Research On Cybercrime and Its Policing
Research On Cybercrime and Its Policing
© Under License of Creative Commons Attribution 3.0 License | This article is available in: https://www.imedpub.com/computer-science-and-engineering-survey/ 1
American Journal of Computer Science and Engineering
ARCHIVOS Survey
DE MEDICINA 2020
ISSN 1698-9465 Vol. 8 No.3:14
Rate of cybercrime cases recorded (per 1 lakh population) in social media scams are on the rise. Cyberbullying is one among
2018 by states/UTs is shown in Figure 1 where Karnataka has the the most important social media fraud to which many teenagers
highest cyber-crime rate [3]. have fallen prey. Under cyberbullying social media sites are wont
to bully people. Also, there are many other social media frauds
sort of a Facebook friend fraud.
Online shopping frauds: It is one among the most important
internet frauds since the past few years. Under this, fraudsters
found out fake online shopping portals with the intention of
cheating innocent people of their hard-earned money. In the
website, they display attractive product at a really cheap rate.
But, after the acquisition is formed by paying the cash, either the
fake product is delivered or the merchandise isn't delivered in the
least. These websites won't have any return or refund policies
and also there'll be no customer support team to contact.
Figure 1: Rate of cybercrime cases recorded (per 1 lakh population) The role of police in fighting cybercrime
in 2018 by states/UTs.
It is very hard for police units to start out investigations due to the
Techniques cybercriminals use low visibility of such crimes and therefore the lack of reporting that
could happen due to different reasons: from the unwillingness
Internet Fraudsters are everywhere and that they come up with of commercial entities, especially financial companies to report
innovative tricks to cheat people and wipe out money from their to the police on account of reputational questions and negative
checking account. There are many techniques which hackers use publicity to the lack of knowledge that such a criminal activity
for committing crime but here we will discuss the most common could be reported or lack of trust in the police department (CSI
ways they use. and FBI, 2004, 19; Wall, 2007, 193). Because of the low reporting
Phishing or email scam: It is a way employed by fraudsters to rate, lack of resources and under-reporting law-enforcement
steal your personal information. Under this fraud, fraudsters send agencies haven't any possibility to research and prosecute quite
you send you emails by posting as a genuine or reputed company. a ‘tiny fraction’ (Vogel, 2007) of what is happening in cyberspace.
The primary intention of sending those emails is to steal your Moreover, it is very hard for police units to justify the impact on
bank details. These emails are to steal your bank details. These public interest of initiating an investigation, especially in the case
emails will usually have a link or attachment. If you click on those of a low impact, single crime with the one victim (Wall, 2007,
links, you'll be taken to a fake website. The fake website will ask p. 191). Since use of internet and ICT technologies provides
you to supply your sensitive information like card details, UPI offenders with the chance to make aggregated revenue with low
code and other bank details. Also, clicking on such links will cause impact on one victim (e.g. stealing 1 euro millions of times rather
an epidemic attack on your computer. than millions of euros only once), one of the most important
Lottery fraud: Lottery fraud is one of the highest three internet challenges for the police is the justification of a public order
frauds in India. Under lottery fraud, fraudsters call you or send breach and the initiation of investigatory procedures.
emails and messages stating you have won lottery money, you will Taking into consideration the demand for new skills to investigate
be asked to transfer money online in the name of tax. Sometimes crimes in cyberspace, the necessity to review policing concepts,
you'll be asked to pay money by visiting fake websites. When you such as the justification of a breach of public order, the
attempt to make payment using those websites, all of your card applicability of techniques in policing the important world to
details are going to be stolen. the upkeep of order in virtual space, implementation of those
Identity theft: Under fraud, your personal information is stolen instruments during a practical environment remains the very best
by fraudsters through the web and wont to apply for a private priority. And for this in Karnataka two stages training program
loan, two-wheeler loan or a MasterCard with a bank. When loans on how to deal with hacking, online harassment, credit/debit
are availed in your name, you'll be liable for its repayment. Banks card fraud, data theft etc., for ranks till the level of constable.
will send you the notice for repayment. If the loan isn't repaid it'll Though training Personnel remains the challenge when it comes
have a nasty impact on your credit score and you'll be marked a to dealing with the digital crime.
loan defaulter [4]. A number of police agencies have formed partnerships with
Also, the stolen information of yours is often wont to create fake computing departments at local universities. These partnerships
social media accounts. not only provide an opportunity to expertise the police, but also
function as a recruiting tool for college kids who have an interest
Social media scam: with the number of people using social media,
in cybercrime and policing. A knowledge hub thus are often using biometric scanning. Biometric scanning can be a good way
established which may also attract students to pursue a career in opening a new dimension for securing our data. There are
as cyber investigators. Also, for enforcement agencies at the multiple biometric scanners available, for instance IRIS scanner,
national, state, and native level, there should be a central referral fingerprint scanner and face recognition which can be helpful
mechanism for complaints involving cybercrime. In many cases, because currently we use PIN and Mobile Numbers for money
private corporations and special branches have more experience transactions and security. This convectional way can be breached
with cybercrime investigations than local police agencies easily and so we can use such biometric scanners to make digital
and henceforth, the Police can seek cooperation with private signatures which can be unique and cannot be replicate easily
corporations without compromising the security [5]. and so our privacy will increase, thus resulting in prevention of
cybercrime.
How ‘We’ as a citizen can prevent cybercrime
Government payment portals: Generally, payments are done
Cybercrime is not just Governments responsibility, we as a citizen using third party applications which attackers use as their
should also have to stay aware and try to defend ourselves from advantage by manipulating people to transfer money to them
cybercriminals. And we can achieve that by following some and are scammed easily. Although there are many government
simple steps: portals for money transactions people usually use easier ways,
• Use strong passwords: Use the various password and and so if government takeovers these third party applications by
username combinations for various accounts and resist the keeping records and also by monitoring the transactions which
temptation to write down them down [6]. can lead to more transparency and will ultimately result in less
crime.
• Keep your social media accounts private: Make certain that
you simply keep your social networking profiles (Facebook, Using AI (Artificial Intelligence) for the identifying threats: AI
Twitter, YouTube, etc.) private. Be sure to check your security can be a very powerful defender from the cyber criminals as it
settings. Be careful of what information you post online. can detect the problem in the vulnerability by analyzing its every
Once it's on the web it's there forever [6]. aspect millions of time within seconds. AI can help checking
emails before a person clicks on it by check its link on a fake
• Secure your mobile devices: Many of us aren't aware
server and if it a scam emails it can directly go to the spam folder
that their mobile devices also are susceptible to malicious
without the user even knowing it. Similarly, an AI can scan the
software, like computer viruses and hackers [6].
loopholes and identify all the vulnerabilities and if someone tries
• Protect your data: Protect your data by using encryption to attack that vulnerability it can automatically block it before the
for your most sensitive files such financial records, and tax attacker can breach it.
returns [6].
• Protect your identity online: When it involves protecting
Conclusion
your identity online it's better to be too cautious than not Computer security may be a vast topic that's becoming more
cautious enough. It is critical that you simply take care when important because the planet is becoming highly interconnected,
giving out personal ID like your name, address, telephone with networks getting used to hold out critical transactions. It is a
number and/or financial information on the web [6]. well-known incontrovertible fact that terrorists are using the web
to speak, extort, intimidate, raise funds and coordinate operations.
To report cybercrime in India, the first step is to file a complaint
The degree of our preparedness within the face of these potential
at the cybercrime cell in a police station of the city where the
threats does leave much to be desired. The Government should
crime has taken place, or where the device is located which was
also note of this slow but worrying development and put in situ a
affected or attacked by cyber criminals. You can go to the police
correct mechanism to curb the misuse.
station of your state or send a mail to the Police as they will
forward your complaint to the Cyber Cell or you can directly mail References
the complaint to cyber cell.
1. Biden JE (2011) Cybercrimes. SSRN Electron J: 1-14.
Innovations in cyber security 2. Tips on how to protect yourself against cybercrime.
As technology is advancing rapidly, the IT sector and computer Kaspersky.co.in, 2018.
security are getting more fragile and susceptible to risks 3. Kancharla B (2020) Almost 45% of the cyber-crimes reported
and threats. Going much beyond their regular activities, the in 2018 are from UP & Karnataka. Factly.in, 2020.
attackers are innovating and advancing their approach to steal
4. Advanced cyber security innovations and updates for 2020.
much complex data and knowledge. Right from credentials to
Technology Trends-medium.com, 2019.
misconfiguring cloud data, cyber security attacks are making life
tough for people within the IT sector. [4] There are few innovations 5. What is cybercrime and how can you prevent it? avast.com,
which can be helpful in cyber security sector which are: 2019.
Biometric scanning: Payments can be made more secure by 6. Shalini S (2019) How to prevent cybercrime in India? myadvo.
in, 2019.