Disclaimer: This is an example of a student written essay.
Click here for sample essays written by our professional writers.

Any opinions, findings, conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of UKEssays.com.

Organized Cybercrime and the IT Act

Info: 5072 words (20 pages) Essay
Published: 23rd Sep 2019 in Criminology

Reference this

– “No city is without cybercrime, but this city is without organized cybercrime, because the IT Act 2000 gave law enforcement teeth to fight against the online mob.”

This would have been a great parody statement for the internet meme world, but the fact Is organized cybercrime exists and the Act was passed 20 years ago.



an illegal act for which someone can be punished by the government especially: a gross violation of la an illegal act for which someone can be punished by the government especially: a gross violation of law (Merriam-Webster 2018)


Cybercrime is presently settled and there are a lot of chances for digital hoodlums to profit – by taking cash from unfortunate casualties’ financial balances and by moving stolen information on the black market. Accordingly, it is not amazing that administration organizations, security sellers and organizations have looked to measure the scale and cost of assaults. Some endeavor to measure the worldwide effect, some attention on the effect inside an explicit geo-political area, and others attempt to assess the expense of an explicit attack.1, 2, 3

Organized Crime

Sorted out wrongdoing is a class of transnational, national, or neighborhood groupings of profoundly unified undertakings kept running by hoodlums who mean to participate in illicit movement, most generally for cash and benefit. Some criminal associations, for example, fear-based oppressor gatherings, are politically inspired. Some of the time criminal associations compel individuals to work with them, for example, when a pack blackmails cash from businesspeople for “protection”. [1] Gangs may end up sufficiently trained to be viewed as sorted out.

Organized Cybercrime

Sorted out wrongdoing is fundamentally about the quest for benefit and can be comprehended in Clausewitzian1 terms as a continuation of business by criminal methods. Therefore, similarly as physical organizations move their ventures on to the Worldwide Web looking for new open doors for benefits, criminal endeavors are doing likewise. Criminal associations are by all account not the only players in unlawful markets, yet they are frequently the most essential, not minimum because of the additional “aggressiveness” that is given by the danger of sorted out savagery. Besides, criminal associations will in general be extraordinarily great at recognizing and seizing open doors for new unlawful undertakings and exercises. In this specific situation, the Internet and the proceeding with development of electronic trade offer colossal new prospects for illegal benefits.  

Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Find out more

As of late, there has been a huge increment in the advancement of sorted out wrongdoing and medication dealing gatherings. Colombian medication dealing associations, for instance, have pursued standard business rehearses for market and item enhancement, misusing new markets in Western Europe and the previous Soviet Union. Criminal associations and medication dealers have progressively contracted monetary authorities to direct their illegal tax avoidance exchanges. This includes an additional layer of protection while using lawful and budgetary specialists learned about money related exchanges and the accessibility of places of refuge in seaward monetary ward. So also, composed wrongdoing does not have to create specialized ability about the Internet. It can enlist those in the hacking network who do have the aptitude, guaranteeing through a blend of remunerations and dangers that they complete their appointed errands viably and effectively. 

Sorted out wrongdoing bunches ordinarily have a command post in frail expresses that give places of refuge from which they direct their transnational tasks. Essentially, this gives an additional level of assurance against law requirement and enables them to work with insignificant hazard. The inalienably transnational nature of the Internet fits flawlessly into this model of action and the push to amplify benefits inside a worthy level of hazard. In the virtual world, there are no outskirts, a trademark that makes it extremely appealing for criminal action. At the point when experts endeavor to police this virtual world, in any case, fringes and national wards pose a potential threat – making broad examination moderate and dull, best case scenario, and incomprehensible, even under the least favorable conditions. 

The Internet itself gives chances to different sorts of robbery, regardless of whether from online banks or of licensed innovation. Be that as it may, it additionally offers new methods for perpetrating old violations, for example, misrepresentation, and offers new vulnerabilities identifying with interchanges and information that give alluring focuses to blackmail, a wrongdoing that has dependably been a staple of mafia associations. 

The obscurity of the Internet likewise makes it a perfect channel and instrument for some sorted out wrongdoing exercises. The idea of a criminal black market means a dinginess or absence of straightforwardness. Mystery is normally a key piece of sorted out wrongdoing system and the Internet offers fantastic open doors for its support. Activities can be taken cover behind a cloak of obscurity that can run from the utilization of universal cybercafés to modern endeavors to cover Internet steering. 

Sorted out wrongdoing has constantly chosen specific enterprises as focuses for penetration and the activity of unlawful impact. Previously, these have incorporated the New York City trash pulling and development businesses, the development and harmful waste transfer ventures in Italy, and the saving money and aluminum enterprises in Russia. From a wrongdoing point of view, the Internet and the development of online business present another arrangement of focuses for penetration and the activity of impact – a prospect that proposes that Internet innovation and administration firms ought to be especially cautious about imminent accomplices and monetary supporters. 

In entirety, the cooperative energy between sorted out wrongdoing and the Internet isn’t just exceptionally regular yet additionally one that is probably going to thrive and grow considerably further later. The Internet gives the two channels and focuses to wrongdoing and empowers them to be misused for significant gain with a low dimension of hazard. For sorted out wrongdoing it is hard to request more. It is basic, in this manner, to distinguish a portion of the manners by which composed wrongdoing is as of now covering with cybercrime.


Each flicker of an eye denotes a headway in innovation in the present world.

Through the innovation of the World Wide Web and pursuit machines, for example, Google and Yahoo, we can without much of a stretch access data whenever we require it.

The data that we effortlessly get to be contained in the surface web, which can be effectively gotten to by ordinary web indexes, for example, the Google. This makes up just 4 percent of the substance accessible at first glance web.

The other information is contained in the profound web, which makes up 96 percent of the data on the web.

The profound web is an undiscoverable bit of the World Wide Web which isn’t gotten to by standard web indexes.

The profound web contains the dull web, which is a deliberately covered up, totally ungoverned bit of the web where correspondence happens in full namelessness.

Your TOR utilization is being observed

This writeup is intended to investigate the effect of the dim web on cybersecurity and web administration.

Cybersecurity and Internet Governance:

The rise of the dull web has prompted progressively pernicious exercises on the web. This has affected the viability of cybersecurity and web administration.

Cybersecurity plans to secure data frameworks and information for any association, while web administration involves the advancing strategies and principles under which online clients settle on choices on web use and advancement.

The over two bodies have been set up to guarantee that the uprightness of the utilization of the web is considered by any client and guarantee that no unlawful activities occur.

Effect of the Dark Web:

The dim web utilizes the Tor organize, which advances mysterious correspondence by scrambling information to different segments and transmitting it to arrange hubs called onion switches.

The Tor organize is utilized by political campaigners together with activists around the globe to keep up the security of their correspondence to evade counter assaults by the administration.

Be that as it may, some poorly intentioned elements can transmit false data and even arrangement unlawful assaults against the legislature, and this makes difficulties to the web administration and cybersecurity control focuses.

The dull web additionally gives a great domain to programmers to direct illicit organizations.

They lead the exchange of stolen merchandise and fake things to the most elevated bidders while likewise facilitating different gatherings identified with tax evasion utilizing cryptographic forms of money and other illicit exercises. Notwithstanding being a center point for cybercriminals, the dull web is likewise a scene for medication dealing activities.

Man, with cuffs on PC:

Cybercrime has been quickly expanding in the U.S., inciting calls for everyone (not just the information insurance offices) to receive methods for managing the dangers.

This has decreased trust to all types of organizations directed through the web.

This is the reason numerous purchasers and organizations individuals like to lead just a couple of organizations which they can acquire trust on them as opposed to taking part in various organizations lastly winding up with an aggregate misfortune.

Depending on these web law implementation focuses has turned into a non-arrangement in battling this wrongdoing as it keeps on continuing day in day out.

The dim web has likewise added to the ascent of worldwide cybercrime. This has been a worry since the mid-2000s.

In 2005, an investigation by the United States Office of Cybercrime demonstrated that this commence had out-numbered the instances of burglary, record misusing and different types of information breaks.

The investigation demonstrated that hacking and different types of composed wrongdoings added to 61 percent of dangers in information assurance, and around 76 percent of officials who managed the web communicated their worry on cybercrime.

Cybercrime has been quickly expanding in the U.S., provoking calls for everyone (not just the information insurance organizations) to embrace methods for managing the dangers.

The utilization of the dim web has additionally pushed youngster misuse, as a lot of its substance are included tyke abuse material.

Studies have appeared numerous predators and abusers utilize the Tor arrange with the goal that they may shroud their exercises.

It takes around a half year to break down 2 percent of the substance contained in obscurity web, and subsequently turns out to be too hard to even think about controlling.

The fast development of dull web discussions has prompted the simple dissemination of scrambled innovations and hacking codes, which makes it troublesome for the web security organizations to control.

The quantity of programmers completing their exercises on the dull web is quickly rising and more individuals are utilizing the utilization of cyberattack benefits or notwithstanding figuring out how to oversee it for themselves without being followed.

Arrangements: Employee Training, System Updates and Building Awareness

To secure your business, firm or some other part of the legislature from cybercrimes, the board ought to depend on the web security office as well as guarantee that they train their specialists on ransomware insurance.

Programmer connecting through workstation.

Ransomware is a kind of cyberattack wherein programmers utilize malignant programming—which is frequently sourced from the dull web—to increase unapproved access to PC frameworks and systems.

Ransomware is a sort of cyberattack wherein programmers utilize malevolent programming—which is frequently sourced from the dim web—to increase unapproved access to PC frameworks and systems.

They at that point encode every one of the information in the focused-on framework and compromise to distribute the data or even limit clients to get to the information except if installment is finished.

Worker preparing will develop a culture of successful information security and counteractive action of information misfortune, with the goal that staff individuals will dependably be caution on the off chance that anything insidious is going to occur.

All in all, it is critical for each association with obsolete innovation to refresh its frameworks to the present benchmarks.

An obsolete framework is dependably at a high danger of information breaks since its innovation was never intended to adapt to current information assaults.

Viable security advances a successful foundation in adapting to security dangers. It is additionally shrewd for IT specialists to make ordinary arrangements on the approaches to overcome the dangers related with the different vindictive exercises that happen in obscurity web.

This will empower less demanding working and coordination of both web administration and cybersecurity—subsequently enhancing its viability.

Growth of the Cybercrime World

Many cybercrime bunches have achieved the dimension of refinement where their specialized abilities are on a standard with those of a country state, it has been guaranteed.

Packs are fit for building complex frameworks went for taking cash and protected innovation on a terrific scale, costing nearly the equivalent to the worldwide economy as duplicating or the opiates exchange — more than $400bn per year.

Find out how UKEssays.com can help you!

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

View our services

“Cybercrime delivers significant yields at generally safe and (moderately) ease for programmers,” said a report supported by security organization McAfee. The report cited one anonymous European knowledge official who said there are 20 to 30 cybercrime bunches in the previous Soviet Union that have “country state level” capacities

Who owns it?

A large part of the cyber-crime is controlled by the same people who own organized crime. Deep-net Darknet are the tools of the underworld cybercrime gangs. Organized crime is also perpetrated through these cybercrime techniques majorly.

To answer the question, no one owns the darknet nor even the internet. Both are forms of hardware and software already connected and bought by individual people/corporations which run them.

So, in the case of darknet obviously individual people/illegal companies have started this and most likely these people are the same as the criminally wanted suspects with noted exceptions below.

One possible exception to this would be the networks that governments.

In that sense, you could say that the U.S. government owns these “darknets.”

White White-Collar – Cyber-Crime

Often cybercrime is associated with white-collar professionals who know how to cheat the law and have the elite skillsets, but with the knowledge catching up to regular sectors of society, these criminals are no less regular than the criminals with stealing abilities.

But in contrast to this phenomenon, there is another class of criminals rising, it is the mafia clan of organized cyber-crime. These people have dedicated their careers to rule the underground world of hacking.

It is very important to run background checks on individuals on whom we still have authority to check backgrounds for, for employment and other regular processes.

Victimless Crimes

Piracy and hacking are said to be victimless crimes. Piracy is basically ripping people off the money they don’t know they can earn.

Hacking being the money borne by the companies and governments out of the contingency and tax funds.

Now, with data and insights, these crimes are no more victimless and punishable.

Again, and again we see these hacks targeting common user data. Data that then is being used in scams and fraud. It is a huge mistake to think that no-one is interested in you since you are not important. You are important to cyber criminals if you don’t protect yourself.

The programmers, obviously, aren’t keen on the general population behind the individual information they gain. Yet, on the off chance that their inbox contained the sort of messages I’ve gotten today, they’d rush to acknowledge PC wrongdoing is a long way from harmless.

“Somebody marked in at Walmart.com and quickly changed the email address and secret key. Walmart informed me that it occurred however would not enable me to recover my record. My money related data was in that account, so I needed to contact the bank for another plastic.

Hacking regularly appears a harmless offense. At the point when the National Crime Agency declares it’s captured 57 affirmed PC programmers, it’s anything but difficult to trust that the wrongdoings they’re blamed for didn’t generally “hurt” anybody.

False. One of the occurrences being researched by the NCA is the hacking of a Yahoo! benefit in 2012. More than 400,000 email locations and passwords were released online by the D33Ds group and stay there right up ’til the present time (and there’s a restricted sum Yahoo! can do about that).

Ethical Hacking

Ethical Hacking is a discipline to learn hacking to find flaws in cybersecurity of an application or product.

It gained a lot of popularity and is known as white hat hacking. People break into systems of multinationals and are hired strangely.

This way of counter-implementing security is great as only humans and human’s trust can help overcome the issue of cybercrime.

The term “white hat” in Internet slang refers to an ethical computer hacker, or a computer security expert, who specializes in penetration testing and in other testing methodologies to ensure the security of an organization’s information systems.

It is evaluated that more than 30,000 sites are hacked each day, which goes to demonstrate the size of present-day hacking and how it can influence organizations all things considered. Programmers extend from unpracticed “content kiddies” making utilization of hacking devices composed by others to refined present day cybercriminals who will persevere relentlessly to get what they need.

While we may consider programmers working solely from behind their PC screens, it’s likewise evident that dark cap programmers will search for elective strategies to separate frameworks. These techniques could incorporate everything from breaking passwords to utilizing types of social building in which exploited people could be deceived into giving over close to home subtleties or touchy hierarchical data.

It’s easy to see how businesses can benefit from using ethical hackers. A white hat hacker can mimic a genuine cyber-attack that black hat hackers would attempt to carry out using all the same strategies that a real attack would use. If a business’s defenses have a weakness, the ethical hacker will be able to expose it so that it can be fixed before a real hack occurs.


Millions are being invested in cyber-security each year to keep up with the hackers.

The jobs which pay for this research also run into millions sometimes.

Protection from yourself

This may be an odd question, but I am fascinated by the world of cyber security. I love learning and thinking about new vulnerabilities. The problem is just how easy it is to get carried away. With the internet you have thousands of forums and videos showing you how to do whatever you please. It’s a giant carrot on a string that also has curiosity calling my name. Are there labs somewhere where you can ethically practice and try new things?

FireEye, a major cybersecurity firm, identified that the Dyer Banking Trojan designed to steal credit exploited this vulnerability – the first time an exploit was reported. This vignette demonstrates how threat warnings gathered from the darknet can provide valuable information for security professionals. The average global exposure of the Dyer Banking Trojan was 57.3% along with another banking malware Dridex. It means that nearly 6 out of 10 organizations in the world were affected, and this is a significantly high number on a global level

Fraud Detection

With automation frauds can be detected faster and on a large scale.

Artificial intelligence-based machine learning technologies are increasingly being used by businesses and payment services to detect and prevent potentially fraudulent payments. Experts say these technologies may help more accurately identify attempted fraud, thus reducing time-consuming manual reviews, costly chargebacks and fees, and denials of legitimate transactions.1,2

Machine learning is being applied alongside existing fraud detection systems, which typically use manually created rules and other techniques, such as flagging unusually large withdrawals or payments initiated outside a cardholder’s home country.3 Machine learning differs from these traditional techniques in that it analyzes large amounts of historical transaction data to build a model that can identify patterns associated with fraudulent transactions. The system then uses this model to scan incoming payments in real time and flag potentially fraudulent ones.4

Helping Payment Services Adapt as Fraud Tactics Evolve

Machine learning is becoming increasingly important for several reasons, experts say. One is the increasing volume of e-commerce and other remote “card not present” transactions, in which speedy approval is often required yet the purchaser’s physical card is not present for additional verification. 5 According to a 2016 LexisNexis fraud study, these remote channels were primarily responsible for driving an increased level of fraud at U.S. merchants, particularly among larger companies.

Another reason for the growing importance of machine learning in fraud detection is the worldwide shift to immediate payment systems, which require correspondingly faster identification of potentially problematic transactions.6 Yet another is fraudsters’ ability to continually change their tactics to evade anti-fraud controls; fraud-detection systems must therefore continuously adapt to keep up.7

Machine learning is suited to addressing fraud in payments solutions in part because of the feedback loop inherent in payments, observes Russ Jones, a partner at payments industry strategy consulting and research firm Glenbrook Partners, in a blog post.8 When fraud attempts succeed, the bad transactions are continuously reported back to the payment network and can be fed into risk-scoring algorithms along with all other data associated with each transaction. 9

This means machine learning systems can analyze vast amounts of historical data to identify patterns associated with fraud. Experts say that machine learning technology is capable of taking into account many more data points than would be possible with manual methods alone, including detailed patterns of behavior associated with specific accounts.10 This may help the technology make a more accurate determination of whether a payment is likely to be fraudulent.11 Machine learning is coming to the fore now, technology providers say, in part because faster, low-cost computers and data storage make it possible for machine learning systems to process high volumes of transactions in real time, making decisions based on complex criteria in a fraction of a second


Even if there is a perfect solution to cybercrime, there won’t be perfection achieved on the part of people who commit it and get away occasionally, that’s just law and nature.

 According to a Naked Security post, it is only a matter of certain time before the authorities and other agencies get some measure of control over the Dark Web/ Deep Net. The article likens the present hidden Web to the Wild West — even though it was once bigger than the settled provinces of the United States, even this lawless land eventually found itself bound by law and decorum.

According to the Global Commission on Information Governance report, the below are six key monitoring areas that are essential to the success of any governance effort:

Mapping the Hidden Services Directory: Both TOR and I2P use a distributed hash table system to hide database information. Strategically deployed nodes could monitor and map this network.

Customer Data Monitoring: There will be no monitoring of consumers themselves, but rather destination requests to track down top-level rogue domains.

Social Site Monitoring: This includes watching over popular sites such as Pastebin to find hidden services.

Hidden Service Monitoring: Agencies must “snapshot” new services and sites as they appear for later analysis, since they disappear quickly.

Semantic Analysis: A shared database of hidden site activities and history should be built.

Marketplace Profiling: Sellers, buyers and intermediary agents committing illegal acts should be tracked.

The bottom line? While the Dark Web does not show any signs of an immediate or obvious danger, it is present nonetheless and works as a catchall both for the users seeking anonymity and to those who look to operate outside the justice system. Keeping an eye on this hidden corner of the Web is by no means and bounds impossible. It comes down to the choices nation-states and private companies are willing to make. How much light must be thrown at the Dark Web to make it safe, while still respecting the right to Internet anonymity? Is a known darkness better than none at all?

Such a massive piece of virtual real estate that is essentially unmonitored by Internet oversight agencies raises the question: Is there any hope for cybersecurity in the dark?


This year is going to see big changes and events in cybersecurity and privacy, predicts a report in TechCrunch. Data breaches spiked in 2018 and will likely continue unabated in 2019, while other major events will also change how we interact with technology, including California’s new online data collection law; Australia’s anti-encryption push; and more privacy-related pain for ad-focused tech firms. The report also predicts that Chinese-U.S. rivalry in cyberespionage is set to get worse. 


  • Smirnova, O. and Holt, T. J. (2017). Examining the geographic distribution of victim nations in stolen data markets. American Behavioral Scientist 61(11): 1403-1426.
  • Whittaker Z (2018, Dec 31) TechCrunch “https://www.linkedin.com/feed/news/cyber-threats-set-to-spike-in-2019-4601884?trk=trending-topics_image”
  • Lee M (2009) Criminology: A Sociological Explanation “https://www.hrstud.unizg.hr/_download/repository/Eamonn_Carrabine,_Maggy_Lee,_Nigel_South,_Pam_Cox,_Ken_Plummer_Criminology_A_Sociological_Introduction__2009.pdf”
  • South N (2009) Criminology: A Sociological Explanation “https://www.hrstud.unizg.hr/_download/repository/Eamonn_Carrabine,_Maggy_Lee,_Nigel_South,_Pam_Cox,_Ken_Plummer_Criminology_A_Sociological_Introduction__2009.pdf”
  • Cox P (2009) Criminology: A Sociological Explanation “https://www.hrstud.unizg.hr/_download/repository/Eamonn_Carrabine,_Maggy_Lee,_Nigel_South,_Pam_Cox,_Ken_Plummer_Criminology_A_Sociological_Introduction__2009.pdf”
  • Plummer K (2009) Criminology: A Sociological Explanation https://www.hrstud.unizg.hr/_download/repository/Eamonn_Carrabine,_Maggy_Lee,_Nigel_South,_Pam_Cox,_Ken_Plummer_Criminology_A_Sociological_Introduction__2009.pdf


Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: