New crimes, among other things, came up as a consequential result of the new IT era. Unfortunately new crimes, new type of criminals came-up due to IT misuse coupled with criminal intention from greedy “white-collar” sophisticated criminals. Loses of cybercrimes are unlimited, uncountable and statistics reveal that it could be over multi billion dollars and the march is going fast around the clock in all corners. No doubt, this is very grave and harmful to economic and social development of all indiscriminately. Cybercrimes may threaten persons or nations security and the financial assets by hacking, identity theft, copyright infringement, child pornography, privacy trespassing, fraud, phishing, VI crimes..
In criminology lessons we have learned that, “the change in the offence requires a change in the defense”. Cybercrimes are new different offences as the “corps deliciti” has changed, as such, there is a real genuine need to change the defense. The criminal “Actus Reus” of e-criminals are maliciously achieved through different IT software programs known as, inter alia, viruses, malwares, Trojans, spywares, hackers, DDoS attacks, spams, SQL injections … They are uncountable and what is unknown in the “Dark Internet” is more and more. Every day we are victims of new grave dangerous IT e-crimes. The fierce epidemic is already there attaching every where.
There is urgent need to work hard and fast to face cybercrimes as the damages are increasing and very frustrating to all. In this respect, there are drastic steps to be taken by all. In addition to the personal
level, there are further steps to be undertaken by Governments and the whole community is required to create water-tight defensive and legal strategy, otherwise the future is at great unwarranted risk.
To achieve an effective control on cybercrimes all steps, being small or big, are to be undertaken, well presented and properly implemented. As a rule, we need to know that no place is attackproof. E-criminals could reach any place any where any time. No string castke to hide in, therefore as protection, strong preventive measures are needed such as firewalls, encryption, re-encryption, frequent security check-ups, etc..
No doubt, IT revolution is strongly needed for an advanced e-future and we need to accommodate and live with its pros and cons.. However, strong technical legislative positions against cybercrimes is a big must. Let’s work tiredlessly for this and we can effectively minimize ecrimes and defeat the masterminds, further more, to bebefit from the fruits coming from the new e-technology.