Abstract: are – espionage, financial theft, and other
crime is a crime where a computer and a network are inextricably involved. The
computer may be the target and have been used in the commission of a crime.
person or the security of nation and financial health may be threatened and
challenged by cyber crime. Surrounding hacking, child pornography, copyright
infringement, unwarranted mass-surveillance, and child grooming are the major
really a tremendous problem about privacy and security when important and
significant information is reveled. Most familiar cyber crimes are – espionage,
financial theft, and other cross-border crimes and non-governmental and
governmental people are profoundly directly or indirectly affected and engaged in
rapid development of computer connectivity and the role of the Internet in the emergence
of new e-commerce have compelled national governments and international
agencies to address the need for regulation and safety on the ‘information
astonishing tools have eroded the traditional barriers to communication,
compressed our concepts of time and place, and changed the way a large part of
the world does business. The convergence of computing and communications and
the exponential growth of digital technology have brought enormous benefits but
with these new benefits come greater risks both domestically and across
borders. The new opportunities created in ‘cyberspace’ have enhanced the capacity
of individual offenders and criminal networks that have emerged to exploit vulnerabilities
in the ‘new’ economy.
role of digital and information technologies in the generation of national
wealth now means that the new risks associated with these changes require
continued attention on all fronts: national, regional and international. While
the process of ‘globalization’ continues to accelerate, a fully global response
to the problems of security in the digital age has yet to emerge and efforts to
secure cyberspace has been reactive rather than proactive.
in the trans-national policing of ‘cyberspace’ so essential in addressing
cyber-crime are the focus of this paper and it outlines what the international
community has achieved so far. Controlling crime involving digital technology and
computer networks will also require a variety of new networks: networks between
police and other agencies within government, networks between police and
private institutions, and networks of police across national borders. Over the
past decade, considerable progress has been made within and between nations to
develop the capacity of police to respond to cybercrime and there is now
growing awareness amongst computer users of the need for basic security
kinds of criminality encompass the following list:
Interference with lawful use of a computer: cyber-vandalism and terrorism; denial
of service; insertion of viruses, worms and other malicious code.
Dissemination of offensive materials: pornography/child pornography; on-line gaming/betting;
racist content; treasonous or sacrilegious content.
Communications: extortion; cyber-stalking.
Forgery/counterfeiting: ID theft; IP offences; software, CD, DVD piracy; copyright
Fraud: payment card fraud and e-funds transfer fraud; theft of Internet and telephone
services; auction house and catalogue fraud; consumer fraud and direct sales
on-line securities fraud and
Other: Illegal interception of communications; commercial/corporate espionage; communications
in furtherance of criminal conspiracies; electronic money laundering.
and Regional Cooperation:
creates an unprecedented need for concerted action from government and
industry, but also unprecedented challenges to effective international cooperation.
As noted it is not always clear where computer-related offences take place for
the purpose of determining criminal jurisdiction. An offence may produce victims
in many countries, as in cases involving virus attacks, copyright violations, and
other 17 offences carried out globally through the Internet. This in turn may result
in cross border conflicts regarding which jurisdiction should prosecute the
offender and how such prosecutions can be carried out to avoid inconvenience to
witnesses, duplication of effort, and unnecessary competition among law enforcement
cooperation in combating cyber-crime that include the following:
improve security awareness by providing adequate resources to secure transactions
and equip system operators and administrators;
improve coordination and collaboration by enabling systematic exchanges between
the private sector and law enforcement including joint operations;
take steps to ensure that technology does not outpace the ability of law enforcement
to investigate and enact substantive and procedural laws adequate to cope with
current and anticipated manifestations of cyber-crime;
Broadly criminalize the conduct and focus on all violators big and small;
strengthen international initiatives by updating existing treaties and
agreements to recognize the existence, threats and transnational nature of high
tech computer-related crimes and strive for legal harmonization; and
development of forensic computing skills by law enforcement and investigative
personnel and mechanisms for operational cooperation between law enforcement agencies
from different countries, i.e. 24/7 points of contact for investigators.
Crime which is occurring at all times in our daily life and around our life
circumstances and even we are everyday being deceived by cyber crime. Though
not all people are victims to cyber crimes, they are still at risk. Crimes by
computer vary, and they don’t always occur behind the computer, but they executed
by computer. The hacker’s identity is ranged between 12 years young to 67years
old. The hacker could live three continents away from its victim, and they
wouldn’t even know they were being hacked. Crimes done behind the computer are
the 21st century’s problem. With the technology increasing, criminals don’t
have to rob banks, nor do they have to be outside in order to commit any crime.
They have everything they need on their lap. Their weapons aren’t guns anymore;
they attack with mouse cursors and passwords.