Saturday, February 23, 2019

Problems posed by ‘cybercrimes’

Cyber vicious offense is defined as those nuisances involving ab theatrical role of electronic media or the information contained in it by influencing the reck matchlessrs functioning or the functioning of its system to the detriment of some otherwise individuals/organizations. The emerging information engineering science trends clear seen has seen incr god manipulation of computing machines crosswise the globe. This rapid expansion in terms of information communication technology capability to transmit bulk of information has seen enormous transmission across the internet and computers daily.With this increased transmission in that location has emerged a new slew in crook diddleivities. In assenting it has created window for perpetration of pestilential numberivities by sad organization. Another sound twist arising from internet and computer usage is intellectual appropriation. The government production of much(prenominal)(prenominal)(prenominal)(prenominal) crimes being committed against computers, and the be information in computers is gradually shifting attention towards the threats ticktockd by cyber crimes. This is coupled by the anonymity of such crimes as well as the less aw argon population being preyed upon.The camouflaging reputation of such crimes and then pre displaces new contends to the remedy of nature enforcement agency due to the inevitable bring to translate in solution to this changing criminal landscape. In accession pretermit of proper legal structures and legislations eat up condemned businesses and the single governments to there own taste in defend themselves against cyber crime. much(prenominal) measures employed hold the technical measures ramed at securing their systems. However, this is not enough to secure the existing cyber space from criminals.There is an additional need for application of the rectitude in play offing this emerging menace. This paper forget analyze the various typ es of cybercrimes, the problems they pose to the constabulary enforcement agencies and in conclusion analyze the sufficiency of the cyber crimes fair plays in Australia in dealing with the problems posed by cyber crimes. misgiving the problems that cyber crime pose to the modern nations requires a deeper at a lower placestanding of the various faces that such crimes take.Cyber crimes in different forms which include denial of servicing (DoS), identity theft, shuck, piracy, pornography, hacking, unauthorized modification, vir functions, unauthorized copying, credit entry card crime, extortion, phishing, spoofing, cyber defamation and salami attack among others. Denial of service involves such acts by criminals aimed at flooding of victims communicate bandwidth of overloading of a victims mailbox with spam thusly denying the victim memory memory access to his authorise services accessibility/provision.Unlike the early twenty-four hourss DoS where simple in either case ls generated and sent attack packets fro one source to another external source, such attacks substantiate transformed to incorporate use of attacks from single source to multiple destinations as well as multiple sources to single destinations. However, the most recent victimisation which involves use of self propagating worms has increasingly created a new twist to reception to such attacks. Hacking on the other hand has emerged as a reparation crime as technology continues to advance.Hacking basically involves illegal computer systems onslaught as no permission is sought from the users/owner of the intruded system. Most of hacking is a lot attributed to teenagers as well as young adults. Hacking is often considered an art of geographic expedition by computer technology buffs who engage in computer exploration rather than being intent on committing crime. The hackers often use hacking as a venue to displaying their skills and not as a tool of harming others.Virus spread on t he other hand involves release of malicious softwares that often attach themselves to the existing software application resulting into a compass of system detriments including system retardation and information sending among others. Such include worms and Trojan horse among others. Pornography on the other hand has emerged as a successful product in e-commerce that often applies deceptive techniques in its marketing most common being the mouse trapping technology.However, the ease of accessing such cites even to children is increasingly raising concern. Internet relays chat servers know likewise emerged as suitable avenues for criminal meetings from anywhere in the world. Hackers too are known to use such sites in discussing of their various exploits and share of information on the equal. In addition Pedophiles buzz off been known to use such sites in luring of children to their activities. Such avenues turn in thus presented avenues for increased criminal activities and planni ng.Credit card fraud has withal increasingly grown more in particular when the cards numbers are utilise in unguaranteed electronic trans carry through resulting into the credit card numbers being stolen by hackers who end up misusing the cards through owner impersonation. Such fraudsters have also been known to use advanced techniques in duplication of credit cards. An emerging trend has also emerged where the secret data of companies is illegally copied with the aim of extorting huge sums of money from the company.Phishing has also emerged with the rising of technology where information confidential to account holders in financial institutions is pulled out through deceptive ways. Spoofing on the other hand involves use of one computer in expect another computers identity. Another form of cyber crime involves peck where defamatory messages are posted on the internet regarding an individual. Likewise stalking has emerged as a form of crime where the criminals trace individual s using the messages they use within the chat rooms.Salami attacks have on the other hand used to perform crime acts that involve insignificant amounts deduction from customers bank accounts and depositing it into their accounts. Such varied nature of cyber crimes presents with it varied challenges to the law enforcement agencies. in vogue(p) significant form of cyber crime is the Nigerian 4-19 scheme where letters supposing carriage of large amount of money in which the victim is required to religious service are distributed to prominent business, and professional personalities with the aim of hoodwinking them.Law enforcement agencies have had to reckon with the emergence of this new form of crime that comes with a variety of challenges in addition to its shifting landscape. Often such challenges may be classified as technical, judicial or ethical. Technical problems pose the greatest challenge to law enforcement agencies more so, on the issue of traceability more so considering the anonymous nature with which such crimes are perpetrated. It is always extremely cumber well-nigh to locate the IP address from which such crime occur.Under such cases the criminals at times use other persons IP address to connect to a third companionship who then is unable to identify the actual source of the crime. Such federations are done using proxies with socks4 and socks5 proxies often used by criminals. Often criminals are known to resource proxies through use of machines belonging to innocent and oblivious(predicate) users. Such present a challenge to law enforcement agencies in their pick up to track down cyber criminals.Criminals are also known to use fast-flux networks in making of website resistant to firewall website filters and any attempts at law agencies to track them down. Such criminal activities always direct attempts to access the IP address to some arbitrary Zombie machine. Convicting of cyber criminals upon arrest may also prove gawky due to neglect of narrate in such instances that the criminal has encrypted his/her computers data. This thus presents the challenge of obtaining testify even in such circumstances where the criminal has been positively identified.In addition tracking down such crimes in cabaret to gain crucial evidence is difficult considering that the criminal activitys traces disappear as soon as the connection is broken such a challenge may also be attributed to the over-reliance exhibited by law enforcement agencies on ISPs rather engaging in a day to day co-ordination with the providers as this would enhance quick tracking responses. Ignorance also plays a major role in inhibiting the attempts by law enforcement agencies to fight cyber crime.Most of such crime often goes unreported as ether the victims are unconscious that the activity may be classified as criminal or by mere lack of information. Large institutions like banks are also known for failing to report such incidence with the aim of protecting their public image from getting distorted. Other cases are only brought to rest after a considerable period of time has elapsed and any evidence that would have aided pursuit has been lost. The digital technology as well as computing convergence has changed the ways of life.Unprecedented criminal opportunities have emerged with some unforeseeable criminal activities becoming a reality. This comes with the need for prosecutors to accept effective knowledge to deal with these emerging crimes. Appropriate training of the pertinent law enforcement agencies to meet the competencies exhibited by such criminals is also a fundamental issue. Most countries, more so the underdeveloped countries lack effectively skilled personnel to counter the activities of the criminals.The moral underpinning of cyber crime is also bound to pose a challenge to the law enforcement agencies as their action aimed at reacting to the same may be interpreted as a human right violations. Such may include arbit rary searches in quick response to an ongoing connection which may be interpreted as a search without assure. On the other seeking a search warrant may provide adequate time for the perpetrator to break connection before identification.Jurisdiction problems likewise remain a major challenge to the law enforcement agencies in fighting of cyber crime. Cyber crime is known to take a transnational perspective across various countries borders. The fundamental issue then arising is the issue of sovereign legal power. In USA V Griffiths, the challenge of dual fault was raised and the consequent requirement for existence of the same to allows criminal extradition.While one country may have already recognized a respective cyber offense as constituting a criminal offense, the other may have not. The resultant effect then would allow a criminal to execute from one given country without fear of facing legal action and harming victims of another country. The cases clearly illustrated the ext ent to which judicial barriers may hinder law enforcement agencies from effectively performing their duty and apprehend such criminals.In R v BODEN the existing legal provisions proved insufficient to sustain prosecution of Mr. Boden resulting to his release. In addition the question as to who holds jurisdiction likewise presents an prohibition to law enforcement agencies in fighting cyber crime. When a criminal commits the crime in one country but it affects an individual in another country, there exist no clear legislations that prescribe the country on whose laws such an individual should face prosecution.The major jurisdictional problems facing law enforcement agencies in fighting cybercrime can be summarized as being the lack of accord rules in qualifying offences as cyber crimes within various narrates legal structures, lack of laws empowering investigative agencies in various states capabilities to trail crime across the borders and ultimately inadequacy of laws allowing international cooperation to allow cross border prosecution. In the take Underground by Dreyfus a true story about an thermionic vacuum tube computer group threat predated the internet for more than ten years is narrated.The group was accused of having hacked into secure systems including the Citibank, the pentagon NASA, NATO among others. It took several raids by two the national police and the police agencies to bring down the group. The group was subsequently brought to running under the telecommunications act of 1991which was cited as outlining the legal proceedings surrounding cyber crimes. The penalty levied on the four who hacked major secured websites has been subject to criticism more so regarding the weight of the sentence in relation of the magnitude of the crime committed.The crimes if somatogenetic would have otherwise been considered dangerous and would have attracted sever sentence. This once again puts into spot clear the effectiveness of the Australian laws in dealing with such crimes. The question arising then was whether or not these regulations are sufficient enough to assure the cyber crimes menace. The latest bill on anti money laundering offers stiffer penalties tended to(p) with possibility of long term imprisonment thus meting out proportionate penalties which could have a deterrent effect on such crimes.The 1991 telecommunication act incorporated surgical incision 74 and 76 criminal jurisprudence of Australia in illustrating the issue of carrier and data. The legislation describes carrier and data considered office of the Australian commonwealth. The law includes data originating from commonwealth computers as well as data into the commonwealth computers as constituting carrier and data within the section definition. Unauthorized access to commonwealth computers is classified as criminal under section 76(b)-1 with section 76(b)-2 describing what qualifies as unauthorized access. fragment 76(b)-3 expounds further to deal w ith acts that impeded, stamp out or after data. Section 76(D) on the other hand emphasizes the on the mode of entry while section 76(e) specifies the prescribed punishment for individuals who controvert the provisions of the aforementioned sections. Unlike the previous cases where creative adaptation was apply in trying to deal with new crimes, the act currently addresses particular(prenominal) cases of computer crimes. For instance in the 1980s the reported cases faced difficulties regarding whether or not legislation on theft could be applied to computer hackers.In the rulings the court held that information was not property and thus incapable of being stolen. Based on this, Gordon Hughes at one point suggested that hacking of computers could not be considered to constitute an act of theft. However, the telecommunication act, 1991 prescribes specific clauses that track such cases. Section 76 of the act not only addresses the issue of unauthorized access and illegal copying, b ut goes further to include resulting damages of such access as constituting a criminal offense.Another milestone made by the Australian laws in fighting cyber crime is evidenced by the Victorian state parliaments amendment of the 1958 criminal offenses Act top cater for cyber stalking crimes. The act caters addressing cyber stalking eliminating the cumbersome need for proof of a offenders conduct is such circumstance where the offered meant harm. The legislation goes along way in solving the consequence of proof shouldered on law enforcement agencies in addition to the circumstance that unlike its predecessors it offers provisions for extraterritorial jurisdictions.It is important to note the burden of proving evidence that an offender was stalking was quite cumbersome given the fact that the evidence would disappear as soon as the communication was broken. However, with this new law an offender is considered to have engaged in a criminal by virtue of having meant harm in his/her activity. The cyber crime act has in addition addresses damages and computer link offenses offering more extensive approaches. It was hypothesise in line with THE recommendations of the Model Criminal Code officers committee.E-commerce has also been on the rise to more so in Australian and USA. The number of internet banking service being offered is constantly on the rise. The Australian government to deal with fraud related issues in this area has a series of legislations that control such operations. Such include the proceeds of crime act 1987 which has the effect of obligating financial institutions to maintain all transactions records for future day references, the payment systems regulation, 1998 within borrows a lot from the Wallis report.The Wallis legislation establishes three unwrap regulators of e-commerce namely The Reserve Bank of Australia, The Australian Prudential Regulation laterality and the Australian Securities and Investments Commissions. Such emerging legis lations in Australia have had the effect of waterproofing some of the loopholes that would have let such crime activities go undisciplined like the DPP v SUTCLIFFE, the magistrates court considering the trans-boundary nature of the crime in question, considered it as not being in apposition to effectively handle the matter.The Victorian Supreme Courts decision however in effect came in to redeem the situation to an extent by establishing jurisdiction of the court. Nonetheless the applicability of the crimes act 1958 still posed a challenge to the court in its examination of the reasons that made stalking a criminal offense. This still remains a challenge as even the 2003 amendment in its section 6(3) still makes specific to such cases with regard to limitations of the courts in the light of the individuals rights.The cases essentially reflected some of the hurdles provided for by the law in the fight against cyber crimes. While the Australian law has made major milestone in dealing with cybercrime within its territory, trans-national cyber crime still remains a challenge. In US v Griffiths, for instance the Australian legislations allowed for extradition of a suspect to face charges in the USA, however, the same cannot be said of other countries whose citizens commit crimes against Australian systems.Most countries still lack legislations that would provide grounds for such extraditions. This step was inline with both the international and the European conventions on cyber crimes which stressed the need for nations cooperation and unity in the fight against this vice. The convention just like the Australian laws undertook an extensive elaboration of the various forms of cyber crimes emphasizing the need for the member states and other signatories to develop legislation on the same.Unlike the early 1980s where the legislation center on criminalizing unauthorized access to computer systems without considerations of the inadequate investigative indorsement and penalties, recent reforms in Australia have taken a more true to life(predicate) approach to safeguard computer systems integrity having acknowledged their centrality and commercial value. The cyber crimes act offers the much needed national model for legal response to cyber related offenses. The act possesses transnational aspects as constituted in the European Council Cyber Crime Convention.This allows expanded jurisdictional scope. The Australian cyber laws adequately prepares it to respond to the emerging cyber crimes more so considering the larger extra-territorial jurisdiction which recognizes both multijurisdictional dimension presented in Australia and abroad jurisdiction. Laws expanding on search warrant and conduction of covert surveillance have additionally had the impact on facilitating gathering of evidence. In general the Australian legislations provide adequate tools in dealing with the cyber crime menace.

No comments:

Post a Comment