You are on page 1of 22

The Internet as Transnational and

International crime
Obviously, the Internet (I-way) and
International crime are fundamental related as
the Internet backbone connects all online
computer networks worldwide to each other.
Digital crime in all forms is likely to
increase dramatically in the 21st Century, as
globalization of computer networks continues,
accompanied by dramatically increase access
to these networks.
Criminologist, criminal justice officers, and
computer security personnel need to prepare
how to be able to meet these treat. However,
until recently it has been difficult to even
categorize digital crime adequately so that
analyst and practitioners can discuss this
phenomenon intelligently. Phrases such as
computer crime, network crime, internet crime
and information crime have all been
employed, often times without specificity, to
describe digital crime.
The Internet is overwhelmingly a power for good.
It provide cheap and easy access every
moment of everyday to vast reservoir
information and entertainment and it is
transforming the nature of commerce and
government, but there is a dark side to
Internet. It would be nave to deny it and
alarmist to exaggerate it. Crime on the Net
takes many forms including hacking, viruses,
fraud, scams, money laundering, industrial
espionage, prostitution, certain forms of
gambling, drug abuse, drug smuggling,, suicide
assistance, defamatory allegations, cyber
stalking, cyber terrorism and actual terrorism.
International cybercrimes challenges the
effectiveness of domestic and international
law and law enforcement. Because existing
laws in many countries are not tailored to
deal with cybercrime, criminals increasingly
conducts crimes on the Internet in order to
take advantages of the less severe
punishments or difficulties of being traced.
The inherently transnational nature of the
internet fits perfectly into this model of
activity and the effort to maximize profits
within an acceptable degree of risk.
In the virtual world, there is no borders, a
characteristics that make it very attractive for
criminal activity. When authorities attempt to
police this virtual world , however , borders and
national jurisdictions loom large making
extensive investigation slow and tedious, at best,
and impossible, at worst. The Internet itself
provides opportunities for various kind of theft,
whether from online banks or of intellectual
property. But also offer new means of committing
such as fraud, and offers new vulnerabilities
relating to communication and data that provide
attractive for extortion, a crime that has always
been a staple of mafia org.
The anonymity of the internet also makes it an
ideal channel and instrument for many
organized crime activities. The notion of a
criminal underworld connotes a murkiness or
lack of transparency. Secrecy is usually a
key part of organized crime strategy and the
Internet offers excellent opportunities for its
maintenance .Organized crime does not
need to develop technical expertise about
Internet. It can hire those in the hacking
community who do have the expertise,
ensuring through a mixture of rewards and
threats that they carry out their assigned
task effectively and efficiently.
The Transnational organize Crime (TOC)
networks are increasingly involved in
cybercrime, which costs consumers billions
of dollars annually, threatens sensitive
corporate and government computer
networks and undermines worldwide
confidence in the international financial
system. Through cybercrime, transnational
criminal organizations pose a significant
threat to financial and trust systems-banking,
stock markets, e-currency and value and
credit cards services- on which the world
economy depends.
The UK case, in March 2001, Donald Ridley
pleaded guilty to 25 offenses relating to
internet stalking and pornography. He
conducted a campaign against a young
woman, whom he meet six years
previously when she was 17, by setting up
a Web site which invited strangers to rape
and abuse here. At one point, his victim
was receiving around 30 e-mails a day
from people who had seen the site and a
number even turned up at her home.
Ridley was sentenced to seven and a half
years in prison.
Internet related crimes as
transnational crime
Hacker- a slang term for a computer enthusiast, a
person who enjoys learning programming languages
and computer systems and can often be consider an
expert on the subjects. Among professional
programmers, depending on how it used, the term
can be either complimentary or derogatory, although
it is developing an increasingly derogatory
connotation. The pejorative sense of hacker is
becoming more prominent largely because the
popular press has scoopted the term to refer to
individuals who gain unauthorized access to
computer systems for the purpose of stealing and
corrupting data. Hackers, themselves, maintain that
the proper term for such individuals is cracker.
Crack

a. to break into a computer system. The term was


coined in the mid- 80s by hackers who wanted to
differentiate themselves from individuals whose
sole purpose is to sneak through security
systems. Whereas crackers sole aim is to break
into secure system, hackers are more interested
in gaining knowledge about computer systems
and possibly using this knowledge for playful
pranks. Although hackers still argue that theres
big difference between what they do and what
crackers do, the mass media has failed to
understand the distinction, so the two terms- hack
and crack- are often used interchangeably.
b. To copy commercial software illegally by
breaking (cracking) the various copy-
protection and registration techniques being
used.
IP Spoofing
A technique used to gain unauthorized access
to computers, whereby the intruder sends
messages to a computer with an IP address
indicating that the messages is coming from a
trusted host. To engage in IP spoofing, a
hacker must first use a variety of techniques to
find an IP address of a trusted host and then
modify the packet headers so that it appears
that the packets are coming from the host.
People all over the world use the Internet to
commit a host of crimes, some of which the
public doesnt even know are capable of
being done electronically.

10 common types of Internet crimes:


1.Phising / Spoofing- unlawful accessing a
computer without authorization and
sending multiple e-mails, resending
multiple commercial email messages with
the internet to deceive recipients; or
falsifying header information in multiple
email messages.
2.Blackmail/Extortion-using the internet to threaten to
cause damage with the intent to extort from any
money or other thing of value.
3.Accessing stored communications-Intentionally
accessing, without authorization, a facility through
which an electronic service is provided.
4.Sport Betting- Engage in business of betting or
wagering an any sporting event or contest over the
Internet.
5.Non-delivery of merchandise- Devising any scheme to
defraud, or for obtaining money or property by means
of false or fraudulent pretenses, or promises and
using the Internet for the purpose of executing the
scheme.
6. Electronic Harassment- anonymously using the Internet
to annoy, or harass the person who receive the
communication.
7.Child Pornography- using Internet to transmit child
pornography.
8.Prostitotion- persuading, inducing, enticing, or coercing
any individual to travel in interstate commerce to
engage in prostitution.
9.Drug Trafficking- Delivering, distributing, or dispending a
controlled substance by means of the Internet.
10.Criminal Copyright Infringement- infringing a copyright
for financial gain or work being prepared for the
commercial distribution on a computer network.
.
Types of internet crime Copyright violations,
include: such as software piracy
Cyber bullying and Counterfeit trademarks
harassment Illegal weapon
Financial extortion trafficking
Internet bomb threats Online child
Classified global
pornography
security data theft
Credit card theft and
fraud
Password trafficking
Email phishing
Enterprise trade secret
Domain name hijacking
theft
Virus spreading
Personally data hacking
In September 1999 two members of a U.S.-based
group known as the Phonemasters were
convicted and jailed for their penetration of the
computer systems of telecommunications
companies MCI, Sprint, AT&T, and Equifax.
One of those convicted, Calvin Cantrell, had
downloaded thousands of Sprint calling card
numbers. They were sold to a Canadian,
passed back through the United States, resold
to another individual in Switzerland, and finally
the calling cards ended up in the hands of
organized crime groups in Italy. Networks
connections between the two kinds of groups
are likely to deepen and widen.
Global Terrorism as Transnational
Crime
Terrorism is a crime, consisting of an
intentional act of political violence to create an
atmosphere of fear. Terrorist used violence to
make a political statement about a government
of policy with which they disagree. The victim
may be symbolic or random, but the act itself is
always political. Acts of terrorism are
premeditated by their perpetrators and are
conspiratorial in nature. It is by generating fear
the terrorist hopes to motivate the public, group
or government to make changes whereby the
goals of the terrorist might be realized.
Obviously, the point of view of those
responsible for global terrorism is quite
different from those are attempting to stop
it. For example, take a look at the interview
of Usamah Bin-Ladin. His mix of political
ideology and religious fundamentalism may
not be agreed to many outside an inner
circle of believers (although the extent of
support for him by Muslims fundamentalists
worldwide is difficult to gage), but the
ideological pattern reappears in struggles
taking place in the Middle East, Northern
Ireland, and other places around the globe.
A question that social scientist have great
difficulty answering is whether violence is ever
justified as a means to achieve political goals.
However, terrorism is particularly loathsome
because targets for attack are frequently
innocent citizens rather than military
oppressors. In our media dominated world,
staging violent events that can garner
international news attention has been adopted
as a strategy by terrorists intent of pushing
their agendas. Its practice is likely to continue,
with electronic technology such as the Internet
providing both additional targets and weapons
for attacks.
Investigating Bodies for Transnational
Crimes
INTERPOL- its uncertain origin 1898-1910;
Deflem, 2001: Keonig and Das, 2001,
McDonald,1997, Nadelmann, 1993; Pasas,
1999; Sheptycki, 2000, all agree that
international patterns of policing have
historical foundations that date back to at
least the 19th century development of Nation
States, when police and government
authorities began to recognize the need for
police cooperation across the boundaries of
National Jurisdiction.
Historical antecedents of international police
cooperation were various efforts especially
in the European Continent, to control the
international spread of people and
organization that were held to be opponent
of established political systems such as
socialist, democrats, liberal and anarchist.
Evidence indicates that the development
and growth of international police
cooperation for criminal enforcement duties
was facilitated prior practices of cooperation
that had been initiated foe political reasons.
THANK YOU AND GOD
BLESS

You might also like