logo

Cyber Security: Common Cybercrimes, Investigation Process, Extradition Requests, and Establishment of an International Cybercrime Tribunal

   

Added on  2023-06-04

8 Pages1933 Words460 Views
 | 
 | 
 | 
Running Head: CYBER SECURITY 1
CYBER SECURITY
Name
Institution
Cyber Security: Common Cybercrimes, Investigation Process, Extradition Requests, and Establishment of an International Cybercrime Tribunal_1

CYBER SECURITY 2
How common are cybercrimes of this nature with the alleged offender in NSW and the target
elsewhere.
There have been a collection of cybercrime activities that have been common as shown
by the evidence of the research that was carried out by the Australian Institute of Criminology
(AIC) here in NSW. The research portrayed that in every 5 citizens here, has his/her personal
information accessed without permission. In addition to this, 10 percent of the people have
experienced this over the past year (Wall, 2015). In other regions like for instance, the United
Kingdom and the United States the loss suffered as a result of cybercrime activities and to be
more specific on hacking ranged between a few dollars to around $310,000. It was learned that
many of the people that suffer these losses get to realize them the time they review the
statements for their bank accounts (Wall, 2017). Therefore, we see that these acts of cyber-
crimes are more common not only in NSW but also in other countries.
Other countries across the world are suffering the same problem of cybercrimes. For
instance, Finance businesses have recorded high losses that have been incurred as a result of
system hacking. When a financial institution is hacked, the expected result is high loss of money.
The acts of cybercrimes have become common all across the word and are at an increase because
people are gaining more computer knowledge day by day (YUE, Wang & Hui, 2018). In addition
to this, the unemployment rate across many countries in the world has propagated the occurrence
of this acts because people need money and there are no job opportunities therefore they end up
engaging in this acts (Comer, 2017).
Cyber Security: Common Cybercrimes, Investigation Process, Extradition Requests, and Establishment of an International Cybercrime Tribunal_2

CYBER SECURITY 3
What normally happens in such cases when cybercrimes occur?
In case somebody commits a crime over the internet, the agencies that enforce the law
work in coordination with the government agencies, private corporations and internal partners
(Smith, 2018). This is because the manner in which these crimes are committed is very
complicated and thus they need to work together to get the hackers. The method used by the
hackers in their tactics is very complicated because the software that they use are very secure in
the way they hide their location and also in how they route the routes of communication aiming
at evading their direction from being detected and finally commite crimes in countries where
prosecution can’t be done.
To locate them, they apply the use of a combination of traditional investigative and
tactics of digital forensics. Most of the attacks that are implemented by computer gangs are like
the phishing scams, ransom ware, malware, and botnets. What motivates these people to engage
in cybercrime activities is because they want money (Johnson, Mora & Schmidt, 2016). When
incidences of crime are detected, the Internet Crime Complaint Center (IC3) does data collection
from the complainant and then forwards these data to the appropriate agency that does law
enforcement for such cases. To add on this, the NW3C might work with FBI to form the IC3;
they offer services to the individual law enforcement agencies with the inclusion of computer
forensics, preparation of materials and evidence and research analysis for using in a court of law.
Leave alone the lending of investigative support to the cases of enforcing the law; training is also
done to thousands of officers every year on computer forensics, financial and cybercrime
investigations and also intelligence analysis. After a series of investigations, when the person
that committed the crime is finally found, he/she is taken to the court of law and charged with the
Cyber Security: Common Cybercrimes, Investigation Process, Extradition Requests, and Establishment of an International Cybercrime Tribunal_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
CYBER FRAUD. CYBER FRAUD Name of the Student Name of th
|9
|2103
|21

Essay about Cybercrime 2022
|6
|2154
|25

Cyber Security Fraud, Scam and Identity Theft
|10
|2775
|272

Cyberspace Laws in Fiji: Strengths and Weaknesses
|11
|3028
|87

Report on Cybercrime Impact on Child and Youth
|7
|2587
|81

Reducing Cybercrime: Identity Theft, Internet Frauds, and Intrusion of Computer Networks
|4
|1162
|199