Cybercrime
Cybercrime
Cybercrime
GROUP 2
Development of Computer
Crime and Cybercrime
The first cybercrime attack happened in France well
before the internet was even invented, in 1834. Attackers
stole financial market information by accessing the
French telegraph system. From that moment on,
cybercrime has grown exponentially, marked by an
intriguing evolution of tactics, techniques, and
procedures — all implemented for malicious gain.
The 1990s: New Technology Brings New Crime Escalating rates
of cybercrime signaled that attackers now enjoyed fresh
opportunities and were devising new means to gain
unauthorized access to systems and manipulate data across
the web. Here’s some of the notable cybercrimes of this
decade.
SAFETY T I P S TO CYBER C R I M E
1. Use antivirus Software
2. Insert Firewalls
3. Uninstall unnecessary software
4. Maintain backup
5. Check security settings
M a i n S t r a t e g i c Roles i n the G l o b a l
Cybersecurity Agenda
1)Legal measures;
2) Technical and procedural measures;
3) Organizational structures;
4) Capacity building; and
5) International cooperation.
Typology of Crime
O n l i n e Harassment
Whereas content may be offensive in a non-specific way, harassment
directs obscenities and derogatory comments at specific individuals
focusing for example on gender, race, religion, nationality, sexual
orientation. This often occurs in chat rooms, through newsgroups, and by
sending hate e-mail to interested parties. Harassment on
the internet also includes revenge porn.
Drug t r a f f i c k i n g
Darknet markets are used to buy and sell recreational drugs online. Some
drug traffickers use encrypted messaging tools to communicate with drug
mules.
Legislation
Different types of high-tech crime may also include elements of low-tech
crime, and vice versa, making cybercrime investigators an indispensable
part of modern law-enforcement. Methodology of cybercrime detective
work is dynamic and is constantly improving, whether in closed police
units, or in international cooperation framework.
Penalties
Penalties for computer related crimes in New York State can range from a
fine and a short period of jail time for a Class A misdemeanor such as
unauthorized use of a computer up to computer tampering in the first
degree which is a Class C felony and can carry 3 to 15 years in prison.
Stalking
It is when a perpetrator singles out a specific person and causes the
person emotional distress and causes the individual to fear for his or her
life, safety, or safety of others. A stalker can be a former
boyfriend or girlfriend, an acquaintance or a stranger.
Types of S t a l k i n g
1. Rejected Stalker- This type of stalker becomes upset when the
friendship or romantic relationship has ended. The rejected stalker is
not only self-centered and jealous but also over-dependent and
persistent.
2. Resentful Stalker – The resentful stalker feels humiliated that the
relationship has ended and seeks revenge upon the victim.
Resentful stalkers are often irrationally paranoid and are known to
verbally assault their victims.
3. Predatory Stalker- The predatory stalker seeks power and sexual
gratification. They will not make physical contact but will use
surveillance to track the victim.
Types of S t a l k i n g
4. Intimacy Seeker– The intimacy-seeking stalker seeks an intimate
and romantic relationship with the victim. When the stalker is rejected by
the victim, he or she will continually phone the victim, write the victim
letters, and can become jealous and violent if the victim enters into a
relationship with someone else.
5.Incompetent Suitor- The incompetent suitor stalker usually has
inadequate social skills. They want a relationship with the victim but do not
have the ability to realize he or she is not meant to be with the victim.
6. Erotomania and Morbidly Infatuated- This type of stalker feels that the
victim loves them even though they may not have had any contact with
the victim. The stalker is usually paranoid, prefers suitors in a higher social
class, and wil repeatedly approach the victim.
Cyberstalking
Cyberstalking is the use of the Internet or other electronic means to stalk
or harass an individual, group, or organization. It may include false
accusations, defamation, slander and libel. It may also include monitoring,
identity theft, threats, vandalism, solicitation for sex, or gathering
information that may be used to threaten, embarrass or harass.
Cyberstalking is a criminal offense under various state anti-stalking, slander
and harassment laws. A conviction can result in a restraining order,
probation, or criminal penalties against the assailant, including jail.
O n l i n e Harassment or C y b e r
Harassment
Pertains to threatening or harassing emails, instant messages, or website
entries-To be considered cyberstalking, the behavior must pose a credible
threat of harm to the victim. All states have anti-stalking laws, but the legal
definitions vary.
T h a n k You!