How To Prevent And Respond To Cyber-Crime Globally

This article provides readers with a brief overview of cyber-crime, a topic that has gripped the world of cybernetics, law enforcement agencies and Justice Departments of late in the wake of hacking of high profile websites across the globe.

A friend of mine once dubbed the internet as the ‘1st wonder of modern civilization’ and its obvious he is not far from the truth.

The internet has come to stay and as mankind evolves through his evolutionary pathway, it is going to play a crucial role in all facets of human endeavor.

Presently the internet is mainly used for issues of commerce and communication.
In future, the healthcare sector is likely to take a bigger share of internet activities as ‘e-lab and e-diagnostics protocols’ allow DIY screening of illnesses through portable communication gadgets such as the cell-phone or electronic tablets.

As the use of the internet becomes ubiquitous so would the prevalence of cyber-crime increase exponentially!

Before we get down to the nitty-gritty of the topic, let’s define cyber-crime.
Cyber-crime includes all crimes committed in any computer network infrastructures or environments.

Let’s have a roller coaster ride through types, motives, culprits and victims of cyber-crime. How would you report issues pertaining to cyber-crime, where to report cyber-crime and how to prevent cyber-crime?

Types of cyber-crime

• Computer intrusion or Hacking, Password trafficking.
• Counterfeiting of currency.
• Child Exploitation and Internet Pornography.
• Internet fraud and Spam mailing.
• Internet harassment.
• Internet bomb threats and terrorism.
• Trafficking in explosive or incendiary devices or firearms over the Internet.
• Pyramid schemes.
• Fake lotto and gambling sites.
• Fake immigration assistance sites.
• Fake foreign employment sites.
• Phony online dating partners.
• Copyright piracy.
• Trademark Counterfeiting.
• Theft of Trade Secrets.
• Hacker-maniacs, Pranksters.
• Connection disruption by uploading and sending worms, viruses and botnets.
• Extortion and International Money Laundering, Identity Theft.
• Committing fraud on security funds, inside trading via the web.
• Unauthorized hacking into computer systems, selling counterfeit computer equipment.
• Uploading, running or hosting phony domain websites.
• Phishing and identity theft.
• Online impersonation of individuals or business firms(identity theft)
• Computer programmer in unauthorized computer access.
• Creating and disseminating fake documents, selling counterfeit goods.
• Illegally accessing government computer or bringing it down.
• Domain name theft, illegal gambling offences, sending international botnet to create massive breakdown of computer systems or paralyzing computer networks
• Copyright infringement, trafficking in counterfeit goods or human beings
• Selling counterfeit software.
• Using malicious advertisement to lure people into disclosing their personal information,
• illegal access, illegal interception, data interference, system interference, misuse of devices, computer-related forgery, computer-related fraud, offences related to child pornography and offences related to copyright and neighboring rights.
• Fraud on social networking sites relating with use of false identity.

Motives for cyber-crime

• Staff disgruntled due to low remuneration, infighting within rank and file of work force because of parochial interests.
• Identity thieves and cyber-stalkers trying to make some money.
• Hacking activists or advocacy groups hoping to score political points.
• Hacker-maniacs, pranksters, erring dilettante, malicious users sending viruses, worms or botnet to infect people’s computer for the fun and adrenaline boost.
• Cybernetic expert wishing to cash in on vulnerable and lucrative computer networks.
• International cyber-spymasters engaged in espionage and cyber-wars.
• Troubleshooting cybernetic gurus or staff belonging to the Intelligence community.
• Renegade law enforcement staff wishing to cash in on a loophole or sabotage the database for capricious reasons.
• Pranksters and deranged individuals (hacker-maniacs) who love destabilizing any vulnerable computer network.
• Fraudsters who steal money from gullible individuals.
• Inquisitive and adventurous computer nerds wishing to try something new.
• Unemployed techno geek trying to make a living.

The culprits

• Cyber-hoodlums Hackers, fraudsters, cyber-bully, cyber-hypnotist, Internet Pedophiles, cyber-dissidents, disseminators of racists and xenophobic materials, cyber-gangsters and homicide criminals, internet human organ racketeers, internet dating sites scammers, unemployed youth and pranksters.

• Cybernetic insider, phishing group, cyber-extortionist, cyber-blackmailer, cyber-defamer, cyber-stalker and spammers.

• Spymasters, renegade computer experts.

The victims

• Unemployed people.
• Institutions with vulnerable computer networks.
• Lonely individuals who live reclusively.
• Internet dilettante.
• Individuals wishing to get involved in pyramid schemes.
• Public or Private firms that are engaged in eCommerce.
• Public or Private firms with a treasure trove of vital information.
• Governments running databanks with priceless sensitive information.

How to report cyber-crime

• Track, locate and identify culprits by doing a search of the IP address
• Contact the Internet Service Provider for detailed information
• Contact your attorney, local sheriff or Police Department, Secret Service and Justice Department
• Contact cyber-detectives or Webmasters

Where to report cyber-crime

Depending on the type of cyber-crime committed, you can report the matter to any of the following agencies,
• The Federal Bureau of Investigation (FBI)
• The United States Secret Service
• The Internet Crime Complaint Center (IC3)
• The United States Immigration and Customs Enforcement (ICE)
• The United States Postal Inspection Service
• The Bureau of Alcohol, Tobacco and Firearms (ATF)
• Internet Crime Complaint Center
• The National White Collar Crime Center (NW3C)
• United States Department of Justice
• DMCA agents of various firms and institutions
• Department of Homeland Security’s National Infrastructure Coordinating Center
• Attorney’s of firms and institutions
• U.S. Computer Emergency Readiness Team (U.S. CERT)
• Your individual government bureau or its appropriate law enforcement agencies and Justice Departments

How to prevent cyber-crime

Governments and citizens must be proactive in the quest to prevent the underworld from taking over the internet to create the same chaos and anarchy they have wrecked on civilization in the real world. This could be achieved by implementing the following suggestions.
• Elucidate international strategies aimed at combating computer and intellectual property crimes worldwide.
• Create a name and shame cyber-crime map website, follow UK example.
• Monitor all ISP transmitting audio-visual messages via the web.
• Remunerate your staff well but snoop on them.
• Form an alliance with national or foreign competitors to share anti-cyber-crime information.
• Conventions and Agreements should have a global outreach and not limited by the parochial interest of a few affluent nations.
• Need for a global attempt at archiving all information of the internet by ISPs so that data could easily be traced. Such services rendered by the ISPs should be paid for by the secret service of the nation under whose jurisdiction the activity took place or where the cloud computing workstation is located.
• Verify identity of internet users before they embark on any financial transaction.
• Harmonize the domestic criminal substantive law elements of offences and connected provisions in the area of cyber-crime
• Clarify code of conduct for internet users and write the penalty in the statute books without any form of ambiguity.
• Involve the United Nations on all internet Agreements and Conventions.
• Need for international co-operation pursue a common criminal policy aimed at the protection of society against cyber-crime, especially by adopting appropriate legislation and fostering international cooperation? No country can curb cyber-crime alone.
• Need to train more cyber-detectives
• Need to sensitize the public about the dangers of not reporting or conniving with cyber-criminals

Internet-related crimes, like any other crime, should be reported to appropriate law enforcement and investigative authorities at the local, state, federal, or international levels, depending on the scope and enormity of the crime. Citizens who are aware of federal crimes should be compelled to report them to local offices of federal law enforcement agencies.

It has been rightly observed that crimes committed over the Internet pose special challenges for law enforcement. Hence, there is a great need for large number of specially trained cyber-detectives and criminologists.

There is also a need to design new and fair rule of engagement for everyone; otherwise the World Wide Web might be in for a futuristic mutually assured destruction apocalypse.

We should all ensure that there is freedom on the internet in line with all democratic principles. However, we should clamor for the setting up of internet crime prevention and busting organizations to curb the activities of the few miscreants that are sabotaging the World Wide Web rather than advocating censorship.

Massive hacking of high profile website usually create furor in the media and congress. But is censorship necessary in order to curb the scams, thefts, frauds, pranks and cyber attack incidences on the internet?
Should governments censor or democratize the internet?

In conclusion, it would be disingenuous for any cybernetic expert to claim that cyber-crime has no border or the culprits are anonymous. Cyber-crime differs from real time crime because all electronic activities can be traced easily if they are decentralized, enrolled, verified, monitored and archived when any internet transaction occur. If all countries are persuaded to ratify IP Agreements and Conventions, all activities would be traceable.

Then, cyber-crime prevention and busting tactics would be workable.

I hope the internet policy moderators and formulators are listening.

Article Source:

Article Source:


Danger Posed by Internet-Linked Biometrics and DNA-Genome Databanks

In this information age, a computerized system recognizing each individual human being based on their fingerprints, iris, hair, body shape, voice, behavioral pattern, DNA, genome, anatomical and blood statistics was developed by scientists. This databank is known as Biometrics archives.

For the information of all readers of this article, every nation on modern day planet earth is currently striving hard to achieve a continually updated, complete and comprehensive Biometrics databank.

As you peruse this information, new biometric data of many people are being enrolled into the Biometrics archives or verified whenever they are ferried unconsciously into a casualty ward, commit any crime, when relatives request for a death certificate, visit a healthcare facility, open an account for any financial transaction or enroll in any law enforcement agency.

Pretty soon, many governments the world over would request that all legal citizens and migrants in the respective countries should have their Biometrics and genome enrolled before they are eligible to partake in any transaction within the countries’ borders. Then, people would soon get used to continually having to get their data identified and verified as often as required by some law that is not yet promulgated.

Already, your national identity card, credit or debit card and international passport contain a link to your biometrics information.

Note that the complexity of accessing, updating and processing this vital personal information of people necessitates a link to the World Wide Web. This enables relevant Public and Private Agencies’ Networks that need to identify and verify people in far flung or remote regions on earth to have access to the archives.

However, it is this internet linkage that presents an underbelly of a rather strong, dragon-like and fraud-proof personal identification scheme. Hacking of government-ran Biometrics databanks, Cyber-criminals most coveted treasure chest may become the Information Age’s Achilles heel.

In future, the inclusion of human hereditary information or genome details might increase the danger of the archives being hacked by several notches. How safe is your personal information? Since the website wouldn’t be absolutely impregnable to hackers, what happens if such a nightmarish hacking scenario occurs and many personal information of a country’s citizenry are lost to cyber-criminals?

That unthinkable situation where a chunk of the Biometrics Archives is dangerously denuded would pose a serious security risk. Just think about it. There would be wanton cases of Identity theft, financial scams and all manner of criminal mayhem.

Should the Biometrics Archives be linked to the internet for faster and easy accessibility for enrollment and authentication processes? Are there ways and means of minimizing the risks posed by such a dastardly crime?

I would pleasantly appreciate your feedback.

Article Source:

Book Review: 27th Century Fiasco

BOOK REVIEW: 27th Century Fiasco (Future Century Fiasco)

By Lawrence Atkins , Brandon, Florida, USA.


To get your copy of this book Click Here!

It’s a believable but fictional apocalyptic future event.
Date of review: 17th February 2011
Title: 27th Century Fiasco (Future Century Fiasco)
Name of Author: Akintunde M Lawal
Name of the Publisher: Outskirts Press Inc.
Place of Publication: United States of America
Year of Publication: 2010
ISBN (13): 9781432744984

This is a compelling fictional future event. It will ignite your curiosity as to the impact of contemporary stem cell research and human organ transplantation on the trajectory of human evolution! What are the implications for humanity? Would more beautiful and intelligent humans emerge from such experimentation or will it end in a catastrophe? Those are the pertinent questions which this novel attempts to answer. The story is set in 2665 to 2666 A.D.

Leslie Foy, employee of the American Biometrics and Genome Data-bank archiving firm is murdered in London. Few days later, the Biometrics archive is hacked by cyber-criminals. This brings to mind the danger of the internet accessibility of several Biometric and genome data-banks which are being run by governments across the globe. How safe is our personal information?

That horrific scenario led a CIA-FBI investigative team to prod Sacramento Police Chief, Robert Conrad to solve the hacking and murder cases whose perpetrators are thought to be hole up somewhere in his district.

To get your copy of this book Click Here!

Then, you get to know Pablo Maldini’s diabolic and insatiable quest for wealth, power and political clout. His confidant and business partner, Professor Guy Sullivan assists him in running the dastardly trade of unethical transplant surgeries and human organ rustling. What would happen if the world allows private organ transplant firms to trade in human organs and stem cells? Is this a giant progressive scientific and evolutionary leap or a journey to a chaotic apocalypse?

As you get engrossed in Robert Conrad’s effort to unravel the ghoulish crime, a high-profile woman is abducted in Sacramento. Later, the woman was able to surmount all the stressful problems caused by the incident with great endurance and stoicism.

Perusing this book might give you goose pimples and get your adrenalin going as you read through the gory details.

All the characters are portrayed as if they exist in a contemporary true-life story.

By the time you approach the end of this believable fictional story, the unending conflict between good and evil on one part or science and religion on another part stares you in the face with haunting poignancy. The endgame of Maldini’s satanic Ponzi scheme necessitates an intervention from future US President, Queen of England, The Pope, European leaders and several intelligence agencies. Was the matter actually resolved eventually? Find out.

You’re guaranteed a roller coaster experience as the author deftly guides you through the twists and turns of a fantastic and mind boggling plot.

It’s a novel that you read and won’t forget quickly. Get set to ponder on questions that have daunted humanity for ages. Should humanity rely on science and evolution to pull through the pitfalls inherent in his existence or is there a role for religion and spirituality?

It’s undoubtedly the best book you’ve missed reading since 2010.

Beware; this is a future event that is waiting to happen under your watch!

Like other great books, this novel is a must read for every living soul.

ORDER FOR YOUR COPY NOW! To get your copy of this book shipped to you anywhere Click Here!

Read this book now!

On a chilly, moonless and sinister night, the Personal Assistant to the webmaster of the American Biometrics and DNA genome databank is murdered and the security of the database breached by cyber-criminals. Later, a woman in the throes of labor is abducted in Sacramento together with her newly born child. Her husband, a leading Professor of Egyptology left in a comatose condition. The motive of the hackers and attackers initially seemed unclear, until the abducted woman was found to be the bloodline of Franco-American longevity icons Jeanne Calment-Mary Christian ancestry. Then the world of human organ transplantation goes askew in a burst of international espionage, adventure and intrigue.

Read this book today!

To get your copy of this book Click Here!

Hello world!

Welcome to This is your first post. Edit or delete it and start blogging!

Next Newer Entries