Effect of Cybercrime On Teenagers For Technology
Effect of Cybercrime On Teenagers For Technology
Internet is a virtual networking medium that can be connected and used on a variety of devices
these days. It enables the users to send, receive, collect, store, update, delete and many others operations
of the data access. Internet usage is expanding its boundaries every day. A few of major uses of e
commerce, e learning, knowledge sharing, social connectivity, media, file transfer, communicate and
collaborate with others.
Therefore cyber-crimes increasing day by day all over world. Cyber-crimes is not only hacking and
cracking, but now also include extortion, child pornography, money laundering, swindle, software
pirating, and corporate espionage are so on cyber-crimes.
India is at 2nd place regarding the 50 lakhs Facebook users are age between13 to17 years old. The 30
million twitter users. What`s app users are around one million. It`s expected that in next one year, mobile
internet users will be three hundred twenty million and total internet users shall be over the five hundred
million. We have large network of users but we just have only 23 cyber-crime cell in india. So it`s very
thought-provoking the control on online crimes and operative safety instructions and guidelines making
inflexibly executed by children.
Internet safety messages need to be timely, age specific, culturally sensitive and match the values and
laws of the society in which the child or young person lives.
Grooming - Online Dating - It is also worth mentioning that adults can be groomed as well,
especially through online dating sites. Moreover, many users of these sites can also be victims of
romance swindles.
Other forms of online grooming - Extremist groups and/or individuals are using social media
to radicalize individuals, especially young people. They tend to target groups of people who can
be easily led because of their state of mind, their upbringing or their experiences. Sometimes
individuals may actively search for online radical content, in doing so extremist individuals can
manipulate to their own advantage and use this interest to initiate contact.
Halder and Jaishankar (2014) note that “Grooming and trapping children can be done by many ways;
including simple chatting in that that “If the victim accepts the groomer as „friend‟, it becomes easier for
the groomer to acquire information about the maturity status of the victim. This is mainly acquired from
the status messages that are shared by the victim, unclaimed pictures with messages embossed on them,
which may be shared from other friends‟ collections, and so on. In case the child has an open profile, it
becomes even easier for the perpetrator to trap him/her.”
Criminal Gang / Drug Dealing Involvement - There are cases around the country as well as
all over the world where children have being groomed to join criminal gangs for drug dealing.
The use of children by criminal gangs has seen as beneficial and profitable primarily for the
reason that gang members can exert their control. Groomers also use material gifts or promise of
money in a bid to entice them. Many companies sell drugs online in contravention of Indian laws,
which do not permit sale or purchase of drugs on an e-commerce site. They may also explore
Darknet markets using Tor, the popular system for anonymous web browsing.
Social media - One of the most popular activities on the internet is joining social networking
sites. These sites provide opportunity to conduct many types of activities including
communication and sharing. Below are some tips for safe social networking that will help to keep
you safe across all social media outlets including Facebook, Twitter, what`s up, Snapchat and
Instagram and many more.
Sexting - “Sexting” is a term used to describe the sharing of intimate images or video with another
person. They can be sent using any device that allows you to share media and messages. The reasons as to
why people sext differs, it can be deliberate where the person sending the content means it to happen. It
can also range from peer pressure or boosting self-esteem.
Risks of sexting
That photos or videos end up being shared between adults they don't know.
Blackmail - An offender may threaten to share the pictures unless they receive money or more images,
Images posted online can attract the attention of sex offenders.
Emotional distress - It can lead to feeling embarrassed or humiliated. This can result in self-harming or
in some cases suicide.
Bullying - If images are shared with their peers or in school, the child may be bullied.
Online gaming addiction - In a recent case from India, two gaming-addicted brothers required
a month of rehabilitation in the ward of the Ram Manohar Lohia Hospital in New Delhi. Several
reports and articles in the media, which have been suggesting an increasing in cases of an Internet
and a gaming addiction, highlighted this case as an example of the perils of teenagers spending
excessive amounts of time on online gaming.
Playing games online and using consoles or games on a computer can be great fun, but you need to be
careful about how much you play and whom you play with. It is important that if you chat with other
gamers you protect your privacy and don‟t share personal information. If you are unsure whether a game
is suitable, ask your parents or a trusted adult to check its classification and reviews for you.
Online bullying - What is bullying? Bullying is the act of intentionally causing harm to another
person through verbal harassment, physical assault or other more subtle methods of coercion such
as manipulation. In everyday language, bullying often describes a form of harassment perpetrated
by an abuser who possesses more physical and/or social power and dominance than the victim
does. The victim of bullying is sometimes referred to as a target. The harassment can be verbal,
physical and/or emotional.
Through services such as e-mail, forums, chat rooms, blogs, Instant Messaging programmes, SMS and
MMS, and video cameras, it is possible to keep in touch with old friends or make new ones in real time
and in all parts of the world and to exchange ideas, play games, carry out research, etc. Although most of
these services and the ways they are used are positive, in some cases, these same tools can be used to
offend, deride, defame and annoy Internet users; and furthermore, violent or offensive off-line behaviour
becomes magnified when filmed with mobile phones and exchanged or posted on the Net.
Bullying among children is generally indicative of an imbalance of power or strength demonstrated
through intentional or unintentional aggression repeated over time. It is known to involve hitting or
punching (physical bullying); teasing or name-calling (verbal bullying); intimidation through gestures or
social exclusion (nonverbal bullying or emotional bullying); and sending insulting messages by e-mail
(cyber bullying).
The 2014 report of the Parliamentary Committee on Information Technology recognized that the
online bullying of teenagers by their peers was probably far more common than other offences. Online
and offline bullies display their power against another person by repeatedly manipulating the knowledge
of the targeted child‟s context and sensitivities. While such hurtful online behaviour is unlikely to be
considered as an offence under Indian law, the severity, frequency of such messages can cause significant
distress to the targeted child. The incidence of such exposure is bound to increase as mobile technology,
images and videos become easier to access.
As per the Teens, Tweens and Technology Survey commissioned by Intel Securities in India in
2015, 52% of teenagers indicated that they had themselves bullied people over social media. The main
reasons for their behaviour cited by cyber bullies were that other children were mean to them or they just
did not like the other child. Online threats of stalking, violence, rape and death can be emotionally
draining. Moreover, the effect of intimidation is further enhanced when the threatening message is shared
with others and is followed by cyber stalking. A child‟s private information or weaknesses exploits the
developmental need of children to feel accepted and appreciated by their peers and feeds on their
psychological insecurities. Being ridiculed, expelled from the peer group or discriminated against can
have deeply harmful effects on a child. Of course, this is not unique to online social exclusion,
particularly in the context of widespread caste-based discrimination.
Therefore, you are aware of the different forms it can take and what can be done to avoid becoming a
victim:
1. Avoid circulate your personal data thoughtlessly, as this could make you easily identifiable and more
prone to acts of bullying and intimidation by others your own age.
2. Once information is posted online it is out of your control and available to anyone and open to any sort
of use. You need to be completely clear on this concept, what may seem like an innocent joke could wind
up having very irritating and hurtful consequences for others,
3. It is important to refrain from reacting to provocations received via SMS , MMS, instant messages, in
offensive or defamatory e-mails, in chat rooms or during online encounters with other users. Instead you
need to employ certain strategies that can exclude or limit the actions of those attempting to provoke you
such as: many games allow for the exclusion of undesirable, when chat rooms are monitored, it is
possible to save the offending text from the chat and report it to the monitor, abuses can be reported to
service providers or, in the case of abuse via mobile phones, the report can be sent to the mobile phone
company, in the more serious cases, such as cases involving physical threats, it is advisable that the police
also be informed, it is possible to trace the e-mail account from which the offensive message was sent, but
practically impossible to prove who actually used it to send the message. The online bully could also hack
into someone else‟s account and use it for his/her offensive Behaviour and therefore letting the blame fall
on the unfortunate person whose e-mail account was wrongfully used, most e-mail programmes offer
filters to block unwanted incoming e-mails.
4. Many instant messaging programmes offer the possibility of creating a list of names that users can
choose to block. In this way, you can prevent unwanted people from making contact with you. An Instant
Messaging (IM) system lets you know when one of your known and approved contacts is online and, at
that point, you can begin a chat session with the person you feel like talking with; there are quite a
number of different IM systems, and Yahoo Messenger!
Tell your parents, a teacher or someone within the school staff you feel you can trust. Even telling
your friends could be helpful.
You can also report to the service provider or mobile operator, even to the police if it`s serious.
Remember to save the evidence of the bullying, as this will be important when you tell someone. Bullying
is not acceptable either in an online or in an offline environment. In a many countries, there are national
or local organizations that you can turn to for help. In some countries, such as Canada, „cyber-bullying‟ is
considered an actual criminal act.
Since 2011, social media platforms have been using Photo DNA technology developed by Microsoft to
scan every uploaded photo to control the distribution of CSAM. Child pornography images are deleted
immediately and the account is blocked and examined by a team of experts. The images classified as
illegal are added to a global photo DNA database. If there is reason to believe that a child is in immediate
danger, the case is referred to a local law enforcement agency or reported. Globally, Internet companies
have been working with law enforcement for many years to stop illegal material being shared on the web.
Generally, child sexual abuse images are removed and reported to the designated authorities. In order to
coordinate these efforts, close collaborations have been built between Internet companies and NCMEC,
the Child Exploitation and Online Protection Centre (CEOP) (United Kingdom), IWF, INTERPOL, the
FBI and many local, federal and international law enforcement organizations and departments.
New challenges have now emerged with the rapid rise and adoption of over-the-top messaging platforms
such as WhatsApp, Snapchat, WeChat and Viber, Telegram. Such platforms have created a whole new
ecosystem of use and potential abuse of children, given their person-to-person nature and removal of
messages from servers once delivered. Mobile Internet access via pre-paid options, while convenient for
consumers, create significant challenges for law enforcement as well as for service providers in tracking
illegal behaviour and identifying offenders.
What would we do?
Tell someone you trust, like a parent, teacher, family member, friend
Save or print all messages from a bully for the purpose of documenting behavior and future
evidence
Report - Most social networks will allow you to report offensive material. After taking a
screenshot, you should report it to the service provider
Block - The easiest way to stop someone bothering you online is to block their account from
contacting you
Do not retaliate or respond to abusive messages.
In Gujarat state - http://cskgujarat.gov.in/ Cyber Suraksha Kavach aims to secure the state and citizens
of Gujarat against cyber adversaries by building much needed cyber resilience for citizens, businesses and
other organizations in the state of Gujarat. Cyber Suraksha Kavach develops and promotes a culture of
cyber security and safer Internet usage practices to make people, especially children and other gullible
users, aware of fundamental DOs and DON‟Ts.
Case study
The recent case in south Delhi in one instagram group name is „BOIS Locker Room‟ is an
online group allegedly involving teenage boys from Delhi schools casually talking about rape, sexual
objectification and slut-shaming school girls has set off a storm on social media. Delhi police has filed
case linked to the Instagram group, which has now been deactivated. The cyber-crime division also has
written to Facebook owned Instagram for details on the group that is every parent`s worst nightmare.
Then after several social media users posted screenshots on Instagram and Twitter of an online group
called „bois Locker Room‟
The Delhi commission for women chairperson Swati Maliwal called for the arrest of those associated
with the group. The DCW has sent notices to Instagram and Delhi police. We want these boys to be
arrested immediately and the strongest action to be taken against them. The one who has been nabbed so
far is a 15-year-old student of a prominent school in south Delhi. 22 other boys have been identified and
they would be called for investigation the police said on 5 may 2020. The detained accused would be
produced before the juvenile justice board (JJB).
A case registered under section 465 forgery, 471 using forged document, 469 forgery for purpose of
harming reputation, 509 intending to insult the modesty of any women of the IPC and 67 and 67A of the
information technology (IT) act at cyber cell of Delhi police.
This incident the Facebook response is „we absolutely do not allow behaviour that promotes sexual
violence of exploits anyone, especially women and young people, and have actioned content violating our
community standards as we made aware of it. We have policies that disallow the sharing of
nonconsensual intimate imagery, as well as threats to share such imagery and we take this issue very
seriously. Ensuring our community can express themselves in a safe and respectful way is our top
priority‟
Next in the case the twist is the girl with fake account made „gang rape‟ comment to test boy`s character.
In its investigation into the bois locker room case the police has stumbled upon a conversation on
snapchat where a girl, posing as a male, suggested a sexual assault plan to a boy just to test his „values
and character’. Therefore we show the how is the incident nowadays growing in the country?
Conclusion
Criminal behavior on the Internet, or cyber-crime, presents as one of the Major challenges
of the future to India and International law enforcement. As ICT become even more pervasive, aspects of
electronic crime will feature in all forms of criminal behavior, even those matters currently regarded as
offences that are more traditional. It already features in many international crime-involving drug
trafficking, smuggling, cyber terrorism and money laundering. Digital evidence will become very
common market, even in traditional crimes, and we must be prepared to deal with these new challenges.
Law enforcement agencies around the world are working together to develop new partnerships, new
forensic approaches and new responses to cyber-crime in order to safeguard safety and security on the
Internet. New expertise, technologies and investigative modus operandi, applied in a universal context,
will be required to detect, prevent and respond to cybercrime. This “new business” will be characterized
by new forms of crime, a far comprehensive scope and scale of offending and victimization, the need to
respond in much more timely way, and challenging technical and legal complexities.
Therefore end of the brief these are a:
STOP. Before you use the Internet, take time to understand the risks and learn how to spot potential
problems.
THINK. Take a moment to be certain the path is clear ahead. Watch for warning signs and consider how
your actions online could affect your safety, or your family‟s.
CONNECT. Enjoy the Internet with greater confidence, knowing you‟ve taken the right steps to safety
net yourself.
References
Australian Communications and Media Authority. (2013). Like, post, share: Young Australians’
experience of social media. Melbourne, Australia.
A guide to cybercrime and online safety-block the web monsters
www.westyorkshire.police.uk/BlockTheWebMonsters
Baas, N., de Jong, M. D., & Drossaert, C. H. (2013). Children‟s perspectives on cyberbullying:
insights based on participatory research. Cyberpsychology, Behavior, and Social Networking,
16(4), 248-253. Netherlands
Berkman Center for Internet & Society. (2008). Enhancing Child Safety and Online
Technologies: Final Report of the Internet Safety Technical Task Force to the Multi-State
Working Group on Social Networking of State Attorneys General of the United States. Boston,
MA: Harvard University. United States
"CYBER CRIME CHANGING EVERYTHING – An empirical study" (Neelesh Jain, Vibhash
Shrivastava) International Journal of Computer Application - 2014 (Issue 4, Volume 1)
Cyber crime a new challenge for CBI, www.rediff.com, March 12, 2003
Department of Electronics and Information Technology, „Cybercrime, cyber security and right to
privacy‟, 52nd Report, New Delhi, February
2014.http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technolo
gy_52.pdf
Get Safe Online - Free online security advice - https://www.getsafeonline.org
Government of India, Ministry of Home Affairs, National Crime Records Bureau, Crime in India
Report, 2014.
The Internet Watch Foundation - https://www.iwf.org.uk/
International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue:
06 | June -2017 (A brief study on Cyber Crime and Cyber Law‟s of India) www.irjet.net
Jaishankar, K., Cyber Bullying: Profi le and Policy Guidelines. Tirunelveli: Department of
Criminology and Criminal Justice, Manonmaniam Sundaranar University, 2009.
Microsoft, Global Youth Online Behaviour Survey, 2012. Standing Committee on Information
Technology (2013-14), Fifteenth Lok Sabha, Ministry of Communications and Information
Technology
National crime record bureau journal October 2018 vol. 1 (government of india)
(www.ncrb.gov.in)
Refer Annex 3: Cybercrime Investigation Cells in India
Sexual Harassment on the Internet.
https://www.unc.edu/courses/2010spring/law/357c/001/internet harassment/internet-
harassment.html
Telephone conversation with Rakshit Tandon, India cybersecurity specialist, January 2016.
The phrase “child sexual abuse material” is increasingly preferred to describe sexually explicit
representation of children in place of the term “child pornography” as it dispels the notion of
consent on the part of the child in any way and reflects the grave nature of the content
The Child Exploitation and Online Protection (CEOP) https://www.ceop.police.uk/Ceop-Report/
The India Express, Six youths arrested for 2 „rapes‟ at Fort Kochi‟, 25 January 2016.
http://indianexpress.com/article/india/india-news-india/sixyouths-arrested-for-2-rapes-at-fort-
kochi/#sthash.Faewe4ni.dpuf
The Washington Post, „More people died taking selfies in India last year than anywhere else in
the world‟, 14 January 2016. www.washingtonpost.com/news/worldviews/wp/2016/01/14/more-
people-die-taking-selfies-in-india-than-anywhere-else-in-the-world/
Youth Internet Safety: Risks, Responses, and Research Recommendations – center for technology
innovation at brookings - Adina Farrukh, Rebecca Sadwick, and John Villasenor (2014)
URL
https://www.usa.gov/online-safety (internet crime education)
http://intelsecurityapac.com/digitalsafety/2015/10/27/research-india-ttt
https://www.history.com/internet
https://theconversation.com/why-do-people-risk-their-lives-or-the-lives-of-others-for-the-perfect-
selfi e-55937
www.wikipedia.org
www.thrillist.com/vice/how-to-buy-illegal-drugs-online-with-the-darknet-tor-bitcoin-and-more-
explained
www.infosecawareness.in