Cybercrime is a criminal phenomenon that uses network information technology and systems as the object or means of infringement. Compared with traditional crimes, new cyber crimes are obviously group-based and industrialized, showing cross-department and cross-industry characteristics, forming an intricate black industry chain of cyber crimes. What are the new types of cyber crimes in 2018? We will introduce them in detail.
1. Main types of new cyber crimes
(1) The manifestations of crimes against the Internet are:
1. Internet theft.
Using the Internet to steal technological, military and commercial intelligence is the most common type of cybercrime. Currently, through the international information highway Internet, international criminals can steal approximately US$2 billion worth of business intelligence every year. In the economic sphere, banks have become the preferred targets of cybercrime. The crime takes the form of stealing public and private property through electronic money, bills, bank account statements, lists, etc. used for payment.
2. Create and spread Internet viruses. Network viruses are a form of cybercrime and a technical means to artificially interfere with the normal operation of network security. The rapid proliferation of network viruses poses the most direct threat to network security and has become a major public hazard to society.
3. High-tech infringement. This crime is an attack designed to bring an entire computer network to its knees and cause maximum damage. Minick, a 15-year-old American boy who was the first in the world to extend his black hands into military computer systems, successfully entered the computer system of the "North American Air Defense Command Center" with his special ability to decipher computer systems.
4. High-tech pollution. High-tech pollution refers to the criminal behavior of using information networks to spread harmful data, publish false information, spam commercial advertisements, insult and slander others. Due to the wide spread and rapid speed of network information, if effective control is not carried out, the losses caused will be unimaginable.
(2) The main forms of crimes supported by the Internet are:
1. Online theft. There are two main types of online theft cases: one occurs in financial systems such as banks, and the other occurs in the field of postal and telecommunications. The main method of the former is to transfer deposits from other people's accounts to fictitious accounts through computer instructions, or to issue instructions to a company's computer through a computer network, requiring cash to be paid to another company that does not actually exist. thereby stealing cash. In the field of postal and telecommunications, cybercrime is the most prominent crime of code theft and computer fraud.
2. Online fraud. Online fraud refers to the criminal act of deceiving and obtaining property by forging credit cards, making fake bills, tampering with computer programs and other means.
3. Online pornography. The international Internet is an open network with "no directors, no borders, and no police", which is the so-called "borderless network but limited law". With the Internet, adults and children can access pornographic information all over the world just by sitting in front of a computer. The Internet has endowed the traditional dissemination of obscene materials with greater breadth and higher concentration.
4. Online gambling. In the Internet age, gambling crimes often appear online. The U.S. Attorney's Office for the District of Manhattan in New York prosecuted 14 gamblers for gambling on the Internet at the end of February 1998. The U.S. federal prosecutor responsible for the case believes that there are dozens of companies in the United States using the Internet and telephone to conduct sports gambling activities, and the annual gambling revenue may be more than 1 billion US dollars.
5. Online money laundering. With the quiet rise of online banking, a silent revolution in the financial industry is beginning. Online banking provides customers with a brand-new service. As long as customers have a computer connected to the international Internet, they can handle the bank's business at any time and anywhere. These convenient conditions provide great convenience for "money laundering" crimes. It is easier to use online banking to launder stolen money than traditional money laundering, and it can cut off the flow of funds more covertly and disguise the illegal source of funds.
6. Instigate or spread criminal methods online. An important feature of instigating others to commit crimes online is that the instigator and the person being instigated do not meet directly, and the results of the instigation do not necessarily depend on the behavior of the instigated person. This kind of crime may have serious consequences such as a large number of non-directly instigated objects receiving the same instigation content at the same time. It is extremely concealed and diffuse.
2. How to prevent cyber crimes
1. Improve the criminal legislation of cyber crimes. When legislating cyber crimes, we should take into account the openness of the Internet society and the concealment of cyber crimes. While clarifying the rights and obligations of network management departments, network providers and service providers, and users in protecting network security, we must accurately define the boundaries between network crimes and non-crimes, standardize network management measures, and increase the number of network service providers and practitioners. Responsibilities and obligations, and severe punishment for anti-government, anti-social, malicious sabotage, financial and other cyber crimes. By improving cyber criminal legislation, we will guide all sectors of the cyber community to raise awareness of the dangers of cyber crimes, consciously use cyber laws and self-regulatory rules as guidelines for cyber behaviors, strengthen the standardization of cyber management and cyber behaviors, and fully protect the legitimate rights and interests of those who act legally on the Internet. rights in order to achieve the purpose of preventing cybercrimes and punishing cybercrimes.
2. Improve network technology and equipment. In reality, cyber criminals often take advantage of the network system’s own flaws to commit cyber crimes. Therefore, the quality of the tools and hardware used in the network system directly determines the quality of network security. Defense capabilities. It is necessary to increase investment in the research and development of my country's network defense technology and equipment, especially network technologies such as encryption, digital signatures, authentication, auditing, logging, network monitoring and security inspections, and important network equipment such as routers, security gateways, firewalls, and super servers. As well as computer software such as Chinese operating systems.
3. Strengthen the management of network users. While enhancing the defense capabilities of the network itself, it is necessary to strictly implement scientific network security protection and supervision systems to prevent illegal users from committing cyber crimes. This requires a reasonable division of labor and joint cooperation between various relevant management departments to form an effective network management system. It also requires each network user to form a good internal management system. By strengthening backup emergency recovery, network intrusion early warning, installing operating system and server patches, conducting frequent network security checks, plugging loopholes, etc., a comprehensive network and information security protection system is established to prevent cyber crimes. , an important way to strengthen network management capabilities.
4. Enrich the human and material resources for network supervision. To prevent and respond to cyber crimes, it is urgent to continuously improve network management technology and further enrich the human and technical equipment of the network supervision team. Targeted training of complex network supervisors with high legal literacy, strong sense of innovation, familiarity with the Internet, and the ability to flexibly use network investigation technology. Select outstanding network supervisors to receive training at home and abroad to improve anti-cybercrime technology, and learn from foreign containment and crackdowns. Successful experiences in cybercrime and gradually establish a set of technical means and strategies for cyber supervision that are suitable for my country's national conditions, hire domestic experts and scholars as technical collaborators in major cybercrime cases, entrust professional institutions to develop specialized software for cybercrime investigation, etc. Effectively improve the strength of the network supervision team.
5. Strengthen international exchanges and cooperation on the Internet. To strengthen international judicial cooperation, we must first unify our understanding, formulate regional or international multilateral treaties to prevent and combat cybercrime, and coordinate cooperation between countries through international network regulatory agencies. Cooperation and monitoring mechanisms between networks, networks, and networks to guide and help countries combat domestic cybercrimes.
6. Increase the intensity of Internet legal education. We must vigorously publicize laws and regulations related to the Internet to enable the majority of netizens to access the Internet in accordance with the law and regulations. While providing legal education to people, we should also focus on cultivating people's legal concepts. Through the promotion and popularization of the legal system, we can use the guiding role of the law in people's behavior to enable people to have an objective understanding of whether specific online behaviors are illegal, thereby avoiding the occurrence of certain online crimes. Of course, in the current situation where Internet legislation has not yet been perfected, the entire society should advocate a positive Internet ethics and morals, give full play to the role of moral education, and publicly discuss cybercrime cases in an effective way to educate the Internet population on values ??and values ??that are in line with the times. The education of outlook on life and social norms including network rules enables network users to establish good network ethics and enhance self-discipline awareness to ensure network security and standardize network behavior, so as to reduce the probability of network crimes.
7. Promote IT companies to support network management. IT companies have a large number of senior talents in network security technology and management. While restraining their own network behaviors with self-discipline rules, they are fully capable of preventing and stopping network crimes. Provide important intellectual support and improve cybercrime defense technologies and methods. Network providers or network service companies can provide the real personal materials of cybercriminal suspects and electromagnetic records of specific network behaviors for the investigation of network cases through strict authentication procedures and methods of retaining network users’ usage data; mailing companies must carefully identify The identity of the sender of the online transaction and the designated account recording the deposit of the payment can provide reliable clues to the online trader for the investigation of cases of using the Internet to buy and sell contraband. IT companies can also reduce the occurrence of hacker crimes by strengthening the correct guidance and effective management of their outstanding talents. Cybercrime technologies and methods are emerging in endlessly, and their professionalism, concealment, and harm will deepen with the widespread use of the Internet. Therefore, preventing cybercrime is an arduous and long-term task that requires legislation, technology, and concepts. Continuous updating and improvement of aspects. The Internet has both advantages and disadvantages. While it brings convenience to people's lives, it also breeds some crimes. When we use the Internet, we must pay attention to ensuring the security of our own information to avoid being infringed. Once you encounter a cybercrime and suffer personal or property losses, you must call the police promptly.