In the 20th century, with the development of technology and the emergence of the Web. The so-called computer crimes emerged as a result of different minds.
Alternatively referred to as cyber crime, e-crime, electronic crime, or hi-tech crime. Computer crime is an act performed by a knowledgeable computer user, sometimes referred to as a hacker that illegally browses or steals a company’s or individual’s private information. In some cases, this person or group of individuals may be malicious and destroy or otherwise corrupt the computer or data files.
Electronic and traditional crime may be similar in terms of the criminal, the victim, the device and the location of the crime, but the difference in the tool used in electronic crime is highly technical and does not require him to move to the crime scene
Computer crime is illegal behavior aimed at harming someone directly or indirectly using the Internet . The aim is to destroy information . Debarati Halder and K. Jaishankar define cybercrimes as: “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including but not limited to Chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)”.
3- Many countries have prepared computer crime laws:
Many states have developed laws that limit computer crimes such as:
3.1- Access to network or system in illegal ways.
3.2- Copy software and data without permission.
3.3- Spreading viruses in information systems.
3.4- Fraud on people using computer.
3.5- Use the computer of others without permission.
3.6- Theft and information fraud.
4- Types of Computer Crimes:
Computer crime , cybercrime , Hi-Tech crime , or Electronic crime . All of theme names
Of crimes where computer plays an essential role.
4.1- Crimes against individuals:
It is also called cybercrime, which consists of stealing people’s identity and e-mail in order to conceal the identity of the offender and use that person’s identity.
4.2- Property crimes:
It consists of copying and transferring harmful programs for the equipment and systems in order to penetrate the systems and systems of companies, banks and governments.
4.3- Government Crimes:
Consists of attacking the government’s network systems and aiming to destroy the infrastructure of the systems.
5- Characteristics of Computer Crimes:
5.1- The crime can easily be committed without any security control.
5.2- It is not possible to determine the extent of the damage resulting from it, it varies in its perpetrators and objectives.
5.3- A crime that does not recognize place or time.
5.4- It is easy for information to be destroyed by perpetrators.
6- Computer Crimes Goals:
Everything has a goal. The goals of computer crimes to:
6.1- Enable illegal theft and deletion of information.
6.2- Access to and disruption of information servers by the Internet.
6.3- Obtain confidential information for individuals or governments and threaten them for physical purposes.
6.4- Stealing bank accounts and forging credit cards for money and politics.
7- Computer Crimes Tools:
7.1- Software for copying information.
7.2- Internet.
7.3- The dial lines connect to the camera.
7.4- Barcode.
7.5- the printer.
7.6- Mobile phone and fixed telephone.
7.7- Destructive programs.
8- Examples of computer crimes:
8.1- Making or distributing child pornography.
8.2- Cyber terrorism.
8.3- Harassing others online.
8.4- Creating viruses and spyware.
9- The perpetrator of cybercrime:
Research has varied on the characterization of the criminal, the criminalization of his crime and the appreciation of his sentence. Thus, we can’t say there is one model of the information criminal, but there are similar characteristics among them.
9.1- Pirate community:
9.1.1- Hackers:
They are called small informatics students and are usually students. They break and break systems for curiosity and learning.
9.1.2- Crackers:
Those who break into computer system to damage and still the information.
9.2- Hateful community :
The Avengers are called the goal of taking revenge on people or institutions by disrupting information systems with malware or spreading viruses.
9.3- Extremists community :
They create sites and services to disseminate intellectual material that leads to intellectual extremism, making some hardcore people fall into the criminal behavior of the intellect.
9.4- Spaying community :
They are disrupting the content of networks and transferring corporate information to their competitors. A sect is intended to transmit private information to an enemy or friend.
9.5- Breakthrough systems community :
This community aims to penetrate the systems and exchange information among them through electronic media bulletins.
10- Characteristics of computer offenders:
10.1- A person with high technical skill and able to use his experience to penetrate the system and change the information.
10.2- A person capable of copying and imitating programs.
10.3- Professional person in dealing with the network.
10.4- Someone who is intelligent and flexible as he overcome problems and does not leave behind evidence.
11- The motives of committing computer crimes:
11.1- Financial motives:
Is to commit crimes and fraud for the purpose of obtaining money
11.2- Personal motives represented in:
11.2.1- Desire to learn:
Commits an intriguing crime to learn how to break through
11.2.2- Intellectual motivations:
Commits this crime to self-prove and triumph over IT.
11.2.3- The motive for revenge: This crime is committed by means of the infidelity of a person or company and the diversion of information about it.
11.2.4- The motive for Entertainment:
Committed for the purpose of entertainment and not to harm.
12- Forms of cybercrime:
12.1- Software piracy.
12.2- Misappropriation of information without permission.
12.3- To discredit others.
12.4- Infusion and theft the data.
13- Prevention of computer crimes:
13.1- Make people aware of the risk of falling into it.
13.2- Do not save the personal image in the computer.
13.3- Do not upload files and programs that are not reliable.
13.4- Keep up-to-date software protection programs.
14- Conclusion:
Each country seeks to limit the spread of cybercrime and counteract its negative effects by enacting strict laws. In the years to come, and with the development of theology, we hope that these crimes will stop.