Before discussing various types of cyber crimes and their methods of doing, first we will discuss the reasons for the increasing trend of cyber crimes. Here we will discuss some common causes of cyber crimes:

A. To get financial benefits at low risk:  As in many crimes committed outside the Internet, money is a major motivator for many cyber criminals. Especially because when you are hidden behind the network, the chances of crime are less. The perception of low risk and much more financial advantage motivates many cyber criminals to involve criminal activities.

B. Negligence: Negligence is very closely associated with human behavior. Therefore, while protecting the computer system, it is very likely that there may be no negligence, which in turn offers the cyber criminal an opportunity to get access to the computer system and control.

C. Loss of evidence: Loss of evidence is a very common and clear problem because all data are regularly destroyed. The collection of data out of the regional border also disrupts the crime investigation system. This important feature of the computer system is that evidences are destroyed very quickly. Criminals find it easy to destroy evidence immediately after crime, making it difficult for investigating agencies to collect relevant material evidence to punish the culprit.

D. Uncertain legal jurisdiction:  Most internet crimes cross international borders. Law enforcement agencies are always limited to the limits of jurisdiction. We have federal law enforcement agencies, which cross the boundaries of the city and the state, but they cannot easily cross international boundaries.

Types of cyber crime

Cyber offenses can be roughly divided into three categories, namely, crime: 1) Personal 2) Property 3) against the government.

Each category can use different methods and the methods used vary from one criminal to another.

1. Cyber Crime against Person: Such cyber crimes can occur in forms such as cyber harassment, pornography distribution, smuggling and grooming. Today, law enforcement agencies are taking this category cyber crimes very seriously and are deliberately working together to reach and arrest the criminal.

A. Cyber oppression: In harassment, constant messages are sent to the reluctant recipients, causing them torture, anxiety and mental torture. Sending unwanted emails or spams is a violation of the right to privacy. Cyber harassment involves following the activities of the person on the Internet by entering the chat-room used by the victims. Cyber harassment is usually with women who are harassed by men. Cyber oppressors do not have to get out of the house to harass their goals and are not afraid of taking physical revenge, as it cannot be physically touched in cyber space. For example: A respected graduate from the University of San Diego in the USA terrorized five women universities on the Internet for more than a year. The victim received hundreds of violent and threatened emails, sometimes four or five messages a day. The student, who accepted the blame, told the police that he committed crime because he felt that women were laughing at him and causing others to ridicule him. In fact, the victims had never seen him.

B. Cyber infamy:  This means to discredit a person through anything that can be read, seen or heard with the help of a computer. Any derogatory statement that intends to harm a person’s name or reputation on a website or by sending an email to another person, becomes a crime of cyber infamy. For example:- Abhishek, a teenage student was arrested by the police station police after a complaint with a girl in India that he tarnished her image on social networking site Orcat. Abhishek allegedly created a fake account in the name of the girl and posted her mobile number on profile. The profile was designed in such a way that those who came to his profile had made a lot of comments. The police station cyber cell tracked Abhishek from the false email account that he made to open the account.

C. Violation of privacy: Under Section 72 of the Information Technology Act, 2000, where any person disclues any electronic book, register, information or document without an illegal and consent of the person concerned, he will be responsible for violation of privacy and privacy.

2. Cyber Crime in Economic Offenses:  Money is the most common purpose behind all crimes. The same is true in cyber crimes. It is seen worldwide that cyber crimes are growing rapidly not for “revenge” or “fun”, but for economic purpose.

A. Hacking:  In today’s time hacking is the most common form of cyber crime. The reason behind the involvement of a hacker in this crime can be from money to political selfishness or only thrill. There are many types of hacking such as website spoofing, e-mail bombing, trojan attack, virus attack, password cracking etc. Hacking in easy words means obtaining information without permission from computer network. For example: – A person can enter the victim’s computer and steal the information of username, password and credit card. Then he can recover money from them by threatening to erase their data and destroy the computer.

B. E-mail bombing and sprugging: E-mail bombing means sending such a large number of e-mails to the victim that the victim’s email account (in a person’s case) or e-mail server (in case of company or email service) crashes. For example: – A foreigner who lived in Shimla, India for almost 30 years wanted to take advantage of a scheme launched by the Shimla Housing Board to buy land at a lower price. When he applied, his application was rejected as the scheme was only for the citizens of India. Thereafter, he decided to take revenge and sent thousands of e-mails to the Shimla Housing Board and continued to send e-mail until his server crashed. Email Spoofing:-A spuffed e-mail is an e-mail that seems to come from a source, but in reality it is sent from another source. For example: Pooja’s email address is pooja@asianlaws.org. His ex-boyfriend Sameer spoles his e-mail and sends obscene messages to all his friends. Since e-mails are coming in the name of worship, his relationship with his friends may deteriorate.

C. Virus:  Computer viruses are small software programs designed to spread from one computer to another and obstruct the operation of computers. A virus can spoil or remove data on the victim’s computer, can spread itself in other computers using the victim’s e-mail program, or even erase everything on the victim’s hard disk. Viruses spread most easily through attachment in email messages. For example: – In 2002, the manufacturer of Melissa Computer Virus was convicted. The virus was spread in 1999 and damaged more than $ 80 million by disrupting individual computers, businesses and government computer networks.

D. Trojan:  Trojan is an unauthorized program that gains control over another’s system, by presenting itself as an authorized program. It is a unauthorized program that works from inside, which looks like an authorized program, hiding what exactly is doing. For example: – A young woman reporter was working on an article about online relationships. The article was focused on how people can easily find friendship and even love on the Internet. During his research, he made a lot of online friends. One of these ‘friends’ infected his computer with Trojan. The young woman lived in a small bedroom apartment and her computer was located in a corner of her bedroom. He did not know that Trojan would activate his webcam and microphone even when the internet is closed. A year later, he realized that hundreds of his pictures were posted on pornographic websites worldwide.

E. Internet time theft: It implies the use of internet hours paid by another person, by an unauthorized person. For example: – In May 2000, an engineer was arrested by Delhi Police who misused the login name and password of the customer whose internet connection he established. The case was registered under the Indian Penal Code and the Indian Telecom Act.

F. Web Jacking:  Just as traditional airplane is used using kidnapping force, similarly web jacking means forcibly taking control over a website. Its purpose is usually similar to kidnapping for ransom. Individuals have either monetary or political objectives; For example:- When someone Cracks the password of a website and later changes it to forcibly controls it. The real owner of the website now has no control over what appears on that website.

G. Digital forgery:  Digital technology provides facility to create a complete replica of documents. By using computers, the document can be made very easily by preparing currency notes, postal cards, revenue tickets, marksheets, birth certificates etc. Example:- In October 1995, the Economic Offenses Branch of the Crime Branch in Mumbai (India) seized more than 22,000 fake share certificates of eight reputed companies, priced at Rs 34 crore. These were reportedly designed using the desktop publication system. Examples:- Abdul Karim Telgi, along with many others, were convicted for copying several billion rupees stamp paper and postage stamps in many cases in India.

H. Violation of theft and intellectual property rights:  One of the most serious crimes committed in cyber space is theft and violation of intellectual property rights. Intellectual property consists of several rights, violating software theft, copyright violations, trademarks and service mark violations, computer source code theft, etc. Due to the fastest telecommunications and information systems, it has become the most convenient medium for business transactions. Digitization and internet blast have made trade secrets, trademarks, logo, computer source code theft copy and illegal distribution more easier for those who violate intellectual property rights. Computer hackers steal important intellectual property by copying software, music, graphics/pictures, books, movies etc. available on the Internet. Usually, the materials that want to copy the community or criminals are protected by copyright, which means that a person cannot make copies of the copyright holder without permission. It is a punishable offense under the Copyright Act. The trademark is also one of the intellectual property rights that protects the reputation and good names of traders and businessmen. These traces are to separate the items of traders or businessmen from other traders in the same region. Passing-off verbs also fall under the Trademark Act, in which a businessman sells his low quality goods in the name of the same distinguished businessman who sells equal commodities or articles. For example, if a particular logo is usually connected to the product ‘A’ and used in relation to it, then another person will use the product in relation to the product ‘B’ and the work of trademark will be the task of violation and passing-off. If these illegal activities are carried out through computer and internet use, this information will affect the provisions of Technology Act 2000.

3. Cyber Crime against the government machinery: Internet development has shown that individuals and groups are threatening the government and citizens of the country through cyber space. Cyber terrorism is a specific type of crime in this category.

A. Cyber Terrorism:  Despite light physical and border security, terrorism has been a complex problem for the government and policy makers. With the emergence of new communication technologies, there has been a radical change in the nature and manner of the operation of terrorism, which has emerged in a new type of cyber terrorism. Cyber terrorism and cyber space include illegal attacks or attacks against computers, networks and stored information, so that the government and its people can be intimidated to carry forward political, social and ideological objectives. A ‘cyber terrorist’ can be defined as a person who uses the computer system to achieve one of the following objectives:- • Showing fear to a class of public or public; Or • adversely affect the harmony between various religious, racial, linguistic or regional groups or castes or communities; Or • to force or pressurize the government established by law; Or • to endanger the sovereignty and integrity of the nation.

Every work done in fulfilling the above objectives will be the work of cyber terrorism. The most likely targets of cyber terrorists are military establishments, power plants, air traffic control, banks, telecom networks, fire fighting and rescue system etc. Cyber terrorism has become an attractive option for modern terrorists for many reasons, some of them are as follows:- • It is relatively easy and cheaper than traditional terrorist methods. • It has the ability to directly influence a large number of people at the same time. • It is easy to detect or avoid litigation in cyber offenses. There is no need to emphasize that the interrelation cyber terrorists are misusing their cyber activities to carry out their cyber activities in the single worldwide web of the national network.

Read Also:

  1. Something About Cyber Crime
  2. Cyber Crime In India
  3. Cyber Fraud And Fraud Types You Should Be Aware
  4. Fraud And Scams
  5. Prevention Of Cyber Financial Fraud Scams: Role And Responsibility Of International Organizations
  6. Fraud Scams
  7. Common Types Of Health Fraud Scams
  8. Skokka, Oklute And Locanto Platforms Sex Romance Frauds Scams Are Increasing Day By Day
  9. Real History Frauds And Scams Of BJP Government
  10. Preventive Measures From Matrimonial Fraud And Scams
  11. What Are Matrimonial Frauds and Scams
  12. Types Of Scams And Frauds
  13. Types Of Frauds And Scams
  14. What Are Fraud And Scams
  15. Artificial Intelligence: How Fraud Happens Through Voice, How To Avoid It
  16. Immediate Requirement Of Judicial Reforms To Deal With Financial Fraud And To Ensure Compensation For Victims
  17. Bribery And Threats After Online Dating Or Romance Scams
  18. Public Warning: Beware Of Online Dating And Romance Scams Connected To These Bank Accounts
  19. ED Enforcement Direactorate (ED) Department Action On Anil Ambani Companies Completed: Raids At 35 Places In 3 Days; ₹ 3000 Crore Loan Fraud Allegations
  20. Investigation Of India Digital Financial Scenario: A Comprehensive Study Of Cyber Fraud Trends And Digital Literacy In India
  21. Fraud Scam Of Escort Agencies
150540cookie-checkCauses And Types Of Cyber Crimes

Hey!

I’m Bedrock. Discover the ultimate Minetest resource – your go-to guide for expert tutorials, stunning mods, and exclusive stories. Elevate your game with insider knowledge and tips from seasoned Minetest enthusiasts.

Join the club

Stay updated with our latest tips and other news by joining our newsletter.

Translate »
error: Content is protected !!

Discover more from Altechbloggers

Subscribe now to keep reading and get access to the full archive.

Continue reading