SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
4/23/2019 CYBERCRIME
Submitted by
Muhammad Fahad Saleem 1-FMS/BSAF/F15
Arbaz Babar 3-FMS/BSAF/F15
Submitted To
Sir Zaheer Akbar
BS Accounting and Finance
INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD
FORENSIC ACCOUNTING
1 |C Y B E R C R I M E
Cybercrime
Definition
Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The
computer may have been used in the commission of a crime, or it may be the target. Cybercrimes can
be defined as: "Offences that are committed against individuals or groups of individuals with a
criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm,
or loss, to the victim directly or indirectly, using modern telecommunication networks such as
Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones
(Bluetooth/SMS/MMS). Cybercrime may threaten a person or a nation's security and financial health.
Types of Cybercrime
1. Hacking: A security hacker is someone who seeks to breach defences and exploit
weaknesses in a computer system or network. Hackers may be motivated by a multitude of
reasons, such as profit, protest, information gathering, challenge, recreation, or to evaluate
system weaknesses to assist in formulating defences against potential hackers.
2. Bank Fraud: Bank fraud is an emerging technique of frauds. In bank fraud, an employee of
bank sends emails (appear to be from the bank) to their clients for sharing of their personal
information such as Credit Cards and Debit Cards information, which he uses for his personal
benefit including unauthorized purchases and cause loss to the client for his trust upon the
bank employee. Whereas, client considers it, that the employee is seeking information on
behalf of bank.
3. Sextortion: Sextortion is a form of sexual exploitation that employs non-physical forms of
coercion to extort money or sexual favours from the victim. Sextortion refers to the broad
category of sexual exploitation in which abuse of power is the means of coercion, as well as
to the category of sexual exploitation in which threatened release of sexual images or
information is the means of coercion.
As used to describe an abuse of power, sextortion is a form of corruption in which people
entrusted with power such as government officials, judges, educators, law enforcement
personnel, and employers seek to extort sexual favour in exchange for something within their
authority to grant or withhold. Examples of such abuses of power include:
2 |C Y B E R C R I M E
a. Government officials who request sexual favours to obtain licenses or permits,
b. Teachers who trade good grades for sex with students,
c. Employers who make providing sexual favour a condition of obtaining a job.
4. Child pornography: Child pornography is pornography that exploits children for sexual
stimulation. It may be produced with the direct involvement or sexual assault of a child (also
known as child sexual abuse images) or it may be simulated child pornography. Abuse of the
child occurs during the sexual acts or lascivious exhibitions of genitals or pubic areas which
are recorded in the production of child pornography. Child pornography may use a variety of
media, including writings, magazines, photos, sculpture, drawing, cartoon, painting,
animation, sound recording, film, video, and video games.
5. Child grooming: Child grooming is befriending and establishing an emotional connection
with a child, and sometimes the family, to lower the child's inhibitions with the objective of
sexual abuse. Child grooming is also regularly used to lure minors into various illicit
businesses such as child trafficking, child prostitution, or the production of child
pornography.
6. Financial Fraud crimes: Computer fraud is any dishonest misrepresentation of fact
intended to let another to do or refrain from doing something which causes loss. Other forms
of fraud may be facilitated using computer systems, including bank fraud, carding, identity
theft, extortion, and theft of classified information. These types of crime often result in the
loss of private information or monetary information.
7. Cyber Terrorism: Government officials and information technology security specialists
have documented a significant increase in Internet problems and server scans since early
2001. But there is a growing concern among government agencies such as the Federal Bureau
of Investigations (FBI) and the Central Intelligence Agency (CIA) that such intrusions are
part of an organized effort by cyberterrorists, foreign intelligence services, or other groups to
map potential security holes in critical systems. A cyberterrorist is someone who intimidates
or coerces a government or an organization to advance his or her political or social objectives
by launching a computer-based attack against computers, networks, or the information stored
on them.
8. Cyber Extortion: Cyberextortion occurs when a website, e-mail server, or computer system
is subjected to or threatened with repeated denial of service or other attacks by malicious
hackers. These hackers demand money in return for promising to stop the attacks and to offer
"protection". According to the Federal Bureau of Investigation, cybercrime extortionists are
increasingly attacking corporate websites and networks, crippling their ability to operate and
demanding payments to restore their service. More than 20 cases are reported each month to
the FBI and many go unreported to keep the victim's name out of the public domain.
9. Computer as a target: These crimes are committed by a selected group of criminals.
Unlike crimes using the computer as a tool, these crimes require the technical knowledge of
the perpetrators. As such, as technology evolves, so too does the nature of the crime. These
crimes are relatively new, having been in existence for only if computers have which explains
3 |C Y B E R C R I M E
how unprepared society and the world in general is towards combating these crimes. There
are numerous crimes of this nature committed daily on the internet. Crimes that primarily
target computer networks or devices include:
 Computer viruses
 Denial-of-service attacks
 Malware (malicious code)
10.Computer as a tool: When the individual is the main target of cybercrime, the computer
can be considered as the tool rather than the target. These crimes generally involve less
technical expertise. Human weaknesses are generally exploited. The damage dealt is largely
psychological and intangible, making legal action against the variants more difficult. These
are the crimes which have existed for centuries in the offline world. Scams, theft, and the
likes have existed even before the development in high-tech equipment. The same criminal
has simply been given a tool which increases their potential pool of victims and makes them
all the harder to trace and apprehend.
Crimes that use computer networks or devices to advance other ends include:
 Fraud and identity theft (although this increasingly use malware, hacking or phishing,
making it an example of both "computer as target" and "computer as tool" crime)
 Information warfare
 Phishing scams
 Spam
 Propagation of illegal obscene or offensive content, including harassment and threats.
11.Online Harassment: In harassment content may be offensive in a non-specific way,
harassment directs obscenities and derogatory comments at specific individuals focusing for
example on gender, race, religion, nationality, sexual orientation. This often occurs in chat
rooms, through newsgroups, and by sending hate e-mail to interested parties. Harassment on
the internet also includes revenge porn.
12.Drug trafficking: Darknet markets are used to buy and sell recreational drugs online. Some
drug traffickers use encrypted messaging tools to communicate with drug mules. The dark
web site Silk Road was a major online marketplace for drugs before it was shut down by law
enforcement (then reopened under new management, and then shut down by law enforcement
again). After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged. However, it was just
an older marketplace named Diablos Market, that used the name for more exposure from the
brand's previous success.
4 |C Y B E R C R I M E
Combating computer crimes
1. Diffusion of cybercrime
2. Investigation
3. Legislation
4. Penalties
5. Awareness
6. Intelligence
Departments of Cybercrime Investigation
 Federal Investigation Agency (FIA)
 National Response centre for Cybercrime
Cybercrime Prevention Tips
o What you put online will always remain there
o Never trust any free online content
o Don’t provide personal information online to get something free
o Don’t click on links inside e-mails or messages
Cybercrime Investigation Case
The Federal Investigation Agency (FIA) has reportedly arrested a woman in Sialkot for blackmailing a man on
social media. Sadia Mirza, a resident of Sialkot, has been booked under Cyber Crime Law for blackmailing
Ahsan Rana, a resident of London. The complaint was registered by the victim’s brother, Hassan Raza, who
alleged that Sadia had sent messages to Ahsan over social networking website Facebook, demanding money.
This is a unique case, several people have been arrested under the new Cyber Law but this is the first incident
that has come to the light of a woman doing a deed of cybercrime. According to the FIR, Sadia has been
charged with “sending threatening, abusive, and lewd messages.” A case has been registered according to the
Prevention of Electronic Crimes Act, 2016 – clauses 20 (1) and 24(b)(c).
Clause 20- Offences against dignity of a natural person
5 |C Y B E R C R I M E
(1) “Whoever intentionally and publicly exhibits or displays or transmits any information through any
information system, which he knows to be false, and intimidates or harms the reputation or privacy of a natural
person, shall be punished with imprisonment for a term which may extend to three years or with fine which
may extend to one million rupees or with both…”
Clause 24- Cyber Stalking
“A person commits the offence of cyber stalking who, with the intent to coerce or intimidate or harass any
person, uses information system, information system network, the internet, website, electronic mail or any
other similar means of communication to
(b) monitor the use by a person of the internet, electronic mail, text message or any other form of electronic
communication;
(c) watch or spy upon a person in a manner that results in fear of violence or serious alarm or distress, in the
mind of such person;
A team headed by Inspector Humaira Kanwal conducted a raid in Sialkot and detained the accused who was
then shifted to the local police station for further investigation.
Pakistan National Assembly passed the controversial Cyber Crime Bill in August last year after making
various amendments to Prevention of Electronic Crimes Bill (PECB) 2015. The bill faced the severe
opposition of many. The first offender of the bill was arrested in KPK for blackmailing women in August, just
weeks after the bill was passed. Another cyber-criminal was fined Rs. 30,000 and jailed for two years for
photoshopping and uploading the pictures of girls on the internet in Lahore.
***************

Mais conteúdo relacionado

Mais procurados

English in written
English in writtenEnglish in written
English in written
azhar manap
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
Ujjwal Tripathi
 

Mais procurados (20)

Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY VinayCyber Crime and Cyber Law of India BY Vinay
Cyber Crime and Cyber Law of India BY Vinay
 
Social Media & Crime
Social Media & CrimeSocial Media & Crime
Social Media & Crime
 
Statutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in indiaStatutory laws pertaining to cybercrimes in india
Statutory laws pertaining to cybercrimes in india
 
English in written
English in writtenEnglish in written
English in written
 
Cyber crime a potential threat and remedies
Cyber crime a potential threat and remediesCyber crime a potential threat and remedies
Cyber crime a potential threat and remedies
 
Cyber Crime & Security
Cyber Crime & SecurityCyber Crime & Security
Cyber Crime & Security
 
Class 21 and 22
Class 21 and 22Class 21 and 22
Class 21 and 22
 
Cybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse CasesCybercrime And Computer Misuse Cases
Cybercrime And Computer Misuse Cases
 
Understanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminalsUnderstanding the new modus operandi of cybercriminals
Understanding the new modus operandi of cybercriminals
 
cyber crime and laws
cyber crime and laws cyber crime and laws
cyber crime and laws
 
Cyber crime against children
Cyber crime against childrenCyber crime against children
Cyber crime against children
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybercrime in Iraq
Cybercrime in IraqCybercrime in Iraq
Cybercrime in Iraq
 
Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203Assignment of cyber crimes for oumh1203
Assignment of cyber crimes for oumh1203
 
19 21
19 2119 21
19 21
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
What constitutes a cyber crime in the country
What constitutes a cyber crime in the countryWhat constitutes a cyber crime in the country
What constitutes a cyber crime in the country
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Oni Iran 2009
Oni Iran 2009Oni Iran 2009
Oni Iran 2009
 

Semelhante a Brief Discussion of Cyber Crime issues

Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
vichu19891
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
nivi55
 
Internet
InternetInternet
Internet
Jodip
 

Semelhante a Brief Discussion of Cyber Crime issues (20)

A Review Paper On Cyber Crime
A Review Paper On Cyber CrimeA Review Paper On Cyber Crime
A Review Paper On Cyber Crime
 
cyber crime
cyber crimecyber crime
cyber crime
 
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptxSJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
SJCTNC-A.ALBERT RAVI-PCM1017Q-E COMMERCE-UNIT-V- TYPES OF CYBER CRIMES.pptx
 
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdfCyber CrimeAs Internet usage is growing daily the world is coming.pdf
Cyber CrimeAs Internet usage is growing daily the world is coming.pdf
 
Cyber Crime Essays
Cyber Crime EssaysCyber Crime Essays
Cyber Crime Essays
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
International-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptxInternational-Dimensions-of-Cybercrime (1).pptx
International-Dimensions-of-Cybercrime (1).pptx
 
111cyber crimes
111cyber crimes111cyber crimes
111cyber crimes
 
cyber crime
 cyber crime  cyber crime
cyber crime
 
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ran...
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
New microsoft office word document (3)
New microsoft office word document (3)New microsoft office word document (3)
New microsoft office word document (3)
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Computer and internet Cybercrime Reports
Computer and internet Cybercrime ReportsComputer and internet Cybercrime Reports
Computer and internet Cybercrime Reports
 
Cyber Crime.pptx
Cyber Crime.pptxCyber Crime.pptx
Cyber Crime.pptx
 
Internet
InternetInternet
Internet
 
Cyber crime and its types
Cyber crime and its  typesCyber crime and its  types
Cyber crime and its types
 
cybercrimeandtypes-19101817340 2.pdf
cybercrimeandtypes-19101817340      2.pdfcybercrimeandtypes-19101817340      2.pdf
cybercrimeandtypes-19101817340 2.pdf
 

Mais de Fahad Saleem

Mais de Fahad Saleem (8)

Short Summary of Vision 2025 Pakistan
Short Summary of Vision 2025 PakistanShort Summary of Vision 2025 Pakistan
Short Summary of Vision 2025 Pakistan
 
Full Tally.ERP 9 Software learner
Full Tally.ERP 9 Software learnerFull Tally.ERP 9 Software learner
Full Tally.ERP 9 Software learner
 
Barriers of communication
Barriers of communicationBarriers of communication
Barriers of communication
 
The muslim dynasties and sufi's in subcontinent
The muslim dynasties and sufi's in subcontinentThe muslim dynasties and sufi's in subcontinent
The muslim dynasties and sufi's in subcontinent
 
Energy crises in pakistan
Energy crises in pakistan Energy crises in pakistan
Energy crises in pakistan
 
The Lord of the Rings
The Lord of the Rings  The Lord of the Rings
The Lord of the Rings
 
Kaymu.com
Kaymu.com Kaymu.com
Kaymu.com
 
7 C's of communication and also how to become a proficient in English.
7 C's of communication and also how to become a proficient in English.7 C's of communication and also how to become a proficient in English.
7 C's of communication and also how to become a proficient in English.
 

Último

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Último (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 

Brief Discussion of Cyber Crime issues

  • 1. 4/23/2019 CYBERCRIME Submitted by Muhammad Fahad Saleem 1-FMS/BSAF/F15 Arbaz Babar 3-FMS/BSAF/F15 Submitted To Sir Zaheer Akbar BS Accounting and Finance INTERNATIONAL ISLAMIC UNIVERSITY, ISLAMABAD FORENSIC ACCOUNTING
  • 2. 1 |C Y B E R C R I M E Cybercrime Definition Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer may have been used in the commission of a crime, or it may be the target. Cybercrimes can be defined as: "Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS). Cybercrime may threaten a person or a nation's security and financial health. Types of Cybercrime 1. Hacking: A security hacker is someone who seeks to breach defences and exploit weaknesses in a computer system or network. Hackers may be motivated by a multitude of reasons, such as profit, protest, information gathering, challenge, recreation, or to evaluate system weaknesses to assist in formulating defences against potential hackers. 2. Bank Fraud: Bank fraud is an emerging technique of frauds. In bank fraud, an employee of bank sends emails (appear to be from the bank) to their clients for sharing of their personal information such as Credit Cards and Debit Cards information, which he uses for his personal benefit including unauthorized purchases and cause loss to the client for his trust upon the bank employee. Whereas, client considers it, that the employee is seeking information on behalf of bank. 3. Sextortion: Sextortion is a form of sexual exploitation that employs non-physical forms of coercion to extort money or sexual favours from the victim. Sextortion refers to the broad category of sexual exploitation in which abuse of power is the means of coercion, as well as to the category of sexual exploitation in which threatened release of sexual images or information is the means of coercion. As used to describe an abuse of power, sextortion is a form of corruption in which people entrusted with power such as government officials, judges, educators, law enforcement personnel, and employers seek to extort sexual favour in exchange for something within their authority to grant or withhold. Examples of such abuses of power include:
  • 3. 2 |C Y B E R C R I M E a. Government officials who request sexual favours to obtain licenses or permits, b. Teachers who trade good grades for sex with students, c. Employers who make providing sexual favour a condition of obtaining a job. 4. Child pornography: Child pornography is pornography that exploits children for sexual stimulation. It may be produced with the direct involvement or sexual assault of a child (also known as child sexual abuse images) or it may be simulated child pornography. Abuse of the child occurs during the sexual acts or lascivious exhibitions of genitals or pubic areas which are recorded in the production of child pornography. Child pornography may use a variety of media, including writings, magazines, photos, sculpture, drawing, cartoon, painting, animation, sound recording, film, video, and video games. 5. Child grooming: Child grooming is befriending and establishing an emotional connection with a child, and sometimes the family, to lower the child's inhibitions with the objective of sexual abuse. Child grooming is also regularly used to lure minors into various illicit businesses such as child trafficking, child prostitution, or the production of child pornography. 6. Financial Fraud crimes: Computer fraud is any dishonest misrepresentation of fact intended to let another to do or refrain from doing something which causes loss. Other forms of fraud may be facilitated using computer systems, including bank fraud, carding, identity theft, extortion, and theft of classified information. These types of crime often result in the loss of private information or monetary information. 7. Cyber Terrorism: Government officials and information technology security specialists have documented a significant increase in Internet problems and server scans since early 2001. But there is a growing concern among government agencies such as the Federal Bureau of Investigations (FBI) and the Central Intelligence Agency (CIA) that such intrusions are part of an organized effort by cyberterrorists, foreign intelligence services, or other groups to map potential security holes in critical systems. A cyberterrorist is someone who intimidates or coerces a government or an organization to advance his or her political or social objectives by launching a computer-based attack against computers, networks, or the information stored on them. 8. Cyber Extortion: Cyberextortion occurs when a website, e-mail server, or computer system is subjected to or threatened with repeated denial of service or other attacks by malicious hackers. These hackers demand money in return for promising to stop the attacks and to offer "protection". According to the Federal Bureau of Investigation, cybercrime extortionists are increasingly attacking corporate websites and networks, crippling their ability to operate and demanding payments to restore their service. More than 20 cases are reported each month to the FBI and many go unreported to keep the victim's name out of the public domain. 9. Computer as a target: These crimes are committed by a selected group of criminals. Unlike crimes using the computer as a tool, these crimes require the technical knowledge of the perpetrators. As such, as technology evolves, so too does the nature of the crime. These crimes are relatively new, having been in existence for only if computers have which explains
  • 4. 3 |C Y B E R C R I M E how unprepared society and the world in general is towards combating these crimes. There are numerous crimes of this nature committed daily on the internet. Crimes that primarily target computer networks or devices include:  Computer viruses  Denial-of-service attacks  Malware (malicious code) 10.Computer as a tool: When the individual is the main target of cybercrime, the computer can be considered as the tool rather than the target. These crimes generally involve less technical expertise. Human weaknesses are generally exploited. The damage dealt is largely psychological and intangible, making legal action against the variants more difficult. These are the crimes which have existed for centuries in the offline world. Scams, theft, and the likes have existed even before the development in high-tech equipment. The same criminal has simply been given a tool which increases their potential pool of victims and makes them all the harder to trace and apprehend. Crimes that use computer networks or devices to advance other ends include:  Fraud and identity theft (although this increasingly use malware, hacking or phishing, making it an example of both "computer as target" and "computer as tool" crime)  Information warfare  Phishing scams  Spam  Propagation of illegal obscene or offensive content, including harassment and threats. 11.Online Harassment: In harassment content may be offensive in a non-specific way, harassment directs obscenities and derogatory comments at specific individuals focusing for example on gender, race, religion, nationality, sexual orientation. This often occurs in chat rooms, through newsgroups, and by sending hate e-mail to interested parties. Harassment on the internet also includes revenge porn. 12.Drug trafficking: Darknet markets are used to buy and sell recreational drugs online. Some drug traffickers use encrypted messaging tools to communicate with drug mules. The dark web site Silk Road was a major online marketplace for drugs before it was shut down by law enforcement (then reopened under new management, and then shut down by law enforcement again). After Silk Road 2.0 went down, Silk Road 3 Reloaded emerged. However, it was just an older marketplace named Diablos Market, that used the name for more exposure from the brand's previous success.
  • 5. 4 |C Y B E R C R I M E Combating computer crimes 1. Diffusion of cybercrime 2. Investigation 3. Legislation 4. Penalties 5. Awareness 6. Intelligence Departments of Cybercrime Investigation  Federal Investigation Agency (FIA)  National Response centre for Cybercrime Cybercrime Prevention Tips o What you put online will always remain there o Never trust any free online content o Don’t provide personal information online to get something free o Don’t click on links inside e-mails or messages Cybercrime Investigation Case The Federal Investigation Agency (FIA) has reportedly arrested a woman in Sialkot for blackmailing a man on social media. Sadia Mirza, a resident of Sialkot, has been booked under Cyber Crime Law for blackmailing Ahsan Rana, a resident of London. The complaint was registered by the victim’s brother, Hassan Raza, who alleged that Sadia had sent messages to Ahsan over social networking website Facebook, demanding money. This is a unique case, several people have been arrested under the new Cyber Law but this is the first incident that has come to the light of a woman doing a deed of cybercrime. According to the FIR, Sadia has been charged with “sending threatening, abusive, and lewd messages.” A case has been registered according to the Prevention of Electronic Crimes Act, 2016 – clauses 20 (1) and 24(b)(c). Clause 20- Offences against dignity of a natural person
  • 6. 5 |C Y B E R C R I M E (1) “Whoever intentionally and publicly exhibits or displays or transmits any information through any information system, which he knows to be false, and intimidates or harms the reputation or privacy of a natural person, shall be punished with imprisonment for a term which may extend to three years or with fine which may extend to one million rupees or with both…” Clause 24- Cyber Stalking “A person commits the offence of cyber stalking who, with the intent to coerce or intimidate or harass any person, uses information system, information system network, the internet, website, electronic mail or any other similar means of communication to (b) monitor the use by a person of the internet, electronic mail, text message or any other form of electronic communication; (c) watch or spy upon a person in a manner that results in fear of violence or serious alarm or distress, in the mind of such person; A team headed by Inspector Humaira Kanwal conducted a raid in Sialkot and detained the accused who was then shifted to the local police station for further investigation. Pakistan National Assembly passed the controversial Cyber Crime Bill in August last year after making various amendments to Prevention of Electronic Crimes Bill (PECB) 2015. The bill faced the severe opposition of many. The first offender of the bill was arrested in KPK for blackmailing women in August, just weeks after the bill was passed. Another cyber-criminal was fined Rs. 30,000 and jailed for two years for photoshopping and uploading the pictures of girls on the internet in Lahore. ***************