Abdul Rasool Syed |
With rapid advancement of science and technology, a new world has emerged. This new world is popularly called the cyber world which has by shortening the longer distances morphed the world into a global village. The world is now just a click away from the fingertips of a netizen.
It is an undeniable fact that this interconnected world has offered myriad advantages and has facilitated our lives to a great extent but at the same, it has put our life, property, health, and honor, at a high risk. People with criminal propensity have penetrated deep into the cyber world and have thereby devised new techniques to multiply their affluence with miniscule effort and short span of time. This tendency has resulted in an unprecedented surge of cybercrimes.
The virus named “WannaCry” was spread through email in the form of attachments as once a user clicked on it, all files would be locked spreading virus through computers and demanding money in order to gain access again.
Cybercrime, to put it simply, is a crime that is commissioned through a computer; digital devices and the networks used in the cyber realm and is facilitated through a medium of internet. The types of cyber offences are many but the most prominent and pervasive are hacking, theft of FTP password, Denial of Service Attacks, phishing, website defacement, identity theft, spamming, spoofing, cyber bullying, cyber stalking, computer viruses and worms, malicious software, Money laundering, digital piracy, web jacking, cyber warfare, and cyber terrorism. Similarly, the reasons for orchestrating such crimes are also multiple such as:
- Financial incentives: In this type of crime, the criminals target rich people or organizations like banks, casinos and financial firms where the huge amount of money flows daily and hack sensitive information.
- Hacktivism: it comprises of denial of service attacks which is meant to punish a financial institution.
- Harassment: This includes disclosure of embarrassing personal information about someone and use such information to blackmail him/her.
- Geopolitics: In this type of cyber offence, a virus is developed to monitor or sabotage an adversarial nation’s system.
- Corporate espionage: it is conducted to learn the competitors ‘moves and to obtain its proprietary data in order to formulate the counter strategy accordingly.
- Finally, Mischief: it is committed by the hackers merely to show off their computer wizardry.
The world has witnessed many big forms of cybercrimes so far. In 2001, a 15-year-old guy, Micheal Calce caused a mischief in cyberspace. He was a high school student in Canada when he carried out a cyber-attack on a number of high profile commercial websites including CNN, Amazon, eBay, and Yahoo that resulted in $1.2 billion damage.
Apart, the case of Aaron Schwartz is also worth mentioning here; the brilliant and young American internet hacktivist who was arrested in 2011 for unlawfully downloading and publishing academic journals at MIT. He was widely overcharged by the federal prosecutors and 35 years of imprisonment resulting in his suicide in 2013.
Another most widespread cyber-attack ever hit the NHS computer systems in mid-2017. The hackers managed to gain access to the UK’s medical system. The virus named “WannaCry” was spread through email in the form of attachments as once a user clicked on it, all files would be locked spreading virus through computers and demanding money in order to gain access again. Around 300,000 computers were infected by “WannaCry” and NHS remained down for a number of days.
According to another report by Trend Micro, the U.S U.K and China are more vulnerable to smart home attacks. The report says that the U.S accounted for 28% of smart home device incidents. The U.K and China have followed with 7% each.
Moreover, in 2015, for a period of two years around 650 million Euros were stolen from banks around the world when Russian based hackers used malware to infiltrate bank’s computer systems and gathered personal data. They successfully impersonated online bank staff to authorize fraudulent transfers, and also dispensed cash from ATM machines without a bank card.
In January 2017, a number of UK high street banks, including Lloyds Bank faced a denial of service attack by the hackers. During the attack, more than 20 million UK accounts were blocked and as a result, customers were unable to send payments or check their balance online.
In addition, French President Emmanuel Macron’s emails were also hacked in 2017. His emails were posted online just days before he was due to go ahead against his opponent. 9GB worth of data was posted to paste bin.
Additionally, CISCO investigated 130 organizations in its CISCO 2017 annual Cybersecurity report. It found that 75% of companies were affected by adware. Adware in itself a nuisance, but it can also facilitate further malware attacks. Adware presents itself in the form of advertisements. Whether you re’ using your device on or off the internet, adverts can be displayed.
Furthermore, According to the cybersecurity breaches survey 2018, 43% of businesses were a victim of Cybersecurity breach in the last 12 months. In the U.S the state of California lost more than $214 million through cybercrime alone.
According to another report by Trend Micro, the U.S U.K and China are more vulnerable to smart home attacks. The report says that the U.S accounted for 28% of smart home device incidents. The U.K and China have followed with 7% each. The majority of smart home devices are connected through an external network. If the router you’re using doesn’t have decent security protection, you could be opening up your home to cyber attack.
A country-wide awareness campaign to educate the masses about the gravity of this alarming issue should as soon as possible be resumed. People should also be sensitized about the legal remedies available to them against such crimes.
Another terrifying figure is mentioned by the varonis’s 2018 Global Data Risk report. It says that nearly 6.2 billion files were analyzed. These files contained credit card information, health records, etc. 21% of these files were open to for global access. Moreover, 41% of companies have more than 1000 sensitive files open to everyone.
According to one report, more than 60% of fraud originates from mobile devices; of that figure, 80% comes from mobile apps. Once a cybercriminal has access to one’s phone, it can access his mobile banking app and initiate multiple levels of cyber crimes.
Besides, research suggests that most businesses take up to 197 days to notice the breach of their data. It is undoubtedly an alarming finding. ZDNet reports finance firms can take an average of 98 days to learn that something went wrong with their data. Due to the amount of time it takes for companies to realize a data breach, attackers are able to obtain even more information. Think about it; imagine what a cybercriminal can obtain over a period of six months…
Our country Pakistan is also not immune from these burgeoning perils of the cyber world. Cybercrimes in Pakistan has hit a record high during the last three years. The figures released by the federal investigation agency pertaining to cyber offenses were quite startling. The agency said that its cybercrime circle has so far conducted 2,295 inquiries, registered 225 cases and made 209 arrests in 2018—all highest since the prevention of Electronic Crimes Act(Peca), 2016 was enforced.
The corresponding figures for 2017 were 12, 90 inquiries, 207 cases registered and 160 arrests made, whereas figures for 2016 stood at 514, 47 and 49. These shocking statistics give a vivid picture of the state of cyber crimes in Pakistan that has indubitably touched an unprecedented height within a very short span of time.
Here, the question arises that how we could protect ourselves from being prey to the cyber victimization. This scribe in this respect has the following suggestions that might help us remain as much safe as possible from being a victim of cyber offenses.
Read more: Why Pakistan needs a cyber army?
- Choose strong passwords and keep changing them frequently.
- Enable a two-step verification of the chosen password
- Change the password as soon as you feel that someone has used your account; change the passwords for all of your accounts, not just the one that was hacked. Otherwise, it is very easy for the hacker to follow a password pattern and get into your other accounts as well.
- Once you have changed the passwords, report the hacking of your account to the relevant site.
- After reporting, let your family members and other acquaintances know the occurrence so that they don’t communicate with your hacked account.
- Report the harassment, if there be, to the concerned law enforcement agency. In Pakistan, we have a Federal investigation agency (FIA) that deals with cyber crimes. To this end, it has introduced a new department under the name of National Response center for cybercrime (NR3C).
To conclude, cybercrimes are growing at an exponential rate in the world. Our country also seems to be a victim of this mushrooming menace. The government as well the authorities concerned should, therefore, take drastic measures to halt the growth of such offenses. A country-wide awareness campaign to educate the masses about the gravity of this alarming issue should as soon as possible be resumed. People should also be sensitized about the legal remedies available to them against such crimes.
Advocate Abdul Rasool Syed is a lawyer by profession and is based in Quetta, Baluchistan. He also has MBA from IBA Karachi. He is passionate about writing and contributes to various publications including Daily Times and Frontier Post. The views expressed in this article are author’s own and do not necessarily reflect the editorial policy of Global Village Space.