}; }; document.write('
Harassment and extortion in the
context of cybercrime refer to illegal activities carried out online with the
intent to intimidate, threaten, or coerce individuals or organizations.
A. Cyber
Harassment
Cyber harassment involves the
use of electronic communication to harass, intimidate, or cause emotional
distress to another person. Cyber harassment is often fueled by personal
vendettas, prejudice, or a desire to harm the victim emotionally or socially.
v
Legal Definition: Cyber harassment
involves the persistent and intentional use of electronic means to inflict
emotional distress, harm, or fear on an individual. This can include behaviors
such as online stalking, cyberbullying, and impersonation.
v
Behavioral Perspective: Cyber harassment,
from a criminological standpoint, examines the motivations and patterns of
behavior behind online activities. It may involve an analysis of power
dynamics, the impact on victims, and the role of technology in facilitating
such behaviors.
This can take various forms,
Online stalking: Persistent
and unwanted attention, monitoring, or following of someone online. Example is,
an individual constantly monitors and tracks someone's online activities,
gathering personal information to use against them.
Cyberbullying:
Deliberate and repeated use of digital platforms to harm, threaten, or
humiliate an individual.
a.
Posting hurtful or threatening messages on social media
platforms.
b.
Sharing embarrassing photos or videos without the
person's consent.
c.
Creating fake profiles to impersonate and harm
someone's reputation.
Impersonation:
Pretending to be someone else online to damage their reputation or cause harm.
a.
Pretending to be someone else in order to damage their
personal or professional relationships.
b.
Creating fake social media accounts in someone else's
name with the intent to deceive.
B. Cyber
Extortion:
Cyber extortion involves using digital means to threaten an
individual or organization with some form of harm unless they comply with the
extortionist's demands. Cyber extortion is often financially motivated, with
perpetrators seeking monetary gain through coercion.
v
Legal Definition: Cyber extortion is the
act of using digital means to coerce individuals or organizations into taking a
specific action, typically involving the payment of money. This can include
ransomware attacks, threats of public exposure, and other forms of intimidation.
v
Behavioral Perspective: Criminologists
studying cyber extortion would likely focus on the motivations and tactics
employed by perpetrators. They may analyze the psychological aspects of
coercion, the decision-making processes of victims, and the broader societal
implications of these types of cybercrimes.
Common tactics include,
Ransomware attacks: Malicious
software that encrypts a victim's data, and the attacker demands payment for
its release.
a.
A hacker infiltrates a company's network and encrypts
its data, demanding a ransom for the decryption key.
b.
Ransomware that threatens to publish sensitive data
unless a payment is made.
DDoS attacks: Overloading a
network or website with traffic, disrupting normal functioning until the victim
pays to stop the attack.
a. An
online service, such as a website or application, is flooded with traffic,
rendering it inaccessible until the owner pays a specified amount.
Threats of public exposure:
Threatening to reveal sensitive or embarrassing information about the victim
unless they pay.
a.
A cybercriminal gains access to compromising
information about an individual and demands payment to prevent the release of
that information.
b.
Threatening to expose confidential company data or
trade secrets unless a ransom is paid.
c.
Threatening to distribute explicit photos or videos of
an individual unless they pay money or perform additional explicit acts.
Criminologist
Perspective
A criminologist's perspective would aim to contribute to a
comprehensive understanding of these cybercrimes, encompassing both the legal
and behavioral dimensions, to inform strategies for prevention, intervention,
and law enforcement.
In both cases, a criminologist might explore the following
aspects:
1.
Motivations:
What drives individuals to engage in cyber harassment or extortion? This could
include financial gain, revenge, ideological motives, or a desire for control
and power.
2.
Impact on
Victims: Understanding the psychological, emotional, and social impact on
individuals or organizations targeted by cyber harassment or extortion.
3.
Technological
Facilitation: Examining how technology is used as a tool in the commission
of these crimes, including the use of social media, email, encryption, and
other digital platforms.
4.
Preventive
Measures: Identifying strategies and policies to prevent and respond to
cyber harassment and extortion, both at the individual and societal levels.
5.
Legal
Frameworks: Analyzing existing legal frameworks and their effectiveness in
addressing and prosecuting cyber harassment and extortion cases.
0 Comments