Sunday, February 22, 2009

Easily cheated, easily loss.......

That true nani..I totally agreed about identity theft and phishing scams. The perpetrators very skillfull to manage all these crimes. I want to add something here about spam and internet child pornography.These two thing are also can easily exposed to perpetrators.

As the use of Electronic Mail increases throughout the world, so has the emergence of Unsolicited Commercial E-mail (UCE), which is more commonly known as "spam." For many consumers, UCE is a time-consuming nuisance. For others, it has been a costly learning experience as they have lost money responding to bogus scams that arrived in their e-mail inbox. Often, e-mail spammers purchases bulk e-mail addresses from a list broker. These brokers are able to compile addresses from a wide array of electronic "directories". If your e-mail address appears in a newsgroup posting, on a website, in a chat room, or in an online service's membership directory, it may find its way into the hands of a broker. Marketers then use special software capable of sending hundreds of thousands - even millions - of email messages to the addresses at the just click of a mouse!.

For Child pornography, parents who neglect the role to observes the online activities of their children may welcome perpetrators. Adults who prey on children often befriend children they meet online and arrange meetings with them for sexual purposes. The children who agree to meet an online "friend" typically do so without knowing that the person on the other end is an adult pretending to be a child.

That’s how person are easily exposed to perpetrators. Every types of internet crime have their own ways on how ones person can be exposed. Maybe if there is any information, others can add it, so that we become aware against this crimes.


Hyedah~

Friday, February 20, 2009

Victims on Internet Crime

There are several ways we can expose to the internet crime or we can be a victim of this problem. Internet crime is a general term that embraces such crimes as phishing, credit card frauds, identity theft, child pornography, kidnapping children via chat rooms, scams, cyber terrorism, creation and/or distribution of viruses, spam and so on. All such crimes are computer related and facilitated crimes.

With the evolution of the Internet, along came another revolution of crime where the perpetrators commit acts of crime and wrongdoing on the World Wide Web. Internet crime takes many faces and is committed in diverse fashions. The number of users and their diversity in their makeup has exposed the Internet to everyone. Some criminals in the Internet have grown up understanding this superhighway of information, unlike the older generation of users. This is why Internet crime has now become a growing problem in the United States. Some crimes committed on the Internet have been exposed to the world and some remain a mystery up until they are perpetrated against someone or some company.

1. Identity Theft

One of the fastest growing crimes in the country is identity theft. Identity theft is simply when someone steals your personal information and uses it to commit a fraudulent transaction. It's a terrible crime that can wreak havoc on not only the financial lives but also the emotional and mental well-being of its victims. One of the reasons this crime is growing so quickly is that the Internet makes it easier for the criminals to obtain other people's personal information.

Before the proliferation of the Internet identity theft still occurred. There are many off-line ways to obtain peoples personal information like stealing people's mail or going through their trash to find discarded financial documents. The Internet offers these thieves easier access to their victims sensitive information. There are websites and forums where people actually buy and sell things like credit card numbers, Social Security numbers, driver's license numbers etc.

In addition to simply purchasing information from another criminal, one way these thieves obtain the information they're looking for is called phishing. In phishing scams, internet-based communications often purport to be from legitimate organisations, such as banks, and use that perception of a trusted relationship to get people to reveal personal information.

2. Phishing

A phishing scam the mark, or potential victim, will usually receive an e-mail asking them to click on a link taking them to an official looking webpage to fill in their personal information. The e-mail will claim to be from a legitimate business or institution such as a bank. The e-mail you receive will say something like "there's been suspicious activity on your account please click this link to log in and update your account information". If you click the link you'll be taken to a page that looks just like a page from your bank's website but it's really just a cloned page. The cloned page looks identical to your bank's page but everything you type in on that page is recorded by the person running the phishing scam. The information you typed in can now be used to steal money from your bank account, open lines of credit in your name that will be maxed out and never paid, or they may just sell your information to someone else who will do all of those things.

>>to be continuee.....

Naniey++

Thursday, February 19, 2009

How we can be the victims of internet crime?

Hello...

Have we ever think about this? We live in the age of possibilities. Not to say that all of these possibilities are good, because we all know that some of them are quite horrid. But, as always, we have to take the good with the bad. One aspect of technology that introduced a vast array of possibilities was the personal computer. Or should I say is the personal computer? There is still more yet to come. The outstanding advantage this technology offers us concerns the Internet. Suddenly everything was within our reach. No more writing letters on paper or driving to the bank to deposit a check. Home computers offer us unlimited conveniences. We can do all of our internet banking, we can contact people anywhere in the world within seconds, we could even play computer games against multiple opponents across the globe simaltaniously.

However, there is also a deep, dark, and dangerous side to these wonderous machines, which also concerns the web. Surely the phrase "Internet crime" is more than one occasion. Type in a search and you'll hear all about people who have had their bank accounts or paid for items they never received. Some people unlucky enough to be a victim of internet crime have even had their identity stolen. The question is; how we can be exposed to internet crime?...

Hyedah~

Changes In The Crime Rate..

hi,(yatie) ^_^

I found another long study.

>which demonstrated that young people are the greatest determinant in changes in the crime rate. In essence, each new crop of kids determines the change in the crime rate for the coming year. Appearently older folks stop becoming violent criminals in a predictable manner.

>And even poor kids have access to the Internet in school. It can have a proportionally greater impact on a poor child's life who has nothing and is surrounded by dis-empowered people, to jump on the Internet and discover the whole world at his/her fingertips.

The Good News is:
A) For some mysterious reason, the violent crime rate has steadily dropped since 1994 to 1/3 of its previous level.
B) Kids today are hyper-empowered and excited about the future as a direct result of the awesome potential the Internet provides.
C) We all know how amazing the Internet is, but it's cool to see it possibly having such an important and measurable effect on our society

Friday, February 13, 2009

Children as Targets of Internet Crimes—Who Is Vulnerable?


I agree with you nani...children and teens nowaday are easy to involved with this kind of crime and most of the time they will be the victim.
Do you know that both intrafamilial offenders and strangers have found that young children and teenagers are perfect targets for criminal acts because they are often trusting, naive, curious, adventuresome, and eager for attention and affection. However, the most attractive factor to predators is that children and teenagers historically have not been viewed as credible witnesses. Today, the danger to children is even greater because the Internet provides predators anonymity. Whether the victimization occurs in person or over the Internet, the process is the same—the perpetrator uses information to target a child victim. For example, the predator may initiate an online friendship with a young person, sharing hobbies and interests. This may lead to the exchange of gifts and pictures. Just like the traditional predator who targets children in person, the online predator usually is willing to spend considerable time befriending and grooming a child. The predator wants to build the child’s trust, which will allow the predator to get what he or she ultimately wants from the child.

Although no family is immune to the possibility that their child may be exploited and harassed on the Internet, a few factors make some children more vulnerable than others. Older children tend to be at greater risk because they often use the computer unsupervised and are more likely to engage in online discussions of a personal nature. Some victims become unwitting participants as they actively participate in chat rooms, trade e-mail messages, and send pictures online. Troubled or rebellious teens who are seeking emancipation from parental authority can be susceptible to Internet predators. The risk of victimization is greater for emotionally vulnerable youth who may be dealing with issues of sexual identity. These young people may be willing to engage in conversation that is both titillating and exciting but appears innocent and harmless. Unfortunately, Internet interactions that initially appear innocent can gradually lead to sexually explicit conduct.
This may cause internet crime against children likes child pornography.

Siti Haidah bte Mohd Ijam
A123090

Wednesday, February 11, 2009

+Up My Knowledge+

Hyee nani here!!
Firstly, thanks to hyedah because she explained about the internet crime problem that happened illegally.
I would agree with that idea which internet crime is a criminal act that is committed while using the internet or while on the internet.
It is because internet crime does not give any benefit to anyone who involved on it.

Actually. I very interested with the types of the internet crime and the important one is child pornography. I think the parents now had very low mentality and discipline in teaching their children. They were busy on their job, unfortunately, they have no time with their children ,they do not care about their children and they do not responsible. So, their children had more time with their own and they do something that had wrong because they know their parents don't know about that. It's a big problem because the parents should play their role.

Tuesday, February 10, 2009

Welcome to internet crime.

The Internet provides a medium for communication and information sharing unparalleled in the history of this planet. Unfortunately, there is also a darker side to all this technological glitter: Internet Crime. You've probably experienced Internet Crime in one form or another: spam, chain-letters, scams, and viruses being the common nuisances that they are. You might even be committing Internet Crimes consciously or unconsciously yourself: using pirated software or borrowing someone's intellectual property without their consent. "Are these things criminal activities?" you may be asking yourself. And, that is a good question to ask. What constitutes an Internet Crime? Who decides? Who will enforce the laws which will inevitably arise in an attempt to control Internet Crime? The answer to these questions is where the heart of the problem of Internet Crime lies.

There is no standard definition of what constitutes an Internet Crime. Generally, internet crime is a criminal act that is committed while using the internet or while on the internet.

Types of internet crime.

Surely you've heard the phrase "Internet crime" on more than one occasion. Type in a search and you'll hear all about people who have had their bank accounts or paid for items they never received. Some people unlucky enough to be a victim of internet crime have even had their identity stolen. To be aware of this crime, we need to know the types of the internet crime.

1. Internet fraud.

The term "Internet fraud" refers generally to any type of fraud scheme that uses one or more components of the Internet - such as chat rooms, e-mail, message boards, or Web sites - to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to other connected with the scheme. Internet fraud categories listed below:

  • Financial Institution Fraud- Knowing misrepresentation of the truth or concealment of a material fact by a person to induce a business, organization, or other entity that manages money, credit, or capital to perform a fraudulent activity. Credit/debit card fraud is an example of financial institution fraud that ranks among the most commonly reported offenses to the IFCC.
  • Gaming Fraud- To risk something of value, especially money, for a chance to win a prize when there is a misrepresentation of the odds or events. Sports tampering and claiming false bets are two examples of gaming fraud.
  • Communications Fraud- A fraudulent act or process in which information is exchanged using different forms of media. Thefts of wireless, satellite, or landline services are examples of communications fraud.
  • Utility Fraud- When an individual or company misrepresents or knowingly intends to harm by defrauding a government regulated entity that performs an essential public service, such as the supply of water or electrical services.
  • Insurance Fraud- A misrepresentation by the provider or the insured in the indemnity against loss. Insurance fraud includes the “padding” or inflating of actual claims, misrepresenting facts on an insurance application, submitting claims for injuries or damage that never occurred, and “staging” accidents.
  • Government Fraud- A knowing misrepresentation of the truth, or concealment of a material fact to induce the government to act to its own detriment. Examples of government fraud include tax evasion, welfare fraud, and counterfeit currency.
  • Investment Fraud- Deceptive practices involving the use of capital to create more money, either through income-producing vehicles or through more risk-oriented ventures designed to result in capital gains. Ponzi/Pyramid schemes and market manipulation are two types of investment fraud.
  • Business Fraud- When a corporation or business knowingly misrepresents the truth or conceals a material fact. Examples of business fraud include bankruptcy fraud and copyright infringement.

Fraud is more likely to affect an individual than a company. And fraud is more likely to be performed by an individual than a company. With a little common sense, most Internet fraud can be avoided.

2. Child pornography.

Initially, the idea of child pornography and sexual abuse is appalling to most people. Innocent young bodies and minds unprepared for the physical and emotional assault of sexual abuse and manipulation by alleged adults is one side of the coin. On the other side, the right for children to have sexual identities is being arbitrarily denied them. Again, it is a problem of definitions.

How do we define a "child" or an "adult"? How do we determine when a child is biologically and emotionally ready to engage in sexual activities? For that matter, how do we define "sex", "pornography", "obscenity", and "abuse"? In the U.S. alone, the age of legal consent can vary state-to-state from age 14 to age 18. Some countries have not established a legal age of consent. Other countries have set the legal age of consent as low as age 12. "Children" themselves have no voice in the decision making process. Rather, the legal age of consent is based on social/cultural/political/religious/historical biases and not on any quantifiable, scientific data. The problem goes even deeper than this.

3. Piracy.

In 2001, the Business Software Alliance commissioned a study on worldwide business software piracy. The study showed that in 2000:

The world piracy rate increased to 37%

$11.75 billion was lost due to piracy.

By region, Eastern Europe had the highest piracy rate at 63%, and has had the highest piracy rate in every study since 1994.

North America's piracy rate decreased to 25% from 31% in 1994.

Vietnam has a piracy rate of 97%—the highest rate of all countries in the study.

What is intellectual property? According to the World Intellectual Property Organization, "Intellectual property refers to creations of the mind: inventions, literary and artistic works, and symbols, names, images, and designs used in commerce. Intellectual property is divided into two categories: Industrial property, which includes inventions (patents), trademarks, industrial designs, and geographic indications of source; and Copyright, which includes literary and artistic works such as novels, poems and plays, films, musical works, artistic works such as drawings, paintings, photographs and sculptures, and architectural designs. Rights related to copyright include those of performing artists in their performances, producers of phonograms in their recordings, and those of broadcasters in their radio and television programs." As you can see, intellectual property covers a lot of territory. Unfortunately, the nature of the Internet lends itself well to piracy. Piracy is the act of copying copyrighted material. Every page you visit is stored on your computer for some amount of time. And, we are forever being asked to download something: software itself, upgrades, patches, files, graphics, sounds, and scripts. It becomes habit forming, and we begin to believe that we have a right to acquire anything we find on the Internet. But, this is simply not the case. I think we need to remind ourselves of this regularly.

4. Privacy.

As with all Internet Crime topics, there is a problem with definitions. What is privacy? Do we have rights to privacy? In what situations could our right to privacy be abused? What is the difference between privacy and security? Definition of privacy is: information, data, or facts about us taken without our expressed permission or consent; and information, data, or facts about used for purposes without our expressed permission or consent. Receiving information that has not been requested and automatically being redirected to a different website seem like invasions of privacy to me. I think that the difference between privacy and security is that privacy is the protection of an individual. Security is the protection of a group: a network, a company, or a nation.

While not necessarily illegal, there are several things on the Internet which it consider being an invasion of my privacy: spam (mass e-mailing), chain-letters, pop-up windows for advertisements, automatically being redirected to a different site, cookies, and Spy ware being the first ones to come to mind. Most of these things can be dealt with by downloading software or turning on features of the software one already owns that blocks or filter out these nuisances. Take a look at the links on the left side of the screen to get more information on how to go about this.

Are there illegal activities concerning privacy on the Internet? Unfortunately, yes, there are. Identity Theft is probably the most serious instance. When your credit card information, passwords and ID's for your accounts, or other information that uniquely identifies you are stolen, it is an illegal activity which can have serious consequences for you as well as the person committing the crime if (when?) they are caught

Businesses also need information to better market and target their products. Web designers would like to create sites that attract people and are useful to people. Governments require information to better serve their citizens. Information has become a valuable commodity. The Internet is a useful source for information. Is a lack of privacy the price we pay for using the Internet? Is it a price you are willing to pay?

5. Security.

In the privacy section of this site definition of security is: protection of a group; a company, a network, or even a government. Security also affects individuals directly and indirectly; though for political or economic reasons this is less likely to be the case. It is more profitable to steal data about a group of people than an individual. And, activities such as hacktivism (hack + activism) are more likely to draw mass media attention if a large number of people are involved. Security affects us indirectly in that governments increase taxes in order to implement costly security systems, and companies raise their prices to cover rising security costs. As protection devices become more sophisticated, so do the means of attack.


6. Stalking

Cyber stalking has received a lot of media hype in the past couple of years. Cyber stalking is a type of Internet crime that is of particular concern for teenagers and young adults. Social networking websites such as “MySpace” make it very easy for criminals to learn private details about a victim’s hobbies, interests, friends, family, and daily schedule. Cyber stalking Internet crimes may also lead to sexual assault if the perpetrator is able to convince the victim to appear for a personal meeting. Yet, cyber stalking is another online phenomenon difficult to define. Spamming, flaming, sexual predators, pedophilia, harassment, threats, hate crime, date/acquaintance rape, and identity theft have all in some way been associated with cyber stalking. However, there is a lack of any concrete statistical evidence to support the claims made about cyber stalking. Depending on the definition of cyber stalking and harassment, the Internet does provide an environment in which cyber stalking could proliferate.

To conclude, as the Internet continues to develop, new legal issues will also develop. New types of crime, and new theories for criminal prosecution, will be implemented to meet the continually evolving state of the online world. Internet crime is undergoing constant change. If you are charged with an Internet crime, seek legal advice from an attorney who is knowledgeable in this area of the law.


Friday, February 6, 2009

What's Going On?

Salam...nani here!!

ok...Now let I start the discussion first..I want to tell you all..about the situation that how internet crime can happened now..n also it is pointed as heavy problem in technology area.

The growth of technology has changed our lives dramatically. Computers were viewed as a luxury or even an extravagance 30 years ago. We relied on television, newspapers, and radio as primary sources of news and information. Cables, modems, and online services were virtually nonexistent.

Today, computers are prevalent in businesses, homes, schools, libraries, and even airports. The World Wide Web provides instant access to news, reference information, shopping, banking, stock trading, auctions, and travel information and reservations. People routinely use the Internet to take college courses, play games, listen to music, and view videos. Chat rooms and e-mails are now replacing telephones as our favorite means of long-distance communication.

The proliferation of computer technology obviously has enhanced our lives in many ways, such as enabling improved productivity and efficiency at work, school, and home. Anyone with access to a computer and modem now has unparalleled recreational and educational opportunities. Unfortunately, criminals are also using modern technology—to prey on innocent victims. Computers and the Internet have made the predator’s job easier. So, many of people that do this crime had want to collect n find more personal profit to them. They do everything to get money..and money...

Then.how about the definition of internet crime and its type?? The other group members will be discuss about it...

+STaRT Discussion NoW+

salam and hyee~~
as we know..
all of us had introduce ourself...
now we start the discussion ok..

take some time to know more about internet crime...
far away... we also don't know what the truly about this internet crime problem
as our effort as possible
we find more information about that problem...
and now we want to share with others about that..

soo...don't waste our time..
let's we see what about internet crime..
that happened cruelly today..

aLL aBout Mee.....~_+

aii....Welcome to our blog...firstly i want to introduced myself...
My name is Norhayati Binti Zulkefli but just cal me yati..
I'm from Muar, Johor but now I lived in Taiping Perak at Taman Assamara not far from zoo Taiping....hehehe.My father is police work in IPD Taiping and my mother is housewife. I very miss my parents...^_^
I have 5 sibling and i'm the second...I always give advice to my sister and brother to work hard if want to success in life...I take coz antropology and sociology in FSSK.
>My ambition is to be a inspector police...that"s is my dream when im still in kindergarten....that's why i join Suksis UKM to strong my mentality n my fitness....also to more alert about our situation, n social problem that our country faces now.
>My hobby is drawing n join my father jogging in Taman Tasik every weekend..My favourite food is tom yam, tom yam n tom yam....hehe n i dont like to take carbonate drink, n my favourite drink is Tea Ice n Coffe Ice....^_^


>So...now I and my group have a discuss abut internet crime.So, enjoy it!

Thursday, February 5, 2009

Get to know me....

Hello everyone and assalammualaikum....

Welcome to our blog...firstly I want to introduce myself...

My name is Siti Haidah Bte Mohd Ijam and everyone call me haidah...

I'm from Segamat, Johor

I live in a small village named Felda Pemanis...peaceful place that have a smell of rubber tree...I used to follow my father to his estate that full of rubber trees, cows and orchard...for me my father was the great farmer...and now, although he becomes older day by day...he never missed to take a look and care his orchard..

I have 5 sibling and I’m the youngest...of course I’m being pampered by my parent and sisters...I’ve been given all the love and care that i need...and now, it’s my turn to prove to them that all their love to is worth.......

My ambition is to be a psychologist...that why I’m taking psychology course here....

Being a clinical psychologist is my passion...I love to learn about human....so, everyday, I never missed my pray to Allah so that Allah can give me strong heart along this journey.....

I believe...whatever we do...set up your focus...criticize yourself to be a better person...never give up...

Lastly...

If you afraid to take the risk...don’t ever say about fight!!!!....

That’s all for now...till we meet again in the new post....

Siti Haidah Bte Mohd Ijam

A123090.

Wednesday, February 4, 2009

^LeT To KnoW mE^


Assalamualaikum..and nice knowing me...

My long name is KHAIRANI BINTI ABDUL AZIZ...my short name is NANI...yes just call me NANI..That's name what my family and my friends call me. My no matric is A123373. I have 5 siblings and I third.. I am shy and quiet person but I easily be friendly with anyone because I love to find more friends. I do not like to waste my time... Me and myself is no other special "items" to be prouded...But the most important thing I want to share with u all...is about my philosophy " DO WHAT IN YOUR HANDS NOT DO AS IN YOUR BRAIN"
That means I like to do any job with my power and energy as I have...not by what I have imagined and illusion...Sometime...I cannot do the best for my job...but I try myself...I push myself to do by what I have and what I can.
I have studying in HUMAN DEVELOPMENT courses that I know more about human habits, human mentality and psycic...For me, study about human is a big responsibility from other courses because human is not a robotic, human cannot be control and cannot be experimented in a laboratory..Human have mind, body and soul..that's special character as human have.
I recently approached 19 years old at last 27 NOv 2008.. But I have already 20 years old in this year. I keep myself in the pearl of life because I want to be more matured..For my mind, my intelligent, my personality, my attitude..and my future.. So, I like to be independent..teach myself sacrifice more to my future.. I have a vision that I want to achieve something that unique and extravaganza in my life.. =) So. I need a support from my family, my friends and my lecturers too.
Anyway...keep the best for our life...^^zasss~~

+Introduction+

"It's the perfect crime, both low- risk and high-profit," said Gadi Evron, a computer security researcher for an Israel-based firm, Beyond Security, who coordinates an international volunteer effort to fight botnets. "The war to make the Internet safe was lost long ago, and we need to figure out what to do now."


The above quotation showed that internet crime problem was so he heavy now. Actually, what's going on? A recent headline claims that internet crime is more profitable than the drugs trade. How can this be true? Trafficking in drugs is a mature criminal enterprise, large scale professional Internet crime only emerged in the past five years. The number of daily security alerts issued by VeriSign iDefense increased from 21 per day to 59, a 180% rise. If the claim that Internet crime already earns $105 billion a year is true and the growth rate is even a fraction of that, we are in very, very serious trouble. Internet crime is certainly a serious problem that will get much worse in the short term. But work is already underway to mitigate the immediate impact of Internet crime and major changes to the Internet infrastructure are being planned that will make its fabric considerably more resistant to Internet crime.

As our responsible as Malaysian, we consider to investigate n study more about this problem. This blog will discuss about
the definition of internet crime, the kinds of internet crime that exist today, the ways we can be exposed to the internet crime, the effects of internet crime to the society and the ways to protect ourselves from the risks of internet crime.