The Organised Cyber Crimes Background

Print   

02 Nov 2017

Disclaimer:
This essay has been written and submitted by students and is not an example of our work. Please click this link to view samples of our professional work witten by our professional essay writers. Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of EssayCompany.

In this technical documentation I have tried to come up with all the logical, physical and monetary needs of the people, who are engaged in Cyber Crimes and all he aspects that how they get organized themselves with the passage of time.

Introduction

The development of the Internet and its continued growth has a significant impact on the development of societies across the world; the Internet is now an integral and essential component of our society and our economy apart.

The information society affects both developed and developing countries. The rise of the Internet has fostered the emergence of new criminal threats. These threats pose significant risks for companies, governments and individuals: According to Norton 2012 study, the cost of cybercrime in France only was estimated at 2.5 billion euros. The fight against cybercrime has become a major global challenge due to the international dimension of this new organized crime often. Cybercrime is evolving every day, revealing new forms of risk and techniques to circumvent the law, the law must take into account and that must adapt.

Cyber Crimes Background

The term "cybercrime" since it is not, most of the time, facts likely to meet an Assize Court - is not subject to any legal definition in most of the countries. According to common sense or a practice, a cybercrime offense includes two types:

First, related to crime "traditional" and have been able to evolve with new technologies of information and communication technologies (ICT). This category includes such scams, including new forms have arisen with Internet (fraudulent use of credit cards online phishing, etc.)., Threats and insults of all kinds that can now be disseminated through new ways electronic communication (email, forums, social networks), dissemination of child pornography, which is also facilitated by the networks and the Internet, etc

Second, news related to information and automated data processing and appeared with the development of computer network systems, and in particular the Internet (unauthorized access, alteration of a system).

Cybercrime is characterized by the use of sophisticated technologies and methods of remote commission, which abstract away from any contact between the perpetrator and the victim.

Evolution of cybercrime

Instead of cybercrime is growing and will be due to the exponential growth of connections, increasing knowledge in the field of culture and the presence of technology and programmable electronic board, which increases the number of potential targets. If we look at the evolution of the last thirty years, the phenomena are increased in magnitude as and acceptance of technology in society:

There were scams Minitel and other telematic services in the 80s

Smart cards and mobile telephony in the 90s

In the 2000s, the great boom of the Internet

There has been a professionalization of cybercrime. Trends in recent years on the professionalization of organized criminal groups were confirmed in 2012 (compared CLUSIF - Overview of Cybercrime, 2012).

More than ever, the mainspring of the "crime" is the pursuit of profit. The sale of vulnerabilities or confidential data as well as the rental of attack (for the dissemination of such SPAM) infrastructure is a real global market.

Cybercrime Trends

The main offenses committed using information technology and communication

The recordings of bank data on the Internet through the following techniques:

"Phishing" or "spoofing", by which the user is prompted by the massive sending "e-mail" messages to connect to a deceived site that believes legitimate and informed personal information.

"Pharming" is that piracy server’s choke point between the computer of the victim and the site it wants to achieve with automatic redirection of requests for access to a fake site.

The "carding" on traffic data card payment easily usable or marketable to the online business. It is secured by a sponsorship worth "exchange exchange" bank data between criminal organizations, designers 'malware', vendors and customer forums.

Scams on the Internet we found in all areas: sale of goods (including via website like Ebay) Funds Transfer (Nigerian scam "money mulling,"), dating scams (via dating sites).

Violations of the automated processing of data: the number of cyber attacks is growing. All private companies are now the target of hackers for sordid motives capture of personal data, industrial espionage or for ideological reasons (hacktivism).

Techniques of cybercrime

Hacking techniques are becoming more sophisticated and used, as we have seen, in logic of mass fraud and pursuit of profit at the international level. The most commonly used are:

"Pharming" aimed hacking servers choke point between the computer of the victim and the site it wants to achieve with automatic redirection of requests for access to a site often forged for the purpose of recovery personal data;

"Trojan horse" that is characterized by a "spy" device inserted into the user's computer, thereby unwittingly intercepts confidential data;

"Hacking" regarding the attack computers of the banking system or payment networks.

"Botnets" (short for robots of the network) are networks of thousands or even millions of computers by individuals or companies that have been compromised by malicious software (malware) and when connected to an Internet contact control server, without the knowledge of the user. These swarms of machines can be used to realize a large part of the illegal actions committed on the Internet today as the dissemination of unsolicited email (spam), the spread of malware or illegal content discretely or else coordinated attacks against servers (attacks distributed denial of service).

They also allow the diffusion of ransom ware which has the particularity to block computer victims and to demand payment of a ransom. This type of malware has exploded in 2012.

Offenders

They can be divided into three broad categories:

Cybercriminals: Actor isolated or member of an organized structure, each fulfills a specific role in the development of software to money laundering. Gang leaders do not hesitate to invest large financial and human resources to create real cybercrime companies according to the schemes of the legal IT industry. Some states and companies storefront also flirt with illegality.

Cyber terrorism: there is a very active presence of terrorist groups on the Internet to communicate, educate and disseminate their propaganda. Their ability to recruit and motivate the younger generations require specialized services for enhanced vigilance.

Hacktivists: less worrying of course, but much more visible and active, especially under the banner of "Anonymous." They conduct denial of service attacks and more serious attacks against large global enterprises, sectarian groups or sometimes states. These groups sometimes generate very significant damage and have mobilized significant resources in investigative services and the courts. Their motivation is displayed sometimes playful, sometimes the order of temper and often in terms of policy and claim the right to demonstrate, with its accompanying digital breakers.

The impact of cybercrime

Cybercrime is extremely costly to society.

In 2011, Norton Symantec report estimated that global cybercrime reported about $ 388 billion per year to the authors, which makes it more lucrative than the global cannabis, cocaine and heroin market combined (Norton Cybercrime Report 2011).

In 2012, according to the new Norton Symantec report, cybercrime has increased. It would thus raised 3.5 billion dollars in 2011, hit 10 million people to harm an average of $ 300 per person. These figures are frightening because every second, 18 surfers are victims of malicious activity on the Internet. Of course we must qualify these figures, the estimated cost may vary according to the definition given of cybercrime.

Compelling figures: in its eighth annual report published in late 2012 (for 2011), the National Observatory of crime and criminal justice responses (ONDRP) recorded 33,299 offenses designated as "clever crime" on the Internet, 80% being of fraud or breach of trust, the remaining party to forgery or use of credit cards 20%. In addition, there are violations of the dignity and personality made ​​by Internet, and sexual abuses by the Internet, which are primarily related to online child pornography (about 2000 offenses).

Legislation and international standards?

Contrary to what is often said, the internet is not a lawless zone.

However, there is not a right of the internet:

There are many areas of law that are intended to apply to the Internet, starting with the criminal law and the right of the press (internet being primarily a medium);

When the pre-Internet law does not apply satisfactorily, the legislature intervenes; specific laws are then created to meet the new offenses specifically related to new technologies.

International standard, the attempt to harmonize the Convention on Cybercrime, signed in Budapest on 23 November 2001, which sets international standards in the following areas:

Criminal law: the Convention (Articles 2-13) is to improve the means of preventing and combating cyber crime by establishing a common minimum standard for establishes certain acts as criminal offenses.

Procedural law

International Cooperation

Conclusion

After so much research and studying different books what I conclude that Cyber crimes are getting stronger and organized as time passes and its just because of less judicial acts and so much difference in he laws of every country.

If we want to stop or at least create some bearers in the way of organized cybercrimes then we have to come up with strong laws and in actual give exemplary punishment’s to the culprits and apart from this we have to educate people for computers and internet so it remains as blessing rather changes into curse.



rev

Our Service Portfolio

jb

Want To Place An Order Quickly?

Then shoot us a message on Whatsapp, WeChat or Gmail. We are available 24/7 to assist you.

whatsapp

Do not panic, you are at the right place

jb

Visit Our essay writting help page to get all the details and guidence on availing our assiatance service.

Get 20% Discount, Now
£19 £14/ Per Page
14 days delivery time

Our writting assistance service is undoubtedly one of the most affordable writting assistance services and we have highly qualified professionls to help you with your work. So what are you waiting for, click below to order now.

Get An Instant Quote

ORDER TODAY!

Our experts are ready to assist you, call us to get a free quote or order now to get succeed in your academics writing.

Get a Free Quote Order Now