Cybercrime is crime that occurs when computers or computer networks are involved as tools, locations, or targets of crime. This means that cybercrime may include a wide variety of traditional types of crime, such as theft or even extortion, but that these may take on novel forms because of the opportunities provided by the cyber environment. In this paper, we try to focus on the Cyber crime. The paper describes and analyzes how the fraud was executed. The paper identifies the parties that were involved (for example: suspect(s), victim(s), witness (es), anonymous tips, law enforcement personnel etc.). The paper also provides a description of the suspects / victims profile. The paper recognizes the motives (or possible motives if not reported of the suspects. It also indentifies internal controls that might have deterred or prevented the fraud from occurring. The paper explains possible preventive measure for fraud. The paper also explains what could be done to detect the fraud and how the fraud investigated. In last paper concludes with the overall discussion.
Cyber Crime
Introduction
Every side and aspect of the society has two faces, good and bad, moral and evil. The activities perused by the inhabitants of the world explicit depict their imbedded morality or immorality. Everyone wishes to perceive this world to be a perfect place to reside in, with no apparent threat from the outer factors of the world. However, this is a highly idealized scenario that most probably no individual witnessed ever since the life on this planet began. Amongst the immoral activities that have been an integral part of this world since the beginning are the crimes that take place in our society in various shapes. It will not be wrong to say that although crimes have always existed in our society, yet ever since the world has progressed and technically developed, so have the shapes of the crimes (Glenny, 2011).
Background
Online crime began in the early 1960s when universities and certain government agencies and banking institutions began using networked computers to send text messages, for research, financial transactions, and record keeping. The earliest abusers of computer systems were college students who experimented with using them to play games and solve problems. Early abuse involved relatively harmless pranks and computer hacking (i.e., breaking into computer systems) to view files and sometimes manipulate or steal data.
Describes and Analyzes How the Fraud Was Executed
Since computers and networks now pervade almost every corner of our lives, from making a telephone call to driving on the freeway, the crimes that occur in the cyber environment are many. Some of these crimes may or may not be crimes, depending on the jurisdiction, especially as the Internet transcends international borders. Gambling, for example, or even trading in child pornography, may not be crimes in some countries. Some of these crimes are old crimes with a new face.
Examples
For example, a thief may purchase an item from an online store using a false identity or credit card; a robber may force a victim to divulge ...