Cyber Crime
Cyber Crime
Cyber Crime
● Cybercrime existed long before the advent of the internet in traditional ways. As
explained by Johansen (1991; 2010) crime shown in history as the ‘Invoice for all
seasons’ in tax evasion, bribery, fraud, and invoicing by criminals in countries such as
Norway. This was most prevalent in the 70s and 80s.
● The first internet crime report was recorded in 1997, in which The FBI reports that over
85% of US companies had been hacked, and most don’t even know it, and by 2001
internet fraud was found to have tripled (Associated Press, 2003) and in 2002, Internet
Fraud Complaint Center reported seventy-five thousand complaints (Bennet, 2003).
● According to Pericherla (2021) cybercriminals commit cybercrimes using different tools
and techniques but the basic process of performing the attacks is the same in general in
which the process or steps involved in committing the cybercrime can be specified in 5
steps namely Reconnaissance, Scanning and Scrutinizing, Gaining Access, Maintaining
Access and Covering the tracks.
● Various studies show that cybercriminals use online meeting places to meet suitable co-
offenders or to buy criminal tools from enables (e.g., Peretti 2008; Lu et al. 2010; Holt
and Lampke 2010; Yip et al. 2012; Soudijn and Monsma 2012; Holt 2013; Holt and
Smirnova 2014; Decary-Hétu and Dupont 2012; Decary-Hétu et al. 2012; Motoyama et
al. 2013; Lusthaus 2012; Dupont et al. 2016). However, this does not mean that all
cybercriminal networks are using these online meeting places, and the structure of
cybercriminal networks, therefore, is always decentralized and flexible.