Discuss different forms of cyber crimes

Cyber crimes have become the new trend in this generation. It has been estimated that these crimes have brought a down- fall in the economy since very many billions are getting lost through the use of technologies. In the past, these crimes were not as high as they are today. Individuals have created complex networks that deal with high tech cyber crimes. These systems are using technologies to make the greatest profits in the shortest time possible. The governments have come up with possible ways to curb these criminal activities across the globe. This article highlights some of the cyber crimes that occur across the world.

Introduction

Cyber crimes are offenses against a person or entity, aided by the use of computer technology (Ghosh & Turrini, 2010). Cyber crimes have become a significant national and international issue, especially now that there is a high population that is conversant with the current technology. The cyber crime convention is an instrument created to protect human rights against cyber crimes. The convention requires all the significant parties to create offenses against the violation of human rights through the use of computers.

Cyberbullying

Cyberbullying is the act of harassing, intimidating or harming individuals through technologies. Cyberbullying can as simple as continuously sending messages, emails or images that are annoying or offensive to the receiving party. Despite there being no physical contact, cyber bullying can be traumatizing to an individual, leading to suicide or depression.

In many cases, Cyberbullying is treated as a civil matter, rather than a criminal case. Criminal harassment statutes have been used to bring charges where the cases are severe. Severe cases can be instances that lead to suicide or other tragic incidences. Depending on the intensity of the bullying, many penalties are ranging from civil fines, suspension from institutions, to a jail term.

Fraud and financial crimes                                                                                                                                                                    Fraud are any offense that involves dishonest misrepresentation or omission of data, which will hinder another person from doing something or cause losses. Section 3 of the Kenyan draft bill criminalizes anyone who causes a computer system to perform a function, knowing that the access they intend to secure is unauthorized

Financial crimes happen when financial institutions are attacked through computers. A good example of financial crime is when an end user gets an email which requires them to confirm their account information. Once the end user hands in their information, the criminal gains access to the to the records of the bank user. There have also been increased cases of people hacking into bank accounts and stealing loads of money.

Identity theft

When an individual purport to be someone else, to (or “intending to”) committing a malicious activity, it is said to be an identity theft. Most common sources of identity information are the government and federal websites. One can also hack into another person’s private website that contains relevant information about them to obtain their identity. Identity fraud study of 2015, released by Javelin Strategy and Research, found that there was a new identity theft every two seconds in 2014.

The person whose identity has been stolen may suffer the consequences of the crimes committed by the criminal. In most cases the victims are not aware that their identity has been stolen and, therefore, they cannot report to the relevant authorities. An article in OCTOBER 2010 entitled “Cyber crimes made easy”, explained the level of hacking using the malicious software. The hackers can easily steal credit card information, documents, and even homeland security information. If the hackers can gain all this information, it makes it easier for them to steal someone’s identity.

 

Cyber terrorism

Cyber terrorism is intimidation of a government or an organization by introducing computer-based attacks against computers networks and information stored in them. There has been an increased internet server problem since early 2001.Cyber terrorist map potential security holes in a system and use it to carry out their malicious activities. Another form of cyber terrorism is when an email server, website or computer system is subjected to attacks by a hacker who demands money for them to stop the attacks.

Kaspersky states that large cyber weapons such as  Flame  Virus and  Net traveler Virus, they have potentials of being destructive. Cyber terrorism has been treated as traditional terrorism; this is because it includes the destruction of property or lives particularly through the use of computers. Cyber Terrorism causes fear and panic to the parties affected and it is a public concern.

Conclusion

Cyber crimes have come in all forms since the introduction of technologies in the society. This crime has affected individuals entities and the state at large. There has been an increase in the rise of the cyber crimes, so states have come up with applicable laws to reduce the occurrence of this offense. These laws have apparently come up with just ways to deal with cyber crimes and fair measures to compensate for the victims of cyber.

Though many people have been using this technology ,and the cyber crimes laws have been created for this them, they are not aware of the rights they have incased of a cyber offense. Computer users should be educated about their human rights when it comes to cyber rights. They should also be aware of where they should report such cases so that they can freely enjoy their human rights

References

Gordon, S., & Ford, R. (2006). On the definition and classification of cybercrime. Journal in Computer Virology2(1), 13-20.

Ghosh, S., & Turrini, E. (2010). Cybercrimes. Berlin: Springer.

Yilma, K., & Abraha, H. (2015). The Internet and Regulatory Responses in Ethiopia: Telecoms, Cybercrimes, Privacy, E-commerce, and the New Media. Miz Law Rev9(1), 108. http://dx.doi.org/10.4314/mlr.v9i1.4

Leave a Reply