify identity of internet users before they embark on any financial transaction.
  •  Harmonize the domestic criminal substantive law elements of offences and connected provisions in the area of cyber-crime
  •  Clarify code of conduct for internet users and write the penalty in the statute books without any form of ambiguity.
  •  Involve the United Nations on all internet Agreements and Conventions.
  •  Need for international co-operation pursue a common criminal policy aimed at the protection of society against cyber-crime, especially by adopting appropriate legislation and fostering international cooperation? No country can curb cyber-crime alone.
  •  Need to train more cyber-detectives
  •  Need to sensitize the public about the dangers of not reporting or conniving with cyber-criminals Internet-related crimes, like any other crime, should be reported to appropriate law enforcement and investigative authorities at the local, state, federal, or international levels, depending on the scope and enormity of the crime. Citizens who are aware of federal crimes should be compelled to report them to local offices of federal law enforcement agencies.

It has been rightly observed that crimes committed over the Internet pose special challenges for law enforcement. Hence, there is a great need for large number of specially trained cyber-detectives and criminologists.

There is also a need to design new and fair rule of engagement for everyone; otherwise the World Wide Web might be in for a futuristic mutually assured destruction apocalypse.

We should all ensure that there is freedom on the internet in line with all democratic principles. However, we should clamor for the setting up of internet crime prevention and busting organizations to curb the activities of the few miscreants that are sabotaging the World Wide Web rather than advocating censorship.

Massive hacking of high profile website usually create furor in the media and congress. But is censorship necessary in order to curb the scams, thefts, frauds, pranks and cyber attack incidences on the internet?

Should governments censor or democratize the internet?

In conclusion, it would be disingenuous for any cybernetic expert to claim that cyber-crime has no border or the culprits are anonymous. Cyber-crime differs from real time crime because all electronic activities can be traced easily if they are decentralized, enrolled, verified, monitored and archived when any internet transaction occur. If all countries are persuaded to ratify IP Agreements and Conventions, all activities would be traceable.

Then, cyber-crime prevention and busting tactics would be workable.
I hope the internet policy moderators and formulators are listening.

COMMENTS

Advertisement
Name

Abigail Abbey,1,Adelina Nasyrova,1,Adeza Vida,1,AOL Aim Live ATT,1,AOL Aim Live ATT Email,1,Aside,10,ATM Scams,1,Cashier's Check Fraud,1,Craigslist,1,Craigslist Job Scam,2,Craigslist Scams,3,Credit Card Scam,6,Credit Report,1,Credit Report Scam,2,Cybercrime,2,Dating Scams,1,Email,3,Email Fake,1,Email Man-Male Scammers,2,Email Men - Male Scammers,2,Email Scam,10,Email Scam List,5,Email Scammers,2,Fake Account,3,Fake Account BRAD PART,2,Fake Account GEN. STANLEY MCCHRYSTAL,1,Fake Account JASON B. JORDAN,1,Fake Accounts,1,fake acount,2,FAKE-ACCOUNTS USED FROM SCAMMERS,1,Financial Fraud,10,GEN. MARK A. WELSH III,1,GEN. STANLEY MCCHRYSTAL,1,Health Care Fraud,2,Hotmail,1,Hotmail.com,1,Identity Theft,1,Investment Scams,4,job,4,Job Scam,4,job scams,3,job search,2,job search scams,2,jobs,1,jobs scams,2,Jobsearch Scams,11,Loan Scam,1,Military Scammers,16,Military Scammers GEN. MARK A. WELSH III,1,Military-Scammer,35,MSN,1,Nigerian 419,4,Outlook,1,PayPal,1,Romance Scammers,20,Romance Scammers - OLGA ULITINA,1,Romance Scammers Adelina Nasyrova,1,Romance Scammers Adeza Vida,1,Romance Scammers Adolfo Ferraro,1,Romance-Scammer,75,Rommance Scammers,1,Russian Email,1,Russian Email Scam,1,Russian Scam Email,1,Scammer,15,Scammers,27,scams,4,Scams List Online,4,Scams Ways,5,shopping scam,1,Tax Fraud,1,Types Of Scams,1,Video Scammers,16,
ltr
item
Scammers Off | Scams and Fraud Examples: How To Prevent And Respond To Cyber-Crime Globally
How To Prevent And Respond To Cyber-Crime Globally
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx8yk2ikSzGmk641CmEE0cKKK-EsnU8sPNBBoFGZOO9ZHd1acyHURv5ZjWuSp9Fdb6Dz0UFPz_COO6bbpM5hFVyJY0azKDN5O1dcI_KOJgQN6UchC6LZ5ljcVoS1L2C2VzmXPaDREp1AFk/s320/Prevent+And+Respond+To+Cyber-Crime.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx8yk2ikSzGmk641CmEE0cKKK-EsnU8sPNBBoFGZOO9ZHd1acyHURv5ZjWuSp9Fdb6Dz0UFPz_COO6bbpM5hFVyJY0azKDN5O1dcI_KOJgQN6UchC6LZ5ljcVoS1L2C2VzmXPaDREp1AFk/s72-c/Prevent+And+Respond+To+Cyber-Crime.jpg
Scammers Off | Scams and Fraud Examples
https://scammersoff.blogspot.com/2016/06/how-to-prevent-and-respond-to-cyber-crime.html
https://scammersoff.blogspot.com/
https://scammersoff.blogspot.com/
https://scammersoff.blogspot.com/2016/06/how-to-prevent-and-respond-to-cyber-crime.html
true
5930868706800931607
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS CONTENT IS PREMIUM Please share to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy