Crime
Crime
CYBER
CRIME
What is Cybercrime?
Technology-as-Target Technology-as-Instrument
Criminal offences targeting computers and other Criminal offences where the internet and information
information technologies. (Hacking to steal sensitive technologies are instrumental in the comission of a crime.
data, unauthorized use of a computer, denial of (fraud, identity theft, cyberbullying, human and drug trafficking,
service attack to online services, etc.) etc.)
Technology-as-target is considered to be pure forms of In Canada many organizations have suffered from
cybercrime. The RCMP has stated “Criminals find ways to cybercrime causing these organizations to lose a total
compromise these technologies and obtain or destroy personal
or sensitive information, or remotely access and infiltrate
of $1.5 billion dollars in 2017. Phishing and online fraud
computers, systems, system networks or mobile devices for a continue to be a huge issue in Canada, in 2021
variety of illegal activities” Canadians lost $100 million dollars due to online fraud.
Different types of Cybercrimes
Technology-as-target cybercrimes: Technology-as-Instrument:
1. Technology creates new opportunities for criminals: Online markets and internet-facing devices provide
the same opportunities and benefits for serious and organized criminal networks as they do for
legitimate buisness.
2. Cybercrime is expanding: Once considered the domain of criminals with specialized skills, cybercrime
activities have expanded to other offenders as the requisite know-how becomes more accessible
3. Cybercrime requires new ways of policing: The criminal exploitation of new and emerging technologies
- such as cloud computing and social media platforms, anonymous online networks and virtual currency
schemes - requires new policing measures to keep pace in digital era.
Cybercrime from a Law Enforcement Perspective
The RCMP considers cybercrime to be any sort of crime where the internet or
information technologies are involved in the moment when the criminal
offence has been commited. The RCMP uses the two different categories of
cybercrime to gain a new reach in understanding new cybercrimes and the
traditional activities that cybercriminals are enacting on. These categories
are also helpful to the RCMP to separate cybercrime incidental uses of
technology.
Made-to-Order Content
Ordering videos/images to suit
offenders’ preferences
70% of known 90% of accused are
victims are girls boys/men, typically much
aged 12-17 older than their victims
AI in cybercrime as a whole is dangerous, there has been a recent surge regarding scam
callers imitating loved ones, pleading and begging for ransom money or bail. When in
reality, their loved ones are safe at home. With the use of A.I, a small snippet of someone's
voice is enough to create a whole digital dialogue for them, allowing these criminals to
manipulate loved ones and instill fear. Unfortunately, that isn’t the worst of A.I. There have
been multiple A.I sites created strictly for it’s ability to “undress” any photo. Photos of
unconsenting people, men, women, and children, are being displayed in provocative
circumstances.
A news clip from Good Morning America has recently gone viral for exposing the use of
A.I voice cloning in scam calls
https://www.youtube.com/watch?v=Dfo2MMGZTvU
The simple facts
Over 62000 cases of fraud are committed in Canada.
Scammers commonly use media like text messages, emails, facebook, ect. To provide links
that will penetrate a computer/cell phone's safety parameters, unlocking private
information and allowing access to accounts, personal information, and other victims.
It is also quite common for cybercriminals to create false websites requiring personal
information.
The most susceptible devices to infiltration are common desktops, and smartphones.
Over 2 million general crimes per year are committed in Canada, meaning that fraud
accounts for roughly 3.1% of those crimes.
Prevention of A.I related cybercime
People have come up with their own ways to
avoid these issues over the last few months,
prominent techniques being avoidance,
swearing off of social media and simply
avoiding unknown phone calls. A simple
solution to avoiding and recognizing
hackers/scammers in a business settings is
easiest with auditors, and being on top of
financial information. Despite best efforts,
software updates and advancements make no
difference, as they are no match for the latest
A.I advancements.
Reporting cybercrime
There are very low rates of actual reports regarding cybercrime, especially when it
comes to fraudulent messages, as most people delete said emails or messages without
thinking to report it, especially since it has become such an everyday occurrence for
many. This leads to an underreport of cybercrime statistics and halters law
advancements, which could help prevent it happening to more vulnerable people(ex
the elderly).
Text 7726 to report/forward scam messages.
Report fraudulent crimes to cybercenter, the Canadian anti-fraud center, local police,
banks, other account holders if needed.
5 Types of Cybercriminals
I conducted multiple searches and compiled three of the best mobile security applications
that frequently make it onto top-rated lists for their reliable features:
1. Norton Mobile Security
2. Bitdefender Mobile Security
3. McAfee Mobile Security
#5: Install the latest operating system updates
Keep your applications and operating system (e.g. Windows, iOS, iPadOS,
watchOS, tvOS, macOS, AOSP, Android One, Android Go, Android, TV Etc.) current
with the latest system updates. Turn on automatic updates to prevent potential
attacks on older software.
Use encryption for your most sensitive
files such as tax returns or financial
your data
location.
Examples:
Name: Often a starting point for identity theft or phishing.
Address: Can verify identity for account breaches or unwanted physical access.
Phone Number: Used in two-factor authentication, making SIM-swapping attacks possible.
Financial Information: Allows fraud and unauthorized access to bank accounts.
Birthplace and Date: Common in security questions, making accounts easier to hack.
Personal Photos and Location Data: Metadata may reveal your location, risking tracking and scams.
Medical Information: Breaches can lead to identity theft and insurance fraud.
#9: Avoid being scammed
Always think before you click on a link or file of unknown origin. Don’t feel pressured by
any emails. Check the source of the message. When in doubt, verify the source. Never
reply to emails that ask you to verify your information or confirm your user ID or
password.
For example, if you receive an email with a link, ensure it is a safe link. Safe links typically
begin with
“https://” – The "s" stands for secure, meaning the site uses encryption to protect your
data. Avoid links starting with just "http://."
Also, look out for no extra characters or unusual extensions – Look out for long strings of
numbers, odd characters, or extensions like ".xyz" or ".cc," which are sometimes used in
scam links.
#10: Call the right person
for help
Don’t panic! If you are a
victim, if you encounter
illegal Internet content
(e.g. child exploitation) or
if you suspect a computer
crime, identity theft or a
commercial scam, report
this to your local police. If
you need help with
maintenance or software
installation on your
computer, consult with
your service provider or a
certified computer
technician.
References
cyber.gc.ca
The Shocking Truth About Cyber Crime in Canada | Access Tech Live - YouTube
https://time.com/6344086/nudify-apps-undress-photos-women-artifical-intelligence/
Police-reported crime statistics in Canada, 2021
(photos)
AdobeStock_186885581-scaled.jpeg (2560×1696)
https://www.iconfinder.com/icons/1909673/crime_cyber_hacker_icon
https://truelist.co/blog/cybercrime-statistics/
Mikkola, M., Oksanen, A., Kaakinen, M., Miller, B. L., Savolainen, I., Sirola, A., Zych, I., & Paek, H.-J. (2024). Situational and
Individual Risk Factors for Cybercrime Victimization in a Cross-national Context. International Journal of Offender Therapy
and Comparative Criminology, 68(5), 449–467. https://doi.org/10.1177/0306624X20981041
https://ca.cybernews.com
https://www.rcmp-grc.gc.ca/to-ot/tis-set/cyber-tips-conseils-eng.htm
Introduction to cybercrime - YouTube https://www.youtube.com/watch?v=qS4ViqnjkC8
5 types of cybercriminals- YouTube https://www.youtube.com/watch?v=bAO_ur8CJvY
Canada, Public Safety. About Online Child Sexual Exploitation, 23 Aug. 2023, www.publicsafety.gc.ca/cnt/cntrng-crm/chld-
sxl-xplttn-ntrnt/abt-nln-chld-sxl-xplttn-en.aspx.
Canada, Public Safety. “Actions to Combat Online Child Sexual Exploitation.” Public Safety Canada, 23 Aug. 2023,
www.publicsafety.gc.ca/cnt/cntrng-crm/chld-sxl-xplttn-ntrnt/actns-nln-chld-sxl-xplttn-en.aspx.
Canada, Public Safety. “International Efforts and Cooperation.” Public Safety Canada, 23 Aug. 2023,
www.publicsafety.gc.ca/cnt/cntrng-crm/chld-sxl-xplttn-ntrnt/ntrntnl-ffrts-en.aspx.
Canada, Public Safety. “Support for Victims and Survivors.” Public Safety Canada, 23 Aug. 2023,
www.publicsafety.gc.ca/cnt/cntrng-crm/chld-sxl-xplttn-ntrnt/spprt-vctms-en.aspx.
References Cont’d
Dennis, M (2024, September 19th) Cybercrime Britannica https://www.britannica.com/topic/cybercrime
Royal Canadian Mounted Police (2014, December 16th) Cybercrime: an overview of incidents and issues in
Canada https://www.rcmp-grc.gc.ca/en/cybercrime-an-overview-incidents-and-issues-canada#sec1
Royal Canadian Mounted Police (2021, September 10th) Cybercrime defined https://www.rcmp-
grc.gc.ca/en/cybercrime-defined
Government of Canada (2024, October 21st) Official Canadian Anti-Fraud Centre Website
https://antifraudcentre-centreantifraude.ca/index-eng.htm
Royal Canadian Mounted Police (2019, October 10th) Online Child Sexual Exploitation https://www.rcmp-
grc.gc.ca/en/online-child-sexual-exploitation