Professional Documents
Culture Documents
10
to check out new people for friendship or romance, but be aware that, while
some people are nice, others act nice because they’re trying to get something.
Flattering or supportive messages may be more about manipulation than
friendship or romance. Be cautious when communicating with people you don’t
know in person, especially if the conversation starts to be about sex or physical
details. Don’t lead them on - you don’t want to be the target of a predator’s
grooming. The only way someone can physically harm you is if you’re both in the
same location, so – to be 100% safe – don’t meet them in person.
Cyber threats have found its way into the unethical way of doings human
predator in the cyberspace that always tries to flourish its perilous behavior
against its target in the cyberworld that resulted into committing cybercrimes.
According to Carter (2002) in his article about forms of cybercrime that the term
cybercrime is such a broad one and is usually applied to a broad range of crimes
in which computers are, in some manner, involved. The article has divided into
two parts such as nature of cybercrime and the types of persons who perpetrate
cyber offenses and briefly discusses the types of statutes used to prosecute
them. In the nature of cybercrime, include computer as target of crime, Computer
as Tool to Commit an Offense, and Computer as Repository of Evidence of a
Crime. The article examines the differences between each of these groups.
Computer as target of crime, in this type of offense the perpetrator’s purpose is
not to steal data or software, but is, instead, to alter the data or the software
contained in the victim’s computer. A common example of a computer as target
offense is where the perpetrator accesses the victim’s computer for the purpose
of planting a destructive virus. For computer as tool to commit an offense, in
some instances the crime committed with the computer may not, for technical or
11
other reasons, fit within the statutory definition of a traditional offenses even
though the result brought about by the use of the computer is clearly within the
concept of a traditional criminal statute. Finally the last one, repository offenses
pose several challenges for law enforcement, the most important of which is how
to acquire the electronically stored evidence.
12
possess much information about the same. However, some of the criminal laws
were on the order which regulated cyber crimes in the ancient days and some of
the criminal barricades were bog-standard. But as times changed, so did the
environment of cyber crime. Additional technological developments and cheaper
access to the software and hardware meant that the Net became the area where
anyone could access data and more threatening frauds came to the notice of the
system. Another threat against person is On-Line ID Theft Threat and according
to Carey (2008) in her article that Pop Ups at Gaming Sites- You've Just Won!,
and Spearphishing in E-mails- Important Notices are just other types of On-Line
Identity Theft Threats. Law enforcement officials have entered on line chat
groups and showed up at ball parks to show young kids how something as
simple as a photo with a team uniform can lead child stalkers right to their ball
field. The public has a heightened sense of protecting children on-line but adults
are often just as easy prey when it comes to fraud and identity theft.
13
and loss of data and damage to systems, through malicious code, such as
worms and viruses. According to www.stmargaretssec.moe.edu.sg(2008) that
the Internet can spark imaginations and open young minds. It’s also loads of fun.
However, there are certain places in the digital world children shouldn’t go,
certain people and kinds of information they aren’t prepared to encounter.
Children can easily stumble across sexual, violent, or otherwise offensive Web
sites. They may receive unwanted attention from adults in chat rooms or over
email. They’re the unwitting targets of deceptive online advertising and marketing
campaigns, some of which attempt to elicit private, family information.
14
harm children to search for and contact potential victims. Online diaries and
social networking sites are a popular way teens connect with one another. There
are several benefits to social networking, but the reality is that there are also
risks.
15
has been aided by the increasing role that the Internet plays in everyday life,
along with the ease in setting up Web sites, according to Ferguson (2007) in
news.cnet.com.
In the global state of Cybrecrime act law, Cybercrime has become a huge
challenge for every e-country in the world especially in the international
Information and Communications Technology. Every concerned country has its
respective initiatives in addressing this global issue in the information technology
however this problem still remain never ceased issue because of the wideness of
the cyberspace that enable cybercriminals to hide. According to Sharma (2007)
that the cyber world today is facing the most complicated problem of fighting a
crime which is hard to detect and curb in the borderless world. Cyber crime
though has its origin in the conventional crime, it is hard to detect because of the
highly technical mode of committing it. It is ironical that the advancement in the
computer network worldwide, which has brought all the nations together on a
global stage, has given rise to such an alarming situation. The law enforcement
agencies, unaware of the technological know-how find it hard to nab the criminals
involved in the offences related to cyber space. The main categories of cyber
crime include hacking, theft of information, data diddling, virus attacks, web
jacking, Trojan attacks etc…The Federal Bureau of Investigation has set up the
National Infrastructure Protection Center which is trying hard to enhance
communication levels between different government agencies for curbing cyber
terrorism. The principle behind the U.S.A Patriot Act is to detect and scrutinize
cyber crimes. This act has given the authority to probe the activities regarding
cyber terrorism to Secret Service. Like this scenario in Kuwait City, according to
Cardozo (2008) that Internet-related crimes are on the rise in Kuwait and the lack
16
of Cyber laws makes it impossible to tackle such fraudulent practices and
hackers are increasingly targeting Kuwait and many other countries, knowing full
well that they can get away with their crimes. On the other hand, according to the
article of Harsh (2008) in articlebase.com that though there are many techniques
evolved to curb the criminal activities by cyber terrorists but still the problem
persists in legal structure and has failed to produce a deterring effect on the
criminals. If the suggestions are undertaken in light of conclusion there can be a
better co-ordination among various national and international agencies to make
the system more efficient, and Information Technology Act 2000 more secured
and trustworthy. It can still be held good for the objects it had existed to provide
the benefits to the society. This paper is contributive of the fact that the till the
crime rate is not curbed technology cannot produce adequate benefits for which
it’s been created.
17
In the local situation of Cybercrime law or IT Act Law, according to
Regalado (2007) that the United States is helping enhance the capabilities of
policemen in Southern Mindanao in the fight against cyber-terrorism, which has
been widely used by terrorists in their operations. The training and skills that
policemen will gain will help them follow proper evidence procedures to ensure
that criminals who utilize computers and digital devices are prosecuted to the full
extent of the law as stressed by Schlachter, manager of the US Embassys ATA
program,to the over 40 participants in the five-day cyber crime incident response
course. This coordination among other country like USA has became a
significant initiative in addressing the local and national problem in cybercrime.
This problem has to be addressed together with the local, national, and
international both private and public sectors to condemn all the unethical and
illegal way of utilizing the technology in this modern era. According to
infotech.indiatimes.com (2008) that the growth of Internet users, broadband
capacity and number of Internet-enabled devices has created an opportunity for
hackers, organised criminals and even terrorists to attack our networks through
Spam, spyware, identity theft, viral attacks, and denial of service exploits. Some
do so for technical trophies, some for political objectives, but today, most attacks
on the Internet are done for financial gain.
18
internet sites, lack of self awareness and discipline in utilizing the internet are
another way to be exposed in internet predators. In helping to address this global
issue, the local and international governments have to initiate further and strong
IT Act laws against these cybercrimes.
19