Just like regular crime, cyber crime happens online. Think of it as any illegal activity that uses a computer, the internet, or other digital devices.
Here are some common examples of cyber crime:
- Online Predators: Individuals who target and exploit others online.
- Identity Theft: Stealing someone’s personal information to commit fraud.
- Stealing of sensitive intellectual property: Illegally copying valuable business secrets or creations.
- BEC (Business Email Compromise): Scammers tricking businesses through email to send money or sensitive information.
- Ransomware: Blocking access to computer systems or files and demanding payment (ransom) to restore access.
The Rise of Cyber Crime: Why is it Increasing?
Sadly, cyber crime is becoming more common each year. Here’s why:
- Easy money laundering with Cryptocurrencies: Digital currencies can make it harder to trace illegal funds. Services called tumblers mix up cryptocurrency transactions, making it very difficult to follow the money trail.
- Easy to do: It can be simpler for criminals to commit crimes online than in the real world.
- Low risk of getting caught: Staying anonymous online can be easier.
- High rewards for little work: Cyber criminals can potentially gain a lot with relatively little effort.
- Targets many victims: One attack can reach thousands of people or organizations.
Cyber crime can have serious consequences. Identity theft, for example, can cause financial ruin and a lot of stress. The internet also makes money laundering easier, especially with cryptocurrencies.
Who are Cyber Criminals?
Cyber criminals can be anyone, but here are some common types:
- “Kids in their rooms”: Individuals, sometimes younger people, engaging in illegal hacking activities.
- State-sponsored groups: Teams working for governments to target other countries.
- Hacking Groups: Criminals who attack companies for ransom money.
Remember, cryptocurrency is digital money that uses strong security to manage transactions. Examples include Bitcoin.
Catching Cyber Criminals: A Challenge
It’s often easy for cyber criminals to stay hidden online, making it hard to catch them. When they do get caught, it’s often because they made a mistake. Law enforcement can also sometimes use captured cyber criminals to find others.
However, tracking down cyber crime is tough. An attack might appear to come from one country (like the UK), but the computer could be controlled from another (like India), which is controlled from yet another (like Pakistan). This makes international cooperation between law enforcement agencies essential.

Driven by Money: Common Cyber Threats
Many cyber threats are motivated by money:
- Cryptocurrency miners: Secret software infects your computer to mine cryptocurrency for the attackers, slowing down your system.
- Ransomware: Attackers encrypt your files and demand payment to unlock them.
- BEC (Business Email Compromise): Hackers gain access to email accounts to trick people into sending money to fake accounts.
The potential to make money attracts many criminals to the cyber crime world.
Value and Power Online
There’s value and power in different aspects of the internet:
- Hacked systems: Can contain valuable sensitive information like business secrets, gaming accounts, and private photos.
- Bandwidth: Can be used for DDoS (Distributed Denial of Service) attacks to overwhelm websites and disrupt businesses.
- Browser hijacking: Attackers can install themselves in your browser to try and steal your online banking details.
The lure of financial gain is causing more criminal groups to get involved in cyber crime, making the internet a riskier place.
Extortion for Money: A Cruel Tactic
Another way cyber criminals make money is through extortion. They hold information over someone and demand payment to avoid releasing it. A common scenario involves online relationships where a scam artist:
- Builds a fake connection with a victim.
- Engages in conversations, sometimes involving video (which might be fake).
- Convinces the victim to share personal and compromising photos or videos.
- Then threatens to share this material with the victim’s contacts unless they pay money.
These kinds of stories are common, highlighting the dangers of interacting online without understanding the risks.
Exploring The Dark Web
The Dark Web (or Dark Net) is a part of the internet that requires special software to access. It’s also known as the Tor Network or Onion Router.
Anyone can access the Dark Web by downloading software like the Tor Browser. This browser works like Chrome or Edge but can also access websites ending in .onion.
Traffic through Tor Browser is automatically made anonymous and encrypted by passing through many different computers. It also has built-in features to protect against tracking.
You can find various websites on the Dark Web, some similar to the regular internet. Using Tor Browser to access certain URLs ensures your communication is encrypted and anonymous within the Dark Web.
Exploring the Dark Web: Anonymity and Hidden Corners of the Internet
You can access a variety of interesting websites through the Tor Browser, the special software needed to enter the Dark Web. Some of these even have counterparts on the regular internet. When you use the Tor Browser to visit certain onion addresses, your communications become fully encrypted and anonymized within the Dark Web.
For example, you can find:
- Facebook (via their Tor address): http://www.facebookcorewwwi.onion/
- The DuckDuckGo search engine, known for its privacy focus: http://3g2upl4pq6kufc4m.onion/
- Even the American CIA (Central Intelligence Agency) has a presence: http://ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion
- The Hidden Wiki, which acts as a directory of links to explore within the Dark Web: http://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page
Because of the strong anonymity and encryption it offers, the Dark Net is unfortunately also a place where many illegal websites, marketplaces, and criminal networks exist.
Please be aware and exercise caution when navigating the Dark Net.
Note: The links provided above will only function correctly when accessed through the appropriate software, such as the Tor Browser.








Leave a Reply