Research Report – 03

Abstract

 

This study investigates cyber crimes, and its impact on teenagers which has become a significant phenomenon within the last two decades. People become victims   of fraud, defamation or harassment online everyday in all four corners of the world. This research focuses its attention specifically on the impact on teenagers who are active Internet users.   A   cross sectional interviews were   conducted with  School  teachers, students and parents  in order to  collect  data. The  analysis of data and information  whether the  teenagers  are more likely to be exposed to cyber crimes than older age groups and  delves into what kinds of risk factors are associated with the exposure to cyber  crime among teenagers. In fact, an exclusive research was  conducted to find out relevant materials for the  project  from relevant books, newspaper articles, magazines, journals  and  websites for  identifying issues, data processing and analysis. It also collected data of   relevant cases occurred in United Kingdom, India and Sri Lanka in the recent past.  The results show that teenagers are more likely to be victims of cyber crimes even when other factors were adjusted for. These findings highlight the significance of understanding both psychological risk factors, patterns of risky online behavior and draw the attention of law makers to impose strict regulations  to fight against cyber crimes specifically against  teenagers. To put into its context the objective of the report is based on the findings in this research analytically discuss the  solutions for the contemporary issues.

 

 

 

 

 

 

1. Introduction

 

With the rapidly developing advanced technology, cyber crime is   very familiar among almost all the people. Apparently there is no dissimilarity between conventional crimes and cyber crimes yet the only disparity being the mode in which  the crime is committed. However, cyber crimes as well as conventional crimes include the behaviour whether act   which leads to breach the rules of law in a society. Cyber crime can be defined as illegal activity committed on internet which harm the other individual or by large the society with the help of a computer and World Wide Web.  There is no doubt with the advancement of  networked technologies  have paved the way for committing  criminal activities in the internet and due to different factors, culprits are easily escaped without punishment. Individuals who are victimized are clueless even to lodge a complain – where to complain or what to complain. More   cyber crime victims are among   teenagers or other age group is irrelevant in  broad perspective yet in this research attention is focused specially on the teenager victimization.

2. Enemy of Teenagers

 

Even though Internet has opened up wide gates for knowledge and information, it has now become the most dangerous enemy of teenagers and parents who have teenage children. Internet users are exploited with unlawful activities and this is the reason advanced ethnology is compared to a coin that is most beneficial thing also has two sides.  Nevertheless it is stated that the advanced technology has made man’s life easier, faster and safe it has its own issues.

3. Defining Cyber Crimes

 

Various cyber crimes which are rampant in contemporary world can be defined as follows;

 

·         Dissemination of obscene material

·         Unlawful access over computer systems

·         Nuisance via e-mails

·         Illegal control over computer systems

·         Intellectual Property crimes

·         Internet time thefts

·         Keeping  unauthorized information

·         Credit Card frauds

·         Cyber terrorism 

·         Distribution of pirated software

·         Pornography

·         Indecent exposure

·         Sending  out virus

·         Financial crimes

·         Sale of illegal articles

·         Online gambling

·         Forgery

4. Recent Incidents

 

Cyber crimes have been increasing rapidly during the past few years at an alarming rate having an impact on teenagers.  A number of internet related threats have been recorded   during the past few years.  The persons who indulge in these crimes have no  borders and boundaries and  culprits  use different  programs  to access  other peoples  computers  to gain  financial data, usernames and passwords. Development of the  computer technology is  providing  ample   opportunities to the people whose motive is not purely genuine,  criminals or criminal organizations to exploit  people specially teenagers  and commit crimes. This scenario has brought the cyber crimes to the global limelight.

5. International Corporation to fight against Cyber Crimes

 

Attorney General of United States of America,  Eric Holder emphasizing that no nation or government can combat cyber crimes alone,  had  urged   international cooperation in developing a global move towards to fight  against  variety of Internet  and technology support  crimes. This statement  displays  the widespread disillusionment over the cyber crimes and leaders of the world have realized that  the whip is not cracked hard enough, chances are that the perpetrators of these crimes will continue their work unhindered and unconcerned.

6. Fight Against Cyber Crimes  in UK

The British government   has introduced   new programs to fight against cyber crimes which are Cyber Crime Reduction Partnership (CCRP). The program will provide a new forum in which U.K. law enforcement officials, the computer industry officials and  other  officials  can regularly get  together to  plan against cyber crimes  effectively.  Home Office Security Minister  James Brokenshire had stated  at a cyber security briefing hosted by the British Computer Society, the Chartered Institute for IT.  He states as follows;

“‘For too long the public’s perception of cyber crimes has been a lone bedroom hacker stealing money ,” said Brokenshire, “but the reality is that cyber criminals are organized and global, with a new breed of criminals selling ‘off-the-shelf’ software to aid gangs in exploiting the public.”

Therefore, the partnership led by Brokenshire and Minister David Willetts, under him the country’s Universities and Science department and their focus will be to assist “ensure police and other law enforcement agencies can stay one step ahead of online criminals.”   As per Brokenshire, the CCRP will soon be joined by several extra initiatives, a Cyber Security Information Sharing Partnership to share information between industry and government, a National Computer Emergency  Team and a National Cyber Crime Unit within the NCA (National Crime Agency). As per Minister Brokenshire, the objective   of this multitude of cyber security method is to deepen the country’s ability to fight against cyber crimes. “By better awareness and action from the public and industry and through continuing to work closely with our international associates, we can deliver a lasting and transformative impact on those criminals that seek to use the economy to damage the U.K. and its interests.”  

7. In Sri Lanka

 

In Sri Lanka  Internet Crime Complaint Centre (IC3) has been instituted  at Police Headquarters with the collaboration of Criminal Investigation Department & Information Technology Division to receive and investigate criminal complaints in the rapidly expanding arena of cyber crimes in Sri Lanka  such as  lottery scams, internet auction frauds,  Passive Residual Income scams,  Sending counterfeit checks,  Work at home scams,  Multi Level marketing and Pyramid schemes, Property Investment Schemes etc.

 

Specially some  teenagers  who  are unemployed in Sri Lanka  fall prey to scams  such as Work-at-home and business opportunity scams for  which  often wide publicity is given over the television channels,  internet as well as in  newspapers.  Some teenagers who are studying, think they can earn extra income by participating in these schemes in order to ease the burden of their parents.  After the would be applicant   applies, they are asked for money up front to make payment for resources and, after paying, they hear nothing back. Another scam is, people are asked to invest in a business that has no chances of success, get rich scheme and websites, “make money  in your spare time”  schemes etc..  They deceive people saying it is easy  once they  get their free book or CD  and learn their secrets. These websites are themselves scams, claiming to offer teenagers a good deal, when at best, their products are worthless, they have no real secrets at all and they cheat the teenagers and make their coppers expand fraudulently.

8. Origin of Cyber Crimes

Cyber Crimes were originated  with the   dependence on computers and increased with the  advancement of technology in modern way of living.  Everything is being run on computers at this age and intermittently cyber crimes also growing phenomena.

9. Financial Crimes

Financial crimes are included in cyber crimes and this can be defined as cheating, credit card frauds and money laundering etc..  Posting information on auction websites and bulletin boards  and  with e-mail communication  illegal items   are transacted via internet.  There are thousands of websites   which offer online gambling.  It is believed that many of such  websites are  actually  in  money laundering.  Cyber crimes included, piracy of  software, infringement of copyright , violations of  trademarks,    computer codes theft  etc., and they are categorized as intellectual property crimes.

10. Recent Incident

In a recent incident occurred in USA a teenager had made millions of dollars by   circulating malicious information   about a company.  Nasty messages were spread by sending emails supposedly by reputed news agencies. Value of shares of the company  came down drastically and affected  thousands of shareholders, it is reported. Even after the  truth  was known,   value of the shares did not  return back to the  earlier  level. This  is  a clear example of  what a  damage can be done  by an individual who has ulterior motive  with a computer  and internet access.

11. Forgery

Using sophisticated computers counterfeit currency notes, postage and other documents   can be forged and this is also a crime in serious nature against the governments. 

12. Counterfeit Certificates

Another scam is it is advertised in   websites and also via emails Educational institutions are offering Degrees, Diplomas and other educational certificates for money.  Today this has become a lucrative business selling authentic looking bogus certificates.

13. Defamatory Information

 A person can publish defamatory information about someone on a website or sending thousands of e-mails against another person. It may be done purposely to take revenge from a person or just for a laugh.  When the truth is come to light  it has caused immense damage to the person concerned and this can also be defined as a cyber crime of serious nature and  sometimes  person who is  doing this type of crimes do not understand the seriousness of the crime.

14. Involvement of Teenagers

It is a known truth that teenagers  these days  knows lot about computers and  these  teenagers also  commit cyber crimes  even without  realizing the  gravity of  the  situation  they create with  their work. It seems really difficult to believe but it is true that most amateur hackers and cyber criminals are teenagers. To them, who have just begun to learn and   understand  it is a  pride to have hacked into a  website to boast about the act with   friends to be smart among them.  These teenagers also may be committing cyber crimes without really knowing what they are doing.

15. Sabotage

Disgruntled worker  can  do harm to their employer by committing computer related crimes  which can bring  the company computer  system to a standstill. Due to computerization,  business  organizations  storing all   their information in computers.  Rival company hackers can steal industrial secrets and confidential  data.

16. Confidential Data

It is easier to steal national secrets from military computers and  as a result a  national security  might be at  risk. Thousands of pages written or typed document can be saved a in a CD or in  a USB pen and also can be transmitted  via e-mail. As a result it is  very difficult for  companies or other organizations to  protect  their confidential  data.  One treacherous   employee can send them to anywhere for money or other privileges or to take revenge  via e-mail. No longer with security guards these organization cannot  protect their trade secrets and  more sophisticated  methods  are required  to be introduced  as smart as the  fraudsters.

17. United Effort

It is a human error that   most people do  not understand  the security implications  of a simple guessable password and a Cyber criminal can  do an immense damage with it. Each year numerous individuals including teenagers become   victims of cyber crimes  and    many cases   are not complained,  reported or recorded. European countries are still not reached to consensus on laws necessary to tackle the issue.  The problem is to a certain extent  the  real cyber crimes  are  unknown and person who victimized  bear the damage personally.  However, in the recent past    lot of progress has been made in addressing these   issues. Most of the people have realized the  necessity of  a united   effort to  tackle  crimes over the  internet.

18. Wage war against Cyber Crimes

United Kingdom has opened a Cyber Crime Center to wage war against  shocking  number of  attacks  and  project follows an  European Union plan  which  emphasize companies to disclose  hacked data potentially  damaging  reputation of companies   and  reduction of share prices. This program will merge   data from  the Government  communication headquarters , the Police and various companies. The objective behind this program  is to  coordinate   and take prompt action  to  cyber attacks  in United Kingdom. Cyber Security Information Partnership will   contribute  data   among government and  companies to  collect  more complete picture  of the attacks  being carried out.

19. Incident

In an another  Cyber Crime Unit of London  Police  got the information   from the National Child Exploitation Coordination Centre that uploading child pornography to  a website over the past year.  Search warrant was executed and through investigation   identified   two child victims.  After the investigations Crime Unit   charged a 25 years old man for production and possession of  child pornography. However,   charges could not be proven due to lack of strict regulations.

20. Covering the Identity

Online committing crimes allows a person to cover his or her identity and location has resulted the spread of cyber crimes speedily.  It also can target a person directly through emails, viruses or hacking into computers.  Victim can feel   facing a powerful but invisible attacker and powerless to defend himself or herself even though the person may be a computer literate.

21. Cyber Bullying

Cyber bullying is a way of doing lasting harm and  victims are mostly  teenagers. Apparently cyber bullying is a serious problem among teens and awareness about this crime among adults are not much. Teenagers as well as adults should be aware of cyber bullying and it  can be helpful to  eradicate this crime.  

·         Pilfering  to a person’s account  and sending  disastrous messages

·         Pretending someone else online and hurting another.

·         Sending  threats to email  inbox of a person

·         Spreading rumours over the internet.

·         Sending messages of threats to social networking sites.

·         Taking unpleasant picture of a person and sending them to others.

·         Taking pictures of a person and disfiguring it and sending it to others.

·         Disseminating  sexually  indicative pictures or messages about  a person

 

This is extremely disastrous specially to teenagers and it can cause anxiety and even  victimized  person  can commit suicide. Once a information or picture is disseminated in the internet it cannot be removed or reversed. People who are doing these things sometime do them to take revenge from the other person or sometimes as a joke but  they do not  realize the consequences and even the person who did it cannot reverse it later.  People who are engaged in this  type of bullying  face legal action  and  in the event  the work is  on sexual nature  or involved with  sex  can  that person may be registered  as a sex offender. People who carry out this type of things think they do it in a fake name and   they will not get caught, yet there are many ways to track them.

22. Teenage Girls and Cyber Bullying

 

Most of the teenagers   do not tell their parents when this type of harassment happens and only a few  has been  reported to law enforcement.  It is also reported that teenage girls are more likely to be involved in cyber bullying.  A teenage girl’s face is taken and merged with a nude body of another female and disseminating and this  is a crime of very serious nature. Victim can prove her innocence to people who are familiar with the  internet  and  not to  others.

23. Online Gambling

 

People  have only begun to understand the  seriousness of  the problem of  recent growth in gambling   among teenagers  all over the world.  The gambling industry is expanding with the continuous rise with the help of internet.  More gambling opportunities are available today than ever before and this has become  a serious menace in the society today even though most people are not aware of it. In the past to do gambling a person has to go to a casino club or location maintained for this purpose. At least such places are paying taxes to the government and teenagers are fearful to visit such places as anybody sees that person will be branded as a gambler. Now   anybody can do gambling leisurely at home what is required is a computer, internet access and a credit card.   Authorities must realize   the seriousness of the gambling problem via internet    and its specific impact on teenagers in the society and drastic measures are necessary to address the   gambling problem in an effective manner.

24. Drug Trafficking

 

It is stated that drug traffickers are  more and more  taking the advantage of  the internet  technology to  sell their  drugs and expanding  sales of  drugs. This is also an area which affect the teenagers in indirect way and another problem of serious nature  at contemporary times.

25. Responsibility of the Society

 

Everybody has a duty in the fight against cyber crimes to be alert and protect their computers and report to the relevant authorities immediately such incidents and if the law enforcement taking strict and prompt action this type of harassment to people can be avoided or  reduced substantially.

26. Safe Internet

 

The impact and  influence of the internet on teenagers  over the past years  have been immense and according to statistics  in  networked  society  has expanded in the range of information available to individuals and change  the manner in which  communicate with each other and  however,  negative side is  the involvement of  criminals.  The potential of the internet to make it easy for criminal activities is matter of grave concern.  In order to access information and communicate with others the internet has created a naval and speedy way and   it has contributed to boost of business and commerce all over the world. It is the responsibility of governments and authorities of all countries to protect it from unscrupulous elements such as   criminals and fraudsters and make it a safe place especially for teenagers.

27. Victim Support in UK

 

When a cyber attack took place best option for   a teenager is to    talk to “Victim support” in UK   free of charge.   Victim support is an independent charity for  victims of cyber crimes in England and Wales. It has   trained volunteers to offer services and work closely with the police and judicial systems. Most victims of cyber crimes  need to talk to someone about  the incident  and  these volunteers  are  trained to  listen and   understand and  give useful information in order to   deal with the situation.

28. Cyber Crime Expenses in UK

 

Researchers and Cyber intelligence experts  state that  online internet criminal markets are providing  incredibly  sophisticated  tools for the purpose of  cyber attacks to  cyber criminals and  they  are having tools such as  Zeus and SpyEye .The average  expenses  of cyber crimes for  38 companies in the  United Kingdom  is £ 2.1  millions   per year according to a study.

29. Threat Report of GFI

 

GFI  software security firm had    issued a threat report  and  in it  states that  cyber criminals were  targeting  Skype, Facebook  and Windows  utilizing  manifold  black hole exploits in October 2012. A large amount of Black hole exploits were found by researchers  pretending as Windows licenses, face book accounts  verifications emails ,  voicemail notification of Skype and also spam messages.

30. Underground Cyber Crime Market

 

In 2012 month of November   a  hacker offered  a zero day exploit for US$ 700  and  it was possible for attack to  use a  cross site scripting (XSS)  in order to steal  cookies and  accounts hijacking.  This  hacker  was identified as  “The Hell”   created  a video to  utilize  in  Darkode  a underground   cyber crime market.

31. Buying and Selling Credit Card Data

 

Six people in United Kingdom and  twelve persons in United States of America were arrested  in  FBI- led sting operation  in June 2012  and detected  24 credit cards  data sting .  These  cyber criminals  were from  13 countries. This was possible after an investigation by the FBI  and tracked  people who are buying and selling  credit card data  through a false  online website.

32. Web application attack report  by FireHost

 

Analysis of 15 million  cyber attacks in  the  end of  2012  discovered that  Cross site scripting (XSS )   was the top  menace to  web applications, websites and data bases.  Further  attack  are  directory traversals, SQL injections (SQLi)  and cross site  request forgery ( CSRF )   as per  web application attack report  by FireHost.

33. AT&T

 

Telecommunications Company AT& T states that (APTs)   advanced persistent threats  are real and   companies  are taking  them critically. In 2012  Telecomminucation company  had set up an IT security  team  for researching APTs and  to find out  how to  defend  against  APTs.

34. Stealing Passwords

 

Over  450 000  passwords  were stolen  from one of the  sites as a result   a yahoo user sued the web portal company on the ground of negligence.

 

35. Nasa

 

Another remarkable incident is  loss of  a laptop containing personal data of more than  ten thousand employees  as well as contractors  of Nasa the US space agency . This is recorded as  latest  data breaches  involving   laptops at Nasa.

36. Cyber Security Risk Report of HP

 

Cyber criminals are  targeting   web  applications  as per a  Cyber Security Risks report issued by Hewlett Packard or well known as    HP   and this was reported in May 2012.  This report further discloses   cyber attacks on  web applications  were  approximately 15 million in the year 2010 and in 2012 it is  approximately  50 million  and this is  a sharp increase. As people are browsing the internet  on daily basis  they do not realize  safety and security is  not like  earlier days. Actually  internet  criminals and scammers   have become  subtle  and  tricky  and therefore   scams and fraud are rampant and all must be alert specially including teenagers.

37. Statistics of Cyber Crimes

 

Backgroundcheck.org  recently published  statistics  in relations with cyber  crimes.

 

A.   Complaints  increased   from 100,000  per year  approximately  to  300,000 per year from 2005 to 2009

B.    It exceeds US$ 300 million a year  loss value  of  complaints.

38. Complaint statistics

·         Spam  8.6%

·         FBI related scams  13.2%

·         Identity Theft  14.4%

·         Advance fee fraud  9.1%

·         Miscellaneous fraud  9.8%

 

Males   have become  victims  25% more than females

39. Origin of  Cyber crimes

§  10.4%  United Kingdom

§  65.9% United States of America

§  China 3.1%

40. Cyber Crime Report –  2011

 

Cyber crime report  issued by Norton  for 2011  state that 431 million people worldwide  are victims of internet crimes.  US$ 114 billion is the total cost of  those crimes. However,  the statement is precise, it lacks  complete  date  and scope of  internet related crimes.  The report primarily  depend on   business and voluntary self report  incidents  without  verifying  and  it is  necessary to  find out  the impact of cyber crimes on the individuals  specially  teenagers. In examining statistical data on cyber crimes special attention should be paid  to what those statistics  is not disclosing.

41. Second Annual cost of Crime study report

 

Study report OF  Information Security Policy Research Centre  based in USA and in this report states   that  cyber crimes amplified  by 56%  and   companies  cost average of  US$  6  million per year.  This  report has been prepared  surveying  50 businesses in USA. Questionnaires had been  sent to companies  and  data collected and   report has been compiled.    However,  fact  should be considered that   companies are reluctant to  give exact  details  as  it may loss confidence of consumers or  they can be held responsible  or accountable by the shareholders.  So these data cannot be  100% accurate and cannot  be trusted as accurate.  Cyber criminals  have  sophisticated  tools to  do major damages and in this report there is no special attention has been focussed on the impact of  teenagers of cyber crimes.

42. Statistics

 

Statistics  published by the  UK Government in 2011  cost of cyber crime in UK economy is  £ 27 billion  per year and however,   real cost  may be much more than that. 

 

·         Business    21 billion

·         Government  2.2 billion

·         Citizens  3.1 billion

 

In this there is no percentage of  teenagers involved but included under  citizens. Most of organizations, citizens  as well as teenagers  are  reluctant to admit  that  they had been the victims  for fear of  damaging their good name or  reputation of the organization. This is a major problem in tackling the issue and also it had made  difficult to  prepare  accurate estimates of cyber crimes.

43. Incidents of Cyber crimes

 

                     I.        Major cyber intrusion had occurred involving the Defense Research and Development of  Canada  a research agency of Department of National Defense Finance and the Treasury Board in January 2011  and  the intrusion force  them to  disconnect from the internet.

                   II.        It was reported in March 2011  hackers  entered  computer networks of French Government in  finding  data on upcoming meeting of G-20

                 III.        As per South Korean Government  information   hackers had entered into its  defense networks  to steal  data  on American made Global Hawkunmanned aircraft .

                 IV.        Spain’s National Police  Technological investigation Brigade  with Europol and Interpol dismantled  ring of cyber criminals accountable for Police Virus which affected Microsoft, Apple, Facebook and Twitter.

                   V.        Twitter published an article on 1st February 2011 regarding  information on how the social network had fallen victim to attack to gain access to  data of some 250,000 users of Twitter. After two weeks Face book also acknowledged that their system had been targeted by attack. After several days Apple announced it had also been targeted and finally Microsoft also acknowledged attack. This shows the  challenge  before authorities.

44. Coordination

 

The European Commission commenced the European Cyber Crime Center to assist member countries against cyber criminals in January 2011.  Also in the same month  FBI  issued information of an inquiry  started  in the year 2010  and disturbed  cyber criminals  who had since 2005  infected  million of computers. This process was significant because it carried out with security forces of several countries. Police of UK, Switzerland, Finland, Germany, Holland, Romania and Moldavia supported in this exercise to FBI it is reported.

 

45.Responsibility of Protecting data

 

It is necessary to alert the internet users specially teenagers   the significance of protecting data in computers. Sony computer Entertainment of UK Division   was ordered to make the payment of £ 250,000 for the theft of data in 2011 as lack of measures that company had achieved in order to protect customer data. This has drawn attention of all internet users that it is their responsibility to protect data in computers.

46. Research Report of NIH – US

 

Teenagers who are targeted of cyber bullying are  at greater risk of depression  according to survey conducted by  researchers of National Institute of Health in United States.  Physical violence, verbal taunts   are traditional forms of bullying while  cyber bullying  involves  aggressive behaviour communicated over a computer  and cyber victims  may not identify their harasser as a result  victims are more  depressed according to the research.

47. UK Approach on Cyber Crimes

 

Government  of United Kingdom  has introduced legislations to  tackle the issue of cyber crimes  allowing Police to track IP addresses of computers. It is expected to protect the people who are using internet and assist the investigation of cyber crimes. Earlier Police had no powers to investigate on IP addresses of individuals.  However, these IP addresses are  sometimes shared among  several people. As such,   to know the exact individual who sent an email or involved person in any other internet usage   Police should know who used the certain IP address at a given time. UK Government believes giving powers to Police, law enforcement and intelligence agencies to get these data   will assist to defend the public as well as to safeguard national security. This new approach came  after  Communications Data bill  was vetoed.

48. Sri Lanka approach on Cyber Crimes

 

Computer crime Act  has been passed in Parliament of Sri Lanka and  as per the Act obtaining unauthorized access to a computer or network , hacking and   modifications offences  under national security,    dealing and  interception of data  unauthorized  disclosure of information  are offences  defined  under the Act. Provisions of investigations    shall be carried out   and dealt with provisions of  the Code of Criminal Procedure Act No. 19 of 1979 or Computer Crime Act ( S.15). The Act states  experts  are called upon to assist  the police officers if the necessity arises.

49. Suggestions and solutions

 

In the above paragraphs   cyber crimes were discussed in details   while focusing attention on key issues analyzing the  approaches  in order to  tackle the issues in United Kingdom and Sri Lanka as well as taking into consideration   prevailing laws in United Kingdom and Sri Lanka.  In this exercise   reference were made to   websites,   articles from journals and  newspapers, books,  law reports  etc and   following suggestions  can be made in order to eradicate cyber crimes and make  internet   a safe place for the benefit of general public. Internet security is a shared responsibility and everybody in the society has a role to play and Cyber Security awareness programs must be organized regularly and following areas must be emphasized on such programs.

 

a.    In order to block all unwanted messages it is necessary to   turn on spam blocker.

b.    Each  computer must be protected with a powerful  antivirus software and making sure that  regularly update  the software

c.    Once a week scanning  the computer  to locate and  remove malware, viruses , spyware in computer

d.    Firewall protection feature which prevents hackers  getting into the  computer system  and always necessary to  keep it turned on.

e.    Utilization of  Encryption software  which garbles  data to  anyone who hack into  the  system

f.     Not to post confidential information such as name, account numbers , addresses, photographs  in websites.

g.    Do shopping only on secure website with url starts with http and/or  a Trusted website.

h.    Avoid  posting  credit card numbers in websites.

i.     Do not fall Frey to any scams such as foreign lotteries, phony sweepstakes and similar methods to get personal information of internet users.

j.     Teenager’s   online activity should be thoroughly monitored.

k.    It is better to have  parental control software  which limits the  websites  user can gain access

 

In boarder perspective following  suggestions are  made to  eradicate   cyber  crimes.

 

1)   Necessity  has arisen  to establish a  association of  all governments in the world  such as United Nations to fight against  the cyber crimes as this cannot be implemented by one country and need an united effort.

2)   Cyber criminals can make attacks from all over the world catching them and therefore requires the coordination of  all  people in all countries.

3)   To catch cyber criminals it is necessary to develop new technologies constantly and this should be a continuous process.

4)   Governments should   establish    teams of professionals in the field to track down internet criminals.

5)   Public must be given a easy to use complaint system in order to complain promptly when an incident occurs.

6)   Specially people must be trained in the police or law enforcement to   act  on an incident of  cyber attack.

7)   Cyber Crimes  Units must be  established with the   experts in the computer field to get assistance when requires.

8)   Universities and colleges  should conduct   degrees in the field like cyber crimes  in order to fill  the gap of  experienced  professional in the field.

9)   Meetings must be organized regularly with government officials,  administrators and  Information technology Managers of companies and organizations   to protect  their systems.

10) Public must  be educated   reporting cyber crimes and then    they are not only helping to combat  internet crimes  such as any other crime.

11) Severe punishment and fines   must be  introduced by the governments to  eradicate cyber crimes.

12)It is necessary to improve the practice of sharing of information in and between  companies and industry sectors.

Conclusion

In this era of globalization Cyber Crime is a word all are familiar with and heard about.  Any violation of law or act forbidden by law  can be defined as  a crime.  Since from a long time   man is associated with  crime and criminality. Cyber crime is a new category of crimes  came into existence with the advancement of science and technology.  There are different  strategies practices  and laws to  fight with crimes in  different countries.  Those are depend on the  environment, background and nature of the offence etc.  It can be concluded and emphasized  that   in order to eradicate  cyber crimes and   specifically to  safeguard  teenagers from cyber related crimes    it is vital a united effort.

References

     I.        Catching cyber criminals – Viewed on 4th  June 2013 – http://www.carnegiecyberacademy.com/facultyPages/cyberCriminals/catching.html

   II.        Computer Crime – Viewed on 6th June 2013 – https://en.wikipedia.org/wiki/Computer_crime

 III.        Csonka P. (2000) Internet Crime; the Draft council of Europe convention on cyber-crime: A response to the challenge of crime in the age of the internet? Computer Law & Security Report Vol.16 no.5.

 IV.        Defending Against Cyber Criminals    Viewed on 5th June 2013 https://www.dhs.gov/defending-against-cybercriminals

   V.        FBI – Cyber Crime – Viewed on 6th June 2013 http://www.fbi.gov/about-us/investigate/cyber

 VI.        Halder, D., & Jaishankar, K. (2011) Cyber crime and the Victimization of Women: Laws, Rights, and Regulations.  ISBN 978-1-60960-830-9

VII.        How to prevent Cyber Crime – Viewed on  6th June 2013  http://www.ehow.com/how_4967690_prevent-cyber-crime.html

VIII.        Paul Taylor. Hackers: Crime in the Digital Sublime (November 3, 1999 ed.). Routledge; 1 edition. p. 200. ISBN 0-415-18072-4

  IX.        Queen introduces Government plans to tackle cyber crime – Viewed on 4th June 2013 -http://www.itpro.co.uk/security/19783/queen-introduces-government-plans-tackle-cyber-crime

    X.        Sri Lanka Computer Crime and Investigation – Viewed on  4th June 2013 – http://www.saptha.com/blog/random/sri-lanka-computer-crime-and-criminal-procedure/

  XI.        Sri Lanka Police, Internet Crime Complaint Center – Viewed on 6th June 2013 – http://www.police.lk/index.php/component/content/article/45/402-internet-crime-complaint-centre

XII.        Susan W. Brenner, Cybercrime: Criminal Threats from Cyberspace, ABC-CLIO, 2010, pp. 91

XIII.        UK Government announces  Cyber crime Reduction partnership – Vihttp://www.computerweekly.com/news/2240179629/UK-government-announces-Cyber-Crime-Reduction-Partnershipewed on 7th June 2013