A Societal Menace: CyberCrime

Cyber Crime,

Online crimes has become a societal menace. Ranging from online financial fraud, extortion, cyber terrorism and the likes. A situation which made businesses, organizations, government and individuals to loose data or informations worth huge amount of money. Cybercrime is a crime committed online through a network with the use of the internet. Cybercrimes usually involve illegal online transactions which may pose a threat to the financial health of the society.

When cybercrimes personal information which are confidential  to companies, individuals, government and Organizations are unlawfully disclosed. Governments, and groups also engage in cybercrimes which include espionage, financial theft and crimes involving border boundaries.

Cybercrimes are perpetrated in different forms. It could be cyber extortion, financial fraud, cybersex trafficking, cyberterrorism etc.

Cyber extortion is carried out when money is illegally made online. Some people now impersonate another person online and use the fake identity in their dealings with the unsuspecting victims in a bid to defraud them of their hard-earned money, this is also referred to as 'Yahoo-Yahoo' in Nigeria and some West African countries. Cyber extortion could also take the form of denying a network system or email server of service, or hacking a website and making the payment of a specified amount of money as a condition to stop the attacks. The Federal Bureau of Investigation (FBI), has noted that the rate at which cyber criminals are hacking networks and websites is outrageously increasing, thus affecting their operations with over 20 hacks carried out monthly.

Financial fraud means a deliberate misrepresentation of facts contained in a personal data which causes loss to the owner of the personal data. Financial fraud also involves the altering of Information before entry into a database or entering incorrect information or using illegal processes, this usually take place in work place. In some cases of financial fraud Information are falsified or destroyed to cover up unauthorized transactions. Financial fraud include bank fraud, identity theft, extortion and information theft.

Cybersex trafficking is also one of the numerous crimes committed on the internet.  It means sexually harassing victims and then releasing pictures and videos of the sexual acts on the web or web-based applications, portals and websites. Some victims maybe abducted or deceived and taken to locations where the cybersex traffickers use internet capacitated device to perpetrate their illegal acts. Cybersex traffickers usually make use of dating sites, chat rooms, apps, dark sites etc to carry out their illegal acts. Also, there are instances where victims nude pictures and sex videos are Livestreamed online by their ex-lover or former sex mates. These victims might have been filmed unknowingly while the consensual sex was taking place. Legislations are needed to tackle this menace especially in nations where there are no sufficient legal instruments to cater for such victims.

There has been an outrageous increase in internet problems subject to research by 'Information Technology Specialists'. Cyber terrorists create loop holes in critical servers to map potential security. For instance, a cyber terrorist may launch a computer based attack against computers, networks, or stored data thereby intimidating organizations in a bid to achieve his objective could either be politically oriented, social or business oriented.

The cyberspace is now being used in geostrategic significance. For instance, the December 2015, Ukraine powerrgrid cyberattack which was attributed to Russia and considered the first successful powerrgrid, cyberattack. Also cyberspace operations are being adopted by the military in war fighting.

Computer Knowledge in Cyber Crime

Cyber crimes are committed by criminals who have virtual knowledge of the cyberspace. Little wonder, the rate of cyber crime increases as technology advances. These crimes are numerously committed daily on the internet and usually committed by groups bond together by a motive to commit organized crime.

Ways of Fighting Cyber Crimes

The rate of cybercrime can be reduced since it is an online based crime.

1. Investigation

In perpetrating cybercrime a computer network is used, so also, information about the perpetrated cybercrime can be retrieved from a computer network. In cases where a computer is not directly used for cybercrime, record of the crime can still be retrieved by cybercrime investigators in the form of a log file. Internet Service Providers usually keep their log files for a specified period subject to law applicable in their country of operations. Every cybercrime perpetrated usually have an IP address which can be traced during cybercrime investigation. Cybercrime investigators constitute an indispensable part of modern cyberlaw enforcement. In Nigeria, The NIA, EFCC, DSS and Police combat cybercrimes. These outfits have trained agents and analyst with a secret intelligence section that works to target financial cybercrimes.


2.The Central Intelligence Agency, monitors and secures government networks by prioritizing network risks and informing system personnel so that they can take action. The CIA has a well structured cybersecurity services protect both public and private sectors.

3. Legislations

Laws to combat cybercrimes are in place in Nigeria. An example is the CyberCrimes Act 2015. Notwithstanding, cyber criminals usually perpetrate their acts in developing countries because of low advance in technology in such countries which makes it difficult for them to be prosecuted. In Nigeria the CyberCrimes Act is operative. However, cyber criminals still operate and sometimes remain undetected. In instance where legislations for combating Cybercrimes are weak clever tricks are adopted to lure the cyber criminals.


Add new comment

This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.
1 + 16 =
Solve this simple math problem and enter the result. E.g. for 1+3, enter 4.