Common Types of Technology Crime

Modern technology is almost inseparable from our daily lives. However, criminals often take advantage of vulnerabilities in cyber security to commit crimes through the use of computer technology.  If members of the public lack security awareness of computer network security, they can easily fall prey to online swindlers.  Police appeal to the public to be vigilant and thereby avoid potential technology crime hazards.

Whilst using computer as the medium, technology crime is not that much different from traditional crime.  Various common types of technology crime are listed here.  We hope members of the public can take precautions.

Common technology crimes include:

Ransomware Attack

Ransomware Attack

Ransomware is malicious software that prevents or restricts a user from accessing a computer system by freezing the computer’s screen or encrypting the computer files unless a ransom is paid.

Social Media Deception (Image)

Social Media Deception

Swindlers logged in social media accounts with login names or email addresses and passwords acquired by illegal means. They then posed as the users of these accounts and sent deceptive messages to the users’ friends on the contact lists, requesting them to buy virtual point cards or reload cards on their behalf. They also asked for the serial numbers/authorization codes and passwords on the cards, and then could not be reached after getting such information.

E-Banking Fraud (Image)

E-Banking Fraud

In recent years, some culprits send suspicious emails to victims to induce them to open the attachments contained.  When the files are opened, the victims’ computers are infected by malicious programmes.

Email Scam (Image)

Email Scam

Nowadays, email is a common form of communication channel for liaising with relatives and friends as well as commercial partners.  Culprits would hack email accounts and cheat victims by all possible means to make remittances.  Some victims have suffered significant amount of losses in some cases.   Here are some common scenarios:

Online Social Networking Traps (Image)

Online Social Networking Traps

As technology is advancing rapidly, computer and information technology have brought convenience to the community by allowing people from all walks of life and different age groups to obtain information from the Internet and have closer liaison with friends and relatives.  While the use of the Internet by young people and children is increasingly common, they will have contact with the people they know by emails, social networking websites and messaging software as well as making friends online by these means.

Online Blackmail (Image)

Online Blackmail

As technology is advancing rapidly, computer and information technology have brought convenience to the public, facilitating people from all walks of life and different age groups to obtain information and make contact with friends and relatives on the Internet.  It is increasingly common for the public to use the Internet on which they connect with people they know by emails, social networking websites and messaging software.  Also, the public would make new friends online by these means.

Technology Crimes Related to Online Games

Technology crime related to online games refer to all the criminal offences involved in online games of which some examples for reference are as follows...

Online Business Fraud

Buyer/ Seller fails to receive any goods/ payments after payment has been made/ goods have been delivered on an online platform (B2C/ C2C - Business to Customer/ Customer to Customer).

Unauthorized Access to Computer System

There are two types of cases related to unauthorized access to computer system, which are “Intrusion into a computer system” and “Internet or online account-take-over”.

Others (other types of technology crime)

Any other offence committed by making use of or through the Internet or computer may be regarded as technology crime, such as:

  • Criminal Intimidation/ Blackmail
  • E-Banking Fraud
  • Social Networking Traps
  • Identity Theft
  • Illegal Information
  • Botnets